Skip to content

Latest commit

 

History

History
1375 lines (1199 loc) · 142 KB

CHANGELOG.md

File metadata and controls

1375 lines (1199 loc) · 142 KB

Change Log

v1.4.0-rc2 (2017-09-08)

All Commits

Enhancements:

  • [authentication,consul] Add Basic auth for consul catalog (#2027 by mmatur)
  • [authentication,ecs] Add basic auth for ecs (#2026 by mmatur)
  • [logs] Send traefik logs to stdout instead stderr (#2054 by marco-jantke)
  • [websocket] Add test for SSL TERMINATION in Websocket IT (#2063 by Juliens)

Bug fixes:

  • [consul] Fix consul catalog refresh problems (#2089 by Juliens)
  • [logs,middleware] Access log default values (#2061 by ldez)
  • [metrics] prometheus, HTTP method and utf8 (#2081 by ldez)
  • [rancher] fix rancher api environment get (#2053 by SantoDE)
  • [websocket] RawPath and Transfer TLSConfig in websocket (#2088 by Juliens)
  • Fix error in prepareServer (#2076 by emilevauge)

Documentation:

v1.4.0-rc1 (2017-08-28)

All Commits

Enhancements:

  • [acme] Make the ACME developments testing easier (#1769 by nmengin)
  • [acme] contrib: Dump keys/certs from acme.json to files (#1484 by brianredbeard)
  • [api] Add HTTP HEAD handling to /ping endpoint (#1768 by martinbaillie)
  • [authentication,marathon] Add marathon label to configure basic auth (#1799 by nikore)
  • [authentication,middleware] Add forward authentication option (#1972 by drampelt)
  • [consul,sticky-session] Enable loadbalancer.sticky for Consul Catalog (#1917 by nbonneval)
  • [consul] Enhanced flexibility in Consul Catalog configuration (#1565 by aantono)
  • [consul] Exposed by default feature in Consul Catalog (#2006 by mmatur)
  • [consul] Speeding up consul catalog health change detection (#1694 by vholovko)
  • [docker,k8s] IP Whitelists for Frontend (with Docker- & Kubernetes-Provider Support) (#1332 by MaZderMind)
  • [ecs,sticky-session] Enable loadbalancer.sticky for ECS (#1925 by mmatur)
  • [ecs] Add support for several ECS backends (#1913 by mmatur)
  • [healthcheck] Add healthcheck command (#1982 by emilevauge)
  • [healthcheck] Allow overriding the port used for healthchecks (#1567 by bakins)
  • [k8s,rules] kubernetes ingress rewrite-target implementation (#1723 by mlaccetti)
  • [k8s] Added ability to override frontend priority for k8s ingress router (#1874 by DiverOfDark)
  • [kv] Adds definitions to backend kv template for health checking (#1644 by zachomedia)
  • [logs,dynamodb,ecs,marathon] Link some providers logs to Traefik (#1746 by ldez)
  • [logs,marathon] remove confusing go-marathon log message (#1810 by marco-jantke)
  • [logs] enable logging to stdout for access logs (#1683 by marco-jantke)
  • [logs] Logs & errors review (#1673 by ldez)
  • [logs] log X-Forwarded-For as ClientHost if present (#1946 by mildis)
  • [logs] Switch access logging to logrus (#1647 by rjshep)
  • [logs] add RetryAttempts to AccessLog in JSON format (#1793 by marco-jantke)
  • [logs] Restore: First stage of access logging middleware. (#1571 by ldez)
  • [logs] Add log file close and reopen on receipt of SIGUSR1 (#1761 by rjshep)
  • [logs] Add JSON as access logging format (#1669 by rjshep)
  • [marathon] Add support for readiness checks. (#1883 by timoreimann)
  • [marathon] Exported getSubDomain function from Marathon provider (#1693 by aantono)
  • [marathon] Improve Marathon integration tests. (#1406 by timoreimann)
  • [marathon] Use single API call to fetch Marathon resources. (#1815 by timoreimann)
  • [marathon] Move marathon mock (#1732 by ldez)
  • [marathon] Support multi-port service routing for containers running on Marathon (#1742 by aantono)
  • [marathon] Use test builder. (#1871 by timoreimann)
  • [metrics] DataDog and StatsD Metrics Support (#1701 by aantono)
  • [metrics] Add status code to request duration metric (#1755 by marco-jantke)
  • [metrics] Add metrics for backend_retries_total (#1504 by marco-jantke)
  • [metrics] Extract metrics to own package and refactor implementations (#1968 by marco-jantke)
  • [metrics] Added RetryMetrics to DataDog and StatsD providers (#1884 by aantono)
  • [middleware] Return 503 on empty backend (#1748 by marco-jantke)
  • [middleware] Add configurable timeouts and curate default timeout settings (#1873 by marco-jantke)
  • [middleware] Custom Error Pages (#1675 by bparli)
  • [middleware] Retry only on real network errors (#1549 by marco-jantke)
  • [middleware] Fix command bug content. (#2002 by ldez)
  • [middleware] Create Header Middleware (#1236 by dtomcej)
  • [oxy] Support X-Forwarded-Port. (#1960 by ldez)
  • [provider,tls] Added a check to ensure clientTLS configuration contains either a cert or a key (#1932 by aantono)
  • [provider] Factorize labels (#1843 by ldez)
  • [provider] Replace go routine by Safe.Go (#1879 by ldez)
  • [provider] Deflake integration tests (#1599 by ldez)
  • [rancher] Refactor into dual Rancher API/Metadata providers (#1563 by martinbaillie)
  • [rules] Simplify stripPrefix and stripPrefixRegex tests (#1699 by ldez)
  • [rules] Add support for Query String filtering (#1934 by driverpt)
  • [rules] Enhance rules tests. (#1679 by ldez)
  • [sticky-session] make the cookie name unique to the backend being served (#1716 by richardjq)
  • [tls] Handle RootCAs certificate (#1789 by Juliens)
  • [tls] enable TLS client forwarding (#1446 by drewwells)
  • [webui] Minor Health UI fixes (#1651 by mihaitodor)
  • [webui] Proxy in dev mode (#1544 by maxwo)
  • extract lb configuration steps into method (#1841 by marco-jantke)
  • Allow file provider to load service config from files in a directory. (#1672 by rjshep)
  • Add whitelist configuration option for entrypoints (#1702 by christopherobin)
  • Enhance integration tests (#1842 by ldez)
  • Add helloworld tests with gRPC (#1845 by Juliens)
  • Add the sprig functions in the template engine (#1891 by thomasbach76)
  • Refactor globalConfiguration / WebProvider (#1938 by Juliens)
  • Code cleaning. (#1956 by ldez)
  • Add proxy protocol (#2004 by emilevauge)
  • Bump gorilla/mux version. (#1954 by ldez)

