Merge branch v2.11 into v3.5
This commit is contained in:
commit
1827652258
8 changed files with 13 additions and 11 deletions
7
.github/workflows/documentation.yml
vendored
7
.github/workflows/documentation.yml
vendored
|
|
@ -1,6 +1,7 @@
|
||||||
name: Build and Publish Documentation
|
name: Build and Publish Documentation
|
||||||
|
|
||||||
on:
|
on:
|
||||||
|
workflow_dispatch: {}
|
||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
- master
|
- master
|
||||||
|
|
@ -39,9 +40,9 @@ jobs:
|
||||||
run: curl -sSfL https://raw.githubusercontent.com/traefik/mixtus/master/godownloader.sh | sh -s -- -b $HOME/bin ${MIXTUS_VERSION}
|
run: curl -sSfL https://raw.githubusercontent.com/traefik/mixtus/master/godownloader.sh | sh -s -- -b $HOME/bin ${MIXTUS_VERSION}
|
||||||
|
|
||||||
- name: Build documentation
|
- name: Build documentation
|
||||||
run: $HOME/bin/structor -o traefik -r traefik --dockerfile-url="https://raw.githubusercontent.com/traefik/traefik/v1.7/docs.Dockerfile" --menu.js-url="https://raw.githubusercontent.com/traefik/structor/master/traefik-menu.js.gotmpl" --rqts-url="https://raw.githubusercontent.com/traefik/structor/master/requirements-override.txt" --force-edit-url --exp-branch=master --debug
|
run: |
|
||||||
env:
|
STRUCTOR_LATEST_TAG=$(curl -s https://api.github.com/repos/traefik/traefik/releases/latest | jq -r '.tag_name')
|
||||||
STRUCTOR_LATEST_TAG: ${{ vars.STRUCTOR_LATEST_TAG }}
|
$HOME/bin/structor -o traefik -r traefik --dockerfile-url="https://raw.githubusercontent.com/traefik/traefik/v1.7/docs.Dockerfile" --menu.js-url="https://raw.githubusercontent.com/traefik/structor/master/traefik-menu.js.gotmpl" --rqts-url="https://raw.githubusercontent.com/traefik/structor/master/requirements-override.txt" --force-edit-url --exp-branch=master --debug
|
||||||
|
|
||||||
- name: Apply seo
|
- name: Apply seo
|
||||||
run: $HOME/bin/seo -path=./site -product=traefik
|
run: $HOME/bin/seo -path=./site -product=traefik
|
||||||
|
|
|
||||||
2
.github/workflows/release.yaml
vendored
2
.github/workflows/release.yaml
vendored
|
|
@ -132,7 +132,7 @@ jobs:
|
||||||
--exclude dist .
|
--exclude dist .
|
||||||
|
|
||||||
chown -R "$(id -u)":"$(id -g)" dist/
|
chown -R "$(id -u)":"$(id -g)" dist/
|
||||||
gh release create ${VERSION} ./dist/**/traefik*.{zip,tar.gz} ./dist/traefik*.{tar.gz,txt} --repo traefik/traefik --title ${VERSION} --notes ${VERSION}
|
gh release create ${VERSION} ./dist/**/traefik*.{zip,tar.gz} ./dist/traefik*.{tar.gz,txt} --repo traefik/traefik --title ${VERSION} --notes ${VERSION} --latest=true
|
||||||
|
|
||||||
./script/deploy.sh
|
./script/deploy.sh
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,8 @@ Below is a non-exhaustive list of versions and their maintenance status:
|
||||||
|
|
||||||
| Version | Release Date | Active Support | Security Support |
|
| Version | Release Date | Active Support | Security Support |
|
||||||
|---------|--------------|--------------------|-------------------|
|
|---------|--------------|--------------------|-------------------|
|
||||||
| 3.4 | May 05, 2025 | Yes | Yes |
|
| 3.5 | Jul 23, 2025 | Yes | Yes |
|
||||||
|
| 3.4 | May 05, 2025 | Ended Jul 23, 2025 | No |
|
||||||
| 3.3 | Jan 06, 2025 | Ended May 05, 2025 | No |
|
| 3.3 | Jan 06, 2025 | Ended May 05, 2025 | No |
|
||||||
| 3.2 | Oct 28, 2024 | Ended Jan 06, 2025 | No |
|
| 3.2 | Oct 28, 2024 | Ended Jan 06, 2025 | No |
|
||||||
| 3.1 | Jul 15, 2024 | Ended Oct 28, 2024 | No |
|
| 3.1 | Jul 15, 2024 | Ended Oct 28, 2024 | No |
|
||||||
|
|
|
||||||
|
|
@ -234,7 +234,7 @@ The TLS options allow one to configure some parameters of the TLS connection.
