Skip to content

Commit 92dd317

Browse files
committed
Release 1.0.0-beta0
1 parent 28ce8f7 commit 92dd317

13 files changed

+151
-102
lines changed

Diff for: CHANGELOG.md

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
# Changelog
22

3+
### 1.0.0-beta0
4+
5+
* [175](https://github.com/nginxinc/kubernetes-ingress/pull/175): Add support for JWT for NGINX Plus.
6+
* [171](https://github.com/nginxinc/kubernetes-ingress/pull/171): Allow NGINX to listen on non-standard ports. Thanks to [Stanislav Seletskiy](https://github.com/seletskiy).
7+
* [170](https://github.com/nginxinc/kubernetes-ingress/pull/170): Add the default server. **Note**: The Ingress controller will fail to start if there are no cert and key for the default server. You can pass a TLS Secret for the default server as an argument to the Ingress controller or add a cert and a key to the Docker image.
8+
* [169](https://github.com/nginxinc/kubernetes-ingress/pull/169): Ignore Ingress resources with empty hostnames.
9+
* [168](https://github.com/nginxinc/kubernetes-ingress/pull/168): Add the `nginx.org/lb-method` annotation. Thanks to [Sajal Kayan](https://github.com/sajal).
10+
* [166](https://github.com/nginxinc/kubernetes-ingress/pull/166): Watch Secret resources for updates. **Note**: If a Secret referenced by one or more Ingress resources becomes invalid or gets removed, the configuration for those Ingress resources will be disabled until there is a valid Secret.
11+
* [160](https://github.com/nginxinc/kubernetes-ingress/pull/160): Add support for events. See the details [here](https://github.com/nginxinc/kubernetes-ingress/pull/160).
12+
* [157](https://github.com/nginxinc/kubernetes-ingress/pull/157): Add graceful termination - when the Ingress controller receives `SIGTERM`, it shutdowns itself as well as NGINX, using `nginx -s quit`.
13+
314
### 0.9.0
415

516
* [156](https://github.com/nginxinc/kubernetes-ingress/pull/156): Write a pem file with an SSL certificate and key atomically.

Diff for: examples/complete-example/README.md

+94-89
Original file line numberDiff line numberDiff line change
@@ -11,110 +11,115 @@
1111

