diff --git a/.ct.yaml b/.ct.yaml
deleted file mode 100644
index 229030219..000000000
--- a/.ct.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-# Copyright 2024 The Kubernetes Authors.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
----
-remote: origin
-target-branch: main
-
-validate-maintainers: false
-check-version-increment: false
-
-chart-repos:
- - ingress-nginx=https://kubernetes.github.io/ingress-nginx
-helm-extra-args: --timeout 800s
-
-chart-dirs:
- - charts
diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md
index 07770e47c..e15a2cd2b 100644
--- a/.github/ISSUE_TEMPLATE/bug_report.md
+++ b/.github/ISSUE_TEMPLATE/bug_report.md
@@ -37,7 +37,7 @@ This questions are the first thing we need to know to understand the context.
-**NGINX Ingress controller version** (exec into the pod and run `/nginx-ingress-controller --version`):
+**NGINX Ingress controller version** (exec into the pod and run nginx-ingress-controller --version.):
## Quick start
@@ -65,38 +65,14 @@ It will install the controller in the `ingress-nginx` namespace, creating that n
helm show values ingress-nginx --repo https://kubernetes.github.io/ingress-nginx
```
-!!! attention "Helm install on AWS/GCP/Azure/Other providers"
- The *ingress-nginx-controller helm-chart is a generic install out of the box*. The default set of helm values is **not** configured for installation on any infra provider. The annotations that are applicable to the cloud provider must be customized by the users.
- See [AWS LB Controller](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/service/annotations/).
- Examples of some annotations recommended (healthecheck ones are required for target-type IP) for the service resource of `--type LoadBalancer` on AWS are below:
- ```yaml
- annotations:
- service.beta.kubernetes.io/aws-load-balancer-target-group-attributes: deregistration_delay.timeout_seconds=270
- service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip
- service.beta.kubernetes.io/aws-load-balancer-healthcheck-path: /healthz
- service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "10254"
- service.beta.kubernetes.io/aws-load-balancer-healthcheck-protocol: http
- service.beta.kubernetes.io/aws-load-balancer-healthcheck-success-codes: 200-299
- service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing"
- service.beta.kubernetes.io/aws-load-balancer-backend-protocol: tcp
- service.beta.kubernetes.io/aws-load-balancer-cross-zone-load-balancing-enabled: "true"
- service.beta.kubernetes.io/aws-load-balancer-type: nlb
- service.beta.kubernetes.io/aws-load-balancer-manage-backend-security-group-rules: "true"
- service.beta.kubernetes.io/aws-load-balancer-access-log-enabled: "true"
- service.beta.kubernetes.io/aws-load-balancer-security-groups: "sg-something1 sg-something2"
- service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-name: "somebucket"
- service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefix: "ingress-nginx"
- service.beta.kubernetes.io/aws-load-balancer-access-log-emit-interval: "5"
- ```
-
**If you don't have Helm** or if you prefer to use a YAML manifest, you can run the following command instead:
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/cloud/deploy.yaml
```
!!! info
- The YAML manifest in the command above was generated with `helm template`, so you will end up with almost the same
+ The YAML manifest in the command above was generated with `helm template`, so you will end up with almost the same
resources as if you had used Helm to install the controller.
!!! attention
@@ -107,7 +83,6 @@ kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/cont
### Firewall configuration
To check which ports are used by your installation of ingress-nginx, look at the output of `kubectl -n ingress-nginx get pod -o yaml`. In general, you need:
-
- Port 8443 open between all hosts on which the kubernetes nodes are running. This is used for the ingress-nginx [admission controller](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/).
- Port 80 (for HTTP) and/or 443 (for HTTPS) open to the public on the kubernetes nodes to which the DNS of your apps are pointing.
@@ -119,7 +94,7 @@ A few pods should start in the `ingress-nginx` namespace:
kubectl get pods --namespace=ingress-nginx
```
-After a while, they should all be running. The following command will wait for the ingress controller pod to be up,
+After a while, they should all be running. The following command will wait for the ingress controller pod to be up,
running, and ready:
```console
@@ -129,6 +104,7 @@ kubectl wait --namespace ingress-nginx \
--timeout=120s
```
+
### Local testing
Let's create a simple web server and the associated service:
@@ -159,7 +135,6 @@ kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller
[This issue](https://github.com/kubernetes/ingress-nginx/issues/10014#issuecomment-1567791549described) shows a typical DNS problem and its solution.
At this point, you can access your deployment using curl ;
-
```console
curl --resolve demo.localdev.me:8080:127.0.0.1 http://demo.localdev.me:8080
```
@@ -168,7 +143,7 @@ You should see a HTML response containing text like **"It works!"**.
### Online testing
-If your Kubernetes cluster is a "real" cluster that supports services of type `LoadBalancer`, it will have allocated an
+If your Kubernetes cluster is a "real" cluster that supports services of type `LoadBalancer`, it will have allocated an
external IP address or FQDN to the ingress controller.
You can see that IP address or FQDN with the following command:
@@ -177,10 +152,10 @@ You can see that IP address or FQDN with the following command:
kubectl get service ingress-nginx-controller --namespace=ingress-nginx
```
-It will be the `EXTERNAL-IP` field. If that field shows ``, this means that your Kubernetes cluster wasn't
+It will be the `EXTERNAL-IP` field. If that field shows ``, this means that your Kubernetes cluster wasn't
able to provision the load balancer (generally, this is because it doesn't support services of type `LoadBalancer`).
-Once you have the external IP address (or FQDN), set up a DNS record pointing to it. Then you can create an ingress
+Once you have the external IP address (or FQDN), set up a DNS record pointing to it. Then you can create an ingress
resource. The following example assumes that you have set up a DNS record for `www.demo.io`:
```console
@@ -189,13 +164,13 @@ kubectl create ingress demo --class=nginx \
```
Alternatively, the above command can be rewritten as follows for the ```--rule``` command and below.
-
```console
kubectl create ingress demo --class=nginx \
--rule www.demo.io/=demo:80
```
-You should then be able to see the "It works!" page when you connect to . Congratulations,
+
+You should then be able to see the "It works!" page when you connect to http://www.demo.io/. Congratulations,
you are serving a public website hosted on a Kubernetes cluster! 🎉
## Environment-specific instructions
@@ -227,19 +202,19 @@ Kubernetes is available in Docker Desktop:
- Mac, from [version 18.06.0-ce](https://docs.docker.com/docker-for-mac/release-notes/#stable-releases-of-2018)
- Windows, from [version 18.06.0-ce](https://docs.docker.com/docker-for-windows/release-notes/#docker-community-edition-18060-ce-win70-2018-07-25)
-First, make sure that Kubernetes is enabled in the Docker settings. The command `kubectl get nodes` should show a
+First, make sure that Kubernetes is enabled in the Docker settings. The command `kubectl get nodes` should show a
single node called `docker-desktop`.
The ingress controller can be installed on Docker Desktop using the default [quick start](#quick-start) instructions.
-On most systems, if you don't have any other service of type `LoadBalancer` bound to port 80, the ingress controller
-will be assigned the `EXTERNAL-IP` of `localhost`, which means that it will be reachable on localhost:80. If that
-doesn't work, you might have to fall back to the `kubectl port-forward` method described in the
+On most systems, if you don't have any other service of type `LoadBalancer` bound to port 80, the ingress controller
+will be assigned the `EXTERNAL-IP` of `localhost`, which means that it will be reachable on localhost:80. If that
+doesn't work, you might have to fall back to the `kubectl port-forward` method described in the
[local testing section](#local-testing).
#### Rancher Desktop
-Rancher Desktop provides Kubernetes and Container Management on the desktop. Kubernetes is enabled by default in Rancher Desktop.
+Rancher Desktop provides Kubernetes and Container Management on the desktop. Kubernetes is enabled by default in Rancher Desktop.
Rancher Desktop uses K3s under the hood, which in turn uses Traefik as the default ingress controller for the Kubernetes cluster. To use Ingress-Nginx Controller in place of the default Traefik, disable Traefik from Preference > Kubernetes menu.
@@ -247,18 +222,18 @@ Once traefik is disabled, the Ingress-Nginx Controller can be installed on Ranch
### Cloud deployments
-If the load balancers of your cloud provider do active healthchecks on their backends (most do), you can change the
-`externalTrafficPolicy` of the ingress controller Service to `Local` (instead of the default `Cluster`) to save an
-extra hop in some cases. If you're installing with Helm, this can be done by adding
+If the load balancers of your cloud provider do active healthchecks on their backends (most do), you can change the
+`externalTrafficPolicy` of the ingress controller Service to `Local` (instead of the default `Cluster`) to save an
+extra hop in some cases. If you're installing with Helm, this can be done by adding
`--set controller.service.externalTrafficPolicy=Local` to the `helm install` or `helm upgrade` command.
-Furthermore, if the load balancers of your cloud provider support the PROXY protocol, you can enable it, and it will
-let the ingress controller see the real IP address of the clients. Otherwise, it will generally see the IP address of
-the upstream load balancer. This must be done both in the ingress controller
-(with e.g. `--set controller.config.use-proxy-protocol=true`) and in the cloud provider's load balancer configuration
+Furthermore, if the load balancers of your cloud provider support the PROXY protocol, you can enable it, and it will
+let the ingress controller see the real IP address of the clients. Otherwise, it will generally see the IP address of
+the upstream load balancer. This must be done both in the ingress controller
+(with e.g. `--set controller.config.use-proxy-protocol=true`) and in the cloud provider's load balancer configuration
to function correctly.
-In the following sections, we provide YAML manifests that enable these options when possible, using the specific
+In the following sections, we provide YAML manifests that enable these options when possible, using the specific
options of various cloud providers.
#### AWS
@@ -267,57 +242,54 @@ In AWS, we use a Network load balancer (NLB) to expose the Ingress-Nginx Control
!!! info
The provided templates illustrate the setup for legacy in-tree service load balancer for AWS NLB.
- AWS provides the documentation on how to use
- [Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
+ AWS provides the documentation on how to use
+ [Network load balancing on Amazon EKS](https://docs.aws.amazon.com/eks/latest/userguide/network-load-balancing.html)
with [AWS Load Balancer Controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller).
##### Network Load Balancer (NLB)
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/aws/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/aws/deploy.yaml
```
##### TLS termination in AWS Load Balancer (NLB)
-By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
+By default, TLS is terminated in the ingress controller. But it is also possible to terminate TLS in the Load Balancer.
This section explains how to do that on AWS using an NLB.
-1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
+1. Download the [deploy.yaml](https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml) template
```console
- wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
+ wget https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/aws/nlb-with-tls-termination/deploy.yaml
```
2. Edit the file and change the VPC CIDR in use for the Kubernetes cluster:
-
```
proxy-real-ip-cidr: XXX.XXX.XXX/XX
```
3. Change the AWS Certificate Manager (ACM) ID as well:
-
```
arn:aws:acm:us-west-2:XXXXXXXX:certificate/XXXXXX-XXXXXXX-XXXXXXX-XXXXXXXX
```
4. Deploy the manifest:
-
```console
kubectl apply -f deploy.yaml
```
##### NLB Idle Timeouts
-Idle timeout value for TCP flows is 350 seconds and
+Idle timeout value for TCP flows is 350 seconds and
[cannot be modified](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/network-load-balancers.html#connection-idle-timeout).
-For this reason, you need to ensure the
-[keepalive_timeout](https://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout)
+For this reason, you need to ensure the
+[keepalive_timeout](https://nginx.org/en/docs/http/ngx_http_core_module.html#keepalive_timeout)
value is configured less than 350 seconds to work as expected.
By default, NGINX `keepalive_timeout` is set to `75s`.
-More information with regard to timeouts can be found in the
+More information with regard to timeouts can be found in the
[official AWS documentation](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/network-load-balancers.html#connection-idle-timeout)
#### GCE-GKE
@@ -332,17 +304,18 @@ kubectl create clusterrolebinding cluster-admin-binding \
Then, the ingress controller can be installed like this:
+
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/cloud/deploy.yaml
```
!!! warning
- For private clusters, you will need to either add a firewall rule that allows master nodes access to
- port `8443/tcp` on worker nodes, or change the existing rule that allows access to port `80/tcp`, `443/tcp` and
- `10254/tcp` to also allow access to port `8443/tcp`. More information can be found in the
+ For private clusters, you will need to either add a firewall rule that allows master nodes access to
+ port `8443/tcp` on worker nodes, or change the existing rule that allows access to port `80/tcp`, `443/tcp` and
+ `10254/tcp` to also allow access to port `8443/tcp`. More information can be found in the
[Official GCP Documentation](https://cloud.google.com/load-balancing/docs/tcp/setting-up-tcp#config-hc-firewall).
- See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules)
+ See the [GKE documentation](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules)
on adding rules and the [Kubernetes issue](https://github.com/kubernetes/kubernetes/issues/79739) for more detail.
Proxy-protocol is supported in GCE check the [Official Documentations on how to enable.](https://cloud.google.com/load-balancing/docs/tcp/setting-up-tcp#proxy-protocol)
@@ -350,7 +323,7 @@ Proxy-protocol is supported in GCE check the [Official Documentations on how to
#### Azure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/cloud/deploy.yaml
```
More information with regard to Azure annotations for ingress controller can be found in the [official AKS documentation](https://docs.microsoft.com/en-us/azure/aks/ingress-internal-ip#create-an-ingress-controller).
@@ -358,36 +331,34 @@ More information with regard to Azure annotations for ingress controller can be
#### Digital Ocean
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/do/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/do/deploy.yaml
```
-
- By default the service object of the ingress-nginx-controller for Digital-Ocean, only configures one annotation. Its this one `service.beta.kubernetes.io/do-loadbalancer-enable-proxy-protocol: "true"`. While this makes the service functional, it was reported that the Digital-Ocean LoadBalancer graphs shows `no data`, unless a few other annotations are also configured. Some of these other annotations require values that can not be generic and hence not forced in a out-of-the-box installation. These annotations and a discussion on them is well documented in [this issue](https://github.com/kubernetes/ingress-nginx/issues/8965). Please refer to the issue to add annotations, with values specific to user, to get graphs of the DO-LB populated with data.
+
#### Scaleway
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/scw/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/scw/deploy.yaml
```
-Refer to the [dedicated tutorial](https://www.scaleway.com/en/docs/tutorials/proxy-protocol-v2-load-balancer/#configuring-proxy-protocol-for-ingress-nginx) in the Scaleway documentation for configuring the proxy protocol for ingress-nginx with the Scaleway load balancer.
-
#### Exoscale
```console
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/exoscale/deploy.yaml
```
-The full list of annotations supported by Exoscale is available in the Exoscale Cloud Controller Manager
+The full list of annotations supported by Exoscale is available in the Exoscale Cloud Controller Manager
[documentation](https://github.com/exoscale/exoscale-cloud-controller-manager/blob/master/docs/service-loadbalancer.md).
#### Oracle Cloud Infrastructure
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/cloud/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/cloud/deploy.yaml
```
-A
-[complete list of available annotations for Oracle Cloud Infrastructure](https://github.com/oracle/oci-cloud-controller-manager/blob/master/docs/load-balancer-annotations.md)
+A
+[complete list of available annotations for Oracle Cloud Infrastructure](https://github.com/oracle/oci-cloud-controller-manager/blob/master/docs/load-balancer-annotations.md)
can be found in the [OCI Cloud Controller Manager](https://github.com/oracle/oci-cloud-controller-manager) documentation.
#### OVHcloud
@@ -402,15 +373,15 @@ You can find the [complete tutorial](https://docs.ovh.com/gb/en/kubernetes/insta
### Bare metal clusters
-This section is applicable to Kubernetes clusters deployed on bare metal servers, as well as "raw" VMs where Kubernetes
+This section is applicable to Kubernetes clusters deployed on bare metal servers, as well as "raw" VMs where Kubernetes
was installed manually, using generic Linux distros (like CentOS, Ubuntu...)
-For quick testing, you can use a
-[NodePort](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport).
+For quick testing, you can use a
+[NodePort](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport).
This should work on almost every cluster, but it will typically use a port in the range 30000-32767.
```console
-kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.12.0/deploy/static/provider/baremetal/deploy.yaml
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.8.2/deploy/static/provider/baremetal/deploy.yaml
```
For more information about bare metal deployments (and how to use port 80 instead of a random port in the 30000-32767 range),
@@ -430,20 +401,20 @@ kubectl exec $POD_NAME -n $POD_NAMESPACE -- /nginx-ingress-controller --version
### Scope
-By default, the controller watches Ingress objects from all namespaces. If you want to change this behavior,
-use the flag `--watch-namespace` or check the Helm chart value `controller.scope` to limit the controller to a single
-namespace. Although the use of this flag is not popular, one important fact to note is that the secret containing the default-ssl-certificate needs to also be present in the watched namespace(s).
+By default, the controller watches Ingress objects from all namespaces. If you want to change this behavior,
+use the flag `--watch-namespace` or check the Helm chart value `controller.scope` to limit the controller to a single
+namespace.
-See also
-[“How to easily install multiple instances of the Ingress NGINX controller in the same cluster”](https://kubernetes.github.io/ingress-nginx/#how-to-easily-install-multiple-instances-of-the-ingress-nginx-controller-in-the-same-cluster)
+See also
+[“How to easily install multiple instances of the Ingress NGINX controller in the same cluster”](https://kubernetes.github.io/ingress-nginx/#how-to-easily-install-multiple-instances-of-the-ingress-nginx-controller-in-the-same-cluster)
for more details.
### Webhook network access
!!! warning
The controller uses an [admission webhook](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/)
- to validate Ingress definitions. Make sure that you don't have
- [Network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
+ to validate Ingress definitions. Make sure that you don't have
+ [Network policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
or additional firewalls preventing connections from the API server to the `ingress-nginx-controller-admission` service.
### Certificate generation
@@ -464,24 +435,22 @@ You can wait until it is ready to run the next command:
### Running on Kubernetes versions older than 1.19
-Ingress resources evolved over time. They started with `apiVersion: extensions/v1beta1`,
+Ingress resources evolved over time. They started with `apiVersion: extensions/v1beta1`,
then moved to `apiVersion: networking.k8s.io/v1beta1` and more recently to `apiVersion: networking.k8s.io/v1`.
Here is how these Ingress versions are supported in Kubernetes:
-
- before Kubernetes 1.19, only `v1beta1` Ingress resources are supported
- from Kubernetes 1.19 to 1.21, both `v1beta1` and `v1` Ingress resources are supported
- in Kubernetes 1.22 and above, only `v1` Ingress resources are supported
And here is how these Ingress versions are supported in Ingress-Nginx Controller:
-
- before version 1.0, only `v1beta1` Ingress resources are supported
- in version 1.0 and above, only `v1` Ingress resources are
-As a result, if you're running Kubernetes 1.19 or later, you should be able to use the latest version of the NGINX
-Ingress Controller; but if you're using an old version of Kubernetes (1.18 or earlier) you will have to use version 0.X
+As a result, if you're running Kubernetes 1.19 or later, you should be able to use the latest version of the NGINX
+Ingress Controller; but if you're using an old version of Kubernetes (1.18 or earlier) you will have to use version 0.X
of the Ingress-Nginx Controller (e.g. version 0.49).
-The Helm chart of the Ingress-Nginx Controller switched to version 1 in version 4 of the chart. In other words, if
-you're running Kubernetes 1.19 or earlier, you should use version 3.X of the chart (this can be done by adding
+The Helm chart of the Ingress-Nginx Controller switched to version 1 in version 4 of the chart. In other words, if
+you're running Kubernetes 1.19 or earlier, you should use version 3.X of the chart (this can be done by adding
`--version='<4'` to the `helm install` command ).
diff --git a/docs/developer-guide/getting-started.md b/docs/developer-guide/getting-started.md
index e4bb661d4..4b7ed46f0 100644
--- a/docs/developer-guide/getting-started.md
+++ b/docs/developer-guide/getting-started.md
@@ -19,10 +19,6 @@ Install [Go 1.14](https://golang.org/dl/) or later.
Install [Docker](https://docs.docker.com/engine/install/) (v19.03.0 or later with experimental feature on)
-Install [kubectl](https://kubernetes.io/docs/tasks/tools/) (1.24.0 or higher)
-
-Install [Kind](https://kind.sigs.k8s.io/)
-
!!! important
The majority of make tasks run as docker containers
diff --git a/docs/e2e-tests.md b/docs/e2e-tests.md
index 43726f5a1..8d8528b31 100644
--- a/docs/e2e-tests.md
+++ b/docs/e2e-tests.md
@@ -7,17 +7,18 @@ Do not try to edit it manually.
### [[Admission] admission controller](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L39)
-- [should not allow overlaps of host and paths without canary annotations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L47)
-- [should allow overlaps of host and paths with canary annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L64)
-- [should block ingress with invalid path](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L85)
-- [should return an error if there is an error validating the ingress definition](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L102)
-- [should return an error if there is an invalid value in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L116)
-- [should return an error if there is a forbidden value in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L130)
-- [should return an error if there is an invalid path and wrong pathType is set](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L144)
-- [should not return an error if the Ingress V1 definition is valid with Ingress Class](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L178)
-- [should not return an error if the Ingress V1 definition is valid with IngressClass annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L194)
-- [should return an error if the Ingress V1 definition contains invalid annotations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L210)
-- [should not return an error for an invalid Ingress when it has unknown class](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L224)
+- [reject ingress with global-rate-limit annotations when memcached is not configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L47)
+- [should not allow overlaps of host and paths without canary annotations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L74)
+- [should allow overlaps of host and paths with canary annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L91)
+- [should block ingress with invalid path](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L112)
+- [should return an error if there is an error validating the ingress definition](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L129)
+- [should return an error if there is an invalid value in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L149)
+- [should return an error if there is a forbidden value in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L163)
+- [should return an error if there is an invalid path and wrong pathType is set](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L177)
+- [should not return an error if the Ingress V1 definition is valid with Ingress Class](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L211)
+- [should not return an error if the Ingress V1 definition is valid with IngressClass annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L227)
+- [should return an error if the Ingress V1 definition contains invalid annotations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L243)
+- [should not return an error for an invalid Ingress when it has unknown class](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/admission/admission.go#L263)
### [affinity session-cookie-name](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/affinity.go#L43)
- [should set sticky cookie SERVERID](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/affinity.go#L50)
- [should change cookie name on ingress definition change](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/affinity.go#L72)
@@ -53,24 +54,24 @@ Do not try to edit it manually.
- [should return status code 200 when authentication is configured with a map and Authorization header is sent](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L205)
- [should return status code 401 when authentication is configured with invalid content and Authorization header is sent](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L233)
- [proxy_set_header My-Custom-Header 42;](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L272)
-- [proxy_set_header My-Custom-Header 42;](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L292)
-- [proxy_set_header 'My-Custom-Header' '42';](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L311)
-- [user retains cookie by default](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L420)
-- [user does not retain cookie if upstream returns error status code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L431)
-- [user with annotated ingress retains cookie if upstream returns error status code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L442)
-- [should return status code 200 when signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L481)
-- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L490)
-- [keeps processing new ingresses even if one of the existing ingresses is misconfigured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L501)
-- [should overwrite Foo header with auth response](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L525)
-- [should return status code 200 when signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L701)
-- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L710)
-- [keeps processing new ingresses even if one of the existing ingresses is misconfigured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L721)
-- [should return status code 200 when signed in after auth backend is deleted ](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L780)
-- [should deny login for different location on same server](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L800)
-- [should deny login for different servers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L828)
-- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L857)
-- [should return 503 (location was denied)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L887)
-- [should add error to the config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L895)
+- [proxy_set_header My-Custom-Header 42;](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L298)
+- [proxy_set_header 'My-Custom-Header' '42';](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L324)
+- [user retains cookie by default](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L433)
+- [user does not retain cookie if upstream returns error status code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L444)
+- [user with annotated ingress retains cookie if upstream returns error status code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L455)
+- [should return status code 200 when signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L494)
+- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L503)
+- [keeps processing new ingresses even if one of the existing ingresses is misconfigured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L514)
+- [should overwrite Foo header with auth response](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L538)
+- [should return status code 200 when signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L714)
+- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L723)
+- [keeps processing new ingresses even if one of the existing ingresses is misconfigured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L734)
+- [should return status code 200 when signed in after auth backend is deleted ](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L793)
+- [should deny login for different location on same server](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L813)
+- [should deny login for different servers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L841)
+- [should redirect to signin url when not signed in](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L870)
+- [should return 503 (location was denied)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L900)
+- [should add error to the config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/auth.go#L908)
### [auth-tls-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L31)
- [should set sslClientCertificate, sslVerifyClient and sslVerifyDepth with auth-tls-secret](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L38)
- [should set valid auth-tls-secret, sslVerify to off, and sslVerifyDepth to 2](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L86)
@@ -79,8 +80,7 @@ Do not try to edit it manually.
- [should validate auth-tls-verify-client](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L208)
- [should return 403 using auth-tls-match-cn with no matching CN from client](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L267)
- [should return 200 using auth-tls-match-cn with matching CN from client](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L296)
-- [should reload the nginx config when auth-tls-match-cn is updated](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L325)
-- [should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L368)
+- [should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/authtls.go#L325)
### [backend-protocol](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/backendprotocol.go#L29)
- [should set backend protocol to https:// and use proxy_pass](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/backendprotocol.go#L36)
- [should set backend protocol to https:// and use proxy_pass with lowercase annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/backendprotocol.go#L51)
@@ -147,12 +147,6 @@ Do not try to edit it manually.
- [should not allow - portless origin with wildcard origin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/cors.go#L520)
- [should allow correct origins - missing subdomain + origin with wildcard origin and correct origin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/cors.go#L540)
- [should allow - missing origins (should allow all origins)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/cors.go#L576)
-- [should allow correct origin but not others - cors allow origin annotations contain trailing comma](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/cors.go#L636)
-- [should allow - origins with non-http[s] protocols](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/cors.go#L673)
-### [custom-headers-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customheaders.go#L33)
-- [should return status code 200 when no custom-headers is configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customheaders.go#L40)
-- [should return status code 503 when custom-headers is configured with an invalid secret](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customheaders.go#L57)
-- [more_set_headers 'My-Custom-Header' '42';](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customheaders.go#L78)
### [custom-http-errors](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customhttperrors.go#L34)
- [configures Nginx correctly](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/customhttperrors.go#L41)
### [default-backend](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/default_backend.go#L29)
@@ -161,8 +155,6 @@ Do not try to edit it manually.
- [disable-access-log set access_log off](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/disableaccesslog.go#L35)
- [disable-http-access-log set access_log off](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/disableaccesslog.go#L53)
- [disable-stream-access-log set access_log off](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/disableaccesslog.go#L71)
-### [disable-proxy-intercept-errors](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/disableproxyintercepterrors.go#L31)
-- [configures Nginx correctly](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/disableproxyintercepterrors.go#L39)
### [backend-protocol - FastCGI](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fastcgi.go#L30)
- [should use fastcgi_pass in the configuration file](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fastcgi.go#L37)
- [should add fastcgi_index in the configuration file](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fastcgi.go#L54)
@@ -173,13 +165,13 @@ Do not try to edit it manually.
### [from-to-www-redirect](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L31)
- [should redirect from www HTTP to HTTP](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L38)
- [should redirect from www HTTPS to HTTPS](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/fromtowwwredirect.go#L64)
-### [backend-protocol - GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L45)
-- [should use grpc_pass in the configuration file](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L48)
-- [should return OK for service with backend protocol GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L71)
-- [authorization metadata should be overwritten by external auth response headers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L132)
-- [should return OK for service with backend protocol GRPCS](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L193)
-- [should return OK when request not exceed timeout](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L260)
-- [should return Error when request exceed timeout](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L303)
+### [annotation-global-rate-limit](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/globalratelimit.go#L30)
+- [generates correct configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/globalratelimit.go#L38)
+### [backend-protocol - GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L40)
+- [should use grpc_pass in the configuration file](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L43)
+- [should return OK for service with backend protocol GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L68)
+- [authorization metadata should be overwritten by external auth response headers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L129)
+- [should return OK for service with backend protocol GRPCS](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/grpc.go#L190)
### [http2-push-preload](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/http2pushpreload.go#L27)
- [enable the http2-push-preload directive](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/http2pushpreload.go#L34)
### [allowlist-source-range](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/ipallowlist.go#L27)
@@ -203,14 +195,14 @@ Do not try to edit it manually.
- [should enable modsecurity with transaction ID and OWASP rules](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L64)
- [should disable modsecurity](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L85)
- [should enable modsecurity with snippet](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L102)
-- [should enable modsecurity without using 'modsecurity on;'](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L124)
-- [should disable modsecurity using 'modsecurity off;'](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L147)
-- [should enable modsecurity with snippet and block requests](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L169)
-- [should enable modsecurity globally and with modsecurity-snippet block requests](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L202)
-- [should enable modsecurity when enable-owasp-modsecurity-crs is set to true](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L235)
-- [should enable modsecurity through the config map](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L269)
-- [should enable modsecurity through the config map but ignore snippet as disabled by admin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L309)
-- [should disable default modsecurity conf setting when modsecurity-snippet is specified](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L354)
+- [should enable modsecurity without using 'modsecurity on;'](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L130)
+- [should disable modsecurity using 'modsecurity off;'](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L153)
+- [should enable modsecurity with snippet and block requests](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L175)
+- [should enable modsecurity globally and with modsecurity-snippet block requests](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L214)
+- [should enable modsecurity when enable-owasp-modsecurity-crs is set to true](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L253)
+- [should enable modsecurity through the config map](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L292)
+- [should enable modsecurity through the config map but ignore snippet as disabled by admin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L338)
+- [should disable default modsecurity conf setting when modsecurity-snippet is specified](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/modsecurity/modsecurity.go#L380)
### [preserve-trailing-slash](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/preservetrailingslash.go#L27)
- [should allow preservation of trailing slashes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/preservetrailingslash.go#L34)
### [proxy-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L30)
@@ -222,10 +214,10 @@ Do not try to edit it manually.
- [should set valid proxy timeouts](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L117)
- [should not set invalid proxy timeouts](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L138)
- [should turn on proxy-buffering](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L159)
-- [should turn off proxy-request-buffering](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L184)
-- [should build proxy next upstream](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L199)
-- [should setup proxy cookies](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L220)
-- [should change the default proxy HTTP version](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L238)
+- [should turn off proxy-request-buffering](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L181)
+- [should build proxy next upstream](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L196)
+- [should setup proxy cookies](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L217)
+- [should change the default proxy HTTP version](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxy.go#L235)
### [proxy-ssl-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxyssl.go#L32)
- [should set valid proxy-ssl-secret](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxyssl.go#L39)
- [should set valid proxy-ssl-secret, proxy-ssl-verify to on, proxy-ssl-verify-depth to 2, and proxy-ssl-server-name to on](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/proxyssl.go#L66)
@@ -235,10 +227,6 @@ Do not try to edit it manually.
### [permanent-redirect permanent-redirect-code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/redirect.go#L30)
- [should respond with a standard redirect code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/redirect.go#L33)
- [should respond with a custom redirect code](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/redirect.go#L61)
-### [relative-redirects](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/relativeredirects.go#L35)
-- [configures Nginx correctly](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/relativeredirects.go#L43)
-- [should respond with absolute URL in Location](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/relativeredirects.go#L61)
-- [should respond with relative URL in Location](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/relativeredirects.go#L85)
### [rewrite-target use-regex enable-rewrite-log](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/rewrite.go#L32)
- [should write rewrite logs](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/rewrite.go#L39)
- [should use correct longest path match](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/rewrite.go#L68)
@@ -255,13 +243,12 @@ Do not try to edit it manually.
- [should not use the Service Cluster IP and Port](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/serviceupstream.go#L97)
### [configuration-snippet](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/snippet.go#L28)
- [set snippet more_set_headers in all locations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/snippet.go#L34)
-- [drops snippet more_set_header in all locations if disabled by admin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/snippet.go#L66)
+- [drops snippet more_set_header in all locations if disabled by admin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/snippet.go#L73)
### [ssl-ciphers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/sslciphers.go#L28)
- [should change ssl ciphers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/sslciphers.go#L35)
-- [should keep ssl ciphers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/sslciphers.go#L58)
### [stream-snippet](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/streamsnippet.go#L34)
- [should add value of stream-snippet to nginx config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/streamsnippet.go#L41)
-- [should add stream-snippet and drop annotations per admin config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/streamsnippet.go#L88)
+- [should add stream-snippet and drop annotations per admin config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/streamsnippet.go#L94)
### [upstream-hash-by-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/upstreamhashby.go#L79)
- [should connect to the same pod](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/upstreamhashby.go#L86)
- [should connect to the same subset of pods](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/upstreamhashby.go#L95)
@@ -270,9 +257,6 @@ Do not try to edit it manually.
### [x-forwarded-prefix](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L28)
- [should set the X-Forwarded-Prefix to the annotation value](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L35)
- [should not add X-Forwarded-Prefix if the annotation value is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/annotations/xforwardedprefix.go#L57)
-### [[CGroups] cgroups](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L32)
-- [detects cgroups version v1](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L40)
-- [detect cgroups version v2](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/cgroups/cgroups.go#L83)
### [Debug CLI](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L29)
- [should list the backend servers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L37)
- [should get information for a specific backend server](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/dbg/main.go#L56)
@@ -287,8 +271,6 @@ Do not try to edit it manually.
- [should return a self generated SSL certificate](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/defaultbackend/ssl.go#L29)
### [[Default Backend] change default settings](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/defaultbackend/with_hosts.go#L30)
- [should apply the annotation to the default backend](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/defaultbackend/with_hosts.go#L38)
-### [[Disable Leader] Routing works when leader election was disabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/disableleaderelection/disable_leader.go#L28)
-- [should create multiple ingress routings rules when leader election has disabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/disableleaderelection/disable_leader.go#L35)
### [[Endpointslices] long service name](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/endpointslices/longname.go#L29)
- [should return 200 when service name has max allowed number of characters 63](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/endpointslices/longname.go#L38)
### [[TopologyHints] topology aware routing](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/endpointslices/topology.go#L34)
@@ -296,7 +278,7 @@ Do not try to edit it manually.
### [[Shutdown] Grace period shutdown](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/grace_period.go#L32)
- [/healthz should return status code 500 during shutdown grace period](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/grace_period.go#L35)
### [[Shutdown] ingress controller](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L30)
-- [should shutdown in less than 60 seconds without pending connections](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L40)
+- [should shutdown in less than 60 secons without pending connections](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/shutdown.go#L40)
### [[Shutdown] Graceful shutdown with pending request](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/slow_requests.go#L25)
- [should let slow requests finish before shutting down](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/gracefulshutdown/slow_requests.go#L33)
### [[Ingress] DeepInspection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/deep_inspection.go#L27)
@@ -309,10 +291,6 @@ Do not try to edit it manually.
- [should choose the correct location](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_mixed.go#L39)
### [[Ingress] [PathType] prefix checks](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L28)
- [should return 404 when prefix /aaa does not match request /aaaccc](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L35)
-- [should test prefix path using simple regex pattern for /id/{int}](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L72)
-- [should test prefix path using regex pattern for /id/{int} ignoring non-digits characters at end of string](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L113)
-- [should test prefix path using fixed path size regex pattern /id/{int}{3}](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L142)
-- [should correctly route multi-segment path patterns](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/pathtype_prefix.go#L177)
### [[Ingress] definition without host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L31)
- [should set ingress details variables for ingresses without a host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L34)
- [should set ingress details variables for ingresses with host without IngressRuleValue, only Backend](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/ingress/without_host.go#L55)
@@ -334,15 +312,13 @@ Do not try to edit it manually.
- [removes HTTPS configuration when we delete TLS spec](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_certificates.go#L233)
### [[Lua] dynamic configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L41)
- [configures balancer Lua middleware correctly](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L49)
-- [handles endpoints only changes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L56)
-- [handles endpoints only changes (down scaling of replicas)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L81)
-- [handles endpoints only changes consistently (down scaling of replicas vs. empty service)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L119)
-- [handles an annotation change](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L165)
+- [handles endpoints only changes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L61)
+- [handles endpoints only changes (down scaling of replicas)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L86)
+- [handles endpoints only changes consistently (down scaling of replicas vs. empty service)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L124)
+- [handles an annotation change](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/lua/dynamic_configuration.go#L170)
### [[metrics] exported prometheus metrics](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L36)
-- [exclude socket request metrics are absent](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L51)
-- [exclude socket request metrics are present](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L73)
-- [request metrics per undefined host are present when flag is set](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L95)
-- [request metrics per undefined host are not present when flag is not set](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L128)
+- [exclude socket request metrics are absent](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L50)
+- [exclude socket request metrics are present](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/metrics/metrics.go#L72)
### [nginx-configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/nginx/nginx.go#L99)
- [start nginx with default configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/nginx/nginx.go#L102)
- [fails when using alias directive](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/nginx/nginx.go#L114)
@@ -375,9 +351,9 @@ Do not try to edit it manually.
- [should be disabled when setting is false](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/aio_write.go#L46)
### [Bad annotation values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L29)
- [[BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L36)
-- [[BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L68)
-- [[BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L105)
-- [[BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L138)
+- [[BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L75)
+- [[BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L119)
+- [[BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/badannotationvalues.go#L157)
### [brotli](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/brotli.go#L30)
- [should only compress responses that meet the `brotli-min-length` condition](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/brotli.go#L38)
### [Configmap change](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/configmap_change.go#L29)
@@ -408,7 +384,6 @@ Do not try to edit it manually.
### [Geoip2](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/geoip2.go#L36)
- [should include geoip2 line in config when enabled and db file exists](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/geoip2.go#L45)
- [should only allow requests from specific countries](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/geoip2.go#L69)
-- [should up and running nginx controller using autoreload flag](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/geoip2.go#L122)
### [[Security] block-*](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_access_block.go#L28)
- [should block CIDRs defined in the ConfigMap](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_access_block.go#L38)
- [should block User-Agents defined in the ConfigMap](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_access_block.go#L55)
@@ -424,15 +399,15 @@ Do not try to edit it manually.
### [global-options](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L28)
- [should have worker_rlimit_nofile option](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L31)
- [should have worker_rlimit_nofile option and be independent on amount of worker processes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/global_options.go#L37)
-### [GRPC](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/grpc.go#L39)
-- [should set the correct GRPC Buffer Size](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/grpc.go#L42)
-### [gzip](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L30)
-- [should be disabled by default](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L40)
-- [should be enabled with default settings](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L56)
-- [should set gzip_comp_level to 4](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L82)
-- [should set gzip_disable to msie6](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L102)
-- [should set gzip_min_length to 100](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L132)
-- [should set gzip_types to text/html](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L164)
+### [settings-global-rate-limit](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/globalratelimit.go#L30)
+- [generates correct NGINX configuration](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/globalratelimit.go#L38)
+### [gzip](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L29)
+- [should be disabled by default](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L32)
+- [should be enabled with default settings](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L39)
+- [should set gzip_comp_level to 4](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L56)
+- [should set gzip_disable to msie6](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L67)
+- [should set gzip_min_length to 100](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L78)
+- [should set gzip_types to application/javascript](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/gzip.go#L89)
### [hash size](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/hash-size.go#L27)
- [should set server_names_hash_bucket_size](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/hash-size.go#L39)
- [should set server_names_hash_max_size](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/hash-size.go#L47)
@@ -494,20 +469,40 @@ Do not try to edit it manually.
- [should return status code 200 when accessing '/noauth' unauthenticated](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/no_auth_locations.go#L82)
### [Add no tls redirect locations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/no_tls_redirect_locations.go#L27)
- [Check no tls redirect locations config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/no_tls_redirect_locations.go#L30)
-### [OCSP](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/ocsp/ocsp.go#L43)
-- [should enable OCSP and contain stapling information in the connection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/ocsp/ocsp.go#L50)
+### [OCSP](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/ocsp/ocsp.go#L42)
+- [should enable OCSP and contain stapling information in the connection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/ocsp/ocsp.go#L49)
### [Configure Opentelemetry](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L39)
- [should not exists opentelemetry directive](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L49)
- [should exists opentelemetry directive when is enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L62)
- [should include opentelemetry_trust_incoming_spans on directive when enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L76)
- [should not exists opentelemetry_operation_name directive when is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L91)
- [should exists opentelemetry_operation_name directive when is configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentelemetry.go#L106)
+### [Configure OpenTracing](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L52)
+- [should not exists opentracing directive](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L62)
+- [should exists opentracing directive when is enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L75)
+- [should include opentracing_trust_incoming_span off directive when disabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L89)
+- [should not exists opentracing_operation_name directive when is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L104)
+- [should exists opentracing_operation_name directive when is configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L119)
+- [should not exists opentracing_location_operation_name directive when is empty](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L134)
+- [should exists opentracing_location_operation_name directive when is configured](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L149)
+- [should enable opentracing using zipkin](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L164)
+- [should enable opentracing using jaeger](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L176)
+- [should enable opentracing using jaeger with sampler host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L188)
+- [should propagate the w3c header when configured with jaeger](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L201)
+- [should enable opentracing using jaeger with an HTTP endpoint](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L232)
+- [should enable opentracing using datadog](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/opentracing.go#L245)
+### [plugins](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/plugins.go#L28)
+- [should exist a x-hello-world header](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/plugins.go#L35)
+### [[Security] Pod Security Policies](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/pod_security_policy.go#L41)
+- [should be running with a Pod Security Policy](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/pod_security_policy.go#L44)
+### [[Security] Pod Security Policies with volumes](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/pod_security_policy_volumes.go#L37)
+- [should be running with a Pod Security Policy](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/pod_security_policy_volumes.go#L40)
### [proxy-connect-timeout](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L29)
- [should set valid proxy timeouts using configmap values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L37)
- [should not set invalid proxy timeouts using configmap values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_connect_timeout.go#L53)
### [Dynamic $proxy_host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_host.go#L28)
- [should exist a proxy_host](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_host.go#L36)
-- [should exist a proxy_host using the upstream-vhost annotation value](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_host.go#L60)
+- [should exist a proxy_host using the upstream-vhost annotation value](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_host.go#L65)
### [proxy-next-upstream](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_next_upstream.go#L28)
- [should build proxy next upstream using configmap values](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_next_upstream.go#L36)
### [use-proxy-protocol](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/proxy_protocol.go#L38)
@@ -527,7 +522,7 @@ Do not try to edit it manually.
- [reuse port should be enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/reuse-port.go#L52)
### [configmap server-snippet](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_snippet.go#L28)
- [should add value of server-snippet setting to all ingress config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_snippet.go#L35)
-- [should add global server-snippet and drop annotations per admin config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_snippet.go#L100)
+- [should add global server-snippet and drop annotations per admin config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_snippet.go#L98)
### [server-tokens](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_tokens.go#L29)
- [should not exists Server header in the response](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_tokens.go#L38)
- [should exists Server header in the response when is enabled](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/server_tokens.go#L50)
@@ -539,14 +534,14 @@ Do not try to edit it manually.
- [should pass unknown traffic to default backend and handle known traffic](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/ssl_passthrough.go#L78)
### [configmap stream-snippet](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/stream_snippet.go#L35)
- [should add value of stream-snippet via config map to nginx config](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/stream_snippet.go#L42)
-### [[SSL] TLS protocols, ciphers and headers](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L32)
-- [setting cipher suite](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L66)
-- [setting max-age parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L110)
-- [setting includeSubDomains parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L127)
-- [setting preload parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L147)
-- [overriding what's set from the upstream](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L168)
-- [should not use ports during the HTTP to HTTPS redirection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L190)
-- [should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L208)
+### [[SSL] TLS protocols, ciphers and headers)](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L31)
+- [setting cipher suite](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L65)
+- [setting max-age parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L109)
+- [setting includeSubDomains parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L125)
+- [setting preload parameter](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L144)
+- [overriding what's set from the upstream](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L164)
+- [should not use ports during the HTTP to HTTPS redirection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L186)
+- [should not use ports or X-Forwarded-Host during the HTTP to HTTPS redirection](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/tls.go#L204)
### [annotation validations](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/validations/validations.go#L30)
- [should allow ingress based on their risk on webhooks](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/validations/validations.go#L33)
- [should allow ingress based on their risk on webhooks](https://github.com/kubernetes/ingress-nginx/tree/main//test/e2e/settings/validations/validations.go#L68)
diff --git a/docs/examples/auth/client-certs/README.md b/docs/examples/auth/client-certs/README.md
index 94cf6c697..7aed26395 100644
--- a/docs/examples/auth/client-certs/README.md
+++ b/docs/examples/auth/client-certs/README.md
@@ -2,59 +2,117 @@
It is possible to enable Client-Certificate Authentication by adding additional annotations to your Ingress Resource.
-Before getting started you must have the following Certificates configured:
+## 1. Prerequisites / Certificates
-1. CA certificate and Key (Intermediate Certs need to be in CA)
-2. Server Certificate (Signed by CA) and Key (CN should be equal the hostname you will use)
-3. Client Certificate (Signed by CA) and Key
+- Certificate Authority (CA) Certificate ```ca-cert.pem```
+- Server Certificate (Signed by CA) and Key ```server-cert.pem``` and ```server-key.pem```
+- Client Certificate (Signed by CA), Key and CA Certificate for following client side authentication (See Sub-Section 4 - Test)
-For more details on the generation process, checkout the Prerequisite [docs](../../PREREQUISITES.md#client-certificate-authentication).
+:memo: If Intermediate CA-Certificates (Official CA, non-self-signed) used, they all need to be concatenated (CA authority chain) in one CA file.
-You can have as many certificates as you want. If they're in the binary DER format, you can convert them as the following:
+The following commands let you generate self-signed Certificates and Keys for testing-purpose.
+
+- Generate the CA Key and Certificate:
+
+```bash
+openssl req -x509 -sha256 -newkey rsa:4096 -keyout ca-key.der -out ca-cert.der -days 356 -nodes -subj '/CN=My Cert Authority'
+```
+
+- Generate the Server Key, and Certificate and Sign with the CA Certificate:
+
+```bash
+openssl req -new -newkey rsa:4096 -keyout server-key.der -out server.csr -nodes -subj '/CN=mydomain.com'
+openssl x509 -req -sha256 -days 365 -in server.csr -CA ca-cert.der -CAkey ca-key.der -set_serial 01 -out server-cert.der
+```
+
+:memo: The CN (Common Name) x.509 attribute for the server Certificate ***must*** match the dns hostname referenced in ingress definition, see example below.
+
+- Generate the Client Key, and Certificate and Sign with the CA Certificate:
+
+```bash
+openssl req -new -newkey rsa:4096 -keyout client-key.der -out client.csr -nodes -subj '/CN=My Client'
+openssl x509 -req -sha256 -days 365 -in client.csr -CA ca-cert.der -CAkey ca-key.der -set_serial 02 -out client-cert.der
+```
+
+## 2. Import Certificates / Keys to Kubernetes Secret-Backend
+
+- Convert all files specified in 1) from .der (binary format) to .pem (base64 encoded):
```bash
openssl x509 -in certificate.der -inform der -out certificate.crt -outform pem
```
-Then, you can concatenate them all into one file, named 'ca.crt' with the following:
+:exclamation: Kubernetes Web-Services import relies on .pem Base64-encoded format.
+
+:zap: There is no need to import the CA Private Key, the Private Key is used only to sign new Client Certificates by the CA.
+
+- Import the CA Certificate as Kubernetes sub-type ```generic/ca.crt```
```bash
-cat certificate1.crt certificate2.crt certificate3.crt >> ca.crt
+kubectl create secret generic ca-secret --from-file=ca.crt=./ca-cert.pem
```
-**Note:** Make sure that the Key Size is greater than 1024 and Hashing Algorithm (Digest) is something better than md5
-for each certificate generated. Otherwise you will receive an error.
+- Import the Server Certificate and Key as Kubernetes sub-type ```tls``` for transport layer
-## Creating Certificate Secrets
+```bash
+kubectl create secret tls tls-secret --cert ./server-cert.pem --key ./server-key.pem
+```
-There are many different ways of configuring your secrets to enable Client-Certificate
-Authentication to work properly.
+- Optional import CA-cert, Server-cert and Server-Key for TLS and Client-Auth
-* You can create a secret containing just the CA certificate and another
- Secret containing the Server Certificate which is Signed by the CA.
+```bash
+kubectl create secret generic tls-and-auth --from-file=tls.crt=./server-crt.pem --from-file=tls.key=./server-key.pem --from-file=ca.crt=./ca-cert.pem
+```
- ```bash
- kubectl create secret generic ca-secret --from-file=ca.crt=ca.crt
- kubectl create secret generic tls-secret --from-file=tls.crt=server.crt --from-file=tls.key=server.key
- ```
+- Optional import a CRL (Certificate Revocation List)
-* You can create a secret containing CA certificate along with the Server
- Certificate that can be used for both TLS and Client Auth.
+```bash
+kubectl create secret generic ca-secret --from-file=ca.crt=./ca-cert.pem --from-file=ca.crl=./ca-crl.pem
+```
- ```bash
- kubectl create secret generic ca-secret --from-file=tls.crt=server.crt --from-file=tls.key=server.key --from-file=ca.crt=ca.crt
- ```
+## 3. Annotations / Ingress-Reference
-* If you want to also enable Certificate Revocation List verification you can
- create the secret also containing the CRL file in PEM format:
- ```bash
- kubectl create secret generic ca-secret --from-file=ca.crt=ca.crt --from-file=ca.crl=ca.crl
- ```
+Now we are able to reference the created secrets in the ingress definition.
-Note: The CA Certificate must contain the trusted certificate authority chain to verify client certificates.
+:memo: The CA Certificate "authentication" will be reference in annotations.
-## Setup Instructions
+| Annotation | Description | Remark |
+|---------------------------------------------------------------------------|----------------------------|--------------------|
+| nginx.ingress.kubernetes.io/auth-tls-verify-client: "on" | Activate Client-Auth | If "on", verify client Certificate |
+| nginx.ingress.kubernetes.io/auth-tls-secret: "namespace/ca-secret" | CA "secret" reference | Secret namespace and service / ingress namespace must match |
+| nginx.ingress.kubernetes.io/auth-tls-verify-depth: "1" | CA "chain" depth | How many CA levels should be processed |
+| nginx.ingress.kubernetes.io/auth-tls-pass-certificate-to-upstream: "true" | Pass Cert / Header | Pass Certificate to Web-App for e.g. parsing Client E-Mail Address x.509 Property |
+
+:memo: The Server Certificate for transport layer will be referenced in tls .yaml subsection.
+
+```yaml
+tls:
+ - hosts:
+ - mydomain.com
+ secretName: tls-secret
+```
+
+## 4. Example / Test
+
+The working .yaml Example: [ingress.yaml](ingress.yaml)
+
+- Test by performing a curl / wget against the Ingress Path without the Client Cert and expect a Status Code 400 (Bad Request - No required SSL certificate was sent).
+- Test by performing a curl / wget against the Ingress Path with the Client Cert and expect a Status Code 200.
+
+```bash
+wget \
+--ca-cert=ca-cert.pem \
+--certificate=client-cert.pem \
+--private-key=client-key.pem \
+https://mydomain.com
+```
+
+## 5. Remarks
+
+| :exclamation: In future releases, CN verification seems to be "replaced" by SAN (Subject Alternate Name) for verrification, so do not forget to add |
+|-----------------------------------------------------------------------------------------------------------------------------------------------------|
+
+```bash
+openssl req -addext "subjectAltName = DNS:mydomain.com" ...
+```
-1. Add the annotations as provided in the [ingress.yaml](ingress.yaml) example to your own ingress resources as required.
-2. Test by performing a curl against the Ingress Path without the Client Cert and expect a Status Code 400.
-3. Test by performing a curl against the Ingress Path with the Client Cert and expect a Status Code 200.
diff --git a/docs/examples/auth/oauth-external-auth/README.md b/docs/examples/auth/oauth-external-auth/README.md
index b64b0e70a..a08928720 100644
--- a/docs/examples/auth/oauth-external-auth/README.md
+++ b/docs/examples/auth/oauth-external-auth/README.md
@@ -51,72 +51,25 @@ into a Kubernetes cluster and use it to protect the Kubernetes Dashboard using G

-3. Configure values in the file [`oauth2-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml) with the values:
+3. Configure oauth2_proxy values in the file [`oauth2-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml) with the values:
- OAUTH2_PROXY_CLIENT_ID with the github ``
- OAUTH2_PROXY_CLIENT_SECRET with the github ``
- OAUTH2_PROXY_COOKIE_SECRET with value of `python -c 'import os,base64; print(base64.b64encode(os.urandom(16)).decode("ascii"))'`
- - (optional, but recommended) OAUTH2_PROXY_GITHUB_USERS with GitHub usernames to allow to login
- - `__INGRESS_HOST__` with a valid FQDN (e.g. `foo.bar.com`)
- - `__INGRESS_SECRET__` with a Secret with a valid SSL certificate
-4. Deploy the oauth2 proxy and the ingress rules by running:
+4. Customize the contents of the file [`dashboard-ingress.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/dashboard-ingress.yaml):
+
+ Replace `__INGRESS_HOST__` with a valid FQDN and `__INGRESS_SECRET__` with a Secret with a valid SSL certificate.
+
+5. Deploy the oauth2 proxy and the ingress rules running:
```console
- $ kubectl create -f oauth2-proxy.yaml
+ $ kubectl create -f oauth2-proxy.yaml,dashboard-ingress.yaml
```
-#### Test
+### Test
-Test the integration by accessing the configured URL, e.g. `https://foo.bar.com`
-
-
-
-
-
-
-
-
-### Example: Vouch Proxy + Kubernetes-Dashboard
-
-This example will show you how to deploy [`Vouch Proxy`](https://github.com/vouch/vouch-proxy)
-into a Kubernetes cluster and use it to protect the Kubernetes Dashboard using GitHub as the OAuth2 provider.
-
-#### Prepare
-
-1. Install the kubernetes dashboard
-
- ```console
- kubectl create -f https://raw.githubusercontent.com/kubernetes/kops/master/addons/kubernetes-dashboard/v1.10.1.yaml
- ```
-
-2. Create a [custom GitHub OAuth application](https://github.com/settings/applications/new)
-
- 
-
- - Homepage URL is the FQDN in the Ingress rule, like `https://foo.bar.com`
- - Authorization callback URL is the same as the base FQDN plus `/oauth2/auth`, like `https://foo.bar.com/oauth2/auth`
-
- 
-
-3. Configure Vouch Proxy values in the file [`vouch-proxy.yaml`](https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/auth/oauth-external-auth/vouch-proxy.yaml) with the values:
-
- - VOUCH_COOKIE_DOMAIN with value of ``
- - OAUTH_CLIENT_ID with the github ``
- - OAUTH_CLIENT_SECRET with the github ``
- - (optional, but recommended) VOUCH_WHITELIST with GitHub usernames to allow to login
- - `__INGRESS_HOST__` with a valid FQDN (e.g. `foo.bar.com`)
- - `__INGRESS_SECRET__` with a Secret with a valid SSL certificate
-
-4. Deploy Vouch Proxy and the ingress rules by running:
-
- ```console
- $ kubectl create -f vouch-proxy.yaml
- ```
-
-#### Test
-
-Test the integration by accessing the configured URL, e.g. `https://foo.bar.com`
+Test the oauth integration accessing the configured URL, e.g. `https://foo.bar.com`

diff --git a/docs/examples/auth/oauth-external-auth/dashboard-ingress.yaml b/docs/examples/auth/oauth-external-auth/dashboard-ingress.yaml
new file mode 100644
index 000000000..198a165f4
--- /dev/null
+++ b/docs/examples/auth/oauth-external-auth/dashboard-ingress.yaml
@@ -0,0 +1,45 @@
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/auth-url: "https://$host/oauth2/auth"
+ nginx.ingress.kubernetes.io/auth-signin: "https://$host/oauth2/start?rd=$escaped_request_uri"
+ name: external-auth-oauth2
+ namespace: kube-system
+spec:
+ ingressClassName: nginx
+ rules:
+ - host: __INGRESS_HOST__
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: kubernetes-dashboard
+ port:
+ number: 80
+---
+
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: oauth2-proxy
+ namespace: kube-system
+spec:
+ ingressClassName: nginx
+ rules:
+ - host: __INGRESS_HOST__
+ http:
+ paths:
+ - path: /oauth2
+ pathType: Prefix
+ backend:
+ service:
+ name: oauth2-proxy
+ port:
+ number: 4180
+ tls:
+ - hosts:
+ - __INGRESS_HOST__
+ secretName: __INGRESS_SECRET__
diff --git a/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml b/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml
index 3d6d41297..b383ab95e 100644
--- a/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml
+++ b/docs/examples/auth/oauth-external-auth/oauth2-proxy.yaml
@@ -31,9 +31,6 @@ spec:
# docker run -ti --rm python:3-alpine python -c 'import secrets,base64; print(base64.b64encode(base64.b64encode(secrets.token_bytes(16))));'
- name: OAUTH2_PROXY_COOKIE_SECRET
value: SECRET
- # Recommended: remove email-domain=* in args and set an allowlist
- # - name: OAUTH2_PROXY_GITHUB_USERS
- # value: alice,bob
image: quay.io/oauth2-proxy/oauth2-proxy:latest
imagePullPolicy: Always
name: oauth2-proxy
@@ -58,52 +55,3 @@ spec:
targetPort: 4180
selector:
k8s-app: oauth2-proxy
-
----
-
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: oauth2-proxy
- namespace: kube-system
-spec:
- ingressClassName: nginx
- rules:
- - host: __INGRESS_HOST__
- http:
- paths:
- - path: /oauth2
- pathType: Prefix
- backend:
- service:
- name: oauth2-proxy
- port:
- number: 4180
- tls:
- - hosts:
- - __INGRESS_HOST__
- secretName: __INGRESS_SECRET__
-
----
-
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/auth-url: "https://$host/oauth2/auth"
- nginx.ingress.kubernetes.io/auth-signin: "https://$host/oauth2/start?rd=$escaped_request_uri"
- name: external-auth-oauth2
- namespace: kube-system
-spec:
- ingressClassName: nginx
- rules:
- - host: __INGRESS_HOST__
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: kubernetes-dashboard
- port:
- number: 80
diff --git a/docs/examples/auth/oauth-external-auth/vouch-proxy.yaml b/docs/examples/auth/oauth-external-auth/vouch-proxy.yaml
deleted file mode 100644
index 05eae6d11..000000000
--- a/docs/examples/auth/oauth-external-auth/vouch-proxy.yaml
+++ /dev/null
@@ -1,110 +0,0 @@
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- labels:
- k8s-app: vouch-proxy
- name: vouch-proxy
- namespace: kube-system
-spec:
- replicas: 1
- selector:
- matchLabels:
- k8s-app: vouch-proxy
- template:
- metadata:
- labels:
- k8s-app: vouch-proxy
- spec:
- containers:
- - env:
- - name: VOUCH_ALLOWALLUSERS
- value: true
- # Recommended: remove VOUCH_ALLOWALLUSERS and set an allowlist
- # - name: VOUCH_WHITELIST
- # value: alice,bob
- - name: VOUCH_COOKIE_DOMAIN
- value:
- - name: VOUCH_LISTEN
- value: 0.0.0.0
- - name: VOUCH_DOCUMENT_ROOT
- value: oauth2
- # See https://github.com/vouch/vouch-proxy/tree/master/config for different provider examples
- - name: OAUTH_PROVIDER
- value: github
- - name: OAUTH_CLIENT_ID
- value:
- - name: OAUTH_CLIENT_SECRET
- value:
- image: quay.io/vouch/vouch-proxy:latest
- imagePullPolicy: Always
- name: vouch-proxy
- ports:
- - containerPort: 9090
- protocol: TCP
-
----
-
-apiVersion: v1
-kind: Service
-metadata:
- labels:
- k8s-app: vouch-proxy
- name: vouch-proxy
- namespace: kube-system
-spec:
- ports:
- - name: http
- port: 9090
- protocol: TCP
- targetPort: 9090
- selector:
- k8s-app: vouch-proxy
-
----
-
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: vouch-proxy
- namespace: kube-system
-spec:
- ingressClassName: nginx
- rules:
- - host: __INGRESS_HOST__
- http:
- paths:
- - path: /oauth2
- pathType: Prefix
- backend:
- service:
- name: vouch-proxy
- port:
- number: 9090
- tls:
- - hosts:
- - __INGRESS_HOST__
- secretName: __INGRESS_SECRET__
-
----
-
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/auth-url: "https://$host/oauth2/validate"
- nginx.ingress.kubernetes.io/auth-signin: "https://$host/oauth2/login?url=$scheme://$http_host$request_uri"
- name: external-auth-oauth2
- namespace: kube-system
-spec:
- ingressClassName: nginx
- rules:
- - host: __INGRESS_HOST__
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: kubernetes-dashboard
- port:
- number: 80
diff --git a/docs/examples/canary/README.md b/docs/examples/canary/README.md
index 885991a3b..4124faf6f 100644
--- a/docs/examples/canary/README.md
+++ b/docs/examples/canary/README.md
@@ -31,7 +31,7 @@ spec:
spec:
containers:
- name: production
- image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.1.1@sha256:a1e0152e2eeab26e3f6fd3986f3d82b17bc7711717cae5392dcd18dd447ba6ef
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
ports:
- containerPort: 80
env:
@@ -97,7 +97,7 @@ spec:
spec:
containers:
- name: canary
- image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.1.1@sha256:a1e0152e2eeab26e3f6fd3986f3d82b17bc7711717cae5392dcd18dd447ba6ef
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
ports:
- containerPort: 80
env:
diff --git a/docs/examples/customization/custom-errors/README.md b/docs/examples/customization/custom-errors/README.md
index 2d6e124bb..a7c9545b0 100644
--- a/docs/examples/customization/custom-errors/README.md
+++ b/docs/examples/customization/custom-errors/README.md
@@ -2,12 +2,11 @@
This example demonstrates how to use a custom backend to render custom error pages.
-If you are using the Helm Chart, look at [example values](https://github.com/kubernetes/ingress-nginx/blob/main/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml) and don't forget to add the [ConfigMap](https://github.com/kubernetes/ingress-nginx/blob/main/docs/examples/customization/custom-errors/custom-default-backend-error_pages.configMap.yaml) to your deployment. Otherwise, continue with [Customized default backend](#customized-default-backend) manual deployment.
+If you are using Helm Chart, look at [example values](https://github.com/kubernetes/ingress-nginx/blob/main/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml) and don't forget to add [configMap](https://github.com/kubernetes/ingress-nginx/blob/main/docs/examples/customization/custom-errors/custom-default-backend-error_pages.configMap.yaml) to your deployment, otherwise continue with [Customized default backend](#customized-default-backend) manual deployment.
## Customized default backend
-First, create the custom `default-backend`. It will be used by the Ingress controller later on.
-
+First, create the custom `default-backend`. It will be used by the Ingress controller later on.
To do that, you can take a look at the [example manifest](https://github.com/kubernetes/ingress-nginx/blob/main/docs/examples/customization/custom-errors/custom-default-backend.yaml)
in this project's GitHub repository.
@@ -39,11 +38,11 @@ If you do not already have an instance of the Ingress-Nginx Controller running,
2. Edit the `ingress-nginx-controller` ConfigMap and create the key `custom-http-errors` with a value of `404,503`.
3. Take note of the IP address assigned to the Ingress-Nginx Controller Service.
- ```
- $ kubectl get svc ingress-nginx
- NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
- ingress-nginx ClusterIP 10.0.0.13 80/TCP,443/TCP 10m
- ```
+ ```
+ $ kubectl get svc ingress-nginx
+ NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
+ ingress-nginx ClusterIP 10.0.0.13 80/TCP,443/TCP 10m
+ ```
!!! note
The `ingress-nginx` Service is of type `ClusterIP` in this example. This may vary depending on your environment.
@@ -86,16 +85,3 @@ Vary: Accept-Encoding
To go further with this example, feel free to deploy your own applications and Ingress objects, and validate that the
responses are still in the correct format when a backend returns 503 (eg. if you scale a Deployment down to 0 replica).
-
-## Maintenance page
-
-You can also leverage custom error pages to set a **"_Service under maintenance_" page** for the whole cluster, useful to prevent users from accessing your services while you are performing planned scheduled maintenance.
-
-When enabled, the maintenance page is served to the clients with an HTTP [**503 Service Unavailable**](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/503) response **status code**.
-
-To do that:
-
-- Enable a **custom error page for the 503 HTTP error**, by following the guide above
-- Set the value of the `--watch-namespace-selector` flag to the name of some non-existent namespace, e.g. `nonexistent-namespace`
- - This effectively prevents the NGINX Ingress Controller from reading `Ingress` resources from any namespace in the Kubernetes cluster
-- Set your `location-snippet` to `return 503;`, to make the NGINX Ingress Controller always return the 503 HTTP error page for all the requests
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
index d72001d58..865857dea 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.helm.values.yaml
@@ -5,8 +5,8 @@ defaultBackend:
enabled: true
image:
registry: registry.k8s.io
- image: ingress-nginx/custom-error-pages
- tag: v1.1.1@sha256:8c10776191ae44b5c387b8c7696d8bc17ceec90d7184a3a38b89ac8434b6c56b
+ image: ingress-nginx/nginx-errors
+ tag: "v20231208-4c39e6acc@sha256:c2ca20775f41c0c89906dc74a31239d94ac48e84e7c6164affed41fe669cdaa5"
extraVolumes:
- name: custom-error-pages
configMap:
diff --git a/docs/examples/customization/custom-errors/custom-default-backend.yaml b/docs/examples/customization/custom-errors/custom-default-backend.yaml
index 088ca1374..993f91f5b 100644
--- a/docs/examples/customization/custom-errors/custom-default-backend.yaml
+++ b/docs/examples/customization/custom-errors/custom-default-backend.yaml
@@ -36,7 +36,7 @@ spec:
spec:
containers:
- name: nginx-error-server
- image: registry.k8s.io/ingress-nginx/custom-error-pages:v1.1.1@sha256:8c10776191ae44b5c387b8c7696d8bc17ceec90d7184a3a38b89ac8434b6c56b
+ image: registry.k8s.io/ingress-nginx/nginx-errors:v20231208-4c39e6acc@sha256:c2ca20775f41c0c89906dc74a31239d94ac48e84e7c6164affed41fe669cdaa5
ports:
- containerPort: 8080
# Setting the environment variable DEBUG we can see the headers sent
diff --git a/docs/examples/customization/external-auth-headers/echo-service.yaml b/docs/examples/customization/external-auth-headers/echo-service.yaml
index 10244458d..fc4461cd8 100644
--- a/docs/examples/customization/external-auth-headers/echo-service.yaml
+++ b/docs/examples/customization/external-auth-headers/echo-service.yaml
@@ -18,7 +18,7 @@ spec:
terminationGracePeriodSeconds: 60
containers:
- name: echo-service
- image: registry.k8s.io/ingress-nginx/e2e-test-echo:v1.1.1@sha256:a1e0152e2eeab26e3f6fd3986f3d82b17bc7711717cae5392dcd18dd447ba6ef
+ image: registry.k8s.io/ingress-nginx/e2e-test-echo:v20230527@sha256:6fc5aa2994c86575975bb20a5203651207029a0d28e3f491d8a127d08baadab4
ports:
- containerPort: 8080
resources:
diff --git a/docs/examples/customization/sysctl/patch.json b/docs/examples/customization/sysctl/patch.json
index 69482c7be..e87c9affa 100644
--- a/docs/examples/customization/sysctl/patch.json
+++ b/docs/examples/customization/sysctl/patch.json
@@ -4,7 +4,7 @@
"spec": {
"initContainers": [{
"name": "sysctl",
- "image": "alpine:3.21",
+ "image": "alpine:3.18",
"securityContext": {
"privileged": true
},
diff --git a/docs/examples/grpc/README.md b/docs/examples/grpc/README.md
index 23126c345..f6bd96e20 100644
--- a/docs/examples/grpc/README.md
+++ b/docs/examples/grpc/README.md
@@ -9,6 +9,7 @@ This example demonstrates how to route traffic to a gRPC service through the Ing
3. You have the ingress-nginx-controller installed as per docs.
4. You have a backend application running a gRPC server listening for TCP traffic. If you want, you can use as an example.
5. You're also responsible for provisioning an SSL certificate for the ingress. So you need to have a valid SSL certificate, deployed as a Kubernetes secret of type `tls`, in the same namespace as the gRPC application.
+ - Note: To use gRPC with ingress-nginx, TLS _must_ be terminated by the ingress or gRPC server (using the `backend-protocol: "GRPCS"` annotation described below).
### Step 1: Create a Kubernetes `Deployment` for gRPC app
@@ -166,9 +167,11 @@ This example demonstrates how to route traffic to a gRPC service through the Ing
### Notes on using response/request streams
-> `grpc_read_timeout` and `grpc_send_timeout` will be set as `proxy_read_timeout` and `proxy_send_timeout` when you set backend protocol to `GRPC` or `GRPCS`.
-
1. If your server only does response streaming and you expect a stream to be open longer than 60 seconds, you will have to change the `grpc_read_timeout` to accommodate this.
2. If your service only does request streaming and you expect a stream to be open longer than 60 seconds, you have to change the
`grpc_send_timeout` and the `client_body_timeout`.
3. If you do both response and request streaming with an open stream longer than 60 seconds, you have to change all three timeouts: `grpc_read_timeout`, `grpc_send_timeout` and `client_body_timeout`.
+
+Values for the timeouts must be specified as e.g. `"1200s"`.
+
+> On the most recent versions of ingress-nginx, changing these timeouts requires using the `nginx.ingress.kubernetes.io/server-snippet` annotation. There are plans for future releases to allow using the Kubernetes annotations to define each timeout separately.
diff --git a/docs/examples/index.md b/docs/examples/index.md
index 4efdae39f..59745e014 100644
--- a/docs/examples/index.md
+++ b/docs/examples/index.md
@@ -23,7 +23,7 @@ Customization | [External authentication with response header propagation](custo
Customization | [Sysctl tuning](customization/sysctl/README.md) | TODO | TODO
Features | [Rewrite](rewrite/README.md) | TODO | TODO
Features | [Session stickiness](affinity/cookie/README.md) | route requests consistently to the same endpoint | Advanced
-Features | [Canary Deployments](canary/README.md) | weighted canary routing to a separate deployment | Intermediate
+Features | [Canary Deployments](canary/README.md) | weighted canary routing to a seperate deployment | Intermediate
Scaling | [Static IP](static-ip/README.md) | a single ingress gets a single static IP | Intermediate
TLS | [Multi TLS certificate termination](multi-tls/README.md) | TODO | TODO
TLS | [TLS termination](tls-termination/README.md) | TODO | TODO
diff --git a/docs/examples/openpolicyagent/README.md b/docs/examples/openpolicyagent/README.md
index 8d6337a38..2d653a90c 100644
--- a/docs/examples/openpolicyagent/README.md
+++ b/docs/examples/openpolicyagent/README.md
@@ -1,25 +1,25 @@
# OpenPolicyAgent and pathType enforcing
-Ingress API allows users to specify different [pathType](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
-on Ingress object.
+Ingress API allows users to specify different [pathType](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
+on Ingress object.
While pathType `Exact` and `Prefix` should allow only a small set of characters, pathType `ImplementationSpecific`
-allows any characters, as it may contain regexes, variables and other features that may be specific of the Ingress
+allows any characters, as it may contain regexes, variables and other features that may be specific of the Ingress
Controller being used.
-This means that the Ingress Admins (the persona who deployed the Ingress Controller) should trust the users
-allowed to use `pathType: ImplementationSpecific`, as this may allow arbitrary configuration, and this
+This means that the Ingress Admins (the persona who deployed the Ingress Controller) should trust the users
+allowed to use `pathType: ImplementationSpecific`, as this may allow arbitrary configuration, and this
configuration may end on the proxy (aka Nginx) configuration.
## Example
-The example in this repo uses [Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/) to block the usage of `pathType: ImplementationSpecific`,
+The example in this repo uses [Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/) to block the usage of `pathType: ImplementationSpecific`,
allowing just a specific list of namespaces to use it.
It is recommended that the admin modifies this rules to enforce a specific set of characters when the usage of ImplementationSpecific
is allowed, or in ways that best suits their needs.
-First, the `ConstraintTemplate` from [template.yaml](template.yaml) will define a rule that validates if the Ingress object
-is being created on an exempted namespace, and case not, will validate its pathType.
+First, the `ConstraintTemplate` from [template.yaml](template.yaml) will define a rule that validates if the Ingress object
+is being created on an excempted namespace, and case not, will validate its pathType.
-Then, the rule `K8sBlockIngressPathType` contained in [rule.yaml](rule.yaml) will define the parameters: what kind of
-object should be verified (Ingress), what are the exempted namespaces, and what kinds of pathType are blocked.
+Then, the rule `K8sBlockIngressPathType` contained in [rule.yaml](rule.yaml) will define the parameters: what kind of
+object should be verified (Ingress), what are the excempted namespaces, and what kinds of pathType are blocked.
diff --git a/docs/examples/openpolicyagent/template.yaml b/docs/examples/openpolicyagent/template.yaml
index 4302415a2..ed2a6ba1c 100644
--- a/docs/examples/openpolicyagent/template.yaml
+++ b/docs/examples/openpolicyagent/template.yaml
@@ -17,11 +17,11 @@ spec:
properties:
blockedTypes:
type: array
- items:
- type: string
+ items:
+ type: string
namespacesExceptions:
type: array
- items:
+ items:
type: string
targets:
- target: admission.k8s.gatekeeper.sh
@@ -31,8 +31,8 @@ spec:
violation[{"msg": msg}] {
input.review.kind.kind == "Ingress"
ns := input.review.object.metadata.namespace
- exemptNS := [good | exempts = input.parameters.namespacesExceptions[_] ; good = exempts == ns]
- not any(exemptNS)
+ excemptNS := [good | excempts = input.parameters.namespacesExceptions[_] ; good = excempts == ns]
+ not any(excemptNS)
pathType := object.get(input.review.object.spec.rules[_].http.paths[_], "pathType", "")
blockedPath := [blocked | blockedTypes = input.parameters.blockedTypes[_] ; blocked = blockedTypes == pathType]
any(blockedPath)
diff --git a/docs/examples/psp/README.md b/docs/examples/psp/README.md
new file mode 100644
index 000000000..f8426baf2
--- /dev/null
+++ b/docs/examples/psp/README.md
@@ -0,0 +1,17 @@
+# Pod Security Policy (PSP)
+
+In most clusters today, by default, all resources (e.g. `Deployments` and `ReplicatSets`)
+have permissions to create pods.
+Kubernetes however provides a more fine-grained authorization policy called
+[Pod Security Policy (PSP)](https://kubernetes.io/docs/concepts/policy/pod-security-policy/).
+
+PSP allows the cluster owner to define the permission of each object, for example creating a pod.
+If you have PSP enabled on the cluster, and you deploy ingress-nginx,
+you will need to provide the `Deployment` with the permissions to create pods.
+
+Before applying any objects, first apply the PSP permissions by running:
+```console
+kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/docs/examples/psp/psp.yaml
+```
+
+Note: PSP permissions must be granted before the creation of the `Deployment` and the `ReplicaSet`.
diff --git a/docs/examples/psp/psp.yaml b/docs/examples/psp/psp.yaml
new file mode 100644
index 000000000..0f859dece
--- /dev/null
+++ b/docs/examples/psp/psp.yaml
@@ -0,0 +1,75 @@
+apiVersion: v1
+kind: Namespace
+metadata:
+ name: ingress-nginx
+
+---
+
+apiVersion: policy/v1beta1
+kind: PodSecurityPolicy
+metadata:
+ name: ingress-nginx
+ namespace: ingress-nginx
+spec:
+ allowedCapabilities:
+ - NET_BIND_SERVICE
+ privileged: false
+ allowPrivilegeEscalation: true
+ # Allow core volume types.
+ volumes:
+ - configMap
+ - secret
+ hostIPC: false
+ hostPID: false
+ runAsUser:
+ # Require the container to run without root privileges.
+ rule: MustRunAsNonRoot
+ supplementalGroups:
+ rule: MustRunAs
+ ranges:
+ # Forbid adding the root group.
+ - min: 1
+ max: 65535
+ fsGroup:
+ rule: MustRunAs
+ ranges:
+ # Forbid adding the root group.
+ - min: 1
+ max: 65535
+ readOnlyRootFilesystem: false
+ seLinux:
+ rule: RunAsAny
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: Role
+metadata:
+ name: ingress-nginx-psp
+ namespace: ingress-nginx
+rules:
+- apiGroups: [policy]
+ resources: [podsecuritypolicies]
+ verbs: [use]
+ resourceNames: [ingress-nginx]
+
+---
+
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+ name: ingress-nginx-psp
+ namespace: ingress-nginx
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: Role
+ name: ingress-nginx-psp
+subjects:
+- kind: ServiceAccount
+ name: default
+- kind: ServiceAccount
+ name: ingress-nginx
+ namespace: ingress-nginx
+- kind: ServiceAccount
+ name: ingress-nginx-admission
+ namespace: ingress-nginx
diff --git a/docs/faq.md b/docs/faq.md
index ea1e4d308..253378c65 100644
--- a/docs/faq.md
+++ b/docs/faq.md
@@ -1,200 +1,33 @@
# FAQ
-## Multi-tenant Kubernetes
-
-Do not use in multi-tenant Kubernetes production installations. This project assumes that users that can create Ingress objects are administrators of the cluster.
-
-For example, the Ingress NGINX control plane has global and per Ingress configuration options that make it insecure, if enabled, in a multi-tenant environment.
-
-For example, enabling snippets, a global configuration, allows any Ingress object to run arbitrary Lua code that could affect the security of all Ingress objects that a controller is running.
-
-We changed the default to allow snippets to `false` in https://github.com/kubernetes/ingress-nginx/pull/10393.
-
-## Multiple controller in one cluster
-
-Question - How can I easily install multiple instances of the ingress-nginx controller in the same cluster?
-
-You can install them in different namespaces.
-
-- Create a new namespace
-
- ```
- kubectl create namespace ingress-nginx-2
- ```
-
-- Use Helm to install the additional instance of the ingress controller
-- Ensure you have Helm working (refer to the [Helm documentation](https://helm.sh/docs/))
-- We have to assume that you have the helm repo for the ingress-nginx controller already added to your Helm config.
- But, if you have not added the helm repo then you can do this to add the repo to your helm config;
-
- ```
- helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
- ```
-
-- Make sure you have updated the helm repo data;
-
- ```
- helm repo update
- ```
-
-- Now, install an additional instance of the ingress-nginx controller like this:
-
- ```
- helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
- --namespace ingress-nginx-2 \
- --set controller.ingressClassResource.name=nginx-two \
- --set controller.ingressClass=nginx-two \
- --set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
- --set controller.ingressClassResource.enabled=true \
- --set controller.ingressClassByName=true
- ```
-
-If you need to install yet another instance, then repeat the procedure to create a new namespace,
-change the values such as names & namespaces (for example from "-2" to "-3"), or anything else that meets your needs.
-
-Note that `controller.ingressClassResource.name` and `controller.ingressClass` have to be set correctly.
-The first is to create the IngressClass object and the other is to modify the deployment of the actual ingress controller pod.
-
-### I can't use multiple namespaces, what should I do?
-
-If you need to install all instances in the same namespace, then you need to specify a different **election id**, like this:
-
-```
-helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
---namespace kube-system \
---set controller.electionID=nginx-two-leader \
---set controller.ingressClassResource.name=nginx-two \
---set controller.ingressClass=nginx-two \
---set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
---set controller.ingressClassResource.enabled=true \
---set controller.ingressClassByName=true
-```
-
## Retaining Client IPAddress
-Question - How to obtain the real-client-ipaddress ?
-
-The goto solution for retaining the real-client IPaddress is to enable PROXY protocol.
-
-Enabling PROXY protocol has to be done on both, the Ingress NGINX controller, as well as the L4 load balancer, in front of the controller.
-
-The real-client IP address is lost by default, when traffic is forwarded over the network. But enabling PROXY protocol ensures that the connection details are retained and hence the real-client IP address doesn't get lost.
-
-Enabling proxy-protocol on the controller is documented [here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#use-proxy-protocol) .
-
-For enabling proxy-protocol on the LoadBalancer, please refer to the documentation of your infrastructure provider because that is where the LB is provisioned.
-
-Some more info available [here](https://kubernetes.github.io/ingress-nginx/user-guide/miscellaneous/#source-ip-address)
-
-Some more info on proxy-protocol is [here](https://kubernetes.github.io/ingress-nginx/user-guide/miscellaneous/#proxy-protocol)
-
-### client-ipaddress on single-node cluster
-
-Single node clusters are created for dev & test uses with tools like "kind" or "minikube". A trick to simulate a real use network with these clusters (kind or minikube) is to install Metallb and configure the ipaddress of the kind container or the minikube vm/container, as the starting and ending of the pool for Metallb in L2 mode. Then the host ip becomes a real client ipaddress, for curl requests sent from the host.
-
-After installing ingress-nginx controller on a kind or a minikube cluster with helm, you can configure it for real-client-ip with a simple change to the service that ingress-nginx controller creates. The service object of --type LoadBalancer has a field service.spec.externalTrafficPolicy. If you set the value of this field to "Local" then the real-ipaddress of a client is visible to the controller.
-
-```
-% kubectl explain service.spec.externalTrafficPolicy
-KIND: Service
-VERSION: v1
-
-FIELD: externalTrafficPolicy
-
-DESCRIPTION:
- externalTrafficPolicy describes how nodes distribute service traffic they
- receive on one of the Service's "externally-facing" addresses (NodePorts,
- ExternalIPs, and LoadBalancer IPs). If set to "Local", the proxy will
- configure the service in a way that assumes that external load balancers
- will take care of balancing the service traffic between nodes, and so each
- node will deliver traffic only to the node-local endpoints of the service,
- without masquerading the client source IP. (Traffic mistakenly sent to a
- node with no endpoints will be dropped.) The default value, "Cluster", uses
- the standard behavior of routing to all endpoints evenly (possibly modified
- by topology and other features). Note that traffic sent to an External IP or
- LoadBalancer IP from within the cluster will always get "Cluster" semantics,
- but clients sending to a NodePort from within the cluster may need to take
- traffic policy into account when picking a node.
-
- Possible enum values:
- - `"Cluster"` routes traffic to all endpoints.
- - `"Local"` preserves the source IP of the traffic by routing only to
- endpoints on the same node as the traffic was received on (dropping the
- traffic if there are no local endpoints).
-```
-
-### client-ipaddress L7
-
-The solution is to get the real client IPaddress from the ["X-Forward-For" HTTP header](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For)
-
-Example : If your application pod behind Ingress NGINX controller, uses the NGINX webserver and the reverseproxy inside it, then you can do the following to preserve the remote client IP.
-
-- First you need to make sure that the X-Forwarded-For header reaches the backend pod. This is done by using a Ingress NGINX conftroller ConfigMap key. Its documented [here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#use-forwarded-headers)
-
-- Next, edit `nginx.conf` file inside your app pod, to contain the directives shown below:
-
-```
-set_real_ip_from 0.0.0.0/0; # Trust all IPs (use your VPC CIDR block in production)
-real_ip_header X-Forwarded-For;
-real_ip_recursive on;
-
-log_format main '$remote_addr - $remote_user [$time_local] "$request" '
- '$status $body_bytes_sent "$http_referer" '
- '"$http_user_agent" '
- 'host=$host x-forwarded-for=$http_x_forwarded_for';
-
-access_log /var/log/nginx/access.log main;
-
-```
+Please read [Retain Client IPAddress Guide here](./user-guide/retaining-client-ipaddress.md).
## Kubernetes v1.22 Migration
-If you are using Ingress objects in your cluster (running Kubernetes older than
-version 1.22), and you plan to upgrade your Kubernetes version to K8S 1.22 or
-above, then please read [the migration guide here](./user-guide/k8s-122-migration.md).
+If you are using Ingress objects in your cluster (running Kubernetes older than v1.22), and you plan to upgrade your Kubernetes version to K8S 1.22 or above, then please read [the migration guide here](./user-guide/k8s-122-migration.md).
-## Validation Of **`path`**
+## Validation Of __`path`__
-- For improving security and also following desired standards on Kubernetes API
-spec, the next release, scheduled for v1.8.0, will include a new & optional
-feature of validating the value for the key `ingress.spec.rules.http.paths.path`.
+- For improving security and also following desired standards on Kubernetes API spec, the next release, scheduled for v1.8.0, will include a new & optional feature of validating the value for the key `ingress.spec.rules.http.paths.path` .
-- This behavior will be disabled by default on the 1.8.0 release and enabled by
-default on the next breaking change release, set for 2.0.0.
+- This behavior will be disabled by default on the 1.8.0 release and enabled by default on the next breaking change release, set for 2.0.0.
-- When "`ingress.spec.rules.http.pathType=Exact`" or "`pathType=Prefix`", this
-validation will limit the characters accepted on the field "`ingress.spec.rules.http.paths.path`",
-to "`alphanumeric characters`", and "`/`", "`_`", "`-`". Also, in this case,
-the path should start with "`/`".
+- When "`ingress.spec.rules.http.pathType=Exact`" or "`pathType=Prefix`", this validation will limit the characters accepted on the field "`ingress.spec.rules.http.paths.path`", to "`alphanumeric characters`", and `"/," "_," "-."` Also, in this case, the path should start with `"/."`
-- When the ingress resource path contains other characters (like on rewrite
-configurations), the pathType value should be "`ImplementationSpecific`".
+- When the ingress resource path contains other characters (like on rewrite configurations), the pathType value should be "`ImplementationSpecific`".
- API Spec on pathType is documented [here](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
-- When this option is enabled, the validation will happen on the Admission
-Webhook. So if any new ingress object contains characters other than
-alphanumeric characters, and, "`/`", "`_`", "`-`", in the `path` field, but
-is not using `pathType` value as `ImplementationSpecific`, then the ingress
-object will be denied admission.
+- When this option is enabled, the validation will happen on the Admission Webhook. So if any new ingress object contains characters other than "`alphanumeric characters`", and `"/," "_," "-."` , in the `path` field, but is not using `pathType` value as `ImplementationSpecific`, then the ingress object will be denied admission.
-- The cluster admin should establish validation rules using mechanisms like
-"`Open Policy Agent`", to validate that only authorized users can use
-ImplementationSpecific pathType and that only the authorized characters can be
-used. [The configmap value is here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#strict-validate-path-type)
+- The cluster admin should establish validation rules using mechanisms like "`Open Policy Agent`", to validate that only authorized users can use ImplementationSpecific pathType and that only the authorized characters can be used. [The configmap value is here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#strict-validate-path-type)
- A complete example of an Openpolicyagent gatekeeper rule is available [here](https://kubernetes.github.io/ingress-nginx/examples/openpolicyagent/)
-- If you have any issues or concerns, please do one of the following:
- - Open a GitHub issue
+- If you have any issues or concerns, please do one of the following:
+ - Open a GitHub issue
- Comment in our Dev Slack Channel
- - Open a thread in our Google Group
-
-## Why is chunking not working since controller v1.10 ?
-
-- If your code is setting the HTTP header `"Transfer-Encoding: chunked"` and
-the controller log messages show an error about duplicate header, it is
-because of this change
-
-- More details are available in this issue
+ - Open a thread in our Google Group ingress-nginx-dev@kubernetes.io
diff --git a/docs/how-it-works.md b/docs/how-it-works.md
index 161803210..4542921c7 100644
--- a/docs/how-it-works.md
+++ b/docs/how-it-works.md
@@ -58,13 +58,13 @@ In a relatively big cluster with frequently deploying apps this feature saves si
### Avoiding outage from wrong configuration
-Because the ingress controller works using the [synchronization loop pattern](https://coreos.com/kubernetes/docs/latest/replication-controller.html#the-reconciliation-loop-in-detail), it is applying the configuration for all matching objects. In case some Ingress objects have a broken configuration, for example a syntax error in the `nginx.ingress.kubernetes.io/configuration-snippet` annotation, the generated configuration becomes invalid, does not reload and hence no more ingresses will be taken into account.
+Because the ingress controller works using the [synchronization loop pattern][1], it is applying the configuration for all matching objects. In case some Ingress objects have a broken configuration, for example a syntax error in the `nginx.ingress.kubernetes.io/configuration-snippet` annotation, the generated configuration becomes invalid, does not reload and hence no more ingresses will be taken into account.
To prevent this situation to happen, the Ingress-Nginx Controller optionally exposes a [validating admission webhook server][8] to ensure the validity of incoming ingress objects.
This webhook appends the incoming ingress objects to the list of ingresses, generates the configuration and calls nginx to ensure the configuration has no syntax errors.
[0]: https://github.com/openresty/lua-nginx-module/pull/1259
-[1]: https://coreos.com/kubernetes/docs/latest/replication-controller.html#the-reconciliation-loop-in-detail
+[1]: https://github.com/coreos/docs/blob/master/kubernetes/replication-controller.md#the-reconciliation-loop-in-detail
[2]: https://godoc.org/k8s.io/client-go/informers#NewFilteredSharedInformerFactory
[3]: https://godoc.org/k8s.io/client-go/tools/cache#ResourceEventHandlerFuncs
[4]: https://github.com/kubernetes/ingress-nginx/blob/main/internal/task/queue.go#L38
diff --git a/docs/troubleshooting.md b/docs/troubleshooting.md
index ffd8f839f..0d2004092 100644
--- a/docs/troubleshooting.md
+++ b/docs/troubleshooting.md
@@ -419,6 +419,7 @@ spec:
operator: "Exists"
effect: NoSchedule
```
+
* update the namespace if applicable/desired
* replace `##_NODE_NAME_##` with the problematic node (or remove nodeSelector section if problem is not confined to one node)
* replace `##_CONTROLLER_IMAGE_##` with the same image as in use by your ingress-nginx deployment
@@ -443,8 +444,9 @@ $ capsh --decode=0000000000000400
```
## Create a test pod as root
-(Note, this may be restricted by PodSecurityAdmission/Standards, OPA Gatekeeper, etc. in which case you will need to do the appropriate workaround for testing, e.g. deploy in a new namespace without the restrictions.)
+(Note, this may be restricted by PodSecurityPolicy, PodSecurityAdmission/Standards, OPA Gatekeeper, etc. in which case you will need to do the appropriate workaround for testing, e.g. deploy in a new namespace without the restrictions.)
To test further you may want to install additional utilities, etc. Modify the pod yaml by:
+
* changing runAsUser from 101 to 0
* removing the "drop..ALL" section from the capabilities.
diff --git a/docs/user-guide/cli-arguments.md b/docs/user-guide/cli-arguments.md
index a33e75159..07a17a271 100644
--- a/docs/user-guide/cli-arguments.md
+++ b/docs/user-guide/cli-arguments.md
@@ -8,7 +8,6 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
|----------|-------------|
| `--annotations-prefix` | Prefix of the Ingress annotations specific to the NGINX controller. (default "nginx.ingress.kubernetes.io") |
| `--apiserver-host` | Address of the Kubernetes API server. Takes the form "protocol://address:port". If not specified, it is assumed the program runs inside a Kubernetes cluster and local discovery is attempted. |
-| `--bucket-factor` | Bucket factor for native histograms. Value must be > 1 for enabling native histograms. (default 0) |
| `--certificate-authority` | Path to a cert file for the certificate authority. This certificate is used only when the flag --apiserver-host is specified. |
| `--configmap` | Name of the ConfigMap containing custom global configurations for the controller. |
| `--controller-class` | Ingress Class Controller value this Ingress satisfies. The class of an Ingress object is set using the field IngressClassName in Kubernetes clusters version v1.19.0 or higher. The .spec.controller value of the IngressClass referenced in an Ingress Object should be the same value specified here to make this object be watched. |
@@ -16,18 +15,16 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--default-backend-service` | Service used to serve HTTP requests not matching any known server name (catch-all). Takes the form "namespace/name". The controller configures NGINX to forward requests to the first port of this Service. |
| `--default-server-port` | Port to use for exposing the default server (catch-all). (default 8181) |
| `--default-ssl-certificate` | Secret containing a SSL certificate to be used by the default HTTPS server (catch-all). Takes the form "namespace/name". |
-| `--enable-annotation-validation` | If true, will enable the annotation validation feature. Defaults to true |
+| `--enable-annotation-validation` | If true, will enable the annotation validation feature. This value will be defaulted to true on a future release. |
| `--disable-catch-all` | Disable support for catch-all Ingresses. (default false) |
| `--disable-full-test` | Disable full test of all merged ingresses at the admission stage and tests the template of the ingress being created or updated (full test of all ingresses is enabled by default). |
| `--disable-svc-external-name` | Disable support for Services of type ExternalName. (default false) |
| `--disable-sync-events` | Disables the creation of 'Sync' Event resources, but still logs them |
| `--dynamic-configuration-retries` | Number of times to retry failed dynamic configuration before failing to sync an ingress. (default 15) |
| `--election-id` | Election id to use for Ingress status updates. (default "ingress-controller-leader") |
-| `--election-ttl` | Duration a leader election is valid before it's getting re-elected, e.g. `15s`, `10m` or `1h`. (Default: 30s) |
-| `--enable-metrics` | Enables the collection of NGINX metrics. (Default: false) |
+| `--enable-metrics` | Enables the collection of NGINX metrics. (default true) |
| `--enable-ssl-chain-completion` | Autocomplete SSL certificate chains with missing intermediate CA certificates. Certificates uploaded to Kubernetes must have the "Authority Information Access" X.509 v3 extension for this to succeed. (default false)|
| `--enable-ssl-passthrough` | Enable SSL Passthrough. (default false) |
-| `--disable-leader-election` | Disable Leader Election on Nginx Controller. (default false) |
| `--enable-topology-aware-routing` | Enable topology aware routing feature, needs service object annotation service.kubernetes.io/topology-mode sets to auto. (default false) |
| `--exclude-socket-metrics` | Set of socket request metrics to exclude which won't be exported nor being calculated. The possible socket request metrics to exclude are documented in the monitoring guide e.g. 'nginx_ingress_controller_request_duration_seconds,nginx_ingress_controller_response_size'|
| `--health-check-path` | URL path of the health check endpoint. Configured inside the NGINX status server. All requests received on the port defined by the healthz-port parameter are forwarded internally to this path. (default "/healthz") |
@@ -41,14 +38,12 @@ They are set in the container spec of the `ingress-nginx-controller` Deployment
| `--internal-logger-address` | Address to be used when binding internal syslogger. (default 127.0.0.1:11514) |
| `--kubeconfig` | Path to a kubeconfig file containing authorization and API server information. |
| `--length-buckets` | Set of buckets which will be used for prometheus histogram metrics such as RequestLength, ResponseLength. (default `[10, 20, 30, 40, 50, 60, 70, 80, 90, 100]`) |
-| `--max-buckets` | Maximum number of buckets for native histograms. (default 100) |
| `--maxmind-edition-ids` | Maxmind edition ids to download GeoLite2 Databases. (default "GeoLite2-City,GeoLite2-ASN") |
| `--maxmind-retries-timeout` | Maxmind downloading delay between 1st and 2nd attempt, 0s - do not retry to download if something went wrong. (default 0s) |
| `--maxmind-retries-count` | Number of attempts to download the GeoIP DB. (default 1) |
-| `--maxmind-license-key` | Maxmind license key to download GeoLite2 Databases. https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ . |
+| `--maxmind-license-key` | Maxmind license key to download GeoLite2 Databases. https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases . |
| `--maxmind-mirror` | Maxmind mirror url (example: http://geoip.local/databases. |
| `--metrics-per-host` | Export metrics per-host. (default true) |
-| `--metrics-per-undefined-host` | Export metrics per-host even if the host is not defined in an ingress. Requires --metrics-per-host to be set to true. (default false) |
| `--monitor-max-batch-size` | Max batch size of NGINX metrics. (default 10000)|
| `--post-shutdown-grace-period` | Additional delay in seconds before controller container exits. (default 10) |
| `--profiler-port` | Port to use for expose the ingress controller Go profiler when it is enabled. (default 10245) |
diff --git a/docs/user-guide/exposing-tcp-udp-services.md b/docs/user-guide/exposing-tcp-udp-services.md
index 9c14a7c39..dbc143ff1 100644
--- a/docs/user-guide/exposing-tcp-udp-services.md
+++ b/docs/user-guide/exposing-tcp-udp-services.md
@@ -3,7 +3,7 @@
While the Kubernetes Ingress resource only officially supports routing external HTTP(s) traffic to services, ingress-nginx can be configured to receive external TCP/UDP traffic from non-HTTP protocols and route them to internal services using TCP/UDP port mappings that are specified within a ConfigMap.
To support this, the `--tcp-services-configmap` and `--udp-services-configmap` flags can be used to point to an existing config map where the key is the external port to use and the value indicates the service to expose using the format:
-`:::[PROXY]:[PROXY]`
+`::[PROXY]:[PROXY]`
It is also possible to use a number or the name of the port. The two last fields are optional.
Adding `PROXY` in either or both of the two last fields we can use [Proxy Protocol](https://www.nginx.com/resources/admin-guide/proxy-protocol) decoding (listen) and/or encoding (proxy_pass) in a TCP service.
diff --git a/docs/user-guide/fcgi-services.md b/docs/user-guide/fcgi-services.md
index 9c222d9ad..db4d9428b 100644
--- a/docs/user-guide/fcgi-services.md
+++ b/docs/user-guide/fcgi-services.md
@@ -1,3 +1,5 @@
+
+
# Exposing FastCGI Servers
> **FastCGI** is a [binary protocol](https://en.wikipedia.org/wiki/Binary_protocol "Binary protocol") for interfacing interactive programs with a [web server](https://en.wikipedia.org/wiki/Web_server "Web server"). [...] (It's) aim is to reduce the overhead related to interfacing between web server and CGI programs, allowing a server to handle more web page requests per unit of time.
@@ -6,60 +8,27 @@
The _ingress-nginx_ ingress controller can be used to directly expose [FastCGI](https://en.wikipedia.org/wiki/FastCGI) servers. Enabling FastCGI in your Ingress only requires setting the _backend-protocol_ annotation to `FCGI`, and with a couple more annotations you can customize the way _ingress-nginx_ handles the communication with your FastCGI _server_.
-For most practical use-cases, php applications are a good example. PHP is not HTML so a FastCGI server like php-fpm processes a index.php script for the response to a request. See a working example below.
-This [post in a FactCGI feature issue](https://github.com/kubernetes/ingress-nginx/issues/8207#issuecomment-2161405468) describes a test for the FastCGI feature. The same test is described below here.
+## Example Objects to Expose a FastCGI Pod
-## Example Objects to expose a FastCGI server pod
-
-### The FasctCGI server pod
-
-The _Pod_ object example below exposes port `9000`, which is the conventional FastCGI port.
+The _Pod_ example object below exposes port `9000`, which is the conventional FastCGI port.
```yaml
apiVersion: v1
kind: Pod
metadata:
name: example-app
- labels:
- app: example-app
+labels:
+ app: example-app
spec:
containers:
- name: example-app
- image: php:fpm-alpine
+ image: example-app:1.0
ports:
- containerPort: 9000
name: fastcgi
```
-- For this example to work, a HTML response should be received from the FastCGI server being exposed
-- A HTTP request to the FastCGI server pod should be sent
-- The response should be generated by a php script as that is what we are demonstrating here
-
-The image we are using here `php:fpm-alpine` does not ship with a ready to use php script inside it. So we need to provide the image with a simple php-script for this example to work.
-
-- Use `kubectl exec` to get into the example-app pod
-- You will land at the path `/var/www/html`
-- Create a simple php script there at the path /var/www/html called index.php
-- Make the index.php file look like this
-
-```
-
-
-
- PHP Test
-
-
- FastCGI Test Worked!
'; ?>
-
-
-```
-
-- Save and exit from the shell in the pod
-- If you delete the pod, then you will have to recreate the file as this method is not persistent
-
-### The FastCGI service
-
The _Service_ object example below matches port `9000` from the _Pod_ object above.
```yaml
@@ -76,41 +45,21 @@ spec:
name: fastcgi
```
-### The configMap object and the ingress object
-
-The _Ingress_ and _ConfigMap_ objects below demonstrate the supported _FastCGI_ specific annotations.
-
-!!! Important
- NGINX actually has 50 [FastCGI directives](https://nginx.org/en/docs/http/ngx_http_fastcgi_module.html#directives)
- All of the nginx directives have not been exposed in the ingress yet
-
-### The ConfigMap object
-
-This configMap object is required to set the parameters of [FastCGI directives](https://nginx.org/en/docs/http/ngx_http_fastcgi_module.html#directives)
-
-!!! Attention
- - The _ConfigMap_ **must** be created before creating the ingress object
-
-- The _Ingress Controller_ needs to find the configMap when the _Ingress_ object with the FastCGI annotations is created
-- So create the configMap before the ingress
-- If the configMap is created after the ingress is created, then you will need to restart the _Ingress Controller_ pods.
+And the _Ingress_ and _ConfigMap_ objects below demonstrates the supported _FastCGI_ specific annotations (NGINX actually has 50 FastCGI directives, all of which have not been exposed in the ingress yet), and matches the service `example-service`, and the port named `fastcgi` from above. The _ConfigMap_ **must** be created first for the _Ingress Controller_ to be able to find it when the _Ingress_ object is created, otherwise you will need to restart the _Ingress Controller_ pods.
```yaml
+# The ConfigMap MUST be created first for the ingress controller to be able to
+# find it when the Ingress object is created.
+
apiVersion: v1
kind: ConfigMap
metadata:
name: example-cm
data:
- SCRIPT_FILENAME: "/var/www/html/index.php"
+ SCRIPT_FILENAME: "/example/index.php"
-```
+---
-### The ingress object
-
-- Do not create the ingress shown below until you have created the configMap seen above.
-- You can see that this ingress matches the service `example-service`, and the port named `fastcgi` from above.
-
-```
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
@@ -134,44 +83,6 @@ spec:
name: fastcgi
```
-## Send a request to the exposed FastCGI server
-
-You will have to look at the external-ip of the ingress or you have to send the HTTP request to the ClusterIP address of the ingress-nginx controller pod.
-
-```
-% curl 172.19.0.2 -H "Host: app.example.com" -vik
-* Trying 172.19.0.2:80...
-* Connected to 172.19.0.2 (172.19.0.2) port 80
-> GET / HTTP/1.1
-> Host: app.example.com
-> User-Agent: curl/8.6.0
-> Accept: */*
->
-< HTTP/1.1 200 OK
-HTTP/1.1 200 OK
-< Date: Wed, 12 Jun 2024 07:11:59 GMT
-Date: Wed, 12 Jun 2024 07:11:59 GMT
-< Content-Type: text/html; charset=UTF-8
-Content-Type: text/html; charset=UTF-8
-< Transfer-Encoding: chunked
-Transfer-Encoding: chunked
-< Connection: keep-alive
-Connection: keep-alive
-< X-Powered-By: PHP/8.3.8
-X-Powered-By: PHP/8.3.8
-
-<
-
-
-
- PHP Test
-
-
- FastCGI Test Worked
-
-
-```
-
## FastCGI Ingress Annotations
To enable FastCGI, the `nginx.ingress.kubernetes.io/backend-protocol` annotation needs to be set to `FCGI`, which overrides the default `HTTP` value.
@@ -203,7 +114,6 @@ data:
SCRIPT_FILENAME: "/example/index.php"
HTTP_PROXY: ""
```
-
Using the _namespace/_ prefix is also supported, for example:
> `nginx.ingress.kubernetes.io/fastcgi-params-configmap: "example-namespace/example-configmap"`
diff --git a/docs/user-guide/ingress-path-matching.md b/docs/user-guide/ingress-path-matching.md
index 43d049043..dd618e08b 100644
--- a/docs/user-guide/ingress-path-matching.md
+++ b/docs/user-guide/ingress-path-matching.md
@@ -3,7 +3,7 @@
## Regular Expression Support
!!! important
- Regular expressions is not supported in the `spec.rules.host` field. The wildcard character '\*' must appear by itself as the first DNS label and matches only a single label. You cannot have a wildcard label by itself (e.g. Host == "\*").
+ Regular expressions and wild cards are not supported in the `spec.rules.host` field. Full hostnames must be used.
!!! note
Please see the [FAQ](../faq.md#validation-of-path) for Validation Of __`path`__
diff --git a/docs/user-guide/k8s-122-migration.md b/docs/user-guide/k8s-122-migration.md
index 0880f020e..9a1ca081d 100644
--- a/docs/user-guide/k8s-122-migration.md
+++ b/docs/user-guide/k8s-122-migration.md
@@ -192,3 +192,54 @@ Bear in mind that if you start Ingress-Nginx B with the command line argument `-
It is highly likely that you will also see the name of the ingress resource in the same error message.
This error message has been observed on use the deprecated annotation (`kubernetes.io/ingress.class`) in an Ingress resource manifest.
It is recommended to use the `.spec.ingressClassName` field of the Ingress resource, to specify the name of the IngressClass of the Ingress you are defining.
+
+## How can I easily install multiple instances of the ingress-nginx controller in the same cluster?
+
+You can install them in different namespaces.
+
+- Create a new namespace
+ ```
+ kubectl create namespace ingress-nginx-2
+ ```
+- Use Helm to install the additional instance of the ingress controller
+- Ensure you have Helm working (refer to the [Helm documentation](https://helm.sh/docs/))
+- We have to assume that you have the helm repo for the ingress-nginx controller already added to your Helm config.
+ But, if you have not added the helm repo then you can do this to add the repo to your helm config;
+ ```
+ helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
+ ```
+- Make sure you have updated the helm repo data;
+ ```
+ helm repo update
+ ```
+- Now, install an additional instance of the ingress-nginx controller like this:
+ ```
+ helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
+ --namespace ingress-nginx-2 \
+ --set controller.ingressClassResource.name=nginx-two \
+ --set controller.ingressClass=nginx-two \
+ --set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
+ --set controller.ingressClassResource.enabled=true \
+ --set controller.ingressClassByName=true
+ ```
+
+If you need to install yet another instance, then repeat the procedure to create a new namespace,
+change the values such as names & namespaces (for example from "-2" to "-3"), or anything else that meets your needs.
+
+Note that `controller.ingressClassResource.name` and `controller.ingressClass` have to be set correctly.
+The first is to create the IngressClass object and the other is to modify the deployment of the actual ingress controller pod.
+
+### I can't use multiple namespaces, what should I do?
+
+If you need to install all instances in the same namespace, then you need to specify a different **election id**, like this:
+
+```
+helm install ingress-nginx-2 ingress-nginx/ingress-nginx \
+--namespace kube-system \
+--set controller.electionID=nginx-two-leader \
+--set controller.ingressClassResource.name=nginx-two \
+--set controller.ingressClass=nginx-two \
+--set controller.ingressClassResource.controllerValue="example.com/ingress-nginx-2" \
+--set controller.ingressClassResource.enabled=true \
+--set controller.ingressClassByName=true
+```
diff --git a/docs/user-guide/miscellaneous.md b/docs/user-guide/miscellaneous.md
index ee3d63056..e7d1ac59c 100644
--- a/docs/user-guide/miscellaneous.md
+++ b/docs/user-guide/miscellaneous.md
@@ -4,11 +4,9 @@
By default NGINX uses the content of the header `X-Forwarded-For` as the source of truth to get information about the client IP address. This works without issues in L7 **if we configure the setting `proxy-real-ip-cidr`** with the correct information of the IP/network address of trusted external load balancer.
-This setting can be enabled/disabled by setting [`use-forwarded-headers`](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#use-forwarded-headers).
-
If the ingress controller is running in AWS we need to use the VPC IPv4 CIDR.
-Another option is to enable the **PROXY protocol** using [`use-proxy-protocol: "true"`](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#use-proxy-protocol).
+Another option is to enable proxy protocol using `use-proxy-protocol: "true"`.
In this mode NGINX does not use the content of the header to get the source IP address of the connection.
@@ -19,7 +17,7 @@ By default NGINX path type is Prefix to not break existing definitions
## Proxy Protocol
-If you are using a L4 proxy to forward the traffic to the Ingress NGINX pods and terminate HTTP/HTTPS there, you will lose the remote endpoint's IP address. To prevent this you could use the [PROXY Protocol](http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt) for forwarding traffic, this will send the connection details before forwarding the actual TCP connection itself.
+If you are using a L4 proxy to forward the traffic to the NGINX pods and terminate HTTP/HTTPS there, you will lose the remote endpoint's IP address. To prevent this you could use the [Proxy Protocol](http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt) for forwarding traffic, this will send the connection details before forwarding the actual TCP connection itself.
Amongst others [ELBs in AWS](http://docs.aws.amazon.com/ElasticLoadBalancing/latest/DeveloperGuide/enable-proxy-protocol.html) and [HAProxy](http://www.haproxy.org/) support Proxy Protocol.
diff --git a/docs/user-guide/monitoring.md b/docs/user-guide/monitoring.md
index 4ad2795cf..28608e850 100644
--- a/docs/user-guide/monitoring.md
+++ b/docs/user-guide/monitoring.md
@@ -166,9 +166,7 @@ According to the above example, this URL will be http://10.192.0.3:31086
#### Wildcard ingresses
- - By default request metrics are labeled with the hostname. When you have a wildcard domain ingress, then there will be no metrics for that ingress (to prevent the metrics from exploding in cardinality). To get metrics in this case you have two options:
- - Run the ingress controller with `--metrics-per-host=false`. You will lose labeling by hostname, but still have labeling by ingress.
- - Run the ingress controller with `--metrics-per-undefined-host=true --metrics-per-host=true`. You will get labeling by hostname even if the hostname is not explicitly defined on an ingress. Be warned that cardinality could explode due to many hostnames and CPU usage could also increase.
+ - By default request metrics are labeled with the hostname. When you have a wildcard domain ingress, then there will be no metrics for that ingress (to prevent the metrics from exploding in cardinality). To get metrics in this case you need to run the ingress controller with `--metrics-per-host=false` (you will lose labeling by hostname, but still have labeling by ingress).
### Grafana dashboard using ingress resource
- If you want to expose the dashboard for grafana using an ingress resource, then you can :
@@ -388,6 +386,10 @@ Prometheus metrics are exposed on port 10254.
The number of bytes sent to a client. **Deprecated**, use `nginx_ingress_controller_response_size`\
nginx var: `bytes_sent`
+* `nginx_ingress_controller_ingress_upstream_latency_seconds` Summary\
+ Upstream service latency per Ingress. **Deprecated**, use `nginx_ingress_controller_connect_duration_seconds`\
+ nginx var: `upstream_connect_time`
+
```
# HELP nginx_ingress_controller_bytes_sent The number of bytes sent to a client. DEPRECATED! Use nginx_ingress_controller_response_size
# TYPE nginx_ingress_controller_bytes_sent histogram
@@ -395,6 +397,8 @@ Prometheus metrics are exposed on port 10254.
