Commit graph

7924 commits

Author SHA1 Message Date
Manuel de Brito Fontes
d43021b3f1 Update gce node return types 2016-08-25 14:08:29 -03:00
Manuel de Brito Fontes
e91c23ff2d Refactoring of templates 2016-08-25 14:08:29 -03:00
kayrus
d8fbe2f582 ingress: removed unnecessary whitespaces 2016-08-23 10:37:10 +02:00
Kubernetes Submit Queue
e4236ad0f2 Merge pull request #1577 from aledbf/update-nginx-controller
Automatic merge from submit-queue

WIP: [nginx-ingress-controller] Release 0.8.3

fixes #1572
2016-08-22 11:33:31 -07:00
Manuel de Brito Fontes
4f92eb9da2 Always listen on port 443, even without ingress rules 2016-08-22 10:51:11 -03:00
Manuel de Brito Fontes
9d07120eb1 Release 0.8.3 2016-08-19 11:44:22 -03:00
kayrus
e4de1e62b8 ingress: use POD_NAMESPACE as a namespace in cli parameters 2016-08-19 10:25:38 +02:00
Kubernetes Submit Queue
727a62421e Merge pull request #1467 from aledbf/change-client
Automatic merge from submit-queue

[nginx-ingress-controller]: Use ClientConfig to configure connection

fixes #1459

Running with `docker run`:
```
core@localhost ~ $ docker run -it aledbf/nginx-third-party:0.31 bash
root@f6a96f46eab0:/# export KUBERNETES_MASTER=http://172.17.4.99:8080
root@f6a96f46eab0:/# /nginx-ingress-controller --default-backend-service=default/nginx-errors
I0802 14:44:58.604384       7 main.go:94] Using build: https://github.com/aledbf/contrib - git-5b9146a
W0802 14:44:58.605282       7 main.go:118] unexpected error getting runtime information: unable to get POD information (missing POD_NAME or POD_NAMESPACE environment variable)
I0802 14:44:58.607270       7 main.go:123] Validated default/nginx-errors as the default backend
W0802 14:44:58.611322       7 ssl.go:132] no file dhparam.pem found in secrets
I0802 14:44:58.615637       7 controller.go:1128] starting NGINX loadbalancer controller
I0802 14:44:58.615902       7 command.go:35] Starting NGINX process...
```

Running inside in a cluster:
```
I0802 14:47:50.254736       1 main.go:94] Using build: https://github.com/aledbf/contrib - git-5b9146a
I0802 14:47:50.254920       1 merged_client_builder.go:103] No kubeconfig could be created, falling back to service account.
I0802 14:47:50.343440       1 main.go:123] Validated default/nginx-errors as the default backend
W0802 14:47:50.343677       1 ssl.go:132] no file dhparam.pem found in secrets
I0802 14:47:50.347322       1 controller.go:1128] starting NGINX loadbalancer controller
I0802 14:47:50.347870       1 command.go:35] Starting NGINX process...
```

<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1467)
<!-- Reviewable:end -->
2016-08-17 13:40:11 -07:00
Kubernetes Submit Queue
01cf346b6f Merge pull request #1435 from mml/k8s-ig-dead-code
Automatic merge from submit-queue

Delete dead code in cluster_manager.



<!-- Reviewable:start -->
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1435)
<!-- Reviewable:end -->
2016-08-12 14:13:33 -07:00
Kubernetes Submit Queue
34a469fa1b Merge pull request #1363 from bprashanth/ing_uid
Automatic merge from submit-queue

Use existing uid if one is found

Without this if we create some ingresses we will get eg: a forwarding rule like "foo-uid". Now if we restart 
the ingress controller, and while it's down delete the configmap where it stores its uid, it will come back, see an existing ingress, but wrongly record the uid as "empty string". This will cause the ingress to ignore the old forwarding rule, backends etc.

<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.kubernetes.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.kubernetes.io/reviews/kubernetes/contrib/1363)
<!-- Reviewable:end -->
2016-08-12 11:03:58 -07:00
bprashanth
fc50762257 Poll and notice changes to cluster UID 2016-08-11 18:03:00 -07:00
Kubernetes Submit Queue
dfc322c2a2 Merge pull request #1503 from bprashanth/backends
Automatic merge from submit-queue

Don't clobber backends.

If a parallel ingress controller updates the backend service with another instance group, don't clobber it, just make sure the instance group you put in is there.
2016-08-11 17:13:50 -07:00
Kubernetes Submit Queue
3032ff166f Merge pull request #1501 from bprashanth/ing_docs_listing
Automatic merge from submit-queue

Correctly handle ingress.class in GCE controller 

This bug would only get activated when a user has both `ingess.class=gce` and `ingress.class=nginx` ingresses active in the same GCE/GKE cluster, and would manifest as a set of cloud resources created wastefully for the `ingress.class=nginx` ingress as well.

We were previously only ignoring ingress.class (documented here: https://github.com/kubernetes/contrib/blob/master/ingress/controllers/gce/BETA_LIMITATIONS.md#disabling-glbc) when the ingress was created/deleted/modified. There's a chance another ingress with the correct class results in us entering the `sync` routine and listing all ingresses. The listing routine was not smart enough to ignore `ingress.class=nginx`, so we ended up creating resources for the nginx ingress anyway. 

The second commit fixes some of the nginx examples to include a `readiness` probe that is == liveness probe. 

Minhan or Girish, whichever one has spare cycles first.
2016-08-11 13:43:47 -07:00
bprashanth
114dbd3575 Don't clobber backends inserted by other controllers. 2016-08-10 19:23:31 -07:00
Matt Liggett
1b5d8fe011 Delete dead code in cluster_manager. 2016-08-10 15:50:25 -07:00
bprashanth
7e674d5f24 Bump glbc image. 2016-08-10 14:09:08 -07:00
Prashanth Balasubramanian
c479d3e261 Bump glbc version 2016-08-08 19:10:09 -07:00
bprashanth
1a890fe7db Continue to ingore non-gce ingress in lister. 2016-08-08 12:47:37 -07:00
Prashanth B
139c5f2b4b Merge pull request #1450 from aledbf/improve-template-errors
[nginx-ingress-controller]: Check for errors in nginx template
2016-08-05 13:57:45 -07:00
Manuel de Brito Fontes
4fe3462a82 Change healthz port to avoid conflicts when running using hostNetwork 2016-08-02 23:10:47 -04:00
Anirudh
b28e1607c6 Removing non-org members. 2016-08-02 14:33:22 -07:00
Manuel de Brito Fontes
0f70b80745 Use ClientConfig to configure connection 2016-08-02 10:46:35 -04:00
Siva Manivannan
c2d56dc685 GCE ingress http-only annotation naming fix 2016-08-02 00:10:24 -05:00
foxish
1abf443742 Generated OWNERS files for each directory under contrib. 2016-08-01 11:00:19 -07:00
Prashanth Balasubramanian
632d4ae45c Fix health check link 2016-07-29 14:54:01 -07:00
Manuel de Brito Fontes
0886c7e58a Check for errors in nginx template 2016-07-28 17:41:12 -04:00
Manuel de Brito Fontes
9f64273b9c Use system self signed certificate as default SSL certificate 2016-07-22 19:30:00 -04:00
Manuel de Brito Fontes
2c7d921d76 Update changelog 2016-07-20 16:39:46 -04:00
Manuel de Brito Fontes
3ef038c557 Change nginx status port to 18080 to avoid conflicts with port 8080 2016-07-20 16:39:46 -04:00
Manuel de Brito Fontes
0d1dd32567 Release 0.8.2 2016-07-20 16:39:46 -04:00
Prashanth B
bff40d7c14 Merge pull request #1351 from aledbf/check-certificate
[nginx-ingress-controller]: Avoid generation of invalid ssl certificates
2016-07-20 13:36:23 -07:00
Manuel de Brito Fontes
de6b00daa3 Change container /proc values to improve nginx performance 2016-07-20 15:00:30 -04:00
Manuel de Brito Fontes
bf5113d91c Avoid generation of invalid ssl certificates 2016-07-20 14:36:15 -04:00
Prashanth B
1a04fa4881 Merge pull request #1398 from aledbf/nginx-httpoxy
Mitigate HTTPoxy Vulnerability
2016-07-20 10:56:17 -07:00
Prashanth B
5306ca4eb9 Merge pull request #1384 from atombender/issue_1883
Unset Authorization header when proxying
2016-07-20 10:54:57 -07:00
Prashanth B
eabad1c990 Merge pull request #1338 from aledbf/ssl-default-backend
[nginx-ingress-controller]: Add HTTPS default backend
2016-07-20 10:35:15 -07:00
Prashanth B
fe59e29f5e Merge pull request #1336 from aledbf/skip-ingress-rules
[nginx-ingress-controller]: Add annotation to skip ingress rule
2016-07-20 10:33:17 -07:00
Manuel de Brito Fontes
a38f2b21a1 Mitigate HTTPoxy Vulnerability 2016-07-20 09:55:46 -04:00
Manuel de Brito Fontes
d3d6c879d5 Refactor nginx certificate creation. 2016-07-18 17:08:00 -04:00
Alexander Staubo
5effb7b4e3 Unset Authorization header when proxying. 2016-07-17 22:02:02 -04:00
Prashanth B
ce7085d277 Merge pull request #1289 from simonswine/docs-kube-lego
ingress: nginx suggest kube-lego for automated cert management
2016-07-15 17:51:03 -07:00
Prashanth B
1aaa63e0be Merge pull request #1350 from aledbf/nginx-backlog
[nginx-ingress-controller]: Improve performance (listen backlog=net.core.somaxconn)
2016-07-12 08:18:53 -07:00
Manuel de Brito Fontes
b4f1b7c0f5 Show warning in case of low number of connections 2016-07-12 00:40:45 -04:00
Manuel de Brito Fontes
a34124be9d Update gce NodeCondition parameter 2016-07-11 23:43:36 -04:00
Manuel de Brito Fontes
a736fba0e1 Update godeps 2016-07-11 23:42:47 -04:00
Manuel de Brito Fontes
8b25cc67a5 Improve nginx performance to match listen backlog with net.core.somaxconn 2016-07-11 23:04:21 -04:00
Prashanth B
cce520a950 Merge pull request #1324 from bprashanth/docs
GCE Ingress docs update
2016-07-08 20:07:27 -07:00
Manuel de Brito Fontes
8f4efb4e3d Add HTTPS default backend 2016-07-08 17:20:14 -04:00
Manuel de Brito Fontes
89bbb8d4ee Add annotation to skip ingress rule 2016-07-08 17:01:40 -04:00
Prashanth Balasubramanian
94ea4ab247 GCE Ingress docs update 2016-07-08 11:15:27 -07:00