Manuel de Brito Fontes
d43021b3f1
Update gce node return types
2016-08-25 14:08:29 -03:00
Manuel de Brito Fontes
e91c23ff2d
Refactoring of templates
2016-08-25 14:08:29 -03:00
kayrus
d8fbe2f582
ingress: removed unnecessary whitespaces
2016-08-23 10:37:10 +02:00
Kubernetes Submit Queue
e4236ad0f2
Merge pull request #1577 from aledbf/update-nginx-controller
...
Automatic merge from submit-queue
WIP: [nginx-ingress-controller] Release 0.8.3
fixes #1572
2016-08-22 11:33:31 -07:00
Manuel de Brito Fontes
4f92eb9da2
Always listen on port 443, even without ingress rules
2016-08-22 10:51:11 -03:00
Manuel de Brito Fontes
9d07120eb1
Release 0.8.3
2016-08-19 11:44:22 -03:00
kayrus
e4de1e62b8
ingress: use POD_NAMESPACE as a namespace in cli parameters
2016-08-19 10:25:38 +02:00
Kubernetes Submit Queue
727a62421e
Merge pull request #1467 from aledbf/change-client
...
Automatic merge from submit-queue
[nginx-ingress-controller]: Use ClientConfig to configure connection
fixes #1459
Running with `docker run`:
```
core@localhost ~ $ docker run -it aledbf/nginx-third-party:0.31 bash
root@f6a96f46eab0:/# export KUBERNETES_MASTER=http://172.17.4.99:8080
root@f6a96f46eab0:/# /nginx-ingress-controller --default-backend-service=default/nginx-errors
I0802 14:44:58.604384 7 main.go:94] Using build: https://github.com/aledbf/contrib - git-5b9146a
W0802 14:44:58.605282 7 main.go:118] unexpected error getting runtime information: unable to get POD information (missing POD_NAME or POD_NAMESPACE environment variable)
I0802 14:44:58.607270 7 main.go:123] Validated default/nginx-errors as the default backend
W0802 14:44:58.611322 7 ssl.go:132] no file dhparam.pem found in secrets
I0802 14:44:58.615637 7 controller.go:1128] starting NGINX loadbalancer controller
I0802 14:44:58.615902 7 command.go:35] Starting NGINX process...
```
Running inside in a cluster:
```
I0802 14:47:50.254736 1 main.go:94] Using build: https://github.com/aledbf/contrib - git-5b9146a
I0802 14:47:50.254920 1 merged_client_builder.go:103] No kubeconfig could be created, falling back to service account.
I0802 14:47:50.343440 1 main.go:123] Validated default/nginx-errors as the default backend
W0802 14:47:50.343677 1 ssl.go:132] no file dhparam.pem found in secrets
I0802 14:47:50.347322 1 controller.go:1128] starting NGINX loadbalancer controller
I0802 14:47:50.347870 1 command.go:35] Starting NGINX process...
```
<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg " height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1467 )
<!-- Reviewable:end -->
2016-08-17 13:40:11 -07:00
Kubernetes Submit Queue
01cf346b6f
Merge pull request #1435 from mml/k8s-ig-dead-code
...
Automatic merge from submit-queue
Delete dead code in cluster_manager.
<!-- Reviewable:start -->
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg " height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1435 )
<!-- Reviewable:end -->
2016-08-12 14:13:33 -07:00
Kubernetes Submit Queue
34a469fa1b
Merge pull request #1363 from bprashanth/ing_uid
...
Automatic merge from submit-queue
Use existing uid if one is found
Without this if we create some ingresses we will get eg: a forwarding rule like "foo-uid". Now if we restart
the ingress controller, and while it's down delete the configmap where it stores its uid, it will come back, see an existing ingress, but wrongly record the uid as "empty string". This will cause the ingress to ignore the old forwarding rule, backends etc.
<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg " height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1363 )
<!-- Reviewable:end -->
2016-08-12 11:03:58 -07:00
bprashanth
fc50762257
Poll and notice changes to cluster UID
2016-08-11 18:03:00 -07:00
Kubernetes Submit Queue
dfc322c2a2
Merge pull request #1503 from bprashanth/backends
...
Automatic merge from submit-queue
Don't clobber backends.
If a parallel ingress controller updates the backend service with another instance group, don't clobber it, just make sure the instance group you put in is there.
2016-08-11 17:13:50 -07:00
Kubernetes Submit Queue
3032ff166f
Merge pull request #1501 from bprashanth/ing_docs_listing
...
Automatic merge from submit-queue
Correctly handle ingress.class in GCE controller
This bug would only get activated when a user has both `ingess.class=gce` and `ingress.class=nginx` ingresses active in the same GCE/GKE cluster, and would manifest as a set of cloud resources created wastefully for the `ingress.class=nginx` ingress as well.
We were previously only ignoring ingress.class (documented here: https://github.com/kubernetes/contrib/blob/master/ingress/controllers/gce/BETA_LIMITATIONS.md#disabling-glbc ) when the ingress was created/deleted/modified. There's a chance another ingress with the correct class results in us entering the `sync` routine and listing all ingresses. The listing routine was not smart enough to ignore `ingress.class=nginx`, so we ended up creating resources for the nginx ingress anyway.
The second commit fixes some of the nginx examples to include a `readiness` probe that is == liveness probe.
Minhan or Girish, whichever one has spare cycles first.
2016-08-11 13:43:47 -07:00
bprashanth
114dbd3575
Don't clobber backends inserted by other controllers.
2016-08-10 19:23:31 -07:00
Matt Liggett
1b5d8fe011
Delete dead code in cluster_manager.
2016-08-10 15:50:25 -07:00
bprashanth
7e674d5f24
Bump glbc image.
2016-08-10 14:09:08 -07:00
Prashanth Balasubramanian
c479d3e261
Bump glbc version
2016-08-08 19:10:09 -07:00
bprashanth
1a890fe7db
Continue to ingore non-gce ingress in lister.
2016-08-08 12:47:37 -07:00
Prashanth B
139c5f2b4b
Merge pull request #1450 from aledbf/improve-template-errors
...
[nginx-ingress-controller]: Check for errors in nginx template
2016-08-05 13:57:45 -07:00
Manuel de Brito Fontes
4fe3462a82
Change healthz port to avoid conflicts when running using hostNetwork
2016-08-02 23:10:47 -04:00
Anirudh
b28e1607c6
Removing non-org members.
2016-08-02 14:33:22 -07:00
Manuel de Brito Fontes
0f70b80745
Use ClientConfig to configure connection
2016-08-02 10:46:35 -04:00
Siva Manivannan
c2d56dc685
GCE ingress http-only annotation naming fix
2016-08-02 00:10:24 -05:00
foxish
1abf443742
Generated OWNERS files for each directory under contrib.
2016-08-01 11:00:19 -07:00
Prashanth Balasubramanian
632d4ae45c
Fix health check link
2016-07-29 14:54:01 -07:00
Manuel de Brito Fontes
0886c7e58a
Check for errors in nginx template
2016-07-28 17:41:12 -04:00
Manuel de Brito Fontes
9f64273b9c
Use system self signed certificate as default SSL certificate
2016-07-22 19:30:00 -04:00
Manuel de Brito Fontes
2c7d921d76
Update changelog
2016-07-20 16:39:46 -04:00
Manuel de Brito Fontes
3ef038c557
Change nginx status port to 18080 to avoid conflicts with port 8080
2016-07-20 16:39:46 -04:00
Manuel de Brito Fontes
0d1dd32567
Release 0.8.2
2016-07-20 16:39:46 -04:00
Prashanth B
bff40d7c14
Merge pull request #1351 from aledbf/check-certificate
...
[nginx-ingress-controller]: Avoid generation of invalid ssl certificates
2016-07-20 13:36:23 -07:00
Manuel de Brito Fontes
de6b00daa3
Change container /proc values to improve nginx performance
2016-07-20 15:00:30 -04:00
Manuel de Brito Fontes
bf5113d91c
Avoid generation of invalid ssl certificates
2016-07-20 14:36:15 -04:00
Prashanth B
1a04fa4881
Merge pull request #1398 from aledbf/nginx-httpoxy
...
Mitigate HTTPoxy Vulnerability
2016-07-20 10:56:17 -07:00
Prashanth B
5306ca4eb9
Merge pull request #1384 from atombender/issue_1883
...
Unset Authorization header when proxying
2016-07-20 10:54:57 -07:00
Prashanth B
eabad1c990
Merge pull request #1338 from aledbf/ssl-default-backend
...
[nginx-ingress-controller]: Add HTTPS default backend
2016-07-20 10:35:15 -07:00
Prashanth B
fe59e29f5e
Merge pull request #1336 from aledbf/skip-ingress-rules
...
[nginx-ingress-controller]: Add annotation to skip ingress rule
2016-07-20 10:33:17 -07:00
Manuel de Brito Fontes
a38f2b21a1
Mitigate HTTPoxy Vulnerability
2016-07-20 09:55:46 -04:00
Manuel de Brito Fontes
d3d6c879d5
Refactor nginx certificate creation.
2016-07-18 17:08:00 -04:00
Alexander Staubo
5effb7b4e3
Unset Authorization header when proxying.
2016-07-17 22:02:02 -04:00
Prashanth B
ce7085d277
Merge pull request #1289 from simonswine/docs-kube-lego
...
ingress: nginx suggest kube-lego for automated cert management
2016-07-15 17:51:03 -07:00
Prashanth B
1aaa63e0be
Merge pull request #1350 from aledbf/nginx-backlog
...
[nginx-ingress-controller]: Improve performance (listen backlog=net.core.somaxconn)
2016-07-12 08:18:53 -07:00
Manuel de Brito Fontes
b4f1b7c0f5
Show warning in case of low number of connections
2016-07-12 00:40:45 -04:00
Manuel de Brito Fontes
a34124be9d
Update gce NodeCondition parameter
2016-07-11 23:43:36 -04:00
Manuel de Brito Fontes
a736fba0e1
Update godeps
2016-07-11 23:42:47 -04:00
Manuel de Brito Fontes
8b25cc67a5
Improve nginx performance to match listen backlog with net.core.somaxconn
2016-07-11 23:04:21 -04:00
Prashanth B
cce520a950
Merge pull request #1324 from bprashanth/docs
...
GCE Ingress docs update
2016-07-08 20:07:27 -07:00
Manuel de Brito Fontes
8f4efb4e3d
Add HTTPS default backend
2016-07-08 17:20:14 -04:00
Manuel de Brito Fontes
89bbb8d4ee
Add annotation to skip ingress rule
2016-07-08 17:01:40 -04:00
Prashanth Balasubramanian
94ea4ab247
GCE Ingress docs update
2016-07-08 11:15:27 -07:00