Ludovic Fernandez
a9d4b09bdb
Stickiness cookie name
2017-10-10 11:10:02 +02:00
Ludovic Fernandez
5cc49e2931
bug
command.
2017-10-02 10:32:02 +02:00
Fernandez Ludovic
7c2ba62b56
doc: structural review
...
- user-guide review.
- add DataDog and StatD configuration.
- sync sample.toml and doc.
- split entry points doc.
- Deprecated.
2017-08-28 23:02:04 +02:00
Timo Reimann
b80ecd51a7
Use default frontend priority of zero.
2017-08-18 16:14:03 +02:00
Ludovic Fernandez
759c269dee
Code cleaning.
2017-08-18 02:18:02 +02:00
Kirill Orlov
94f922cd28
Added ability to override frontend priority for k8s ingress router
2017-07-29 18:35:23 +02:00
Fernandez Ludovic
c36e0b3b06
refactor: add Safe everywhere is needing.
2017-07-20 14:59:54 +02:00
Ludovic Fernandez
d653a348b1
Factorize labels
...
* refactor(accesslog): factorize file name.
* traefik.frontend.rule
* traefik.frontend.value
* traefik.backend.circuitbreaker.expression
* traefik.enable
* traefik.backend.loadbalancer.method
* traefik.backend.loadbalancer.sticky
* traefik.backend.maxconn.amount
* traefik.backend.maxconn.extractorfunc
* traefik.port
* traefik.tags
* traefik.backend
* traefik.weight
* traefik.domain
* traefik.protocol
* traefik.frontend.passHostHeader
* traefik.frontend.whitelistSourceRange
* traefik.frontend.priority
* traefik.frontend.entryPoints
* traefik.frontend.auth.basic
* traefik.backend.id
* traefik.backend.circuitbreaker
* traefik.frontend.rule.type
* traefik.portIndex
* refactor(docker): specific labels
* refactor(rancher): specific labels
* traefik.backend.healthcheck.*
* refactor(providers): factorize labels.
2017-07-10 16:58:12 +02:00
Michael Laccetti
41dd124a4b
kubernetes ingress rewrite-target implementation
...
* Adding support for `ingress.kubernetes.io/rewrite-target`
We create a rule using the `PathPrefixStrip` to trim out the bit in the rewrite rule.
2017-07-07 21:27:54 +02:00
Fernandez Ludovic
8f845bac74
Merge tag 'v1.3.3'
2017-07-06 19:37:12 +02:00
Timo Reimann
4892b2b0da
[kubernetes] Undo the Secrets controller sync wait.
...
When Secrets permissions have not been granted (which is likely to be
the case for users not needing the basic auth feature), the watch on the
Secrets API will never yield a response, thereby causing the controller
to never sync successfully, and in turn causing the check for all
controller synchronizations to fail consistently. Thus, no event will
ever be handled.
2017-07-06 17:12:25 +02:00
Timo Reimann
91ce78da46
[k8s] Tell glog to log everything into STDERR.
...
Logging errors into a file inside a minimalistic container might not be
possible, and glog bails out with an exit code > 0 if it fails.
2017-07-04 17:11:50 +02:00
Fernandez Ludovic
3776e58041
Merge branch 'v1.3'
2017-06-30 00:04:04 +02:00
Timo Reimann
6473002021
Continue Ingress processing on auth retrieval failure.
2017-06-29 16:13:53 +02:00
Timo Reimann
4d89ff7e18
Improve basic auth handling.
...
- Enrich logging.
- Move error closer to producer.
2017-06-29 16:13:53 +02:00
Timo Reimann
c5c63071ca
Wait for secret controller to finish synchronizing.
...
Prevents a race on closing the events channel, possibly leading to a
double-close.
2017-06-29 16:13:53 +02:00
Fernandez Ludovic
71111708d4
Merge branch 'v1.3' into master
2017-06-02 19:56:15 +02:00
Kekoa Vincent
ac5ab13a4c
Fix errors caused by incorrect type being sent for the Kubernetes Secret watcher #1596
...
This was likely just a copy-paste issue, the bug should be benign because the secret is cast to the correct type later, but the additional logging is a major annoyance, and is happening even if basic auth is not in use with Kubernetes.
2017-06-02 19:20:47 +02:00
Fernandez Ludovic
cbccdd51c5
refactor: Logs & errors review.
...
- log & error: remove format if not necessary, add if necessary.
- add constants for k8s annotations.
- fix typos
2017-05-30 23:33:27 +02:00
Fernandez Ludovic
2833d68f15
Merge branch 'v1.3' into merge-back-1_3_0-rc3
2017-05-24 20:39:38 +02:00
Timo Reimann
9967494996
[k8s] Ignore Ingresses with empty Endpoint subsets.
...
We previously fell back to using ClusterIPs. However, the approach can
lead to all kinds of problems since Ingresses rely on being able to talk
to Endpoints directly. For instance, it can break stickiness and
retries.
2017-05-23 21:15:06 +02:00
Timo Reimann
b392023c37
Add additional tests for PathStrip{Prefix}.
2017-05-23 17:31:34 +02:00
Timo Reimann
f7d9dfafd0
[k8s] Remove rule type path list.
...
Instead of doing sanity checks in the Kubernetes provider, we just
accept any non-empty value from the annotation and rely on the server
part to filter out unknown rules.
This allows us to automatically stay in sync with the currently
supported Path matchers/modifiers.
2017-05-23 17:31:34 +02:00
MaZderMind
5f0b215e90
IP Whitelists for Frontend (with Docker- & Kubernetes-Provider Support)
2017-05-19 15:19:29 +02:00
Timo Reimann
fe6c35bc6b
[Kubernetes] Ignore missing pass host header annotation.
...
A missing annotation would previously be handled in the default error
case, causing a noisy warning-level log message to be generated each
time.
We add another case statement to ignore the case where the annotation is
missing from the annotations map.
Also piggybacking a minor improvement to the log message.
2017-05-10 19:32:45 +02:00
Alex Peters
89da3b15a4
Add basic auth to kubernetes provider
2017-05-03 13:18:40 +02:00
Regner Blok-Andersen
d24ba90900
Updating Kubernetes tests to properly test missing endpoints code path
...
This fixes #1307
2017-04-28 15:25:03 +02:00
Vincent Demeester
542c3673e4
Extract providers to their own package
...
This is just doing that and making it compile :)
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2017-04-18 13:24:17 +02:00