Emile Vauge
bea5ad3f13
Add leadership election
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-09-30 11:26:05 +02:00
Emile Vauge
5a0440d6f8
Add KV datastore
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-09-30 11:26:05 +02:00
Emile Vauge
462d8b3e74
Fix Docker & KV templates for sticky
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-09-30 10:57:55 +02:00
Emile Vauge
291c3b6dbc
Fix sticky sessions Docker/Marathon labels
2016-09-30 10:56:47 +02:00
Owen Marshall
81fddb4ccf
missed a cherry pick, good start :=/
2016-09-30 10:56:17 +02:00
Owen Marshall
c9d4c5ae3e
Fix Docker integration problems
2016-09-30 10:56:17 +02:00
Owen Marshall
be5b1fd92b
docs, sticky session for Docker
2016-09-30 10:56:17 +02:00
Owen Marshall
dc52abf4ce
Add sticky session support to Traefik.
...
This change adds sticky session support, by using the new
oxy/rr/StickySession feature.
To use it, set traefik.backend.sticky to true.
This is currently only implemented in the wrr load balancer, and against
the Marathon backend, but lifting it should be very doable.
In the wrr load balancer, a cookie called _TRAEFIK_SERVERNAME will be
set with the backend to use. If the cookie is altered to an invalid
backend server, or the server is removed from the load balancer, the
next server will be used instead.
Otherwise, the cookie will be checked in Oxy's rr on access and if valid
the connection will be wired through to it.
2016-09-30 10:56:17 +02:00
Emile Vauge
364958cbaf
Move jobs backoff back into traefik
...
https://github.com/cenk/backoff/pull/27#issuecomment-245842725
2016-09-27 21:45:29 +02:00
Diego Osse Fernandes
99c8bffcbf
Initial support for Docker 1.12 Swarm Mode
2016-09-27 14:21:38 -03:00
tuier
1624c51cb5
remove unused endpoint when using constraints in marathon
2016-09-23 22:05:11 +01:00
tuier
361dc94002
fmt
2016-09-21 17:27:48 +02:00
tuier
cc0fdf15ef
test for task and application constraint
2016-09-21 17:27:47 +02:00
tuier
928675a847
feat(constraints): Support constraint for Marathon provider
2016-09-21 17:27:47 +02:00
Emile Vauge
bb1dde0469
Fix kv
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-09-21 14:33:45 +02:00
Samuel BERTHE
ced69b8397
refacto(constraint-kv): Move constraint checking out of template
2016-09-21 14:33:45 +02:00
Samuel BERTHE
013808956c
feat(constraints): Supports kv stores backends
2016-09-21 14:33:45 +02:00
Vincent Demeester
5ea761e19f
Add possibility to use BindPort IPAddress 👼
...
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-09-20 14:52:35 +02:00
Bruce Lee
f7f17f0057
enable consul catalog to use maxconn
2016-09-15 12:11:37 -04:00
Bruce Lee
99ca5d0a03
Add ability for marathon provider to set maxconn values
...
Initial implementation: Force both to be present to trigger behavior.
add ability to see rendered template in debug
add support for loadbalancer and circuit breaker specification
add documentation for new configuration
2016-09-14 16:52:02 -04:00
Bruce Lee
d89bdfbd27
Add backend features to docker
2016-09-14 14:51:31 -04:00
Diogo Gomes
1e324ad3bc
If Marathon doesn't have healthcheck, assume it's ok ( #665 )
...
Healthcheck are not mandatory, so if a result is not present, assume it
is ok to continue. Fixes the case when a new leader is elected and
don't have any healthcheck result's, returning 404 to all requests.
https://github.com/containous/traefik/issues/653
2016-09-14 17:44:37 +02:00
Yves Peter
1a20e9f9b4
Kubernetes provider: don't log a warning if traefik.frontend.rule.type is empty, log namespace and ingress if invalide.
