Commit graph

4493 commits

Author SHA1 Message Date
Kubernetes Prow Robot
a6815c36aa
Merge pull request #4683 from valentinsoe/master
Fixed upgrading example command
2019-10-16 09:21:42 -07:00
Valentin Rul
66c3d70208
Fixed upgrading example command 2019-10-16 14:58:30 +03:00
Kubernetes Prow Robot
be277f8690
Merge pull request #4681 from mantuliu/mantuliu-patch-1
Fix docs/development.md describing inaccurate issues
2019-10-16 01:09:40 -07:00
mantuliu
8a8959cd47
Fix documentation describing inaccurate issues 2019-10-16 13:48:35 +08:00
Kubernetes Prow Robot
04e2ad8fcd
Merge pull request #4678 from wawa0210/doc-install-update
Increase the kubernetes 1.14 version to the installation prompt
2019-10-14 18:07:51 -07:00
张潇
cabab54eab Increase the kubernetes 1.14 version to the installation prompt 2019-10-15 07:31:46 +08:00
Kubernetes Prow Robot
bd07afb1cc
Merge pull request #4673 from jacksontj/helpful_dns_error
More helpful dns error
2019-10-14 09:12:39 -07:00
Thomas Jackson
7fc442c7f1 update test cases 2019-10-14 08:14:35 -07:00
Thomas Jackson
b698699fdd More helpful DNS failure message
Previously if dns.lua failed to resolve a name you'd see the following in your logs:
```
2019/10/12 23:39:34 [error] 41#41: *6474 [lua] dns.lua:121: dns_lookup(): failed to query the DNS server:
server returned error code: 3: name error
server returned error code: 3: name error, context: ngx.timer
```

Unfortunately this doesn't tell you what name is failing (so you have to start guessing). To alleviate the pain this simply adds the host name we are attempting to resolve to the log line so users don't have to guess.
2019-10-14 08:14:35 -07:00
Kubernetes Prow Robot
decc1346dd
Merge pull request #4671 from jacksontj/issue_4670
Discontinue use of a single DNS query to validate an endpoint name
2019-10-13 13:56:36 -07:00
Thomas Jackson
500b043f27 Don't use DNS resolution to "validate FQDN"
As the controller stands today this "validation" is done once per config load, which means if the DNS query fails for any reason the endpoint will remain dead until both (1) a change happens to the ingress and (2) the DNS resolution works. If the user configured the name we should just pass it through, this way the lua dns can attempt to re-query it at its leisure.
2019-10-13 13:16:47 -07:00
Kubernetes Prow Robot
a1a2950413
Merge pull request #4645 from wawa0210/zx-scheduler
Bind ingress controller to linux nodes to avoid Windows scheduling on kubernetes cluster includes linux nodes and windows nodes
2019-10-12 18:44:35 -07:00
xiaozhang
1908d0e605 Bind ingress controller to linux nodes to avoid Windows scheduling on kubernetes cluster includes linux nodes and windows nodes 2019-10-13 08:59:11 +08:00
Kubernetes Prow Robot
69880ac9ad
Merge pull request #4650 from DaveAurionix/master
Expose GeoIP2 Organization as variable $geoip2_org
2019-10-12 15:34:36 -07:00
Kubernetes Prow Robot
8537d7e047
Merge pull request #4658 from turchanov/fix-stream_log_format
Need to quote expansion of `$cfg.LogFormatStream` in `log_stream` access log
2019-10-12 15:10:36 -07:00
Kubernetes Prow Robot
d4f0f55d71
Merge pull request #4669 from frioux/simplifyBufferPool
Simplify initialization function of bytes.Buffer
2019-10-12 10:46:37 -07:00
Arthur Axel 'fREW' Schmidt
ea8f7ea8b7 Simplify initialization function of bytes.Buffer 2019-10-12 08:36:54 -07:00
Sergei Turchanov
0476715022 Need to quote expansion of $cfg.LogFormatStream in log_stream access log
format in nginx.tmpl otherwise individual variables are just glued together
without separating spaces so that you would get these in access logs:

[10/Oct/2019:05:03:30 +0000]TCP200000.003
[10/Oct/2019:05:03:30 +0000]TCP200000.000
[10/Oct/2019:05:05:04 +0000]TCP200000.000

which supposed to be someting like these:
[10/Oct/2019:05:03:30 +0000] TCP 200 0 0 0.003
[10/Oct/2019:05:03:30 +0000] TCP 200 0 0 0.000
[10/Oct/2019:05:05:04 +0000] TCP 200 0 0 0.000
2019-10-10 17:27:15 +10:00
Dave Thompson
8e926b21d1 Expose GeoIP2 Organization as variable $geoip2_org 2019-10-09 09:47:48 +01:00
Kubernetes Prow Robot
8fd17045e6
Merge pull request #4603 from membphis/code-style
optimize: local cache global variable and reduce string object creation.
2019-10-08 07:51:15 -07:00
Kubernetes Prow Robot
2c6fbdca30
Merge pull request #4623 from beautytiger/dev-191001-clean
remove duplicated line in docs
2019-10-01 05:03:34 -07:00
Guangming Wang
e7590ef727 remove duplicated line in docs
Signed-off-by: Guangming Wang <guangming.wang@daocloud.io>
2019-10-01 10:08:45 +08:00
Kubernetes Prow Robot
fb025ab501
Merge pull request #4087 from MRoci/master
Define Modsecurity Snippet via ConfigMap
2019-09-30 15:19:32 -07:00
Kubernetes Prow Robot
27df50a192
Merge pull request #4620 from aspacca/ISSUE-4244-e2e-test
ISSUE-4244 e2e test
2019-09-30 14:57:31 -07:00
Manuel Alejandro de Brito Fontes
7aca7bcc04
Terraform release (#4613)
* Add script to build the ingress controller image using terraform

* Update terraform to 0.12.9
2019-09-30 18:33:46 -03:00
Andrea Spacca
e84c8cd705 ISSUE-4244 e2e test 2019-09-29 23:28:44 +02:00
Manuel Alejandro de Brito Fontes
2de5a893aa
Release 0.26.1 (#4618) 2019-09-29 18:26:23 -03:00
Andrea Spacca
203a3ed455 ISSUE-4244 comply with --health-check-path (#4619) 2019-09-29 14:37:57 -03:00
Manuel Alejandro de Brito Fontes
d5d2b4037c
Fix ports collision when hostNetwork=true (#4617) 2019-09-28 17:30:57 -03:00
MRoci
1ee081ccc8
test modsecurity-snippet 2019-09-28 09:54:10 +02:00
MRoci
72c4ffa8b5
add modsecurity-snippet key 2019-09-28 09:54:07 +02:00
Kubernetes Prow Robot
9ecec0de63
Merge pull request #4607 from aledbf/0.26
Release 0.26.0
2019-09-27 10:57:37 -07:00
Manuel Alejandro de Brito Fontes
6715108d8a
Release 0.26.0 2019-09-27 10:23:12 -03:00
Manuel Alejandro de Brito Fontes
a9f332704a
Fix custom default backend switch to default (#4611) 2019-09-27 10:21:28 -03:00
Kubernetes Prow Robot
fd9acd412f
Merge pull request #4606 from aledbf/fix-dirs
Mount temporal directory volume for ingress controller
2019-09-25 09:38:03 -07:00
Manuel Alejandro de Brito Fontes
6100836375
Mount temporal directory volume for ingress controller 2019-09-25 13:03:17 -03:00
Kubernetes Prow Robot
50b6715f06
Merge pull request #4604 from aledbf/2353
Change default for proxy-add-original-uri-header
2019-09-25 07:28:00 -07:00
Manuel Alejandro de Brito Fontes
2bd8121338
Change default for proxy-add-original-uri-header 2019-09-25 10:57:31 -03:00
Yuansheng
e4571fdeef optimize: local cache global variable and reduce string object creation.
and some code style.
2019-09-25 09:43:11 -04:00
Kubernetes Prow Robot
ceddec4ea0
Merge pull request #4588 from multi-io/patch-1
tls user guide --default-ssl-certificate clarification
2019-09-25 06:14:00 -07:00
Kubernetes Prow Robot
182de47479
Merge pull request #4602 from ElvinEfendi/fix-clear-cert
fix bug with new and running configuration comparison
2019-09-25 05:44:00 -07:00
Elvin Efendi
fe2ea692a6 adjust tests to the new no-reload on cert update world 2019-09-25 06:59:47 -04:00
Elvin Efendi
d8a3d616b4 fix bug with new and running configuration comparison 2019-09-25 06:33:59 -04:00
Kubernetes Prow Robot
113f8d2931
Merge pull request #4601 from ElvinEfendi/hsts-refactoring
Hsts refactoring
2019-09-24 19:50:00 -07:00
Kubernetes Prow Robot
702faedaac
Merge pull request #4600 from aledbf/update-image
Update nginx image
2019-09-24 18:33:59 -07:00
Elvin Efendi
73e659f5fc improve certificate configuration detection per request 2019-09-24 21:17:22 -04:00
Elvin Efendi
c5a8357f1d handle hsts header injection in lua 2019-09-24 21:17:22 -04:00
Manuel Alejandro de Brito Fontes
361f3da4d5
Update nginx image 2019-09-24 21:19:48 -03:00
Kubernetes Prow Robot
daf8634acf
Merge pull request #4595 from aledbf/nginx-update
Rollback change of ModSecurity setting SecAuditLog
2019-09-24 17:05:59 -07:00
Kubernetes Prow Robot
a0a025ca8a
Merge pull request #4598 from ElvinEfendi/simplify-conf
delete redundant config
2019-09-24 16:39:59 -07:00