Bilal Amarni
22b97b7214
check permissions on acme.json during startup
...
Follow-up from #639 . At the moment people that were affected
by this security issue would still be vulnerable even after upgrading.
This patch makes sure permissions are also checked for already existing
files.
Signed-off-by: Bilal Amarni <bilal.amarni@gmail.com>
2017-01-12 12:14:35 +01:00
Csaba Palfi
db68dd3bc1
Fix docs build and add missing benchmarks page ( #1017 )
...
* fix mkdocs theme dependency - mkdocs/mkdocs#201
* add missing benchmarks page
2017-01-09 15:12:11 +01:00
Vincent Demeester
85b9c19871
Merge pull request #1023 from syfonseq/fix-acme-http-only-entrypoint
...
Don't fetch ACME certificates for frontends using non-TLS entrypoints (#989 )
2017-01-06 21:16:25 +01:00
Matthieu Martin
2bfc237e53
Don't fetch ACME certificates for frontends using non-TLS entrypoints
2017-01-06 17:06:48 +01:00
Diego de Oliveira
d74ea22d7d
IP-per-task: ( #841 )
...
Support IP per task with marathon/mesos
2017-01-06 16:26:50 +01:00
Thomas Recloux
8004132a3a
Merge pull request #1018 from dtomcej/fix-672
...
Return Proper Non-ACME certificate - Fixes Issue 672
2017-01-05 09:37:02 +01:00
Daniel Tomcej
a6f4183cde
Add regex for wildcard certs
...
fix spacing
2017-01-04 14:32:44 -07:00
Bilal Amarni
51e9f3ede2
instruct to flatten dependencies with glide
2017-01-01 19:23:35 +01:00
j0hnsmith
bfc7b3d183
Add multiple values for one rule to docs
2016-12-30 22:29:37 +01:00
Vincent Demeester
8a348423ae
Import order as goimports does
...
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2016-12-30 19:04:02 +01:00
Bilal Amarni
e4952cd145
[doc] few tweaks on the basics page
2016-12-30 16:49:13 +01:00
Guilhem Lettron
5b0bf5d150
See the right go report badge
...
look like a copypasta error
2016-12-30 15:20:15 +01:00
Thomas Recloux
79180dc021
Merge pull request #975 from trecloux/integration-test-acme
...
Add ACME/Let’s Encrypt integration tests
2016-12-22 10:46:15 +01:00
Thomas Recloux
599c95e5f6
Add ACME/Let’s Encrypt integration tests
...
Thx @gwallet for the help.
2016-12-22 10:11:37 +01:00
Vincent Demeester
e1ed8b71f6
Merge pull request #931 from Juliens/addprefix
...
Add Rule AddPrefix
2016-12-21 21:45:09 +01:00
Emile Vauge
6ca142bf20
Merge branch 'master' into addprefix
2016-12-20 22:26:04 +01:00
Rodrigo Menezes
6b20d2a5f3
toml zookeeper doc fix ( #948 )
...
Having that slash there causes traefik to be able to get keys from ZK
2016-12-20 22:25:50 +01:00
Emile Vauge
bef55db120
Merge branch 'master' into addprefix
2016-12-20 12:18:37 +01:00
Emile Vauge
3bb3658d7d
Merge pull request #921 from containous/add-github-issue
...
Add bug command
2016-12-20 11:36:06 +01:00
Julien Salleyron
a4034ce1e2
Add some docs
2016-12-19 17:17:24 +01:00
Julien Salleyron
d9fc66fdbc
Add Rule AddPrefix
2016-12-19 17:12:52 +01:00
Emile Vauge
3ebfd729cf
Refactor StatsRecorder
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-19 15:24:00 +01:00
Emile Vauge
6adb346cee
Add bug command
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-19 15:23:59 +01:00
Manuel Laufenberg
318ff52ff3
Merge pull request #969 from Mic92/patch-1
...
deploy.sh: upload release source tarball
2016-12-19 11:13:37 +01:00
Jörg Thalheim
b7b0f8f68d
deploy.sh: upload release source tarball
...
Having a release tarball including all vendor source makes life of maintainers a lot easier to create downstream packages.
It also ensures that as long as the go release is available the software can be build reproducible.
2016-12-17 12:17:05 +01:00
Ian
94bb7a1435
Add ability to set authenticated user in request header ( #889 )
...
* Add ability to set authenticated user in request header
Some web applications provide the ability to authorize users based on
the authenticated from Basic Auth. This patch provides a way to set a
key to which the authenticated user can be set in the Header.
For example, if I set `HeaderValue = "X-WebAuth-User"` and authenticate,
my application will be able to read my user name from that header and
provide me with the proper access.