Bug fixes:

  • [docker] Error handling for docker swarm mode (#1533 by tanyadegurechaff)
  • [healthcheck] Bind healthcheck to backend by entryPointName (#1868 by chrigl)
  • [k8s] Use default frontend priority of zero. (#1906 by timoreimann)
  • [marathon] Assign filtered tasks to apps contained in slice. (#1881 by timoreimann)
  • [marathon] Fix fallback to other nodes for Marathon (#1740 by marco-jantke)
  • [middleware] compress: preserve status code (#1948 by ldez)
  • [sticky-session] Setting the Cookie Path explicitly to root (#1950 by marcopaga)

Documentation:

Misc:

v1.3.8 (2017-09-07)

All Commits

Bug fixes:

  • [middleware] Compress and Webscocket (#2079 by ldez)

v1.3.7 (2017-08-25)

All Commits

Bug fixes:

  • [oxy] Only forward X-Forwarded-Port. (#2007 by ldez)

v1.3.6 (2017-08-20)

All Commits

Bug fixes:

  • [oxy,websocket] Websocket parameters and protocol. (#1970 by ldez)

v1.3.5 (2017-08-01)

All Commits

Bug fixes:

  • [websocket] Oxy with fixes on websocket + integration tests (#1905 by Juliens)

v1.3.4 (2017-07-27)

All Commits

Bug fixes:

  • [middleware] Double compression. (#1863 by ldez)
  • [middleware] Fix replace path rule (#1859 by dedalusj)
  • [websocket] New oxy with gorilla for websocket with integration tests (#1896 by Juliens)

v1.3.3 (2017-07-06)

All Commits

Bug fixes:

v1.3.2 (2017-06-29)

All Commits

Bug fixes:

  • [acme] Add provided certificate checking before LE certificate generation with OnHostRule option (#1772 by nmengin)
  • [k8s] Fix race on closing event channel. (#1798 by timoreimann)
  • [marathon] Upgrade go-marathon to dd6cbd4. (#1800 by timoreimann)
  • [oxy,websocket] Problem with keepalive when switching protocol failed (#1782 by ldez)
  • [oxy] Fix proxying of unannounced trailers (#1805 by ldez)

v1.3.1 (2017-06-16)

All Commits

Enhancements:

  • [logs,eureka,marathon] Minor logs changes (#1749 by ldez)

Bug fixes:

  • [k8s] Use correct type when watching for k8s secrets (#1700 by kekoav)
  • [middleware] fix: Double compression. (#1714 by ldez)
  • [webui] Don't fail when backend or frontend are empty. (#1757 by ldez)

Documentation:

  • [k8s] Fix capitalization of PathPrefixStrip in kubernetes doc (#1695 by Miouge1)

v1.3.0 (2017-05-31)

All Commits

Enhancements:

Bug fixes:

Documentation:

Misc:

v1.3.0-rc3 (2017-05-24)

All Commits

Enhancements:

Bug fixes:

Documentation:

v1.3.0-rc2 (2017-05-16)

All Commits

Enhancements:

  • Fixed ReplacePath rule executing out of order, when combined with PathPrefixStrip #1577 (aantono)

Bug fixes:

Documentation:

v1.3.0-rc1 (2017-05-05)

All Commits

Enhancements:

Bug fixes:

Documentation:

Misc:

v1.2.3 (2017-04-13)

Full Changelog

Merged pull requests:

v1.2.2 (2017-04-11)

Full Changelog

Merged pull requests:

v1.2.1 (2017-03-27)

Full Changelog

Merged pull requests:

v1.2.0 (2017-03-20)

Full Changelog

Merged pull requests:

v1.2.0-rc2 (2017-03-01)

Full Changelog

Implemented enhancements:

  • Are there plans to support the service type ExternalName in Kubernetes? #1142
  • Kubernetes Ingress and sticky support #911
  • kubernetes client does not support InsecureSkipVerify #876
  • Support active health checking like HAProxy #824
  • Allow k8s ingress controller serviceAccountToken and serviceAccountCACert to be changed #611

Fixed bugs:

  • [rancher] invalid memory address or nil pointer dereference #1134
  • Kubernetes default backend should work #1073

Closed issues:

  • Are release Download links broken? #1201
  • Bind to specific ip address #1193
  • DNS01 challenge use the wrong zone through route53 #1192
  • Reverse proxy https to http backends fails #1180
  • Swarm Mode + Letsecrypt + KV Store #1176
  • docker deploy -c example.yml e #1169
  • Traefik not finding dynamically added services (Docker Swarm Mode) #1168
  • Traefik with Kubernetes backend - keep getting 401 on all GET requests to kube-apiserver #1166
  • Near line 15 (last key parsed 'backends.backend-monitor-viz.servers'): Key 'backends.backend-monitor-viz.servers.server-monitor_viz-1' has already been defined. #1154
  • How to reuse SSL certificates automatically fetched from Let´s encrypt? #1152
  • Dynamically ban ip when backend repeatedly returns specified status code. ( 403 ) #1136
  • Always get 404 accessing my nginx backend service #1112
  • Incomplete Docu #1091
  • LoadCertificateForDomains: runtime error: invalid memory address #1069
  • Traefik creating backends & mappings for ingress annotated with ingress.class: nginx #1058
  • ACME file format description #1012
  • SwarmMode - Not routing on worker node #838
  • Migrate k8s to kubernetes/client-go #678
  • Support for sticky session with kubernetes ingress as backend #674

Merged pull requests:

v1.2.0-rc1 (2017-02-06)

Full Changelog

Implemented enhancements:

  • Add FreeBSD and OpenBSD to release builds #923
  • Write authenticated user to header key #802
  • Question: Wildcard Host for Kubernetes Ingress #792
  • First commit prometheus middleware. #1022 (enxebre)
  • Use deployment primitives from travis #843 (guilhem)

Fixed bugs:

  • Increase Docker API version to work with Windows Containers #1094

Closed issues:

  • How could I know whether forwarding path is correctly set? #1111
  • ACME + Docker-compose labels #1099
  • Loadbalance between 2 containers in Docker Swarm Mode #1095
  • Add DNS01 letsencrypt challenge support through AWS. #1093
  • New Release Cut #1092
  • Marathon integration changed default backend server port from task-level to application-level #1072
  • websockets not working when compress = true in toml config. #1059
  • Proxying 403 http status into the application #1044
  • Normalize auto generated frontend-rule (docker) #1043
  • Traefik with Consul catalog backend + Registrator #1039
  • [Configuration help] Can't connect to docker containers under a domain path #1032
  • Kubernetes and etcd backend : storeconfig fails. #1031
  • kubernetes: Undefined backend 'X/' for frontend X/" #1026
  • TLS handshake error #1025
  • Traefik failing on POST request #1008
  • how config traffic.toml http 80 without basic auth, traefik WebUI 8080 with basic auth #1001
  • Docs 404 #995
  • Disable acme for non https endpoints #989
  • Add parameter to configure TLS entrypoints with ca-bundle file #984
  • docker multiple networks routing #970
  • don't add Docker containers not on the same network as traefik #959
  • Multiple frontend routes #957
  • SNI based routing without TLS offloading #933
  • NEO4J + traefik proxy Issues #907
  • ACME OnDemand ignores entrypoint certificate #672
  • Ability to use self-signed certificates for local development #399

Merged pull requests:

v1.1.2 (2016-12-15)

Full Changelog

Fixed bugs:

  • Problem during HTTPS redirection #952
  • nil pointer with kubernetes ingress #934
  • ConsulCatalog and File not working #903
  • Traefik can not start #902
  • Cannot connect to Kubernetes server failed to decode watch event #532

Closed issues:

  • Updating certificates with configuration file. #968
  • Let's encrypt retrieving certificate from wrong IP #962
  • let's encrypt and dashboard? #961
  • Working HTTPS example for GKE? #960
  • GKE design pattern #958
  • Consul Catalog constraints does not seem to work #954
  • Issue in building traefik from master #949
  • Proxy http application to https doesn't seem to work correctly for all services #937
  • Excessive requests to kubernetes apiserver #922
  • I am getting a connection error while creating traefik with consul backend "dial tcp 127.0.0.1:8500: getsockopt: connection refused" #917
  • SwarmMode - 1.13 RC2 - DNS RR - Individual IPs not retrieved #913
  • Panic in kubernetes ingress (traefik 1.1.0) #910
  • Kubernetes updating deployment image requires Ingress to be remade #909
  • [ACME] Too many currently pending authorizations #905
  • WEB UI Authentication and Let's Encrypt : error 404 #754
  • Traefik as ingress controller for SNI based routing in kubernetes #745
  • Kubernetes Ingress backend: using self-signed certificates #486
  • Kubernetes Ingress backend: can't find token and ca.crt #484

Merged pull requests:

v1.1.1 (2016-11-29)

Full Changelog

Implemented enhancements:

  • Getting "Kubernetes connection error failed to decode watch event : unexpected EOF" every minute in Traefik log #732

Fixed bugs:

  • 1.1.0 kubernetes panic: send on closed channel #877
  • digest auth example is incorrect #869
  • Marathon & Mesos providers' GroupsAsSubDomains option broken #867
  • 404 responses when a new Marathon leader is elected #653

Closed issues:

  • traefik:latest fails to auto-detect Docker containers #901
  • Panic error on bare metal Kubernetes (installed with Kubeadm) #897
  • api backend readOnly: what is the purpose of this setting #893
  • file backend: using external file - doesn't work #892
  • auth support for web backend #891
  • Basic auth with docker labels #890
  • file vs inline config #888
  • combine Host and HostRegexp rules #882
  • [Question] Traefik + Kubernetes + Let's Encrypt (ssl not used) #881
  • Traefik security for dashboard #880
  • Kubernetes Nginx Deployment Panic #879
  • Kubernetes Example Address already in use #872
  • ETCD Backend - frontend/backends missing #866
  • [Swarm mode] Dashboard does not work on RC4 #864
  • Docker v1.1.0 image does not exist #861
  • ConsulService catalog do not support multiple rules #859
  • Update official docker repo #858
  • Still a memory leak with k8s - 1.1 RC4 #844

Merged pull requests:

v1.1.0 (2016-11-17)

Full Changelog

Implemented enhancements:

  • Support healthcheck if present for docker #666
  • Standard unit for traefik latency in access log #559
  • [CI] wiredep marked as unmaintained #550
  • Feature Request: Enable Health checks to containers. #540
  • Feature Request: SSL Cipher Selection #535
  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Running Traefik with Docker 1.12 Swarm Mode #504
  • Kubernetes provider: should allow the master url to be override #501
  • [FRONTEND][LE] Pre-generate SSL certificates for "Host:" rules #483
  • Frontend Rule evolution #437
  • Add a Changelog #388
  • Add label matching for kubernetes ingests #363
  • Acme in HA Traefik Scenario #348
  • HTTP Basic Auth support #77
  • Session affinity / stickiness / persistence #5

Fixed bugs:

  • 1.1.0-rc4 dashboard UX not displaying #828
  • Traefik stopped serving on upgrade to v1.1.0-rc3 #807
  • cannot access webui/dashboard #796
  • Traefik cannot read constraints from KV #794
  • HTTP2 - configuration #790
  • Cannot provide multiple certificates using flag #757
  • Allow multiple certificates on a single entrypoint when trying to use TLS? #747
  • traefik * Users: unsupported type: slice #743
  • [Docker swarm mode] The traefik.docker.network seems to have no effect #719
  • traefik hangs - stops handling requests #662
  • Add long jobs in exponential backoff providers #626
  • Tip of tree crashes on invalid pointer on Marathon provider #624
  • ACME: revoke certificate on agreement update #579
  • WebUI: Providers tabs disappeared #577
  • traefik version command contains incorrect information when building from master branch #569
  • Case sensitive domain names breaks routing #562
  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503
  • Traefik crashing #458
  • traefik.toml constraints error: Expected map but found 'string'. #451
  • Multiple path separators in the url path causing redirect #167

Closed issues:

  • All path rules require paths to be lowercase #851
  • The UI stops working after a time and have to restart the service. #840
  • Incorrect Dashboard page returned #831
  • LoadBalancing doesn't work in single node Swarm-mode #815
  • cannot connect to docker daemon #813
  • Let's encrypt configuration not working #805
  • Multiple subdomains for Marathon backend. #785
  • traefik-1.1.0-rc1: build error #781
  • dependencies installation error #755
  • k8s provider w/ acme? #752
  • Swarm Docs - How to use a FQDN #744
  • Documented ProvidersThrottleDuration value is invalid #741
  • Sensible configuration for consulCatalog #737
  • Traefik ignoring container listening in more than one TCP port #734
  • Loadbalaning issues with traefik and Docker Swarm cluster #730
  • issues with marathon app ids containing a dot #726
  • Error when using HA acme in kubernetes with etcd #725
  • [Docker swarm mode] No round robin when using service #718
  • Dose it support docker swarm mode #712
  • Kubernetes - Undefined backend #710
  • How Routing traffic depending on path not domain in docker #706
  • Constraints on Consul Catalogue not working as expected #703
  • Global InsecureSkipVerify does not work #700
  • Traefik crashes when using Consul catalog #699
  • [documentation/feature] Consul/etcd support atomic multiple key changes now #698
  • How to configure which network to use when starting traefik binary? #694
  • How to get multiple host headers working for docker labels? #692
  • Requests with URL-encoded characters are not forwarded correctly #684
  • File Watcher for rules does not work #683
  • Issue with global InsecureSkipVerify = true and self signed certificates #667
  • Docker exposedbydefault = false didn't work #663
  • swarm documentation needs update #656
  • [ACME] Auto SAN Detection #655
  • Fronting a domain with DNS A-record round-robin & ACME #654
  • Overriding toml configuration with environment variables #650
  • marathon provider exposedByDefault = false #647
  • Add status URL for service up checks #642
  • acme's storage file, containing private key, is word readable #638
  • wildcard domain with exclusions #633
  • Enable evenly distribution among backend #631
  • Traefik sporadically failing when proxying requests #615
  • TCP Proxy #608
  • How to use in Windows? #605
  • ClientCAFiles ignored #604
  • Let`s Encrypt enable in etcd #600
  • Support HTTP Basic Auth #599
  • Consul KV seem broken #587
  • HTTPS entryPoint not working #574
  • Traefik stuck when used as frontend for a streaming API #560
  • Exclude some frontends in consul catalog #555
  • Update docs with new Mesos provider #548
  • Can I use Traefik without a domain name? #539
  • docker run syntax in swarm example has changed #528
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500
  • Secure WebSockets #467
  • Container IP Lost #375
  • Multiple routes support with Docker or Marathon labels #118

Merged pull requests:

v1.1.0-rc4 (2016-11-10)

Full Changelog

Implemented enhancements:

  • Feature Request: Enable Health checks to containers. #540

Fixed bugs:

  • Traefik stopped serving on upgrade to v1.1.0-rc3 #807
  • Traefik cannot read constraints from KV #794
  • HTTP2 - configuration #790
  • Allow multiple certificates on a single entrypoint when trying to use TLS? #747

Closed issues:

  • LoadBalancing doesn't work in single node Swarm-mode #815
  • cannot connect to docker daemon #813
  • Let's encrypt configuration not working #805
  • Question: Wildcard Host for Kubernetes Ingress #792
  • Multiple subdomains for Marathon backend. #785
  • traefik-1.1.0-rc1: build error #781
  • Multiple routes support with Docker or Marathon labels #118

Merged pull requests:

v1.1.0-rc3 (2016-10-26)

Full Changelog

Fixed bugs:

  • Cannot provide multiple certificates using flag #757
  • traefik * Users: unsupported type: slice #743
  • [Docker swarm mode] The traefik.docker.network seems to have no effect #719
  • Case sensitive domain names breaks routing #562

Closed issues:

  • dependencies installation error #755
  • k8s provider w/ acme? #752
  • Documented ProvidersThrottleDuration value is invalid #741
  • Loadbalaning issues with traefik and Docker Swarm cluster #730
  • issues with marathon app ids containing a dot #726
  • How Routing traffic depending on path not domain in docker #706
  • Traefik crashes when using Consul catalog #699
  • File Watcher for rules does not work #683

Merged pull requests:

v1.1.0-rc2 (2016-10-17)

Full Changelog

Implemented enhancements:

  • Support healthcheck if present for docker #666

Closed issues:

  • Sensible configuration for consulCatalog #737
  • Traefik ignoring container listening in more than one TCP port #734
  • Error when using HA acme in kubernetes with etcd #725
  • [Docker swarm mode] No round robin when using service #718
  • Dose it support docker swarm mode #712
  • Kubernetes - Undefined backend #710
  • Constraints on Consul Catalogue not working as expected #703
  • docker run syntax in swarm example has changed #528
  • Secure WebSockets #467

Merged pull requests:

v1.1.0-rc1 (2016-09-30)

Full Changelog

Implemented enhancements:

  • Feature Request: SSL Cipher Selection #535
  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Running Traefik with Docker 1.12 Swarm Mode #504
  • Kubernetes provider: should allow the master url to be override #501
  • [FRONTEND][LE] Pre-generate SSL certificates for "Host:" rules #483
  • Frontend Rule evolution #437
  • Add a Changelog #388
  • Add label matching for kubernetes ingests #363
  • Acme in HA Traefik Scenario #348
  • HTTP Basic Auth support #77
  • Session affinity / stickiness / persistence #5
  • Kubernetes provider: traefik.frontend.rule.type logging #668 (yvespp)

Fixed bugs:

  • traefik hangs - stops handling requests #662
  • Add long jobs in exponential backoff providers #626
  • Tip of tree crashes on invalid pointer on Marathon provider #624
  • ACME: revoke certificate on agreement update #579
  • WebUI: Providers tabs disappeared #577
  • traefik version command contains incorrect information when building from master branch #569
  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503
  • Traefik crashing #458
  • traefik.toml constraints error: Expected map but found 'string'. #451
  • Multiple path separators in the url path causing redirect #167

