qianyong
8ca5450e22
bugfix: always update trafficShapingPolicy when using ewma as load-balance even if endpoints not change, otherwise update trafficShapingPolicy will not working
2020-12-01 12:10:15 +08:00
Manuel Alejandro de Brito Fontes
3f153add00
Refactor handling of path Prefix and Exact
2020-11-10 07:21:34 -03:00
Manuel Alejandro de Brito Fontes
a6b6f03b53
Add support for k8s ingress pathtype Prefix
2020-11-02 09:56:49 -05:00
Manuel Alejandro de Brito Fontes
493dd6726d
Replace request_uri
2020-09-27 20:26:39 -03:00
wenzong
87e79da16a
Move ocsp_response_cache:delete after certificate_data:set
2020-09-19 23:16:00 +08:00
wenzong
16f970d8bb
Use was_not_called without check args match
2020-09-19 00:15:42 +08:00
wenzong
724646bd73
Delete OCSP Response cache when certificate renewed
2020-09-18 14:30:18 +08:00
Frank Gadban
e9059eef01
fixed some typos
...
Signed-off-by: Frank Gadban <frankgad@outlook.de>
2020-07-21 22:02:23 +02:00
agile6v
3402d07ff0
doc: update docs and fixed typos ( #5821 )
2020-07-01 10:02:52 -04:00
Manuel Alejandro de Brito Fontes
bcc3cfaa65
Dynamic LB sync non-external backends only when necessary
2020-06-29 18:11:51 -04:00
Bo0km4n
7ab0916c92
Resolve conflicts
2020-06-20 17:13:31 +09:00
Bo0km4n
53a6b0fd3b
Configurable metrics max batch size
2020-06-20 15:58:14 +09:00
agile6v
5b0f7d7d6e
Improve performance.
2020-06-10 17:36:56 +08:00
Manuel Alejandro de Brito Fontes
1d4c7ec65c
Fix lua lint error
2020-06-09 17:19:16 -04:00
Andreas Sommer
f27b404421
Serve correct TLS certificate for requests with uppercase host
2020-06-09 16:47:03 -04:00
agile6v
bafbd4cccf
Enable lj-releng tool to lint lua code.
2020-06-09 18:01:35 +08:00
agile6v
c035a144f8
Support the combination of nginx variables and text value for annotation upstream-hash-by.
2020-06-01 06:37:41 +08:00
Elvin Efendi
3b217cf766
make sure first backend sync happens in timer phase
2020-04-30 19:44:24 -04:00
Manuel Alejandro de Brito Fontes
c8eb914d8a
Remove noisy dns log
2020-04-28 18:34:51 -04:00
Elvin Efendi
b569d2357a
staple only when OCSP response status is "good"
2020-04-19 13:53:47 -04:00
Elvin Efendi
1dab12fb81
Lua OCSP stapling
2020-04-16 21:29:16 -04:00
Elvin Efendi
b60e25f1db
ingress-nginx lua plugins documentation
2020-04-14 09:47:58 -04:00
Manuel Alejandro de Brito Fontes
8527f774f7
Change condition order that produces endless loop
2020-04-03 10:53:40 -03:00
Kubernetes Prow Robot
5cf7018b6d
Merge pull request #5277 from ElvinEfendi/small-refactoring
...
refactoring: use more specific var name
2020-03-23 06:02:51 -07:00
Manuel Alejandro de Brito Fontes
6ea6d47044
Empty directory
2020-03-22 17:16:30 -03:00
Manuel Alejandro de Brito Fontes
1894579455
Remove unnecessary logs
2020-03-22 17:09:39 -03:00
Elvin Efendi
eb112ea06c
refactoring: use more specific var name
2020-03-21 21:23:24 -04:00
Lisheng Zheng
f2e5d6f8a5
Migrate the backends handler logic to function
2020-02-27 09:31:04 +08:00
Lisheng Zheng
0b33650bb8
Feat: canary supports using specific match strategy to match header value.
2020-02-21 10:02:20 +08:00
Elvin Efendi
ad78425852
also expose pem cert uid in certificate.call function
2020-02-19 13:41:50 -05:00
Elvin Efendi
4bb9106be2
refactor ssl handling in preperation of OCSP stapling
2020-02-19 13:14:35 -05:00
briankopp
b2beeeab25
Add case for when user agent is nil
...
Add test for nil user agent
2020-02-16 21:07:45 -06:00
Kubernetes Prow Robot
5e54f66ab2
Merge pull request #5040 from BrianKopp/samesite-followup
...
Update documentation and remove hack fixed by upstream cookie library
2020-02-10 10:25:53 -08:00
Ilya Nemakov
46a3e0a6fd
Fix X-Forwarded-Proto based on proxy-protocol server port
2020-02-10 18:08:34 +03:00
BrianKopp
7c7a1b9c8b
Update samesite tests
2020-02-08 12:58:52 -07:00
BrianKopp
34b194c770
Update documentation and remove hack fixed by upstream cookie library
2020-02-08 11:54:52 -07:00
Brian Kopp
1b523390bb
Add SameSite=None support and conditionally omit SameSite=None for backwards compatibility
2020-01-29 14:30:00 -07:00
Boris Djurdjevic
665f924e9e
Add proxy protocol support for X-Forwarded-Port
...
Fixes https://github.com/kubernetes/ingress-nginx/issues/4951
2020-01-24 13:50:35 +01:00
Manuel Alejandro de Brito Fontes
a8c2c9c6bc
Remove todo from lua test ( #4894 )
2020-01-08 19:46:52 -03:00
Manuel Alejandro de Brito Fontes
5ce93d98c2
Fix lua test
2020-01-05 16:00:54 -03:00
Manuel Alejandro de Brito Fontes
6c92c80073
Fix sticky session for ingress without host
2020-01-02 16:52:49 -03:00
Elvin Efendi
54918c0ff2
fix duplicate hsts bug
2019-12-12 13:49:13 -05:00
Laszlo Janosi
31227d61c2
Removing secure-verify-ca-secret support and writing an error log if that annotation is used in an Ingress definition
2019-10-18 10:58:57 +02:00
Thomas Jackson
7fc442c7f1
update test cases
2019-10-14 08:14:35 -07:00
Thomas Jackson
b698699fdd
More helpful DNS failure message
...
Previously if dns.lua failed to resolve a name you'd see the following in your logs:
```
2019/10/12 23:39:34 [error] 41#41: *6474 [lua] dns.lua:121: dns_lookup(): failed to query the DNS server:
server returned error code: 3: name error
server returned error code: 3: name error, context: ngx.timer
```
Unfortunately this doesn't tell you what name is failing (so you have to start guessing). To alleviate the pain this simply adds the host name we are attempting to resolve to the log line so users don't have to guess.
2019-10-14 08:14:35 -07:00
Yuansheng
e4571fdeef
optimize: local cache global variable and reduce string object creation.
...
and some code style.
2019-09-25 09:43:11 -04:00
Elvin Efendi
73e659f5fc
improve certificate configuration detection per request
2019-09-24 21:17:22 -04:00
Elvin Efendi
c5a8357f1d
handle hsts header injection in lua
2019-09-24 21:17:22 -04:00
Elvin Efendi
8c64b12a96
refactor force ssl redirect logic
2019-09-24 14:57:52 -04:00
Elvin Efendi
e392c8a8af
cleanup unused certificates
2019-09-24 14:16:03 -04:00