Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update traefik Docker tag to v1.7.34 #5

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Oct 18, 2021

Mend Renovate

This PR contains the following updates:

Package Update Change
traefik patch 1.7.14 -> v1.7.34

Release Notes

containous/traefik

v1.7.34

Compare Source

Bug fixes:

  • [k8s] require that secret is a valid PEM (#​8624 by jr0d)

v1.7.34

Compare Source

Bug fixes:

  • [k8s] require that secret is a valid PEM (#​8624 by jr0d)

v1.7.33

Compare Source

Bug fixes:

v1.7.33

Compare Source

Bug fixes:

v1.7.32

Compare Source

Bug fixes:

  • [acme] acme: add missing preferred chain (#​8495 by ldez)

v1.7.32

Compare Source

Bug fixes:

  • [acme] acme: add missing preferred chain (#​8495 by ldez)

v1.7.31

Compare Source

Bug fixes:

  • [acme,k8s] acme: add support of preferredchain in Traefik v1 (#​8482 by ldez)

v1.7.31

Compare Source

Bug fixes:

  • [acme,k8s] acme: add support of preferredchain in Traefik v1 (#​8482 by ldez)

v1.7.30

Compare Source

Bug fixes:

  • [metrics] Prometheus: fixing prom Handler to use the custom registry (#​8040 by tomMoulard)

v1.7.30

Compare Source

Bug fixes:

  • [metrics] Prometheus: fixing prom Handler to use the custom registry (#​8040 by tomMoulard)

v1.7.29

Compare Source

v1.7.29

Compare Source

v1.7.28

Compare Source

Bug fixes:

  • [middleware,tracing] Do not SetError on tracing event when whitelist allowed request (#​7174 by LordGaav)
  • [servicefabric] Fix stickiness support in Service Fabric. (#​7667 by tpayne84)

Documentation:

v1.7.28

Compare Source

Bug fixes:

  • [middleware,tracing] Do not SetError on tracing event when whitelist allowed request (#​7174 by LordGaav)
  • [servicefabric] Fix stickiness support in Service Fabric. (#​7667 by tpayne84)

Documentation:

v1.7.26

Compare Source

Bug fixes:

  • [webui] fix: clean X-Forwarded-Prefix header for the dashboard. (#​7108 by ldez)

Documentation:

  • [k8s,k8s/ingress] Change apiVersion to apps/v1 in examples/k8s/cheese-deployments.yaml (#​7090 by claflico)

v1.7.26

Compare Source

Bug fixes:

  • [webui] fix: clean X-Forwarded-Prefix header for the dashboard. (#​7108 by ldez)

Documentation:

  • [k8s,k8s/ingress] Change apiVersion to apps/v1 in examples/k8s/cheese-deployments.yaml (#​7090 by claflico)

v1.7.25

Compare Source

Bug fixes:

Documentation:

v1.7.25

Compare Source

Bug fixes:

Documentation:

v1.7.24

Compare Source

All Commits

Bug fixes:

  • [k8s/ingress] fix: stickiness annotations support. (#​6576 by ldez)

v1.7.24

Compare Source

All Commits

Bug fixes:

  • [k8s/ingress] fix: stickiness annotations support. (#​6576 by ldez)

v1.7.23

Compare Source

All Commits

Bug fixes:

  • [consul,consulcatalog,docker,ecs,k8s,marathon,mesos,rancher,sticky-session] Fix sameSite (#​6537 by ldez)
  • [server] Force http/1.1 for upgrade (#​6553 by juliens)
  • [tls] fix: max TLS version. (#​6531 by ldez)

v1.7.23

Compare Source

All Commits

Bug fixes:

  • [consul,consulcatalog,docker,ecs,k8s,marathon,mesos,rancher,sticky-session] Fix sameSite (#​6537 by ldez)
  • [server] Force http/1.1 for upgrade (#​6553 by juliens)
  • [tls] fix: max TLS version. (#​6531 by ldez)

v1.7.22

Compare Source

All Commits

Bug fixes:

  • [provider] Skip redirection with invalid regex syntax. (#​6446 by ldez)
  • [server] Clear closed hijacked h2c connections (#​6357 by omerkay)

Documentation:

v1.7.22

Compare Source

All Commits

Bug fixes:

  • [provider] Skip redirection with invalid regex syntax. (#​6446 by ldez)
  • [server] Clear closed hijacked h2c connections (#​6357 by omerkay)

Documentation:

v1.7.21

Compare Source

All Commits

Bug fixes:

  • [acme] Fix dnspod update. (#​6240 by iineva)
  • [acme] Fix finding proper provided certificate when ACME is enabled (#​5873 by yazd)
  • [authentication,middleware] don't create http client in each request in forward auth (#​6273 by juliens)
  • [ecs] fix: skip ECS container when information are missing instead of panic. (#​6071 by ldez)
  • [k8s] Add edge case for root path with rewrite-target (#​6005 by dtomcej)

Documentation:

v1.7.21

Compare Source

All Commits

Bug fixes:

  • [acme] Fix dnspod update. (#​6240 by iineva)
  • [acme] Fix finding proper provided certificate when ACME is enabled (#​5873 by yazd)
  • [authentication,middleware] don't create http client in each request in forward auth (#​6273 by juliens)
  • [ecs] fix: skip ECS container when information are missing instead of panic. (#​6071 by ldez)
  • [k8s] Add edge case for root path with rewrite-target (#​6005 by dtomcej)

Documentation:

v1.7.20

Compare Source

All Commits

Bug fixes:

Documentation:

v1.7.20

Compare Source

All Commits

Bug fixes:

Documentation:

v1.7.19

Compare Source

All Commits

Bug fixes:

  • [k8s,k8s/ingress] Add functions to support precise float compute of weight (#​5663 by rmrfself)
  • [middleware] Fix Location response header http to https when SSL (#​5574 by elielgoncalves)
  • [tls] Allow Default Certificate to work on macOS 10.15 (#​5662 by dtomcej)

Documentation:

v1.7.19

Compare Source

All Commits

Bug fixes:

  • [k8s,k8s/ingress] Add functions to support precise float compute of weight (#​5663 by rmrfself)
  • [middleware] Fix Location response header http to https when SSL (#​5574 by elielgoncalves)
  • [tls] Allow Default Certificate to work on macOS 10.15 (#​5662 by dtomcej)

Documentation:

v1.7.18

Compare Source

All Commits

Bug fixes:

  • [go,security] This version is compiled with Go 1.12.10, which fixes a vulnerability in previous versions. See the CVE about it for more details.

v1.7.18

Compare Source

All Commits

Bug fixes:

  • [go,security] This version is compiled with Go 1.12.10, which fixes a vulnerability in previous versions. See the CVE about it for more details.

v1.7.17

Compare Source

All Commits

Bug fixes:

  • [logs,middleware] Avoid closing stdout when the accesslog handler is closed (#​5459 by nrwiersma)
  • [middleware] Actually send header and code during WriteHeader, if needed (#​5404 by mpl)

Documentation:

v1.7.17

Compare Source

All Commits

Bug fixes:

  • [logs,middleware] Avoid closing stdout when the accesslog handler is closed (#​5459 by nrwiersma)
  • [middleware] Actually send header and code during WriteHeader, if needed (#​5404 by mpl)

Documentation:

v1.7.16

Compare Source

All Commits

Bug fixes:

  • [middleware,websocket] implement Flusher and Hijacker for codeCatcher (#​5376 by mpl)

v1.7.16

Compare Source

All Commits

Bug fixes:

  • [middleware,websocket] implement Flusher and Hijacker for codeCatcher (#​5376 by mpl)

v1.7.15

Compare Source

All Commits

Bug fixes:

  • [authentication,k8s/ingress] Kubernetes support for Auth.HeaderField (#​5235 by ErikWegner)
  • [k8s,k8s/ingress] Finish kubernetes throttling refactoring (#​5269 by mpl)
  • [k8s] Throttle Kubernetes config refresh (#​4716 by benweissmann)
  • [k8s] Fix wrong handling of insecure tls auth forward ingress annotation (#​5319 by majkrzak)
  • [middleware] error pages: do not buffer response when it's not an error (#​5285 by mpl)
  • [tls] Consider default cert domain in certificate store (#​5353 by nrwiersma)
  • [tls] Add TLS minversion constraint (#​5356 by dtomcej)

Documentation:

  • [acme] Update Acme doc - Vultr Wildcard & Root (#​5320 by ddymko)
  • [consulcatalog] Typo in basic auth usersFile label consul-catalog (#​5230 by pitan)
  • [logs] Improve Access Logs Documentation page (#​5238 by dduportal)

v1.7.15

Compare Source

All Commits

Bug fixes:

  • [authentication,k8s/ingress] Kubernetes support for Auth.HeaderField (#​5235 by ErikWegner)
  • [k8s,k8s/ingress] Finish kubernetes throttling refactoring (#​5269 by mpl)
  • [k8s] Throttle Kubernetes config refresh (#​4716 by benweissmann)
  • [k8s] Fix wrong handling of insecure tls auth forward ingress annotation (#​5319 by majkrzak)
  • [middleware] error pages: do not buffer response when it's not an error (#​5285 by mpl)
  • [tls] Consider default cert domain in certificate store (#​5353 by nrwiersma)
  • [tls] Add TLS minversion constraint (#​5356 by dtomcej)

Documentation:

  • [acme] Update Acme doc - Vultr Wildcard & Root (#​5320 by ddymko)
  • [consulcatalog] Typo in basic auth usersFile label consul-catalog (#​5230 by pitan)
  • [logs] Improve Access Logs Documentation page (#​5238 by dduportal)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot force-pushed the renovate/traefik-1.x branch from 9a52f9f to c41b45b Compare March 7, 2022 13:11
@renovate renovate bot changed the title Update traefik Docker tag to v1.7.33 Update dependency traefik to v1.7.34 Mar 7, 2022
@renovate renovate bot changed the title Update dependency traefik to v1.7.34 Update traefik Docker tag to v1.7.34 Sep 25, 2022
@renovate
Copy link
Author

renovate bot commented Mar 22, 2023

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant