Commit graph

2049 commits

Author SHA1 Message Date
Manuel Alejandro de Brito Fontes
47ecbc25e8 Merge pull request #1440 from aledbf/monitor-master-process
Kill worker processes to allow the restart of nginx
2017-09-28 09:17:12 -07:00
Manuel de Brito Fontes
1c73d13733 Kill worker processes to allow the restart of nginx 2017-09-28 11:52:12 -03:00
Manuel Alejandro de Brito Fontes
31dde7b9a7 Merge pull request #1438 from aledbf/do-not-intercept-errors
Do not intercept errors from the custom error service
2017-09-28 06:32:47 -07:00
Manuel de Brito Fontes
5707387daa Do not intercept errors from the custom error service 2017-09-28 10:07:02 -03:00
Manuel de Brito Fontes
d3bb1c441c Add header to upstream server for external authentication 2017-09-27 23:51:01 -03:00
Manuel Alejandro de Brito Fontes
35acacb6ea Merge pull request #1434 from jcmoraisjr/jm-fix-read-secrets
Fix exec of readSecrets
2017-09-27 17:59:07 -07:00
Joao Morais
def90460e6 Check if item is really a task.Element 2017-09-27 21:33:23 -03:00
Joao Morais
23bb14db9f Fix exec of readSecrets 2017-09-27 20:53:31 -03:00
Manuel Alejandro de Brito Fontes
e758ba2512 Merge pull request #1398 from decker502/server-snippet
Surpport snippet for server section by the annotation of the ingess
2017-09-27 10:44:07 -07:00
Manuel Alejandro de Brito Fontes
eedd8a9cfe Merge pull request #1430 from skilld-labs/proxy-protocol-tcp-upstream
Add support for proxy protocol decoding and encoding in TCP services
2017-09-27 10:38:16 -07:00
Manuel Alejandro de Brito Fontes
1d86af08d0 Merge pull request #1426 from diazjf/ma-logging
Enhance Certificate Logging and Clearup Mutual Auth Docs
2017-09-27 10:11:11 -07:00
Jean-Baptiste Guerraz
d44d800a7a Add support for proxy protocol decoding and encoding in TCP services 2017-09-27 19:05:14 +02:00
Fernando Diaz
21ae9b99a6 Enhance Certificate Logging and Clearup Mutual Auth Docs
Adds better logging to errors caused when getting a Certificate.
Adds notes and updates documentation for Mutual Authentication.
2017-09-27 11:09:37 -05:00
decker
3987fe67aa changed by suggest 2017-09-27 14:59:10 +08:00
Manuel Alejandro de Brito Fontes
b35aca66f7 Merge pull request #1424 from albertvaka/patch-1
Allow overriding the tag and registry
2017-09-26 14:26:08 -07:00
Albert Vaca
5b06e34247 Allow overriding the tag and registry
The same way it is possible in controllers/nginx/Makefile
2017-09-26 23:11:25 +02:00
Tony Li
82e190624f Update nginx controller action 2017-09-26 14:46:46 -04:00
Tony Li
3ef5182ebc Clarify list
Make it clear it is not a list of steps, but a list of options.
2017-09-26 14:45:25 -04:00
Manuel Alejandro de Brito Fontes
acca511866 Merge pull request #1423 from aledbf/cast-error
Fix cast error
2017-09-26 11:31:06 -07:00
Manuel de Brito Fontes
12975a8771 Fix cast error 2017-09-26 15:05:20 -03:00
Manuel de Brito Fontes
5119becba5 Fix cast error 2017-09-26 15:04:21 -03:00
Manuel de Brito Fontes
08a6cfea23 Fix template mappings 2017-09-26 14:20:36 -03:00
Manuel de Brito Fontes
d2d8f0463f Merge remote-tracking branch 'master/master' into refactor-template-headers
Merge
2017-09-26 14:08:17 -03:00
Manuel Alejandro de Brito Fontes
34c867fe1f Merge pull request #1384 from aledbf/opentracing
Add support for opentracing
2017-09-26 09:29:08 -07:00
Nick Sardo
ae017c2c5c Merge pull request #1383 from aledbf/nginx-opentracing
Release nginx-slim 0.25
2017-09-26 09:08:39 -07:00
Manuel Alejandro de Brito Fontes
acd0a7497c Merge pull request #1420 from aledbf/group-queue-itema
Process queue items by time window
2017-09-26 06:37:30 -07:00
Manuel de Brito Fontes
18f85241b6 Process queue items by time window 2017-09-26 09:55:52 -03:00
Manuel Alejandro de Brito Fontes
9377dc3da6 Merge pull request #1419 from aledbf/cleanup
Remove duplicated ingress check code
2017-09-25 13:31:28 -07:00
Manuel de Brito Fontes
b7c256ced9 Remove duplicated ingress check code 2017-09-25 16:40:55 -03:00
Manuel Alejandro de Brito Fontes
acb132c77b Merge pull request #1418 from nikhita/fix-link-design-proposal
Fix links after design proposals move
2017-09-25 11:57:06 -07:00
Nikhita Raghunath
2dda797347 Fix link after design proposals move 2017-09-26 00:19:06 +05:30
Manuel Alejandro de Brito Fontes
7bcdb13592 Merge pull request #1413 from aledbf/resolve-external-names
Validate external names
2017-09-24 14:54:24 -07:00
Manuel de Brito Fontes
8a38c0696c Validate external names 2017-09-24 17:36:59 -03:00
Manuel Alejandro de Brito Fontes
e570f0a564 Merge pull request #1403 from wombat/master
Added tls ports to rbac nginx ingress controller and service
2017-09-24 12:31:14 -07:00
Manuel Alejandro de Brito Fontes
ca85107a46 Merge pull request #1404 from bobveznat/patch-1
Use nginx default value for SSLECDHCurve
2017-09-24 12:31:01 -07:00
Manuel Alejandro de Brito Fontes
1f94295d53 Merge pull request #1402 from auhlig/nilpointerfix
fix error when cert or key is nil
2017-09-24 12:30:12 -07:00
Manuel Alejandro de Brito Fontes
c7a9cf4bef Merge pull request #1400 from maxlaverse/fix_configmap_link
Fix ConfigMap link in doc
2017-09-24 12:29:34 -07:00
Manuel Alejandro de Brito Fontes
bf06e7e332 Merge pull request #1411 from diazjf/fix-cert-logs
Add more descriptive logging in certificate loading
2017-09-24 12:27:52 -07:00
Manuel Alejandro de Brito Fontes
9d5a9e532f Merge pull request #1412 from diazjf/empty-strings
Correct Error Handling to avoid panics and add more logging to template
2017-09-24 12:27:21 -07:00
Fernando Diaz
f1214d6535 Correct Error Handling to avoid panics and add more logging to template
When a type error is found we return an empty object of the expected
type(Example: return "" for string return type). Also makes adds logging
to all errors caused by type and corrects all related logging for consistency.
2017-09-22 18:12:08 -05:00
Fernando Diaz
02ba91d191 Add more descriptive logging in certificate loading
Currently a log "secret %v has no private key" is provided for
cert and "secret %v has no cert" is provided for key. They are in
the wrong place. This PR corrects the ordering and adds a
description as to what is actually missing.
2017-09-22 15:21:16 -05:00
Bob Van Zant
b01fb760a5 Use nginx default value for SSLECDHCurve
This configuration setting permits nginx to auto discover supported curves based on what openssl was compiled with. With the old default of secp384r1 if you attempted to use a key from a different curve, for example prime256v1, the SSL handshake would fail in an awful way without any helpful errors logged anywhere.

