From 55845c95bb087bea369ae41a57d57364cb685a55 Mon Sep 17 00:00:00 2001 From: Wei Lun Date: Thu, 24 Jun 2021 17:28:05 +0800 Subject: [PATCH] docs: fix invalid subdomain --- docs/content/middlewares/headers.md | 8 ++++---- docs/content/middlewares/ipwhitelist.md | 18 +++++++++--------- docs/content/migration/v1-to-v2.md | 6 +++--- docs/content/migration/v2.md | 4 ++-- .../routing/providers/kubernetes-crd.md | 16 ++++++++-------- 5 files changed, 26 insertions(+), 26 deletions(-) diff --git a/docs/content/middlewares/headers.md b/docs/content/middlewares/headers.md index 4b95afa3a..56a1d3602 100644 --- a/docs/content/middlewares/headers.md +++ b/docs/content/middlewares/headers.md @@ -23,7 +23,7 @@ labels: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: - name: testHeader + name: test-header spec: headers: customRequestHeaders: @@ -86,7 +86,7 @@ labels: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: - name: testHeader + name: test-header spec: headers: customRequestHeaders: @@ -154,7 +154,7 @@ labels: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: - name: testHeader + name: test-header spec: headers: frameDeny: true @@ -212,7 +212,7 @@ labels: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: - name: testHeader + name: test-header spec: headers: accessControlAllowMethods: diff --git a/docs/content/middlewares/ipwhitelist.md b/docs/content/middlewares/ipwhitelist.md index 40aca521f..4ca01d167 100644 --- a/docs/content/middlewares/ipwhitelist.md +++ b/docs/content/middlewares/ipwhitelist.md @@ -92,8 +92,8 @@ The `depth` option tells Traefik to use the `X-Forwarded-For` header and take th ```yaml tab="Docker" # Whitelisting Based on `X-Forwarded-For` with `depth=2` labels: - - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" - - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.ipstrategy.depth=2" + - "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" + - "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.ipstrategy.depth=2" ``` ```yaml tab="Kubernetes" @@ -101,7 +101,7 @@ labels: apiVersion: traefik.containo.us/v1alpha1 kind: Middleware metadata: - name: testIPwhitelist + name: test-ipwhitelist spec: ipWhiteList: sourceRange: @@ -113,22 +113,22 @@ spec: ```yaml tab="Consul Catalog" # Whitelisting Based on `X-Forwarded-For` with `depth=2` -- "traefik.http.middlewares.testIPwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" -- "traefik.http.middlewares.testIPwhitelist.ipwhitelist.ipstrategy.depth=2" +- "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" +- "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.ipstrategy.depth=2" ``` ```json tab="Marathon" "labels": { - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.sourcerange": "127.0.0.1/32, 192.168.1.7", - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.ipstrategy.depth": "2" + "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.sourcerange": "127.0.0.1/32, 192.168.1.7", + "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.ipstrategy.depth": "2" } ``` ```yaml tab="Rancher" # Whitelisting Based on `X-Forwarded-For` with `depth=2` labels: - - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" - - "traefik.http.middlewares.testIPwhitelist.ipwhitelist.ipstrategy.depth=2" + - "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.1.7" + - "traefik.http.middlewares.test-ipwhitelist.ipwhitelist.ipstrategy.depth=2" ``` ```yaml tab="File (YAML)" diff --git a/docs/content/migration/v1-to-v2.md b/docs/content/migration/v1-to-v2.md index 015bd3200..c2dce4a29 100644 --- a/docs/content/migration/v1-to-v2.md +++ b/docs/content/migration/v1-to-v2.md @@ -441,7 +441,7 @@ To apply a redirection: apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: - name: http-redirect-ingressRoute + name: http-redirect-ingressroute spec: entryPoints: @@ -459,7 +459,7 @@ To apply a redirection: apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: - name: https-ingressRoute + name: https-ingressroute spec: entryPoints: @@ -595,7 +595,7 @@ with the path `/admin` stripped, e.g. to `http://:/`. In this case, yo apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: - name: http-redirect-ingressRoute + name: http-redirect-ingressroute namespace: admin-web spec: entryPoints: diff --git a/docs/content/migration/v2.md b/docs/content/migration/v2.md index d75e6e5c1..a34fed323 100644 --- a/docs/content/migration/v2.md +++ b/docs/content/migration/v2.md @@ -189,7 +189,7 @@ metadata: spec: tls: - - secretName: myTlsSecret + - secretName: my-tls-secret rules: - host: example.com @@ -256,7 +256,7 @@ metadata: spec: tls: - - secretName: myTlsSecret + - secretName: my-tls-secret rules: - host: example.com diff --git a/docs/content/routing/providers/kubernetes-crd.md b/docs/content/routing/providers/kubernetes-crd.md index c8a1dc2ca..c42219f73 100644 --- a/docs/content/routing/providers/kubernetes-crd.md +++ b/docs/content/routing/providers/kubernetes-crd.md @@ -385,7 +385,7 @@ Register the `IngressRoute` [kind](../../reference/dynamic-configuration/kuberne apiVersion: traefik.containo.us/v1alpha1 kind: IngressRoute metadata: - name: testName + name: test-name namespace: default spec: entryPoints: @@ -1345,8 +1345,8 @@ or referencing TLS options in the [`IngressRoute`](#kind-ingressroute) / [`Ingre - TLS_RSA_WITH_AES_256_GCM_SHA384 clientAuth: # [5] secretNames: # [6] - - secretCA1 - - secretCA2 + - secret-ca1 + - secret-ca2 clientAuthType: VerifyClientCertIfGiven # [7] sniStrict: true # [8] ``` @@ -1379,8 +1379,8 @@ or referencing TLS options in the [`IngressRoute`](#kind-ingressroute) / [`Ingre - TLS_RSA_WITH_AES_256_GCM_SHA384 clientAuth: secretNames: - - secretCA1 - - secretCA2 + - secret-ca1 + - secret-ca2 clientAuthType: VerifyClientCertIfGiven ``` @@ -1409,7 +1409,7 @@ or referencing TLS options in the [`IngressRoute`](#kind-ingressroute) / [`Ingre apiVersion: v1 kind: Secret metadata: - name: secretCA1 + name: secret-ca1 namespace: default data: @@ -1419,7 +1419,7 @@ or referencing TLS options in the [`IngressRoute`](#kind-ingressroute) / [`Ingre apiVersion: v1 kind: Secret metadata: - name: secretCA2 + name: secret-ca2 namespace: default data: @@ -1459,7 +1459,7 @@ or referencing TLS stores in the [`IngressRoute`](#kind-ingressroute) / [`Ingres spec: defaultCertificate: - secretName: mySecret # [1] + secretName: my-secret # [1] ``` | Ref | Attribute | Purpose |