Deprecate and remove AJP support (#10158)
This commit is contained in:
parent
652a800422
commit
ebb6314494
8 changed files with 3 additions and 34 deletions
|
@ -73,7 +73,6 @@ Do not try to edit it manually.
|
||||||
- [should set backend protocol to grpc:// and use grpc_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L64)
|
- [should set backend protocol to grpc:// and use grpc_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L64)
|
||||||
- [should set backend protocol to grpcs:// and use grpc_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L79)
|
- [should set backend protocol to grpcs:// and use grpc_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L79)
|
||||||
- [should set backend protocol to '' and use fastcgi_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L94)
|
- [should set backend protocol to '' and use fastcgi_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L94)
|
||||||
- [should set backend protocol to '' and use ajp_pass](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/backendprotocol.go#L109)
|
|
||||||
|
|
||||||
### [client-body-buffer-size](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/clientbodybuffersize.go#L28)
|
### [client-body-buffer-size](https://github.com/kubernetes/ingress-nginx/tree/main/test/e2e/annotations/clientbodybuffersize.go#L28)
|
||||||
|
|
||||||
|
|
|
@ -38,7 +38,7 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|
||||||
|[nginx.ingress.kubernetes.io/auth-proxy-set-headers](#external-authentication)|string|
|
|[nginx.ingress.kubernetes.io/auth-proxy-set-headers](#external-authentication)|string|
|
||||||
|[nginx.ingress.kubernetes.io/auth-snippet](#external-authentication)|string|
|
|[nginx.ingress.kubernetes.io/auth-snippet](#external-authentication)|string|
|
||||||
|[nginx.ingress.kubernetes.io/enable-global-auth](#external-authentication)|"true" or "false"|
|
|[nginx.ingress.kubernetes.io/enable-global-auth](#external-authentication)|"true" or "false"|
|
||||||
|[nginx.ingress.kubernetes.io/backend-protocol](#backend-protocol)|string|HTTP,HTTPS,GRPC,GRPCS,AJP|
|
|[nginx.ingress.kubernetes.io/backend-protocol](#backend-protocol)|string|HTTP,HTTPS,GRPC,GRPCS|
|
||||||
|[nginx.ingress.kubernetes.io/canary](#canary)|"true" or "false"|
|
|[nginx.ingress.kubernetes.io/canary](#canary)|"true" or "false"|
|
||||||
|[nginx.ingress.kubernetes.io/canary-by-header](#canary)|string|
|
|[nginx.ingress.kubernetes.io/canary-by-header](#canary)|string|
|
||||||
|[nginx.ingress.kubernetes.io/canary-by-header-value](#canary)|string|
|
|[nginx.ingress.kubernetes.io/canary-by-header-value](#canary)|string|
|
||||||
|
@ -894,7 +894,7 @@ Include /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
|
||||||
### Backend Protocol
|
### Backend Protocol
|
||||||
|
|
||||||
Using `backend-protocol` annotations is possible to indicate how NGINX should communicate with the backend service. (Replaces `secure-backends` in older versions)
|
Using `backend-protocol` annotations is possible to indicate how NGINX should communicate with the backend service. (Replaces `secure-backends` in older versions)
|
||||||
Valid Values: HTTP, HTTPS, GRPC, GRPCS, AJP and FCGI
|
Valid Values: HTTP, HTTPS, GRPC, GRPCS and FCGI
|
||||||
|
|
||||||
By default NGINX uses `HTTP`.
|
By default NGINX uses `HTTP`.