Closed issues:

  • Global InsecureSkipVerify does not work #700
  • [documentation/feature] Consul/etcd support atomic multiple key changes now #698
  • How to configure which network to use when starting traefik binary? #694
  • How to get multiple host headers working for docker labels? #692
  • Requests with URL-encoded characters are not forwarded correctly #684
  • Issue with global InsecureSkipVerify = true and self signed certificates #667
  • Docker exposedbydefault = false didn't work #663
  • [ACME] Auto SAN Detection #655
  • Fronting a domain with DNS A-record round-robin & ACME #654
  • Overriding toml configuration with environment variables #650
  • marathon provider exposedByDefault = false #647
  • Add status URL for service up checks #642
  • acme's storage file, containing private key, is word readable #638
  • wildcard domain with exclusions #633
  • Enable evenly distribution among backend #631
  • Traefik sporadically failing when proxying requests #615
  • TCP Proxy #608
  • How to use in Windows? #605
  • ClientCAFiles ignored #604
  • Let`s Encrypt enable in etcd #600
  • Support HTTP Basic Auth #599
  • Consul KV seem broken #587
  • HTTPS entryPoint not working #574
  • Traefik stuck when used as frontend for a streaming API #560
  • Exclude some frontends in consul catalog #555
  • Can I use Traefik without a domain name? #539
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500
  • Container IP Lost #375

Merged pull requests:

v1.0.2 (2016-08-02)

Full Changelog

Fixed bugs:

  • ACME: revoke certificate on agreement update #579

Closed issues:

  • Exclude some frontends in consul catalog #555

Merged pull requests:

v1.0.1 (2016-07-19)

Full Changelog

Implemented enhancements:

  • Error with -consulcatalog and missing load balance method on 1.0.0 #524
  • Kubernetes provider: should allow the master url to be override #501

Fixed bugs:

  • Flag --etcd.endpoint default #508
  • Conditional ACME on demand generation #505
  • Important delay with streams (Mozilla EventSource) #503

Closed issues:

  • Can I use Traefik without a domain name? #539
  • Priortities in 1.0.0 not behaving #506
  • Route by path #500

Merged pull requests:

v1.0.0 (2016-07-05)

Full Changelog

Fixed bugs:

  • Enable to define empty TLS option by flag for Let's Encrypt #488
  • [Docker] No IP in backend in host networking mode #487
  • Response is compressed when not requested #485
  • loadConfig modifies configuration causing same config check to fail #480

Closed issues:

  • svg logo #482
  • etcd tries to connect with TLS even with --etcd.tls=false #456
  • Zookeeper - KV connection error: Failed to test KV store connection #455
  • "Not Found" api response needed instead of 404 #454
  • domain label doesn't work on docker #447
  • Any chance of a windows release? #425

Merged pull requests:

v1.0.0-rc3 (2016-06-23)

Full Changelog

Implemented enhancements:

  • support more than one rule to Docker backend #419

Fixed bugs:

  • consulCatalog issue when serviceName contains a dot #475
  • Issue with empty responses #463
  • Severe memory leak in beta.470 and beyond crashes Traefik server #462
  • Marathon that starts with a space causes parsing errors. #459
  • A frontend route without a rule (or empty rule) causes a crash when traefik starts #453
  • container dropped out when connecting to Docker Swarm #442
  • Traefik setting Accept-Encoding: gzip on requests (Traefik may also be broken with chunked responses) #421

Closed issues:

  • HTTP headers case gets modified #466
  • File frontend > Marathon Backend #465
  • Websocket: Unable to hijack the connection #452
  • kubernetes: Received event spamming? #449
  • kubernetes: backends not updated when i scale replication controller? #448
  • Add href link on frontend #436
  • Multiple Domains Rule #430

Merged pull requests:

v1.0.0-rc2 (2016-06-07)

Full Changelog

Implemented enhancements:

Fixed bugs:

  • Panic on help #429
  • Bad default values in configuration #427

Closed issues:

  • Traefik doesn't listen on IPv4 ports #434
  • Not listening on port 80 #432
  • docs need updating for new frontend rules format #423
  • Does traefik supports for Mac? (For devlelopment) #417

Merged pull requests:

* This Change Log was automatically generated by gcg