2016-09-12 21:06:21 +02:00
Emile Vauge
d340ccd601
Migrate to JobBackOff
2016-08-19 14:24:09 +02:00
Emile Vauge
97ddfcb17a
Use long job RetryBackoff in providers
2016-08-19 11:09:54 +02:00
Emile Vauge
11297b38c5
Remove misused Fatal*
2016-08-19 10:36:54 +02:00
Bruce Lee
0757a75732
fix for nil clientTLS causing issue
2016-08-16 17:50:22 -04:00
Ed Robinson
e3a8fd116d
Don't filter the endpoint and service watches
...
We added the ability to filter the ingresses used by traefik based
on a label selector, but we shouldn't need to have matching
labels on every other resource, Ingress allready has a way
to explicty choose which pods end up in the load ballancer
(by refering to the membership of a particular service)
2016-08-16 06:50:50 +01:00
Ed Robinson
d4f190e995
Name servers after thier pods
...
The TargetRef contains information from the object referenced
by the pod, unless the service has been set up with bare
endpoints - i.e. not pointing at pods this information
will be present.
It just makes the information that we show in the web-ui
a little more constent with that shown in kubectl
and the kuberntes dashboard.
2016-08-06 20:40:40 +01:00
Phil Kates
79dd72f53d
Prioritize kubernetes routes by path length
...
The Kubernetes provider wasn't setting priorities which was causing
shorter paths to get chosen before longer ones. This now matches the
[documentation](https://github.com/containous/traefik/blob/master/docs/basics.md#priorities )
2016-08-03 11:37:22 -07:00
Vincent Demeester
c170ddc7ae
Upgrade libkermit and dependencies
...
And use ContainerAPIClient where needed 👼
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-07-21 17:43:05 +02:00
Vincent Demeester
87a4d73556
Move version.go in its own package…
...
… making it possible to use in other packages ; and thus in the
User-Agent header for the docker client.
Also removing the dockerverion hack as it's not required anymore.
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-07-21 16:33:49 +02:00
Martin
b153e90ec5
add createStore() funcs and skip consul TLS test
2016-07-21 09:22:35 +02:00
Martin
e26e0955b3
add struct ClientTLS : supports either a paths to a file or directly the certificate
2016-07-21 09:22:35 +02:00
Martin
056e0fe2d9
Use KvStores as global config source
2016-07-21 09:22:35 +02:00
julien
5afcf17706
add mesos provider inspired by mesos-dns & marathon provider
2016-07-20 11:56:14 +02:00
Vincent Demeester
b80479f9ef
Option to disable expose of all docker containers
...
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-07-14 11:32:15 +02:00
Vincent Demeester
a73baded88
Remove traefik.frontend.value support in docker…
...
… provider 👼 . Was deprecated in 1.0, removing it for 1.1.
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-07-13 19:28:08 +02:00
Parham Negahdar
9f6484a328
Fixes #363 : Allow for kubernetes label selectors
2016-07-12 17:50:01 -04:00
Parham Negahdar
40c0ed092e
Fixes #501 : prioritize kube.endpoint passed via cli
2016-07-11 15:39:20 -04:00
Emile Vauge
b1ecb1f61f
Use of container.HostConfig.NetworkMode to detect host mode
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-07-05 14:11:33 +02:00
Emile Vauge
050416224d
Fix host Docker network
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-07-05 11:29:13 +02:00
Emile Vauge
606e667b88
Fix spamming events in listenProviders
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-23 16:33:54 +02:00
David Keijser
70305266dc
Sort nodes before creating consul catalog config
...
The watch of consul can return for various reasons and not of all of
them require a reload of the config. The order of nodes provided by
consul is not stable so to ensure a identical config is generated for an
identical server set the nodes needs to be sorted before creating the
config.
2016-06-23 13:08:12 +02:00
Emile Vauge
b586df6689
Fix marathon tests
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-22 13:56:28 +02:00
Emile Vauge
4ca2ff0495
Bump go-marathon a558128c87724cd7430060ef5aedf39f83937f55, add DCOS support
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-20 17:11:32 +02:00
Kevin Busse
dcf98d13c8
Fix typo in error message. ( #471 )
2016-06-20 12:15:31 +02:00
Emile Vauge
56ef678c09
Fix memory leak in listenProviders
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-16 22:49:57 +02:00
Samuel BERTHE
357150bcab
fix(constainrs,docker): Syntax
2016-06-11 19:06:39 +02:00
Samuel BERTHE
f7224ff403
feat(constraints): Supports constraints for docker backend
2016-06-11 19:06:39 +02:00
Emile Vauge
223e8cafac
Fix default KV configuration
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-09 23:44:49 +02:00
Vincent Demeester
f286cb9a34
Fix panic if listContainers fails…
...