1212
## 1. Deploy the Ingress Controller
1313

14-
1. Create an Ingress controller either for NGINX or NGINX Plus:
15-
```
16-
$ kubectl create -f nginx-ingress-rc.yaml
17-
```
18-
or
19-
```
20-
$ kubectl create -f nginx-plus-ingress-rc.yaml
21-
```
22-
23-
1. The controller container exposes ports 80, 443 (and 8080 for NGINX Plus )
14+
1. Create a Secret with an SSL certificate and key for the default server of NGINX/NGINX Plus. The default server returns the Not Found page with the 404 status code for all requests for domains for which there are no Ingress rules defined.
15+
```
16+
$ kubectl create -f default-server-secret.yaml
17+
```
18+
19+
2. Create an Ingress controller either for NGINX or NGINX Plus:
20+
```
21+
$ kubectl create -f nginx-ingress-rc.yaml
22+
```
23+
or
24+
```
25+
$ kubectl create -f nginx-plus-ingress-rc.yaml
26+
```
27+
28+
3. The controller container exposes ports 80, 443 (and 8080 for NGINX Plus )
2429
on the host it is running on. Make sure to add a firewall rule to allow incoming traffic
2530
though these ports.
2631
2732
## 2. Deploy the Cafe Application
2833
2934
1. Create the coffee and the tea services and replication controllers:
30-
31-
```
32-
$ kubectl create -f tea-rc.yaml
33-
$ kubectl create -f tea-svc.yaml
34-
$ kubectl create -f coffee-rc.yaml
35-
$ kubectl create -f coffee-svc.yaml
36-
```
35+
```
36+
$ kubectl create -f tea-rc.yaml
37+
$ kubectl create -f tea-svc.yaml
38+
$ kubectl create -f coffee-rc.yaml
39+
$ kubectl create -f coffee-svc.yaml
40+
```
3741
3842
## 3. Configure Load Balancing
3943
4044
1. Create a secret with an SSL certificate and a key:
41-
```
42-
$ kubectl create -f cafe-secret.yaml
43-
```
45+
```
46+
$ kubectl create -f cafe-secret.yaml
47+
```
4448
45-
1. Create an Ingress Resource:
46-
```
47-
$ kubectl create -f cafe-ingress.yaml
48-
```
49+
2. Create an Ingress Resource:
50+
```
51+
$ kubectl create -f cafe-ingress.yaml
52+
```
4953
5054
## 4. Test the Application
5155
5256
1. Find out the external IP address of the node where the controller is running:
53-
```
54-
$ kubectl get pods -o wide
55-
NAME READY STATUS RESTARTS AGE NODE
56-
coffee-rc-mtjuw 1/1 Running 0 3m kubernetes-minion-iikt
57-
coffee-rc-mu9ns 1/1 Running 0 3m kubernetes-minion-cm0y
58-
nginx-plus-ingress-rc-86kkq 1/1 Running 0 1m kubernetes-minion-iikt
59-
tea-rc-7w3fq 1/1 Running 0 3m kubernetes-minion-iikt
60-
```
61-
62-
```
63-
$ kubectl get node kubernetes-minion-iikt -o json | grep -A 2 ExternalIP
64-
"type": "ExternalIP",
65-
"address": "XXX.YYY.ZZZ.III"
66-
}
67-
```
68-
69-
1. To see that the controller is working, let's curl the coffee and the tea services.
57+
```
58+
$ kubectl get pods -o wide
59+
NAME READY STATUS RESTARTS AGE NODE
60+
coffee-rc-mtjuw 1/1 Running 0 3m kubernetes-minion-iikt
61+
coffee-rc-mu9ns 1/1 Running 0 3m kubernetes-minion-cm0y
62+
nginx-plus-ingress-rc-86kkq 1/1 Running 0 1m kubernetes-minion-iikt
63+
tea-rc-7w3fq 1/1 Running 0 3m kubernetes-minion-iikt
64+
```
65+
66+
```
67+
$ kubectl get node kubernetes-minion-iikt -o json | grep -A 2 ExternalIP
68+
"type": "ExternalIP",
69+
"address": "XXX.YYY.ZZZ.III"
70+
}
71+
```
72+
73+
2. To see that the controller is working, let's curl the coffee and the tea services.
7074
We'll use ```curl```'s --insecure option to turn off certificate verification of our self-signed
7175
certificate and the --resolve option to set the Host header of a request with ```cafe.example.com```
72-
To get coffee:
73-
```
74-
$ curl --resolve cafe.example.com:443:XXX.YYY.ZZZ.III https://cafe.example.com/coffee --insecure
75-
<!DOCTYPE html>
76-
<html>
77-
<head>
78-
<title>Hello from NGINX!</title>
79-
<style>
80-
body {
81-
width: 35em;
82-
margin: 0 auto;
83-
font-family: Tahoma, Verdana, Arial, sans-serif;
84-
}
85-
</style>
86-
</head>
87-
<body>
88-
<h1>Hello!</h1>
89-
<h2>URI = /coffee</h2>
90-
<h2>My hostname is coffee-rc-mu9ns</h2>
91-
<h2>My address is 10.244.0.3:80</h2>
92-
</body>
93-
</html>
94-
```
95-
If your rather prefer tea:
96-
```
97-
$ curl --resolve cafe.example.com:443:XXX.YYY.ZZZ.III https://cafe.example.com/tea --insecure
98-
<!DOCTYPE html>
99-
<html>
100-
<head>
101-
<title>Hello from NGINX!</title>
102-
<style>
103-
body {
104-
width: 35em;
105-
margin: 0 auto;
106-
font-family: Tahoma, Verdana, Arial, sans-serif;
107-
}
108-
</style>
109-
</head>
110-
<body>
111-
<h1>Hello!</h1>
112-
<h2>URI = /tea</h2>
113-
<h2>My hostname is tea-rc-w7rjr</h2>
114-
<h2>My address is 10.244.0.5:80</h2>
115-
</body>
116-
</html>
117-
```
118-
119-
1. If you're using NGINX Plus, you can open the live activity monitoring dashboard, which is available at http://XXX.YYY.ZZZ.III:8080/status.html
76+
77+
To get coffee:
78+
```
79+
$ curl --resolve cafe.example.com:443:XXX.YYY.ZZZ.III https://cafe.example.com/coffee --insecure
80+
<!DOCTYPE html>
81+
<html>
82+
<head>
83+
<title>Hello from NGINX!</title>
84+
<style>
85+
body {
86+
width: 35em;
87+
margin: 0 auto;
88+
font-family: Tahoma, Verdana, Arial, sans-serif;
89+
}
90+
</style>
91+
</head>
92+
<body>
93+
<h1>Hello!</h1>
94+
<h2>URI = /coffee</h2>
95+
<h2>My hostname is coffee-rc-mu9ns</h2>
96+
<h2>My address is 10.244.0.3:80</h2>
97+
</body>
98+
</html>
99+
```
100+
If your rather prefer tea:
101+
```
102+
$ curl --resolve cafe.example.com:443:XXX.YYY.ZZZ.III https://cafe.example.com/tea --insecure
103+
<!DOCTYPE html>
104+
<html>
105+
<head>
106+
<title>Hello from NGINX!</title>
107+
<style>
108+
body {
109+
width: 35em;
110+
margin: 0 auto;
111+
font-family: Tahoma, Verdana, Arial, sans-serif;
112+
}
113+
</style>
114+
</head>
115+
<body>
116+
<h1>Hello!</h1>
117+
<h2>URI = /tea</h2>
118+
<h2>My hostname is tea-rc-w7rjr</h2>
119+
<h2>My address is 10.244.0.5:80</h2>
120+
</body>
121+
</html>
122+
```
123+
124+
3. If you're using NGINX Plus, you can open the live activity monitoring dashboard, which is available at http://XXX.YYY.ZZZ.III:8080/status.html
120125
If you go to the Upstream tab, you'll see: ![dashboard](dashboard.png)