The default setting in nginx has been "auto" since 1.11.0
2017-09-21 11:56:52 -07:00
Daniel Sachse
a2b97de6c7 Added tls ports to rbac nginx ingress controller and service
The rbac nginx ingress controller and service were missing tls/https
ports and nodePorts
2017-09-21 19:53:43 +02:00
Arno Uhlig
706956c619 fix error when cert or key is nil 2017-09-21 17:50:20 +02:00
Max Laverse
48ccd5f87a Fix ConfigMap link in doc 2017-09-21 10:22:46 +02:00
decker
7bf1a2b3d6 fix test 2017-09-21 14:50:11 +08:00
decker
52d8df5266 Surpport snippet for server section by the annotation of the ingess 2017-09-20 17:35:16 +08:00
Manuel Alejandro de Brito Fontes
3c9e6beca5 Merge pull request #1393 from aledbf/fix-sync
Limit the number of goroutines used for the update of  ingress status
2017-09-19 20:42:10 -07:00
Manuel de Brito Fontes
0d8e22d188 Limit the number of goroutines used for the update of ingress status 2017-09-20 00:40:39 -03:00
Manuel Alejandro de Brito Fontes
edda2ad08e Merge pull request #1391 from thedch/patch-1
Add missing whitespace line between items
2017-09-19 20:33:36 -07:00