Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restore ExternalName https support for Kubernetes CRD #6037

Merged
merged 2 commits into from Dec 16, 2019

Conversation

kpeiruza
Copy link
Contributor

@kpeiruza kpeiruza commented Dec 14, 2019

What does this PR do?

Kubernetes CRD was missing support for ExternalName https backends. It's already added into v2.0 and Kubernetes Ingress in v2.1 has it already included, so, I simply add this into CRDs.

Motivation

I need Sticky sessions with Kubernetes CRDs and ExternalName on https backends in an ongoing project, and this feature is going to be implemented anyway.

I made the former pull request to support https backends in ExternalNames for v2.0, as they were hardcoded as "http" backends in the code.

More

  • Added/updated tests
  • Added/updated documentation

Additional Notes

Related to #5660
Regression from #5711

Copy link
Member

@ldez ldez left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you 👍

Copy link
Collaborator

@SantoDE SantoDE left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - Thanks!

@traefiker traefiker merged commit b501c6d into traefik:v2.1 Dec 16, 2019
v2 automation moved this from To review to Done Dec 16, 2019
@ldez ldez changed the title Added ExternalName https support for Kubernetes CRD, as done in v2.0 Restore ExternalName https support for Kubernetes CRD Jan 7, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
No open projects
v2
Done
Development

Successfully merging this pull request may close these issues.

None yet

5 participants