Diff for: examples/complete-example/cafe-secret.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,5 @@ metadata:
44
name: cafe-secret
55
type: Opaque
66
data:
7-
tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURqVENDQW5XZ0F3SUJBZ0lKQUlkSFdJaXhLK0Y2TUEwR0NTcUdTSWIzRFFFQkN3VUFNRjB4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlEQXBUYjIxbExWTjBZWFJsTVNFd0h3WURWUVFLREJoSmJuUmxjbTVsZENCWAphV1JuYVhSeklGQjBlU0JNZEdReEZqQVVCZ05WQkFNTURURTVNaTR4TmpndU16TXVORE13SGhjTk1UWXdNekF4Ck1Ua3hOelU0V2hjTk1UY3dNekF4TVRreE56VTRXakJkTVFzd0NRWURWUVFHRXdKVlV6RVRNQkVHQTFVRUNBd0sKVTI5dFpTMVRkR0YwWlRFaE1COEdBMVVFQ2d3WVNXNTBaWEp1WlhRZ1YybGtaMmwwY3lCUWRIa2dUSFJrTVJZdwpGQVlEVlFRRERBMHhPVEl1TVRZNExqTXpMalF6TUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCCkNnS0NBUUVBekNINSsrRGUyZ0VEbWE4YmpQS1ZuZ2o5ZEpFdk5wa1Q0WXBMUlV0WHJYTjZHandjZ2lPQWJITnMKMlMyWGw1RXpXYm9Pd3Axejd6M0xpYUlJdDdBT3lkc3R6TmhmckhqMU1FRi9TNGdKOG5jOVJQT01qcTQrV2cwNwpOOWNyMzJEM3l3ak9GSTdieXdXZ3daSG5NTDhHUDNrUDRpcktEcm0vMDczdjhWbVBFUzRwd01nM3drQytZL1J2ClZNd0QrMENsbU41d0dSenZNcEFKalNiaUJXZ0l3NFRCTGZUREZTSTlzUE5abk5hNWVkRFVyeFI3SmJwLzZ0Yy8KSEZOZXVwYjNyQlY3dkxTZVZydFZjSm85WXB6MmRIMlZmQS9uck5uVXd2K2NXS0RDWjVhbm5qcHZsbVYzMlo4TgpXVjJkR2JKVzJneHJ4TjB1QWNrditsQlJrMkZnSHdJREFRQUJvMUF3VGpBZEJnTlZIUTRFRmdRVWtFd3JTNTNsCms3L3NCS2JncWphdWZ6cWZhMTR3SHdZRFZSMGpCQmd3Rm9BVWtFd3JTNTNsazcvc0JLYmdxamF1ZnpxZmExNHcKREFZRFZSMFRCQVV3QXdFQi96QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFrSnRFSW02YktIQm4vK245QWkzegpyUEJ5OHpYdUV6eStYR2pmV050QUlGNUllVHNUUkRJeXEyWkwvTU92MFBvSGl3My9LTENrbENkWDd3OU91Sm10CnRRVWtmZnlYMVdwTkF6MjJvVlFTWHJkeUdLY3ZCbk84WkhpUHhPeFNoWjNqLzhjRWw4b1RpYTd6dTdodVRBOEwKL2V3NmZieFFhZlkxaERXQXF5NGJGUnFmQk1qNVpua3d6Ti9USmtDSXRvbVFJVHdDK2tPcE1KdmJDb2Zkc2JzVwo4dW1PQkVYWi9tbzU4SGtwVUtIQTRyWk9EL0JGNGlUSXl3TjFxOE5xQTJobGdLMHRsWHk1UGVITmJxUFVTejRxCkNreU91dXlWZnpITTk5ZWJ3dTVxd3RpNlRxUUM4b0ltQkdJeVM3NEh0a2l6dHc0dy9uQU9LTzhhSEM2ZXRsQVUKSUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
8-
tls.key: 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
7+
tls.crt: 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
8+
tls.key: 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

Diff for: examples/complete-example/default-server-secret.yaml

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
apiVersion: v1
2+
kind: Secret
3+
metadata:
4+
name: default-server-secret
5+
type: Opaque
6+
data:
7+
tls.crt: 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
8+
tls.key: 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

0 commit comments

Comments
 (0)