|
||||||
|
|
||||||
!!! important "TLSOption in Kubernetes"
|
!!! important "TLSOption in Kubernetes"
|
||||||
|
|
||||||
When using the [TLSOption resource](../../routing/providers/kubernetes-crd#kind-tlsoption) in Kubernetes, one might setup a default set of options that,
|
When using the [TLSOption resource](../../routing/providers/kubernetes-crd/#kind-tlsoption) in Kubernetes, one might setup a default set of options that,
|
||||||
if not explicitly overwritten, should apply to all ingresses.
|
if not explicitly overwritten, should apply to all ingresses.
|
||||||
To achieve that, you'll have to create a TLSOption resource with the name `default`.
|
To achieve that, you'll have to create a TLSOption resource with the name `default`.
|
||||||
There may exist only one TLSOption with the name `default` (across all namespaces) - otherwise they will be dropped.
|
There may exist only one TLSOption with the name `default` (across all namespaces) - otherwise they will be dropped.
|
||||||
|
|
|
||||||
|
|
@ -46,7 +46,7 @@ And then define a routing configuration on Traefik itself with the
|
||||||
|
|
||||||
--8<-- "content/operations/include-api-examples.md"
|
--8<-- "content/operations/include-api-examples.md"
|
||||||
|
|
||||||
??? warning "The router's [rule](../../routing/routers#rule) must catch requests for the URI path `/api`"
|
??? warning "The router's [rule](../../routing/routers/#rule) must catch requests for the URI path `/api`"
|
||||||
Using an "Host" rule is recommended, by catching all the incoming traffic on this host domain to the API.
|
Using an "Host" rule is recommended, by catching all the incoming traffic on this host domain to the API.
|
||||||
However, you can also use "path prefix" rule or any combination or rules.
|
However, you can also use "path prefix" rule or any combination or rules.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -10,8 +10,8 @@ What's Happening to the Requests?
|
||||||
|
|
||||||
Let's zoom in on Traefik's architecture and talk about the components that enable the routes to be created.
|
Let's zoom in on Traefik's architecture and talk about the components that enable the routes to be created.
|
||||||
|
|
||||||
First, when you start Traefik, you define [entrypoints](../entrypoints) (in their most basic forms, they are port numbers).
|
First, when you start Traefik, you define [entrypoints](../entrypoints/) (in their most basic forms, they are port numbers).
|
||||||
Then, connected to these entrypoints, [routers](../routers) analyze the incoming requests to see if they match a set of [rules](../routers#rule).
|
Then, connected to these entrypoints, [routers](../routers/) analyze the incoming requests to see if they match a set of [rules](../routers/#rule).
|
||||||
If they do, the router might transform the request using pieces of [middleware](../middlewares/overview.md) before forwarding them to your [services](./services/index.md).
|
If they do, the router might transform the request using pieces of [middleware](../middlewares/overview.md) before forwarding them to your [services](./services/index.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
|
||||||
|
|
@ -910,7 +910,7 @@ TLS certificates can be managed in Secrets objects.
|
||||||
whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP.
|
whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP.
|
||||||
|
|
||||||
One alternative is to use an `ExternalName` service to forward requests to the Kubernetes service through DNS.
|
One alternative is to use an `ExternalName` service to forward requests to the Kubernetes service through DNS.
|
||||||
To do so, one must [allow external name services](../providers/kubernetes-ingress/#allowexternalnameservices "Link to docs about allowing external name services").
|
To do so, one must [allow external name services](../../../providers/kubernetes-ingress/#allowexternalnameservices "Link to docs about allowing external name services").
|
||||||
|
|
||||||
Traefik automatically requests endpoint information based on the service provided in the ingress spec.
|
Traefik automatically requests endpoint information based on the service provided in the ingress spec.
|
||||||
Although Traefik will connect directly to the endpoints (pods),
|
Although Traefik will connect directly to the endpoints (pods),
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,7 @@ description: "Learn how to create a certificate with the Let's Encrypt DNS chall
|
||||||
# Docker-compose with Let's Encrypt: DNS Challenge
|
# Docker-compose with Let's Encrypt: DNS Challenge
|
||||||
|
|
||||||
This guide aims to demonstrate how to create a certificate with the Let's Encrypt DNS challenge to use https on a simple service exposed with Traefik.
|
This guide aims to demonstrate how to create a certificate with the Let's Encrypt DNS challenge to use https on a simple service exposed with Traefik.
|
||||||
Please also read the [basic example](../basic-example) for details on how to expose such a service.
|
Please also read the [basic example](../basic-example/) for details on how to expose such a service.
|
||||||
|
|
||||||
## Prerequisite
|
## Prerequisite
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue