Commit graph

734 commits

Author SHA1 Message Date
Manuel de Brito Fontes
f19ad83063 Add warning when the ingress controller uses a custom class 2017-03-04 18:35:33 -03:00
Manuel de Brito Fontes
bfa183e174 Cleanup custom log format configuration 2017-03-04 18:35:33 -03:00
Jakob Jarosch
aeeaa34991 Add documentation for ingress.kubernetes.io/force-ssl-redirect
refs #314 #365
2017-03-03 20:29:43 +01:00
Peter Lee
ebf57a8c34 Minor text fix for "ApiServer"
It looks a little weird to apply camel case style for the noun "apiserver", i didn't see somewhere else spelling it in that way.
2017-03-04 00:40:07 +08:00
Manuel Alejandro de Brito Fontes
f20814087e Merge pull request #356 from gianrubio/patch-1
Disable listen only on ipv6 and fix proxy_protocol
2017-03-03 09:50:43 -03:00
Manuel Alejandro de Brito Fontes
9e74fedc24 Merge pull request #362 from gianrubio/fix-ingress-class
Fix ingress class
2017-03-03 09:49:59 -03:00
Manuel Alejandro de Brito Fontes
940a5e542c Merge pull request #367 from gianrubio/customize-logformat
BuildLogFormatUpstream was always using the default log-format
2017-03-03 09:43:48 -03:00
Manuel Alejandro de Brito Fontes
bc646f571a Merge pull request #365 from pwillie/forcesslredirect
add ForceSSLRedirect ingress annotation
2017-03-03 09:05:02 -03:00
Giancarlo Rubio
6d334f8c8f BuildLogFormatUpstream function was always using the default log-format-upstream, 2017-03-03 13:03:49 +01:00
Manuel Alejandro de Brito Fontes
d91a5ed592 Merge pull request #366 from caiyixiang/add_judgment
add_judgment
2017-03-03 09:02:32 -03:00
caiyixiang
aed822f695 add_judgment 2017-03-03 15:17:32 +08:00
Peter Wilson
4f342cc3c6 add ForceSSLRedirect ingress annotation 2017-03-03 16:44:29 +11:00
Manuel Alejandro de Brito Fontes
133d1210af Merge pull request #354 from caiyixiang/addJudgment
add judgment
2017-03-03 01:03:58 -03:00
caiyixiang
5a29b48fff add judgment 2017-03-03 08:39:18 +08:00
Manuel Alejandro de Brito Fontes
c043af265f Merge pull request #364 from whereisaaron/patch-1
Fix error caused by increasing proxy_buffer_size (#363)
2017-03-02 18:48:19 -03:00
Aaron Roydhouse
19868fd9cc Fix error caused by increasing proxy_buffer_size (#363)
This fixes the bug raised in #363, by increasing the size of the proxy_buffers (memory allocation) to match the size of the proxy buffer. This leaves the default values (with no ingress setting) unchanged:
```
proxy_buffer_size      4k
proxy_buffers            4 4k
```
If 'proxy-buffer-size' is set, then now both the buffer size and the memory allocation size is increased:
```
proxy_buffer_size     "{{ $location.Proxy.BufferSize }}";
proxy_buffers           4 "{{ $location.Proxy.BufferSize }}";
```
I have been using this patch with 0.8.3 and 0.9.0-beta.2.
2017-03-02 16:11:27 -05:00
Christian Bell
c4f1026e0f Better logging and address review comments 2017-03-02 10:54:32 -08:00
Giancarlo Rubio
82214d8181 Fix ingress class 2017-03-02 16:50:31 +01:00
Manuel Alejandro de Brito Fontes
3f83042c4e Merge pull request #361 from caiyixiang/haproxyDaemonset
haproxy Daemonset
2017-03-02 09:05:03 -03:00
caiyixiang
7bf5e5f162 haproxy Daemonset 2017-03-02 16:49:55 +08:00
Manuel Alejandro de Brito Fontes
5830c25abb Merge pull request #358 from rikatz/issue-242
Checks if the TLS secret contains a valid keypair structure
2017-03-01 23:56:23 -03:00
Manuel Alejandro de Brito Fontes
1b156dd0a0 Merge pull request #360 from chentao1596/multi-deployment
add example of 'run multiple nginx ingress controllers as a deployment'
2017-03-01 23:55:48 -03:00
chentao1596
45fdfb6310 add example of 'run multiple nginx ingress controllers as a deployment' 2017-03-02 09:33:01 +08:00
Manuel Alejandro de Brito Fontes
83029860b6 Merge pull request #352 from gianrubio/customize-logformat
Add ability to customize upstream and stream log format
2017-03-01 15:54:14 -03:00
Ricardo Pchevuzinske Katz
181d468e66 Checks if the TLS secret contains a valid keypair structure, with 'CERTIFICATE' before the Private Key 2017-03-01 15:44:39 -03:00
Giancarlo Rubio
cd018f5f48 Add ability to customize upstream and stream log format 2017-03-01 18:47:11 +01:00
Giancarlo Rubio
7a559672fc Disable listen only on ipv6 and fix proxy_protocol
- Always listen on ipv4 address for port 443
- Rollback previous PR #227 that broke the proxy_protocol when passthroughBackends is disabled
2017-03-01 15:31:00 +01:00
Christian Bell
ab5b309cc7 First stab at extending the "uid" configmap to store firewall
rule information.
2017-02-28 10:49:31 -08:00
Manuel Alejandro de Brito Fontes
ec84c38fd1 Merge pull request #351 from danielqsj/master
Enable custom election id for status sync.
2017-02-27 09:19:15 -03:00
shijunqian
ca4fc3907e Enable custom election id for status sync. 2017-02-27 15:35:04 +08:00
Manuel Alejandro de Brito Fontes
1d7a1bbe69 Merge pull request #347 from aledbf/fix-proxy-protocol
Fix client source IP address
2017-02-26 19:24:46 -03:00
Manuel de Brito Fontes
8738976220 Fix client source IP address 2017-02-26 19:01:07 -03:00
Manuel Alejandro de Brito Fontes
decc4a8a4c Merge pull request #235 from rikatz/ingress-ssl-auth
Adds correct support for TLS Muthual autentication
2017-02-25 20:34:28 -03:00
Manuel Alejandro de Brito Fontes
bd8718226d Merge pull request #346 from piosz/metrics
Expose Prometheus metrics in glbc controller
2017-02-25 17:07:44 -03:00
Piotr Szczesniak
6b9f470d83 Expose Prometheus metrics in glbc controller 2017-02-25 18:30:00 +01:00
Manuel Alejandro de Brito Fontes
4a352ee60f Merge pull request #221 from tonglil/typos
Typo: unittesting -> unit testing
2017-02-25 08:12:53 -03:00
Manuel Alejandro de Brito Fontes
0fd106ba5c Merge pull request #222 from tonglil/fix-log-message
Change arg ordering in log message
2017-02-25 08:12:41 -03:00
Manuel Alejandro de Brito Fontes
ec9a3c2fe8 Merge pull request #224 from tonglil/check-error
Check for error getting cert
2017-02-25 08:12:25 -03:00
Ricardo Pchevuzinske Katz
218ed647fc Adds correct support for TLS Muthual autentication and depth verification
modified:   controllers/nginx/configuration.md
	modified:   controllers/nginx/rootfs/etc/nginx/template/nginx.tmpl
	modified:   core/pkg/ingress/annotations/authtls/main.go
	modified:   core/pkg/ingress/controller/backend_ssl.go
	modified:   core/pkg/ingress/controller/controller.go
	modified:   core/pkg/ingress/controller/util_test.go
	modified:   core/pkg/ingress/resolver/main.go
	modified:   core/pkg/ingress/types.go
	modified:   core/pkg/net/ssl/ssl.go
	modified:   examples/PREREQUISITES.md
	new file:   examples/auth/client-certs/nginx/README.md
	new file:   examples/auth/client-certs/nginx/nginx-tls-auth.yaml
2017-02-24 22:49:01 -03:00
Manuel Alejandro de Brito Fontes
ba350bb82e Merge pull request #345 from aledbf/fmt
Fix lint error
2017-02-24 22:16:13 -03:00
Manuel de Brito Fontes
2c26b93eb9 Fix lint error 2017-02-24 21:54:47 -03:00
Manuel Alejandro de Brito Fontes
82d3e0a148 Merge pull request #320 from chentao1596/fix-test-http-service
update some descriptions about of 'Test HTTP Service'
2017-02-24 20:59:56 -03:00
Manuel Alejandro de Brito Fontes
34cd3207c9 Merge pull request #344 from aledbf/tcp-udp
Refactoring of TCP and UDP services
2017-02-24 20:48:13 -03:00
Manuel de Brito Fontes
2b9924861e Refactoring of TCP and UDP services 2017-02-24 20:14:43 -03:00
Manuel Alejandro de Brito Fontes
c97fb56b45 Merge pull request #332 from aledbf/snippets
Add annotation to customize nginx configuration
2017-02-24 18:39:45 -03:00
Manuel Alejandro de Brito Fontes
d9a32d734c Merge pull request #343 from aledbf/node-lister
Fix node lister when --watch-namespace is used
2017-02-24 15:12:01 -03:00
Manuel de Brito Fontes
481df19f59 Fix node lister when --watch-namespace is used 2017-02-24 14:18:10 -03:00
Manuel Alejandro de Brito Fontes
8f16d6f150 Merge pull request #341 from porridge/drop-cover
Do not run coverage check in the default target.
2017-02-24 13:09:53 -03:00
Manuel Alejandro de Brito Fontes
ce1a6cd1ca Merge pull request #340 from gianrubio/custom-proxy-cookies
Add support for specify proxy cookie path/domain
2017-02-24 13:02:40 -03:00
Marcin Owsiany
ed3d0823e6 Do not run coverage check in the default target.
Reasons:
- this takes a lot longer than the other steps
- its results are harder to interpret at a single glance, compared to other
  steps
- it requires special privileges to succeed, and should probably not be ran
  from a random developer's checkout, since it pushes results to a shared
  service
2017-02-24 16:50:10 +01:00