This fixes #802
2016-12-16 16:42:51 +01:00
Emile Vauge
913a297e8d
Merge pull request #930 from Juliens/defaultFuncMap
...
feat: Add defaultFuncMap to template
2016-12-14 18:41:47 +01:00
Julien Salleyron
d469d426f8
Remove useless func in FuncMaps
2016-12-08 20:44:13 +01:00
Julien Salleyron
ec05fbcf19
feat: Add defaultFuncMap to template
2016-12-08 20:44:13 +01:00
Vincent Demeester
686faf0556
Merge pull request #936 from funkyfuture/getting-started
...
Updates index.md 'Test it!' section
2016-12-08 18:39:04 +01:00
Frank Sachsenheim
fe2d4e0d38
Updates index.md 'Test it!' section
...
adapted to current schema for compose files
uses networks as necessary in a real world usage
2016-12-08 17:01:49 +01:00
Vincent Demeester
c500873586
Merge pull request #932 from yvespp/master
...
Kubernetes: cleanup channel handling
2016-12-08 11:23:20 +01:00
Yves Peter
fc788eb426
Kubernetes: cleanup channel handling
...
Only use one channel for all watches
Re-use stop channel from the provider
Skip events that have already been handled by the provider, builds on 007f8cc48ea9504bb7754c5e3244124be422f47d
2016-12-07 20:12:14 +01:00
Phil Kates
87eac1dc1a
Fix deadlock in k8s provider
...
On a reasonably sized cluster:
63 nodes
87 services
90 endpoints
The initialization of the k8s provider would hang.
I tracked this down to the ResourceEventHandlerFuncs. Once you reach the
channel buffer size (10) the k8s Informer gets stuck. You can't read or
write messages to the channel anymore. I think this is probably a lock
issue somewhere in k8s but the more reasonable solution for the traefik
usecase is to just drop events when the queue is full since we only use
the events for signalling, not their content, thus dropping an event
doesn't matter.
2016-12-07 20:12:14 +01:00
Emile Vauge
91d9b9811f
Merge pull request #738 from tyrken/lego-dns
...
Support Lets Encrypt DNS Challenges
2016-12-07 09:31:49 +01:00
Tristan Keen
71beb4b08f
Support Lets Encrypt DNS Challenges
...
* Add exoscale support for Let’s encrypt DNS challenge
* Use name->DNS provider mapping from lego lib
2016-12-07 01:04:33 +00:00
Emile Vauge
d26f06e2d1
Merge pull request #938 from containous/merge-v1.1.1-master
...
Merge v1.1.1 master
2016-12-06 09:14:39 +01:00
Emile Vauge
dca08af003
Merge v1.1.1 into master
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-12-06 08:44:23 +01:00
Darius Karel
4c740e26d7
Clarify exposedbydefault behaviour ( #904 )
...
* docs: clarify exposedbydefault behaviour
* docs: sentence clarity
2016-12-05 11:40:06 +01:00
Vincent Demeester
131f581f77
Merge pull request #836 from yvespp/master
...
Migrate k8s to kubernetes/client-go
2016-12-01 12:00:05 +01:00
Yves Peter
9236a43a4d
kubernetes: moved doc of client to the interface
2016-11-30 19:25:22 +01:00
yvespp
7f4eddf6d6
k8s: changed debug log, removed unneeded stop channels, increased watch channel buffer
2016-11-30 19:16:48 +01:00
Ed Robinson
d1e631a487
Flatten dependencies
...
Deps for the integration suite are handled seperately, and not
flattend, as glide can't read the version info from docker/docker
2016-11-30 19:16:48 +01:00
Yves Peter
0b78375211
Kubernetes client: set resync period to 5 minutes for more robustness
2016-11-30 19:16:48 +01:00
Yves Peter
15540764a0
Switched Kubernetes provider to new client implementation: https://github.com/kubernetes/client-go
2016-11-30 19:16:48 +01:00
Vincent Demeester
82234cbbb2
Merge pull request #862 from Juliens/eureka
...
test-integration(eureka): Add some integration tests
2016-11-29 23:00:50 +01:00
Emile Vauge
22392daef7
Merge branch 'master' into eureka
2016-11-29 19:04:43 +01:00
Emile Vauge
7f3ae6edb0
Merge pull request #915 from containous/prepare-release-v1.1.1
...
Prepare release v1.1.1
2016-11-29 16:25:52 +01:00
Emile Vauge
1a993f5dfb
Prepare release v1.1.1
...
Signed-off-by: Emile Vauge <emile@vauge.com>
2016-11-29 14:52:55 +01:00
Emile Vauge
4e527304d0
Merge pull request #908 from containous/fix-swarm-panic
...
Fix Swarm panic
2016-11-29 14:47:51 +01:00