Skip to content

Commit

Permalink
Merge pull request #832 from davecheney/release-0.8.1
Browse files Browse the repository at this point in the history
Release 0.8.1
  • Loading branch information
davecheney authored Dec 11, 2018
2 parents 9844961 + b5dd305 commit 22e772d
Show file tree
Hide file tree
Showing 12 changed files with 19 additions and 31 deletions.
2 changes: 0 additions & 2 deletions deployment/common/common.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -47,8 +47,6 @@ spec:
openAPIV3Schema:
properties:
spec:
required:
- routes
properties:
virtualhost:
properties:
Expand Down
4 changes: 2 additions & 2 deletions deployment/deployment-grpc-v2/02-contour.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ spec:
prometheus.io/format: "prometheus"
spec:
containers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: contour
command: ["contour"]
Expand Down Expand Up @@ -54,7 +54,7 @@ spec:
exec:
command: ["wget", "-qO-", "http://localhost:9001/healthcheck/fail"]
initContainers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
command: ["contour"]
Expand Down
4 changes: 2 additions & 2 deletions deployment/ds-grpc-v2/02-contour.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
prometheus.io/format: "prometheus"
spec:
containers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: contour
command: ["contour"]
Expand Down Expand Up @@ -55,7 +55,7 @@ spec:
exec:
command: ["wget", "-qO-", "http://localhost:9001/healthcheck/fail"]
initContainers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
command: ["contour"]
Expand Down
2 changes: 1 addition & 1 deletion deployment/ds-hostnet-split/03-contour.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ spec:
- --envoy-https-port
- "443"
command: ["contour"]
image: gcr.io/heptio-images/contour:v0.8.0
image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: contour
ports:
Expand Down
2 changes: 1 addition & 1 deletion deployment/ds-hostnet-split/03-envoy.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ spec:
- $(CONTOUR_SERVICE_PORT)
command:
- contour
image: gcr.io/heptio-images/contour:v0.8.0
image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
volumeMounts:
Expand Down
4 changes: 2 additions & 2 deletions deployment/ds-hostnet/02-contour.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ spec:
spec:
hostNetwork: true
containers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
ports:
- containerPort: 8000
Expand Down Expand Up @@ -59,7 +59,7 @@ spec:
exec:
command: ["wget", "-qO-", "http://localhost:9001/healthcheck/fail"]
initContainers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
command: ["contour"]
Expand Down
6 changes: 2 additions & 4 deletions deployment/render/daemonset-rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,6 @@ spec:
openAPIV3Schema:
properties:
spec:
required:
- routes
properties:
virtualhost:
properties:
Expand Down Expand Up @@ -177,7 +175,7 @@ spec:
prometheus.io/format: "prometheus"
spec:
containers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: contour
command: ["contour"]
Expand Down Expand Up @@ -210,7 +208,7 @@ spec:
exec:
command: ["wget", "-qO-", "http://localhost:9001/healthcheck/fail"]
initContainers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
command: ["contour"]
Expand Down
6 changes: 2 additions & 4 deletions deployment/render/deployment-rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,6 @@ spec:
openAPIV3Schema:
properties:
spec:
required:
- routes
properties:
virtualhost:
properties:
Expand Down Expand Up @@ -176,7 +174,7 @@ spec:
prometheus.io/format: "prometheus"
spec:
containers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: contour
command: ["contour"]
Expand Down Expand Up @@ -209,7 +207,7 @@ spec:
exec:
command: ["wget", "-qO-", "http://localhost:9001/healthcheck/fail"]
initContainers:
- image: gcr.io/heptio-images/contour:v0.8.0
- image: gcr.io/heptio-images/contour:v0.8.1
imagePullPolicy: Always
name: envoy-initconfig
command: ["contour"]
Expand Down
2 changes: 1 addition & 1 deletion docs/ingressroute.md
Original file line number Diff line number Diff line change
Expand Up @@ -746,7 +746,7 @@ IngressRoutes with a defined `virtualhost` field that are not in one of the allo

Ingressroute supports proxying of TLS encapsulated TCP sessions.

The TCP session must be encrupted with TLS.
The TCP session must be encrypted with TLS.
This is necessary so that Envoy can use SNI to route the incoming request to the correct service.

```
Expand Down
13 changes: 5 additions & 8 deletions docs/proxy-proto.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,14 +33,11 @@ spec:
...
spec:
containers:
- name: contour
args:
- serve
- --incluster
- --use-proxy-protocol
command:
- contour
image: gcr.io/heptio-images/contour:latest
- image: gcr.io/heptio-images/contour:master
imagePullPolicy: Always
name: contour
command: ["contour"]
args: ["serve", "--incluster", "--use-proxy-protocol"]
...
```

Expand Down
4 changes: 1 addition & 3 deletions docs/tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,11 @@ Contour 0.3 adds support for HTTPS (TLS/SSL) ingress by integrating Envoy's SNI

## Enabling TLS support

Enabling TLS support requires Contour version 0.3 or later. You must use the [YAML v2 bootstrap configuration][0].

Enabling TLS support requires Contour version 0.3 or later.=
You must also add an [entry for port 443][1] to your `contour` service object.

## Configuring TLS with Contour on an ELB

If you deploy behind an AWS Elastic Load Balancer, see [EC2 ELB PROXY protocol support](proxy-proto.md) for special instructions.

[0]: upgrade.md
[1]: https://github.com/heptio/contour/blob/v0.3.1/deployment/common/service.yaml#L20-L23
1 change: 0 additions & 1 deletion internal/contour/holdoff.go
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,6 @@ func (hn *HoldoffNotifier) OnChange(builder *dag.Builder) {
return
}

hn.WithField("remaining", holdoffMaxDelay-since).Info("delaying update")
hn.timer = time.AfterFunc(holdoffDelay, func() {
hn.mu.Lock()
defer hn.mu.Unlock()
Expand Down

0 comments on commit 22e772d

Please sign in to comment.