|
||||||
|
|
||||||
|
|
|
@ -80,11 +80,6 @@ export LUA_CJSON_VERSION=2.1.0.10
|
||||||
# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/3.3...master
|
# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/3.3...master
|
||||||
export GEOIP2_VERSION=a26c6beed77e81553686852dceb6c7fdacc5970d
|
export GEOIP2_VERSION=a26c6beed77e81553686852dceb6c7fdacc5970d
|
||||||
|
|
||||||
# Check for recent changes: https://github.com/msva/nginx_ajp_module/compare/fcbb2ccca4901d317ecd7a9dabb3fec9378ff40f...master
|
|
||||||
# This is a fork from https://github.com/yaoweibin/nginx_ajp_module
|
|
||||||
# Since it has not been updated and is not compatible with NGINX 1.21
|
|
||||||
export NGINX_AJP_VERSION=fcbb2ccca4901d317ecd7a9dabb3fec9378ff40f
|
|
||||||
|
|
||||||
# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20220411...v2.1-agentzh
|
# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20220411...v2.1-agentzh
|
||||||
export LUAJIT_VERSION=2.1-20220411
|
export LUAJIT_VERSION=2.1-20220411
|
||||||
|
|
||||||
|
@ -271,9 +266,6 @@ get_src 8d39c6b23f941a2d11571daaccc04e69539a3fcbcc50a631837560d5861a7b96 \
|
||||||
get_src 4c1933434572226942c65b2f2b26c8a536ab76aa771a3c7f6c2629faa764976b \
|
get_src 4c1933434572226942c65b2f2b26c8a536ab76aa771a3c7f6c2629faa764976b \
|
||||||
"https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz"
|
"https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz"
|
||||||
|
|
||||||
get_src 778fcca851bd69dabfb382dc827d2ee07662f7eca36b5e66e67d5512bad75ef8 \
|
|
||||||
"https://github.com/msva/nginx_ajp_module/archive/$NGINX_AJP_VERSION.tar.gz"
|
|
||||||
|
|
||||||
get_src 5d16e623d17d4f42cc64ea9cfb69ca960d313e12f5d828f785dd227cc483fcbd \
|
get_src 5d16e623d17d4f42cc64ea9cfb69ca960d313e12f5d828f785dd227cc483fcbd \
|
||||||
"https://github.com/openresty/lua-resty-upload/archive/v$LUA_RESTY_UPLOAD_VERSION.tar.gz"
|
"https://github.com/openresty/lua-resty-upload/archive/v$LUA_RESTY_UPLOAD_VERSION.tar.gz"
|
||||||
|
|
||||||
|
@ -633,7 +625,6 @@ WITH_MODULES=" \
|
||||||
--add-module=$BUILD_PATH/lua-nginx-module-$LUA_NGX_VERSION \
|
--add-module=$BUILD_PATH/lua-nginx-module-$LUA_NGX_VERSION \
|
||||||
--add-module=$BUILD_PATH/stream-lua-nginx-module-$LUA_STREAM_NGX_VERSION \
|
--add-module=$BUILD_PATH/stream-lua-nginx-module-$LUA_STREAM_NGX_VERSION \
|
||||||
--add-module=$BUILD_PATH/lua-upstream-nginx-module-$LUA_UPSTREAM_VERSION \
|
--add-module=$BUILD_PATH/lua-upstream-nginx-module-$LUA_UPSTREAM_VERSION \
|
||||||
--add-module=$BUILD_PATH/nginx_ajp_module-${NGINX_AJP_VERSION} \
|
|
||||||
--add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest-$NGINX_DIGEST_AUTH \
|
--add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest-$NGINX_DIGEST_AUTH \
|
||||||
--add-dynamic-module=$BUILD_PATH/nginx-opentracing-$NGINX_OPENTRACING_VERSION/opentracing \
|
--add-dynamic-module=$BUILD_PATH/nginx-opentracing-$NGINX_OPENTRACING_VERSION/opentracing \
|
||||||
--add-dynamic-module=$BUILD_PATH/ModSecurity-nginx-$MODSECURITY_VERSION \
|
--add-dynamic-module=$BUILD_PATH/ModSecurity-nginx-$MODSECURITY_VERSION \
|
||||||
|
|
|
@ -31,7 +31,7 @@ import (
|
||||||
const HTTP = "HTTP"
|
const HTTP = "HTTP"
|
||||||
|
|
||||||
var (
|
var (
|
||||||
validProtocols = regexp.MustCompile(`^(AUTO_HTTP|HTTP|HTTPS|AJP|GRPC|GRPCS|FCGI)$`)
|
validProtocols = regexp.MustCompile(`^(AUTO_HTTP|HTTP|HTTPS|GRPC|GRPCS|FCGI)$`)
|
||||||
)
|
)
|
||||||
|
|
||||||
type backendProtocol struct {
|
type backendProtocol struct {
|
||||||
|
|
|
@ -736,9 +736,6 @@ func buildProxyPass(host string, b interface{}, loc interface{}) string {
|
||||||
case "GRPCS":
|
case "GRPCS":
|
||||||
proto = "grpcs://"
|
proto = "grpcs://"
|
||||||
proxyPass = "grpc_pass"
|
proxyPass = "grpc_pass"
|
||||||
case "AJP":
|
|
||||||
proto = ""
|
|
||||||
proxyPass = "ajp_pass"
|
|
||||||
case "FCGI":
|
case "FCGI":
|
||||||
proto = ""
|
proto = ""
|
||||||
proxyPass = "fastcgi_pass"
|
proxyPass = "fastcgi_pass"
|
||||||
|
|
|
@ -1137,7 +1137,6 @@ func TestOpentracingPropagateContext(t *testing.T) {
|
||||||
{BackendProtocol: "AUTO_HTTP"}: "opentracing_propagate_context;",
|
{BackendProtocol: "AUTO_HTTP"}: "opentracing_propagate_context;",
|
||||||
{BackendProtocol: "GRPC"}: "opentracing_grpc_propagate_context;",
|
{BackendProtocol: "GRPC"}: "opentracing_grpc_propagate_context;",
|
||||||
{BackendProtocol: "GRPCS"}: "opentracing_grpc_propagate_context;",
|
{BackendProtocol: "GRPCS"}: "opentracing_grpc_propagate_context;",
|
||||||
{BackendProtocol: "AJP"}: "opentracing_propagate_context;",
|
|
||||||
{BackendProtocol: "FCGI"}: "opentracing_propagate_context;",
|
{BackendProtocol: "FCGI"}: "opentracing_propagate_context;",
|
||||||
nil: "",
|
nil: "",
|
||||||
}
|
}
|
||||||
|
@ -1157,7 +1156,6 @@ func TestOpentelemetryPropagateContext(t *testing.T) {
|
||||||
{BackendProtocol: "AUTO_HTTP"}: "opentelemetry_propagate;",
|
{BackendProtocol: "AUTO_HTTP"}: "opentelemetry_propagate;",
|
||||||
{BackendProtocol: "GRPC"}: "opentelemetry_propagate;",
|
{BackendProtocol: "GRPC"}: "opentelemetry_propagate;",
|
||||||
{BackendProtocol: "GRPCS"}: "opentelemetry_propagate;",
|
{BackendProtocol: "GRPCS"}: "opentelemetry_propagate;",
|
||||||
{BackendProtocol: "AJP"}: "opentelemetry_propagate;",
|
|
||||||
{BackendProtocol: "FCGI"}: "opentelemetry_propagate;",
|
{BackendProtocol: "FCGI"}: "opentelemetry_propagate;",
|
||||||
nil: "",
|
nil: "",
|
||||||
}
|
}
|
||||||
|
|
|
@ -307,7 +307,6 @@ http {
|
||||||
client_body_temp_path /tmp/nginx/client-body;
|
client_body_temp_path /tmp/nginx/client-body;
|
||||||
fastcgi_temp_path /tmp/nginx/fastcgi-temp;
|
fastcgi_temp_path /tmp/nginx/fastcgi-temp;
|
||||||
proxy_temp_path /tmp/nginx/proxy-temp;
|
proxy_temp_path /tmp/nginx/proxy-temp;
|
||||||
ajp_temp_path /tmp/nginx/ajp-temp;
|
|
||||||
|
|
||||||
client_header_buffer_size {{ $cfg.ClientHeaderBufferSize }};
|
client_header_buffer_size {{ $cfg.ClientHeaderBufferSize }};
|
||||||
client_header_timeout {{ $cfg.ClientHeaderTimeout }}s;
|
client_header_timeout {{ $cfg.ClientHeaderTimeout }}s;
|
||||||
|
|
|
@ -105,19 +105,4 @@ var _ = framework.DescribeAnnotation("backend-protocol", func() {
|
||||||
return strings.Contains(server, "fastcgi_pass upstream_balancer;")
|
return strings.Contains(server, "fastcgi_pass upstream_balancer;")
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should set backend protocol to '' and use ajp_pass", func() {
|
|
||||||
host := "backendprotocol.foo.com"
|
|
||||||
annotations := map[string]string{
|
|
||||||
"nginx.ingress.kubernetes.io/backend-protocol": "AJP",
|
|
||||||
}
|
|
||||||
|
|
||||||
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
|
|
||||||
f.EnsureIngress(ing)
|
|
||||||
|
|
||||||
f.WaitForNginxServer(host,
|
|
||||||
func(server string) bool {
|
|
||||||
return strings.Contains(server, "ajp_pass upstream_balancer;")
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
})
|
||||||
|
|
Loading…
Reference in a new issue