Commit graph

626 commits

Author SHA1 Message Date
Manuel Alejandro de Brito Fontes
dbb12afbb9 Merge pull request #829 from rlguarino/ross/2017-06-08T18-48-35-07-00
feat(template): wrap IPv6 addresses in []
2017-06-09 13:21:30 -04:00
Ross Guarino
54f6729dc8 feat(template): wrap IPv6 addresses in []
Add formatIP helper function which will wrap IPv6 addresses
in [] and print IPv4 addresses as is.

Closes #828
2017-06-08 20:11:00 -07:00
Nick Sardo
8cd9a5a98a Merge pull request #786 from aledbf/update-echoheaders
Update echoserver image version in examples
2017-06-06 16:38:48 -07:00
Nick Sardo
82bc0059aa Merge pull request #818 from nicksardo/gce-fix-backendStatus
[GLBC] Fix backend status out of bounds error
2017-06-06 13:06:26 -07:00
Nick Sardo
851c9d0d41 Fix backend status out of bounds 2017-06-06 13:02:57 -07:00
Nick Sardo
95114f9a75 Fix mapsEqual out of bounds error 2017-06-06 12:40:37 -07:00
Olve Sæther Hansen
d4600a87b5 Added client_max_body_size to authPath location
Seems like nginx denies the request because it would be over the max body size,
event if `proxy_pass_request_body` is `off`.

This fixes 811
2017-06-02 22:40:29 +02:00
Manuel Alejandro de Brito Fontes
66b4c2606b Merge pull request #809 from aledbf/fix-variables-map
Fix dynamic variable name
2017-06-02 11:59:32 -04:00
Manuel de Brito Fontes
b70e9ca078 Fix dynamic variable name 2017-06-02 11:12:02 -04:00
Arjan Schaaf
a854dc71b2 #789 removing duplicate X-Real-IP header introduced 4bd4bf3be6 2017-05-29 11:43:05 +02:00
Manuel Alejandro de Brito Fontes
32f24380ec Merge pull request #787 from aledbf/pass-server-header
Add setting to allow returning the Server header from the backend
2017-05-28 19:16:58 -04:00
Manuel de Brito Fontes
2f20c6bfcb Add setting to allow returning the Server header from the backend 2017-05-28 17:40:25 -04:00
Manuel de Brito Fontes
b84fc350ee Update echoserver image version in examples 2017-05-28 17:19:34 -04:00
Manuel de Brito Fontes
8837cf93e2 Allow customization of variables hash tables 2017-05-28 16:05:49 -04:00
Manuel Alejandro de Brito Fontes
f00823fd83 Merge pull request #783 from unixwitch/nginx-app-root
nginx/README.md: clarify app-root and fix example hyperlink
2017-05-28 15:43:51 -04:00
Liss Tarnell
6d3e9666ba nginx/README.md: clarify app-root and fix example hyperlink 2017-05-28 20:41:00 +01:00
Manuel Alejandro de Brito Fontes
efd6714d42 Merge pull request #774 from aledbf/fix-tcp-upd-listen
Add IPv6 support in TCP and UDP stream section
2017-05-28 13:11:05 -04:00
Lars Solberg
c12a2fa186 Correcting image version link 2017-05-27 21:04:40 +02:00
Manuel Alejandro de Brito Fontes
865cc78df3 Merge pull request #773 from aknuds1/fix-readme
Fix README WRT. building nginx-ingress-controller
2017-05-27 08:06:33 -04:00
Nick Sardo
fa579af218 Merge pull request #779 from nicksardo/recorder-scheme
Change recorder event scheme for GCE
2017-05-26 15:39:06 -07:00
Nick Sardo
4a43fe400d Use scheme package 2017-05-26 14:43:35 -07:00
Manuel de Brito Fontes
6563330d2b Release nginx ingress controller 0.9-beta.7 2017-05-26 15:10:07 -04:00
Manuel de Brito Fontes
20e99fa409 Update sniff parser to fix index out of bound error 2017-05-26 14:25:06 -04:00
Manuel de Brito Fontes
40cd78d0b8 Add support for IPv6 in TCP and UDP stream section 2017-05-26 12:19:54 -04:00
Arve Knudsen
c34b78b59c Fix README wrt. building nginx-ingress-controller 2017-05-26 16:20:21 +02:00
Matthew Walter
4ef6073f08 Typo fix ingres -> ingress 2017-05-25 23:13:40 -04:00
Nick Sardo
0018fa5b15 Merge pull request #763 from aledbf/release-beta-6
Release nginx ingress controller 0.9-beta.6
2017-05-24 18:02:29 -07:00
Manuel de Brito Fontes
178321b1fe Release nginx ingress controller 0.9-beta.6 2017-05-24 20:14:49 -04:00
Joao Morais
37f8c8bb40 Add ConfigureFlags() on controller interface 2017-05-24 21:03:52 -03:00
Manuel de Brito Fontes
30343c489a Fix bad variable assignment in template nginx 2017-05-24 00:25:42 -04:00
Manuel de Brito Fontes
4d7a280371 Fix server name hash maxSize default value 2017-05-23 20:13:32 -04:00
Nick Sardo
4bed0c8627 Update description if not correct 2017-05-22 16:11:05 -07:00
Manuel de Brito Fontes
07cdee5ca8 Refactoring whitelist source IP verification 2017-05-20 19:32:03 -04:00
Manuel de Brito Fontes
d742dcb55c Specify nginx image arch 2017-05-18 17:57:33 -04:00
Manuel de Brito Fontes
7ceb0a8025 Update nginx image 2017-05-17 14:54:27 -04:00
Manuel Alejandro de Brito Fontes
c831359733 Merge pull request #709 from phekmat/patch-1
Add config for X-Forwarded-For trust
2017-05-17 07:45:49 -04:00
Manuel Alejandro de Brito Fontes
49e490e5e5 Merge pull request #704 from ckeyer/fix_nginx_reload
fix nginx reload flags '-c'
2017-05-17 07:44:54 -04:00
Manuel Alejandro de Brito Fontes
b4032f0648 Merge pull request #722 from aledbf/remove-go-reaper
Remove go-reap and use tini as process reaper
2017-05-17 07:37:23 -04:00
Manuel Alejandro de Brito Fontes
bc6112bbef Merge pull request #724 from davidstack/master
change the directory of default-backend.yaml
2017-05-17 07:36:48 -04:00
Chuanjian Wang
9f32b74fea
fix nginx reload flags '-c' 2017-05-17 18:30:19 +08:00
Vlad Gorodetsky
3bd2cb331f Add keepalive_requests and client_boxy_buffer_size options 2017-05-17 09:36:10 +03:00
Damon Wang
7321704399 change the directory of default-backend.yaml
there is no default-backend.yaml in examples directory.
2017-05-17 11:12:43 +08:00
Manuel de Brito Fontes
22d63d0ad0 Auto stash before merge of "master" and "master/master"
Remove go-reap and use tini as process reaper
2017-05-16 16:06:33 -04:00
Kwok-kuen Cheung
a83f17c716 Set $proxy_upstream_name before location directive
When nginx performs ssl redirect, $proxy_upstream_name used in log
is not initialized because it is set after nginx matched a location directive,
which is not the case when performing a ssl redirect.

refs #711
2017-05-14 08:59:30 +08:00
Manuel Alejandro de Brito Fontes
12d2c4f689 Merge pull request #690 from aledbf/avoid-empty-secret
Fix IP in logs for https traffic
2017-05-12 10:44:20 -03:00
Payam Hekmat
dd894f0f73 Add config for X-Forwarded-For trust
Use the same config option for `set_real_ip_from` when not using proxy protocol. The default remains `0.0.0.0/0`, which is insecure if the ingress is publicly accessible. This at least provides a workaround for #200
2017-05-11 21:55:35 -05:00
Manuel de Brito Fontes
a537d2d0fa Remove secrets from ingress after a Delete event 2017-05-11 22:19:16 -03:00
Manuel de Brito Fontes
4bd4bf3be6 Fix remote address in log when protocol is https 2017-05-11 15:04:19 -03:00
Dan Cech
485098fd69 use nginx vts module version 0.1.14 2017-05-11 13:56:42 -04:00
David Pratt
d56d8b7da1 Use proxy-protocol to pass through source IP to nginx 2017-05-10 16:22:48 -05:00