… and also share context accross API call, as this is how it's meant to
be used (and it allows to skip some calls if `cancel` is called).
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-06-08 19:39:38 +02:00
Emile Vauge
f4cb4bb1b8
Add routes priorities in providers
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-07 09:18:37 +02:00
Emile Vauge
92ca220890
Add groupsAsSubDomains option
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-03 09:10:59 +02:00
Emile Vauge
72f88e5c0f
Add marathon directory subdomain
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-03 09:10:59 +02:00
Emile Vauge
3f08bb4cdf
Fix panic on help, Better version
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-06-02 15:17:04 +02:00
Erin Dachtler
7386378cc0
Merge branch 'master' into docker_network
2016-06-01 08:38:23 -07:00
Samuel BERTHE
1de5434e1a
refacto(constraints): Migration to Flaeg cli library
2016-06-01 10:30:34 +02:00
Samuel BERTHE
f46accc74d
test(constraint): unit tests + integration tests + make validate
2016-06-01 10:30:34 +02:00
Samuel BERTHE
ac087921d8
feat(constraints): Implementation of constraint filtering (cmd + toml + matching functions), implementation proposal with consul
2016-06-01 10:30:34 +02:00
Erin Dachtler
df7e1cf078
Squashed commit of the following:
...
commit 468cdf5c74b8df80fe6cc093feda84d124d47460
Author: Erin Dachtler <download333@gmail.com>
Date: Mon May 30 17:21:50 2016 -0700
Documentation update
commit bcbe622141fc333579177e056b49d418997c511d
Author: Erin Dachtler <download333@gmail.com>
Date: Sat May 28 15:32:34 2016 -0700
Whoops, forgot to fmt
commit 1ad5f1052541372722adc372069da094b422c793
Author: Erin Dachtler <download333@gmail.com>
Date: Sat May 28 14:56:04 2016 -0700
Added getIPAddress helper for docker template, and tests
2016-05-31 22:11:17 -07:00
Erin Dachtler
f5d49f6657
Merge branch 'master' into no_require_expose
2016-05-28 16:36:59 -07:00
Erin Dachtler
53ae64e578
Filter containers with no exposed ports unless they have a traefik.port label
2016-05-28 15:16:57 -07:00
Martin
cc2735f733
add Debug StructTag
...
Signed-off-by: Martin <martin.piegay@zenika.com>
2016-05-27 10:06:19 +02:00
Martin
f64c2bc065
add flag on ACME
...
add flag on Retry
set Retry.MaxMem to 2 by default
rm useless import
rm useless structtag
add custom parser on []acme.Domain type
add commants + refactor
2016-05-27 10:06:19 +02:00
Martin
6752b49536
rm useless StrucTag
2016-05-27 10:06:19 +02:00
Martin
629be45c4a
fix DisablePassHostHeaders
2016-05-27 10:06:19 +02:00
Martin
414fb1f406
add kubernetes.Namespaces parser
2016-05-27 10:06:19 +02:00
Martin
fe0a8f3363
Flaeg integration
2016-05-27 10:06:19 +02:00
Erin Dachtler
45589d5133
Reminder
2016-05-26 11:03:40 -07:00
Ed Robinson
2e735f622f
Adds some more coverage of the endpoint port selection logic.
2016-05-26 12:09:36 +01:00
Ed Robinson
6accb90c47
Simplify Service Lookup
...
Since we already know the name and namespace
of the service(s) we want we can just get the
correct one back from the API without filtering
the results.
2016-05-26 11:17:38 +01:00
Ed Robinson
e948a013cd
Build backend config using the K8S endpoint resource.
...
* Potentialy saves a network hop
* Ability to configure LB algothim (given some work to expose an
anotation etc...)
* K8s config Watch is triggered far less often
2016-05-26 10:52:30 +01:00
Ed Robinson
b79535f369
Support ingresses without a host ( #406 )
...
fixes #370
2016-05-25 14:16:19 +02:00
Emile Vauge
0f23581f64
Fix k8s memory leak
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-05-24 23:37:17 +02:00
Jonas Falck
aeb9cc1732
http protocol should not use TLS
...
I need this in order to run kubectl proxy and then
make traefik use http://localhost to get to my cluster
when developing
2016-05-23 09:51:05 +02:00
Ed Robinson
d13b755df2
Allow k8s ports to be referenced by name as well as number
2016-05-19 13:36:19 +01:00
Ed Robinson
5923d22379
The referenced k8s service(s) must be in namespace
...
By design k8s ingress is only designed to ballance services from within
the namespace of the ingress.
This is disscuessed a little in
https://github.com/kubernetes/kubernetes/issues/17088 .
For now traefik should only reference the services in the current
namespace. For me this was a confusing change of behaviour
from the reference implimentations, as I have services
with the same name in each namespace.
2016-05-18 17:38:47 +01:00
AlmogBaku
8210743dad
change log error of "ruleType" to warning
2016-05-17 16:54:40 +03:00
AlmogBaku
895f3cc109
fixes golint error
2016-05-17 16:22:37 +03:00
AlmogBaku
71f160dddc
Following up to the conversation on Slack & GitHub:
...
- Change the annotation to define the rule type in `traefik.frontend.rule.type`
- Update tests
- Add documentation
- Add example
2016-05-17 13:50:06 +03:00
AlmogBaku
92abaa0d47
fixes wrong actual on unit-test
2016-05-16 01:24:23 +03:00
AlmogBaku
47710c1385
fixes wrong names on tests - make it pass
2016-05-16 01:06:30 +03:00
AlmogBaku
df3abcbc9a
gofmt to tests..
2016-05-15 20:01:26 +03:00
AlmogBaku
dbb7ad41e5
Add tests for k8s PathPrefixStrip annotation
2016-05-15 12:16:27 +03:00
AlmogBaku
9773d4e409
K8s: add an option to configure "PathPrefixStrip" for the ingress-resource using annotation
2016-05-15 12:00:20 +03:00
Emile Vauge
d89279d708
Replace PathPrefixStrip by PathPrefix in k8s
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-05-12 12:44:26 +02:00
Marcus Stong
be209ed30c
#216 : sets passHostHeader to true by default ( #351 )
2016-05-10 13:43:24 +02:00
David Keijser
b9bb78d04b
Normalise tags in backend name of consul_catalog
...
Another fun thing consul lets you do is use spaces in your tags. This
means when including tags in backend name it's possible to generate
invalid names.
2016-05-07 16:30:38 +02:00
Ed Robinson
301a463aeb
Adds option to namespace k8s ingresses
...
If the flag kubernetes.namespaces is set...
Then we only select ingresses from that/those namespace(s)
This allows multiple instances of traefik to
independently load balance for each namespace.
This could be for logical or security reasons.
Addresses #336
2016-05-06 11:36:53 +01:00
Emile Vauge
c3aadab615
Add Consul integration tests
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-05-03 15:41:09 +02:00
Emile Vauge
61def880db
Fix etcd backend with prefix /
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-05-03 15:41:09 +02:00
Poney baker
378a261e64
feat(consul-provider): If Service.Address is nil then use Node.Address
...
test(consul-catalog): Test on backend-name and backend-address
2016-04-27 21:09:42 +02:00
Emile Vauge
87caf458df
Fix Kubernetes schema
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-27 10:05:04 +02:00
Emile Vauge
4ff4e4e626
Fix Kubernetes watch SSL
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-27 10:05:04 +02:00
Emile Vauge
53a2787626
Fix watch pods/services/rc/ingresses
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-25 17:13:26 +02:00
Emile Vauge
cac9927395
Fix namespace, fix PathPrefixStrip
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-22 13:57:00 +02:00
Emile Vauge
c0dd4c3209
Add unit test
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-22 13:57:00 +02:00
Emile Vauge
d82e1342fb
Fix integration test
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-22 13:57:00 +02:00
emile
720912e880
Add kubernetes Ingress backend
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-04-22 13:57:00 +02:00