# TYPE nginx_ingress_controller_connect_duration_seconds nginx_ingress_controller_connect_duration_seconds
* HELP nginx_ingress_controller_header_duration_seconds The time spent on receiving first header from the upstream server
# TYPE nginx_ingress_controller_header_duration_seconds histogram
+# HELP nginx_ingress_controller_ingress_upstream_latency_seconds Upstream service latency per Ingress DEPRECATED! Use nginx_ingress_controller_connect_duration_seconds
+# TYPE nginx_ingress_controller_ingress_upstream_latency_seconds summary
# HELP nginx_ingress_controller_request_duration_seconds The request processing time in milliseconds
# TYPE nginx_ingress_controller_request_duration_seconds histogram
# HELP nginx_ingress_controller_request_size The request length (including request line, header, and request body)
diff --git a/docs/user-guide/multiple-ingress.md b/docs/user-guide/multiple-ingress.md
index 2c7c8e712..fca93ee65 100644
--- a/docs/user-guide/multiple-ingress.md
+++ b/docs/user-guide/multiple-ingress.md
@@ -57,7 +57,6 @@ or if installing with Helm:
```yaml
controller:
electionID: ingress-controller-leader
- ingressClass: internal-nginx # default: nginx
ingressClassResource:
name: internal-nginx # default: nginx
enabled: true
diff --git a/docs/user-guide/nginx-configuration/annotations-risk.md b/docs/user-guide/nginx-configuration/annotations-risk.md
deleted file mode 100755
index aff9357b8..000000000
--- a/docs/user-guide/nginx-configuration/annotations-risk.md
+++ /dev/null
@@ -1,141 +0,0 @@
-# Annotations Scope and Risk
-
-|Group |Annotation | Risk | Scope |
-|--------|------------------|------|-------|
-| Aliases | server-alias | High | ingress |
-| Allowlist | allowlist-source-range | Medium | location |
-| BackendProtocol | backend-protocol | Low | location |
-| BasicDigestAuth | auth-realm | Medium | location |
-| BasicDigestAuth | auth-secret | Medium | location |
-| BasicDigestAuth | auth-secret-type | Low | location |
-| BasicDigestAuth | auth-type | Low | location |
-| Canary | canary | Low | ingress |
-| Canary | canary-by-cookie | Medium | ingress |
-| Canary | canary-by-header | Medium | ingress |
-| Canary | canary-by-header-pattern | Medium | ingress |
-| Canary | canary-by-header-value | Medium | ingress |
-| Canary | canary-weight | Low | ingress |
-| Canary | canary-weight-total | Low | ingress |
-| CertificateAuth | auth-tls-error-page | High | location |
-| CertificateAuth | auth-tls-match-cn | High | location |
-| CertificateAuth | auth-tls-pass-certificate-to-upstream | Low | location |
-| CertificateAuth | auth-tls-secret | Medium | location |
-| CertificateAuth | auth-tls-verify-client | Medium | location |
-| CertificateAuth | auth-tls-verify-depth | Low | location |
-| ClientBodyBufferSize | client-body-buffer-size | Low | location |
-| ConfigurationSnippet | configuration-snippet | Critical | location |
-| Connection | connection-proxy-header | Low | location |
-| CorsConfig | cors-allow-credentials | Low | ingress |
-| CorsConfig | cors-allow-headers | Medium | ingress |
-| CorsConfig | cors-allow-methods | Medium | ingress |
-| CorsConfig | cors-allow-origin | Medium | ingress |
-| CorsConfig | cors-expose-headers | Medium | ingress |
-| CorsConfig | cors-max-age | Low | ingress |
-| CorsConfig | enable-cors | Low | ingress |
-| CustomHTTPErrors | custom-http-errors | Low | location |
-| CustomHeaders | custom-headers | Medium | location |
-| DefaultBackend | default-backend | Low | location |
-| Denylist | denylist-source-range | Medium | location |
-| DisableProxyInterceptErrors | disable-proxy-intercept-errors | Low | location |
-| EnableGlobalAuth | enable-global-auth | Low | location |
-| ExternalAuth | auth-always-set-cookie | Low | location |
-| ExternalAuth | auth-cache-duration | Medium | location |
-| ExternalAuth | auth-cache-key | Medium | location |
-| ExternalAuth | auth-keepalive | Low | location |
-| ExternalAuth | auth-keepalive-requests | Low | location |
-| ExternalAuth | auth-keepalive-share-vars | Low | location |
-| ExternalAuth | auth-keepalive-timeout | Low | location |
-| ExternalAuth | auth-method | Low | location |
-| ExternalAuth | auth-proxy-set-headers | Medium | location |
-| ExternalAuth | auth-request-redirect | Medium | location |
-| ExternalAuth | auth-response-headers | Medium | location |
-| ExternalAuth | auth-signin | High | location |
-| ExternalAuth | auth-signin-redirect-param | Medium | location |
-| ExternalAuth | auth-snippet | Critical | location |
-| ExternalAuth | auth-url | High | location |
-| FastCGI | fastcgi-index | Medium | location |
-| FastCGI | fastcgi-params-configmap | Medium | location |
-| HTTP2PushPreload | http2-push-preload | Low | location |
-| LoadBalancing | load-balance | Low | location |
-| Logs | enable-access-log | Low | location |
-| Logs | enable-rewrite-log | Low | location |
-| Mirror | mirror-host | High | ingress |
-| Mirror | mirror-request-body | Low | ingress |
-| Mirror | mirror-target | High | ingress |
-| ModSecurity | enable-modsecurity | Low | ingress |
-| ModSecurity | enable-owasp-core-rules | Low | ingress |
-| ModSecurity | modsecurity-snippet | Critical | ingress |
-| ModSecurity | modsecurity-transaction-id | High | ingress |
-| Opentelemetry | enable-opentelemetry | Low | location |
-| Opentelemetry | opentelemetry-operation-name | Medium | location |
-| Opentelemetry | opentelemetry-trust-incoming-span | Low | location |
-| Proxy | proxy-body-size | Medium | location |
-| Proxy | proxy-buffer-size | Low | location |
-| Proxy | proxy-buffering | Low | location |
-| Proxy | proxy-buffers-number | Low | location |
-| Proxy | proxy-busy-buffers-size | Low | location |
-| Proxy | proxy-connect-timeout | Low | location |
-| Proxy | proxy-cookie-domain | Medium | location |
-| Proxy | proxy-cookie-path | Medium | location |
-| Proxy | proxy-http-version | Low | location |
-| Proxy | proxy-max-temp-file-size | Low | location |
-| Proxy | proxy-next-upstream | Medium | location |
-| Proxy | proxy-next-upstream-timeout | Low | location |
-| Proxy | proxy-next-upstream-tries | Low | location |
-| Proxy | proxy-read-timeout | Low | location |
-| Proxy | proxy-redirect-from | Medium | location |
-| Proxy | proxy-redirect-to | Medium | location |
-| Proxy | proxy-request-buffering | Low | location |
-| Proxy | proxy-send-timeout | Low | location |
-| ProxySSL | proxy-ssl-ciphers | Medium | ingress |
-| ProxySSL | proxy-ssl-name | High | ingress |
-| ProxySSL | proxy-ssl-protocols | Low | ingress |
-| ProxySSL | proxy-ssl-secret | Medium | ingress |
-| ProxySSL | proxy-ssl-server-name | Low | ingress |
-| ProxySSL | proxy-ssl-verify | Low | ingress |
-| ProxySSL | proxy-ssl-verify-depth | Low | ingress |
-| RateLimit | limit-allowlist | Low | location |
-| RateLimit | limit-burst-multiplier | Low | location |
-| RateLimit | limit-connections | Low | location |
-| RateLimit | limit-rate | Low | location |
-| RateLimit | limit-rate-after | Low | location |
-| RateLimit | limit-rpm | Low | location |
-| RateLimit | limit-rps | Low | location |
-| Redirect | from-to-www-redirect | Low | location |
-| Redirect | permanent-redirect | Medium | location |
-| Redirect | permanent-redirect-code | Low | location |
-| Redirect | relative-redirects | Low | location |
-| Redirect | temporal-redirect | Medium | location |
-| Redirect | temporal-redirect-code | Low | location |
-| Rewrite | app-root | Medium | location |
-| Rewrite | force-ssl-redirect | Medium | location |
-| Rewrite | preserve-trailing-slash | Medium | location |
-| Rewrite | rewrite-target | Medium | ingress |
-| Rewrite | ssl-redirect | Low | location |
-| Rewrite | use-regex | Low | location |
-| SSLCipher | ssl-ciphers | Low | ingress |
-| SSLCipher | ssl-prefer-server-ciphers | Low | ingress |
-| SSLPassthrough | ssl-passthrough | Low | ingress |
-| Satisfy | satisfy | Low | location |
-| ServerSnippet | server-snippet | Critical | ingress |
-| ServiceUpstream | service-upstream | Low | ingress |
-| SessionAffinity | affinity | Low | ingress |
-| SessionAffinity | affinity-canary-behavior | Low | ingress |
-| SessionAffinity | affinity-mode | Medium | ingress |
-| SessionAffinity | session-cookie-change-on-failure | Low | ingress |
-| SessionAffinity | session-cookie-conditional-samesite-none | Low | ingress |
-| SessionAffinity | session-cookie-domain | Medium | ingress |
-| SessionAffinity | session-cookie-expires | Medium | ingress |
-| SessionAffinity | session-cookie-max-age | Medium | ingress |
-| SessionAffinity | session-cookie-name | Medium | ingress |
-| SessionAffinity | session-cookie-path | Medium | ingress |
-| SessionAffinity | session-cookie-samesite | Low | ingress |
-| SessionAffinity | session-cookie-secure | Low | ingress |
-| StreamSnippet | stream-snippet | Critical | ingress |
-| UpstreamHashBy | upstream-hash-by | High | location |
-| UpstreamHashBy | upstream-hash-by-subset | Low | location |
-| UpstreamHashBy | upstream-hash-by-subset-size | Low | location |
-| UpstreamVhost | upstream-vhost | Low | location |
-| UsePortInRedirects | use-port-in-redirects | Low | location |
-| XForwardedPrefix | x-forwarded-prefix | Medium | location |
-
diff --git a/docs/user-guide/nginx-configuration/annotations.md b/docs/user-guide/nginx-configuration/annotations.md
index b0ea3cce3..41a876abf 100755
--- a/docs/user-guide/nginx-configuration/annotations.md
+++ b/docs/user-guide/nginx-configuration/annotations.md
@@ -39,7 +39,7 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/auth-proxy-set-headers](#external-authentication)|string|
|[nginx.ingress.kubernetes.io/auth-snippet](#external-authentication)|string|
|[nginx.ingress.kubernetes.io/enable-global-auth](#external-authentication)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/backend-protocol](#backend-protocol)|string|
+|[nginx.ingress.kubernetes.io/backend-protocol](#backend-protocol)|string|HTTP,HTTPS,GRPC,GRPCS|
|[nginx.ingress.kubernetes.io/canary](#canary)|"true" or "false"|
|[nginx.ingress.kubernetes.io/canary-by-header](#canary)|string|
|[nginx.ingress.kubernetes.io/canary-by-header-value](#canary)|string|
@@ -50,7 +50,7 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/client-body-buffer-size](#client-body-buffer-size)|string|
|[nginx.ingress.kubernetes.io/configuration-snippet](#configuration-snippet)|string|
|[nginx.ingress.kubernetes.io/custom-http-errors](#custom-http-errors)|[]int|
-|[nginx.ingress.kubernetes.io/custom-headers](#custom-headers)|string|
+|[nginx.ingress.kubernetes.io/disable-proxy-intercept-errors](#disable-proxy-intercept-errors)|"true" or "false"|
|[nginx.ingress.kubernetes.io/default-backend](#default-backend)|string|
|[nginx.ingress.kubernetes.io/enable-cors](#enable-cors)|"true" or "false"|
|[nginx.ingress.kubernetes.io/cors-allow-origin](#enable-cors)|string|
@@ -64,10 +64,13 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/http2-push-preload](#http2-push-preload)|"true" or "false"|
|[nginx.ingress.kubernetes.io/limit-connections](#rate-limiting)|number|
|[nginx.ingress.kubernetes.io/limit-rps](#rate-limiting)|number|
+|[nginx.ingress.kubernetes.io/global-rate-limit](#global-rate-limiting)|number|
+|[nginx.ingress.kubernetes.io/global-rate-limit-window](#global-rate-limiting)|duration|
+|[nginx.ingress.kubernetes.io/global-rate-limit-key](#global-rate-limiting)|string|
+|[nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs](#global-rate-limiting)|string|
|[nginx.ingress.kubernetes.io/permanent-redirect](#permanent-redirect)|string|
|[nginx.ingress.kubernetes.io/permanent-redirect-code](#permanent-redirect-code)|number|
|[nginx.ingress.kubernetes.io/temporal-redirect](#temporal-redirect)|string|
-|[nginx.ingress.kubernetes.io/temporal-redirect-code](#temporal-redirect-code)|number|
|[nginx.ingress.kubernetes.io/preserve-trailing-slash](#server-side-https-enforcement-through-redirect)|"true" or "false"|
|[nginx.ingress.kubernetes.io/proxy-body-size](#custom-max-body-size)|string|
|[nginx.ingress.kubernetes.io/proxy-cookie-domain](#proxy-cookie-domain)|string|
@@ -95,15 +98,12 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/server-alias](#server-alias)|string|
|[nginx.ingress.kubernetes.io/server-snippet](#server-snippet)|string|
|[nginx.ingress.kubernetes.io/service-upstream](#service-upstream)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/session-cookie-change-on-failure](#cookie-affinity)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/session-cookie-conditional-samesite-none](#cookie-affinity)|"true" or "false"|
-|[nginx.ingress.kubernetes.io/session-cookie-domain](#cookie-affinity)|string|
-|[nginx.ingress.kubernetes.io/session-cookie-expires](#cookie-affinity)|string|
-|[nginx.ingress.kubernetes.io/session-cookie-max-age](#cookie-affinity)|string|
-|[nginx.ingress.kubernetes.io/session-cookie-name](#cookie-affinity)|string|default "INGRESSCOOKIE"|
+|[nginx.ingress.kubernetes.io/session-cookie-name](#cookie-affinity)|string|
|[nginx.ingress.kubernetes.io/session-cookie-path](#cookie-affinity)|string|
-|[nginx.ingress.kubernetes.io/session-cookie-samesite](#cookie-affinity)|string|"None", "Lax" or "Strict"|
-|[nginx.ingress.kubernetes.io/session-cookie-secure](#cookie-affinity)|string|
+|[nginx.ingress.kubernetes.io/session-cookie-domain](#cookie-affinity)|string|
+|[nginx.ingress.kubernetes.io/session-cookie-change-on-failure](#cookie-affinity)|"true" or "false"|
+|[nginx.ingress.kubernetes.io/session-cookie-samesite](#cookie-affinity)|string|
+|[nginx.ingress.kubernetes.io/session-cookie-conditional-samesite-none](#cookie-affinity)|"true" or "false"|
|[nginx.ingress.kubernetes.io/ssl-redirect](#server-side-https-enforcement-through-redirect)|"true" or "false"|
|[nginx.ingress.kubernetes.io/ssl-passthrough](#ssl-passthrough)|"true" or "false"|
|[nginx.ingress.kubernetes.io/stream-snippet](#stream-snippet)|string|
@@ -116,12 +116,13 @@ You can add these Kubernetes annotations to specific Ingress objects to customiz
|[nginx.ingress.kubernetes.io/proxy-buffering](#proxy-buffering)|string|
|[nginx.ingress.kubernetes.io/proxy-buffers-number](#proxy-buffers-number)|number|
|[nginx.ingress.kubernetes.io/proxy-buffer-size](#proxy-buffer-size)|string|
-|[nginx.ingress.kubernetes.io/proxy-busy-buffers-size](#proxy-busy-buffers-size)|string|
|[nginx.ingress.kubernetes.io/proxy-max-temp-file-size](#proxy-max-temp-file-size)|string|
|[nginx.ingress.kubernetes.io/ssl-ciphers](#ssl-ciphers)|string|
|[nginx.ingress.kubernetes.io/ssl-prefer-server-ciphers](#ssl-ciphers)|"true" or "false"|
|[nginx.ingress.kubernetes.io/connection-proxy-header](#connection-proxy-header)|string|
|[nginx.ingress.kubernetes.io/enable-access-log](#enable-access-log)|"true" or "false"|
+|[nginx.ingress.kubernetes.io/enable-opentracing](#enable-opentracing)|"true" or "false"|
+|[nginx.ingress.kubernetes.io/opentracing-trust-incoming-span](#opentracing-trust-incoming-span)|"true" or "false"|
|[nginx.ingress.kubernetes.io/enable-opentelemetry](#enable-opentelemetry)|"true" or "false"|
|[nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span](#opentelemetry-trust-incoming-spans)|"true" or "false"|
|[nginx.ingress.kubernetes.io/use-regex](#use-regex)|bool|
@@ -193,12 +194,6 @@ Use `nginx.ingress.kubernetes.io/session-cookie-domain` to set the `Domain` attr
Use `nginx.ingress.kubernetes.io/session-cookie-samesite` to apply a `SameSite` attribute to the sticky cookie. Browser accepted values are `None`, `Lax`, and `Strict`. Some browsers reject cookies with `SameSite=None`, including those created before the `SameSite=None` specification (e.g. Chrome 5X). Other browsers mistakenly treat `SameSite=None` cookies as `SameSite=Strict` (e.g. Safari running on OSX 14). To omit `SameSite=None` from browsers with these incompatibilities, add the annotation `nginx.ingress.kubernetes.io/session-cookie-conditional-samesite-none: "true"`.
-Use `nginx.ingress.kubernetes.io/session-cookie-expires` to control the cookie expires, its value is a number of seconds until the cookie expires.
-
-Use `nginx.ingress.kubernetes.io/session-cookie-path` to control the cookie path when use-regex is set to true.
-
-Use `nginx.ingress.kubernetes.io/session-cookie-change-on-failure` to control the cookie change after request failure.
-
### Authentication
It is possible to add authentication by adding additional annotations in the Ingress rule. The source of the authentication is a secret that contains usernames and passwords.
@@ -322,7 +317,8 @@ nginx.ingress.kubernetes.io/configuration-snippet: |
more_set_headers "Request-Id: $req_id";
```
-Be aware this can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. The recommended mitigation for this threat is to disable this feature, so it may not work for you. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
+!!! attention
+Since version 1.9.0, `"configuration-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
### Custom HTTP Errors
@@ -335,29 +331,17 @@ Example usage:
nginx.ingress.kubernetes.io/custom-http-errors: "404,415"
```
-### Custom Headers
-This annotation is of the form `nginx.ingress.kubernetes.io/custom-headers: /` to specify a namespace and configmap name that contains custom headers. This annotation uses `more_set_headers` nginx directive.
+## Disable Proxy intercept Errors
-Example annotation for following example configmap:
+Like the [`disable-proxy-intercept-errors`](./configmap.md#disable-proxy-intercept-errors) value in the ConfigMap, this annotation allows to disable NGINX `proxy-intercept-errors` when `custom-http-errors` are set, but only for the NGINX location associated with this ingress. If a [default backend annotation](#default-backend) is specified on the ingress, the errors will be routed to that annotation's default backend service (instead of the global default backend).
+Different ingresses can specify different sets of errors codes and there are UseCases where NGINX shall not intercept all errors returned from upstream.
+If `disable-proxy-intercept-errors` is also specified globally, the annotation will override the global value for the given ingress' hostname and path.
-```yaml
-nginx.ingress.kubernetes.io/custom-headers: default/custom-headers-configmap
+Example usage:
```
-
-Example configmap:
-```yaml
-apiVersion: v1
-data:
- Content-Type: application/json
-kind: ConfigMap
-metadata:
- name: custom-headers-configmap
- namespace: default
+nginx.ingress.kubernetes.io/disable-proxy-intercept-errors: "false"
```
-!!! attention
- First define the allowed response headers in [global-allowed-response-headers](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/configmap.md#global-allowed-response-headers).
-
### Default Backend
This annotation is of the form `nginx.ingress.kubernetes.io/default-backend: ` to specify a custom default backend. This `` is a reference to a service inside of the same namespace in which you are applying this annotation. This annotation overrides the global default backend. In case the service has [multiple ports](https://kubernetes.io/docs/concepts/services-networking/service/#multi-port-services), the first one is the one which will receive the backend traffic.
@@ -395,13 +379,13 @@ CORS can be controlled with the following annotations:
* `nginx.ingress.kubernetes.io/cors-allow-origin`: Controls what's the accepted Origin for CORS.
- This is a multi-valued field, separated by ','. It must follow this format: `protocol://origin-site.com` or `protocol://origin-site.com:port`
+ This is a multi-valued field, separated by ','. It must follow this format: `http(s)://origin-site.com` or `http(s)://origin-site.com:port`
- Default: `*`
- - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://origin-site.com:4443, http://origin-site.com, myprotocol://example.org:1199"`
+ - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://origin-site.com:4443, http://origin-site.com, https://example.org:1199"`
- It also supports single level wildcard subdomains and follows this format: `protocol://*.foo.bar`, `protocol://*.bar.foo:8080` or `protocol://*.abc.bar.foo:9000`
- - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://*.origin-site.com:4443, http://*.origin-site.com, myprotocol://example.org:1199"`
+ It also supports single level wildcard subdomains and follows this format: `http(s)://*.foo.bar`, `http(s)://*.bar.foo:8080` or `http(s)://*.abc.bar.foo:9000`
+ - Example: `nginx.ingress.kubernetes.io/cors-allow-origin: "https://*.origin-site.com:4443, http://*.origin-site.com, https://example.org:1199"`
* `nginx.ingress.kubernetes.io/cors-allow-credentials`: Controls if credentials can be passed during CORS operations.
@@ -457,6 +441,9 @@ metadata:
}
```
+!!! attention
+Since version 1.9.0, `"server-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
+
!!! attention
This annotation can be used only once per host.
@@ -534,12 +521,15 @@ nginx.ingress.kubernetes.io/auth-snippet: |
```
> Note: `nginx.ingress.kubernetes.io/auth-snippet` is an optional annotation. However, it may only be used in conjunction with `nginx.ingress.kubernetes.io/auth-url` and will be ignored if `nginx.ingress.kubernetes.io/auth-url` is not set
+!!! attention
+Since version 1.9.0, `"auth-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
+
!!! example
Please check the [external-auth](../../examples/auth/external-auth/README.md) example.
#### Global External Authentication
-By default the controller redirects all requests to an existing service that provides authentication if `global-auth-url` is set in the NGINX ConfigMap. If you want to disable this behavior for that ingress, you can use `enable-global-auth: "false"` in the NGINX ConfigMap.
+By default the controller redirects all requests to an existing service that provides authentication if `global-auth-url` is set in the NGINX ConfigMap. If you want to disable this behavior for a specific ingress, you can use the annotation `nginx.ingress.kubernetes.io/enable-global-auth: "false"`.
`nginx.ingress.kubernetes.io/enable-global-auth`:
indicates if GlobalExternalAuth configuration should be applied or not to this Ingress rule. Default values is set to `"true"`.
@@ -550,15 +540,10 @@ By default the controller redirects all requests to an existing service that pro
These annotations define limits on connections and transmission rates. These can be used to mitigate [DDoS Attacks](https://www.nginx.com/blog/mitigating-ddos-attacks-with-nginx-and-nginx-plus).
-!!! attention
- Rate limits are applied per Ingress NGINX controller replica.
- If you're running multiple replicas or using a horizontal pod autoscaler (HPA), the effective rate limit will be multiplied by the number of replicas.
- When using HPA, the exact rate limit becomes dynamic as the number of replicas may change based on load.
-
-* `nginx.ingress.kubernetes.io/limit-connections`: number of concurrent connections allowed from a single IP address per controller replica. A 503 error is returned when exceeding this limit.
-* `nginx.ingress.kubernetes.io/limit-rps`: number of requests accepted from a given IP each second per controller replica. The burst limit is set to this limit multiplied by the burst multiplier, the default multiplier is 5. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
-* `nginx.ingress.kubernetes.io/limit-rpm`: number of requests accepted from a given IP each minute per controller replica. The burst limit is set to this limit multiplied by the burst multiplier, the default multiplier is 5. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
-* `nginx.ingress.kubernetes.io/limit-burst-multiplier`: multiplier of the limit rate for burst size. The default burst multiplier is 5, this annotation override the default multiplier. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
+* `nginx.ingress.kubernetes.io/limit-connections`: number of concurrent connections allowed from a single IP address. A 503 error is returned when exceeding this limit.
+* `nginx.ingress.kubernetes.io/limit-rps`: number of requests accepted from a given IP each second. The burst limit is set to this limit multiplied by the burst multiplier, the default multiplier is 5. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
+* `nginx.ingress.kubernetes.io/limit-rpm`: number of requests accepted from a given IP each minute. The burst limit is set to this limit multiplied by the burst multiplier, the default multiplier is 5. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
+* `nginx.ingress.kubernetes.io/limit-burst-multiplier`: multiplier of the limit rate for burst size. The default burst multiplier is 5, this annotation override the default multiplier. When clients exceed this limit, [limit-req-status-code](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#limit-req-status-code) ***default:*** 503 is returned.
* `nginx.ingress.kubernetes.io/limit-rate-after`: initial number of kilobytes after which the further transmission of a response to a given connection will be rate limited. This feature must be used with [proxy-buffering](#proxy-buffering) enabled.
* `nginx.ingress.kubernetes.io/limit-rate`: number of kilobytes per second allowed to send to a given connection. The zero value disables rate limiting. This feature must be used with [proxy-buffering](#proxy-buffering) enabled.
* `nginx.ingress.kubernetes.io/limit-whitelist`: client IP source ranges to be excluded from rate-limiting. The value is a comma separated list of CIDRs.
@@ -569,6 +554,46 @@ To configure settings globally for all Ingress rules, the `limit-rate-after` and
The client IP address will be set based on the use of [PROXY protocol](./configmap.md#use-proxy-protocol) or from the `X-Forwarded-For` header value when [use-forwarded-headers](./configmap.md#use-forwarded-headers) is enabled.
+### Global Rate Limiting
+
+**Note:** Be careful when configuring both (Local) Rate Limiting and Global Rate Limiting at the same time.
+They are two completely different rate limiting implementations. Whichever limit exceeds first will reject the
+requests. It might be a good idea to configure both of them to ease load on Global Rate Limiting backend
+in cases of spike in traffic.
+
+The stock NGINX rate limiting does not share its counters among different NGINX instances.
+Given that most ingress-nginx deployments are elastic and number of replicas can change any day
+it is impossible to configure a proper rate limit using stock NGINX functionalities.
+Global Rate Limiting overcome this by using [lua-resty-global-throttle](https://github.com/ElvinEfendi/lua-resty-global-throttle). `lua-resty-global-throttle` shares its counters via a central store such as `memcached`.
+The obvious shortcoming of this is users have to deploy and operate a `memcached` instance
+in order to benefit from this functionality. Configure the `memcached`
+using [these configmap settings](./configmap.md#global-rate-limit).
+
+**Here are a few remarks for ingress-nginx integration of `lua-resty-global-throttle`:**
+
+1. We minimize `memcached` access by caching exceeding limit decisions. The expiry of
+cache entry is the desired delay `lua-resty-global-throttle` calculates for us.
+The Lua Shared Dictionary used for that is `global_throttle_cache`. Currently its size defaults to 10M.
+Customize it as per your needs using [lua-shared-dicts](./configmap.md#lua-shared-dicts).
+When we fail to cache the exceeding limit decision then we log an NGINX error. You can monitor
+for that error to decide if you need to bump the cache size. Without cache the cost of processing a
+request is two memcached commands: `GET`, and `INCR`. With the cache it is only `INCR`.
+1. Log NGINX variable `$global_rate_limit_exceeding`'s value to have some visibility into
+what portion of requests are rejected (value `y`), whether they are rejected using cached decision (value `c`),
+or if they are not rejected (default value `n`). You can use [log-format-upstream](./configmap.md#log-format-upstream)
+to include that in access logs.
+1. In case of an error it will log the error message and **fail open**.
+1. The annotations below creates Global Rate Limiting instance per ingress.
+That means if there are multiple paths configured under the same ingress,
+the Global Rate Limiting will count requests to all the paths under the same counter.
+Extract a path out into its own ingress if you need to isolate a certain path.
+
+
+* `nginx.ingress.kubernetes.io/global-rate-limit`: Configures maximum allowed number of requests per window. Required.
+* `nginx.ingress.kubernetes.io/global-rate-limit-window`: Configures a time window (i.e `1m`) that the limit is applied. Required.
+* `nginx.ingress.kubernetes.io/global-rate-limit-key`: Configures a key for counting the samples. Defaults to `$remote_addr`. You can also combine multiple NGINX variables here, like `${remote_addr}-${http_x_api_client}` which would mean the limit will be applied to requests coming from the same API client (indicated by `X-API-Client` HTTP request header) with the same source IP address.
+* `nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs`: comma separated list of IPs and CIDRs to match client IP against. When there's a match request is not considered for rate limiting.
+
### Permanent Redirect
This annotation allows to return a permanent redirect (Return Code 301) instead of sending data to the upstream. For example `nginx.ingress.kubernetes.io/permanent-redirect: https://www.google.com` would redirect everything to Google.
@@ -580,10 +605,6 @@ This annotation allows you to modify the status code used for permanent redirect
### Temporal Redirect
This annotation allows you to return a temporal redirect (Return Code 302) instead of sending data to the upstream. For example `nginx.ingress.kubernetes.io/temporal-redirect: https://www.google.com` would redirect everything to Google with a Return Code of 302 (Moved Temporarily)
-### Temporal Redirect Code
-
-This annotation allows you to modify the status code used for temporal redirects. For example `nginx.ingress.kubernetes.io/temporal-redirect-code: '307'` would return your temporal-redirect with a 307.
-
### SSL Passthrough
The annotation `nginx.ingress.kubernetes.io/ssl-passthrough` instructs the controller to send TLS connections directly
@@ -629,10 +650,7 @@ To preserve the trailing slash in the URI with `ssl-redirect`, set `nginx.ingres
### Redirect from/to www
-In some scenarios, it is required to redirect from `www.domain.com` to `domain.com` or vice versa, which way the redirect is performed depends on the configured `host` value in the Ingress object.
-
-For example, if `.spec.rules.host` is configured with a value like `www.example.com`, then this annotation will redirect from `example.com` to `www.example.com`. If `.spec.rules.host` is configured with a value like `example.com`, so without a `www`, then this annotation will redirect from `www.example.com` to `example.com` instead.
-
+In some scenarios is required to redirect from `www.domain.com` to `domain.com` or vice versa.
To enable this feature use the annotation `nginx.ingress.kubernetes.io/from-to-www-redirect: "true"`
!!! attention
@@ -675,12 +693,6 @@ In some scenarios is required to have different values. To allow this we provide
- `nginx.ingress.kubernetes.io/proxy-next-upstream-tries`
- `nginx.ingress.kubernetes.io/proxy-request-buffering`
-If you indicate [Backend Protocol](#backend-protocol) as `GRPC` or `GRPCS`, the following grpc values will be set and inherited from proxy timeouts:
-
-- [`grpc_connect_timeout=5s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_connect_timeout), from `nginx.ingress.kubernetes.io/proxy-connect-timeout`
-- [`grpc_send_timeout=60s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_send_timeout), from `nginx.ingress.kubernetes.io/proxy-send-timeout`
-- [`grpc_read_timeout=60s`](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_read_timeout), from `nginx.ingress.kubernetes.io/proxy-read-timeout`
-
Note: All timeout values are unitless and in seconds e.g. `nginx.ingress.kubernetes.io/proxy-read-timeout: "120"` sets a valid 120 seconds proxy read timeout.
### Proxy redirect
@@ -748,18 +760,6 @@ To configure this setting globally, set `proxy-buffer-size` in [NGINX ConfigMap]
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
```
-### Proxy busy buffers size
-
-[Limits the total size of buffers that can be busy](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_busy_buffers_size) sending a response to the client while the response is not yet fully read.
-
-By default proxy busy buffers size is set as "8k".
-
-To configure this setting globally, set `proxy-busy-buffers-size` in the [ConfigMap](./configmap.md#proxy-busy-buffers-size). To use custom values in an Ingress rule, define this annotation:
-
-```yaml
-nginx.ingress.kubernetes.io/proxy-busy-buffers-size: "16k"
-```
-
### Proxy max temp file size
When [`buffering`](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffering) of responses from the proxied server is enabled, and the whole response does not fit into the buffers set by the [`proxy_buffer_size`](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffer_size) and [`proxy_buffers`](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffers) directives, a part of the response can be saved to a temporary file. This directive sets the maximum `size` of the temporary file setting the [`proxy_max_temp_file_size`](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_max_temp_file_size). The size of data written to the temporary file at a time is set by the [`proxy_temp_file_write_size`](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_temp_file_write_size) directive.
@@ -823,6 +823,24 @@ Note that rewrite logs are sent to the error_log file at the notice level. To en
nginx.ingress.kubernetes.io/enable-rewrite-log: "true"
```
+### Enable Opentracing
+
+Opentracing can be enabled or disabled globally through the ConfigMap but this will sometimes need to be overridden
+to enable it or disable it for a specific ingress (e.g. to turn off tracing of external health check endpoints)
+
+```yaml
+nginx.ingress.kubernetes.io/enable-opentracing: "true"
+```
+
+### Opentracing Trust Incoming Span
+
+The option to trust incoming trace spans can be enabled or disabled globally through the ConfigMap but this will
+sometimes need to be overridden to enable it or disable it for a specific ingress (e.g. only enable on a private endpoint)
+
+```yaml
+nginx.ingress.kubernetes.io/opentracing-trust-incoming-span: "true"
+```
+
### Enable Opentelemetry
Opentelemetry can be enabled or disabled globally through the ConfigMap but this will sometimes need to be overridden
@@ -896,10 +914,13 @@ nginx.ingress.kubernetes.io/modsecurity-snippet: |
Include /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
```
+!!! attention
+Since version 1.9.0, `"modsecurity-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
+
### Backend Protocol
Using `backend-protocol` annotations is possible to indicate how NGINX should communicate with the backend service. (Replaces `secure-backends` in older versions)
-Valid Values: HTTP, HTTPS, AUTO_HTTP, GRPC, GRPCS and FCGI
+Valid Values: HTTP, HTTPS, GRPC, GRPCS and FCGI
By default NGINX uses `HTTP`.
@@ -947,7 +968,7 @@ Enables a request to be mirrored to a mirror backend. Responses by mirror backen
The mirror backend can be set by applying:
```yaml
-nginx.ingress.kubernetes.io/mirror-target: https://test.env.com$request_uri
+nginx.ingress.kubernetes.io/mirror-target: https://test.env.com/$request_uri
```
By default the request-body is sent to the mirror backend, but can be turned off by applying:
@@ -959,7 +980,7 @@ nginx.ingress.kubernetes.io/mirror-request-body: "off"
Also by default header Host for mirrored requests will be set the same as a host part of uri in the "mirror-target" annotation. You can override it by "mirror-host" annotation:
```yaml
-nginx.ingress.kubernetes.io/mirror-target: https://1.2.3.4$request_uri
+nginx.ingress.kubernetes.io/mirror-target: https://1.2.3.4/$request_uri
nginx.ingress.kubernetes.io/mirror-host: "test.env.com"
```
@@ -985,3 +1006,6 @@ metadata:
proxy_pass 127.0.0.1:80;
}
```
+
+!!! attention
+Since version 1.9.0, `"stream-snippet"` annotation is disabled by default and has to be explicitly enabled, see [allow-snippet-annotations](./configmap.md#allow-snippet-annotations). Enabling it can be dangerous in multi-tenant clusters, as it can lead to people with otherwise limited permissions being able to retrieve all secrets on the cluster. See CVE-2021-25742 and the [related issue on github](https://github.com/kubernetes/ingress-nginx/issues/7837) for more information.
diff --git a/docs/user-guide/nginx-configuration/configmap.md b/docs/user-guide/nginx-configuration/configmap.md
index d8b4f6693..7038ca90d 100644
--- a/docs/user-guide/nginx-configuration/configmap.md
+++ b/docs/user-guide/nginx-configuration/configmap.md
@@ -25,206 +25,217 @@ data:
The following table shows a configuration option's name, type, and the default value:
-| name | type | default | notes |
-|:--------------------------------------------------------------------------------|:-------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:------------------------------------------------------------------------------------|
-| [add-headers](#add-headers) | string | "" | |
-| [allow-backend-server-header](#allow-backend-server-header) | bool | "false" | |
-| [allow-cross-namespace-resources](#allow-cross-namespace-resources) | bool | "false" | |
-| [allow-snippet-annotations](#allow-snippet-annotations) | bool | "false" | |
-| [annotations-risk-level](#annotations-risk-level) | string | High | |
-| [annotation-value-word-blocklist](#annotation-value-word-blocklist) | string array | "" | |
-| [hide-headers](#hide-headers) | string array | empty | |
-| [access-log-params](#access-log-params) | string | "" | |
-| [access-log-path](#access-log-path) | string | "/var/log/nginx/access.log" | |
-| [http-access-log-path](#http-access-log-path) | string | "" | |
-| [stream-access-log-path](#stream-access-log-path) | string | "" | |
-| [enable-access-log-for-default-backend](#enable-access-log-for-default-backend) | bool | "false" | |
-| [error-log-path](#error-log-path) | string | "/var/log/nginx/error.log" | |
-| [enable-modsecurity](#enable-modsecurity) | bool | "false" | |
-| [modsecurity-snippet](#modsecurity-snippet) | string | "" | |
-| [enable-owasp-modsecurity-crs](#enable-owasp-modsecurity-crs) | bool | "false" | |
-| [client-header-buffer-size](#client-header-buffer-size) | string | "1k" | |
-| [client-header-timeout](#client-header-timeout) | int | 60 | |
-| [client-body-buffer-size](#client-body-buffer-size) | string | "8k" | |
-| [client-body-timeout](#client-body-timeout) | int | 60 | |
-| [disable-access-log](#disable-access-log) | bool | "false" | |
-| [disable-ipv6](#disable-ipv6) | bool | "false" | |
-| [disable-ipv6-dns](#disable-ipv6-dns) | bool | "false" | |
-| [enable-underscores-in-headers](#enable-underscores-in-headers) | bool | "false" | |
-| [enable-ocsp](#enable-ocsp) | bool | "false" | |
-| [ignore-invalid-headers](#ignore-invalid-headers) | bool | "true" | |
-| [retry-non-idempotent](#retry-non-idempotent) | bool | "false" | |
-| [error-log-level](#error-log-level) | string | "notice" | |
-| [http2-max-field-size](#http2-max-field-size) | string | "" | DEPRECATED in favour of [large_client_header_buffers](#large-client-header-buffers) |
-| [http2-max-header-size](#http2-max-header-size) | string | "" | DEPRECATED in favour of [large_client_header_buffers](#large-client-header-buffers) |
-| [http2-max-requests](#http2-max-requests) | int | 0 | DEPRECATED in favour of [keepalive_requests](#keepalive-requests) |
-| [http2-max-concurrent-streams](#http2-max-concurrent-streams) | int | 128 | |
-| [hsts](#hsts) | bool | "true" | |
-| [hsts-include-subdomains](#hsts-include-subdomains) | bool | "true" | |
-| [hsts-max-age](#hsts-max-age) | string | "31536000" | |
-| [hsts-preload](#hsts-preload) | bool | "false" | |
-| [keep-alive](#keep-alive) | int | 75 | |
-| [keep-alive-requests](#keep-alive-requests) | int | 1000 | |
-| [large-client-header-buffers](#large-client-header-buffers) | string | "4 8k" | |
-| [log-format-escape-none](#log-format-escape-none) | bool | "false" | |
-| [log-format-escape-json](#log-format-escape-json) | bool | "false" | |
-| [log-format-upstream](#log-format-upstream) | string | `$remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent" $request_length $request_time [$proxy_upstream_name] [$proxy_alternative_upstream_name] $upstream_addr $upstream_response_length $upstream_response_time $upstream_status $req_id` | |
-| [log-format-stream](#log-format-stream) | string | `[$remote_addr] [$time_local] $protocol $status $bytes_sent $bytes_received $session_time` | |
-| [enable-multi-accept](#enable-multi-accept) | bool | "true" | |
-| [max-worker-connections](#max-worker-connections) | int | 16384 | |
-| [max-worker-open-files](#max-worker-open-files) | int | 0 | |
-| [map-hash-bucket-size](#max-hash-bucket-size) | int | 64 | |
-| [nginx-status-ipv4-whitelist](#nginx-status-ipv4-whitelist) | []string | "127.0.0.1" | |
-| [nginx-status-ipv6-whitelist](#nginx-status-ipv6-whitelist) | []string | "::1" | |
-| [proxy-real-ip-cidr](#proxy-real-ip-cidr) | []string | "0.0.0.0/0" | |
-| [proxy-set-headers](#proxy-set-headers) | string | "" | |
-| [server-name-hash-max-size](#server-name-hash-max-size) | int | 1024 | |
-| [server-name-hash-bucket-size](#server-name-hash-bucket-size) | int | `` |
-| [proxy-headers-hash-max-size](#proxy-headers-hash-max-size) | int | 512 | |
-| [proxy-headers-hash-bucket-size](#proxy-headers-hash-bucket-size) | int | 64 | |
-| [reuse-port](#reuse-port) | bool | "true" | |
-| [server-tokens](#server-tokens) | bool | "false" | |
-| [ssl-ciphers](#ssl-ciphers) | string | "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384" | |
-| [ssl-ecdh-curve](#ssl-ecdh-curve) | string | "auto" | |
-| [ssl-dh-param](#ssl-dh-param) | string | "" | |
-| [ssl-protocols](#ssl-protocols) | string | "TLSv1.2 TLSv1.3" | |
-| [ssl-session-cache](#ssl-session-cache) | bool | "true" | |
-| [ssl-session-cache-size](#ssl-session-cache-size) | string | "10m" | |
-| [ssl-session-tickets](#ssl-session-tickets) | bool | "false" | |
-| [ssl-session-ticket-key](#ssl-session-ticket-key) | string | `` |
-| [ssl-session-timeout](#ssl-session-timeout) | string | "10m" | |
-| [ssl-buffer-size](#ssl-buffer-size) | string | "4k" | |
-| [use-proxy-protocol](#use-proxy-protocol) | bool | "false" | |
-| [proxy-protocol-header-timeout](#proxy-protocol-header-timeout) | string | "5s" | |
-| [enable-aio-write](#enable-aio-write) | bool | "true" | |
-| [use-gzip](#use-gzip) | bool | "false" | |
-| [use-geoip](#use-geoip) | bool | "true" | |
-| [use-geoip2](#use-geoip2) | bool | "false" | |
-| [geoip2-autoreload-in-minutes](#geoip2-autoreload-in-minutes) | int | "0" | |
-| [enable-brotli](#enable-brotli) | bool | "false" | |
-| [brotli-level](#brotli-level) | int | 4 | |
-| [brotli-min-length](#brotli-min-length) | int | 20 | |
-| [brotli-types](#brotli-types) | string | "application/xml+rss application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component" | |
-| [use-http2](#use-http2) | bool | "true" | |
-| [gzip-disable](#gzip-disable) | string | "" | |
-| [gzip-level](#gzip-level) | int | 1 | |
-| [gzip-min-length](#gzip-min-length) | int | 256 | |
-| [gzip-types](#gzip-types) | string | "application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component" | |
-| [worker-processes](#worker-processes) | string | `` | |
-| [worker-cpu-affinity](#worker-cpu-affinity) | string | "" | |
-| [worker-shutdown-timeout](#worker-shutdown-timeout) | string | "240s" | |
-| [enable-serial-reloads](#enable-serial-reloads) | bool | "false" | |
-| [load-balance](#load-balance) | string | "round_robin" | |
-| [variables-hash-bucket-size](#variables-hash-bucket-size) | int | 128 | |
-| [variables-hash-max-size](#variables-hash-max-size) | int | 2048 | |
-| [upstream-keepalive-connections](#upstream-keepalive-connections) | int | 320 | |
-| [upstream-keepalive-time](#upstream-keepalive-time) | string | "1h" | |
-| [upstream-keepalive-timeout](#upstream-keepalive-timeout) | int | 60 | |
-| [upstream-keepalive-requests](#upstream-keepalive-requests) | int | 10000 | |
-| [limit-conn-zone-variable](#limit-conn-zone-variable) | string | "$binary_remote_addr" | |
-| [proxy-stream-timeout](#proxy-stream-timeout) | string | "600s" | |
-| [proxy-stream-next-upstream](#proxy-stream-next-upstream) | bool | "true" | |
-| [proxy-stream-next-upstream-timeout](#proxy-stream-next-upstream-timeout) | string | "600s" | |
-| [proxy-stream-next-upstream-tries](#proxy-stream-next-upstream-tries) | int | 3 | |
-| [proxy-stream-responses](#proxy-stream-responses) | int | 1 | |
-| [bind-address](#bind-address) | []string | "" | |
-| [use-forwarded-headers](#use-forwarded-headers) | bool | "false" | |
-| [enable-real-ip](#enable-real-ip) | bool | "false" | |
-| [forwarded-for-header](#forwarded-for-header) | string | "X-Forwarded-For" | |
-| [compute-full-forwarded-for](#compute-full-forwarded-for) | bool | "false" | |
-| [proxy-add-original-uri-header](#proxy-add-original-uri-header) | bool | "false" | |
-| [generate-request-id](#generate-request-id) | bool | "true" | |
-| [jaeger-collector-host](#jaeger-collector-host) | string | "" | |
-| [jaeger-collector-port](#jaeger-collector-port) | int | 6831 | |
-| [jaeger-endpoint](#jaeger-endpoint) | string | "" | |
-| [jaeger-service-name](#jaeger-service-name) | string | "nginx" | |
-| [jaeger-propagation-format](#jaeger-propagation-format) | string | "jaeger" | |
-| [jaeger-sampler-type](#jaeger-sampler-type) | string | "const" | |
-| [jaeger-sampler-param](#jaeger-sampler-param) | string | "1" | |
-| [jaeger-sampler-host](#jaeger-sampler-host) | string | "http://127.0.0.1" | |
-| [jaeger-sampler-port](#jaeger-sampler-port) | int | 5778 | |
-| [jaeger-trace-context-header-name](#jaeger-trace-context-header-name) | string | uber-trace-id | |
-| [jaeger-debug-header](#jaeger-debug-header) | string | uber-debug-id | |
-| [jaeger-baggage-header](#jaeger-baggage-header) | string | jaeger-baggage | |
-| [jaeger-trace-baggage-header-prefix](#jaeger-trace-baggage-header-prefix) | string | uberctx- | |
-| [datadog-collector-host](#datadog-collector-host) | string | "" | |
-| [datadog-collector-port](#datadog-collector-port) | int | 8126 | |
-| [datadog-service-name](#datadog-service-name) | string | "nginx" | |
-| [datadog-environment](#datadog-environment) | string | "prod" | |
-| [datadog-operation-name-override](#datadog-operation-name-override) | string | "nginx.handle" | |
-| [datadog-priority-sampling](#datadog-priority-sampling) | bool | "true" | |
-| [datadog-sample-rate](#datadog-sample-rate) | float | 1.0 | |
-| [enable-opentelemetry](#enable-opentelemetry) | bool | "false" | |
-| [opentelemetry-trust-incoming-span](#opentelemetry-trust-incoming-span) | bool | "true" | |
-| [opentelemetry-operation-name](#opentelemetry-operation-name) | string | "" | |
-| [opentelemetry-config](#/etc/nginx/opentelemetry.toml) | string | "/etc/nginx/opentelemetry.toml" | |
-| [otlp-collector-host](#otlp-collector-host) | string | "" | |
-| [otlp-collector-port](#otlp-collector-port) | int | 4317 | |
-| [otel-max-queuesize](#otel-max-queuesize) | int | | |
-| [otel-schedule-delay-millis](#otel-schedule-delay-millis) | int | | |
-| [otel-max-export-batch-size](#otel-max-export-batch-size) | int | | |
-| [otel-service-name](#otel-service-name) | string | "nginx" | |
-| [otel-sampler](#otel-sampler) | string | "AlwaysOff" | |
-| [otel-sampler-parent-based](#otel-sampler-parent-based) | bool | "false" | |
-| [otel-sampler-ratio](#otel-sampler-ratio) | float | 0.01 | |
-| [main-snippet](#main-snippet) | string | "" | |
-| [http-snippet](#http-snippet) | string | "" | |
-| [server-snippet](#server-snippet) | string | "" | |
-| [stream-snippet](#stream-snippet) | string | "" | |
-| [location-snippet](#location-snippet) | string | "" | |
-| [custom-http-errors](#custom-http-errors) | []int | []int{} | |
-| [proxy-body-size](#proxy-body-size) | string | "1m" | |
-| [proxy-connect-timeout](#proxy-connect-timeout) | int | 5 | |
-| [proxy-read-timeout](#proxy-read-timeout) | int | 60 | |
-| [proxy-send-timeout](#proxy-send-timeout) | int | 60 | |
-| [proxy-buffers-number](#proxy-buffers-number) | int | 4 | |
-| [proxy-buffer-size](#proxy-buffer-size) | string | "4k" | |
-| [proxy-busy-buffers-size](#proxy-busy-buffers-size) | string | "8k" | |
-| [proxy-cookie-path](#proxy-cookie-path) | string | "off" | |
-| [proxy-cookie-domain](#proxy-cookie-domain) | string | "off" | |
-| [proxy-next-upstream](#proxy-next-upstream) | string | "error timeout" | |
-| [proxy-next-upstream-timeout](#proxy-next-upstream-timeout) | int | 0 | |
-| [proxy-next-upstream-tries](#proxy-next-upstream-tries) | int | 3 | |
-| [proxy-redirect-from](#proxy-redirect-from) | string | "off" | |
-| [proxy-request-buffering](#proxy-request-buffering) | string | "on" | |
-| [ssl-redirect](#ssl-redirect) | bool | "true" | |
-| [force-ssl-redirect](#force-ssl-redirect) | bool | "false" | |
-| [denylist-source-range](#denylist-source-range) | []string | []string{} | |
-| [whitelist-source-range](#whitelist-source-range) | []string | []string{} | |
-| [skip-access-log-urls](#skip-access-log-urls) | []string | []string{} | |
-| [limit-rate](#limit-rate) | int | 0 | |
-| [limit-rate-after](#limit-rate-after) | int | 0 | |
-| [lua-shared-dicts](#lua-shared-dicts) | string | "" | |
-| [http-redirect-code](#http-redirect-code) | int | 308 | |
-| [proxy-buffering](#proxy-buffering) | string | "off" | |
-| [limit-req-status-code](#limit-req-status-code) | int | 503 | |
-| [limit-conn-status-code](#limit-conn-status-code) | int | 503 | |
-| [enable-syslog](#enable-syslog) | bool | "false" | |
-| [syslog-host](#syslog-host) | string | "" | |
-| [syslog-port](#syslog-port) | int | 514 | |
-| [no-tls-redirect-locations](#no-tls-redirect-locations) | string | "/.well-known/acme-challenge" | |
-| [global-allowed-response-headers](#global-allowed-response-headers) | string | "" | |
-| [global-auth-url](#global-auth-url) | string | "" | |
-| [global-auth-method](#global-auth-method) | string | "" | |
-| [global-auth-signin](#global-auth-signin) | string | "" | |
-| [global-auth-signin-redirect-param](#global-auth-signin-redirect-param) | string | "rd" | |
-| [global-auth-response-headers](#global-auth-response-headers) | string | "" | |
-| [global-auth-request-redirect](#global-auth-request-redirect) | string | "" | |
-| [global-auth-snippet](#global-auth-snippet) | string | "" | |
-| [global-auth-cache-key](#global-auth-cache-key) | string | "" | |
-| [global-auth-cache-duration](#global-auth-cache-duration) | string | "200 202 401 5m" | |
-| [no-auth-locations](#no-auth-locations) | string | "/.well-known/acme-challenge" | |
-| [block-cidrs](#block-cidrs) | []string | "" | |
-| [block-user-agents](#block-user-agents) | []string | "" | |
-| [block-referers](#block-referers) | []string | "" | |
-| [proxy-ssl-location-only](#proxy-ssl-location-only) | bool | "false" | |
-| [default-type](#default-type) | string | "text/html" | |
-| [service-upstream](#service-upstream) | bool | "false" | |
-| [ssl-reject-handshake](#ssl-reject-handshake) | bool | "false" | |
-| [debug-connections](#debug-connections) | []string | "127.0.0.1,1.1.1.1/24" | |
-| [strict-validate-path-type](#strict-validate-path-type) | bool | "true" | |
-| [grpc-buffer-size-kb](#grpc-buffer-size-kb) | int | 0 | |
-| [relative-redirects](#relative-redirects) | bool | false | |
+|name|type|default|notes|
+|:---|:---|:------|:----|
+|[add-headers](#add-headers)|string|""||
+|[allow-backend-server-header](#allow-backend-server-header)|bool|"false"||
+|[allow-cross-namespace-resources](#allow-cross-namespace-resources)|bool|"true"||
+|[allow-snippet-annotations](#allow-snippet-annotations)|bool|false||
+|[annotations-risk-level](#annotations-risk-level)|string|Critical||
+|[annotation-value-word-blocklist](#annotation-value-word-blocklist)|string array|""||
+|[hide-headers](#hide-headers)|string array|empty||
+|[access-log-params](#access-log-params)|string|""||
+|[access-log-path](#access-log-path)|string|"/var/log/nginx/access.log"||
+|[http-access-log-path](#http-access-log-path)|string|""||
+|[stream-access-log-path](#stream-access-log-path)|string|""||
+|[enable-access-log-for-default-backend](#enable-access-log-for-default-backend)|bool|"false"||
+|[enable-auth-access-log](#enable-auth-access-log)|bool|"false"||
+|[error-log-path](#error-log-path)|string|"/var/log/nginx/error.log"||
+|[enable-modsecurity](#enable-modsecurity)|bool|"false"||
+|[modsecurity-snippet](#modsecurity-snippet)|string|""||
+|[enable-owasp-modsecurity-crs](#enable-owasp-modsecurity-crs)|bool|"false"||
+|[client-header-buffer-size](#client-header-buffer-size)|string|"1k"||
+|[client-header-timeout](#client-header-timeout)|int|60||
+|[client-body-buffer-size](#client-body-buffer-size)|string|"8k"||
+|[client-body-timeout](#client-body-timeout)|int|60||
+|[disable-access-log](#disable-access-log)|bool|false||
+|[disable-ipv6](#disable-ipv6)|bool|false||
+|[disable-ipv6-dns](#disable-ipv6-dns)|bool|false||
+|[enable-underscores-in-headers](#enable-underscores-in-headers)|bool|false||
+|[enable-ocsp](#enable-ocsp)|bool|false||
+|[ignore-invalid-headers](#ignore-invalid-headers)|bool|true||
+|[retry-non-idempotent](#retry-non-idempotent)|bool|"false"||
+|[error-log-level](#error-log-level)|string|"notice"||
+|[http2-max-field-size](#http2-max-field-size)|string|""|DEPRECATED in favour of [large_client_header_buffers](#large-client-header-buffers)|
+|[http2-max-header-size](#http2-max-header-size)|string|""|DEPRECATED in favour of [large_client_header_buffers](#large-client-header-buffers)|
+|[http2-max-requests](#http2-max-requests)|int|0|DEPRECATED in favour of [keepalive_requests](#keepalive-requests)|
+|[http2-max-concurrent-streams](#http2-max-concurrent-streams)|int|128||
+|[hsts](#hsts)|bool|"true"||
+|[hsts-include-subdomains](#hsts-include-subdomains)|bool|"true"||
+|[hsts-max-age](#hsts-max-age)|string|"31536000"||
+|[hsts-preload](#hsts-preload)|bool|"false"||
+|[keep-alive](#keep-alive)|int|75||
+|[keep-alive-requests](#keep-alive-requests)|int|1000||
+|[large-client-header-buffers](#large-client-header-buffers)|string|"4 8k"||
+|[log-format-escape-none](#log-format-escape-none)|bool|"false"||
+|[log-format-escape-json](#log-format-escape-json)|bool|"false"||
+|[log-format-upstream](#log-format-upstream)|string|`$remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent" $request_length $request_time [$proxy_upstream_name] [$proxy_alternative_upstream_name] $upstream_addr $upstream_response_length $upstream_response_time $upstream_status $req_id`||
+|[log-format-stream](#log-format-stream)|string|`[$remote_addr] [$time_local] $protocol $status $bytes_sent $bytes_received $session_time`||
+|[enable-multi-accept](#enable-multi-accept)|bool|"true"||
+|[max-worker-connections](#max-worker-connections)|int|16384||
+|[max-worker-open-files](#max-worker-open-files)|int|0||
+|[map-hash-bucket-size](#max-hash-bucket-size)|int|64||
+|[nginx-status-ipv4-whitelist](#nginx-status-ipv4-whitelist)|[]string|"127.0.0.1"||
+|[nginx-status-ipv6-whitelist](#nginx-status-ipv6-whitelist)|[]string|"::1"||
+|[proxy-real-ip-cidr](#proxy-real-ip-cidr)|[]string|"0.0.0.0/0"||
+|[proxy-set-headers](#proxy-set-headers)|string|""||
+|[server-name-hash-max-size](#server-name-hash-max-size)|int|1024||
+|[server-name-hash-bucket-size](#server-name-hash-bucket-size)|int|``|
+|[proxy-headers-hash-max-size](#proxy-headers-hash-max-size)|int|512||
+|[proxy-headers-hash-bucket-size](#proxy-headers-hash-bucket-size)|int|64||
+|[plugins](#plugins)|[]string| ||
+|[reuse-port](#reuse-port)|bool|"true"||
+|[server-tokens](#server-tokens)|bool|"false"||
+|[ssl-ciphers](#ssl-ciphers)|string|"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"||
+|[ssl-ecdh-curve](#ssl-ecdh-curve)|string|"auto"||
+|[ssl-dh-param](#ssl-dh-param)|string|""||
+|[ssl-protocols](#ssl-protocols)|string|"TLSv1.2 TLSv1.3"||
+|[ssl-session-cache](#ssl-session-cache)|bool|"true"||
+|[ssl-session-cache-size](#ssl-session-cache-size)|string|"10m"||
+|[ssl-session-tickets](#ssl-session-tickets)|bool|"false"||
+|[ssl-session-ticket-key](#ssl-session-ticket-key)|string|``|
+|[ssl-session-timeout](#ssl-session-timeout)|string|"10m"||
+|[ssl-buffer-size](#ssl-buffer-size)|string|"4k"||
+|[use-proxy-protocol](#use-proxy-protocol)|bool|"false"||
+|[proxy-protocol-header-timeout](#proxy-protocol-header-timeout)|string|"5s"||
+|[enable-aio-write](#enable-aio-write)|bool|"true"||
+|[use-gzip](#use-gzip)|bool|"false"||
+|[use-geoip](#use-geoip)|bool|"true"||
+|[use-geoip2](#use-geoip2)|bool|"false"||
+|[enable-brotli](#enable-brotli)|bool|"false"||
+|[brotli-level](#brotli-level)|int|4||
+|[brotli-min-length](#brotli-min-length)|int|20||
+|[brotli-types](#brotli-types)|string|"application/xml+rss application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component"||
+|[use-http2](#use-http2)|bool|"true"||
+|[gzip-disable](#gzip-disable)|string|""||
+|[gzip-level](#gzip-level)|int|1||
+|[gzip-min-length](#gzip-min-length)|int|256||
+|[gzip-types](#gzip-types)|string|"application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component"||
+|[worker-processes](#worker-processes)|string|``||
+|[worker-cpu-affinity](#worker-cpu-affinity)|string|""||
+|[worker-shutdown-timeout](#worker-shutdown-timeout)|string|"240s"||
+|[load-balance](#load-balance)|string|"round_robin"||
+|[variables-hash-bucket-size](#variables-hash-bucket-size)|int|128||
+|[variables-hash-max-size](#variables-hash-max-size)|int|2048||
+|[upstream-keepalive-connections](#upstream-keepalive-connections)|int|320||
+|[upstream-keepalive-time](#upstream-keepalive-time)|string|"1h"||
+|[upstream-keepalive-timeout](#upstream-keepalive-timeout)|int|60||
+|[upstream-keepalive-requests](#upstream-keepalive-requests)|int|10000||
+|[limit-conn-zone-variable](#limit-conn-zone-variable)|string|"$binary_remote_addr"||
+|[proxy-stream-timeout](#proxy-stream-timeout)|string|"600s"||
+|[proxy-stream-next-upstream](#proxy-stream-next-upstream)|bool|"true"||
+|[proxy-stream-next-upstream-timeout](#proxy-stream-next-upstream-timeout)|string|"600s"||
+|[proxy-stream-next-upstream-tries](#proxy-stream-next-upstream-tries)|int|3||
+|[proxy-stream-responses](#proxy-stream-responses)|int|1||
+|[bind-address](#bind-address)|[]string|""||
+|[use-forwarded-headers](#use-forwarded-headers)|bool|"false"||
+|[enable-real-ip](#enable-real-ip)|bool|"false"||
+|[forwarded-for-header](#forwarded-for-header)|string|"X-Forwarded-For"||
+|[compute-full-forwarded-for](#compute-full-forwarded-for)|bool|"false"||
+|[proxy-add-original-uri-header](#proxy-add-original-uri-header)|bool|"false"||
+|[generate-request-id](#generate-request-id)|bool|"true"||
+|[enable-opentracing](#enable-opentracing)|bool|"false"||
+|[opentracing-operation-name](#opentracing-operation-name)|string|""||
+|[opentracing-location-operation-name](#opentracing-location-operation-name)|string|""||
+|[zipkin-collector-host](#zipkin-collector-host)|string|""||
+|[zipkin-collector-port](#zipkin-collector-port)|int|9411||
+|[zipkin-service-name](#zipkin-service-name)|string|"nginx"||
+|[zipkin-sample-rate](#zipkin-sample-rate)|float|1.0||
+|[jaeger-collector-host](#jaeger-collector-host)|string|""||
+|[jaeger-collector-port](#jaeger-collector-port)|int|6831||
+|[jaeger-endpoint](#jaeger-endpoint)|string|""||
+|[jaeger-service-name](#jaeger-service-name)|string|"nginx"||
+|[jaeger-propagation-format](#jaeger-propagation-format)|string|"jaeger"||
+|[jaeger-sampler-type](#jaeger-sampler-type)|string|"const"||
+|[jaeger-sampler-param](#jaeger-sampler-param)|string|"1"||
+|[jaeger-sampler-host](#jaeger-sampler-host)|string|"http://127.0.0.1"||
+|[jaeger-sampler-port](#jaeger-sampler-port)|int|5778||
+|[jaeger-trace-context-header-name](#jaeger-trace-context-header-name)|string|uber-trace-id||
+|[jaeger-debug-header](#jaeger-debug-header)|string|uber-debug-id||
+|[jaeger-baggage-header](#jaeger-baggage-header)|string|jaeger-baggage||
+|[jaeger-trace-baggage-header-prefix](#jaeger-trace-baggage-header-prefix)|string|uberctx-||
+|[datadog-collector-host](#datadog-collector-host)|string|""||
+|[datadog-collector-port](#datadog-collector-port)|int|8126||
+|[datadog-service-name](#datadog-service-name)|string|"nginx"||
+|[datadog-environment](#datadog-environment)|string|"prod"||
+|[datadog-operation-name-override](#datadog-operation-name-override)|string|"nginx.handle"||
+|[datadog-priority-sampling](#datadog-priority-sampling)|bool|"true"||
+|[datadog-sample-rate](#datadog-sample-rate)|float|1.0||
+|[enable-opentelemetry](#enable-opentelemetry)|bool|"false"||
+|[opentelemetry-trust-incoming-span](#opentelemetry-trust-incoming-span)|bool|"true"||
+|[opentelemetry-operation-name](#opentelemetry-operation-name)|string|""||
+|[opentelemetry-config](#/etc/ingress-controller/telemetry/opentelemetry.toml)|string|"/etc/ingress-controller/telemetry/opentelemetry.toml"||
+|[otlp-collector-host](#otlp-collector-host)|string|""||
+|[otlp-collector-port](#otlp-collector-port)|int|4317||
+|[otel-max-queuesize](#otel-max-queuesize)|int|||
+|[otel-schedule-delay-millis](#otel-schedule-delay-millis)|int|||
+|[otel-max-export-batch-size](#otel-max-export-batch-size)|int|||
+|[otel-service-name](#otel-service-name)|string|"nginx"||
+|[otel-sampler](#otel-sampler)|string|"AlwaysOff"||
+|[otel-sampler-parent-based](#otel-sampler-parent-based)|bool|"false"||
+|[otel-sampler-ratio](#otel-sampler-ratio)|float|0.01||
+|[main-snippet](#main-snippet)|string|""||
+|[http-snippet](#http-snippet)|string|""||
+|[server-snippet](#server-snippet)|string|""||
+|[stream-snippet](#stream-snippet)|string|""||
+|[location-snippet](#location-snippet)|string|""||
+|[custom-http-errors](#custom-http-errors)|[]int|[]int{}||
+|[disable-proxy-intercept-errors](#disable-proxy-intercept-errors)|bool|"false"|
+|[proxy-body-size](#proxy-body-size)|string|"1m"||
+|[proxy-connect-timeout](#proxy-connect-timeout)|int|5||
+|[proxy-read-timeout](#proxy-read-timeout)|int|60||
+|[proxy-send-timeout](#proxy-send-timeout)|int|60||
+|[proxy-buffers-number](#proxy-buffers-number)|int|4||
+|[proxy-buffer-size](#proxy-buffer-size)|string|"4k"||
+|[proxy-cookie-path](#proxy-cookie-path)|string|"off"||
+|[proxy-cookie-domain](#proxy-cookie-domain)|string|"off"||
+|[proxy-next-upstream](#proxy-next-upstream)|string|"error timeout"||
+|[proxy-next-upstream-timeout](#proxy-next-upstream-timeout)|int|0||
+|[proxy-next-upstream-tries](#proxy-next-upstream-tries)|int|3||
+|[proxy-redirect-from](#proxy-redirect-from)|string|"off"||
+|[proxy-request-buffering](#proxy-request-buffering)|string|"on"||
+|[ssl-redirect](#ssl-redirect)|bool|"true"||
+|[force-ssl-redirect](#force-ssl-redirect)|bool|"false"||
+|[denylist-source-range](#denylist-source-range)|[]string|[]string{}||
+|[whitelist-source-range](#whitelist-source-range)|[]string|[]string{}||
+|[skip-access-log-urls](#skip-access-log-urls)|[]string|[]string{}||
+|[limit-rate](#limit-rate)|int|0||
+|[limit-rate-after](#limit-rate-after)|int|0||
+|[lua-shared-dicts](#lua-shared-dicts)|string|""||
+|[http-redirect-code](#http-redirect-code)|int|308||
+|[proxy-buffering](#proxy-buffering)|string|"off"||
+|[limit-req-status-code](#limit-req-status-code)|int|503||
+|[limit-conn-status-code](#limit-conn-status-code)|int|503||
+|[enable-syslog](#enable-syslog)|bool|false||
+|[syslog-host](#syslog-host)|string|""||
+|[syslog-port](#syslog-port)|int|514||
+|[no-tls-redirect-locations](#no-tls-redirect-locations)|string|"/.well-known/acme-challenge"||
+|[global-auth-url](#global-auth-url)|string|""||
+|[global-auth-method](#global-auth-method)|string|""||
+|[global-auth-signin](#global-auth-signin)|string|""||
+|[global-auth-signin-redirect-param](#global-auth-signin-redirect-param)|string|"rd"||
+|[global-auth-response-headers](#global-auth-response-headers)|string|""||
+|[global-auth-request-redirect](#global-auth-request-redirect)|string|""||
+|[global-auth-snippet](#global-auth-snippet)|string|""||
+|[global-auth-cache-key](#global-auth-cache-key)|string|""||
+|[global-auth-cache-duration](#global-auth-cache-duration)|string|"200 202 401 5m"||
+|[global-auth-always-set-cookie](#global-auth-always-set-cookie)|bool|"false"||
+|[no-auth-locations](#no-auth-locations)|string|"/.well-known/acme-challenge"||
+|[block-cidrs](#block-cidrs)|[]string|""||
+|[block-user-agents](#block-user-agents)|[]string|""||
+|[block-referers](#block-referers)|[]string|""||
+|[proxy-ssl-location-only](#proxy-ssl-location-only)|bool|"false"||
+|[default-type](#default-type)|string|"text/html"||
+|[global-rate-limit-memcached-host](#global-rate-limit)|string|""||
+|[global-rate-limit-memcached-port](#global-rate-limit)|int|11211||
+|[global-rate-limit-memcached-connect-timeout](#global-rate-limit)|int|50||
+|[global-rate-limit-memcached-max-idle-timeout](#global-rate-limit)|int|10000||
+|[global-rate-limit-memcached-pool-size](#global-rate-limit)|int|50||
+|[global-rate-limit-status-code](#global-rate-limit)|int|429||
+|[service-upstream](#service-upstream)|bool|"false"||
+|[ssl-reject-handshake](#ssl-reject-handshake)|bool|"false"||
+|[debug-connections](#debug-connections)|[]string|"127.0.0.1,1.1.1.1/24"||
+|[strict-validate-path-type](#strict-validate-path-type)|bool|"false" (v1.7.x)||
## add-headers
@@ -236,16 +247,18 @@ Enables the return of the header Server from the backend instead of the generic
## allow-cross-namespace-resources
-Enables users to consume cross namespace resource on annotations, when was previously enabled . _**default:**_ false
+Enables users to consume cross namespace resource on annotations, when was previously enabled . _**default:**_ true
**Annotations that may be impacted with this change**:
-
* `auth-secret`
* `auth-proxy-set-header`
* `auth-tls-secret`
* `fastcgi-params-configmap`
* `proxy-ssl-secret`
+
+**This option will be defaulted to false in the next major release**
+
## allow-snippet-annotations
Enables Ingress to parse and add *-snippet annotations/directives created by the user. _**default:**_ `false`
@@ -253,13 +266,15 @@ Enables Ingress to parse and add *-snippet annotations/directives created by the
Warning: We recommend enabling this option only if you TRUST users with permission to create Ingress objects, as this
may allow a user to add restricted configurations to the final nginx.conf file
+**This option is defaulted to false since v1.9.0**
+
## annotations-risk-level
Represents the risk accepted on an annotation. If the risk is, for instance `Medium`, annotations with risk High and Critical will not be accepted.
Accepted values are `Critical`, `High`, `Medium` and `Low`.
-_**default:**_ `High`
+Defaults to `Critical` but will be changed to `High` on the next minor release
## annotation-value-word-blocklist
@@ -314,6 +329,10 @@ __Note:__ If not specified, the `access-log-path` will be used.
Enables logging access to default backend. _**default:**_ is disabled.
+## enable-auth-access-log
+
+Enables logging access to the authentication endpoint. _**default:**_ is disabled.
+
## error-log-path
Error log path. Goes to `/var/log/nginx/error.log` by default.
@@ -603,6 +622,10 @@ _References:_
- [https://nginx.org/en/docs/hash.html](https://nginx.org/en/docs/hash.html)
- [https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_headers_hash_bucket_size](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_headers_hash_bucket_size)
+## plugins
+
+Activates plugins installed in `/etc/nginx/lua/plugins`. Refer to [ingress-nginx plugins README](https://github.com/kubernetes/ingress-nginx/blob/main/rootfs/etc/nginx/lua/plugins/README.md) for more information on how to write and install a plugin.
+
## server-tokens
Send NGINX Server header in responses and display NGINX version in error pages. _**default:**_ is disabled
@@ -704,6 +727,9 @@ Enables or disables compression of HTTP responses using the ["gzip" module](http
## use-geoip
+!!! attention
+ GeoIP is deprecated and removed on v1.10. Users willing to use GeoIP should use GeoIP2
+
Enables or disables ["geoip" module](https://nginx.org/en/docs/http/ngx_http_geoip_module.html) that creates variables with values depending on the client IP address, using the precompiled MaxMind databases.
_**default:**_ true
@@ -712,21 +738,15 @@ _**default:**_ true
## use-geoip2
Enables the [geoip2 module](https://github.com/leev/ngx_http_geoip2_module) for NGINX.
-Since `0.27.0` and due to a [change in the MaxMind databases](https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/) a license is required to have access to the databases.
+Since `0.27.0` and due to a [change in the MaxMind databases](https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases) a license is required to have access to the databases.
For this reason, it is required to define a new flag `--maxmind-license-key` in the ingress controller deployment to download the databases needed during the initialization of the ingress controller.
-Alternatively, it is possible to use a volume to mount the files `/etc/ingress-controller/geoip/GeoLite2-City.mmdb` and `/etc/ingress-controller/geoip/GeoLite2-ASN.mmdb`, avoiding the overhead of the download.
+Alternatively, it is possible to use a volume to mount the files `/etc/nginx/geoip/GeoLite2-City.mmdb` and `/etc/nginx/geoip/GeoLite2-ASN.mmdb`, avoiding the overhead of the download.
!!! important
If the feature is enabled but the files are missing, GeoIP2 will not be enabled.
_**default:**_ false
-## geoip2-autoreload-in-minutes
-
-Enables the [geoip2 module](https://github.com/leev/ngx_http_geoip2_module) autoreload in MaxMind databases setting the interval in minutes.
-
-_**default:**_ 0
-
## enable-brotli
Enables or disables compression of HTTP responses using the ["brotli" module](https://github.com/google/ngx_brotli).
@@ -925,6 +945,41 @@ Adds an X-Original-Uri header with the original request URI to the backend reque
Ensures that X-Request-ID is defaulted to a random value, if no X-Request-ID is present in the request
+## enable-opentracing
+
+Enables the nginx Opentracing extension. _**default:**_ is disabled
+
+_References:_
+[https://github.com/opentracing-contrib/nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing)
+
+## opentracing-operation-name
+
+Specifies a custom name for the server span. _**default:**_ is empty
+
+For example, set to "HTTP $request_method $uri".
+
+## opentracing-location-operation-name
+
+Specifies a custom name for the location span. _**default:**_ is empty
+
+For example, set to "HTTP $request_method $uri".
+
+## zipkin-collector-host
+
+Specifies the host to use when uploading traces. It must be a valid URL.
+
+## zipkin-collector-port
+
+Specifies the port to use when uploading traces. _**default:**_ 9411
+
+## zipkin-service-name
+
+Specifies the service name to use for any traces created. _**default:**_ nginx
+
+## zipkin-sample-rate
+
+Specifies sample rate for any traces created. _**default:**_ 1.0
+
## jaeger-collector-host
Specifies the host to use when uploading traces. It must be a valid URL.
@@ -1075,10 +1130,18 @@ You can not use this to add new locations that proxy to the Kubernetes pods, as
Enables which HTTP codes should be passed for processing with the [error_page directive](https://nginx.org/en/docs/http/ngx_http_core_module.html#error_page)
-Setting at least one code also enables [proxy_intercept_errors](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_intercept_errors) which are required to process error_page.
+Setting at least one code also enables [proxy_intercept_errors](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_intercept_errors) if not disabled with [disable-proxy-intercept-errors](#disable-proxy-intercept-errors).
Example usage: `custom-http-errors: 404,415`
+## disable-proxy-intercept-errors
+
+Allows to disable [proxy-intercept-errors](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_intercept_errors).
+
+Disabling [proxy_intercept_errors](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_intercept_errors) allows to pass upstream errors to client even if [custom-http-errors](#custom-http-errors) are set.
+
+Example usage: `disable-proxy-intercept-errors: "true"`
+
## proxy-body-size
Sets the maximum allowed size of the client request body.
@@ -1088,20 +1151,14 @@ See NGINX [client_max_body_size](https://nginx.org/en/docs/http/ngx_http_core_mo
Sets the timeout for [establishing a connection with a proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_connect_timeout). It should be noted that this timeout cannot usually exceed 75 seconds.
-It will also set the [grpc_connect_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_connect_timeout) for gRPC connections.
-
## proxy-read-timeout
Sets the timeout in seconds for [reading a response from the proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_read_timeout). The timeout is set only between two successive read operations, not for the transmission of the whole response.
-It will also set the [grpc_read_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_read_timeout) for gRPC connections.
-
## proxy-send-timeout
Sets the timeout in seconds for [transmitting a request to the proxied server](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_send_timeout). The timeout is set only between two successive write operations, not for the transmission of the whole request.
-It will also set the [grpc_send_timeout](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_send_timeout) for gRPC connections.
-
## proxy-buffers-number
Sets the number of the buffer used for [reading the first part of the response](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffers) received from the proxied server. This part usually contains a small response header.
@@ -1110,10 +1167,6 @@ Sets the number of the buffer used for [reading the first part of the response](
Sets the size of the buffer used for [reading the first part of the response](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffer_size) received from the proxied server. This part usually contains a small response header.
-## proxy-busy-buffers-size
-
-[Limits the total size of buffers that can be busy](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_busy_buffers_size) sending a response to the client while the response is not yet fully read.
-
## proxy-cookie-path
Sets a text that [should be changed in the path attribute](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_cookie_path) of the “Set-Cookie” header fields of a proxied server response.
@@ -1179,9 +1232,6 @@ _References:_
Sets the initial amount after which the further transmission of a response to a client will be rate limited.
-_References:_
-[https://nginx.org/en/docs/http/ngx_http_core_module.html#limit_rate_after](https://nginx.org/en/docs/http/ngx_http_core_module.html#limit_rate_after)
-
## lua-shared-dicts
Customize default Lua shared dictionaries or define more. You can use the following syntax to do so:
@@ -1203,6 +1253,9 @@ You can optionally set a size unit to allow for kilobyte-granularity. Allowed un
lua-shared-dicts: "certificate_data: 100, my_custom_plugin: 512k"
```
+_References:_
+[https://nginx.org/en/docs/http/ngx_http_core_module.html#limit_rate_after](https://nginx.org/en/docs/http/ngx_http_core_module.html#limit_rate_after)
+
## http-redirect-code
Sets the HTTP status code to be used in redirects.
@@ -1242,15 +1295,11 @@ Sets the port of syslog server. _**default:**_ 514
A comma-separated list of locations on which http requests will never get redirected to their https counterpart.
_**default:**_ "/.well-known/acme-challenge"
-## global-allowed-response-headers
-
-A comma-separated list of allowed response headers inside the [custom headers annotations](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#custom-headers)
-
## global-auth-url
A url to an existing service that provides authentication for all the locations.
Similar to the Ingress rule annotation `nginx.ingress.kubernetes.io/auth-url`.
-Locations that should not get authenticated can be listed using `no-auth-locations` See [no-auth-locations](#no-auth-locations). In addition, each service can be excluded from authentication via annotation `enable-global-auth` set to "false".
+Locations that should not get authenticated can be listed using `no-auth-locations` See [no-auth-locations](#no-auth-locations). In addition, each service can be excluded from authentication via annotation `nginx.ingress.kubernetes.io/enable-global-auth` set to "false".
_**default:**_ ""
_References:_ [https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#external-authentication](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#external-authentication)
@@ -1345,6 +1394,22 @@ _**default:**_ text/html
_References:_
[https://nginx.org/en/docs/http/ngx_http_core_module.html#default_type](https://nginx.org/en/docs/http/ngx_http_core_module.html#default_type)
+## global-rate-limit
+
+* `global-rate-limit-status-code`: configure HTTP status code to return when rejecting requests. Defaults to 429.
+
+Configure `memcached` client for [Global Rate Limiting](https://github.com/kubernetes/ingress-nginx/blob/main/docs/user-guide/nginx-configuration/annotations.md#global-rate-limiting).
+
+* `global-rate-limit-memcached-host`: IP/FQDN of memcached server to use. Required to enable Global Rate Limiting.
+* `global-rate-limit-memcached-port`: port of memcached server to use. Defaults default memcached port of `11211`.
+* `global-rate-limit-memcached-connect-timeout`: configure timeout for connect, send and receive operations. Unit is millisecond. Defaults to 50ms.
+* `global-rate-limit-memcached-max-idle-timeout`: configure timeout for cleaning idle connections. Unit is millisecond. Defaults to 50ms.
+* `global-rate-limit-memcached-pool-size`: configure number of max connections to keep alive. Make sure your `memcached` server can handle
+`global-rate-limit-memcached-pool-size * worker-processes * ` simultaneous connections.
+
+These settings get used by [lua-resty-global-throttle](https://github.com/ElvinEfendi/lua-resty-global-throttle)
+that ingress-nginx includes. Refer to the link to learn more about `lua-resty-global-throttle`.
+
## service-upstream
Set if the service's Cluster IP and port should be used instead of a list of all endpoints. This can be overwritten by an annotation on an Ingress rule.
@@ -1366,7 +1431,6 @@ _References:_
[http://nginx.org/en/docs/ngx_core_module.html#debug_connection](http://nginx.org/en/docs/ngx_core_module.html#debug_connection)
## strict-validate-path-type
-
Ingress objects contains a field called pathType that defines the proxy behavior. It can be `Exact`, `Prefix` and `ImplementationSpecific`.
When pathType is configured as `Exact` or `Prefix`, there should be a more strict validation, allowing only paths starting with "/" and
@@ -1379,23 +1443,3 @@ This means that Ingress objects that rely on paths containing regex characters s
The cluster admin should establish validation rules using mechanisms like [Open Policy Agent](https://www.openpolicyagent.org/) to
validate that only authorized users can use `ImplementationSpecific` pathType and that only the authorized characters can be used.
-
-_**default:**_ "true"
-
-## grpc-buffer-size-kb
-
-Sets the configuration for the GRPC Buffer Size parameter. If not set it will use the default from NGINX.
-
-_References:_
-[https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_buffer_size](https://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_buffer_size)
-
-## relative-redirects
-
-Use relative redirects instead of absolute redirects. Absolute redirects are the default in nginx. RFC7231 allows relative redirects since 2014.
-Similar to the Ingress rule annotation `nginx.ingress.kubernetes.io/relative-redirects`.
-
-_**default:**_ "false"
-
-_References:_
-- [https://nginx.org/en/docs/http/ngx_http_core_module.html#absolute_redirect](https://nginx.org/en/docs/http/ngx_http_core_module.html#absolute_redirect)
-- [https://datatracker.ietf.org/doc/html/rfc7231#section-7.1.2](https://datatracker.ietf.org/doc/html/rfc7231#section-7.1.2)
diff --git a/docs/user-guide/retaining-client-ipaddress.md b/docs/user-guide/retaining-client-ipaddress.md
new file mode 100644
index 000000000..237bd3004
--- /dev/null
+++ b/docs/user-guide/retaining-client-ipaddress.md
@@ -0,0 +1,44 @@
+
+## Retaining Client IPAddress
+
+Please read this https://kubernetes.github.io/ingress-nginx/user-guide/miscellaneous/#source-ip-address , to get details of retaining the client IPAddress.
+
+### Using proxy-protocol
+
+Please read this https://kubernetes.github.io/ingress-nginx/user-guide/miscellaneous/#proxy-protocol , to use proxy-protocol for retaining client IPAddress
+
+
+### Using the K8S spec service.spec.externalTrafficPolicy
+
+```
+% kubectl explain service.spec.externalTrafficPolicy
+KIND: Service
+VERSION: v1
+
+FIELD: externalTrafficPolicy
+
+DESCRIPTION:
+ externalTrafficPolicy describes how nodes distribute service traffic they
+ receive on one of the Service's "externally-facing" addresses (NodePorts,
+ ExternalIPs, and LoadBalancer IPs). If set to "Local", the proxy will
+ configure the service in a way that assumes that external load balancers
+ will take care of balancing the service traffic between nodes, and so each
+ node will deliver traffic only to the node-local endpoints of the service,
+ without masquerading the client source IP. (Traffic mistakenly sent to a
+ node with no endpoints will be dropped.) The default value, "Cluster", uses
+ the standard behavior of routing to all endpoints evenly (possibly modified
+ by topology and other features). Note that traffic sent to an External IP or
+ LoadBalancer IP from within the cluster will always get "Cluster" semantics,
+ but clients sending to a NodePort from within the cluster may need to take
+ traffic policy into account when picking a node.
+
+ Possible enum values:
+ - `"Cluster"` routes traffic to all endpoints.
+ - `"Local"` preserves the source IP of the traffic by routing only to
+ endpoints on the same node as the traffic was received on (dropping the
+ traffic if there are no local endpoints).
+
+```
+
+
+- Setting the field `externalTrafficPolicy`, in the ingress-controller service, to a value of `Local` retains the client's ipaddress, within the scope explained above
diff --git a/docs/user-guide/third-party-addons/modsecurity.md b/docs/user-guide/third-party-addons/modsecurity.md
index 38d39888d..93a7f4097 100644
--- a/docs/user-guide/third-party-addons/modsecurity.md
+++ b/docs/user-guide/third-party-addons/modsecurity.md
@@ -14,97 +14,3 @@ The default `Serial` value in SecAuditLogType can impact performance.
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.
The directory `/etc/nginx/owasp-modsecurity-crs` contains the [OWASP ModSecurity Core Rule Set repository](https://github.com/coreruleset/coreruleset).
Using `enable-owasp-modsecurity-crs: "true"` we enable the use of the rules.
-
-## Supported annotations
-
-For more info on supported annotations, please see [annotations/#modsecurity](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/annotations/#modsecurity)
-
-## Example of using ModSecurity with plugins via the helm chart
-
-Suppose you have a ConfigMap that contains the contents of the [nextcloud-rule-exclusions plugin](https://github.com/coreruleset/nextcloud-rule-exclusions-plugin/blob/main/plugins/nextcloud-rule-exclusions-before.conf) like this:
-
-```yaml
-apiVersion: v1
-kind: ConfigMap
-metadata:
- name: modsecurity-plugins
-data:
- empty-after.conf: |
- # no data
- empty-before.conf: |
- # no data
- empty-config.conf: |
- # no data
- nextcloud-rule-exclusions-before.conf:
- # this is just a snippet
- # find the full file at https://github.com/coreruleset/nextcloud-rule-exclusions-plugin
- #
- # [ File Manager ]
- # The web interface uploads files, and interacts with the user.
- SecRule REQUEST_FILENAME "@contains /remote.php/webdav" \
- "id:9508102,\
- phase:1,\
- pass,\
- t:none,\
- nolog,\
- ver:'nextcloud-rule-exclusions-plugin/1.2.0',\
- ctl:ruleRemoveById=920420,\
- ctl:ruleRemoveById=920440,\
- ctl:ruleRemoveById=941000-942999,\
- ctl:ruleRemoveById=951000-951999,\
- ctl:ruleRemoveById=953100-953130,\
- ctl:ruleRemoveByTag=attack-injection-php"
-```
-
-If you're using the helm chart, you can pass in the following parameters in your `values.yaml`:
-
-```yaml
-controller:
- config:
- # Enables Modsecurity
- enable-modsecurity: "true"
-
- # Update ModSecurity config and rules
- modsecurity-snippet: |
- # this enables the mod security nextcloud plugin
- Include /etc/nginx/owasp-modsecurity-crs/plugins/nextcloud-rule-exclusions-before.conf
-
- # this enables the default OWASP Core Rule Set
- Include /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
-
- # Enable prevention mode. Options: DetectionOnly,On,Off (default is DetectionOnly)
- SecRuleEngine On
-
- # Enable scanning of the request body
- SecRequestBodyAccess On
-
- # Enable XML and JSON parsing
- SecRule REQUEST_HEADERS:Content-Type "(?:text|application(?:/soap\+|/)|application/xml)/" \
- "id:200000,phase:1,t:none,t:lowercase,pass,nolog,ctl:requestBodyProcessor=XML"
-
- SecRule REQUEST_HEADERS:Content-Type "application/json" \
- "id:200001,phase:1,t:none,t:lowercase,pass,nolog,ctl:requestBodyProcessor=JSON"
-
- # Reject if larger (we could also let it pass with ProcessPartial)
- SecRequestBodyLimitAction Reject
-
- # Send ModSecurity audit logs to the stdout (only for rejected requests)
- SecAuditLog /dev/stdout
-
- # format the logs in JSON
- SecAuditLogFormat JSON
-
- # could be On/Off/RelevantOnly
- SecAuditEngine RelevantOnly
-
- # Add a volume for the plugins directory
- extraVolumes:
- - name: plugins
- configMap:
- name: modsecurity-plugins
-
- # override the /etc/nginx/enable-owasp-modsecurity-crs/plugins with your ConfigMap
- extraVolumeMounts:
- - name: plugins
- mountPath: /etc/nginx/owasp-modsecurity-crs/plugins
-```
diff --git a/docs/user-guide/third-party-addons/opentelemetry.md b/docs/user-guide/third-party-addons/opentelemetry.md
index 255ba1ffa..a4bd8d060 100644
--- a/docs/user-guide/third-party-addons/opentelemetry.md
+++ b/docs/user-guide/third-party-addons/opentelemetry.md
@@ -1,304 +1,314 @@
-# OpenTelemetry
-
-Enables requests served by NGINX for distributed telemetry via The OpenTelemetry Project.
-
-Using the third party module [opentelemetry-cpp-contrib/nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx) the Ingress-Nginx Controller can configure NGINX to enable [OpenTelemetry](http://opentelemetry.io) instrumentation.
-By default this feature is disabled.
-
-Check out this demo showcasing OpenTelemetry in Ingress NGINX. The video provides an overview and
-practical demonstration of how OpenTelemetry can be utilized in Ingress NGINX for observability
-and monitoring purposes.
-
-
-
-
-
-
-
-Demo: OpenTelemetry in Ingress NGINX.
-
-## Usage
-
-To enable the instrumentation we must enable OpenTelemetry in the configuration ConfigMap:
-```yaml
-data:
- enable-opentelemetry: "true"
-```
-
-To enable or disable instrumentation for a single Ingress, use
-the `enable-opentelemetry` annotation:
-```yaml
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/enable-opentelemetry: "true"
-```
-
-We must also set the host to use when uploading traces:
-
-```yaml
-otlp-collector-host: "otel-coll-collector.otel.svc"
-```
-NOTE: While the option is called `otlp-collector-host`, you will need to point this to any backend that receives otlp-grpc.
-
-Next you will need to deploy a distributed telemetry system which uses OpenTelemetry.
-[opentelemetry-collector](https://github.com/open-telemetry/opentelemetry-collector), [Jaeger](https://www.jaegertracing.io/)
-[Tempo](https://github.com/grafana/tempo), and [zipkin](https://zipkin.io/)
-have been tested.
-
-Other optional configuration options:
-```yaml
-# specifies the name to use for the server span
-opentelemetry-operation-name
-
-# sets whether or not to trust incoming telemetry spans
-opentelemetry-trust-incoming-span
-
-# specifies the port to use when uploading traces, Default: 4317
-otlp-collector-port
-
-# specifies the service name to use for any traces created, Default: nginx
-otel-service-name
-
-# The maximum queue size. After the size is reached data are dropped.
-otel-max-queuesize
-
-# The delay interval in milliseconds between two consecutive exports.
-otel-schedule-delay-millis
-
-# How long the export can run before it is cancelled.
-otel-schedule-delay-millis
-
-# The maximum batch size of every export. It must be smaller or equal to maxQueueSize.
-otel-max-export-batch-size
-
-# specifies sample rate for any traces created, Default: 0.01
-otel-sampler-ratio
-
-# specifies the sampler to be used when sampling traces.
-# The available samplers are: AlwaysOn, AlwaysOff, TraceIdRatioBased, Default: AlwaysOff
-otel-sampler
-
-# Uses sampler implementation which by default will take a sample if parent Activity is sampled, Default: false
-otel-sampler-parent-based
-```
-
-Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
-```yaml
-kind: Ingress
-metadata:
- annotations:
- nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span: "true"
-```
-
-## Examples
-
-The following examples show how to deploy and test different distributed telemetry systems. These example can be performed using Docker Desktop.
-
-In the [esigo/nginx-example](https://github.com/esigo/nginx-example)
-GitHub repository is an example of a simple hello service:
-
-```mermaid
-graph TB
- subgraph Browser
- start["http://esigo.dev/hello/nginx"]
- end
-
- subgraph app
- sa[service-a]
- sb[service-b]
- sa --> |name: nginx| sb
- sb --> |hello nginx!| sa
- end
-
- subgraph otel
- otc["Otel Collector"]
- end
-
- subgraph observability
- tempo["Tempo"]
- grafana["Grafana"]
- backend["Jaeger"]
- zipkin["Zipkin"]
- end
-
- subgraph ingress-nginx
- ngx[nginx]
- end
-
- subgraph ngx[nginx]
- ng[nginx]
- om[OpenTelemetry module]
- end
-
- subgraph Node
- app
- otel
- observability
- ingress-nginx
- om --> |otlp-gRPC| otc --> |jaeger| backend
- otc --> |zipkin| zipkin
- otc --> |otlp-gRPC| tempo --> grafana
- sa --> |otlp-gRPC| otc
- sb --> |otlp-gRPC| otc
- start --> ng --> sa
- end
-```
-
-To install the example and collectors run:
-
-1. Enable OpenTelemetry and set the otlp-collector-host:
-
- ```yaml
- $ echo '
- apiVersion: v1
- kind: ConfigMap
- data:
- enable-opentelemetry: "true"
- opentelemetry-config: "/etc/nginx/opentelemetry.toml"
- opentelemetry-operation-name: "HTTP $request_method $service_name $uri"
- opentelemetry-trust-incoming-span: "true"
- otlp-collector-host: "otel-coll-collector.otel.svc"
- otlp-collector-port: "4317"
- otel-max-queuesize: "2048"
- otel-schedule-delay-millis: "5000"
- otel-max-export-batch-size: "512"
- otel-service-name: "nginx-proxy" # Opentelemetry resource name
- otel-sampler: "AlwaysOn" # Also: AlwaysOff, TraceIdRatioBased
- otel-sampler-ratio: "1.0"
- otel-sampler-parent-based: "false"
- metadata:
- name: ingress-nginx-controller
- namespace: ingress-nginx
- ' | kubectl replace -f -
- ```
-
-2. Deploy otel-collector, grafana and Jaeger backend:
-
- ```bash
- # add helm charts needed for grafana and OpenTelemetry collector
- helm repo add open-telemetry https://open-telemetry.github.io/opentelemetry-helm-charts
- helm repo add grafana https://grafana.github.io/helm-charts
- helm repo update
- # deploy cert-manager needed for OpenTelemetry collector operator
- kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.15.3/cert-manager.yaml
- # create observability namespace
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
- # install OpenTelemetry collector operator
- helm upgrade --install otel-collector-operator -n otel --create-namespace open-telemetry/opentelemetry-operator
- # deploy OpenTelemetry collector
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/collector.yaml
- # deploy Jaeger all-in-one
- kubectl apply -f https://github.com/jaegertracing/jaeger-operator/releases/download/v1.37.0/jaeger-operator.yaml -n observability
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/jaeger.yaml -n observability
- # deploy zipkin
- kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/zipkin.yaml -n observability
- # deploy tempo and grafana
- helm upgrade --install tempo grafana/tempo --create-namespace -n observability
- helm upgrade -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/grafana/grafana-values.yaml --install grafana grafana/grafana --create-namespace -n observability
- ```
-
-3. Build and deploy demo app:
-
- ```bash
- # build images
- make images
-
- # deploy demo app:
- make deploy-app
- ```
-
-4. Make a few requests to the Service:
-
- ```bash
- kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
- curl http://esigo.dev:8090/hello/nginx
-
-
- StatusCode : 200
- StatusDescription : OK
- Content : {"v":"hello nginx!"}
-
- RawContent : HTTP/1.1 200 OK
- Connection: keep-alive
- Content-Length: 21
- Content-Type: text/plain; charset=utf-8
- Date: Mon, 10 Oct 2022 17:43:33 GMT
-
- {"v":"hello nginx!"}
-
- Forms : {}
- Headers : {[Connection, keep-alive], [Content-Length, 21], [Content-Type, text/plain; charset=utf-8], [Date,
- Mon, 10 Oct 2022 17:43:33 GMT]}
- Images : {}
- InputFields : {}
- Links : {}
- ParsedHtml : System.__ComObject
- RawContentLength : 21
- ```
-
-5. View the Grafana UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/grafana 3000:80
- ```
- In the Grafana interface we can see the details:
- 
-
-6. View the Jaeger UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
- ```
- In the Jaeger interface we can see the details:
- 
-
-7. View the Zipkin UI:
-
- ```bash
- kubectl port-forward --namespace=observability service/zipkin 9411:9411
- ```
- In the Zipkin interface we can see the details:
- 
-
-## Migration from OpenTracing, Jaeger, Zipkin and Datadog
-
-If you are migrating from OpenTracing, Jaeger, Zipkin, or Datadog to OpenTelemetry,
-you may need to update various annotations and configurations. Here are the mappings
-for common annotations and configurations:
-
-### Annotations
-
-| Legacy | OpenTelemetry |
-|---------------------------------------------------------------|-----------------------------------------------------------------|
-| `nginx.ingress.kubernetes.io/enable-opentracing` | `nginx.ingress.kubernetes.io/enable-opentelemetry` |
-| `nginx.ingress.kubernetes.io/opentracing-trust-incoming-span` | `nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span` |
-
-### Configs
-
-| Legacy | OpenTelemetry |
-|---------------------------------------|----------------------------------------------|
-| `opentracing-operation-name` | `opentelemetry-operation-name` |
-| `opentracing-location-operation-name` | `opentelemetry-operation-name` |
-| `opentracing-trust-incoming-span` | `opentelemetry-trust-incoming-span` |
-| `zipkin-collector-port` | `otlp-collector-port` |
-| `zipkin-service-name` | `otel-service-name` |
-| `zipkin-sample-rate` | `otel-sampler-ratio` |
-| `jaeger-collector-port` | `otlp-collector-port` |
-| `jaeger-endpoint` | `otlp-collector-port`, `otlp-collector-host` |
-| `jaeger-service-name` | `otel-service-name` |
-| `jaeger-propagation-format` | `N/A` |
-| `jaeger-sampler-type` | `otel-sampler` |
-| `jaeger-sampler-param` | `otel-sampler` |
-| `jaeger-sampler-host` | `N/A` |
-| `jaeger-sampler-port` | `N/A` |
-| `jaeger-trace-context-header-name` | `N/A` |
-| `jaeger-debug-header` | `N/A` |
-| `jaeger-baggage-header` | `N/A` |
-| `jaeger-tracer-baggage-header-prefix` | `N/A` |
-| `datadog-collector-port` | `otlp-collector-port` |
-| `datadog-service-name` | `otel-service-name` |
-| `datadog-environment` | `N/A` |
-| `datadog-operation-name-override` | `N/A` |
-| `datadog-priority-sampling` | `otel-sampler` |
-| `datadog-sample-rate` | `otel-sampler-ratio` |
+# OpenTelemetry
+
+Enables requests served by NGINX for distributed telemetry via The OpenTelemetry Project.
+
+Using the third party module [opentelemetry-cpp-contrib/nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx) the Ingress-Nginx Controller can configure NGINX to enable [OpenTelemetry](http://opentelemetry.io) instrumentation.
+By default this feature is disabled.
+
+Check out this demo showcasing OpenTelemetry in Ingress NGINX. The video provides an overview and
+practical demonstration of how OpenTelemetry can be utilized in Ingress NGINX for observability
+and monitoring purposes.
+
+
+
+
+
+
+
+Demo: OpenTelemetry in Ingress NGINX.
+
+## Usage
+
+To enable the instrumentation we must enable OpenTelemetry in the configuration ConfigMap:
+```yaml
+data:
+ enable-opentelemetry: "true"
+```
+
+To enable or disable instrumentation for a single Ingress, use
+the `enable-opentelemetry` annotation:
+```yaml
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/enable-opentelemetry: "true"
+```
+
+We must also set the host to use when uploading traces:
+
+```yaml
+otlp-collector-host: "otel-coll-collector.otel.svc"
+```
+NOTE: While the option is called `otlp-collector-host`, you will need to point this to any backend that receives otlp-grpc.
+
+Next you will need to deploy a distributed telemetry system which uses OpenTelemetry.
+[opentelemetry-collector](https://github.com/open-telemetry/opentelemetry-collector), [Jaeger](https://www.jaegertracing.io/)
+[Tempo](https://github.com/grafana/tempo), and [zipkin](https://zipkin.io/)
+have been tested.
+
+Other optional configuration options:
+```yaml
+# specifies the name to use for the server span
+opentelemetry-operation-name
+
+# sets whether or not to trust incoming telemetry spans
+opentelemetry-trust-incoming-span
+
+# specifies the port to use when uploading traces, Default: 4317
+otlp-collector-port
+
+# specifies the service name to use for any traces created, Default: nginx
+otel-service-name
+
+# The maximum queue size. After the size is reached data are dropped.
+otel-max-queuesize
+
+# The delay interval in milliseconds between two consecutive exports.
+otel-schedule-delay-millis
+
+# How long the export can run before it is cancelled.
+otel-schedule-delay-millis
+
+# The maximum batch size of every export. It must be smaller or equal to maxQueueSize.
+otel-max-export-batch-size
+
+# specifies sample rate for any traces created, Default: 0.01
+otel-sampler-ratio
+
+# specifies the sampler to be used when sampling traces.
+# The available samplers are: AlwaysOn, AlwaysOff, TraceIdRatioBased, Default: AlwaysOff
+otel-sampler
+
+# Uses sampler implementation which by default will take a sample if parent Activity is sampled, Default: false
+otel-sampler-parent-based
+```
+
+Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
+```yaml
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/opentelemetry-trust-incoming-span: "true"
+```
+
+## Examples
+
+The following examples show how to deploy and test different distributed telemetry systems. These example can be performed using Docker Desktop.
+
+In the [esigo/nginx-example](https://github.com/esigo/nginx-example)
+GitHub repository is an example of a simple hello service:
+
+```mermaid
+graph TB
+ subgraph Browser
+ start["http://esigo.dev/hello/nginx"]
+ end
+
+ subgraph app
+ sa[service-a]
+ sb[service-b]
+ sa --> |name: nginx| sb
+ sb --> |hello nginx!| sa
+ end
+
+ subgraph otel
+ otc["Otel Collector"]
+ end
+
+ subgraph observability
+ tempo["Tempo"]
+ grafana["Grafana"]
+ backend["Jaeger"]
+ zipkin["Zipkin"]
+ end
+
+ subgraph ingress-nginx
+ ngx[nginx]
+ end
+
+ subgraph ngx[nginx]
+ ng[nginx]
+ om[OpenTelemetry module]
+ end
+
+ subgraph Node
+ app
+ otel
+ observability
+ ingress-nginx
+ om --> |otlp-gRPC| otc --> |jaeger| backend
+ otc --> |zipkin| zipkin
+ otc --> |otlp-gRPC| tempo --> grafana
+ sa --> |otlp-gRPC| otc
+ sb --> |otlp-gRPC| otc
+ start --> ng --> sa
+ end
+```
+
+To install the example and collectors run:
+
+1. Enable Ingress addon with:
+
+ ```yaml
+ opentelemetry:
+ enabled: true
+ image: registry.k8s.io/ingress-nginx/opentelemetry:v20230527@sha256:fd7ec835f31b7b37187238eb4fdad4438806e69f413a203796263131f4f02ed0
+ containerSecurityContext:
+ allowPrivilegeEscalation: false
+ ```
+
+2. Enable OpenTelemetry and set the otlp-collector-host:
+
+ ```yaml
+ $ echo '
+ apiVersion: v1
+ kind: ConfigMap
+ data:
+ enable-opentelemetry: "true"
+ opentelemetry-config: "/etc/ingress-controller/telemetry/opentelemetry.toml"
+ opentelemetry-operation-name: "HTTP $request_method $service_name $uri"
+ opentelemetry-trust-incoming-span: "true"
+ otlp-collector-host: "otel-coll-collector.otel.svc"
+ otlp-collector-port: "4317"
+ otel-max-queuesize: "2048"
+ otel-schedule-delay-millis: "5000"
+ otel-max-export-batch-size: "512"
+ otel-service-name: "nginx-proxy" # Opentelemetry resource name
+ otel-sampler: "AlwaysOn" # Also: AlwaysOff, TraceIdRatioBased
+ otel-sampler-ratio: "1.0"
+ otel-sampler-parent-based: "false"
+ metadata:
+ name: ingress-nginx-controller
+ namespace: ingress-nginx
+ ' | kubectl replace -f -
+ ```
+
+4. Deploy otel-collector, grafana and Jaeger backend:
+
+ ```bash
+ # add helm charts needed for grafana and OpenTelemetry collector
+ helm repo add open-telemetry https://open-telemetry.github.io/opentelemetry-helm-charts
+ helm repo add grafana https://grafana.github.io/helm-charts
+ helm repo update
+ # deply cert-manager needed for OpenTelemetry collector operator
+ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.9.1/cert-manager.yaml
+ # create observability namespace
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/namespace.yaml
+ # install OpenTelemetry collector operator
+ helm upgrade --install otel-collector-operator -n otel --create-namespace open-telemetry/opentelemetry-operator
+ # deploy OpenTelemetry collector
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/collector.yaml
+ # deploy Jaeger all-in-one
+ kubectl apply -f https://github.com/jaegertracing/jaeger-operator/releases/download/v1.37.0/jaeger-operator.yaml -n observability
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/jaeger.yaml -n observability
+ # deploy zipkin
+ kubectl apply -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/zipkin.yaml -n observability
+ # deploy tempo and grafana
+ helm upgrade --install tempo grafana/tempo --create-namespace -n observability
+ helm upgrade -f https://raw.githubusercontent.com/esigo/nginx-example/main/observability/grafana/grafana-values.yaml --install grafana grafana/grafana --create-namespace -n observability
+ ```
+
+3. Build and deploy demo app:
+
+ ```bash
+ # build images
+ make images
+
+ # deploy demo app:
+ make deploy-app
+ ```
+
+5. Make a few requests to the Service:
+
+ ```bash
+ kubectl port-forward --namespace=ingress-nginx service/ingress-nginx-controller 8090:80
+ curl http://esigo.dev:8090/hello/nginx
+
+
+ StatusCode : 200
+ StatusDescription : OK
+ Content : {"v":"hello nginx!"}
+
+ RawContent : HTTP/1.1 200 OK
+ Connection: keep-alive
+ Content-Length: 21
+ Content-Type: text/plain; charset=utf-8
+ Date: Mon, 10 Oct 2022 17:43:33 GMT
+
+ {"v":"hello nginx!"}
+
+ Forms : {}
+ Headers : {[Connection, keep-alive], [Content-Length, 21], [Content-Type, text/plain; charset=utf-8], [Date,
+ Mon, 10 Oct 2022 17:43:33 GMT]}
+ Images : {}
+ InputFields : {}
+ Links : {}
+ ParsedHtml : System.__ComObject
+ RawContentLength : 21
+ ```
+
+6. View the Grafana UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/grafana 3000:80
+ ```
+ In the Grafana interface we can see the details:
+ 
+
+7. View the Jaeger UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/jaeger-all-in-one-query 16686:16686
+ ```
+ In the Jaeger interface we can see the details:
+ 
+
+8. View the Zipkin UI:
+
+ ```bash
+ kubectl port-forward --namespace=observability service/zipkin 9411:9411
+ ```
+ In the Zipkin interface we can see the details:
+ 
+
+## Migration from OpenTracing, Jaeger, Zipkin and Datadog
+
+If you are migrating from OpenTracing, Jaeger, Zipkin, or Datadog to OpenTelemetry,
+you may need to update various annotations and configurations. Here are the mappings
+for common annotations and configurations:
+
+### Annotations
+
+| Legacy | OpenTelemetry |
+|--------------------------------------------------|--------------------------------------------------|
+| `nginx.ingress.kubernetes.io/enable-opentracing` | `nginx.ingress.kubernetes.io/enable-opentelemetry` |
+| `opentracing-trust-incoming-span` | `opentracing-trust-incoming-span` |
+
+### Configs
+
+| Legacy | OpenTelemetry |
+|---------------------------------------|----------------------------------------------|
+| `opentracing-operation-name` | `opentelemetry-operation-name` |
+| `opentracing-location-operation-name` | `opentelemetry-operation-name` |
+| `opentracing-trust-incoming-span` | `opentelemetry-trust-incoming-span` |
+| `zipkin-collector-port` | `otlp-collector-port` |
+| `zipkin-service-name` | `otel-service-name` |
+| `zipkin-sample-rate` | `otel-sampler-ratio` |
+| `jaeger-collector-port` | `otlp-collector-port` |
+| `jaeger-endpoint` | `otlp-collector-port`, `otlp-collector-host` |
+| `jaeger-service-name` | `otel-service-name` |
+| `jaeger-propagation-format` | `N/A` |
+| `jaeger-sampler-type` | `otel-sampler` |
+| `jaeger-sampler-param` | `otel-sampler` |
+| `jaeger-sampler-host` | `N/A` |
+| `jaeger-sampler-port` | `N/A` |
+| `jaeger-trace-context-header-name` | `N/A` |
+| `jaeger-debug-header` | `N/A` |
+| `jaeger-baggage-header` | `N/A` |
+| `jaeger-tracer-baggage-header-prefix` | `N/A` |
+| `datadog-collector-port` | `otlp-collector-port` |
+| `datadog-service-name` | `otel-service-name` |
+| `datadog-environment` | `N/A` |
+| `datadog-operation-name-override` | `N/A` |
+| `datadog-priority-sampling` | `otel-sampler` |
+| `datadog-sample-rate` | `otel-sampler-ratio` |
diff --git a/docs/user-guide/third-party-addons/opentracing.md b/docs/user-guide/third-party-addons/opentracing.md
new file mode 100644
index 000000000..f5ec59faf
--- /dev/null
+++ b/docs/user-guide/third-party-addons/opentracing.md
@@ -0,0 +1,263 @@
+# OpenTracing
+
+Enables requests served by NGINX for distributed tracing via The OpenTracing Project.
+
+Using the third party module [opentracing-contrib/nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing) the Ingress-Nginx Controller can configure NGINX to enable [OpenTracing](http://opentracing.io) instrumentation.
+By default this feature is disabled.
+
+## Usage
+
+To enable the instrumentation we must enable OpenTracing in the configuration ConfigMap:
+```
+data:
+ enable-opentracing: "true"
+```
+
+To enable or disable instrumentation for a single Ingress, use
+the `enable-opentracing` annotation:
+```
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/enable-opentracing: "true"
+```
+
+We must also set the host to use when uploading traces:
+
+```
+zipkin-collector-host: zipkin.default.svc.cluster.local
+jaeger-collector-host: jaeger-agent.default.svc.cluster.local
+datadog-collector-host: datadog-agent.default.svc.cluster.local
+```
+NOTE: While the option is called `jaeger-collector-host`, you will need to point this to a `jaeger-agent`, and not the `jaeger-collector` component.
+Alternatively, you can set `jaeger-endpoint` and specify the full endpoint for uploading traces. This will use TCP and should be used for a collector rather than an agent.
+
+Next you will need to deploy a distributed tracing system which uses OpenTracing.
+[Zipkin](https://github.com/openzipkin/zipkin) and
+[Jaeger](https://github.com/jaegertracing/jaeger) and
+[Datadog](https://github.com/DataDog/dd-opentracing-cpp)
+have been tested.
+
+Other optional configuration options:
+```
+# specifies the name to use for the server span
+opentracing-operation-name
+
+# specifies specifies the name to use for the location span
+opentracing-location-operation-name
+
+# sets whether or not to trust incoming tracing spans
+opentracing-trust-incoming-span
+
+# specifies the port to use when uploading traces, Default: 9411
+zipkin-collector-port
+
+# specifies the service name to use for any traces created, Default: nginx
+zipkin-service-name
+
+# specifies sample rate for any traces created, Default: 1.0
+zipkin-sample-rate
+
+# specifies the port to use when uploading traces, Default: 6831
+jaeger-collector-port
+
+# specifies the endpoint to use when uploading traces to a collector instead of an agent
+jaeger-endpoint
+
+# specifies the service name to use for any traces created, Default: nginx
+jaeger-service-name
+
+# specifies the traceparent/tracestate propagation format
+jaeger-propagation-format
+
+# specifies the sampler to be used when sampling traces.
+# The available samplers are: const, probabilistic, ratelimiting, remote, Default: const
+jaeger-sampler-type
+
+# specifies the argument to be passed to the sampler constructor, Default: 1
+jaeger-sampler-param
+
+# Specifies the custom remote sampler host to be passed to the sampler constructor. Must be a valid URL.
+# Default: http://127.0.0.1
+jaeger-sampler-host
+
+# Specifies the custom remote sampler port to be passed to the sampler constructor. Must be a number. Default: 5778
+jaeger-sampler-port
+
+# Specifies the header name used for passing trace context. Must be a string. Default: uber-trace-id
+jaeger-trace-context-header-name
+
+# Specifies the header name used for force sampling. Must be a string. Default: jaeger-debug-id
+jaeger-debug-header
+
+# Specifies the header name used to submit baggage if there is no root span. Must be a string. Default: jaeger-baggage
+jaeger-baggage-header
+
+# Specifies the header prefix used to propagate baggage. Must be a string. Default: uberctx-
+jaeger-tracer-baggage-header-prefix
+
+# specifies the port to use when uploading traces, Default 8126
+datadog-collector-port
+
+# specifies the service name to use for any traces created, Default: nginx
+datadog-service-name
+
+# specifies the environment this trace belongs to, Default: prod
+datadog-environment
+
+# specifies the operation name to use for any traces collected, Default: nginx.handle
+datadog-operation-name-override
+
+# Specifies to use client-side sampling for distributed priority sampling and ignore sample rate, Default: true
+datadog-priority-sampling
+
+# specifies sample rate for any traces created, Default: 1.0
+datadog-sample-rate
+```
+
+All these options (including host) allow environment variables, such as `$HOSTNAME` or `$HOST_IP`. In the case of Jaeger, if you have a Jaeger agent running on each machine in your cluster, you can use something like `$HOST_IP` (which can be 'mounted' with the `status.hostIP` fieldpath, as described [here](https://kubernetes.io/docs/tasks/inject-data-application/downward-api-volume-expose-pod-information/#capabilities-of-the-downward-api)) to make sure traces will be sent to the local agent.
+
+
+Note that you can also set whether to trust incoming spans (global default is true) per-location using annotations like the following:
+```
+kind: Ingress
+metadata:
+ annotations:
+ nginx.ingress.kubernetes.io/opentracing-trust-incoming-span: "true"
+```
+
+## Examples
+
+The following examples show how to deploy and test different distributed tracing systems. These example can be performed using Minikube.
+
+### Zipkin
+
+In the [rnburn/zipkin-date-server](https://github.com/rnburn/zipkin-date-server)
+GitHub repository is an example of a dockerized date service. To install the example and Zipkin collector run:
+
+```
+kubectl create -f https://raw.githubusercontent.com/rnburn/zipkin-date-server/master/kubernetes/zipkin.yaml
+kubectl create -f https://raw.githubusercontent.com/rnburn/zipkin-date-server/master/kubernetes/deployment.yaml
+```
+
+Also we need to configure the Ingress-NGINX controller ConfigMap with the required values:
+
+```
+$ echo '
+apiVersion: v1
+kind: ConfigMap
+data:
+ enable-opentracing: "true"
+ zipkin-collector-host: zipkin.default.svc.cluster.local
+metadata:
+ name: ingress-nginx-controller
+ namespace: kube-system
+' | kubectl replace -f -
+```
+
+In the Zipkin interface we can see the details:
+
+
+### Jaeger
+
+1. Enable Ingress addon in Minikube:
+ ```
+ $ minikube addons enable ingress
+ ```
+
+2. Add Minikube IP to /etc/hosts:
+ ```
+ $ echo "$(minikube ip) example.com" | sudo tee -a /etc/hosts
+ ```
+
+3. Apply a basic Service and Ingress Resource:
+ ```
+ # Create Echoheaders Deployment
+ $ kubectl run echoheaders --image=registry.k8s.io/echoserver:1.4 --replicas=1 --port=8080
+
+ # Expose as a Cluster-IP
+ $ kubectl expose deployment echoheaders --port=80 --target-port=8080 --name=echoheaders-x
+
+ # Apply the Ingress Resource
+ $ echo '
+ apiVersion: networking.k8s.io/v1
+ kind: Ingress
+ metadata:
+ name: echo-ingress
+ spec:
+ ingressClassName: nginx
+ rules:
+ - host: example.com
+ http:
+ paths:
+ - path: /echo
+ pathType: Prefix
+ backend:
+ service:
+ name: echoheaders-x
+ port:
+ number: 80
+ ' | kubectl apply -f -
+ ```
+
+4. Enable OpenTracing and set the jaeger-collector-host:
+ ```
+ $ echo '
+ apiVersion: v1
+ kind: ConfigMap
+ data:
+ enable-opentracing: "true"
+ jaeger-collector-host: jaeger-agent.default.svc.cluster.local
+ metadata:
+ name: ingress-nginx-controller
+ namespace: kube-system
+ ' | kubectl replace -f -
+ ```
+
+5. Apply the Jaeger All-In-One Template:
+ ```
+ $ kubectl apply -f https://raw.githubusercontent.com/jaegertracing/jaeger-kubernetes/master/all-in-one/jaeger-all-in-one-template.yml
+ ```
+
+6. Make a few requests to the Service:
+ ```
+ $ curl example.com/echo -d "meow"
+
+ CLIENT VALUES:
+ client_address=172.17.0.5
+ command=POST
+ real path=/echo
+ query=nil
+ request_version=1.1
+ request_uri=http://example.com:8080/echo
+
+ SERVER VALUES:
+ server_version=nginx: 1.10.0 - lua: 10001
+
+ HEADERS RECEIVED:
+ accept=*/*
+ connection=close
+ content-length=4
+ content-type=application/x-www-form-urlencoded
+ host=example.com
+ user-agent=curl/7.54.0
+ x-forwarded-for=192.168.99.1
+ x-forwarded-host=example.com
+ x-forwarded-port=80
+ x-forwarded-proto=http
+ x-original-uri=/echo
+ x-real-ip=192.168.99.1
+ x-scheme=http
+ BODY:
+ meow
+ ```
+
+7. View the Jaeger UI:
+ ```
+ $ minikube service jaeger-query --url
+
+ http://192.168.99.100:30183
+ ```
+
+ In the Jaeger interface we can see the details:
+ 
diff --git a/docs/user-guide/tls.md b/docs/user-guide/tls.md
index eaf33e210..f6fee6895 100644
--- a/docs/user-guide/tls.md
+++ b/docs/user-guide/tls.md
@@ -23,7 +23,7 @@ The resulting secret will be of type `kubernetes.io/tls`.
## Host names
-Ensure that the relevant [ingress rules specify a matching hostname](https://kubernetes.io/docs/concepts/services-networking/ingress/#tls).
+Ensure that the relevant [ingress rules specify a matching host name](https://kubernetes.io/docs/concepts/services-networking/ingress/#tls).
## Default SSL Certificate
@@ -41,9 +41,8 @@ If this flag is not provided NGINX will use a self-signed certificate.
For instance, if you have a TLS secret `foo-tls` in the `default` namespace,
add `--default-ssl-certificate=default/foo-tls` in the `nginx-controller` deployment.
-If the `tls:` section is not set, NGINX will provide the default certificate but will not force HTTPS redirect.
-
-On the other hand, if the `tls:` section is set - even without specifying a `secretName` option - NGINX will force HTTPS redirect.
+The default certificate will also be used for ingress `tls:` sections that do not
+have a `secretName` option.
To force redirects for Ingresses that do not specify a TLS-block at all, take a look at `force-ssl-redirect` in [ConfigMap][ConfigMap].
@@ -128,6 +127,9 @@ ingress-nginx defaults to using TLS 1.2 and 1.3 only, with a [secure set of TLS
### Legacy TLS
+!!! warning
+ TLSv1, TLSv1.1 are not supported in ingress-nginx v1.6.0 and above.
+
The default configuration, though secure, does not support some older browsers and operating systems.
For instance, TLS 1.1+ is only enabled by default from Android 5.0 on. At the time of writing,
@@ -146,7 +148,7 @@ metadata:
name: nginx-config
data:
ssl-ciphers: "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
- ssl-protocols: "TLSv1.2 TLSv1.3"
+ ssl-protocols: "TLSv1 TLSv1.1 TLSv1.2 TLSv1.3"
```
diff --git a/ginkgo_upgrade.md b/ginkgo_upgrade.md
index 87e6bd9fd..57db0f28f 100644
--- a/ginkgo_upgrade.md
+++ b/ginkgo_upgrade.md
@@ -49,7 +49,7 @@ Promoting the images basically means that images, that were pushed to staging co
```
...
- pushing manifest for us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx/controller:v1.0.2@sha256:e15fac6e8474d77e1f017edc33d804ce72a184e3c0a30963b2a0d7f0b89f6b16
+ pushing manifest for gcr.io/k8s-staging-ingress-nginx/controller:v1.0.2@sha256:e15fac6e8474d77e1f017edc33d804ce72a184e3c0a30963b2a0d7f0b89f6b16
...
```
@@ -65,11 +65,11 @@ Promoting the images basically means that images, that were pushed to staging co
- Create a branch in your fork, named as the issue number for this release
-- In the related branch, of your fork, edit the file registry.k8s.io/images/k8s-staging-ingress-nginx/images.yaml.
+- In the related branch, of your fork, edit the file k8s.gcr.io/images/k8s-staging-ingress-nginx/images.yaml.
- For making it easier, you can edit your branch directly in the browser. But be careful about making any mistake.
-- Insert the sha(s) & the tag(s), in a new line, in this file [Project kubernetes/k8s.io Ingress-Nginx-Controller Images](https://github.com/kubernetes/k8s.io/blob/main/registry.k8s.io/images/k8s-staging-ingress-nginx/images.yaml) Look at this [example PR and the diff](https://github.com/kubernetes/k8s.io/pull/4499) to see how it was done before
+- Insert the sha(s) & the tag(s), in a new line, in this file [Project kubernetes/k8s.io Ingress-Nginx-Controller Images](https://github.com/kubernetes/k8s.io/blob/main/k8s.gcr.io/images/k8s-staging-ingress-nginx/images.yaml) Look at this [example PR and the diff](https://github.com/kubernetes/k8s.io/pull/4499) to see how it was done before
- Save and commit
@@ -128,4 +128,4 @@ Promoting the images basically means that images, that were pushed to staging co
- Finally merge the PR.
-## END ##
+## END ##
\ No newline at end of file
diff --git a/go.mod b/go.mod
index 34584bbf9..0868653cf 100644
--- a/go.mod
+++ b/go.mod
@@ -1,137 +1,127 @@
module k8s.io/ingress-nginx
-go 1.23.6
+go 1.21.5
require (
- dario.cat/mergo v1.0.1
+ dario.cat/mergo v1.0.0
github.com/armon/go-proxyproto v0.1.0
github.com/eapache/channels v1.1.0
- github.com/fsnotify/fsnotify v1.8.0
+ github.com/fsnotify/fsnotify v1.7.0
github.com/json-iterator/go v1.1.12
github.com/kylelemons/godebug v1.1.0
github.com/mitchellh/go-ps v1.0.0
github.com/mitchellh/hashstructure/v2 v2.0.2
github.com/mitchellh/mapstructure v1.5.0
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c
- github.com/ncabatoff/process-exporter v0.8.5
- github.com/onsi/ginkgo/v2 v2.22.2
- github.com/opencontainers/runc v1.2.5
- github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2
- github.com/prometheus/client_golang v1.20.5
- github.com/prometheus/client_model v0.6.1
- github.com/prometheus/common v0.62.0
- github.com/spf13/cobra v1.9.1
- github.com/spf13/pflag v1.0.6
- github.com/stretchr/testify v1.10.0
+ github.com/ncabatoff/process-exporter v0.7.10
+ github.com/onsi/ginkgo/v2 v2.13.1
+ github.com/opencontainers/runc v1.1.10
+ github.com/pmezard/go-difflib v1.0.0
+ github.com/prometheus/client_golang v1.17.0
+ github.com/prometheus/client_model v0.5.0
+ github.com/prometheus/common v0.45.0
+ github.com/spf13/cobra v1.8.0
+ github.com/spf13/pflag v1.0.5
+ github.com/stretchr/testify v1.8.4
github.com/yudai/gojsondiff v1.0.0
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30
- golang.org/x/crypto v0.33.0
- google.golang.org/grpc v1.70.0
- google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab
+ golang.org/x/crypto v0.17.0
+ google.golang.org/grpc v1.60.1
+ google.golang.org/grpc/examples v0.0.0-20221220003428-4f16fbe410f7
gopkg.in/go-playground/pool.v3 v3.1.1
gopkg.in/mcuadros/go-syslog.v2 v2.3.0
- k8s.io/api v0.32.2
- k8s.io/apiextensions-apiserver v0.32.2
- k8s.io/apimachinery v0.32.2
- k8s.io/apiserver v0.32.2
- k8s.io/cli-runtime v0.32.2
- k8s.io/client-go v0.32.2
- k8s.io/code-generator v0.32.2
- k8s.io/component-base v0.32.2
- k8s.io/klog/v2 v2.130.1
+ k8s.io/api v0.27.6
+ k8s.io/apiextensions-apiserver v0.27.6
+ k8s.io/apimachinery v0.27.6
+ k8s.io/apiserver v0.27.6
+ k8s.io/cli-runtime v0.27.6
+ k8s.io/client-go v0.27.6
+ k8s.io/code-generator v0.27.6
+ k8s.io/component-base v0.27.6
+ k8s.io/klog/v2 v2.100.1
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732
- sigs.k8s.io/controller-runtime v0.20.2
- sigs.k8s.io/mdtoc v1.4.0
+ sigs.k8s.io/controller-runtime v0.14.6
+ sigs.k8s.io/mdtoc v1.1.0
)
require (
- github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be // indirect
- github.com/fxamacker/cbor/v2 v2.7.0 // indirect
- github.com/klauspost/compress v1.17.9 // indirect
- github.com/moby/sys/userns v0.1.0 // indirect
- github.com/x448/float16 v0.8.4 // indirect
- go.opentelemetry.io/otel v1.32.0 // indirect
- go.opentelemetry.io/otel/trace v1.32.0 // indirect
- gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
- sigs.k8s.io/release-utils v0.8.3 // indirect
-)
-
-require (
- github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c
- github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 // indirect
github.com/BurntSushi/toml v1.3.2 // indirect
github.com/beorn7/perks v1.0.1 // indirect
github.com/blang/semver/v4 v4.0.0 // indirect
- github.com/cespare/xxhash/v2 v2.3.0 // indirect
- github.com/coreos/go-systemd/v22 v22.5.0 // indirect
- github.com/cyphar/filepath-securejoin v0.4.1 // indirect
- github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
+ github.com/cespare/xxhash/v2 v2.2.0 // indirect
+ github.com/coreos/go-systemd/v22 v22.4.0 // indirect
+ github.com/cyphar/filepath-securejoin v0.2.4 // indirect
+ github.com/davecgh/go-spew v1.1.1 // indirect
github.com/eapache/queue v1.1.0 // indirect
- github.com/emicklei/go-restful/v3 v3.12.0 // indirect
- github.com/evanphx/json-patch/v5 v5.9.11 // indirect
+ github.com/emicklei/go-restful/v3 v3.10.2 // indirect
+ github.com/evanphx/json-patch v4.12.0+incompatible // indirect
+ github.com/evanphx/json-patch/v5 v5.6.0 // indirect
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa // indirect
- github.com/go-errors/errors v1.5.1 // indirect
- github.com/go-logr/logr v1.4.2 // indirect
- github.com/go-openapi/jsonpointer v0.21.0 // indirect
- github.com/go-openapi/jsonreference v0.21.0 // indirect
- github.com/go-openapi/swag v0.23.0 // indirect
- github.com/go-task/slim-sprig/v3 v3.0.0 // indirect
- github.com/godbus/dbus/v5 v5.1.0 // indirect
+ github.com/go-errors/errors v1.4.2 // indirect
+ github.com/go-logr/logr v1.3.0 // indirect
+ github.com/go-openapi/jsonpointer v0.19.6 // indirect
+ github.com/go-openapi/jsonreference v0.20.1 // indirect
+ github.com/go-openapi/swag v0.22.3 // indirect
+ github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 // indirect
+ github.com/godbus/dbus/v5 v5.0.6 // indirect
github.com/gogo/protobuf v1.3.2 // indirect
- github.com/golang/protobuf v1.5.4 // indirect
- github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0 // indirect
- github.com/google/btree v1.1.3 // indirect
- github.com/google/gnostic-models v0.6.8 // indirect
+ github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
+ github.com/golang/protobuf v1.5.3 // indirect
+ github.com/gomarkdown/markdown v0.0.0-20210514010506-3b9f47219fe7 // indirect
+ github.com/google/btree v1.0.1 // indirect
+ github.com/google/gnostic v0.5.7-v3refs // indirect
github.com/google/go-cmp v0.6.0 // indirect
- github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad // indirect
+ github.com/google/gofuzz v1.1.0 // indirect
+ github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98 // indirect
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
- github.com/google/uuid v1.6.0 // indirect
- github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
+ github.com/google/uuid v1.3.1 // indirect
+ github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7 // indirect
+ github.com/imdario/mergo v0.3.6 // indirect
github.com/inconshreveable/mousetrap v1.1.0 // indirect
github.com/josharian/intern v1.0.0 // indirect
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de // indirect
github.com/mailru/easyjson v0.7.7 // indirect
github.com/mattn/go-colorable v0.1.13 // indirect
- github.com/mattn/go-isatty v0.0.19 // indirect
+ github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0 // indirect
github.com/mmarkdown/mmark v2.0.40+incompatible // indirect
- github.com/moby/sys/mountinfo v0.7.1 // indirect
- github.com/moby/term v0.5.0 // indirect
+ github.com/moby/sys/mountinfo v0.5.0 // indirect
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
github.com/ncabatoff/go-seq v0.0.0-20180805175032-b08ef85ed833 // indirect
github.com/onsi/ginkgo v1.16.5 // indirect
- github.com/opencontainers/runtime-spec v1.2.0 // indirect
+ github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417 // indirect
github.com/peterbourgon/diskv v2.0.1+incompatible // indirect
github.com/pkg/errors v0.9.1 // indirect
- github.com/prometheus/procfs v0.15.1 // indirect
- github.com/sergi/go-diff v1.3.1 // indirect
- github.com/sirupsen/logrus v1.9.3 // indirect
- github.com/xlab/treeprint v1.2.0 // indirect
+ github.com/prometheus/procfs v0.11.1 // indirect
+ github.com/sergi/go-diff v1.1.0 // indirect
+ github.com/sirupsen/logrus v1.9.0 // indirect
+ github.com/xlab/treeprint v1.1.0 // indirect
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 // indirect
github.com/yudai/pp v2.0.1+incompatible // indirect
- golang.org/x/mod v0.22.0 // indirect
- golang.org/x/net v0.33.0 // indirect
- golang.org/x/oauth2 v0.24.0 // indirect
- golang.org/x/sync v0.11.0 // indirect
- golang.org/x/sys v0.30.0 // indirect
- golang.org/x/term v0.29.0 // indirect
- golang.org/x/text v0.22.0 // indirect
- golang.org/x/time v0.7.0 // indirect
- golang.org/x/tools v0.28.0 // indirect
- google.golang.org/genproto/googleapis/rpc v0.0.0-20241202173237-19429a94021a // indirect
- google.golang.org/protobuf v1.36.1 // indirect
+ go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5 // indirect
+ golang.org/x/mod v0.13.0 // indirect
+ golang.org/x/net v0.17.0 // indirect
+ golang.org/x/oauth2 v0.13.0 // indirect
+ golang.org/x/sys v0.15.0 // indirect
+ golang.org/x/term v0.15.0 // indirect
+ golang.org/x/text v0.14.0 // indirect
+ golang.org/x/time v0.3.0 // indirect
+ golang.org/x/tools v0.14.0 // indirect
+ google.golang.org/appengine v1.6.8 // indirect
+ google.golang.org/genproto/googleapis/rpc v0.0.0-20231002182017-d307bd883b97 // indirect
+ google.golang.org/protobuf v1.31.0 // indirect
gopkg.in/go-playground/assert.v1 v1.2.1 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
+ gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
- k8s.io/gengo/v2 v2.0.0-20240911193312-2b36238f13e9 // indirect
- k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f // indirect
- k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 // indirect
- sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 // indirect
- sigs.k8s.io/kustomize/api v0.18.0 // indirect
- sigs.k8s.io/kustomize/kyaml v0.18.1 // indirect
- sigs.k8s.io/structured-merge-diff/v4 v4.4.2 // indirect
- sigs.k8s.io/yaml v1.4.0 // indirect
+ k8s.io/gengo v0.0.0-20220902162205-c0856e24416d // indirect
+ k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f // indirect
+ k8s.io/utils v0.0.0-20230209194617-a36077c30491 // indirect
+ sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
+ sigs.k8s.io/kustomize/api v0.13.2 // indirect
+ sigs.k8s.io/kustomize/kyaml v0.14.1 // indirect
+ sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect
+ sigs.k8s.io/yaml v1.3.0 // indirect
)
diff --git a/go.sum b/go.sum
index 6e933d349..bb59dc862 100644
--- a/go.sum
+++ b/go.sum
@@ -1,115 +1,232 @@
-dario.cat/mergo v1.0.1 h1:Ra4+bf83h2ztPIQYNP99R6m+Y7KfnARDfID+a+vLl4s=
-dario.cat/mergo v1.0.1/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
-github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c h1:uhBf0CHXi7nCFZXxHV7l1cBcYFEEVRK4FYxvm1l9lKg=
-github.com/Anddd7/pb v0.0.0-20240425032658-369b0f6a404c/go.mod h1:vYWKbnXd2KAZHUECLPzSE0Er3FgiEmOdPtxwSIRihck=
-github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 h1:L/gRVlceqvL25UVaW/CKtUDjefjrs0SPonmDGUVOYP0=
-github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=
+cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU=
+cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
+cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc=
+cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0=
+cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To=
+cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4=
+cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M=
+cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc=
+cloud.google.com/go v0.56.0/go.mod h1:jr7tqZxxKOVYizybht9+26Z/gUq7tiRzu+ACVAMbKVk=
+cloud.google.com/go v0.57.0/go.mod h1:oXiQ6Rzq3RAkkY7N6t3TcE6jE+CIBBbA36lwQ1JyzZs=
+cloud.google.com/go v0.62.0/go.mod h1:jmCYTdRCQuc1PHIIJ/maLInMho30T/Y0M4hTdTShOYc=
+cloud.google.com/go v0.65.0/go.mod h1:O5N8zS7uWy9vkA9vayVHs65eM1ubvY4h553ofrNHObY=
+cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o=
+cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE=
+cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc=
+cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
+cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
+cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
+cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
+cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
+cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
+cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw=
+cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA=
+cloud.google.com/go/pubsub v1.3.1/go.mod h1:i+ucay31+CNRpDW4Lu78I4xXG+O1r/MAHgjpRVR+TSU=
+cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw=
+cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos=
+cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk=
+cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs=
+cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0=
+dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
+dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
+dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
github.com/BurntSushi/toml v1.3.2 h1:o7IhLm0Msx3BaB+n3Ag7L8EVlByGnpq14C4YWiu/gL8=
github.com/BurntSushi/toml v1.3.2/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
+github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
+github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
github.com/armon/go-proxyproto v0.1.0 h1:TWWcSsjco7o2itn6r25/5AqKBiWmsiuzsUDLT/MTl7k=
github.com/armon/go-proxyproto v0.1.0/go.mod h1:Xj90dce2VKbHzRAeiVQAMBtj4M5oidoXJ8lmgyW21mw=
+github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
+github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
github.com/blang/semver/v4 v4.0.0 h1:1PFHFE6yCCTv8C1TeyNNarDzntLi7wMI5i/pzqYIsAM=
github.com/blang/semver/v4 v4.0.0/go.mod h1:IbckMUScFkM3pff0VJDNKRiT6TG/YpiHIM2yvyW5YoQ=
-github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
-github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
-github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be h1:J5BL2kskAlV9ckgEsNQXscjIaLiOYiZ75d4e94E6dcQ=
-github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be/go.mod h1:mk5IQ+Y0ZeO87b858TlA645sVcEcbiX6YqP98kt+7+w=
-github.com/coreos/go-systemd/v22 v22.5.0 h1:RrqgGjYQKalulkV8NGVIfkXQf6YYmOyiJKk8iXXhfZs=
-github.com/coreos/go-systemd/v22 v22.5.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
-github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
-github.com/creack/pty v1.1.18 h1:n56/Zwd5o6whRC5PMGretI4IdRLlmBXYNjScPaBgsbY=
-github.com/creack/pty v1.1.18/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4=
-github.com/cyphar/filepath-securejoin v0.4.1 h1:JyxxyPEaktOD+GAnqIqTf9A8tHyAG22rowi7HkoSU1s=
-github.com/cyphar/filepath-securejoin v0.4.1/go.mod h1:Sdj7gXlvMcPZsbhwhQ33GguGLDGQL7h7bg04C/+u9jI=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/cespare/xxhash/v2 v2.2.0 h1:DC2CZ1Ep5Y4k3ZQ899DldepgrayRUGE6BBZ/cd9Cj44=
+github.com/cespare/xxhash/v2 v2.2.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
+github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
+github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/coreos/go-systemd/v22 v22.4.0 h1:y9YHcjnjynCd/DVbg5j9L/33jQM3MxJlbj/zWskzfGU=
+github.com/coreos/go-systemd/v22 v22.4.0/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
+github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
+github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
+github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg=
+github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc h1:U9qPSI2PIWSS1VwoXQT9A3Wy9MM3WgvqSxFWenqJduM=
-github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
github.com/eapache/channels v1.1.0 h1:F1taHcn7/F0i8DYqKXJnyhJcVpp2kgFcNePxXtnyu4k=
github.com/eapache/channels v1.1.0/go.mod h1:jMm2qB5Ubtg9zLd+inMZd2/NUvXgzmWXsDaLyQIGfH0=
github.com/eapache/queue v1.1.0 h1:YOEu7KNc61ntiQlcEeUIoDTJ2o8mQznoNvUhiigpIqc=
github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I=
-github.com/emicklei/go-restful/v3 v3.12.0 h1:y2DdzBAURM29NFF94q6RaY4vjIH1rtwDapwQtU84iWk=
-github.com/emicklei/go-restful/v3 v3.12.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
-github.com/evanphx/json-patch/v5 v5.9.11 h1:/8HVnzMq13/3x9TPvjG08wUGqBTmZBsCWzjTM0wiaDU=
-github.com/evanphx/json-patch/v5 v5.9.11/go.mod h1:3j+LviiESTElxA4p3EMKAB9HXj3/XEtnUf6OZxqIQTM=
+github.com/emicklei/go-restful/v3 v3.10.2 h1:hIovbnmBTLjHXkqEBUz3HGpXZdM7ZrE9fJIZIqlJLqE=
+github.com/emicklei/go-restful/v3 v3.10.2/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
+github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/evanphx/json-patch v4.12.0+incompatible h1:4onqiflcdA9EOZ4RxV643DvftH5pOlLGNtQ5lPWQu84=
+github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/evanphx/json-patch/v5 v5.6.0 h1:b91NhWfaz02IuVxO9faSllyAtNXHMPkC5J8sJCLunww=
+github.com/evanphx/json-patch/v5 v5.6.0/go.mod h1:G79N1coSVB93tBe7j6PhzjmR3/2VvlbKOFpnXhI9Bw4=
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
-github.com/fsnotify/fsnotify v1.8.0 h1:dAwr6QBTBZIkG8roQaJjGof0pp0EeF+tNV7YBP3F/8M=
-github.com/fsnotify/fsnotify v1.8.0/go.mod h1:8jBTzvmWwFyi3Pb8djgCCO5IBqzKJ/Jwo8TRcHyHii0=
+github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nosvA=
+github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
github.com/fullsailor/pkcs7 v0.0.0-20160414161337-2585af45975b/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa h1:RDBNVkRviHZtvDvId8XSGPu3rmpmSe+wKRcEWNgsfWU=
github.com/fullsailor/pkcs7 v0.0.0-20190404230743-d7302db945fa/go.mod h1:KnogPXtdwXqoenmZCw6S+25EAm2MkxbG0deNDu4cbSA=
-github.com/fxamacker/cbor/v2 v2.7.0 h1:iM5WgngdRBanHcxugY4JySA0nk1wZorNOpTgCMedv5E=
-github.com/fxamacker/cbor/v2 v2.7.0/go.mod h1:pxXPTn3joSm21Gbwsv0w9OSA2y1HFR9qXEeXQVeNoDQ=
-github.com/go-errors/errors v1.5.1 h1:ZwEMSLRCapFLflTpT7NKaAc7ukJ8ZPEjzlxt8rPN8bk=
-github.com/go-errors/errors v1.5.1/go.mod h1:sIVyrIiJhuEF+Pj9Ebtd6P/rEYROXFi3BopGUQ5a5Og=
-github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
-github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
-github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
-github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
-github.com/go-logr/zapr v1.3.0 h1:XGdV8XW8zdwFiwOA2Dryh1gj2KRQyOOoNmBy4EplIcQ=
-github.com/go-logr/zapr v1.3.0/go.mod h1:YKepepNBd1u/oyhd/yQmtjVXmm9uML4IXUgMOwR8/Gg=
-github.com/go-openapi/jsonpointer v0.21.0 h1:YgdVicSA9vH5RiHs9TZW5oyafXZFc6+2Vc1rr/O9oNQ=
-github.com/go-openapi/jsonpointer v0.21.0/go.mod h1:IUyH9l/+uyhIYQ/PXVA41Rexl+kOkAPDdXEYns6fzUY=
-github.com/go-openapi/jsonreference v0.21.0 h1:Rs+Y7hSXT83Jacb7kFyjn4ijOuVGSvOdF2+tg1TRrwQ=
-github.com/go-openapi/jsonreference v0.21.0/go.mod h1:LmZmgsrTkVg9LG4EaHeY8cBDslNPMo06cago5JNLkm4=
-github.com/go-openapi/swag v0.23.0 h1:vsEVJDUo2hPJ2tu0/Xc+4noaxyEffXNIs3cOULZ+GrE=
-github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ577vPjgQ=
+github.com/go-errors/errors v1.4.2 h1:J6MZopCL4uSllY1OfXM374weqZFFItUbrImctkmUxIA=
+github.com/go-errors/errors v1.4.2/go.mod h1:sIVyrIiJhuEF+Pj9Ebtd6P/rEYROXFi3BopGUQ5a5Og=
+github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
+github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
+github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
+github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
+github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
+github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-logr/logr v1.3.0 h1:2y3SDp0ZXuc6/cjLSZ+Q3ir+QB9T/iG5yYRXqsagWSY=
+github.com/go-logr/logr v1.3.0/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
+github.com/go-logr/zapr v1.2.3 h1:a9vnzlIBPQBBkeaR9IuMUfmVOrQlkoC4YfPoFkX3T7A=
+github.com/go-logr/zapr v1.2.3/go.mod h1:eIauM6P8qSvTw5o2ez6UEAfGjQKrxQTl5EoK+Qa2oG4=
+github.com/go-openapi/jsonpointer v0.19.6 h1:eCs3fxoIi3Wh6vtgmLTOjdhSpiqphQ+DaPn38N2ZdrE=
+github.com/go-openapi/jsonpointer v0.19.6/go.mod h1:osyAmYz/mB/C3I+WsTTSgw1ONzaLJoLCyoi6/zppojs=
+github.com/go-openapi/jsonreference v0.20.1 h1:FBLnyygC4/IZZr893oiomc9XaghoveYTrLC1F86HID8=
+github.com/go-openapi/jsonreference v0.20.1/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
+github.com/go-openapi/swag v0.22.3 h1:yMBqmnQ0gyZvEb/+KzuWZOXgllrXT4SADYbvDaXHv/g=
+github.com/go-openapi/swag v0.22.3/go.mod h1:UzaqsxGiab7freDnrUUra0MwWfN/q7tE4j+VcZ0yl14=
+github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
-github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
-github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
-github.com/godbus/dbus/v5 v5.1.0 h1:4KLkAxT3aOY8Li4FRJe/KvhoNFFxo0m6fNuFUO8QJUk=
-github.com/godbus/dbus/v5 v5.1.0/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
+github.com/godbus/dbus/v5 v5.0.6 h1:mkgN1ofwASrYnJ5W6U/BxG15eXXXjirgZc7CLqkcaro=
+github.com/godbus/dbus/v5 v5.0.6/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
+github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da h1:oI5xCqsCo564l8iNU+DwB5epxmsaqB+rhGL0m5jtYqE=
+github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
+github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.3/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.4/go.mod h1:l3mdAwkq5BuhzHwde/uurv3sEJeZMXNpwsxVWU71h+4=
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk=
github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
-github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
-github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
-github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0 h1:4gjrh/PN2MuWCCElk8/I4OCKRKWCCo2zEct3VKCbibU=
-github.com/gomarkdown/markdown v0.0.0-20240328165702-4d01890c35c0/go.mod h1:JDGcbDT52eL4fju3sZ4TeHGsQwhG9nbDV21aMyhwPoA=
-github.com/google/btree v1.1.3 h1:CVpQJjYgC4VbzxeGVHfvZrv1ctoYCAI8vbl07Fcxlyg=
-github.com/google/btree v1.1.3/go.mod h1:qOPhT0dTNdNzV6Z/lhRX0YXUafgPLFUh+gZMl761Gm4=
-github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I=
-github.com/google/gnostic-models v0.6.8/go.mod h1:5n7qKqH0f5wFt+aWF8CW6pZLLNOfYuF5OpfBSENuI8U=
+github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
+github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg=
+github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/gomarkdown/markdown v0.0.0-20210514010506-3b9f47219fe7 h1:oKYOfNR7Hp6XpZ4JqolL5u642Js5Z0n7psPVl+S5heo=
+github.com/gomarkdown/markdown v0.0.0-20210514010506-3b9f47219fe7/go.mod h1:aii0r/K0ZnHv7G0KF7xy1v0A7s2Ljrb5byB7MO5p6TU=
+github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/btree v1.0.1 h1:gK4Kx5IaGY9CD5sPJ36FHiBJ6ZXl0kilRiiCj+jdYp4=
+github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9uaxA=
+github.com/google/gnostic v0.5.7-v3refs h1:FhTMOKj2VhjpouxvWJAV1TL304uMlb9zcDqkl6cEI54=
+github.com/google/gnostic v0.5.7-v3refs/go.mod h1:73MKFl6jIHelAJNaBGFzt3SPtZULs9dYrGFt8OiIsHQ=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
+github.com/google/go-cmp v0.4.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.1/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
-github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad h1:a6HEuzUHeKH6hwfN/ZoQgRgVIWFJljSWa/zetS2WTvg=
-github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad/go.mod h1:vavhavw2zAxS5dIdcRluK6cSGGPlZynqzFM8NdvU144=
+github.com/google/gofuzz v1.1.0 h1:Hsa8mG0dQ46ij8Sl2AYJDUv1oA9/d6Vk+3LG99Oe02g=
+github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
+github.com/google/martian/v3 v3.0.0/go.mod h1:y5Zk1BBys9G+gd6Jrk0W3cC1+ELVxBWuIGO+w/tUAp0=
+github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200708004538-1a94d8640e99/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98 h1:pUa4ghanp6q4IJHwE9RwLgmVFfReJN+KbQ8ExNEUUoQ=
+github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98/go.mod h1:czg5+yv1E0ZGTi6S6vVK1mke0fV+FaUhNGcd6VRS9Ik=
+github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 h1:El6M4kTTCOh6aBiKaUGG7oYTSPP8MxqL4YI3kZKwcP4=
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510/go.mod h1:pupxD2MaaD3pAXIBCelhxNneeOaAeabZDe5s4K6zSpQ=
-github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
-github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
-github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 h1:+ngKgrYPPJrOjhax5N+uePQ0Fh1Z7PheYoUI/0nzkPA=
-github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
+github.com/google/uuid v1.3.1 h1:KjJaJ9iWZ3jOFZIf1Lqf4laDRCasjl0BCmnEGxkdLb4=
+github.com/google/uuid v1.3.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
+github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk=
+github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7 h1:pdN6V1QBWetyv/0+wjACpqVH+eVULgEjkurDLq3goeM=
+github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
+github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
+github.com/imdario/mergo v0.3.6 h1:xTNEAn+kxVO7dTZGu0CegyqKZmoWFI0rF8UxjlB2d28=
+github.com/imdario/mergo v0.3.6/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
+github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI=
github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
+github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
+github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU=
+github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
+github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
+github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
-github.com/klauspost/compress v1.17.9 h1:6KIumPrER1LHsvBVuDa0r5xaG0Es51mhhB9BQB2qeMA=
-github.com/klauspost/compress v1.17.9/go.mod h1:Di0epgTjJY877eYKx5yC51cX2A2Vl2ibi7bDH9ttBbw=
+github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
+github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
+github.com/kr/pretty v0.3.0/go.mod h1:640gp4NfQd8pI5XOwp5fnNeVWj67G7CFk/SaSQn7NBk=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
@@ -124,9 +241,11 @@ github.com/mailru/easyjson v0.7.7 h1:UGYAvKxe3sBsEDzO8ZeWOSlIQfWFlxbzLZe7hwFURr0
github.com/mailru/easyjson v0.7.7/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mattn/go-colorable v0.1.13 h1:fFA4WZxdEF4tXPZVKMLwD8oUnCTTo08duU7wxecdEvA=
github.com/mattn/go-colorable v0.1.13/go.mod h1:7S9/ev0klgBDR4GtXTXX8a3vIGJpMovkB8vQcUbaXHg=
+github.com/mattn/go-isatty v0.0.16 h1:bq3VjFmv/sOjHtdEhmkEV4x1AJtvUvOJ2PFAZ5+peKQ=
github.com/mattn/go-isatty v0.0.16/go.mod h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM=
-github.com/mattn/go-isatty v0.0.19 h1:JITubQf0MOLdlGRuRq+jtsDlekdYPia9ZFsB8h/APPA=
-github.com/mattn/go-isatty v0.0.19/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
+github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0 h1:jWpvCLoY8Z/e3VKvlsiIGKtc+UG6U5vzxaoagmhXfyg=
+github.com/matttproud/golang_protobuf_extensions/v2 v2.0.0/go.mod h1:QUyp042oQthUoa9bqDv0ER0wrtXnBruoNd7aNjkbP+k=
github.com/mitchellh/go-ps v1.0.0 h1:i6ampVEEF4wQFF+bkYfwYgY+F/uYJDktmvLPf7qIgjc=
github.com/mitchellh/go-ps v1.0.0/go.mod h1:J4lOc8z8yJs6vUwklHw2XEIiT4z4C40KtWVN3nvg8Pg=
github.com/mitchellh/hashstructure/v2 v2.0.2 h1:vGKWl0YJqUNxE8d+h8f6NJLcCJrgbhC4NcD46KavDd4=
@@ -135,15 +254,13 @@ github.com/mitchellh/mapstructure v1.5.0 h1:jeMsZIYE/09sWLaz43PL7Gy6RuMjD2eJVyua
github.com/mitchellh/mapstructure v1.5.0/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo=
github.com/mmarkdown/mmark v2.0.40+incompatible h1:vMeUeDzBK3H+/mU0oMVfMuhSXJlIA+DE/DMPQNAj5C4=
github.com/mmarkdown/mmark v2.0.40+incompatible/go.mod h1:Uvmoz7tvsWpr7bMVxIpqZPyN3FbOtzDmnsJDFp7ltJs=
-github.com/moby/sys/mountinfo v0.7.1 h1:/tTvQaSJRr2FshkhXiIpux6fQ2Zvc4j7tAhMTStAG2g=
-github.com/moby/sys/mountinfo v0.7.1/go.mod h1:IJb6JQeOklcdMU9F5xQ8ZALD+CUr5VlGpwtX+VE0rpI=
-github.com/moby/sys/userns v0.1.0 h1:tVLXkFOxVu9A64/yh59slHVv9ahO9UIev4JZusOLG/g=
-github.com/moby/sys/userns v0.1.0/go.mod h1:IHUYgu/kao6N8YZlp9Cf444ySSvCmDlmzUcYfDHOl28=
-github.com/moby/term v0.5.0 h1:xt8Q1nalod/v7BqbG21f8mQPqH+xAaC9C3N3wfWbVP0=
-github.com/moby/term v0.5.0/go.mod h1:8FzsFHVUBGZdbDsJw/ot+X+d5HLUbvklYLJ9uGfcI3Y=
+github.com/moby/sys/mountinfo v0.5.0 h1:2Ks8/r6lopsxWi9m58nlwjaeSzUX9iiL1vj5qB/9ObI=
+github.com/moby/sys/mountinfo v0.5.0/go.mod h1:3bMD3Rg+zkqx8MRYPi7Pyb0Ie97QEBmdxbhnCLlSvSU=
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 h1:n6/2gBQ3RWajuToeY6ZtZTIKv2v7ThUy5KKusIT0yc0=
@@ -152,10 +269,13 @@ github.com/moul/pb v0.0.0-20220425114252-bca18df4138c h1:1STmblv9zmHLDpru4dbnf1P
github.com/moul/pb v0.0.0-20220425114252-bca18df4138c/go.mod h1:jE2HT8eoucYyUPBFJMreiVlC3KPHkDMtN8wn+ef7Y64=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
+github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/ncabatoff/fakescraper v0.0.0-20201102132415-4b37ba603d65/go.mod h1:Tx6UMSMyIsjLG/VU/F6xA1+0XI+/f9o1dGJnf1l+bPg=
github.com/ncabatoff/go-seq v0.0.0-20180805175032-b08ef85ed833 h1:t4WWQ9I797y7QUgeEjeXnVb+oYuEDQc6gLvrZJTYo94=
github.com/ncabatoff/go-seq v0.0.0-20180805175032-b08ef85ed833/go.mod h1:0CznHmXSjMEqs5Tezj/w2emQoM41wzYM9KpDKUHPYag=
-github.com/ncabatoff/process-exporter v0.8.5 h1:Hk1sflgRWn0Xrh/OsupQLVVCTW01kv0YYrGxu7NvkmM=
-github.com/ncabatoff/process-exporter v0.8.5/go.mod h1:IZndG/m2Y++D90y99NhDJfg0SOkpbx/Fl6MlnBr4SC0=
+github.com/ncabatoff/process-exporter v0.7.10 h1:+Ere7+3se6QqP54gg7aBRagWcL8bq3u5zNi/GRSWeKQ=
+github.com/ncabatoff/process-exporter v0.7.10/go.mod h1:DHZRZjqxw9LCOpLlX0DjBuyn6d5plh41Jv6Tmttj7Ek=
github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE=
github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU=
@@ -163,165 +283,429 @@ github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+W
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
-github.com/onsi/ginkgo/v2 v2.22.2 h1:/3X8Panh8/WwhU/3Ssa6rCKqPLuAkVY2I0RoyDLySlU=
-github.com/onsi/ginkgo/v2 v2.22.2/go.mod h1:oeMosUL+8LtarXBHu/c0bx2D/K9zyQ6uX3cTyztHwsk=
+github.com/onsi/ginkgo/v2 v2.13.1 h1:LNGfMbR2OVGBfXjvRZIZ2YCTQdGKtPLvuI1rMCCj3OU=
+github.com/onsi/ginkgo/v2 v2.13.1/go.mod h1:XStQ8QcGwLyF4HdfcZB8SFOS/MWCgDuXMSBe6zrvLgM=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/onsi/gomega v1.36.2 h1:koNYke6TVk6ZmnyHrCXba/T/MoLBXFjeC1PtvYgw0A8=
-github.com/onsi/gomega v1.36.2/go.mod h1:DdwyADRjrc825LhMEkD76cHR5+pUnjhUN8GlHlRPHzY=
-github.com/opencontainers/runc v1.2.5 h1:8KAkq3Wrem8bApgOHyhRI/8IeLXIfmZ6Qaw6DNSLnA4=
-github.com/opencontainers/runc v1.2.5/go.mod h1:dOQeFo29xZKBNeRBI0B19mJtfHv68YgCTh1X+YphA+4=
-github.com/opencontainers/runtime-spec v1.2.0 h1:z97+pHb3uELt/yiAWD691HNHQIF07bE7dzrbT927iTk=
-github.com/opencontainers/runtime-spec v1.2.0/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
+github.com/onsi/gomega v1.29.0 h1:KIA/t2t5UBzoirT4H9tsML45GEbo3ouUnBHsCfD2tVg=
+github.com/onsi/gomega v1.29.0/go.mod h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
+github.com/opencontainers/runc v1.1.10 h1:EaL5WeO9lv9wmS6SASjszOeQdSctvpbu0DdBQBizE40=
+github.com/opencontainers/runc v1.1.10/go.mod h1:+/R6+KmDlh+hOO8NkjmgkG9Qzvypzk0yXxAPYYR65+M=
+github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417 h1:3snG66yBm59tKhhSPQrQ/0bCrv1LQbKt40LnUPiUxdc=
+github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0=
github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+vxiaj6gdUUzhl4XmI=
github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU=
+github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
+github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
-github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.20.5 h1:cxppBPuYhUnsO6yo/aoRol4L7q7UFfdm+bR9r+8l63Y=
-github.com/prometheus/client_golang v1.20.5/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
-github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
-github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
-github.com/prometheus/common v0.62.0 h1:xasJaQlnWAeyHdUBeGjXmutelfJHWMRr+Fg4QszZ2Io=
-github.com/prometheus/common v0.62.0/go.mod h1:vyBcEuLSvWos9B1+CyL7JZ2up+uFzXhkqml0W5zIY1I=
-github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
-github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
-github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
-github.com/rogpeppe/go-internal v1.12.0/go.mod h1:E+RYuTGaKKdloAfM02xzb0FW3Paa99yedzYV+kq4uf4=
+github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
+github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
+github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
+github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
+github.com/prometheus/client_golang v1.17.0 h1:rl2sfwZMtSthVU752MqfjQozy7blglC+1SOtjMAMh+Q=
+github.com/prometheus/client_golang v1.17.0/go.mod h1:VeL+gMmOAxkS2IqfCq0ZmHSL+LjWfWDUmp1mBz9JgUY=
+github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.5.0 h1:VQw1hfvPvk3Uv6Qf29VrPF32JB6rtbgI6cYPYQjL0Qw=
+github.com/prometheus/client_model v0.5.0/go.mod h1:dTiFglRmd66nLR9Pv9f0mZi7B7fk5Pm3gvsjB5tr+kI=
+github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
+github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
+github.com/prometheus/common v0.29.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
+github.com/prometheus/common v0.45.0 h1:2BGz0eBc2hdMDLnO/8n0jeB3oPrt2D08CekT0lneoxM=
+github.com/prometheus/common v0.45.0/go.mod h1:YJmSTw9BoKxJplESWWxlbyttQR4uaEcGyv9MZjVOJsY=
+github.com/prometheus/exporter-toolkit v0.7.0/go.mod h1:ZUBIj498ePooX9t/2xtDjeQYwvRpiPP2lh5u4iblj2g=
+github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
+github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/prometheus/procfs v0.11.1 h1:xRC8Iq1yyca5ypa9n1EZnWZkt7dwcoRPQwX/5gwaUuI=
+github.com/prometheus/procfs v0.11.1/go.mod h1:eesXgaPo1q7lBpVMoMy0ZOFTth9hBn4W/y0/p/ScXhY=
+github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
+github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc=
+github.com/rogpeppe/go-internal v1.8.0/go.mod h1:WmiCO8CzOY8rg0OYDC4/i/2WRWAB6poM+XZ2dLUbcbE=
+github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
+github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
-github.com/sergi/go-diff v1.3.1 h1:xkr+Oxo4BOQKmkn/B9eMK0g5Kg/983T9DqqPHwYqD+8=
-github.com/sergi/go-diff v1.3.1/go.mod h1:aMJSSKb2lpPvRNec0+w3fl7LP9IOFzdc9Pa4NFbPK1I=
-github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
-github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
-github.com/spf13/cobra v1.9.1 h1:CXSaggrXdbHK9CF+8ywj8Amf7PBRmPCOJugH954Nnlo=
-github.com/spf13/cobra v1.9.1/go.mod h1:nDyEzZ8ogv936Cinf6g1RU9MRY64Ir93oCnqb9wxYW0=
-github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o=
-github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/sergi/go-diff v1.1.0 h1:we8PVUC3FE2uYfodKH/nBHMSetSfHDR6scGdBi+erh0=
+github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM=
+github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
+github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
+github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
+github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0=
+github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
+github.com/spf13/cobra v1.8.0 h1:7aJaZx1B85qltLMc546zn58BxxfZdR/W22ej9CFoEf0=
+github.com/spf13/cobra v1.8.0/go.mod h1:WXLWApfZ71AjXPya3WOlMsY9yMs7YeiHhFVlvLyhcho=
+github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
+github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
-github.com/stretchr/objx v0.5.2 h1:xuMeJ0Sdp5ZMRXx/aWO6RZxdr3beISkG5/G/aIRr3pY=
-github.com/stretchr/objx v0.5.2/go.mod h1:FRsXN1f5AsAjCGJKqEizvkpNtU+EGNCLh3NxZ/8L+MA=
+github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
+github.com/stretchr/objx v0.5.0 h1:1zr/of2m5FGMsad5YfcqgdqdWrIhu+EBEJRhR1U7z/c=
+github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
github.com/stretchr/testify v1.1.3/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
-github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
-github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
+github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
+github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
+github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
+github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
github.com/urfave/cli v1.17.1-0.20160602030128-01a33823596e/go.mod h1:70zkFmudgCuE/ngEzBv17Jvp/497gISqfk5gWijbERA=
-github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
-github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
-github.com/xlab/treeprint v1.2.0 h1:HzHnuAF1plUN2zGlAFHbSQP2qJ0ZAD3XF5XD7OesXRQ=
-github.com/xlab/treeprint v1.2.0/go.mod h1:gj5Gd3gPdKtR1ikdDK6fnFLdmIS0X30kTTuNd/WEJu0=
+github.com/xlab/treeprint v1.1.0 h1:G/1DjNkPpfZCFt9CSh6b5/nY4VimlbHF3Rh4obvtzDk=
+github.com/xlab/treeprint v1.1.0/go.mod h1:gj5Gd3gPdKtR1ikdDK6fnFLdmIS0X30kTTuNd/WEJu0=
github.com/yudai/gojsondiff v1.0.0 h1:27cbfqXLVEJ1o8I6v3y9lg8Ydm53EKqHXAOMxEGlCOA=
github.com/yudai/gojsondiff v1.0.0/go.mod h1:AY32+k2cwILAkW1fbgxQ5mUmMiZFgLIV+FBNExI05xg=
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 h1:BHyfKlQyqbsFN5p3IfnEUduWvb9is428/nNb5L3U01M=
github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82/go.mod h1:lgjkn3NuSvDfVJdfcVVdX+jpBxNmX4rDAzaS45IcYoM=
github.com/yudai/pp v2.0.1+incompatible h1:Q4//iY4pNF6yPLZIigmvcl7k/bPgrcTPIFIcmawg5bI=
github.com/yudai/pp v2.0.1+incompatible/go.mod h1:PuxR/8QJ7cyCkFp/aUDS+JY727OFEZkTdatxwunjIkc=
+github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30 h1:rzHvkiukOVYcf840FqAsHqBMhfLofvQIxWtczkGRklU=
github.com/zakjan/cert-chain-resolver v0.0.0-20221221105603-fcedb00c5b30/go.mod h1:/Hzu8ych2oXCs1iNI+MeASyFzWTncQ6nlu/wgqbqC2A=
-go.opentelemetry.io/otel v1.32.0 h1:WnBN+Xjcteh0zdk01SVqV55d/m62NJLJdIyb4y/WO5U=
-go.opentelemetry.io/otel v1.32.0/go.mod h1:00DCVSB0RQcnzlwyTfqtxSm+DRr9hpYrHjNGiBHVQIg=
-go.opentelemetry.io/otel/metric v1.32.0 h1:xV2umtmNcThh2/a/aCP+h64Xx5wsj8qqnkYZktzNa0M=
-go.opentelemetry.io/otel/metric v1.32.0/go.mod h1:jH7CIbbK6SH2V2wE16W05BHCtIDzauciCRLoc/SyMv8=
-go.opentelemetry.io/otel/sdk v1.32.0 h1:RNxepc9vK59A8XsgZQouW8ue8Gkb4jpWtJm9ge5lEG4=
-go.opentelemetry.io/otel/sdk v1.32.0/go.mod h1:LqgegDBjKMmb2GC6/PrTnteJG39I8/vJCAP9LlJXEjU=
-go.opentelemetry.io/otel/sdk/metric v1.32.0 h1:rZvFnvmvawYb0alrYkjraqJq0Z4ZUJAiyYCU9snn1CU=
-go.opentelemetry.io/otel/sdk/metric v1.32.0/go.mod h1:PWeZlq0zt9YkYAp3gjKZ0eicRYvOh1Gd+X99x6GHpCQ=
-go.opentelemetry.io/otel/trace v1.32.0 h1:WIC9mYrXf8TmY/EXuULKc8hR17vE+Hjv2cssQDe03fM=
-go.opentelemetry.io/otel/trace v1.32.0/go.mod h1:+i4rkvCraA+tG6AzwloGaCtkx53Fa+L+V8e9a7YvhT8=
-go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
-go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
-go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
-go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
-go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
-go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
+go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
+go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
+go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.4/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5 h1:+FNtrFTmVw0YZGpBGX56XDee331t6JAXeK2bcyhLOOc=
+go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5/go.mod h1:nmDLcffg48OtT/PSW0Hg7FvpRQsQh5OSqIylirxKC7o=
+go.uber.org/atomic v1.7.0 h1:ADUqmZGgLDDfbSL9ZmPxKTybcoEYHgpYfELNoN+7hsw=
+go.uber.org/atomic v1.7.0/go.mod h1:fEN4uk6kAWBTFdckzkM89CLk9XfWZrxpCo0nPH17wJc=
+go.uber.org/multierr v1.6.0 h1:y6IPFStTAIT5Ytl7/XYmHvzXQ7S3g/IeZW9hyZ5thw4=
+go.uber.org/multierr v1.6.0/go.mod h1:cdWPpRnG4AhwMwsgIHip0KRBQjJy5kYEpYjJxpXp9iU=
+go.uber.org/zap v1.24.0 h1:FiJd5l1UOLj0wCgbSE0rwwXHzEdAZS6hiiSnxJN/D60=
+go.uber.org/zap v1.24.0/go.mod h1:2kMP+WWQ8aoFoedH3T2sq6iJ2yDWpHbP0f6MQbS9Gkg=
+golang.org/dl v0.0.0-20190829154251-82a15e2f2ead/go.mod h1:IUMfjQLJQd4UTqG1Z90tenwKoCX93Gn3MAQJMOSBsDQ=
+golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.33.0 h1:IOBPskki6Lysi0lo9qQvbxiQ+FvsCC/YWOecCHAixus=
-golang.org/x/crypto v0.33.0/go.mod h1:bVdXmD7IV/4GdElGPozy6U7lWdRXA4qyRVGJV57uQ5M=
+golang.org/x/crypto v0.0.0-20210616213533-5ff15b29337e/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
+golang.org/x/crypto v0.17.0 h1:r8bRNjWL3GshPW3gkd+RpvzWrZAwPS49OmTGZ/uhM4k=
+golang.org/x/crypto v0.17.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
+golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
+golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
+golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
+golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
+golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
+golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs=
+golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE=
+golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o=
+golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc=
+golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY=
+golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
+golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.22.0 h1:D4nJWe9zXqHOmWqj4VMOJhvzj7bEZg4wEYa759z1pH4=
-golang.org/x/mod v0.22.0/go.mod h1:6SkKJ3Xj0I0BrPOZoBy3bdMptDDU9oJrpohJ3eWZ1fY=
+golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
+golang.org/x/mod v0.13.0 h1:I/DsJXRlw/8l/0c24sM9yb0T4z9liZTduXvdAWYiysY=
+golang.org/x/mod v0.13.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
+golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200501053045-e0ff5e5a1de5/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200506145744-7e3656a0809f/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200513185701-a91f0712d120/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200520182314-0ba52f642ac2/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
+golang.org/x/net v0.0.0-20200707034311-ab3426394381/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
+golang.org/x/net v0.0.0-20200822124328-c89045814202/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.33.0 h1:74SYHlV8BIgHIFC/LrYkOGIwL19eTYXQ5wc6TBuO36I=
-golang.org/x/net v0.33.0/go.mod h1:HXLR5J+9DxmrqMwG9qjGCxZ+zKXxBru04zlTvWlWuN4=
-golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=
-golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
+golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
+golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM=
+golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20210514164344-f6687ab2804c/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.13.0 h1:jDDenyj+WgFtmV3zYVoi8aE2BwtXFLWOA67ZfNWftiY=
+golang.org/x/oauth2 v0.13.0/go.mod h1:/JMhi4ZRXAf4HG9LiNmxvk+45+96RUlVThiH8FzNBn0=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20200317015054-43a5402ce75a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.11.0 h1:GGz8+XQP4FvTTrjZPzNKTMFtSXH80RAzG+5ghFPgK9w=
-golang.org/x/sync v0.11.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
+golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191002063906-3421d5a6bb1c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200331124033-c3d80250170d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200501052902-10377860bb8e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200511232937-7e40ca221e25/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200515095857-1151b9dac4a9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200803210538-64077c9b5642/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210112080510-489259a85091/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20211025201205-69cdffdb9359/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.30.0 h1:QjkSwP/36a20jFYWkSue1YwXzLmsV5Gfq7Eiy72C1uc=
-golang.org/x/sys v0.30.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.29.0 h1:L6pJp37ocefwRRtYPKSWOWzOtWSxVajvz2ldH/xi3iU=
-golang.org/x/term v0.29.0/go.mod h1:6bl4lRlvVuDgSf3179VpIxBF0o10JUpXWOnI7nErv7s=
+golang.org/x/sys v0.15.0 h1:h48lPFYpsTvQJZF4EKyI4aLHaev3CxivZmv7yZig9pc=
+golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
+golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
+golang.org/x/term v0.15.0 h1:y/Oo/a/q3IXu26lQgl04j/gjuBDOBlx7X6Om1j2CPW4=
+golang.org/x/term v0.15.0/go.mod h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
+golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.22.0 h1:bofq7m3/HAFvbF51jz3Q9wLg3jkvSPuiZu/pD1XwgtM=
-golang.org/x/text v0.22.0/go.mod h1:YRoo4H8PVmsu+E3Ou7cqLVH8oXWIHVoX0jqUWALQhfY=
-golang.org/x/time v0.7.0 h1:ntUhktv3OPE6TgYxXWv9vKvUSJyIFJlyohwbkEwPrKQ=
-golang.org/x/time v0.7.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
+golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
+golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
+golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
+golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
+golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4=
+golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200227222343-706bc42d1f0d/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
+golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
+golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
+golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
+golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
+golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.28.0 h1:WuB6qZ4RPCQo5aP3WdKZS7i595EdWqWR8vqJTlwTVK8=
-golang.org/x/tools v0.28.0/go.mod h1:dcIOrVd3mfQKTgrDVQHqCPMWy6lnhfhtX3hLXYVLfRw=
+golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
+golang.org/x/tools v0.14.0 h1:jvNa2pY0M4r62jkRQ6RwEZZyPcymeL9XZMLBbV7U2nc=
+golang.org/x/tools v0.14.0/go.mod h1:uYBEerGOWcJyEORxN+Ek8+TT266gXkNlHdJBwexUsBg=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw=
-gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20241202173237-19429a94021a h1:hgh8P4EuoxpsuKMXX/To36nOFD7vixReXgn8lPGnt+o=
-google.golang.org/genproto/googleapis/rpc v0.0.0-20241202173237-19429a94021a/go.mod h1:5uTbfoYQed2U9p3KIj2/Zzm02PYhndfdmML0qC3q3FU=
-google.golang.org/grpc v1.70.0 h1:pWFv03aZoHzlRKHWicjsZytKAiYCtNS0dHbXnIdq7jQ=
-google.golang.org/grpc v1.70.0/go.mod h1:ofIJqVKDXx/JiXrwr2IG4/zwdH9txy3IlF40RmcJSQw=
-google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab h1:tg8hvIl5RmFBuXlcJMuL0h4Psh1gx5Q5xEMwzBZIzWA=
-google.golang.org/grpc/examples v0.0.0-20240223204917-5ccf176a08ab/go.mod h1:liVNnGuZDITxuksuZ+BBvdy7FcJfeNk+efF9qgqNUmc=
+gomodules.xyz/jsonpatch/v2 v2.2.0 h1:4pT439QV83L+G9FkcCriY6EkpcK6r6bK+A5FBUMI7qY=
+gomodules.xyz/jsonpatch/v2 v2.2.0/go.mod h1:WXp+iVDkoLQqPudfQ9GBlwB2eZ5DKOnjQZCYdOS8GPY=
+google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
+google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
+google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.19.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.22.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.24.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
+google.golang.org/api v0.28.0/go.mod h1:lIXQywCXRcnZPGlsd8NbLnOjtAoL6em04bJ9+z0MncE=
+google.golang.org/api v0.29.0/go.mod h1:Lcubydp8VUV7KeIHD9z2Bys/sm/vGKnG1UHuDBSrHWM=
+google.golang.org/api v0.30.0/go.mod h1:QGmEvQ87FHZNiUVJkT14jQNYJ4ZJjdRF23ZXz5138Fc=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
+google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/appengine v1.6.6/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/appengine v1.6.8 h1:IhEN5q69dyKagZPYMSdIjS2HqprW324FRQZJcGqPAsM=
+google.golang.org/appengine v1.6.8/go.mod h1:1jJ3jBArFh5pcgW8gCtRJnepW8FzD1V44FJffLiz/Ds=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8=
+google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA=
+google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200228133532-8c2c7df3a383/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200312145019-da6875a35672/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200331122359-1ee6d9798940/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200430143042-b979b6f78d84/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200511104702-f5ebc3bea380/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200515170657-fc4c6c6a6587/go.mod h1:YsZOwe1myG/8QRHRsmBRE1LrgQY60beZKjly0O1fX9U=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7FcilCzHH/e9qn6dsT145K34l5v+OpcnNgKAAA=
+google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20231002182017-d307bd883b97 h1:6GQBEOdGkX6MMTLT9V+TjtIRZCw9VPD5Z+yHY9wMgS0=
+google.golang.org/genproto/googleapis/rpc v0.0.0-20231002182017-d307bd883b97/go.mod h1:v7nGkzlmW8P3n/bKmWBn2WpBjpOEx8Q6gMueudAmKfY=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
+google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
+google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.28.0/go.mod h1:rpkK4SK4GF4Ach/+MFLZUBavHOvF2JJB5uozKKal+60=
+google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
+google.golang.org/grpc v1.30.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
+google.golang.org/grpc v1.31.0/go.mod h1:N36X2cJ7JwdamYAgDz+s+rVMFjt3numwzf/HckM8pak=
+google.golang.org/grpc v1.60.1 h1:26+wFr+cNqSGFcOXcabYC0lUVJVRa2Sb2ortSK7VrEU=
+google.golang.org/grpc v1.60.1/go.mod h1:OlCHIeLYqSSsLi6i49B5QGdzaMZK9+M7LXN2FKz4eGM=
+google.golang.org/grpc/examples v0.0.0-20221220003428-4f16fbe410f7 h1:pPsdyuBif+uoyUoL19yuj/TCfUPsmpJHJZhWQ98JGLU=
+google.golang.org/grpc/examples v0.0.0-20221220003428-4f16fbe410f7/go.mod h1:8pQa1yxxkh+EsxUK8/455D5MSbv3vgmEJqKCH3y17mI=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
-google.golang.org/protobuf v1.36.1 h1:yBPeRvTftaleIgM3PZ/WBIZ7XM/eEYAaEyCwvyjq/gk=
-google.golang.org/protobuf v1.36.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
+google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
+google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
+google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
+google.golang.org/protobuf v1.31.0 h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8=
+google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
-gopkg.in/evanphx/json-patch.v4 v4.12.0 h1:n6jtcsulIzXPJaxegRbvFNNrZDjbij7ny3gmSPG+6V4=
-gopkg.in/evanphx/json-patch.v4 v4.12.0/go.mod h1:p8EYWUEYMpynmqDbY58zCKCFZw8pRWMG4EsWvDvM72M=
+gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI=
gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
gopkg.in/go-playground/assert.v1 v1.2.1 h1:xoYuJVE7KT85PYWrN730RguIQO0ePzVRfFMXadIrXTM=
gopkg.in/go-playground/assert.v1 v1.2.1/go.mod h1:9RXL0bg/zibRAgZUYszZSwO/z8Y/a8bDuhia5mkpMnE=
@@ -333,52 +717,67 @@ gopkg.in/mcuadros/go-syslog.v2 v2.3.0 h1:kcsiS+WsTKyIEPABJBJtoG0KkOS6yzvJ+/eZlhD
gopkg.in/mcuadros/go-syslog.v2 v2.3.0/go.mod h1:l5LPIyOOyIdQquNg+oU6Z3524YwrcqEm0aKH+5zpt2U=
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 h1:uRGJdciOHaEIrze2W8Q3AKkepLTh2hOroT7a+7czfdQ=
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.32.2 h1:bZrMLEkgizC24G9eViHGOPbW+aRo9duEISRIJKfdJuw=
-k8s.io/api v0.32.2/go.mod h1:hKlhk4x1sJyYnHENsrdCWw31FEmCijNGPJO5WzHiJ6Y=
-k8s.io/apiextensions-apiserver v0.32.2 h1:2YMk285jWMk2188V2AERy5yDwBYrjgWYggscghPCvV4=
-k8s.io/apiextensions-apiserver v0.32.2/go.mod h1:GPwf8sph7YlJT3H6aKUWtd0E+oyShk/YHWQHf/OOgCA=
-k8s.io/apimachinery v0.32.2 h1:yoQBR9ZGkA6Rgmhbp/yuT9/g+4lxtsGYwW6dR6BDPLQ=
-k8s.io/apimachinery v0.32.2/go.mod h1:GpHVgxoKlTxClKcteaeuF1Ul/lDVb74KpZcxcmLDElE=
-k8s.io/apiserver v0.32.2 h1:WzyxAu4mvLkQxwD9hGa4ZfExo3yZZaYzoYvvVDlM6vw=
-k8s.io/apiserver v0.32.2/go.mod h1:PEwREHiHNU2oFdte7BjzA1ZyjWjuckORLIK/wLV5goM=
-k8s.io/cli-runtime v0.32.2 h1:aKQR4foh9qeyckKRkNXUccP9moxzffyndZAvr+IXMks=
-k8s.io/cli-runtime v0.32.2/go.mod h1:a/JpeMztz3xDa7GCyyShcwe55p8pbcCVQxvqZnIwXN8=
-k8s.io/client-go v0.32.2 h1:4dYCD4Nz+9RApM2b/3BtVvBHw54QjMFUl1OLcJG5yOA=
-k8s.io/client-go v0.32.2/go.mod h1:fpZ4oJXclZ3r2nDOv+Ux3XcJutfrwjKTCHz2H3sww94=
-k8s.io/code-generator v0.32.2 h1:CIvyPrLWP7cMgrqval2qYT839YAwCDeSvGfXgWSNpHQ=
-k8s.io/code-generator v0.32.2/go.mod h1:plh7bWk7JztAUkHM4zpbdy0KOMdrhsePcZL2HLWFH7Y=
-k8s.io/component-base v0.32.2 h1:1aUL5Vdmu7qNo4ZsE+569PV5zFatM9hl+lb3dEea2zU=
-k8s.io/component-base v0.32.2/go.mod h1:PXJ61Vx9Lg+P5mS8TLd7bCIr+eMJRQTyXe8KvkrvJq0=
-k8s.io/gengo/v2 v2.0.0-20240911193312-2b36238f13e9 h1:si3PfKm8dDYxgfbeA6orqrtLkvvIeH8UqffFJDl0bz4=
-k8s.io/gengo/v2 v2.0.0-20240911193312-2b36238f13e9/go.mod h1:EJykeLsmFC60UQbYJezXkEsG2FLrt0GPNkU5iK5GWxU=
-k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
-k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
-k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f h1:GA7//TjRY9yWGy1poLzYYJJ4JRdzg3+O6e8I+e+8T5Y=
-k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f/go.mod h1:R/HEjbvWI0qdfb8viZUeVZm0X6IZnxAydC7YU42CMw4=
-k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 h1:M3sRQVHv7vB20Xc2ybTt7ODCeFj6JSWYFzOFnYeS6Ro=
-k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
+honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+k8s.io/api v0.27.6 h1:PBWu/lywJe2qQcshMjubzcBg7+XDZOo7O8JJAWuYtUo=
+k8s.io/api v0.27.6/go.mod h1:AQYj0UsFCp3qJE7bOVnUuy4orCsXVkvHefnbYQiNWgk=
+k8s.io/apiextensions-apiserver v0.27.6 h1:mOwSBJtThZhpJr+8gEkc3wFDIjq87E3JspR5mtZxIg8=
+k8s.io/apiextensions-apiserver v0.27.6/go.mod h1:AVNlLYRrESG5Poo6ASRUhY2pvoKPcNt8y/IuZ4lx3o8=
+k8s.io/apimachinery v0.27.6 h1:mGU8jmBq5o8mWBov+mLjdTBcU+etTE19waies4AQ6NE=
+k8s.io/apimachinery v0.27.6/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E=
+k8s.io/apiserver v0.27.6 h1:r/eHN8r3lG2buggHrVMy++kKhHlHn1HWSX1dqDtes54=
+k8s.io/apiserver v0.27.6/go.mod h1:Xeo9OEXn2kDLK5pqspjdXQx7YKgDyKSpwIB4p0BmpAQ=
+k8s.io/cli-runtime v0.27.6 h1:ik1+20C0AvxYcqEzwebH2PHOlqBTKUHZnOuPtG2CCl8=
+k8s.io/cli-runtime v0.27.6/go.mod h1:+qSBK08EJL1fFvsfVNlETzsgGtxIhascIGZSuaQXQro=
+k8s.io/client-go v0.27.6 h1:vzI8804gpUtpMCNaFjIFyJrifH7u//LJCJPy8fQuYQg=
+k8s.io/client-go v0.27.6/go.mod h1:PMsXcDKiJTW7PHJ64oEsIUJF319wm+EFlCj76oE5QXM=
+k8s.io/code-generator v0.27.6 h1:1zkSDvylcA11s91aYg5U7fZ24EXMZ+KIDOj/Z3Ti4c8=
+k8s.io/code-generator v0.27.6/go.mod h1:DPung1sI5vBgn4AGKtlPRQAyagj/ir/4jI55ipZHVww=
+k8s.io/component-base v0.27.6 h1:hF5WxX7Tpi9/dXAbLjPVkIA6CA6Pi6r9JOHyo0uCDYI=
+k8s.io/component-base v0.27.6/go.mod h1:NvjLtaneUeb0GgMPpCBF+4LNB9GuhDHi16uUTjBhQfU=
+k8s.io/gengo v0.0.0-20220902162205-c0856e24416d h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08=
+k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
+k8s.io/klog/v2 v2.100.1 h1:7WCHKK6K8fNhTqfBhISHQ97KrnJNFZMcQvKp7gP/tmg=
+k8s.io/klog/v2 v2.100.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
+k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f h1:2kWPakN3i/k81b0gvD5C5FJ2kxm1WrQFanWchyKuqGg=
+k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f/go.mod h1:byini6yhqGC14c3ebc/QwanvYwhuMWF6yz2F8uwW8eg=
+k8s.io/utils v0.0.0-20230209194617-a36077c30491 h1:r0BAOLElQnnFhE/ApUsg3iHdVYYPBjNSSOMowRZxxsY=
+k8s.io/utils v0.0.0-20230209194617-a36077c30491/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732 h1:SAElp8THCfmBdM+4lmWX5gebiSSkEr7PAYDVF91qpfg=
pault.ag/go/sniff v0.0.0-20200207005214-cf7e4d167732/go.mod h1:lpvCfhqEHNJSSpG5R5A2EgsVzG8RTt4RfPoQuRAcDmg=
-sigs.k8s.io/controller-runtime v0.20.2 h1:/439OZVxoEc02psi1h4QO3bHzTgu49bb347Xp4gW1pc=
-sigs.k8s.io/controller-runtime v0.20.2/go.mod h1:xg2XB0K5ShQzAgsoujxuKN4LNXR2LfwwHsPj7Iaw+XY=
-sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 h1:/Rv+M11QRah1itp8VhT6HoVx1Ray9eB4DBr+K+/sCJ8=
-sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3/go.mod h1:18nIHnGi6636UCz6m8i4DhaJ65T6EruyzmoQqI2BVDo=
-sigs.k8s.io/kustomize/api v0.18.0 h1:hTzp67k+3NEVInwz5BHyzc9rGxIauoXferXyjv5lWPo=
-sigs.k8s.io/kustomize/api v0.18.0/go.mod h1:f8isXnX+8b+SGLHQ6yO4JG1rdkZlvhaCf/uZbLVMb0U=
-sigs.k8s.io/kustomize/kyaml v0.18.1 h1:WvBo56Wzw3fjS+7vBjN6TeivvpbW9GmRaWZ9CIVmt4E=
-sigs.k8s.io/kustomize/kyaml v0.18.1/go.mod h1:C3L2BFVU1jgcddNBE1TxuVLgS46TjObMwW5FT9FcjYo=
-sigs.k8s.io/mdtoc v1.4.0 h1:2pDEwJSjoVrGr5BPkG+LoLkYLKvgtGYurrBY8ul3SxQ=
-sigs.k8s.io/mdtoc v1.4.0/go.mod h1:KVnRRtK1rX9aQ95qF0rt3x2ytTxf3r7W7N41H+0KF0k=
-sigs.k8s.io/release-utils v0.8.3 h1:KtOtA4qDmzJyeQ2zkDsFVI25+NViwms/o5eL2NftFdA=
-sigs.k8s.io/release-utils v0.8.3/go.mod h1:fp82Fma06OXBhEJ+GUJKqvcplDBomruK1R/1fWJnsrQ=
-sigs.k8s.io/structured-merge-diff/v4 v4.4.2 h1:MdmvkGuXi/8io6ixD5wud3vOLwc1rj0aNqRlpuvjmwA=
-sigs.k8s.io/structured-merge-diff/v4 v4.4.2/go.mod h1:N8f93tFZh9U6vpxwRArLiikrE5/2tiu1w1AGfACIGE4=
-sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
-sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY=
+rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
+rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
+rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
+sigs.k8s.io/controller-runtime v0.14.6 h1:oxstGVvXGNnMvY7TAESYk+lzr6S3V5VFxQ6d92KcwQA=
+sigs.k8s.io/controller-runtime v0.14.6/go.mod h1:WqIdsAY6JBsjfc/CqO0CORmNtoCtE4S6qbPc9s68h+0=
+sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
+sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
+sigs.k8s.io/kustomize/api v0.13.2 h1:kejWfLeJhUsTGioDoFNJET5LQe/ajzXhJGYoU+pJsiA=
+sigs.k8s.io/kustomize/api v0.13.2/go.mod h1:DUp325VVMFVcQSq+ZxyDisA8wtldwHxLZbr1g94UHsw=
+sigs.k8s.io/kustomize/kyaml v0.14.1 h1:c8iibius7l24G2wVAGZn/Va2wNys03GXLjYVIcFVxKA=
+sigs.k8s.io/kustomize/kyaml v0.14.1/go.mod h1:AN1/IpawKilWD7V+YvQwRGUvuUOOWpjsHu6uHwonSF4=
+sigs.k8s.io/mdtoc v1.1.0 h1:q3YtqYzmC2e0hgLXRIOm7/QLuPux1CX3ZHCwlbABxZo=
+sigs.k8s.io/mdtoc v1.1.0/go.mod h1:QZLVEdHH2iNIR4uHAZyvFRtjloHgVItk8lo/mzCtq3w=
+sigs.k8s.io/structured-merge-diff/v4 v4.2.3 h1:PRbqxJClWWYMNV1dhaG4NsibJbArud9kFxnAMREiWFE=
+sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
+sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
+sigs.k8s.io/yaml v1.3.0 h1:a2VclLzOGrwOHDiV8EfBGhvjHvP46CtW5j6POvhYGGo=
+sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8=
diff --git a/go.work b/go.work
new file mode 100644
index 000000000..3dd9bfdee
--- /dev/null
+++ b/go.work
@@ -0,0 +1,7 @@
+go 1.21.5
+
+use (
+ .
+ ./images/kube-webhook-certgen/rootfs
+ ./magefiles
+)
diff --git a/go.work.sum b/go.work.sum
new file mode 100644
index 000000000..2b31940aa
--- /dev/null
+++ b/go.work.sum
@@ -0,0 +1,183 @@
+cloud.google.com/go v0.97.0/go.mod h1:GF7l59pYBVlXQIBLx3a761cZ41F9bBH3JUlihCt2Udc=
+cloud.google.com/go v0.110.2/go.mod h1:k04UEeEtb6ZBRTv3dZz4CeJC3jKGxyhl0sAiVVquxiw=
+cloud.google.com/go v0.110.4/go.mod h1:+EYjdK8e5RME/VY/qLCAtuyALQ9q67dvuum8i+H5xsI=
+cloud.google.com/go/accessapproval v1.7.1/go.mod h1:JYczztsHRMK7NTXb6Xw+dwbs/WnOJxbo/2mTI+Kgg68=
+cloud.google.com/go/accesscontextmanager v1.8.1/go.mod h1:JFJHfvuaTC+++1iL1coPiG1eu5D24db2wXCDWDjIrxo=
+cloud.google.com/go/aiplatform v1.45.0/go.mod h1:Iu2Q7sC7QGhXUeOhAj/oCK9a+ULz1O4AotZiqjQ8MYA=
+cloud.google.com/go/analytics v0.21.2/go.mod h1:U8dcUtmDmjrmUTnnnRnI4m6zKn/yaA5N9RlEkYFHpQo=
+cloud.google.com/go/apigateway v1.6.1/go.mod h1:ufAS3wpbRjqfZrzpvLC2oh0MFlpRJm2E/ts25yyqmXA=
+cloud.google.com/go/apigeeconnect v1.6.1/go.mod h1:C4awq7x0JpLtrlQCr8AzVIzAaYgngRqWf9S5Uhg+wWs=
+cloud.google.com/go/apigeeregistry v0.7.1/go.mod h1:1XgyjZye4Mqtw7T9TsY4NW10U7BojBvG4RMD+vRDrIw=
+cloud.google.com/go/appengine v1.8.1/go.mod h1:6NJXGLVhZCN9aQ/AEDvmfzKEfoYBlfB80/BHiKVputY=
+cloud.google.com/go/area120 v0.8.1/go.mod h1:BVfZpGpB7KFVNxPiQBuHkX6Ed0rS51xIgmGyjrAfzsg=
+cloud.google.com/go/artifactregistry v1.14.1/go.mod h1:nxVdG19jTaSTu7yA7+VbWL346r3rIdkZ142BSQqhn5E=
+cloud.google.com/go/asset v1.14.1/go.mod h1:4bEJ3dnHCqWCDbWJ/6Vn7GVI9LerSi7Rfdi03hd+WTQ=
+cloud.google.com/go/assuredworkloads v1.11.1/go.mod h1:+F04I52Pgn5nmPG36CWFtxmav6+7Q+c5QyJoL18Lry0=
+cloud.google.com/go/automl v1.13.1/go.mod h1:1aowgAHWYZU27MybSCFiukPO7xnyawv7pt3zK4bheQE=
+cloud.google.com/go/baremetalsolution v0.5.0/go.mod h1:dXGxEkmR9BMwxhzBhV0AioD0ULBmuLZI8CdwalUxuss=
+cloud.google.com/go/batch v0.7.0/go.mod h1:vLZN95s6teRUqRQ4s3RLDsH8PvboqBK+rn1oevL159g=
+cloud.google.com/go/beyondcorp v0.6.1/go.mod h1:YhxDWw946SCbmcWo3fAhw3V4XZMSpQ/VYfcKGAEU8/4=
+cloud.google.com/go/bigquery v1.52.0/go.mod h1:3b/iXjRQGU4nKa87cXeg6/gogLjO8C6PmuM8i5Bi/u4=
+cloud.google.com/go/billing v1.16.0/go.mod h1:y8vx09JSSJG02k5QxbycNRrN7FGZB6F3CAcgum7jvGA=
+cloud.google.com/go/binaryauthorization v1.6.1/go.mod h1:TKt4pa8xhowwffiBmbrbcxijJRZED4zrqnwZ1lKH51U=
+cloud.google.com/go/certificatemanager v1.7.1/go.mod h1:iW8J3nG6SaRYImIa+wXQ0g8IgoofDFRp5UMzaNk1UqI=
+cloud.google.com/go/channel v1.16.0/go.mod h1:eN/q1PFSl5gyu0dYdmxNXscY/4Fi7ABmeHCJNf/oHmc=
+cloud.google.com/go/cloudbuild v1.10.1/go.mod h1:lyJg7v97SUIPq4RC2sGsz/9tNczhyv2AjML/ci4ulzU=
+cloud.google.com/go/clouddms v1.6.1/go.mod h1:Ygo1vL52Ov4TBZQquhz5fiw2CQ58gvu+PlS6PVXCpZI=
+cloud.google.com/go/cloudtasks v1.11.1/go.mod h1:a9udmnou9KO2iulGscKR0qBYjreuX8oHwpmFsKspEvM=
+cloud.google.com/go/compute v1.19.3/go.mod h1:qxvISKp/gYnXkSAD1ppcSOveRAmzxicEv/JlizULFrI=
+cloud.google.com/go/compute v1.20.1/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
+cloud.google.com/go/compute v1.21.0/go.mod h1:4tCnrn48xsqlwSAiLf1HXMQk8CONslYbdiEZc9FEIbM=
+cloud.google.com/go/compute/metadata v0.2.3/go.mod h1:VAV5nSsACxMJvgaAuX6Pk2AawlZn8kiOGuCv6gTkwuA=
+cloud.google.com/go/contactcenterinsights v1.9.1/go.mod h1:bsg/R7zGLYMVxFFzfh9ooLTruLRCG9fnzhH9KznHhbM=
+cloud.google.com/go/container v1.22.1/go.mod h1:lTNExE2R7f+DLbAN+rJiKTisauFCaoDq6NURZ83eVH4=
+cloud.google.com/go/containeranalysis v0.10.1/go.mod h1:Ya2jiILITMY68ZLPaogjmOMNkwsDrWBSTyBubGXO7j0=
+cloud.google.com/go/datacatalog v1.14.1/go.mod h1:d2CevwTG4yedZilwe+v3E3ZBDRMobQfSG/a6cCCN5R4=
+cloud.google.com/go/dataflow v0.9.1/go.mod h1:Wp7s32QjYuQDWqJPFFlnBKhkAtiFpMTdg00qGbnIHVw=
+cloud.google.com/go/dataform v0.8.1/go.mod h1:3BhPSiw8xmppbgzeBbmDvmSWlwouuJkXsXsb8UBih9M=
+cloud.google.com/go/datafusion v1.7.1/go.mod h1:KpoTBbFmoToDExJUso/fcCiguGDk7MEzOWXUsJo0wsI=
+cloud.google.com/go/datalabeling v0.8.1/go.mod h1:XS62LBSVPbYR54GfYQsPXZjTW8UxCK2fkDciSrpRFdY=
+cloud.google.com/go/dataplex v1.8.1/go.mod h1:7TyrDT6BCdI8/38Uvp0/ZxBslOslP2X2MPDucliyvSE=
+cloud.google.com/go/dataproc v1.12.0/go.mod h1:zrF3aX0uV3ikkMz6z4uBbIKyhRITnxvr4i3IjKsKrw4=
+cloud.google.com/go/dataqna v0.8.1/go.mod h1:zxZM0Bl6liMePWsHA8RMGAfmTG34vJMapbHAxQ5+WA8=
+cloud.google.com/go/datastore v1.12.1/go.mod h1:KjdB88W897MRITkvWWJrg2OUtrR5XVj1EoLgSp6/N70=
+cloud.google.com/go/datastream v1.9.1/go.mod h1:hqnmr8kdUBmrnk65k5wNRoHSCYksvpdZIcZIEl8h43Q=
+cloud.google.com/go/deploy v1.11.0/go.mod h1:tKuSUV5pXbn67KiubiUNUejqLs4f5cxxiCNCeyl0F2g=
+cloud.google.com/go/dialogflow v1.38.0/go.mod h1:L7jnH+JL2mtmdChzAIcXQHXMvQkE3U4hTaNltEuxXn4=
+cloud.google.com/go/dlp v1.10.1/go.mod h1:IM8BWz1iJd8njcNcG0+Kyd9OPnqnRNkDV8j42VT5KOI=
+cloud.google.com/go/documentai v1.20.0/go.mod h1:yJkInoMcK0qNAEdRnqY/D5asy73tnPe88I1YTZT+a8E=
+cloud.google.com/go/domains v0.9.1/go.mod h1:aOp1c0MbejQQ2Pjf1iJvnVyT+z6R6s8pX66KaCSDYfE=
+cloud.google.com/go/edgecontainer v1.1.1/go.mod h1:O5bYcS//7MELQZs3+7mabRqoWQhXCzenBu0R8bz2rwk=
+cloud.google.com/go/errorreporting v0.3.0/go.mod h1:xsP2yaAp+OAW4OIm60An2bbLpqIhKXdWR/tawvl7QzU=
+cloud.google.com/go/essentialcontacts v1.6.2/go.mod h1:T2tB6tX+TRak7i88Fb2N9Ok3PvY3UNbUsMag9/BARh4=
+cloud.google.com/go/eventarc v1.12.1/go.mod h1:mAFCW6lukH5+IZjkvrEss+jmt2kOdYlN8aMx3sRJiAI=
+cloud.google.com/go/filestore v1.7.1/go.mod h1:y10jsorq40JJnjR/lQ8AfFbbcGlw3g+Dp8oN7i7FjV4=
+cloud.google.com/go/firestore v1.11.0/go.mod h1:b38dKhgzlmNNGTNZZwe7ZRFEuRab1Hay3/DBsIGKKy4=
+cloud.google.com/go/functions v1.15.1/go.mod h1:P5yNWUTkyU+LvW/S9O6V+V423VZooALQlqoXdoPz5AE=
+cloud.google.com/go/gkebackup v0.4.0/go.mod h1:byAyBGUwYGEEww7xsbnUTBHIYcOPy/PgUWUtOeRm9Vg=
+cloud.google.com/go/gkeconnect v0.8.1/go.mod h1:KWiK1g9sDLZqhxB2xEuPV8V9NYzrqTUmQR9shJHpOZw=
+cloud.google.com/go/gkehub v0.14.1/go.mod h1:VEXKIJZ2avzrbd7u+zeMtW00Y8ddk/4V9511C9CQGTY=
+cloud.google.com/go/gkemulticloud v0.6.1/go.mod h1:kbZ3HKyTsiwqKX7Yw56+wUGwwNZViRnxWK2DVknXWfw=
+cloud.google.com/go/gsuiteaddons v1.6.1/go.mod h1:CodrdOqRZcLp5WOwejHWYBjZvfY0kOphkAKpF/3qdZY=
+cloud.google.com/go/iam v0.13.0/go.mod h1:ljOg+rcNfzZ5d6f1nAUJ8ZIxOaZUVoS14bKCtaLZ/D0=
+cloud.google.com/go/iam v1.1.1/go.mod h1:A5avdyVL2tCppe4unb0951eI9jreack+RJ0/d+KUZOU=
+cloud.google.com/go/iap v1.8.1/go.mod h1:sJCbeqg3mvWLqjZNsI6dfAtbbV1DL2Rl7e1mTyXYREQ=
+cloud.google.com/go/ids v1.4.1/go.mod h1:np41ed8YMU8zOgv53MMMoCntLTn2lF+SUzlM+O3u/jw=
+cloud.google.com/go/iot v1.7.1/go.mod h1:46Mgw7ev1k9KqK1ao0ayW9h0lI+3hxeanz+L1zmbbbk=
+cloud.google.com/go/kms v1.12.1/go.mod h1:c9J991h5DTl+kg7gi3MYomh12YEENGrf48ee/N/2CDM=
+cloud.google.com/go/language v1.10.1/go.mod h1:CPp94nsdVNiQEt1CNjF5WkTcisLiHPyIbMhvR8H2AW0=
+cloud.google.com/go/lifesciences v0.9.1/go.mod h1:hACAOd1fFbCGLr/+weUKRAJas82Y4vrL3O5326N//Wc=
+cloud.google.com/go/logging v1.7.0/go.mod h1:3xjP2CjkM3ZkO73aj4ASA5wRPGGCRrPIAeNqVNkzY8M=
+cloud.google.com/go/longrunning v0.5.0/go.mod h1:0JNuqRShmscVAhIACGtskSAWtqtOoPkwP0YF1oVEchc=
+cloud.google.com/go/longrunning v0.5.1/go.mod h1:spvimkwdz6SPWKEt/XBij79E9fiTkHSQl/fRUUQJYJc=
+cloud.google.com/go/managedidentities v1.6.1/go.mod h1:h/irGhTN2SkZ64F43tfGPMbHnypMbu4RB3yl8YcuEak=
+cloud.google.com/go/maps v0.7.0/go.mod h1:3GnvVl3cqeSvgMcpRlQidXsPYuDGQ8naBis7MVzpXsY=
+cloud.google.com/go/mediatranslation v0.8.1/go.mod h1:L/7hBdEYbYHQJhX2sldtTO5SZZ1C1vkapubj0T2aGig=
+cloud.google.com/go/memcache v1.10.1/go.mod h1:47YRQIarv4I3QS5+hoETgKO40InqzLP6kpNLvyXuyaA=
+cloud.google.com/go/metastore v1.11.1/go.mod h1:uZuSo80U3Wd4zi6C22ZZliOUJ3XeM/MlYi/z5OAOWRA=
+cloud.google.com/go/monitoring v1.15.1/go.mod h1:lADlSAlFdbqQuwwpaImhsJXu1QSdd3ojypXrFSMr2rM=
+cloud.google.com/go/networkconnectivity v1.12.1/go.mod h1:PelxSWYM7Sh9/guf8CFhi6vIqf19Ir/sbfZRUwXh92E=
+cloud.google.com/go/networkmanagement v1.8.0/go.mod h1:Ho/BUGmtyEqrttTgWEe7m+8vDdK74ibQc+Be0q7Fof0=
+cloud.google.com/go/networksecurity v0.9.1/go.mod h1:MCMdxOKQ30wsBI1eI659f9kEp4wuuAueoC9AJKSPWZQ=
+cloud.google.com/go/notebooks v1.9.1/go.mod h1:zqG9/gk05JrzgBt4ghLzEepPHNwE5jgPcHZRKhlC1A8=
+cloud.google.com/go/optimization v1.4.1/go.mod h1:j64vZQP7h9bO49m2rVaTVoNM0vEBEN5eKPUPbZyXOrk=
+cloud.google.com/go/orchestration v1.8.1/go.mod h1:4sluRF3wgbYVRqz7zJ1/EUNc90TTprliq9477fGobD8=
+cloud.google.com/go/orgpolicy v1.11.1/go.mod h1:8+E3jQcpZJQliP+zaFfayC2Pg5bmhuLK755wKhIIUCE=
+cloud.google.com/go/osconfig v1.12.1/go.mod h1:4CjBxND0gswz2gfYRCUoUzCm9zCABp91EeTtWXyz0tE=
+cloud.google.com/go/oslogin v1.10.1/go.mod h1:x692z7yAue5nE7CsSnoG0aaMbNoRJRXO4sn73R+ZqAs=
+cloud.google.com/go/phishingprotection v0.8.1/go.mod h1:AxonW7GovcA8qdEk13NfHq9hNx5KPtfxXNeUxTDxB6I=
+cloud.google.com/go/policytroubleshooter v1.7.1/go.mod h1:0NaT5v3Ag1M7U5r0GfDCpUFkWd9YqpubBWsQlhanRv0=
+cloud.google.com/go/privatecatalog v0.9.1/go.mod h1:0XlDXW2unJXdf9zFz968Hp35gl/bhF4twwpXZAW50JA=
+cloud.google.com/go/pubsub v1.32.0/go.mod h1:f+w71I33OMyxf9VpMVcZbnG5KSUkCOUHYpFd5U1GdRc=
+cloud.google.com/go/pubsublite v1.8.1/go.mod h1:fOLdU4f5xldK4RGJrBMm+J7zMWNj/k4PxwEZXy39QS0=
+cloud.google.com/go/recaptchaenterprise/v2 v2.7.2/go.mod h1:kR0KjsJS7Jt1YSyWFkseQ756D45kaYNTlDPPaRAvDBU=
+cloud.google.com/go/recommendationengine v0.8.1/go.mod h1:MrZihWwtFYWDzE6Hz5nKcNz3gLizXVIDI/o3G1DLcrE=
+cloud.google.com/go/recommender v1.10.1/go.mod h1:XFvrE4Suqn5Cq0Lf+mCP6oBHD/yRMA8XxP5sb7Q7gpA=
+cloud.google.com/go/redis v1.13.1/go.mod h1:VP7DGLpE91M6bcsDdMuyCm2hIpB6Vp2hI090Mfd1tcg=
+cloud.google.com/go/resourcemanager v1.9.1/go.mod h1:dVCuosgrh1tINZ/RwBufr8lULmWGOkPS8gL5gqyjdT8=
+cloud.google.com/go/resourcesettings v1.6.1/go.mod h1:M7mk9PIZrC5Fgsu1kZJci6mpgN8o0IUzVx3eJU3y4Jw=
+cloud.google.com/go/retail v1.14.1/go.mod h1:y3Wv3Vr2k54dLNIrCzenyKG8g8dhvhncT2NcNjb/6gE=
+cloud.google.com/go/run v0.9.0/go.mod h1:Wwu+/vvg8Y+JUApMwEDfVfhetv30hCG4ZwDR/IXl2Qg=
+cloud.google.com/go/scheduler v1.10.1/go.mod h1:R63Ldltd47Bs4gnhQkmNDse5w8gBRrhObZ54PxgR2Oo=
+cloud.google.com/go/secretmanager v1.11.1/go.mod h1:znq9JlXgTNdBeQk9TBW/FnR/W4uChEKGeqQWAJ8SXFw=
+cloud.google.com/go/security v1.15.1/go.mod h1:MvTnnbsWnehoizHi09zoiZob0iCHVcL4AUBj76h9fXA=
+cloud.google.com/go/securitycenter v1.23.0/go.mod h1:8pwQ4n+Y9WCWM278R8W3nF65QtY172h4S8aXyI9/hsQ=
+cloud.google.com/go/servicedirectory v1.10.1/go.mod h1:Xv0YVH8s4pVOwfM/1eMTl0XJ6bzIOSLDt8f8eLaGOxQ=
+cloud.google.com/go/shell v1.7.1/go.mod h1:u1RaM+huXFaTojTbW4g9P5emOrrmLE69KrxqQahKn4g=
+cloud.google.com/go/spanner v1.47.0/go.mod h1:IXsJwVW2j4UKs0eYDqodab6HgGuA1bViSqW4uH9lfUI=
+cloud.google.com/go/speech v1.17.1/go.mod h1:8rVNzU43tQvxDaGvqOhpDqgkJTFowBpDvCJ14kGlJYo=
+cloud.google.com/go/storage v1.30.1/go.mod h1:NfxhC0UJE1aXSx7CIIbCf7y9HKT7BiccwkR7+P7gN8E=
+cloud.google.com/go/storagetransfer v1.10.0/go.mod h1:DM4sTlSmGiNczmV6iZyceIh2dbs+7z2Ayg6YAiQlYfA=
+cloud.google.com/go/talent v1.6.2/go.mod h1:CbGvmKCG61mkdjcqTcLOkb2ZN1SrQI8MDyma2l7VD24=
+cloud.google.com/go/texttospeech v1.7.1/go.mod h1:m7QfG5IXxeneGqTapXNxv2ItxP/FS0hCZBwXYqucgSk=
+cloud.google.com/go/tpu v1.6.1/go.mod h1:sOdcHVIgDEEOKuqUoi6Fq53MKHJAtOwtz0GuKsWSH3E=
+cloud.google.com/go/trace v1.10.1/go.mod h1:gbtL94KE5AJLH3y+WVpfWILmqgc6dXcqgNXdOPAQTYk=
+cloud.google.com/go/translate v1.8.1/go.mod h1:d1ZH5aaOA0CNhWeXeC8ujd4tdCFw8XoNWRljklu5RHs=
+cloud.google.com/go/video v1.17.1/go.mod h1:9qmqPqw/Ib2tLqaeHgtakU+l5TcJxCJbhFXM7UJjVzU=
+cloud.google.com/go/videointelligence v1.11.1/go.mod h1:76xn/8InyQHarjTWsBR058SmlPCwQjgcvoW0aZykOvo=
+cloud.google.com/go/vision/v2 v2.7.2/go.mod h1:jKa8oSYBWhYiXarHPvP4USxYANYUEdEsQrloLjrSwJU=
+cloud.google.com/go/vmmigration v1.7.1/go.mod h1:WD+5z7a/IpZ5bKK//YmT9E047AD+rjycCAvyMxGJbro=
+cloud.google.com/go/vmwareengine v0.4.1/go.mod h1:Px64x+BvjPZwWuc4HdmVhoygcXqEkGHXoa7uyfTgSI0=
+cloud.google.com/go/vpcaccess v1.7.1/go.mod h1:FogoD46/ZU+JUBX9D606X21EnxiszYi2tArQwLY4SXs=
+cloud.google.com/go/webrisk v1.9.1/go.mod h1:4GCmXKcOa2BZcZPn6DCEvE7HypmEJcJkr4mtM+sqYPc=
+cloud.google.com/go/websecurityscanner v1.6.1/go.mod h1:Njgaw3rttgRHXzwCB8kgCYqv5/rGpFCsBOvPbYgszpg=
+cloud.google.com/go/workflows v1.11.1/go.mod h1:Z+t10G1wF7h8LgdY/EmRcQY8ptBD/nvofaL6FqlET6g=
+github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5/go.mod h1:wHh0iHkYZB8zMSxRWpUBQtwG5a7fFgvEO+odwuTv2gs=
+github.com/blang/semver v3.5.1+incompatible h1:cQNTCjp13qL8KC3Nbxr/y2Bqb63oX6wdnnjpJbkM4JQ=
+github.com/census-instrumentation/opencensus-proto v0.4.1/go.mod h1:4T9NM4+4Vw91VeyqjLS6ao50K5bOcLKN6Q42XnYaRYw=
+github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko=
+github.com/checkpoint-restore/go-criu/v5 v5.3.0/go.mod h1:E/eQpaFtUKGOOSEBZgmKAcn+zUUwWxqcaKZlF54wK8E=
+github.com/chromedp/cdproto v0.0.0-20230802225258-3cf4e6d46a89/go.mod h1:GKljq0VrfU4D5yc+2qA6OVr8pmO/MBbPEWqWQ/oqGEs=
+github.com/chromedp/chromedp v0.9.2/go.mod h1:LkSXJKONWTCHAfQasKFUZI+mxqS4tZqhmtGzzhLsnLs=
+github.com/chromedp/sysutil v1.0.0/go.mod h1:kgWmDdq8fTzXYcKIBqIYvRRTnYb9aNS9moAV0xufSww=
+github.com/chzyer/logex v1.2.1/go.mod h1:JLbx6lG2kDbNRFnfkgvh4eRJRPX1QCoOIWomwysCBrQ=
+github.com/chzyer/readline v1.5.1/go.mod h1:Eh+b79XXUwfKfcPLepksvw2tcLE/Ct21YObkaSkeBlk=
+github.com/chzyer/test v1.0.0/go.mod h1:2JlltgoNkt4TW/z9V/IzDdFaMTM2JPIi26O1pF38GC8=
+github.com/cilium/ebpf v0.7.0/go.mod h1:/oI2+1shJiTGAMgl6/RgJr36Eo1jzrRcAWbcXO2usCA=
+github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
+github.com/cncf/udpa/go v0.0.0-20220112060539-c52dc94e7fbe/go.mod h1:6pvJx4me5XPnfI9Z40ddWsdw2W/uZgQLFXToKeRcDiI=
+github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/cncf/xds/go v0.0.0-20230607035331-e9ce68804cb4/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
+github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U=
+github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk=
+github.com/emicklei/go-restful v2.9.5+incompatible h1:spTtZBk5DYEvbxMVutUuTyh1Ao2r4iyvLdACqsl/Ljk=
+github.com/emicklei/go-restful/v3 v3.8.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
+github.com/emicklei/go-restful/v3 v3.9.0/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
+github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
+github.com/envoyproxy/go-control-plane v0.11.1/go.mod h1:uhMcXKCQMEJHiAb0w+YGefQLaTEw+YhGluxZkrTmD0g=
+github.com/envoyproxy/protoc-gen-validate v1.0.2/go.mod h1:GpiZQP3dDbg4JouG/NNS7QWXpgx6x8QiMKdmN72jogE=
+github.com/felixge/httpsnoop v1.0.3/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs=
+github.com/go-logr/logr v1.2.3/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
+github.com/gobwas/httphead v0.1.0/go.mod h1:O/RXo79gxV8G+RqlR/otEwx4Q36zl9rqC5u12GKvMCM=
+github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
+github.com/gobwas/ws v1.2.1/go.mod h1:hRKAFb8wOxFROYNsT1bqfWnhX+b5MFeJM9r2ZSwg/KY=
+github.com/golang/glog v1.1.0/go.mod h1:pfYeQZ3JWZoXTV5sFc986z3HTpwQs9At6P4ImfuP3NQ=
+github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
+github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/martian/v3 v3.3.2/go.mod h1:oBOf6HBosgwRXnUGWUB05QECsc6uvmMiJ3+6W4l/CUk=
+github.com/google/pprof v0.0.0-20210407192527-94a9f03dee38/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
+github.com/google/s2a-go v0.1.4/go.mod h1:Ej+mSEMGRnqRzjc7VtF+jdBwYG5fuJfiZ8ELkjEwM0A=
+github.com/googleapis/enterprise-certificate-proxy v0.2.3/go.mod h1:AwSRAtLfXpU5Nm3pW+v7rGDHp09LsPtGY9MduiEsR9k=
+github.com/googleapis/gax-go/v2 v2.11.0/go.mod h1:DxmR61SGKkGLa2xigwuZIQpkCI2S5iydzRfb3peWZJI=
+github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
+github.com/ianlancetaylor/demangle v0.0.0-20230524184225-eabc099b10ab/go.mod h1:gx7rwoVhcfuVKG5uya9Hs3Sxj7EIvldVofAWIUtGouw=
+github.com/ledongthuc/pdf v0.0.0-20220302134840-0c2507a12d80/go.mod h1:imJHygn/1yfhB7XSJJKlFZKl/J+dCPAknuiaGOshXAs=
+github.com/orisano/pixelmatch v0.0.0-20220722002657-fb0b55479cde/go.mod h1:nZgzbfBr3hhjoZnS66nKrHmduYNpc34ny7RK4z5/HM0=
+github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
+golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
+golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
+golang.org/x/net v0.16.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
+golang.org/x/sync v0.4.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
+golang.org/x/sys v0.0.0-20220310020820-b874c991c1a5/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
+golang.org/x/tools v0.12.0/go.mod h1:Sc0INKfu04TlqNoRA1hgpFZbhYXHPr4V5DzpSBTPqQM=
+golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
+google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
diff --git a/hack/init-buildx.sh b/hack/init-buildx.sh
index bac68e1ae..1a47bf145 100755
--- a/hack/init-buildx.sh
+++ b/hack/init-buildx.sh
@@ -42,11 +42,12 @@ fi
# We can skip setup if the current builder already has multi-arch
# AND if it isn't the docker driver, which doesn't work
current_builder="$(docker buildx inspect)"
-# linux/amd64, linux/arm, linux/arm64
+# linux/amd64, linux/arm64, linux/riscv64, linux/ppc64le, linux/s390x, linux/386, linux/arm/v7, linux/arm/v6
if ! grep -q "^Driver: docker$" <<<"${current_builder}" && \
grep -q "linux/amd64" <<<"${current_builder}" && \
grep -q "linux/arm" <<<"${current_builder}" && \
- grep -q "linux/arm64" <<<"${current_builder}"; then
+ grep -q "linux/arm64" <<<"${current_builder}" && \
+ grep -q "linux/s390x" <<<"${current_builder}"; then
exit 0
fi
diff --git a/hack/manifest-templates/provider/kind/values.yaml b/hack/manifest-templates/provider/kind/values.yaml
index 6140f6500..ed636f372 100644
--- a/hack/manifest-templates/provider/kind/values.yaml
+++ b/hack/manifest-templates/provider/kind/values.yaml
@@ -8,9 +8,11 @@ controller:
enabled: true
terminationGracePeriodSeconds: 0
service:
- type: LoadBalancer
+ type: NodePort
watchIngressWithoutClass: true
+ nodeSelector:
+ ingress-ready: "true"
tolerations:
- key: "node-role.kubernetes.io/master"
operator: "Equal"
diff --git a/hack/print-e2e-suite.sh b/hack/print-e2e-suite.sh
index 12b0efb13..e6b083d58 100755
--- a/hack/print-e2e-suite.sh
+++ b/hack/print-e2e-suite.sh
@@ -14,8 +14,8 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-if [ "$DEBUG" == "true" ]; then
- set -x
+if [ -n "$DEBUG" ]; then
+ set -x
fi
set -o errexit
@@ -25,6 +25,5 @@ set -o pipefail
DIR=$(cd $(dirname "${BASH_SOURCE}")/.. && pwd -P)
$DIR/test/e2e/e2e.test \
- --ginkgo.no-color \
- --ginkgo.v \
- --ginkgo.dry-run | sed "s|$DIR/|File: |g" | sed 's/•//g' | tail -n+5 | head -n-3
+ -ginkgo.noColor \
+ -ginkgo.dryRun | sed "s|$DIR/|File: |g" | sed 's/•//g' | tail -n+5 | head -n-3
diff --git a/hack/update-codegen.sh b/hack/update-codegen.sh
index 47a104584..fadc67633 100755
--- a/hack/update-codegen.sh
+++ b/hack/update-codegen.sh
@@ -27,7 +27,7 @@ if [[ ! -d ${CODEGEN_PKG} ]]; then
fi
# Ensure we can execute.
-chmod +x ${CODEGEN_PKG}/kube_codegen.sh
+chmod +x ${CODEGEN_PKG}/generate-groups.sh
# generate the code with:
# --output-base because this script should also be able to run inside the vendor dir of
@@ -37,7 +37,7 @@ chmod +x ${CODEGEN_PKG}/kube_codegen.sh
# k8s.io/ingress-nginx/pkg/client k8s.io/ingress-nginx/pkg/apis \
# nginxingress:v1alpha1 \
# --output-base "$(dirname ${BASH_SOURCE})/../../.."
-${CODEGEN_PKG}/kube_codegen.sh "deepcopy" \
+${CODEGEN_PKG}/generate-groups.sh "deepcopy" \
k8s.io/ingress-nginx/internal k8s.io/ingress-nginx/pkg/apis \
.:ingress \
--output-base "$(dirname ${BASH_SOURCE})/../../.." \
diff --git a/hack/verify-annotation-docs.sh b/hack/verify-annotation-docs.sh
deleted file mode 100755
index 54034539b..000000000
--- a/hack/verify-annotation-docs.sh
+++ /dev/null
@@ -1,46 +0,0 @@
-#!/bin/bash
-
-# Copyright 2024 The Kubernetes Authors.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-set -o errexit
-set -o nounset
-set -o pipefail
-
-SCRIPT_ROOT=$(dirname "${BASH_SOURCE}")/..
-
-ANNOTATIONFILE="${SCRIPT_ROOT}/docs/user-guide/nginx-configuration/annotations-risk.md"
-TMP_DIFFROOT="${SCRIPT_ROOT}/_tmp"
-TMP_FILE="${TMP_DIFFROOT}/annotations-risk.md"
-
-cleanup() {
- rm -rf "${TMP_DIFFROOT}"
-}
-trap "cleanup" EXIT SIGINT
-
-cleanup
-
-mkdir -p "${TMP_DIFFROOT}"
-
-go run cmd/annotations/main.go -output "${TMP_FILE}"
-echo "diffing ${ANNOTATIONFILE} against freshly generated annotation doc"
-ret=0
-diff -Naupr --no-dereference "${ANNOTATIONFILE}" "${TMP_FILE}" || ret=1
-
-if [[ $ret -eq 0 ]]; then
- echo "${ANNOTATIONFILE} up to date."
-else
- echo "${ANNOTATIONFILE} is out of date. Please run hack/update-annotation-doc.sh"
- exit 1
-fi
diff --git a/hack/update-annotation-doc.sh b/hack/verify-chart-lint.sh
similarity index 70%
rename from hack/update-annotation-doc.sh
rename to hack/verify-chart-lint.sh
index c4feb41ce..1c661ae2b 100755
--- a/hack/update-annotation-doc.sh
+++ b/hack/verify-chart-lint.sh
@@ -1,6 +1,6 @@
#!/bin/bash
-# Copyright 2024 The Kubernetes Authors.
+# Copyright 2020 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -16,8 +16,7 @@
set -o errexit
set -o nounset
+set -o pipefail
-SCRIPT_ROOT=$(dirname "${BASH_SOURCE}")/..
-ANNOTATIONFILE="${SCRIPT_ROOT}/docs/user-guide/nginx-configuration/annotations-risk.md"
-
-go run "${SCRIPT_ROOT}"/cmd/annotations/main.go -output "${ANNOTATIONFILE}"
\ No newline at end of file
+KUBE_ROOT="$( cd "$(dirname "$0")../" >/dev/null 2>&1 ; pwd -P )"
+ct lint --charts ${KUBE_ROOT}/charts/ingress-nginx --validate-maintainers=false
diff --git a/hack/verify-lualint.sh b/hack/verify-lualint.sh
index 769d7a6cd..1f6048de0 100755
--- a/hack/verify-lualint.sh
+++ b/hack/verify-lualint.sh
@@ -18,13 +18,6 @@ set -o errexit
set -o nounset
set -o pipefail
-luacheck --codes --globals lua_ingress \
- --globals configuration \
- --globals balancer \
- --globals monitor \
- --globals certificate \
- --globals tcp_udp_configuration \
- --globals tcp_udp_balancer \
- --no-max-comment-line-length -q rootfs/etc/nginx/lua/
+luacheck --codes -q rootfs/etc/nginx/lua/
find rootfs/etc/nginx/lua/ -name "*.lua" -not -path "*/test/*" -exec lj-releng -L -s {} + && echo "lj-releng validation is success!"
diff --git a/images/OWNERS b/images/OWNERS
new file mode 100644
index 000000000..00f162ebd
--- /dev/null
+++ b/images/OWNERS
@@ -0,0 +1,9 @@
+# See the OWNERS docs: https://github.com/kubernetes/community/blob/master/contributors/guide/owners.md
+
+approvers:
+- ingress-nginx-admins
+- ingress-nginx-maintainers
+
+reviewers:
+- ingress-nginx-admins
+- ingress-nginx-maintainers
diff --git a/images/cfssl/Makefile b/images/cfssl/Makefile
new file mode 100644
index 000000000..31c37fbc5
--- /dev/null
+++ b/images/cfssl/Makefile
@@ -0,0 +1,57 @@
+# Copyright 2020 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/e2e-test-cfssl
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/cfssl/TAG b/images/cfssl/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/cfssl/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/cfssl/cloudbuild.yaml b/images/cfssl/cloudbuild.yaml
index 33fafdb08..5fed3b712 100644
--- a/images/cfssl/cloudbuild.yaml
+++ b/images/cfssl/cloudbuild.yaml
@@ -1,11 +1,17 @@
+timeout: 600s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=cfssl push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/cfssl && make push
diff --git a/images/cfssl/rootfs/Dockerfile b/images/cfssl/rootfs/Dockerfile
index 3978c8f4b..569756d79 100644
--- a/images/cfssl/rootfs/Dockerfile
+++ b/images/cfssl/rootfs/Dockerfile
@@ -12,9 +12,10 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.21
+FROM alpine:3.19.0
-RUN echo "@testing https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+
+RUN echo "@testing http://nl.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk update \
&& apk upgrade && \
apk add --no-cache \
diff --git a/images/custom-error-pages/Makefile b/images/custom-error-pages/Makefile
new file mode 100644
index 000000000..98f7104a7
--- /dev/null
+++ b/images/custom-error-pages/Makefile
@@ -0,0 +1,59 @@
+# Copyright 2021 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# Container image for nginx-errors.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/nginx-errors
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/custom-error-pages/README.md b/images/custom-error-pages/README.md
new file mode 100644
index 000000000..cd6df3e0a
--- /dev/null
+++ b/images/custom-error-pages/README.md
@@ -0,0 +1,3 @@
+# custom-error-pages
+
+Example of Custom error pages for the Ingress-Nginx Controller
diff --git a/images/custom-error-pages/TAG b/images/custom-error-pages/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/custom-error-pages/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/custom-error-pages/cloudbuild.yaml b/images/custom-error-pages/cloudbuild.yaml
index 324a8f19a..a443d2b11 100644
--- a/images/custom-error-pages/cloudbuild.yaml
+++ b/images/custom-error-pages/cloudbuild.yaml
@@ -1,11 +1,17 @@
+timeout: 1800s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=custom-error-pages push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/custom-error-pages && make push
diff --git a/images/custom-error-pages/rootfs/Dockerfile b/images/custom-error-pages/rootfs/Dockerfile
index 478e4c22d..3647788d4 100755
--- a/images/custom-error-pages/rootfs/Dockerfile
+++ b/images/custom-error-pages/rootfs/Dockerfile
@@ -12,9 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-ARG GOLANG_VERSION
-
-FROM golang:${GOLANG_VERSION}-alpine3.21 as builder
+FROM golang:1.21.5-alpine3.18 as builder
RUN apk update \
&& apk upgrade && apk add git
diff --git a/images/custom-error-pages/rootfs/go.mod b/images/custom-error-pages/rootfs/go.mod
index 5c0377284..ce0fffd4a 100644
--- a/images/custom-error-pages/rootfs/go.mod
+++ b/images/custom-error-pages/rootfs/go.mod
@@ -1,17 +1,17 @@
module k8s.io/ingress-nginx/custom-error-pages
-go 1.23.6
+go 1.21.5
-require github.com/prometheus/client_golang v1.20.5
+require github.com/prometheus/client_golang v1.11.1
require (
github.com/beorn7/perks v1.0.1 // indirect
- github.com/cespare/xxhash/v2 v2.3.0 // indirect
- github.com/klauspost/compress v1.17.9 // indirect
- github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
- github.com/prometheus/client_model v0.6.1 // indirect
- github.com/prometheus/common v0.55.0 // indirect
- github.com/prometheus/procfs v0.15.1 // indirect
- golang.org/x/sys v0.22.0 // indirect
- google.golang.org/protobuf v1.34.2 // indirect
+ github.com/cespare/xxhash/v2 v2.1.1 // indirect
+ github.com/golang/protobuf v1.5.0 // indirect
+ github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
+ github.com/prometheus/client_model v0.2.0 // indirect
+ github.com/prometheus/common v0.26.0 // indirect
+ github.com/prometheus/procfs v0.6.0 // indirect
+ golang.org/x/sys v0.1.0 // indirect
+ google.golang.org/protobuf v1.28.0 // indirect
)
diff --git a/images/custom-error-pages/rootfs/go.sum b/images/custom-error-pages/rootfs/go.sum
index d5318cf86..a5f86cade 100644
--- a/images/custom-error-pages/rootfs/go.sum
+++ b/images/custom-error-pages/rootfs/go.sum
@@ -1,24 +1,141 @@
+cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
+github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
+github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
-github.com/cespare/xxhash/v2 v2.3.0 h1:UL815xU9SqsFlibzuggzjXhog7bL6oX9BbNZnL2UFvs=
-github.com/cespare/xxhash/v2 v2.3.0/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
-github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
-github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
-github.com/klauspost/compress v1.17.9 h1:6KIumPrER1LHsvBVuDa0r5xaG0Es51mhhB9BQB2qeMA=
-github.com/klauspost/compress v1.17.9/go.mod h1:Di0epgTjJY877eYKx5yC51cX2A2Vl2ibi7bDH9ttBbw=
-github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
-github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
-github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
-github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/prometheus/client_golang v1.20.5 h1:cxppBPuYhUnsO6yo/aoRol4L7q7UFfdm+bR9r+8l63Y=
-github.com/prometheus/client_golang v1.20.5/go.mod h1:PIEt8X02hGcP8JWbeHyeZ53Y/jReSnHgO035n//V5WE=
-github.com/prometheus/client_model v0.6.1 h1:ZKSh/rekM+n3CeS952MLRAdFwIKqeY8b62p8ais2e9E=
-github.com/prometheus/client_model v0.6.1/go.mod h1:OrxVMOVHjw3lKMa8+x6HeMGkHMQyHDk9E3jmP2AmGiY=
-github.com/prometheus/common v0.55.0 h1:KEi6DK7lXW/m7Ig5i47x0vRzuBsHuvJdi5ee6Y3G1dc=
-github.com/prometheus/common v0.55.0/go.mod h1:2SECS4xJG1kd8XF9IcM1gMX6510RAEL65zxzNImwdc8=
-github.com/prometheus/procfs v0.15.1 h1:YagwOFzUgYfKKHX6Dr+sHT7km/hxC76UB0learggepc=
-github.com/prometheus/procfs v0.15.1/go.mod h1:fB45yRUv8NstnjriLhBQLuOUt+WW4BsoGhij/e3PBqk=
-golang.org/x/sys v0.22.0 h1:RI27ohtqKCnwULzJLqkv897zojh5/DwS/ENaMzUOaWI=
-golang.org/x/sys v0.22.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-google.golang.org/protobuf v1.34.2 h1:6xV6lTsCfpGD21XK49h7MhtcApnLqkfYgPcdHftf6hg=
-google.golang.org/protobuf v1.34.2/go.mod h1:qYOHts0dSfpeUzUFpOMr/WGzszTmLH+DiWniOlNbLDw=
+github.com/cespare/xxhash/v2 v2.1.1 h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+qY=
+github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
+github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
+github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
+github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
+github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
+github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.5.0 h1:LUVKkCeviFUMKqHa4tXIIij/lbhnMbP7Fn5wKdKkRh4=
+github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.5 h1:Khx7svrCpmxxtHBq5j2mp/xVjsi8hQMfNLvJFAlrGgU=
+github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
+github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
+github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
+github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
+github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
+github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
+github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
+github.com/prometheus/client_golang v1.11.1 h1:+4eQaD7vAZ6DsfsxB15hbE0odUjGI5ARs9yskGu1v4s=
+github.com/prometheus/client_golang v1.11.1/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
+github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.2.0 h1:uq5h0d+GuxiXLJLNABMgp2qUWDPiLvgCzz2dUR+/W/M=
+github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
+github.com/prometheus/common v0.26.0 h1:iMAkS2TDoNWnKM+Kopnx/8tnEStIfpYA0ur0xQzzhMQ=
+github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
+github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
+github.com/prometheus/procfs v0.6.0 h1:mxy4L2jP6qMonqmq+aTtOx1ifVWUgG/TAmntgbh3xv4=
+github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
+github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
+github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
+github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
+github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
+golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
+golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.1.0 h1:kunALQeHf1/185U1i0GOB/fy1IPRDDpuoOOqRReG57U=
+golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
+golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543 h1:E7g+9GITq07hpfrRu66IVDexMakfv52eLZ2CXBWiKr4=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
+google.golang.org/protobuf v1.28.0 h1:w43yiav+6bVFTBQFZX0r7ipe9JQ1QsbMgHwbBziscLw=
+google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
+gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
diff --git a/images/e2e-test-echo/EXTRAARGS b/images/e2e-test-echo/EXTRAARGS
deleted file mode 100644
index 3db8aaa5c..000000000
--- a/images/e2e-test-echo/EXTRAARGS
+++ /dev/null
@@ -1 +0,0 @@
---build-arg LUAROCKS_VERSION=3.8.0 --build-arg LUAROCKS_SHA=ab6612ca9ab87c6984871d2712d05525775e8b50172701a0a1cabddf76de2be7
\ No newline at end of file
diff --git a/images/e2e-test-echo/TAG b/images/e2e-test-echo/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/e2e-test-echo/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/e2e-test-echo/cloudbuild.yaml b/images/e2e-test-echo/cloudbuild.yaml
deleted file mode 100644
index 02bfc034a..000000000
--- a/images/e2e-test-echo/cloudbuild.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-options:
- # Ignore Prow provided substitutions.
- substitution_option: ALLOW_LOOSE
-steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
- entrypoint: bash
- args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=e2e-test-echo push
diff --git a/images/echo/Makefile b/images/echo/Makefile
new file mode 100644
index 000000000..a213df5d3
--- /dev/null
+++ b/images/echo/Makefile
@@ -0,0 +1,61 @@
+# Copyright 2020 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/e2e-test-echo
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+BASE_IMAGE = $(shell cat $(DIR)/../../NGINX_BASE)
+# build with buildx
+PLATFORMS?=linux/amd64
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ --build-arg BASE_IMAGE=${BASE_IMAGE} \
+ --build-arg LUAROCKS_VERSION=3.8.0 \
+ --build-arg LUAROCKS_SHA=ab6612ca9ab87c6984871d2712d05525775e8b50172701a0a1cabddf76de2be7 \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/echo/cloudbuild.yaml b/images/echo/cloudbuild.yaml
new file mode 100644
index 000000000..811d8d3f0
--- /dev/null
+++ b/images/echo/cloudbuild.yaml
@@ -0,0 +1,17 @@
+timeout: 1200s
+options:
+ substitution_option: ALLOW_LOOSE
+steps:
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
+ entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
+ args:
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/echo && make push
diff --git a/images/e2e-test-echo/rootfs/Dockerfile b/images/echo/rootfs/Dockerfile
similarity index 92%
rename from images/e2e-test-echo/rootfs/Dockerfile
rename to images/echo/rootfs/Dockerfile
index eaa919835..c4ab26561 100644
--- a/images/e2e-test-echo/rootfs/Dockerfile
+++ b/images/echo/rootfs/Dockerfile
@@ -17,4 +17,4 @@ RUN wget -O /tmp/luarocks.tgz \
RUN luarocks install lua-resty-template
-COPY nginx.conf /etc/nginx/nginx.conf
\ No newline at end of file
+COPY nginx.conf /etc/nginx/nginx.conf
diff --git a/images/e2e-test-echo/rootfs/nginx.conf b/images/echo/rootfs/nginx.conf
similarity index 100%
rename from images/e2e-test-echo/rootfs/nginx.conf
rename to images/echo/rootfs/nginx.conf
diff --git a/images/ext-auth-example-authsvc/Makefile b/images/ext-auth-example-authsvc/Makefile
new file mode 100644
index 000000000..63f261ec3
--- /dev/null
+++ b/images/ext-auth-example-authsvc/Makefile
@@ -0,0 +1,57 @@
+# Copyright 2022 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/ext-auth-example-authsvc
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/ext-auth-example-authsvc/TAG b/images/ext-auth-example-authsvc/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/ext-auth-example-authsvc/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/ext-auth-example-authsvc/cloudbuild.yaml b/images/ext-auth-example-authsvc/cloudbuild.yaml
new file mode 100644
index 000000000..4a436e012
--- /dev/null
+++ b/images/ext-auth-example-authsvc/cloudbuild.yaml
@@ -0,0 +1,19 @@
+timeout: 1200s
+options:
+ substitution_option: ALLOW_LOOSE
+ # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ machineType: E2_HIGHCPU_8
+steps:
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
+ entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
+ args:
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/ext-auth-example-authsvc && make push
diff --git a/images/ext-auth-example-authsvc/rootfs/Dockerfile b/images/ext-auth-example-authsvc/rootfs/Dockerfile
index ca142e663..f85698398 100644
--- a/images/ext-auth-example-authsvc/rootfs/Dockerfile
+++ b/images/ext-auth-example-authsvc/rootfs/Dockerfile
@@ -1,6 +1,4 @@
-ARG GOLANG_VERSION
-
-FROM golang:${GOLANG_VERSION}-alpine3.21 as builder
+FROM golang:1.21.5-alpine3.18 as builder
RUN mkdir /authsvc
WORKDIR /authsvc
COPY . ./
diff --git a/images/ext-auth-example-authsvc/rootfs/go.mod b/images/ext-auth-example-authsvc/rootfs/go.mod
index 5f33a86ff..3608868b3 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.mod
+++ b/images/ext-auth-example-authsvc/rootfs/go.mod
@@ -1,7 +1,7 @@
module example.com/authsvc
-go 1.23.6
+go 1.21.5
-require k8s.io/apimachinery v0.32.2
+require k8s.io/apimachinery v0.23.1
-require github.com/google/uuid v1.6.0 // indirect
+require github.com/google/uuid v1.1.2 // indirect
diff --git a/images/ext-auth-example-authsvc/rootfs/go.sum b/images/ext-auth-example-authsvc/rootfs/go.sum
index 770c22f6a..6e3fab295 100644
--- a/images/ext-auth-example-authsvc/rootfs/go.sum
+++ b/images/ext-auth-example-authsvc/rootfs/go.sum
@@ -1,4 +1,215 @@
-github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
-github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
-k8s.io/apimachinery v0.32.2 h1:yoQBR9ZGkA6Rgmhbp/yuT9/g+4lxtsGYwW6dR6BDPLQ=
-k8s.io/apimachinery v0.32.2/go.mod h1:GpHVgxoKlTxClKcteaeuF1Ul/lDVb74KpZcxcmLDElE=
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
+github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
+github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
+github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
+github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
+github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
+github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=
+github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
+github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
+github.com/getkin/kin-openapi v0.76.0/go.mod h1:660oXbgy5JFMKreazJaQTw7o+X00qeSyhcnluiMv+Xg=
+github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
+github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas=
+github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
+github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
+github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
+github.com/go-openapi/jsonreference v0.19.3/go.mod h1:rjx6GuL8TTa9VaixXglHmQmIL98+wF9xc8zWvFonSJ8=
+github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
+github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
+github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
+github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/uuid v1.1.2 h1:EVhdT+1Kseyi1/pUmXKaFxYsDNy9RQYkMWRH68J/W7Y=
+github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/googleapis/gnostic v0.5.1/go.mod h1:6U4PtQXGIEt/Z3h5MAT7FNofLnw9vXk2cUuW7uA/OeU=
+github.com/googleapis/gnostic v0.5.5/go.mod h1:7+EbHbldMins07ALC74bsA81Ovc97DwqyJO1AENw9kA=
+github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
+github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
+github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
+github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
+github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
+github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
+github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
+github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
+github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
+github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
+github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
+github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
+github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
+github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
+github.com/onsi/ginkgo v1.14.0/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY=
+github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA=
+github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
+github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
+github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/spf13/afero v1.2.2/go.mod h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
+github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
+github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
+golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190827160401-ba9fcec4b297/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
+golang.org/x/net v0.0.0-20211209124913-491a49abca63/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200519105757-fe76b779f299/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210831042530-f4d43177bf5e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
+golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
+golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
+golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
+golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
+golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
+google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
+google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
+google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
+gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
+gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
+gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
+gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+k8s.io/apimachinery v0.23.1 h1:sfBjlDFwj2onG0Ijx5C+SrAoeUscPrmghm7wHP+uXlo=
+k8s.io/apimachinery v0.23.1/go.mod h1:SADt2Kl8/sttJ62RRsi9MIV4o8f5S3coArm0Iu3fBno=
+k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE=
+k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
+k8s.io/klog/v2 v2.30.0/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
+k8s.io/kube-openapi v0.0.0-20211115234752-e816edb12b65/go.mod h1:sX9MT8g7NVZM5lVL/j8QyCCJe8YSMW30QvGZWaCIDIk=
+k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+k8s.io/utils v0.0.0-20210930125809-cb0fa318a74b/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+sigs.k8s.io/json v0.0.0-20211020170558-c049b76a60c6/go.mod h1:p4QtZmO4uMYipTQNzagwnNoseA6OxSUutVw05NhYDRs=
+sigs.k8s.io/structured-merge-diff/v4 v4.0.2/go.mod h1:bJZC9H9iH24zzfZ/41RGcq60oK1F7G282QMXDPYydCw=
+sigs.k8s.io/structured-merge-diff/v4 v4.1.2/go.mod h1:j/nl6xW8vLS49O8YvXW1ocPhZawJtm+Yrr7PPRQ0Vg4=
+sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
diff --git a/images/Makefile b/images/fastcgi-helloserver/Makefile
similarity index 53%
rename from images/Makefile
rename to images/fastcgi-helloserver/Makefile
index 31560168d..4d277a19d 100644
--- a/images/Makefile
+++ b/images/fastcgi-helloserver/Makefile
@@ -1,4 +1,4 @@
-# Copyright 2024 The Kubernetes Authors.
+# Copyright 2020 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -12,30 +12,20 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-.DEFAULT_GOAL:=build
+# Docker image for e2e testing.
# set default shell
SHELL=/bin/bash -o pipefail -o errexit
DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
-INIT_BUILDX=$(DIR)/../hack/init-buildx.sh
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
-
-BASE_IMAGE = $(shell cat $(DIR)/../NGINX_BASE)
-
-# The env below is called GO_VERSION and not GOLANG_VERSION because
-# the gcb image we use to build already defines GOLANG_VERSION and is a
-# really old version
-GO_VERSION = $(shell cat $(DIR)/../GOLANG_VERSION)
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
REGISTRY ?= local
-NAME ?=
-
-IMAGE = $(REGISTRY)/$(NAME)
-TAG ?= $(shell cat $(NAME)/TAG)
-
-EXTRAARGS ?= $(shell cat $(NAME)/EXTRAARGS)
+IMAGE = $(REGISTRY)/e2e-test-fastcgi-helloserver
# required to enable buildx
export DOCKER_CLI_EXPERIMENTAL=enabled
@@ -45,34 +35,17 @@ PLATFORMS?=linux/amd64,linux/arm,linux/arm64
OUTPUT=
PROGRESS=plain
-
-precheck:
-ifndef NAME
- $(error NAME variable is required)
-endif
-
-build: precheck ensure-buildx
+build: ensure-buildx
docker buildx build \
- --label=org.opencontainers.image.source=https://github.com/kubernetes/ingress-nginx \
- --label=org.opencontainers.image.licenses=Apache-2.0 \
- --label=org.opencontainers.image.description="Ingress NGINX $(NAME) image" \
- --build-arg BASE_IMAGE=$(BASE_IMAGE) \
- --build-arg GOLANG_VERSION=$(GO_VERSION) \
--platform=${PLATFORMS} $(OUTPUT) \
--progress=$(PROGRESS) \
- --pull $(EXTRAARGS) \
- -t $(IMAGE):$(TAG) $(NAME)/rootfs
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
# push the cross built image
push: OUTPUT=--push
push: build
-test: precheck
- cd $(NAME)/rootfs && go test ./...
-
-test-e2e: precheck
- cd $(NAME) && ./hack/e2e.sh
-
# enable buildx
ensure-buildx:
# this is required for cloudbuild
@@ -83,4 +56,4 @@ else
endif
@echo "done"
-.PHONY: build push ensure-buildx test test-e2e precheck
+.PHONY: build push ensure-buildx
diff --git a/images/fastcgi-helloserver/TAG b/images/fastcgi-helloserver/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/fastcgi-helloserver/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/fastcgi-helloserver/cloudbuild.yaml b/images/fastcgi-helloserver/cloudbuild.yaml
index c2c6135df..80623a197 100644
--- a/images/fastcgi-helloserver/cloudbuild.yaml
+++ b/images/fastcgi-helloserver/cloudbuild.yaml
@@ -1,11 +1,18 @@
+timeout: 1800s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=fastcgi-helloserver push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/fastcgi-helloserver && make push
+
diff --git a/images/fastcgi-helloserver/rootfs/Dockerfile b/images/fastcgi-helloserver/rootfs/Dockerfile
index 7d8e95c47..38d7f8ce0 100755
--- a/images/fastcgi-helloserver/rootfs/Dockerfile
+++ b/images/fastcgi-helloserver/rootfs/Dockerfile
@@ -11,9 +11,8 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-ARG GOLANG_VERSION
-FROM golang:${GOLANG_VERSION}-alpine3.21 as builder
+FROM golang:1.21.5-alpine3.18 as builder
WORKDIR /go/src/k8s.io/ingress-nginx/images/fastcgi
diff --git a/images/go-grpc-greeter-server/Makefile b/images/go-grpc-greeter-server/Makefile
new file mode 100644
index 000000000..e221ecfea
--- /dev/null
+++ b/images/go-grpc-greeter-server/Makefile
@@ -0,0 +1,57 @@
+# Copyright 2021 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/go-grpc-greeter-server
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/go-grpc-greeter-server/TAG b/images/go-grpc-greeter-server/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/go-grpc-greeter-server/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/go-grpc-greeter-server/cloudbuild.yaml b/images/go-grpc-greeter-server/cloudbuild.yaml
new file mode 100644
index 000000000..20740eb27
--- /dev/null
+++ b/images/go-grpc-greeter-server/cloudbuild.yaml
@@ -0,0 +1,19 @@
+timeout: 1200s
+options:
+ substitution_option: ALLOW_LOOSE
+ # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ machineType: E2_HIGHCPU_8
+steps:
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
+ entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
+ args:
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/go-grpc-greeter-server && make push
diff --git a/images/go-grpc-greeter-server/rootfs/Dockerfile b/images/go-grpc-greeter-server/rootfs/Dockerfile
index 39be2990f..94e4b91ff 100644
--- a/images/go-grpc-greeter-server/rootfs/Dockerfile
+++ b/images/go-grpc-greeter-server/rootfs/Dockerfile
@@ -1,6 +1,4 @@
-ARG GOLANG_VERSION
-
-FROM golang:${GOLANG_VERSION}-alpine3.21 as build
+FROM golang:1.21.5-alpine3.18 as build
WORKDIR /go/src/greeter-server
diff --git a/images/httpbun/Makefile b/images/httpbun/Makefile
new file mode 100644
index 000000000..bcb8c7be2
--- /dev/null
+++ b/images/httpbun/Makefile
@@ -0,0 +1,57 @@
+# Copyright 2020 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/e2e-test-httpbun
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/httpbun/TAG b/images/httpbun/TAG
deleted file mode 100644
index 56130fb3a..000000000
--- a/images/httpbun/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.1.1
diff --git a/images/httpbun/cloudbuild.yaml b/images/httpbun/cloudbuild.yaml
index c56820d15..68afbe873 100644
--- a/images/httpbun/cloudbuild.yaml
+++ b/images/httpbun/cloudbuild.yaml
@@ -1,11 +1,19 @@
+timeout: 1200s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
+ # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ machineType: E2_HIGHCPU_8
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=httpbun push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/httpbun && make push
diff --git a/images/httpbun/rootfs/Dockerfile b/images/httpbun/rootfs/Dockerfile
index ada137ee9..c4b1e6f9d 100644
--- a/images/httpbun/rootfs/Dockerfile
+++ b/images/httpbun/rootfs/Dockerfile
@@ -12,9 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-ARG GOLANG_VERSION
-
-FROM golang:${GOLANG_VERSION} AS builder
+FROM golang:1.21.5 AS builder
ENV LC_ALL=C.UTF-8
ENV LANG=C.UTF-8
@@ -33,4 +31,4 @@ FROM scratch
COPY --from=builder /go/httpbun/bin/httpbun httpbun
ENV HTTPBUN_BIND=0.0.0.0:80
EXPOSE 80
-ENTRYPOINT ["/httpbun"]
\ No newline at end of file
+ENTRYPOINT ["/httpbun"]
diff --git a/images/kube-webhook-certgen/Makefile b/images/kube-webhook-certgen/Makefile
new file mode 100644
index 000000000..cd014c7c3
--- /dev/null
+++ b/images/kube-webhook-certgen/Makefile
@@ -0,0 +1,64 @@
+# Copyright 2021 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+.DEFAULT_GOAL:=build
+
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= local
+
+IMAGE = $(REGISTRY)/kube-webhook-certgen
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ -t $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+test:
+ cd rootfs && go test ./...
+
+test-e2e:
+ ./hack/e2e.sh
+
+.PHONY: build push ensure-buildx test test-e2e
diff --git a/images/kube-webhook-certgen/OWNERS b/images/kube-webhook-certgen/OWNERS
new file mode 100644
index 000000000..ad47b2e6d
--- /dev/null
+++ b/images/kube-webhook-certgen/OWNERS
@@ -0,0 +1,10 @@
+# See the OWNERS docs: https://github.com/kubernetes/community/blob/master/contributors/guide/owners.md
+
+approvers:
+- ingress-nginx-admins
+- ingress-nginx-maintainers
+
+reviewers:
+- ingress-nginx-admins
+- ingress-nginx-maintainers
+- ingress-nginx-kube-webhook-certgen-reviewers
diff --git a/images/kube-webhook-certgen/TAG b/images/kube-webhook-certgen/TAG
deleted file mode 100644
index 53b5bbb12..000000000
--- a/images/kube-webhook-certgen/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v1.5.1
diff --git a/images/kube-webhook-certgen/cloudbuild.yaml b/images/kube-webhook-certgen/cloudbuild.yaml
index e4118ff88..88d7400d0 100644
--- a/images/kube-webhook-certgen/cloudbuild.yaml
+++ b/images/kube-webhook-certgen/cloudbuild.yaml
@@ -1,11 +1,32 @@
+
+# Copyright 2021 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+timeout: 10800s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images && make NAME=kube-webhook-certgen push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/kube-webhook-certgen && make push
diff --git a/images/kube-webhook-certgen/rootfs/Dockerfile b/images/kube-webhook-certgen/rootfs/Dockerfile
index 2348db825..f20a295d3 100644
--- a/images/kube-webhook-certgen/rootfs/Dockerfile
+++ b/images/kube-webhook-certgen/rootfs/Dockerfile
@@ -12,24 +12,17 @@
# See the License for the specific language governing permissions and
# limitations under the License.
-ARG GOLANG_VERSION
-
-FROM --platform=$BUILDPLATFORM golang:${GOLANG_VERSION} as builder
-
+FROM --platform=$BUILDPLATFORM golang:1.21.5 as builder
ARG BUILDPLATFORM
ARG TARGETARCH
-
WORKDIR /workspace
COPY . .
-RUN go mod tidy && CGO_ENABLED=0 GOOS=linux GOARCH=${TARGETARCH} go build -a -o kube-webhook-certgen main.go
+RUN CGO_ENABLED=0 GOOS=linux GOARCH=${TARGETARCH} go build -a -o kube-webhook-certgen main.go
FROM --platform=$BUILDPLATFORM gcr.io/distroless/static:nonroot
ARG BUILDPLATFORM
ARG TARGETARCH
-
-LABEL org.opencontainers.image.source=https://github.com/kubernetes/ingress-nginx
-
WORKDIR /
COPY --from=builder /workspace/kube-webhook-certgen /kube-webhook-certgen
USER 65532:65532
diff --git a/images/kube-webhook-certgen/rootfs/go.mod b/images/kube-webhook-certgen/rootfs/go.mod
index 2b8567748..893669c7b 100644
--- a/images/kube-webhook-certgen/rootfs/go.mod
+++ b/images/kube-webhook-certgen/rootfs/go.mod
@@ -1,57 +1,63 @@
module github.com/jet/kube-webhook-certgen
-go 1.23.6
+go 1.21.5
require (
- github.com/onrik/logrus v0.11.0
- github.com/sirupsen/logrus v1.9.3
- github.com/spf13/cobra v1.9.1
- k8s.io/api v0.32.2
- k8s.io/apimachinery v0.32.2
- k8s.io/client-go v0.32.2
- k8s.io/kube-aggregator v0.32.2
+ github.com/onrik/logrus v0.9.0
+ github.com/sirupsen/logrus v1.9.0
+ github.com/spf13/cobra v1.7.0
+ k8s.io/api v0.27.6
+ k8s.io/apimachinery v0.27.6
+ k8s.io/client-go v0.27.6
+ k8s.io/kube-aggregator v0.22.6
)
require (
- github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
- github.com/emicklei/go-restful/v3 v3.11.3 // indirect
- github.com/fxamacker/cbor/v2 v2.7.0 // indirect
- github.com/go-logr/logr v1.4.2 // indirect
- github.com/go-openapi/jsonpointer v0.21.0 // indirect
- github.com/go-openapi/jsonreference v0.20.4 // indirect
- github.com/go-openapi/swag v0.23.0 // indirect
+ github.com/davecgh/go-spew v1.1.1 // indirect
+ github.com/emicklei/go-restful/v3 v3.10.2 // indirect
+ github.com/evanphx/json-patch v4.12.0+incompatible // indirect
+ github.com/go-logr/logr v1.2.4 // indirect
+ github.com/go-openapi/jsonpointer v0.19.6 // indirect
+ github.com/go-openapi/jsonreference v0.20.1 // indirect
+ github.com/go-openapi/swag v0.22.3 // indirect
github.com/gogo/protobuf v1.3.2 // indirect
- github.com/golang/protobuf v1.5.4 // indirect
- github.com/google/gnostic-models v0.6.8 // indirect
- github.com/google/go-cmp v0.6.0 // indirect
- github.com/google/gofuzz v1.2.0 // indirect
- github.com/google/uuid v1.6.0 // indirect
+ github.com/golang/protobuf v1.5.3 // indirect
+ github.com/google/gnostic v0.5.7-v3refs // indirect
+ github.com/google/go-cmp v0.5.9 // indirect
+ github.com/google/gofuzz v1.1.0 // indirect
+ github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98 // indirect
+ github.com/google/uuid v1.3.1 // indirect
+ github.com/imdario/mergo v0.3.6 // indirect
github.com/inconshreveable/mousetrap v1.1.0 // indirect
github.com/josharian/intern v1.0.0 // indirect
github.com/json-iterator/go v1.1.12 // indirect
+ github.com/kr/pretty v0.3.1 // indirect
github.com/mailru/easyjson v0.7.7 // indirect
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.2 // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
- github.com/onsi/ginkgo/v2 v2.22.2 // indirect
- github.com/onsi/gomega v1.36.2 // indirect
+ github.com/onsi/ginkgo/v2 v2.13.0 // indirect
+ github.com/onsi/gomega v1.27.10 // indirect
github.com/pkg/errors v0.9.1 // indirect
- github.com/spf13/pflag v1.0.6 // indirect
- github.com/x448/float16 v0.8.4 // indirect
- golang.org/x/net v0.33.0 // indirect
- golang.org/x/oauth2 v0.23.0 // indirect
- golang.org/x/sys v0.28.0 // indirect
- golang.org/x/term v0.27.0 // indirect
- golang.org/x/text v0.21.0 // indirect
- golang.org/x/time v0.7.0 // indirect
- google.golang.org/protobuf v1.36.1 // indirect
- gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
+ github.com/spf13/pflag v1.0.5 // indirect
+ github.com/stretchr/testify v1.8.4 // indirect
+ github.com/tidwall/gjson v1.14.0 // indirect
+ golang.org/x/net v0.17.0 // indirect
+ golang.org/x/oauth2 v0.12.0 // indirect
+ golang.org/x/sys v0.13.0 // indirect
+ golang.org/x/term v0.13.0 // indirect
+ golang.org/x/text v0.13.0 // indirect
+ golang.org/x/time v0.3.0 // indirect
+ golang.org/x/tools v0.14.0 // indirect
+ google.golang.org/appengine v1.6.7 // indirect
+ google.golang.org/protobuf v1.31.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
+ gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
- k8s.io/klog/v2 v2.130.1 // indirect
- k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f // indirect
- k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 // indirect
- sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 // indirect
- sigs.k8s.io/structured-merge-diff/v4 v4.4.2 // indirect
- sigs.k8s.io/yaml v1.4.0 // indirect
+ k8s.io/klog/v2 v2.100.1 // indirect
+ k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f // indirect
+ k8s.io/utils v0.0.0-20230209194617-a36077c30491 // indirect
+ sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
+ sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect
+ sigs.k8s.io/yaml v1.3.0 // indirect
)
diff --git a/images/kube-webhook-certgen/rootfs/go.sum b/images/kube-webhook-certgen/rootfs/go.sum
index 1c660f020..004bd7d96 100644
--- a/images/kube-webhook-certgen/rootfs/go.sum
+++ b/images/kube-webhook-certgen/rootfs/go.sum
@@ -1,163 +1,808 @@
-github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
+cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
+cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=
+cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU=
+cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY=
+cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc=
+cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0=
+cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To=
+cloud.google.com/go v0.52.0/go.mod h1:pXajvRH/6o3+F9jDHZWQ5PbGhn+o8w9qiu/CffaVdO4=
+cloud.google.com/go v0.53.0/go.mod h1:fp/UouUEsRkN6ryDKNW/Upv/JBKnv6WDthjR6+vze6M=
+cloud.google.com/go v0.54.0/go.mod h1:1rq2OEkV3YMf6n/9ZvGWI3GWw0VoqH/1x2nd8Is/bPc=
+cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o=
+cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE=
+cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc=
+cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
+cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
+cloud.google.com/go/firestore v1.1.0/go.mod h1:ulACoGHTpvq5r8rxGJ4ddJZBZqakUQqClKRT5SZwBmk=
+cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
+cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw=
+cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA=
+cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw=
+cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0ZeosJ0Rtdos=
+cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk=
+dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
+github.com/Azure/go-ansiterm v0.0.0-20210608223527-2377c96fe795/go.mod h1:LmzpDX56iTiv29bbRTIsUNlaFfuhWRQBWjQdVyAevI8=
+github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg63KZ2rFqZQzSB4Vz2SUXa1BpHTVz9L5PTmPC4E=
+github.com/Azure/go-autorest v14.2.0+incompatible/go.mod h1:r+4oMnoxhatjLLJ6zxSWATqVooLgysK6ZNox3g/xq24=
+github.com/Azure/go-autorest/autorest v0.11.18/go.mod h1:dSiJPy22c3u0OtOKDNttNgqpNFY/GeWa7GH/Pz56QRA=
+github.com/Azure/go-autorest/autorest/adal v0.9.13/go.mod h1:W/MM4U6nLxnIskrw4UwWzlHfGjwUS50aOsc/I3yuU8M=
+github.com/Azure/go-autorest/autorest/date v0.3.0/go.mod h1:BI0uouVdmngYNUzGWeSYnokU+TrmwEsOqdt8Y6sso74=
+github.com/Azure/go-autorest/autorest/mocks v0.4.1/go.mod h1:LTp+uSrOhSkaKrUy935gNZuuIPPVsHlr9DSOxSayd+k=
+github.com/Azure/go-autorest/logger v0.2.1/go.mod h1:T9E3cAhj2VqvPOtCYAvby9aBXkZmbF5NWuPV8+WeEW8=
+github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU=
+github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
+github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
+github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
+github.com/NYTimes/gziphandler v1.1.1/go.mod h1:n/CVRwUEOgIxrgPvAQhUUr9oeUtvrhMomdKFjzJNB0c=
+github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU=
+github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
+github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
+github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
+github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
+github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho=
+github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY=
+github.com/armon/circbuf v0.0.0-20150827004946-bbbad097214e/go.mod h1:3U/XgcO3hCbHZ8TKRvWD2dDTCfh9M9ya+I9JpbB7O8o=
+github.com/armon/go-metrics v0.0.0-20180917152333-f0300d1749da/go.mod h1:Q73ZrmVTwzkszR9V5SSuryQ31EELlFMUz1kKyl939pY=
+github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8=
+github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
+github.com/benbjohnson/clock v1.0.3/go.mod h1:bGMdMPoPVvcYyt1gHDf4J2KE153Yf9BuiUKYMaxlTDM=
+github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
+github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
+github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=
+github.com/bgentry/speakeasy v0.1.0/go.mod h1:+zsyZBPWlz7T6j88CTgSN5bM796AkVf0kBD4zp0CCIs=
+github.com/bketelsen/crypt v0.0.3-0.20200106085610-5cbc8cc4026c/go.mod h1:MKsuJmJgSg28kpZDP6UIiPt0e0Oz0kqKNGyRaWEPv84=
+github.com/blang/semver v3.5.1+incompatible/go.mod h1:kRBLl5iJ+tD4TcOOxsy/0fnwebNt5EWlYSAyrTnjyyk=
+github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
+github.com/certifi/gocertifi v0.0.0-20191021191039-0944d244cd40/go.mod h1:sGbDF6GwGcLpkNXPUTkMRoywsNa/ol15pxFe6ERfguA=
+github.com/certifi/gocertifi v0.0.0-20200922220541-2c3bb06c6054/go.mod h1:sGbDF6GwGcLpkNXPUTkMRoywsNa/ol15pxFe6ERfguA=
+github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc=
+github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
+github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
+github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
+github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
+github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
+github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
+github.com/cockroachdb/datadriven v0.0.0-20200714090401-bf6692d28da5/go.mod h1:h6jFvWxBdQXxjopDMZyH2UVceIRfR84bdzbkoKrsWNo=
+github.com/cockroachdb/errors v1.2.4/go.mod h1:rQD95gz6FARkaKkQXUksEje/d9a6wBJoCr5oaCLELYA=
+github.com/cockroachdb/logtags v0.0.0-20190617123548-eb05cc24525f/go.mod h1:i/u985jwjWRlyHXQbwatDASoW0RMlZ/3i9yJHE2xLkI=
+github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk=
+github.com/coreos/etcd v3.3.13+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
+github.com/coreos/go-oidc v2.1.0+incompatible/go.mod h1:CgnwVTmzoESiwO9qyAFEMiHoZ1nMCKZlZ9V6mm3/LKc=
+github.com/coreos/go-semver v0.3.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk=
+github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
+github.com/coreos/go-systemd/v22 v22.3.2/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
+github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA=
+github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
+github.com/cpuguy83/go-md2man/v2 v2.0.2/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o=
+github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
+github.com/creack/pty v1.1.11/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
+github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc h1:U9qPSI2PIWSS1VwoXQT9A3Wy9MM3WgvqSxFWenqJduM=
-github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
-github.com/emicklei/go-restful/v3 v3.11.3 h1:yagOQz/38xJmcNeZJtrUcKjkHRltIaIFXKWeG1SkWGE=
-github.com/emicklei/go-restful/v3 v3.11.3/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
-github.com/fxamacker/cbor/v2 v2.7.0 h1:iM5WgngdRBanHcxugY4JySA0nk1wZorNOpTgCMedv5E=
-github.com/fxamacker/cbor/v2 v2.7.0/go.mod h1:pxXPTn3joSm21Gbwsv0w9OSA2y1HFR9qXEeXQVeNoDQ=
-github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY=
-github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY=
-github.com/go-openapi/jsonpointer v0.21.0 h1:YgdVicSA9vH5RiHs9TZW5oyafXZFc6+2Vc1rr/O9oNQ=
-github.com/go-openapi/jsonpointer v0.21.0/go.mod h1:IUyH9l/+uyhIYQ/PXVA41Rexl+kOkAPDdXEYns6fzUY=
-github.com/go-openapi/jsonreference v0.20.4 h1:bKlDxQxQJgwpUSgOENiMPzCTBVuc7vTdXSSgNeAhojU=
-github.com/go-openapi/jsonreference v0.20.4/go.mod h1:5pZJyJP2MnYCpoeoMAql78cCHauHj0V9Lhc506VOpw4=
-github.com/go-openapi/swag v0.23.0 h1:vsEVJDUo2hPJ2tu0/Xc+4noaxyEffXNIs3cOULZ+GrE=
-github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ577vPjgQ=
-github.com/go-task/slim-sprig/v3 v3.0.0 h1:sUs3vkvUymDpBKi3qH1YSqBQk9+9D/8M2mN1vB6EwHI=
-github.com/go-task/slim-sprig/v3 v3.0.0/go.mod h1:W848ghGpv3Qj3dhTPRyJypKRiqCdHZiAzKg9hl15HA8=
+github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ=
+github.com/dgryski/go-sip13 v0.0.0-20181026042036-e10d5fee7954/go.mod h1:vAd38F8PWV+bWy6jNmig1y/TA+kYO4g3RSRF0IAv0no=
+github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
+github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
+github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=
+github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
+github.com/emicklei/go-restful v2.9.5+incompatible/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
+github.com/emicklei/go-restful/v3 v3.10.2 h1:hIovbnmBTLjHXkqEBUz3HGpXZdM7ZrE9fJIZIqlJLqE=
+github.com/emicklei/go-restful/v3 v3.10.2/go.mod h1:6n3XBCmQQb25CM2LCACGz8ukIrRry+4bhvbpWn3mrbc=
+github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
+github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
+github.com/envoyproxy/go-control-plane v0.9.9-0.20210217033140-668b12f5399d/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
+github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
+github.com/evanphx/json-patch v4.11.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/evanphx/json-patch v4.12.0+incompatible h1:4onqiflcdA9EOZ4RxV643DvftH5pOlLGNtQ5lPWQu84=
+github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
+github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4=
+github.com/felixge/httpsnoop v1.0.1/go.mod h1:m8KPJKqk1gH5J9DgRY2ASl2lWCfGKXixSwevea8zH2U=
+github.com/form3tech-oss/jwt-go v3.2.2+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k=
+github.com/form3tech-oss/jwt-go v3.2.3+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k=
+github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
+github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
+github.com/getsentry/raven-go v0.2.0/go.mod h1:KungGk8q33+aIAZUIVWZDr2OfAEBsO49PX4NzFV5kcQ=
+github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
+github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
+github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
+github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
+github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
+github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
+github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
+github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas=
+github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
+github.com/go-logr/logr v0.4.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
+github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-logr/logr v1.2.4 h1:g01GSCwiDw2xSZfjJ2/T9M+S6pFdcNtFYsp+Y43HYDQ=
+github.com/go-logr/logr v1.2.4/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
+github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
+github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
+github.com/go-openapi/jsonpointer v0.19.6 h1:eCs3fxoIi3Wh6vtgmLTOjdhSpiqphQ+DaPn38N2ZdrE=
+github.com/go-openapi/jsonpointer v0.19.6/go.mod h1:osyAmYz/mB/C3I+WsTTSgw1ONzaLJoLCyoi6/zppojs=
+github.com/go-openapi/jsonreference v0.19.3/go.mod h1:rjx6GuL8TTa9VaixXglHmQmIL98+wF9xc8zWvFonSJ8=
+github.com/go-openapi/jsonreference v0.19.5/go.mod h1:RdybgQwPxbL4UEjuAruzK1x3nE69AqPYEJeo/TWfEeg=
+github.com/go-openapi/jsonreference v0.20.1 h1:FBLnyygC4/IZZr893oiomc9XaghoveYTrLC1F86HID8=
+github.com/go-openapi/jsonreference v0.20.1/go.mod h1:Bl1zwGIM8/wsvqjsOQLJ/SH+En5Ap4rVB5KVcIDZG2k=
+github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
+github.com/go-openapi/swag v0.19.14/go.mod h1:QYRuS/SOXUCsnplDa677K7+DxSOj6IPNl/eQntq43wQ=
+github.com/go-openapi/swag v0.22.3 h1:yMBqmnQ0gyZvEb/+KzuWZOXgllrXT4SADYbvDaXHv/g=
+github.com/go-openapi/swag v0.22.3/go.mod h1:UzaqsxGiab7freDnrUUra0MwWfN/q7tE4j+VcZ0yl14=
+github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
+github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
+github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
+github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4=
+github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o=
github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
-github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
-github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
-github.com/google/gnostic-models v0.6.8 h1:yo/ABAfM5IMRsS1VnXjTBvUb61tFIHozhlYvRgGre9I=
-github.com/google/gnostic-models v0.6.8/go.mod h1:5n7qKqH0f5wFt+aWF8CW6pZLLNOfYuF5OpfBSENuI8U=
+github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
+github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
+github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
+github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
+github.com/golang/mock v1.4.0/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/mock v1.4.1/go.mod h1:UOMv5ysSaYNkG+OFQykRIcU/QvvxJf3p21QfJ2Bt3cw=
+github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.3.4/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw=
+github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
+github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
+github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
+github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w=
+github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
+github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8=
+github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
+github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
+github.com/golang/protobuf v1.5.1/go.mod h1:DopwsBzvsk0Fs44TXzsVbJyPhcCPeIwnvohx4u74HPM=
+github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg=
+github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
+github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
+github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9uaxA=
+github.com/google/gnostic v0.5.7-v3refs h1:FhTMOKj2VhjpouxvWJAV1TL304uMlb9zcDqkl6cEI54=
+github.com/google/gnostic v0.5.7-v3refs/go.mod h1:73MKFl6jIHelAJNaBGFzt3SPtZULs9dYrGFt8OiIsHQ=
+github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
+github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
+github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
+github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
-github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
-github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
-github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
-github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad h1:a6HEuzUHeKH6hwfN/ZoQgRgVIWFJljSWa/zetS2WTvg=
-github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad/go.mod h1:vavhavw2zAxS5dIdcRluK6cSGGPlZynqzFM8NdvU144=
-github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
-github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/gofuzz v1.1.0 h1:Hsa8mG0dQ46ij8Sl2AYJDUv1oA9/d6Vk+3LG99Oe02g=
+github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
+github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
+github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc=
+github.com/google/pprof v0.0.0-20191218002539-d4f498aebedc/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200212024743-f11f1df84d12/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20200229191704-1ebb73c60ed3/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM=
+github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98 h1:pUa4ghanp6q4IJHwE9RwLgmVFfReJN+KbQ8ExNEUUoQ=
+github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98/go.mod h1:czg5+yv1E0ZGTi6S6vVK1mke0fV+FaUhNGcd6VRS9Ik=
+github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
+github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.1.2/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/google/uuid v1.3.1 h1:KjJaJ9iWZ3jOFZIf1Lqf4laDRCasjl0BCmnEGxkdLb4=
+github.com/google/uuid v1.3.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
+github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
+github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk=
+github.com/googleapis/gnostic v0.5.1/go.mod h1:6U4PtQXGIEt/Z3h5MAT7FNofLnw9vXk2cUuW7uA/OeU=
+github.com/googleapis/gnostic v0.5.5/go.mod h1:7+EbHbldMins07ALC74bsA81Ovc97DwqyJO1AENw9kA=
+github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY=
+github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
+github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
+github.com/grpc-ecosystem/go-grpc-middleware v1.0.0/go.mod h1:FiyG127CGDf3tlThmgyCl78X/SZQqEOJBCDaAfeWzPs=
+github.com/grpc-ecosystem/go-grpc-middleware v1.3.0/go.mod h1:z0ButlSOZa5vEBq9m2m2hlwIgKw+rp3sdCBRoJY+30Y=
+github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
+github.com/grpc-ecosystem/grpc-gateway v1.9.0/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY=
+github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
+github.com/hashicorp/consul/api v1.1.0/go.mod h1:VmuI/Lkw1nC05EYQWNKwWGbkg+FbDBtguAZLlVdkD9Q=
+github.com/hashicorp/consul/sdk v0.1.1/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8=
+github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
+github.com/hashicorp/go-cleanhttp v0.5.1/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
+github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60=
+github.com/hashicorp/go-msgpack v0.5.3/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM=
+github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
+github.com/hashicorp/go-rootcerts v1.0.0/go.mod h1:K6zTfqpRlCUIjkwsN4Z+hiSfzSTQa6eBIzfwKfwNnHU=
+github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU=
+github.com/hashicorp/go-syslog v1.0.0/go.mod h1:qPfqrKkXGihmCqbJM2mZgkZGvKG1dFdvsLplgctolz4=
+github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go-uuid v1.0.1/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
+github.com/hashicorp/go.net v0.0.1/go.mod h1:hjKkEWcCURg++eb33jQU7oqQcI9XDCnUzHA0oac0k90=
+github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
+github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
+github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64=
+github.com/hashicorp/mdns v1.0.0/go.mod h1:tL+uN++7HEJ6SQLQ2/p+z2pH24WQKWjBPkE0mNTz8vQ=
+github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2pPBoIllUwCN7I=
+github.com/hashicorp/serf v0.8.2/go.mod h1:6hOLApaqBFA1NXqRQAsxw9QxuDEvNxSQRwA/JwenrHc=
+github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
+github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
+github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
+github.com/imdario/mergo v0.3.6 h1:xTNEAn+kxVO7dTZGu0CegyqKZmoWFI0rF8UxjlB2d28=
+github.com/imdario/mergo v0.3.6/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
+github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8=
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
+github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo=
+github.com/jonboulle/clockwork v0.2.2/go.mod h1:Pkfl5aHPm1nk2H9h0bjmnJD/BcgbGXUBGnn1kMkgxc8=
github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
+github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
+github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
+github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
+github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
github.com/json-iterator/go v1.1.12/go.mod h1:e30LSqwooZae/UwlEbR2852Gd8hjQvJoHmT4TnhNGBo=
+github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU=
+github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
+github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU=
+github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
+github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
+github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q=
+github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00=
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
+github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
+github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
+github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
+github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
+github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
github.com/kr/pretty v0.3.1 h1:flRD4NNwYAUpkphVc1HcthR4KEIFJ65n8Mw5qdRn3LE=
github.com/kr/pretty v0.3.1/go.mod h1:hoEshYVHaxMs3cyo3Yncou5ZscifuDolrwPKZanG3xk=
+github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
+github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
+github.com/magiconair/properties v1.8.1/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
+github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
+github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
+github.com/mailru/easyjson v0.7.6/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
github.com/mailru/easyjson v0.7.7 h1:UGYAvKxe3sBsEDzO8ZeWOSlIQfWFlxbzLZe7hwFURr0=
github.com/mailru/easyjson v0.7.7/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
+github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU=
+github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4=
+github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
+github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369/go.mod h1:BSXmuO+STAnVfrANrmjBb36TMTDstsz7MSK+HVaYKv4=
+github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg=
+github.com/mitchellh/cli v1.0.0/go.mod h1:hNIlj7HEI86fIcpObd7a0FcrxTWetlwJDGcceTlRvqc=
+github.com/mitchellh/go-homedir v1.0.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
+github.com/mitchellh/go-testing-interface v1.0.0/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI=
+github.com/mitchellh/gox v0.4.0/go.mod h1:Sd9lOJ0+aimLBi73mGofS1ycjY8lL3uZM3JPS42BGNg=
+github.com/mitchellh/iochan v1.0.0/go.mod h1:JwYml1nuB7xOzsp52dPpHFffvOCDupsG0QubkSMEySY=
+github.com/mitchellh/mapstructure v0.0.0-20160808181253-ca63d7c062ee/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
+github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
+github.com/moby/term v0.0.0-20210610120745-9d4ed1856297/go.mod h1:vgPCkQMyxTZ7IDy8SXRufE172gr8+K/JE/7hHFxHW3A=
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
+github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
+github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
+github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/onrik/logrus v0.11.0 h1:pu+BCaWL36t0yQaj/2UHK2erf88dwssAKOT51mxPUVs=
-github.com/onrik/logrus v0.11.0/go.mod h1:fO2vlZwIdti6PidD3gV5YKt9Lq5ptpnP293RAe1ITwk=
-github.com/onsi/ginkgo/v2 v2.22.2 h1:/3X8Panh8/WwhU/3Ssa6rCKqPLuAkVY2I0RoyDLySlU=
-github.com/onsi/ginkgo/v2 v2.22.2/go.mod h1:oeMosUL+8LtarXBHu/c0bx2D/K9zyQ6uX3cTyztHwsk=
-github.com/onsi/gomega v1.36.2 h1:koNYke6TVk6ZmnyHrCXba/T/MoLBXFjeC1PtvYgw0A8=
-github.com/onsi/gomega v1.36.2/go.mod h1:DdwyADRjrc825LhMEkD76cHR5+pUnjhUN8GlHlRPHzY=
+github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
+github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
+github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
+github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
+github.com/oklog/ulid v1.3.1/go.mod h1:CirwcVhetQ6Lv90oh/F+FBtV6XMibvdAFo93nm5qn4U=
+github.com/onrik/logrus v0.9.0 h1:oT7VstCUxWBoX7fswYK61fi9bzRBSpROq5CR2b7wxQo=
+github.com/onrik/logrus v0.9.0/go.mod h1:qfe9NeZVAJfIxviw3cYkZo3kvBtLoPRJriAO8zl7qTk=
+github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
+github.com/onsi/ginkgo v1.14.0/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY=
+github.com/onsi/ginkgo/v2 v2.13.0 h1:0jY9lJquiL8fcf3M4LAXN5aMlS/b2BV86HFFPCPMgE4=
+github.com/onsi/ginkgo/v2 v2.13.0/go.mod h1:TE309ZR8s5FsKKpuB1YAQYBzCaAfUgatB/xlT/ETL/o=
+github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA=
+github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
+github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
+github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI=
+github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M=
+github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
+github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
+github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
+github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU=
+github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
+github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
+github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 h1:Jamvg5psRIccs7FGNTlIRMkT8wgtp5eCXdBlqhYGL6U=
-github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/rogpeppe/go-internal v1.12.0 h1:exVL4IDcn6na9z1rAb56Vxr+CgyK3nn3O+epU5NdKM8=
-github.com/rogpeppe/go-internal v1.12.0/go.mod h1:E+RYuTGaKKdloAfM02xzb0FW3Paa99yedzYV+kq4uf4=
+github.com/posener/complete v1.1.1/go.mod h1:em0nMJCgc9GFtwrmVmEMR/ZL6WyhyjMBndrE9hABlRI=
+github.com/pquerna/cachecontrol v0.0.0-20171018203845-0dec1b30a021/go.mod h1:prYjPmNq4d1NPVmpShWobRqXY3q7Vp+80DqgxxUrUIA=
+github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
+github.com/prometheus/client_golang v0.9.3/go.mod h1:/TN21ttK/J9q6uSwhBd54HahCDft0ttaMvbicHlPoso=
+github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
+github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
+github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
+github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
+github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/client_model v0.2.0/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
+github.com/prometheus/common v0.0.0-20181113130724-41aa239b4cce/go.mod h1:daVV7qP5qjZbuso7PdcryaAu0sAZbrN9i7WWcTMWvro=
+github.com/prometheus/common v0.4.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
+github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
+github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
+github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
+github.com/prometheus/procfs v0.0.0-20190507164030-5867b95ac084/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
+github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
+github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU=
+github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg=
+github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=
+github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
+github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
+github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
+github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
+github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
-github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ=
-github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
-github.com/spf13/cobra v1.9.1 h1:CXSaggrXdbHK9CF+8ywj8Amf7PBRmPCOJugH954Nnlo=
-github.com/spf13/cobra v1.9.1/go.mod h1:nDyEzZ8ogv936Cinf6g1RU9MRY64Ir93oCnqb9wxYW0=
-github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o=
-github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/ryanuber/columnize v0.0.0-20160712163229-9b3edd62028f/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts=
+github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc=
+github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc=
+github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
+github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
+github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
+github.com/sirupsen/logrus v1.7.0/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
+github.com/sirupsen/logrus v1.8.1/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
+github.com/sirupsen/logrus v1.9.0 h1:trlNQbNUG3OdDrDil03MCb1H2o9nJ1x4/5LYw7byDE0=
+github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ=
+github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc=
+github.com/smartystreets/goconvey v1.6.4/go.mod h1:syvi0/a8iFYH4r/RixwvyeAJjdLS9QV7WQ/tjFTllLA=
+github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM=
+github.com/soheilhy/cmux v0.1.5/go.mod h1:T7TcVDs9LWfQgPlPsdngu6I6QIoyIFZDDC6sNE1GqG0=
+github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA=
+github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ=
+github.com/spf13/afero v1.2.2/go.mod h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
+github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE=
+github.com/spf13/cobra v1.1.3/go.mod h1:pGADOWyqRD/YMrPZigI/zbliZ2wVD/23d+is3pSWzOo=
+github.com/spf13/cobra v1.7.0 h1:hyqWnYt1ZQShIddO5kBpj3vu05/++x6tJ6dg8EC572I=
+github.com/spf13/cobra v1.7.0/go.mod h1:uLxZILRyS/50WlhOIKD7W6V5bgeIt+4sICxh6uRMrb0=
+github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo=
+github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
+github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
+github.com/spf13/viper v1.7.0/go.mod h1:8WkrPz2fc9jxqZNCJI/76HCieCp4Q8HaLFoCha5qpdg=
+github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
+github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
+github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
+github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
+github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
+github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
+github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
-github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
-github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
-github.com/tidwall/gjson v1.14.4 h1:uo0p8EbA09J7RQaflQ1aBRffTR7xedD2bcIVSYxLnkM=
-github.com/tidwall/gjson v1.14.4/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=
+github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
+github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
+github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
+github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
+github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
+github.com/subosito/gotenv v1.2.0/go.mod h1:N0PQaV/YGNqwC0u51sEeR/aUtSLEXKX9iv69rRypqCw=
+github.com/tidwall/gjson v1.14.0 h1:6aeJ0bzojgWLa82gDQHcx3S0Lr/O51I9bJ5nv6JFx5w=
+github.com/tidwall/gjson v1.14.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=
github.com/tidwall/match v1.1.1 h1:+Ho715JplO36QYgwN9PGYNhgZvoUSc9X2c80KVTi+GA=
github.com/tidwall/match v1.1.1/go.mod h1:eRSPERbgtNPcGhD8UCthc6PmLEQXEWd3PRB5JTxsfmM=
github.com/tidwall/pretty v1.2.0 h1:RWIZEg2iJ8/g6fDDYzMpobmaoGh5OLl4AXtGUGPcqCs=
github.com/tidwall/pretty v1.2.0/go.mod h1:ITEVvHYasfjBbM0u2Pg8T2nJnzm8xPwvNhhsoaGGjNU=
-github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=
-github.com/x448/float16 v0.8.4/go.mod h1:14CWIYCyZA/cWjXOioeEpHeN/83MdbZDRQHoFcYsOfg=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
+github.com/tmc/grpc-websocket-proxy v0.0.0-20201229170055-e5319fda7802/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
+github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
+github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
+go.etcd.io/bbolt v1.3.2/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU=
+go.etcd.io/bbolt v1.3.6/go.mod h1:qXsaaIqmgQH0T+OPdb99Bf+PKfBBQVAdyD6TY9G8XM4=
+go.etcd.io/etcd/api/v3 v3.5.0/go.mod h1:cbVKeC6lCfl7j/8jBhAK6aIYO9XOjdptoxU/nLQcPvs=
+go.etcd.io/etcd/client/pkg/v3 v3.5.0/go.mod h1:IJHfcCEKxYu1Os13ZdwCwIUTUVGYTSAM3YSwc9/Ac1g=
+go.etcd.io/etcd/client/v2 v2.305.0/go.mod h1:h9puh54ZTgAKtEbut2oe9P4L/oqKCVB6xsXlzd7alYQ=
+go.etcd.io/etcd/client/v3 v3.5.0/go.mod h1:AIKXXVX/DQXtfTEqBryiLTUXwON+GuvO6Z7lLS/oTh0=
+go.etcd.io/etcd/pkg/v3 v3.5.0/go.mod h1:UzJGatBQ1lXChBkQF0AuAtkRQMYnHubxAEYIrC3MSsE=
+go.etcd.io/etcd/raft/v3 v3.5.0/go.mod h1:UFOHSIvO/nKwd4lhkwabrTD3cqW5yVyYYf/KlD00Szc=
+go.etcd.io/etcd/server/v3 v3.5.0/go.mod h1:3Ah5ruV+M+7RZr0+Y/5mNLwC+eQlni+mQmOVdCRJoS4=
+go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
+go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
+go.opencensus.io v0.22.2/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opencensus.io v0.22.3/go.mod h1:yxeiOL68Rb0Xd1ddK5vPZ/oVn4vY4Ynel7k9FzqtOIw=
+go.opentelemetry.io/contrib v0.20.0/go.mod h1:G/EtFaa6qaN7+LxqfIAT3GiZa7Wv5DTBUzl5H4LY0Kc=
+go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.20.0/go.mod h1:oVGt1LRbBOBq1A5BQLlUg9UaU/54aiHw8cgjV3aWZ/E=
+go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.20.0/go.mod h1:2AboqHi0CiIZU0qwhtUfCYD1GeUzvvIXWNkhDt7ZMG4=
+go.opentelemetry.io/otel v0.20.0/go.mod h1:Y3ugLH2oa81t5QO+Lty+zXf8zC9L26ax4Nzoxm/dooo=
+go.opentelemetry.io/otel/exporters/otlp v0.20.0/go.mod h1:YIieizyaN77rtLJra0buKiNBOm9XQfkPEKBeuhoMwAM=
+go.opentelemetry.io/otel/metric v0.20.0/go.mod h1:598I5tYlH1vzBjn+BTuhzTCSb/9debfNp6R3s7Pr1eU=
+go.opentelemetry.io/otel/oteltest v0.20.0/go.mod h1:L7bgKf9ZB7qCwT9Up7i9/pn0PWIa9FqQ2IQ8LoxiGnw=
+go.opentelemetry.io/otel/sdk v0.20.0/go.mod h1:g/IcepuwNsoiX5Byy2nNV0ySUF1em498m7hBWC279Yc=
+go.opentelemetry.io/otel/sdk/export/metric v0.20.0/go.mod h1:h7RBNMsDJ5pmI1zExLi+bJK+Dr8NQCh0qGhm1KDnNlE=
+go.opentelemetry.io/otel/sdk/metric v0.20.0/go.mod h1:knxiS8Xd4E/N+ZqKmUPf3gTTZ4/0TjTXukfxjzSTpHE=
+go.opentelemetry.io/otel/trace v0.20.0/go.mod h1:6GjCW8zgDjwGHGa6GkyeB8+/5vjT16gUEi0Nf1iBdgw=
+go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI=
+go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE=
+go.uber.org/atomic v1.7.0/go.mod h1:fEN4uk6kAWBTFdckzkM89CLk9XfWZrxpCo0nPH17wJc=
+go.uber.org/goleak v1.1.10/go.mod h1:8a7PlsEVH3e/a/GLqe5IIrQx6GzcnRmZEufDUTk4A7A=
+go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0=
+go.uber.org/multierr v1.6.0/go.mod h1:cdWPpRnG4AhwMwsgIHip0KRBQjJy5kYEpYjJxpXp9iU=
+go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q=
+go.uber.org/zap v1.17.0/go.mod h1:MXVU+bhUf/A7Xi2HNOnopQOrmycQ5Ih87HtOu4q5SSo=
+golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
+golang.org/x/crypto v0.0.0-20181029021203-45a5f77698d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
+golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
+golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/crypto v0.0.0-20201002170205-7f63de1d35b0/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
+golang.org/x/crypto v0.0.0-20210220033148-5ea612d1eb83/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I=
+golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
+golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
+golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
+golang.org/x/exp v0.0.0-20191129062945-2f5052295587/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
+golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
+golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
+golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
+golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
+golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU=
+golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
+golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc=
+golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f/go.mod h1:5qLYkcX4OjUUV8bRuDixDT3tpyyb+LUpUlRWLxfhWrs=
+golang.org/x/lint v0.0.0-20200130185559-910be7a94367/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20200302205851-738671d3881b/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/lint v0.0.0-20210508222113-6edffad5e616/go.mod h1:3xt1FjdF8hUf6vQPIChWIBhFzV8gjjsPE/fR3IyQdNY=
+golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE=
+golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o=
+golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc=
+golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY=
+golang.org/x/mod v0.1.1-0.20191105210325-c90efee705ee/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
+golang.org/x/mod v0.1.1-0.20191107180719-034126e5016b/go.mod h1:QqPTAvyqsEbceGzBzNggFXnrqF1CaUcvgkdR5Ot7KZg=
golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
+golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181023162649-9b4f9f5ad519/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181201002055-351d144fa1fc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20181220203305-927f97764cc3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
+golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
+golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20190827160401-ba9fcec4b297/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200222125558-5a598a2470a0/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200301022130-244492dfa37a/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
+golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
+golang.org/x/net v0.0.0-20200625001655-4c5254603344/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
+golang.org/x/net v0.0.0-20200822124328-c89045814202/go.mod h1:/O7V0waA8r7cgGh81Ro3o1hOxt32SMVPicZroKQ2sZA=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.33.0 h1:74SYHlV8BIgHIFC/LrYkOGIwL19eTYXQ5wc6TBuO36I=
-golang.org/x/net v0.33.0/go.mod h1:HXLR5J+9DxmrqMwG9qjGCxZ+zKXxBru04zlTvWlWuN4=
-golang.org/x/oauth2 v0.23.0 h1:PbgcYx2W7i4LvjJWEbf0ngHV6qJYr86PkAV3bXdLEbs=
-golang.org/x/oauth2 v0.23.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
+golang.org/x/net v0.0.0-20201202161906-c7110b5ffcbb/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
+golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
+golang.org/x/net v0.0.0-20211209124913-491a49abca63/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
+golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM=
+golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
+golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
+golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20191202225959-858c2ad4c8b6/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
+golang.org/x/oauth2 v0.12.0 h1:smVPGxink+n1ZI5pkQa8y6fZT0RW0MgCO5bFpepy4B4=
+golang.org/x/oauth2 v0.12.0/go.mod h1:A74bZ3aGXgCY0qaIC9Ahg6Lglin4AMAco8cIv9baba4=
+golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
+golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181026203630-95b1ffbd15a5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181107165924-66b7b1311ac8/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
+golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190422165155-953cdadca894/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200122134326-e047566fdf82/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200202164722-d101bd2416d5/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200212091648-12a6c2dcc1e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200223170610-d5e6a3e2c0ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200302150141-5c8b2ff67527/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200519105757-fe76b779f299/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200831180312-196b9ba8737a/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20200923182605-d9f96fdee20d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210403161142-5e06dd20ab57/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
+golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.28.0 h1:Fksou7UEQUWlKvIdsqzJmUmCX3cZuD2+P3XyyzwMhlA=
-golang.org/x/sys v0.28.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.27.0 h1:WP60Sv1nlK1T6SupCHbXzSaN0b9wUmsPoRS9b61A23Q=
-golang.org/x/term v0.27.0/go.mod h1:iMsnZpn0cago0GOrHO2+Y7u7JPn5AylBrcoWkElMTSM=
+golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE=
+golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
+golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
+golang.org/x/term v0.0.0-20210220032956-6a3ed077a48d/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
+golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek=
+golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U=
+golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.21.0 h1:zyQAAkrwaneQ066sspRyJaG9VNi/YJ1NfzcGB3hZ/qo=
-golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
-golang.org/x/time v0.7.0 h1:ntUhktv3OPE6TgYxXWv9vKvUSJyIFJlyohwbkEwPrKQ=
-golang.org/x/time v0.7.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
+golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
+golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k=
+golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
+golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20210220033141-f8bda1e9f3ba/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4=
+golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
+golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
+golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190328211700-ab21143f2384/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
+golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190624222133-a101b041ded4/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc=
+golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191108193012-7d206e10da11/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191112195655-aa38f8e97acc/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191113191852-77e3bb0ad9e7/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
+golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200122220014-bf1340f18c4a/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200130002326-2f3ba24bd6e7/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200204074204-1cc6d1ef6c74/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200207183749-b753a1ba74fa/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200212150539-ea181f53ac56/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200224181240-023911ca70b2/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
+golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
+golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.28.0 h1:WuB6qZ4RPCQo5aP3WdKZS7i595EdWqWR8vqJTlwTVK8=
-golang.org/x/tools v0.28.0/go.mod h1:dcIOrVd3mfQKTgrDVQHqCPMWy6lnhfhtX3hLXYVLfRw=
+golang.org/x/tools v0.1.2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
+golang.org/x/tools v0.14.0 h1:jvNa2pY0M4r62jkRQ6RwEZZyPcymeL9XZMLBbV7U2nc=
+golang.org/x/tools v0.14.0/go.mod h1:uYBEerGOWcJyEORxN+Ek8+TT266gXkNlHdJBwexUsBg=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-google.golang.org/protobuf v1.36.1 h1:yBPeRvTftaleIgM3PZ/WBIZ7XM/eEYAaEyCwvyjq/gk=
-google.golang.org/protobuf v1.36.1/go.mod h1:9fA7Ob0pmnwhb644+1+CVWFRbNajQ6iRojtC/QF5bRE=
+google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
+google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
+google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
+google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.14.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.15.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI=
+google.golang.org/api v0.17.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.18.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/api v0.20.0/go.mod h1:BwFmGc8tA3vsd7r/7kR8DY7iEEGSU04BFxCo5jP/sfE=
+google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
+google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4=
+google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0=
+google.golang.org/appengine v1.6.5/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/appengine v1.6.7 h1:FZR1q0exgwxzPzp/aF+VccGrSfxfPpkBqjIIEq3ru6c=
+google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
+google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
+google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE=
+google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc=
+google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8=
+google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191115194625-c23dd37a84c9/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191216164720-4f79533eabd1/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20191230161307-f3c370f40bfb/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200115191322-ca5a22157cba/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200122232147-0452cf42e150/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc=
+google.golang.org/genproto v0.0.0-20200204135345-fa8e72b47b90/go.mod h1:GmwEX6Z4W5gMy59cAlVYjN9JhxgbQH6Gn+gFDQe2lzA=
+google.golang.org/genproto v0.0.0-20200212174721-66ed5ce911ce/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200224152610-e50cd9704f63/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200305110556-506484158171/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200423170343-7949de9c1215/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200513103714-09dca8ec2884/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c=
+google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo=
+google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
+google.golang.org/genproto v0.0.0-20210602131652-f16073e35f0c/go.mod h1:UODoCrxHCcBojKKwX1terBiRUaqAsFqJiF615XL43r0=
+google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
+google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
+google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
+google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
+google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
+google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.27.1/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
+google.golang.org/grpc v1.29.1/go.mod h1:itym6AZVZYACWQqET3MqgPpjcuV5QH3BxFS3IjizoKk=
+google.golang.org/grpc v1.33.1/go.mod h1:fr5YgcSWrqhRRxogOsw7RzIpsmvOZ6IcH4kBYTpR3n0=
+google.golang.org/grpc v1.36.0/go.mod h1:qjiiYl8FncCW8feJPdyg3v6XW24KsRHe+dy9BAGRRjU=
+google.golang.org/grpc v1.37.0/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQdJfM=
+google.golang.org/grpc v1.38.0/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQdJfM=
+google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
+google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
+google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
+google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE=
+google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo=
+google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
+google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4=
+google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c=
+google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
+google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
+google.golang.org/protobuf v1.31.0 h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8=
+google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
+gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
-gopkg.in/evanphx/json-patch.v4 v4.12.0 h1:n6jtcsulIzXPJaxegRbvFNNrZDjbij7ny3gmSPG+6V4=
-gopkg.in/evanphx/json-patch.v4 v4.12.0/go.mod h1:p8EYWUEYMpynmqDbY58zCKCFZw8pRWMG4EsWvDvM72M=
+gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI=
+gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys=
gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc=
gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
+gopkg.in/ini.v1 v1.51.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k=
+gopkg.in/natefinch/lumberjack.v2 v2.0.0/go.mod h1:l0ndWWf7gzL7RNwBG7wST/UCcT4T24xpD6X8LsfU/+k=
+gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo=
+gopkg.in/square/go-jose.v2 v2.2.2/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
+gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
+gopkg.in/yaml.v2 v2.0.0-20170812160011-eb3733d160e7/go.mod h1:JAlM8MvJe8wmxCU4Bli9HhUf9+ttbYbLASfIpnQbh74=
+gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.3/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.5/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.3.0/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
+gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
+gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.32.2 h1:bZrMLEkgizC24G9eViHGOPbW+aRo9duEISRIJKfdJuw=
-k8s.io/api v0.32.2/go.mod h1:hKlhk4x1sJyYnHENsrdCWw31FEmCijNGPJO5WzHiJ6Y=
-k8s.io/apimachinery v0.32.2 h1:yoQBR9ZGkA6Rgmhbp/yuT9/g+4lxtsGYwW6dR6BDPLQ=
-k8s.io/apimachinery v0.32.2/go.mod h1:GpHVgxoKlTxClKcteaeuF1Ul/lDVb74KpZcxcmLDElE=
-k8s.io/client-go v0.32.2 h1:4dYCD4Nz+9RApM2b/3BtVvBHw54QjMFUl1OLcJG5yOA=
-k8s.io/client-go v0.32.2/go.mod h1:fpZ4oJXclZ3r2nDOv+Ux3XcJutfrwjKTCHz2H3sww94=
-k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
-k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
-k8s.io/kube-aggregator v0.32.2 h1:kg9pke+i2qRbJwX1UKwZV4fsCRvmbaCEFk38R4FqHmw=
-k8s.io/kube-aggregator v0.32.2/go.mod h1:rRm+xY1yIFIt3zBc727nG5SBLYywywD87klfIAw+7+c=
-k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f h1:GA7//TjRY9yWGy1poLzYYJJ4JRdzg3+O6e8I+e+8T5Y=
-k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f/go.mod h1:R/HEjbvWI0qdfb8viZUeVZm0X6IZnxAydC7YU42CMw4=
-k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 h1:M3sRQVHv7vB20Xc2ybTt7ODCeFj6JSWYFzOFnYeS6Ro=
-k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
-sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 h1:/Rv+M11QRah1itp8VhT6HoVx1Ray9eB4DBr+K+/sCJ8=
-sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3/go.mod h1:18nIHnGi6636UCz6m8i4DhaJ65T6EruyzmoQqI2BVDo=
-sigs.k8s.io/structured-merge-diff/v4 v4.4.2 h1:MdmvkGuXi/8io6ixD5wud3vOLwc1rj0aNqRlpuvjmwA=
-sigs.k8s.io/structured-merge-diff/v4 v4.4.2/go.mod h1:N8f93tFZh9U6vpxwRArLiikrE5/2tiu1w1AGfACIGE4=
-sigs.k8s.io/yaml v1.4.0 h1:Mk1wCc2gy/F0THH0TAp1QYyJNzRm2KCLy3o5ASXVI5E=
-sigs.k8s.io/yaml v1.4.0/go.mod h1:Ejl7/uTz7PSA4eKMyQCUTnhZYNmLIl+5c2lQPGR2BPY=
+gotest.tools/v3 v3.0.2/go.mod h1:3SzNCllyD9/Y+b5r9JIKQ474KzkZyqLqEfYqMsX94Bk=
+gotest.tools/v3 v3.0.3/go.mod h1:Z7Lb0S5l+klDB31fvDQX8ss/FlKDxtlFlw3Oa8Ymbl8=
+honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
+honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
+honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
+k8s.io/api v0.22.6/go.mod h1:q1F7IfaNrbi/83ebLy3YFQYLjPSNyunZ/IXQxMmbwCg=
+k8s.io/api v0.27.6 h1:PBWu/lywJe2qQcshMjubzcBg7+XDZOo7O8JJAWuYtUo=
+k8s.io/api v0.27.6/go.mod h1:AQYj0UsFCp3qJE7bOVnUuy4orCsXVkvHefnbYQiNWgk=
+k8s.io/apimachinery v0.22.6/go.mod h1:ZvVLP5iLhwVFg2Yx9Gh5W0um0DUauExbRhe+2Z8I1EU=
+k8s.io/apimachinery v0.27.6 h1:mGU8jmBq5o8mWBov+mLjdTBcU+etTE19waies4AQ6NE=
+k8s.io/apimachinery v0.27.6/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E=
+k8s.io/apiserver v0.22.6/go.mod h1:OlL1rGa2kKWGj2JEXnwBcul/BwC9Twe95gm4ohtiIIs=
+k8s.io/client-go v0.22.6/go.mod h1:TffU4AV2idZGeP+g3kdFZP+oHVHWPL1JYFySOALriw0=
+k8s.io/client-go v0.27.6 h1:vzI8804gpUtpMCNaFjIFyJrifH7u//LJCJPy8fQuYQg=
+k8s.io/client-go v0.27.6/go.mod h1:PMsXcDKiJTW7PHJ64oEsIUJF319wm+EFlCj76oE5QXM=
+k8s.io/code-generator v0.22.6/go.mod h1:iOZwYADSgFPNGWfqHFfg1V0TNJnl1t0WyZluQp4baqU=
+k8s.io/component-base v0.22.6/go.mod h1:ngHLefY4J5fq2fApNdbWyj4yh0lvw36do4aAjNN8rc8=
+k8s.io/gengo v0.0.0-20200413195148-3a45101e95ac/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0=
+k8s.io/gengo v0.0.0-20201214224949-b6c5ce23f027/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE=
+k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
+k8s.io/klog/v2 v2.9.0/go.mod h1:hy9LJ/NvuK+iVyP4Ehqva4HxZG/oXyIS3n3Jmire4Ec=
+k8s.io/klog/v2 v2.100.1 h1:7WCHKK6K8fNhTqfBhISHQ97KrnJNFZMcQvKp7gP/tmg=
+k8s.io/klog/v2 v2.100.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
+k8s.io/kube-aggregator v0.22.6 h1:/iaXzOWia2dqOQkIA9eJtkmfTveJMLz3Dci9ZA/WgmU=
+k8s.io/kube-aggregator v0.22.6/go.mod h1:0RSTzxqiwsj5HUlov195Z72ZKyE4qgedKXCl6sLKAjM=
+k8s.io/kube-openapi v0.0.0-20211109043538-20434351676c/go.mod h1:vHXdDvt9+2spS2Rx9ql3I8tycm3H9FDfdUoIuKCefvw=
+k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f h1:2kWPakN3i/k81b0gvD5C5FJ2kxm1WrQFanWchyKuqGg=
+k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f/go.mod h1:byini6yhqGC14c3ebc/QwanvYwhuMWF6yz2F8uwW8eg=
+k8s.io/utils v0.0.0-20210819203725-bdf08cb9a70a/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+k8s.io/utils v0.0.0-20230209194617-a36077c30491 h1:r0BAOLElQnnFhE/ApUsg3iHdVYYPBjNSSOMowRZxxsY=
+k8s.io/utils v0.0.0-20230209194617-a36077c30491/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
+rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
+rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
+rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.27/go.mod h1:tq2nT0Kx7W+/f2JVE+zxYtUhdjuELJkVpNz+x/QN5R4=
+sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd h1:EDPBXCAspyGV4jQlpZSudPeMmr1bNJefnuqLsRAsHZo=
+sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd/go.mod h1:B8JuhiUyNFVKdsE8h686QcCxMaH6HrOAZj4vswFpcB0=
+sigs.k8s.io/structured-merge-diff/v4 v4.0.2/go.mod h1:bJZC9H9iH24zzfZ/41RGcq60oK1F7G282QMXDPYydCw=
+sigs.k8s.io/structured-merge-diff/v4 v4.2.1/go.mod h1:j/nl6xW8vLS49O8YvXW1ocPhZawJtm+Yrr7PPRQ0Vg4=
+sigs.k8s.io/structured-merge-diff/v4 v4.2.3 h1:PRbqxJClWWYMNV1dhaG4NsibJbArud9kFxnAMREiWFE=
+sigs.k8s.io/structured-merge-diff/v4 v4.2.3/go.mod h1:qjx8mGObPmV2aSZepjQjbmb2ihdVs8cGKBraizNC69E=
+sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
+sigs.k8s.io/yaml v1.3.0 h1:a2VclLzOGrwOHDiV8EfBGhvjHvP46CtW5j6POvhYGGo=
+sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8=
diff --git a/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go b/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
index b326697b6..f11bef981 100644
--- a/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
+++ b/images/kube-webhook-certgen/rootfs/pkg/k8s/k8s_test.go
@@ -186,7 +186,7 @@ func Test_Patching_objects(t *testing.T) {
})
// This is to preserve old behavior and log format, it could be improved.
- t.Run("different_non_empty_names_are_specified_for_validating_and_mutating_webhook", func(t *testing.T) {
+ t.Run("diffent_non_empty_names_are_specified_for_validating_and_mutating_webhook", func(t *testing.T) {
t.Parallel()
k := testK8sWithUnpatchedObjects()
diff --git a/images/nginx/Makefile b/images/nginx/Makefile
index 3cc14e5b3..b54a7739b 100644
--- a/images/nginx/Makefile
+++ b/images/nginx/Makefile
@@ -1,4 +1,4 @@
-# Copyright 2024 The Kubernetes Authors. All rights reserved.
+# Copyright 2017 The Kubernetes Authors. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -22,9 +22,9 @@ INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
# 0.0.0 shouldn't clobber any released builds
SHORT_SHA ?=$(shell git rev-parse --short HEAD)
-TAG ?=$(shell cat TAG)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
-REGISTRY ?= us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+REGISTRY ?= gcr.io/k8s-staging-ingress-nginx
IMAGE = $(REGISTRY)/nginx
@@ -32,7 +32,7 @@ IMAGE = $(REGISTRY)/nginx
export DOCKER_CLI_EXPERIMENTAL=enabled
# build with buildx
-PLATFORMS?=linux/amd64,linux/arm,linux/arm64
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
OUTPUT=
PROGRESS=plain
build: ensure-buildx
diff --git a/images/nginx/README.md b/images/nginx/README.md
index 768077215..da6994fb5 100644
--- a/images/nginx/README.md
+++ b/images/nginx/README.md
@@ -1,47 +1,27 @@
-NGINX base image
+NGINX base image using [alpine](https://www.alpinelinux.org/)
-### HTTP/3 Support
+This custom image contains:
-**HTTP/3 support is experimental and under development**
+- [nginx-http-auth-digest](https://github.com/atomx/nginx-http-auth-digest)
+- [ngx_http_substitutions_filter_module](https://github.com/yaoweibin/ngx_http_substitutions_filter_module)
+- [OpenTelemetry-CPP](https://github.com/open-telemetry/opentelemetry-cpp)
+- [OpenTelemetry-CPP-Nginx](https://github.com/open-telemetry/opentelemetry-cpp-contrib/tree/main/instrumentation/nginx)
+- [nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing)
+- [opentracing-cpp](https://github.com/opentracing/opentracing-cpp)
+- [zipkin-cpp-opentracing](https://github.com/rnburn/zipkin-cpp-opentracing)
+- [dd-opentracing-cpp](https://github.com/DataDog/dd-opentracing-cpp)
+- [ModSecurity-nginx](https://github.com/SpiderLabs/ModSecurity-nginx) (only supported in x86_64)
+- [brotli](https://github.com/google/brotli)
+- [geoip2](https://github.com/leev/ngx_http_geoip2_module)
-[HTTP/3](https://datatracker.ietf.org/doc/html/rfc9114)\
-[QUIC](https://datatracker.ietf.org/doc/html/rfc9000)
+**How to use this image:**
+This image provides a default configuration file with no backend servers.
-[According to the documentation, NGINX 1.25.0 or higher supports HTTP/3:](https://nginx.org/en/docs/quic.html)
+_Using docker_
-> Support for QUIC and HTTP/3 protocols is available since 1.25.0.
+NGINX base image we use is defined in NGINX_BASE file at the root of the project
-But this requires adding a new flag during the build:
+```console
+docker run -v /some/nginx.conf:/etc/nginx/nginx.conf:ro $(cat ../../NGINX_BASE)
+```
-> When configuring nginx, it is possible to enable QUIC and HTTP/3 using the --with-http_v3_module configuration parameter.
-
-[We have added this flag](https://github.com/kubernetes/ingress-nginx/pull/11470), but it is not enough to use HTTP/3 in ingress-nginx, this is the first step.
-
-The next steps will be:
-
-1. **Waiting for OpenSSL 3.4.**\
- The main problem is, that we still use OpenSSL (3.x) and it does not support the important mechanism of TLS 1.3 - [early_data](https://datatracker.ietf.org/doc/html/rfc8446#section-2.3):
-
- > Otherwise, the OpenSSL compatibility layer will be used that does not support early data.
-
- [And although another part of the documentation says that the directive is supported with OpenSSL:](https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_early_data)
-
- > The directive is supported when using OpenSSL 1.1.1 or higher.
-
- But this is incomplete support, because OpenSSL does not support this feature, and [it has only client side support:](https://github.com/openssl/openssl)
-
- > ... the QUIC (currently client side only) version 1 protocol
-
- [And also there are some issues even with client side](https://github.com/openssl/openssl/discussions/23339)
-
- Due to this, we currently have incomplete HTTP/3 support, without important security and performance features.\
- But the good news is that [OpenSSL plans to add server-side support in 3.4](https://github.com/openssl/web/blob/master/roadmap.md):
-
- > Server-side QUIC support
-
- [Overview of SSL libraries(HAProxy Documentation)](https://github.com/haproxy/wiki/wiki/SSL-Libraries-Support-Status#tldr)
-
-2. **Adding [parameters](https://nginx.org/en/docs/http/ngx_http_v3_module.html) to the configmap to configure HTTP/3 and quic(enableHTTP3, enableHTTP/0.9, maxCurrentStream, and so on).**
-3. **Adding options to the nginx config template(`listen 443 quic` to server blocks and `add_header Alt-Svc 'h3=":8443"; ma=86400';` to location blocks).**
-4. **Opening the https port for UDP in the container(because QUIC uses UDP).**
-5. **Adding tests.**
diff --git a/images/nginx/TAG b/images/nginx/TAG
index 46b105a30..6812f8122 100644
--- a/images/nginx/TAG
+++ b/images/nginx/TAG
@@ -1 +1 @@
-v2.0.0
+0.0.3
\ No newline at end of file
diff --git a/images/nginx/cloudbuild.yaml b/images/nginx/cloudbuild.yaml
index 2563692d7..71051f26d 100644
--- a/images/nginx/cloudbuild.yaml
+++ b/images/nginx/cloudbuild.yaml
@@ -1,14 +1,17 @@
+timeout: 10800s
options:
- # Increase machine type for multi-arch builds.
- machineType: E2_HIGHCPU_32
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
+ # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ machineType: E2_HIGHCPU_32
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: 'gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90'
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images/nginx && make push
-timeout: 7200s
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/nginx && make push
diff --git a/images/nginx/rc.yaml b/images/nginx/rc.yaml
new file mode 100644
index 000000000..bcf2b0274
--- /dev/null
+++ b/images/nginx/rc.yaml
@@ -0,0 +1,44 @@
+apiVersion: v1
+kind: Service
+metadata:
+ name: nginx
+ labels:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+spec:
+ type: NodePort
+ ports:
+ - port: 80
+ protocol: TCP
+ name: http
+ - port: 443
+ protocol: TCP
+ name: https
+ selector:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+---
+apiVersion: v1
+kind: ReplicationController
+metadata:
+ name: nginx
+ labels:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+spec:
+ replicas: 1
+ selector:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ template:
+ metadata:
+ labels:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/part-of: ingress-nginx
+ spec:
+ containers:
+ - name: nginx
+ image: registry.k8s.io/ingress-nginx/nginx:c5766dc011965f22fac2f4437e86d0fd9960a50c@sha256:94ff9b435a5f3f4570bbdaed4a3a523f63a54ce2ad6b132b5640bae2af5d9d90
+ ports:
+ - containerPort: 80
+ - containerPort: 443
diff --git a/images/nginx/rootfs/Dockerfile b/images/nginx/rootfs/Dockerfile
index 834a9bcf3..024c0e873 100644
--- a/images/nginx/rootfs/Dockerfile
+++ b/images/nginx/rootfs/Dockerfile
@@ -1,4 +1,4 @@
-# Copyright 2024 The Kubernetes Authors. All rights reserved.
+# Copyright 2015 The Kubernetes Authors. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -11,7 +11,7 @@
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
-FROM alpine:3.21 as builder
+FROM alpine:3.19.0 as builder
COPY . /
@@ -21,7 +21,7 @@ RUN apk update \
&& /build.sh
# Use a multi-stage build
-FROM alpine:3.21
+FROM alpine:3.19.0
ENV PATH=$PATH:/usr/local/luajit/bin:/usr/local/nginx/sbin:/usr/local/nginx/bin
@@ -29,7 +29,6 @@ ENV LUA_PATH="/usr/local/share/luajit-2.1.0-beta3/?.lua;/usr/local/share/lua/5.1
ENV LUA_CPATH="/usr/local/lib/lua/?/?.so;/usr/local/lib/lua/?.so;;"
COPY --from=builder /usr/local /usr/local
-COPY --from=builder /usr/lib/libopentelemetry* /usr/local/lib
COPY --from=builder /opt /opt
COPY --from=builder /etc/nginx /etc/nginx
@@ -49,10 +48,6 @@ RUN apk update \
yaml-cpp \
dumb-init \
tzdata \
- grpc-cpp \
- libprotobuf \
- abseil-cpp-crc-cpu-detect \
- abseil-cpp-vlog-config-internal \
&& ln -s /usr/local/nginx/sbin/nginx /sbin/nginx \
&& adduser -S -D -H -u 101 -h /usr/local/nginx \
-s /sbin/nologin -G www-data -g www-data www-data \
@@ -68,7 +63,7 @@ RUN apk update \
); \
for dir in "${writeDirs[@]}"; do \
mkdir -p ${dir}; \
- chown -R www-data:www-data ${dir}; \
+ chown -R www-data.www-data ${dir}; \
done'
EXPOSE 80 443
diff --git a/images/nginx/rootfs/build.sh b/images/nginx/rootfs/build.sh
index 297abf777..8bf372f21 100755
--- a/images/nginx/rootfs/build.sh
+++ b/images/nginx/rootfs/build.sh
@@ -1,6 +1,6 @@
#!/bin/bash
-# Copyright 2023 The Kubernetes Authors.
+# Copyright 2015 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -18,119 +18,139 @@ set -o errexit
set -o nounset
set -o pipefail
-export NGINX_VERSION=1.27.1
+export NGINX_VERSION=1.21.6
-# Check for recent changes: https://github.com/vision5/ngx_devel_kit/compare/v0.3.3...master
-export NDK_VERSION=v0.3.3
+# Check for recent changes: https://github.com/vision5/ngx_devel_kit/compare/v0.3.2...master
+export NDK_VERSION=0.3.2
# Check for recent changes: https://github.com/openresty/set-misc-nginx-module/compare/v0.33...master
-export SETMISC_VERSION=v0.33
+export SETMISC_VERSION=0.33
-# Check for recent changes: https://github.com/openresty/headers-more-nginx-module/compare/v0.37...master
-export MORE_HEADERS_VERSION=v0.37
+# Check for recent changes: https://github.com/openresty/headers-more-nginx-module/compare/v0.34...master
+export MORE_HEADERS_VERSION=0.34
-# Check for recent changes: https://github.com/atomx/nginx-http-auth-digest/compare/v1.0.0...master
-export NGINX_DIGEST_AUTH=v1.0.0
+# Check for recent changes: https://github.com/atomx/nginx-http-auth-digest/compare/v1.0.0...atomx:master
+export NGINX_DIGEST_AUTH=1.0.0
+
+# Check for recent changes: https://github.com/yaoweibin/ngx_http_substitutions_filter_module/compare/v0.6.4...master
+export NGINX_SUBSTITUTIONS=b8a71eacc7f986ba091282ab8b1bbbc6ae1807e0
+
+# Check for recent changes: https://github.com/opentracing-contrib/nginx-opentracing/compare/v0.19.0...master
+export NGINX_OPENTRACING_VERSION=0.19.0
+
+#Check for recent changes: https://github.com/opentracing/opentracing-cpp/compare/v1.6.0...master
+export OPENTRACING_CPP_VERSION=f86b33f3d9e7322b1298ba62d5ffa7a9519c4c41
+
+# Check for recent changes: https://github.com/rnburn/zipkin-cpp-opentracing/compare/v0.5.2...master
+export ZIPKIN_CPP_VERSION=f69593138ff84ca2f6bc115992e18ca3d35f344a
+
+# Check for recent changes: https://github.com/jbeder/yaml-cpp/compare/yaml-cpp-0.7.0...master
+export YAML_CPP_VERSION=yaml-cpp-0.7.0
+
+# Check for recent changes: https://github.com/jaegertracing/jaeger-client-cpp/compare/v0.7.0...master
+export JAEGER_VERSION=0.7.0
+
+# Check for recent changes: https://github.com/msgpack/msgpack-c/compare/cpp-3.3.0...master
+export MSGPACK_VERSION=3.3.0
+
+# Check for recent changes: https://github.com/DataDog/dd-opentracing-cpp/compare/v1.3.7...master
+export DATADOG_CPP_VERSION=1.3.7
# Check for recent changes: https://github.com/SpiderLabs/ModSecurity-nginx/compare/v1.0.3...master
-export MODSECURITY_VERSION=v1.0.3
+export MODSECURITY_VERSION=1.0.3
-# Check for recent changes: https://github.com/SpiderLabs/ModSecurity/compare/v3.0.13...v3/master
-export MODSECURITY_LIB_VERSION=v3.0.13
+# Check for recent changes: https://github.com/SpiderLabs/ModSecurity/compare/v3.0.8...v3/master
+export MODSECURITY_LIB_VERSION=e9a7ba4a60be48f761e0328c6dfcc668d70e35a0
-# Check for recent changes: https://github.com/coreruleset/coreruleset/compare/v4.10.0...main
-export OWASP_MODSECURITY_CRS_VERSION=v4.10.0
+# Check for recent changes: https://github.com/coreruleset/coreruleset/compare/v3.3.2...v3.3/master
+export OWASP_MODSECURITY_CRS_VERSION=v3.3.5
-# Check for recent changes: https://github.com/openresty/lua-nginx-module/compare/v0.10.27...master
-export LUA_NGX_VERSION=v0.10.27
+# Check for recent changes: https://github.com/openresty/lua-nginx-module/compare/v0.10.25...master
+export LUA_NGX_VERSION=0.10.25
-# Check for recent changes: https://github.com/openresty/stream-lua-nginx-module/compare/v0.0.15...master
-export LUA_STREAM_NGX_VERSION=v0.0.15
+# Check for recent changes: https://github.com/openresty/stream-lua-nginx-module/compare/v0.0.13...master
+export LUA_STREAM_NGX_VERSION=0.0.13
-# Check for recent changes: https://github.com/openresty/lua-upstream-nginx-module/compare/v0.07...master
-export LUA_UPSTREAM_VERSION=v0.07
+# Check for recent changes: https://github.com/openresty/lua-upstream-nginx-module/compare/8aa93ead98ba2060d4efd594ae33a35d153589bf...master
+export LUA_UPSTREAM_VERSION=8aa93ead98ba2060d4efd594ae33a35d153589bf
-# Check for recent changes: https://github.com/openresty/lua-cjson/compare/2.1.0.14...master
-export LUA_CJSON_VERSION=2.1.0.14
+# Check for recent changes: https://github.com/openresty/lua-cjson/compare/2.1.0.11...openresty:master
+export LUA_CJSON_VERSION=2.1.0.11
-# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/445df24ef3781e488cee3dfe8a1e111997fc1dfe...master
-export GEOIP2_VERSION=445df24ef3781e488cee3dfe8a1e111997fc1dfe
+# Check for recent changes: https://github.com/leev/ngx_http_geoip2_module/compare/3.4...master
+export GEOIP2_VERSION=a607a41a8115fecfc05b5c283c81532a3d605425
-# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20240815...v2.1-agentzh
-export LUAJIT_VERSION=v2.1-20240815
+# Check for recent changes: https://github.com/openresty/luajit2/compare/v2.1-20230410...v2.1-agentzh
+export LUAJIT_VERSION=2.1-20230410
-# Check for recent changes: https://github.com/openresty/lua-resty-balancer/compare/v0.05...master
-export LUA_RESTY_BALANCER=v0.05
+# Check for recent changes: https://github.com/openresty/lua-resty-balancer/compare/v0.04...master
+export LUA_RESTY_BALANCER=0.04
-# Check for recent changes: https://github.com/openresty/lua-resty-lrucache/compare/v0.15...master
-export LUA_RESTY_CACHE=v0.15
+# Check for recent changes: https://github.com/openresty/lua-resty-lrucache/compare/v0.13...master
+export LUA_RESTY_CACHE=0.13
-# Check for recent changes: https://github.com/openresty/lua-resty-core/compare/v0.1.30...master
-export LUA_RESTY_CORE=v0.1.30
+# Check for recent changes: https://github.com/openresty/lua-resty-core/compare/v0.1.27...master
+export LUA_RESTY_CORE=0.1.27
-# Check for recent changes: https://github.com/cloudflare/lua-resty-cookie/compare/f418d77082eaef48331302e84330488fdc810ef4...master
-export LUA_RESTY_COOKIE_VERSION=f418d77082eaef48331302e84330488fdc810ef4
+# Check for recent changes: https://github.com/utix/lua-resty-cookie/compare/9533f47...master
+export LUA_RESTY_COOKIE_VERSION=9533f479371663107b515590fc9daf00d61ebf11
-# Check for recent changes: https://github.com/openresty/lua-resty-dns/compare/v0.23...master
-export LUA_RESTY_DNS=v0.23
+# Check for recent changes: https://github.com/openresty/lua-resty-dns/compare/v0.22...master
+export LUA_RESTY_DNS=0.22
-# Check for recent changes: https://github.com/ledgetech/lua-resty-http/compare/v0.17.2...master
-export LUA_RESTY_HTTP=v0.17.2
+# Check for recent changes: https://github.com/ledgetech/lua-resty-http/compare/v0.16.1...master
+export LUA_RESTY_HTTP=0ce55d6d15da140ecc5966fa848204c6fd9074e8
# Check for recent changes: https://github.com/openresty/lua-resty-lock/compare/v0.09...master
-export LUA_RESTY_LOCK=v0.09
+export LUA_RESTY_LOCK=0.09
# Check for recent changes: https://github.com/openresty/lua-resty-upload/compare/v0.11...master
-export LUA_RESTY_UPLOAD_VERSION=v0.11
+export LUA_RESTY_UPLOAD_VERSION=0.11
-# Check for recent changes: https://github.com/openresty/lua-resty-string/compare/v0.16...master
-export LUA_RESTY_STRING_VERSION=v0.16
+# Check for recent changes: https://github.com/openresty/lua-resty-string/compare/v0.15...master
+export LUA_RESTY_STRING_VERSION=0.15
# Check for recent changes: https://github.com/openresty/lua-resty-memcached/compare/v0.17...master
-export LUA_RESTY_MEMCACHED_VERSION=v0.17
+export LUA_RESTY_MEMCACHED_VERSION=0.17
-# Check for recent changes: https://github.com/openresty/lua-resty-redis/compare/v0.31...master
-export LUA_RESTY_REDIS_VERSION=v0.31
+# Check for recent changes: https://github.com/openresty/lua-resty-redis/compare/v0.30...master
+export LUA_RESTY_REDIS_VERSION=0.30
-# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/3e93c53eb8c9884efe939ef070486a0e507cc5be...master
-export LUA_RESTY_IPMATCHER_VERSION=3e93c53eb8c9884efe939ef070486a0e507cc5be
+# Check for recent changes: https://github.com/api7/lua-resty-ipmatcher/compare/v0.6.1...master
+export LUA_RESTY_IPMATCHER_VERSION=0.6.1
-# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v2.1.9...master
-export MIMALOC_VERSION=v2.1.9
+# Check for recent changes: https://github.com/ElvinEfendi/lua-resty-global-throttle/compare/v0.2.0...main
+export LUA_RESTY_GLOBAL_THROTTLE_VERSION=0.2.0
-# Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp/compare/v1.18.0...main
-export OPENTELEMETRY_CPP_VERSION=v1.18.0
-
-# Check for recent changes: https://github.com/open-telemetry/opentelemetry-proto/compare/v1.5.0...main
-export OPENTELEMETRY_PROTO_VERSION=v1.5.0
+# Check for recent changes: https://github.com/microsoft/mimalloc/compare/v1.7.6...master
+export MIMALOC_VERSION=1.7.6
export BUILD_PATH=/tmp/build
ARCH=$(uname -m)
+if [[ ${ARCH} == "s390x" ]]; then
+ export LUAJIT_VERSION=9d5750d28478abfdcaefdfdc408f87752a21e431
+ export LUA_RESTY_CORE=0.1.17
+ export LUA_NGX_VERSION=0.10.15
+ export LUA_STREAM_NGX_VERSION=0.0.7
+fi
+
get_src()
{
hash="$1"
url="$2"
- dest="${3-}"
- ARGS=""
f=$(basename "$url")
echo "Downloading $url"
curl -sSL "$url" -o "$f"
- # TODO: Reenable checksum verification but make it smarter
- # echo "$hash $f" | sha256sum -c - || exit 10
- if [ ! -z "$dest" ]; then
- mkdir ${BUILD_PATH}/${dest}
- ARGS="-C ${BUILD_PATH}/${dest} --strip-components=1"
- fi
- tar xvzf "$f" $ARGS
+ echo "$hash $f" | sha256sum -c - || exit 10
+ tar xzf "$f"
rm -rf "$f"
}
# install required packages to build
-# Dependencies from "ninja" and below are OTEL dependencies
apk add \
bash \
gcc \
@@ -167,22 +187,7 @@ apk add \
unzip \
dos2unix \
yaml-cpp \
- coreutils \
- ninja \
- gtest-dev \
- git \
- build-base \
- pkgconfig \
- c-ares-dev \
- re2-dev \
- grpc-dev \
- protobuf-dev
-
-# apk add -X http://dl-cdn.alpinelinux.org/alpine/edge/testing opentelemetry-cpp-dev
-
-# There is some bug with some platforms and git, so force HTTP/1.1
-git config --global http.version HTTP/1.1
-git config --global http.postBuffer 157286400
+ coreutils
mkdir -p /etc/nginx
@@ -194,131 +199,276 @@ get_src 66dc7081488811e9f925719e34d1b4504c2801c81dee2920e5452a86b11405ae \
"https://nginx.org/download/nginx-$NGINX_VERSION.tar.gz"
get_src aa961eafb8317e0eb8da37eb6e2c9ff42267edd18b56947384e719b85188f58b \
- "https://github.com/vision5/ngx_devel_kit/archive/$NDK_VERSION.tar.gz" "ngx_devel_kit"
-
-get_src abc123 \
- "https://github.com/open-telemetry/opentelemetry-cpp/archive/$OPENTELEMETRY_CPP_VERSION.tar.gz" "opentelemetry-cpp"
-
-get_src abc123 \
- "https://github.com/open-telemetry/opentelemetry-proto/archive/$OPENTELEMETRY_PROTO_VERSION.tar.gz" "opentelemetry-proto"
+ "https://github.com/vision5/ngx_devel_kit/archive/v$NDK_VERSION.tar.gz"
get_src cd5e2cc834bcfa30149e7511f2b5a2183baf0b70dc091af717a89a64e44a2985 \
- "https://github.com/openresty/set-misc-nginx-module/archive/$SETMISC_VERSION.tar.gz" "set-misc-nginx-module"
+ "https://github.com/openresty/set-misc-nginx-module/archive/v$SETMISC_VERSION.tar.gz"
get_src 0c0d2ced2ce895b3f45eb2b230cd90508ab2a773299f153de14a43e44c1209b3 \
- "https://github.com/openresty/headers-more-nginx-module/archive/$MORE_HEADERS_VERSION.tar.gz" "headers-more-nginx-module"
+ "https://github.com/openresty/headers-more-nginx-module/archive/v$MORE_HEADERS_VERSION.tar.gz"
get_src f09851e6309560a8ff3e901548405066c83f1f6ff88aa7171e0763bd9514762b \
- "https://github.com/atomx/nginx-http-auth-digest/archive/$NGINX_DIGEST_AUTH.tar.gz" "nginx-http-auth-digest"
+ "https://github.com/atomx/nginx-http-auth-digest/archive/v$NGINX_DIGEST_AUTH.tar.gz"
+
+get_src a98b48947359166326d58700ccdc27256d2648218072da138ab6b47de47fbd8f \
+ "https://github.com/yaoweibin/ngx_http_substitutions_filter_module/archive/$NGINX_SUBSTITUTIONS.tar.gz"
+
+get_src 6f97776ebdf019b105a755c7736b70bdbd7e575c7f0d39db5fe127873c7abf17 \
+ "https://github.com/opentracing-contrib/nginx-opentracing/archive/v$NGINX_OPENTRACING_VERSION.tar.gz"
+
+get_src cbe625cba85291712253db5bc3870d60c709acfad9a8af5a302673d3d201e3ea \
+ "https://github.com/opentracing/opentracing-cpp/archive/$OPENTRACING_CPP_VERSION.tar.gz"
+
+get_src 71de3d0658935db7ccea20e006b35e58ddc7e4c18878b9523f2addc2371e9270 \
+ "https://github.com/rnburn/zipkin-cpp-opentracing/archive/$ZIPKIN_CPP_VERSION.tar.gz"
get_src 32a42256616cc674dca24c8654397390adff15b888b77eb74e0687f023c8751b \
- "https://github.com/SpiderLabs/ModSecurity-nginx/archive/$MODSECURITY_VERSION.tar.gz" "ModSecurity-nginx"
+ "https://github.com/SpiderLabs/ModSecurity-nginx/archive/v$MODSECURITY_VERSION.tar.gz"
+get_src 43e6a9fcb146ad871515f0d0873947e5d497a1c9c60c58cb102a97b47208b7c3 \
+ "https://github.com/jbeder/yaml-cpp/archive/$YAML_CPP_VERSION.tar.gz"
+
+get_src 3a3a03060bf5e3fef52c9a2de02e6035cb557f389453d8f3b0c1d3d570636994 \
+ "https://github.com/jaegertracing/jaeger-client-cpp/archive/v$JAEGER_VERSION.tar.gz"
+
+get_src 754c3ace499a63e45b77ef4bcab4ee602c2c414f58403bce826b76ffc2f77d0b \
+ "https://github.com/msgpack/msgpack-c/archive/cpp-$MSGPACK_VERSION.tar.gz"
+
+if [[ ${ARCH} == "s390x" ]]; then
+get_src 7d5f3439c8df56046d0564b5857fd8a30296ab1bd6df0f048aed7afb56a0a4c2 \
+ "https://github.com/openresty/lua-nginx-module/archive/v$LUA_NGX_VERSION.tar.gz"
+get_src 99c47c75c159795c9faf76bbb9fa58e5a50b75286c86565ffcec8514b1c74bf9 \
+ "https://github.com/openresty/stream-lua-nginx-module/archive/v$LUA_STREAM_NGX_VERSION.tar.gz"
+else
get_src bc764db42830aeaf74755754b900253c233ad57498debe7a441cee2c6f4b07c2 \
- "https://github.com/openresty/lua-nginx-module/archive/$LUA_NGX_VERSION.tar.gz" "lua-nginx-module"
+ "https://github.com/openresty/lua-nginx-module/archive/v$LUA_NGX_VERSION.tar.gz"
get_src 01b715754a8248cc7228e0c8f97f7488ae429d90208de0481394e35d24cef32f \
- "https://github.com/openresty/stream-lua-nginx-module/archive/$LUA_STREAM_NGX_VERSION.tar.gz" "stream-lua-nginx-module"
+ "https://github.com/openresty/stream-lua-nginx-module/archive/v$LUA_STREAM_NGX_VERSION.tar.gz"
+
+fi
get_src a92c9ee6682567605ece55d4eed5d1d54446ba6fba748cff0a2482aea5713d5f \
- "https://github.com/openresty/lua-upstream-nginx-module/archive/$LUA_UPSTREAM_VERSION.tar.gz" "lua-upstream-nginx-module"
+ "https://github.com/openresty/lua-upstream-nginx-module/archive/$LUA_UPSTREAM_VERSION.tar.gz"
+if [[ ${ARCH} == "s390x" ]]; then
+get_src 266ed1abb70a9806d97cb958537a44b67db6afb33d3b32292a2d68a2acedea75 \
+ "https://github.com/openresty/luajit2/archive/$LUAJIT_VERSION.tar.gz"
+else
get_src 77bbcbb24c3c78f51560017288f3118d995fe71240aa379f5818ff6b166712ff \
- "https://github.com/openresty/luajit2/archive/$LUAJIT_VERSION.tar.gz" "luajit2"
+ "https://github.com/openresty/luajit2/archive/v$LUAJIT_VERSION.tar.gz"
+fi
+
+get_src 8d39c6b23f941a2d11571daaccc04e69539a3fcbcc50a631837560d5861a7b96 \
+ "https://github.com/DataDog/dd-opentracing-cpp/archive/v$DATADOG_CPP_VERSION.tar.gz"
get_src b6c9c09fd43eb34a71e706ad780b2ead26549a9a9f59280fe558f5b7b980b7c6 \
- "https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz" "ngx_http_geoip2_module"
+ "https://github.com/leev/ngx_http_geoip2_module/archive/$GEOIP2_VERSION.tar.gz"
get_src deb4ab1ffb9f3d962c4b4a2c4bdff692b86a209e3835ae71ebdf3b97189e40a9 \
- "https://github.com/openresty/lua-resty-upload/archive/$LUA_RESTY_UPLOAD_VERSION.tar.gz" "lua-resty-upload"
+ "https://github.com/openresty/lua-resty-upload/archive/v$LUA_RESTY_UPLOAD_VERSION.tar.gz"
get_src bdbf271003d95aa91cab0a92f24dca129e99b33f79c13ebfcdbbcbb558129491 \
- "https://github.com/openresty/lua-resty-string/archive/$LUA_RESTY_STRING_VERSION.tar.gz" "lua-resty-string"
+ "https://github.com/openresty/lua-resty-string/archive/v$LUA_RESTY_STRING_VERSION.tar.gz"
get_src 16d72ed133f0c6df376a327386c3ef4e9406cf51003a700737c3805770ade7c5 \
- "https://github.com/openresty/lua-resty-balancer/archive/$LUA_RESTY_BALANCER.tar.gz" "lua-resty-balancer"
+ "https://github.com/openresty/lua-resty-balancer/archive/v$LUA_RESTY_BALANCER.tar.gz"
+if [[ ${ARCH} == "s390x" ]]; then
+get_src 8f5f76d2689a3f6b0782f0a009c56a65e4c7a4382be86422c9b3549fe95b0dc4 \
+ "https://github.com/openresty/lua-resty-core/archive/v$LUA_RESTY_CORE.tar.gz"
+else
get_src 39baab9e2b31cc48cecf896cea40ef6e80559054fd8a6e440cc804a858ea84d4 \
- "https://github.com/openresty/lua-resty-core/archive/$LUA_RESTY_CORE.tar.gz" "lua-resty-core"
+ "https://github.com/openresty/lua-resty-core/archive/v$LUA_RESTY_CORE.tar.gz"
+fi
get_src a77b9de160d81712f2f442e1de8b78a5a7ef0d08f13430ff619f79235db974d4 \
- "https://github.com/openresty/lua-cjson/archive/$LUA_CJSON_VERSION.tar.gz" "lua-cjson"
+ "https://github.com/openresty/lua-cjson/archive/$LUA_CJSON_VERSION.tar.gz"
-get_src 5ed48c36231e2622b001308622d46a0077525ac2f751e8cc0c9905914254baa4 \
- "https://github.com/cloudflare/lua-resty-cookie/archive/$LUA_RESTY_COOKIE_VERSION.tar.gz" "lua-resty-cookie"
+get_src a404c790553617424d743b82a9f01feccd0d2930b306b370c665ca3b7c09ccb6 \
+ "https://github.com/utix/lua-resty-cookie/archive/$LUA_RESTY_COOKIE_VERSION.tar.gz"
get_src 573184006b98ccee2594b0d134fa4d05e5d2afd5141cbad315051ccf7e9b6403 \
- "https://github.com/openresty/lua-resty-lrucache/archive/$LUA_RESTY_CACHE.tar.gz" "lua-resty-lrucache"
+ "https://github.com/openresty/lua-resty-lrucache/archive/v$LUA_RESTY_CACHE.tar.gz"
get_src b4ddcd47db347e9adf5c1e1491a6279a6ae2a3aff3155ef77ea0a65c998a69c1 \
- "https://github.com/openresty/lua-resty-lock/archive/$LUA_RESTY_LOCK.tar.gz" "lua-resty-lock"
+ "https://github.com/openresty/lua-resty-lock/archive/v$LUA_RESTY_LOCK.tar.gz"
get_src 70e9a01eb32ccade0d5116a25bcffde0445b94ad35035ce06b94ccd260ad1bf0 \
- "https://github.com/openresty/lua-resty-dns/archive/$LUA_RESTY_DNS.tar.gz" "lua-resty-dns"
+ "https://github.com/openresty/lua-resty-dns/archive/v$LUA_RESTY_DNS.tar.gz"
get_src 9fcb6db95bc37b6fce77d3b3dc740d593f9d90dce0369b405eb04844d56ac43f \
- "https://github.com/ledgetech/lua-resty-http/archive/$LUA_RESTY_HTTP.tar.gz" "lua-resty-http"
+ "https://github.com/ledgetech/lua-resty-http/archive/$LUA_RESTY_HTTP.tar.gz"
get_src 02733575c4aed15f6cab662378e4b071c0a4a4d07940c4ef19a7319e9be943d4 \
- "https://github.com/openresty/lua-resty-memcached/archive/$LUA_RESTY_MEMCACHED_VERSION.tar.gz" "lua-resty-memcached"
+ "https://github.com/openresty/lua-resty-memcached/archive/v$LUA_RESTY_MEMCACHED_VERSION.tar.gz"
get_src c15aed1a01c88a3a6387d9af67a957dff670357f5fdb4ee182beb44635eef3f1 \
- "https://github.com/openresty/lua-resty-redis/archive/$LUA_RESTY_REDIS_VERSION.tar.gz" "lua-resty-redis"
+ "https://github.com/openresty/lua-resty-redis/archive/v$LUA_RESTY_REDIS_VERSION.tar.gz"
get_src efb767487ea3f6031577b9b224467ddbda2ad51a41c5867a47582d4ad85d609e \
- "https://github.com/api7/lua-resty-ipmatcher/archive/$LUA_RESTY_IPMATCHER_VERSION.tar.gz" "lua-resty-ipmatcher"
+ "https://github.com/api7/lua-resty-ipmatcher/archive/v$LUA_RESTY_IPMATCHER_VERSION.tar.gz"
+
+get_src 0fb790e394510e73fdba1492e576aaec0b8ee9ef08e3e821ce253a07719cf7ea \
+ "https://github.com/ElvinEfendi/lua-resty-global-throttle/archive/v$LUA_RESTY_GLOBAL_THROTTLE_VERSION.tar.gz"
get_src d74f86ada2329016068bc5a243268f1f555edd620b6a7d6ce89295e7d6cf18da \
- "https://github.com/microsoft/mimalloc/archive/${MIMALOC_VERSION}.tar.gz" "mimalloc"
+ "https://github.com/microsoft/mimalloc/archive/refs/tags/v${MIMALOC_VERSION}.tar.gz"
# improve compilation times
CORES=$(($(grep -c ^processor /proc/cpuinfo) - 1))
export MAKEFLAGS=-j${CORES}
export CTEST_BUILD_FLAGS=${MAKEFLAGS}
+export HUNTER_JOBS_NUMBER=${CORES}
+export HUNTER_USE_CACHE_SERVERS=true
# Install luajit from openresty fork
export LUAJIT_LIB=/usr/local/lib
export LUA_LIB_DIR="$LUAJIT_LIB/lua"
export LUAJIT_INC=/usr/local/include/luajit-2.1
-cd "$BUILD_PATH/luajit2"
+cd "$BUILD_PATH/luajit2-$LUAJIT_VERSION"
make CCDEBUG=-g
make install
ln -s /usr/local/bin/luajit /usr/local/bin/lua
ln -s "$LUAJIT_INC" /usr/local/include/lua
-cd "$BUILD_PATH/opentelemetry-cpp"
-export CXXFLAGS="-DBENCHMARK_HAS_NO_INLINE_ASSEMBLY"
-cmake -B build -G Ninja -Wno-dev \
- -DOTELCPP_PROTO_PATH="${BUILD_PATH}/opentelemetry-proto/" \
- -DCMAKE_INSTALL_PREFIX=/usr \
- -DBUILD_SHARED_LIBS=ON \
- -DBUILD_TESTING="OFF" \
- -DBUILD_W3CTRACECONTEXT_TEST="OFF" \
- -DCMAKE_BUILD_TYPE=None \
- -DWITH_ABSEIL=ON \
- -DWITH_STL=ON \
- -DWITH_EXAMPLES=OFF \
- -DWITH_ZPAGES=OFF \
- -DWITH_OTLP_GRPC=ON \
- -DWITH_OTLP_HTTP=ON \
- -DWITH_ZIPKIN=ON \
- -DWITH_PROMETHEUS=OFF \
- -DWITH_ASYNC_EXPORT_PREVIEW=OFF \
- -DWITH_METRICS_EXEMPLAR_PREVIEW=OFF
- cmake --build build
- cmake --install build
+cd "$BUILD_PATH"
# Git tuning
git config --global --add core.compression -1
+# build opentracing lib
+cd "$BUILD_PATH/opentracing-cpp-$OPENTRACING_CPP_VERSION"
+mkdir .build
+cd .build
+
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DBUILD_TESTING=OFF \
+ -DBUILD_SHARED_LIBS=OFF \
+ -DBUILD_MOCKTRACER=OFF \
+ -DBUILD_STATIC_LIBS=ON \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ ..
+
+make
+make install
+
+# build yaml-cpp
+# TODO @timmysilv: remove this and jaeger sed calls once it is fixed in jaeger-client-cpp
+cd "$BUILD_PATH/yaml-cpp-$YAML_CPP_VERSION"
+mkdir .build
+cd .build
+
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ -DYAML_BUILD_SHARED_LIBS=ON \
+ -DYAML_CPP_BUILD_TESTS=OFF \
+ -DYAML_CPP_BUILD_TOOLS=OFF \
+ ..
+
+make
+make install
+
+# build jaeger lib
+cd "$BUILD_PATH/jaeger-client-cpp-$JAEGER_VERSION"
+sed -i 's/-Werror/-Wno-psabi/' CMakeLists.txt
+# use the above built yaml-cpp instead until a new version of jaeger-client-cpp fixes the yaml-cpp issue
+# tl;dr new hunter is needed for new yaml-cpp, but new hunter has a conflict with old Thrift and new Boost
+sed -i 's/hunter_add_package(yaml-cpp)/#hunter_add_package(yaml-cpp)/' CMakeLists.txt
+sed -i 's/yaml-cpp::yaml-cpp/yaml-cpp/' CMakeLists.txt
+
+cat < export.map
+{
+ global:
+ OpenTracingMakeTracerFactory;
+ local: *;
+};
+EOF
+
+mkdir .build
+cd .build
+
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DBUILD_TESTING=OFF \
+ -DJAEGERTRACING_BUILD_EXAMPLES=OFF \
+ -DJAEGERTRACING_BUILD_CROSSDOCK=OFF \
+ -DJAEGERTRACING_COVERAGE=OFF \
+ -DJAEGERTRACING_PLUGIN=ON \
+ -DHUNTER_CONFIGURATION_TYPES=Release \
+ -DBUILD_SHARED_LIBS=OFF \
+ -DJAEGERTRACING_WITH_YAML_CPP=ON \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ ..
+
+make
+make install
+
+export HUNTER_INSTALL_DIR=$(cat _3rdParty/Hunter/install-root-dir) \
+
+mv libjaegertracing_plugin.so /usr/local/lib/libjaegertracing_plugin.so
+
+
+# build zipkin lib
+cd "$BUILD_PATH/zipkin-cpp-opentracing-$ZIPKIN_CPP_VERSION"
+
+cat < export.map
+{
+ global:
+ OpenTracingMakeTracerFactory;
+ local: *;
+};
+EOF
+
+mkdir .build
+cd .build
+
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DBUILD_SHARED_LIBS=OFF \
+ -DBUILD_PLUGIN=ON \
+ -DBUILD_TESTING=OFF \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ ..
+
+make
+make install
+
+# build msgpack lib
+cd "$BUILD_PATH/msgpack-c-cpp-$MSGPACK_VERSION"
+
+mkdir .build
+cd .build
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DBUILD_SHARED_LIBS=OFF \
+ -DMSGPACK_BUILD_EXAMPLES=OFF \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ ..
+
+make
+make install
+
+# build datadog lib
+cd "$BUILD_PATH/dd-opentracing-cpp-$DATADOG_CPP_VERSION"
+
+mkdir .build
+cd .build
+
+cmake -DCMAKE_BUILD_TYPE=Release \
+ -DBUILD_TESTING=OFF \
+ -DCMAKE_POSITION_INDEPENDENT_CODE:BOOL=true \
+ ..
+
+make
+make install
+
# Get Brotli source and deps
cd "$BUILD_PATH"
git clone --depth=100 https://github.com/google/ngx_brotli.git
cd ngx_brotli
-git reset --hard a71f9312c2deb28875acc7bacfdd5695a111aa53
+# https://github.com/google/ngx_brotli/issues/156
+git reset --hard 63ca02abdcf79c9e788d2eedcc388d2335902e52
git submodule init
git submodule update
@@ -376,13 +526,17 @@ mv rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example rules/REQUEST-900-E
mv rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
cd ..
-# OWASP CRS v4 rules
+# OWASP CRS v3 rules
echo "
Include /etc/nginx/owasp-modsecurity-crs/crs-setup.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-901-INITIALIZATION.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-905-COMMON-EXCEPTIONS.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-910-IP-REPUTATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-911-METHOD-ENFORCEMENT.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-912-DOS-PROTECTION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-921-PROTOCOL-ATTACK.conf
@@ -391,7 +545,7 @@ Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LF
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
+Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
@@ -402,27 +556,11 @@ Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-951-DATA-LEAKAGES-SQL.co
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf
-Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-955-WEB-SHELLS.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-959-BLOCKING-EVALUATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf
Include /etc/nginx/owasp-modsecurity-crs/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
" > /etc/nginx/owasp-modsecurity-crs/nginx-modsecurity.conf
-# NGINX compiles a small test program to check if an added module works as expected.
-#
-# ModSecurity-nginx provides 'printf("hello");' as a test, but newer versions of GCC,
-# as included in Alpine 3.21, do not allow implicit declaration of function 'printf':
-#
-# objs/autotest.c:7:5: error: implicit declaration of function 'printf' [-Wimplicit-function-declaration]
-#
-# For this reason we replace 'printf("hello");' by 'msc_init();', which is always available.
-#
-# This fix is taken from a PR, that has been proposed to the ModSecurity-nginx project:
-#
-# https://github.com/owasp-modsecurity/ModSecurity-nginx/pull/275
-#
-sed -i "s/ngx_feature_test='printf(\"hello\");'/ngx_feature_test='msc_init();'/" $BUILD_PATH/ModSecurity-nginx/config
-
# build nginx
cd "$BUILD_PATH/nginx-$NGINX_VERSION"
@@ -447,7 +585,6 @@ WITH_FLAGS="--with-debug \
--with-http_gzip_static_module \
--with-http_sub_module \
--with-http_v2_module \
- --with-http_v3_module \
--with-stream \
--with-stream_ssl_module \
--with-stream_realip_module \
@@ -467,9 +604,10 @@ CC_OPT="-g -O2 -fPIE -fstack-protector-strong \
--param=ssp-buffer-size=4 \
-DTCP_FASTOPEN=23 \
-fPIC \
+ -I$HUNTER_INSTALL_DIR/include \
-Wno-cast-function-type"
-LD_OPT="-fPIE -fPIC -pie -Wl,-z,relro -Wl,-z,now"
+LD_OPT="-fPIE -fPIC -pie -Wl,-z,relro -Wl,-z,now -L$HUNTER_INSTALL_DIR/lib"
if [[ ${ARCH} != "aarch64" ]]; then
WITH_FLAGS+=" --with-file-aio"
@@ -480,15 +618,17 @@ if [[ ${ARCH} == "x86_64" ]]; then
fi
WITH_MODULES=" \
- --add-module=$BUILD_PATH/ngx_devel_kit \
- --add-module=$BUILD_PATH/set-misc-nginx-module \
- --add-module=$BUILD_PATH/headers-more-nginx-module \
- --add-module=$BUILD_PATH/lua-nginx-module \
- --add-module=$BUILD_PATH/stream-lua-nginx-module \
- --add-module=$BUILD_PATH/lua-upstream-nginx-module \
- --add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest \
- --add-dynamic-module=$BUILD_PATH/ModSecurity-nginx \
- --add-dynamic-module=$BUILD_PATH/ngx_http_geoip2_module \
+ --add-module=$BUILD_PATH/ngx_devel_kit-$NDK_VERSION \
+ --add-module=$BUILD_PATH/set-misc-nginx-module-$SETMISC_VERSION \
+ --add-module=$BUILD_PATH/headers-more-nginx-module-$MORE_HEADERS_VERSION \
+ --add-module=$BUILD_PATH/ngx_http_substitutions_filter_module-$NGINX_SUBSTITUTIONS \
+ --add-module=$BUILD_PATH/lua-nginx-module-$LUA_NGX_VERSION \
+ --add-module=$BUILD_PATH/stream-lua-nginx-module-$LUA_STREAM_NGX_VERSION \
+ --add-module=$BUILD_PATH/lua-upstream-nginx-module-$LUA_UPSTREAM_VERSION \
+ --add-dynamic-module=$BUILD_PATH/nginx-http-auth-digest-$NGINX_DIGEST_AUTH \
+ --add-dynamic-module=$BUILD_PATH/nginx-opentracing-$NGINX_OPENTRACING_VERSION/opentracing \
+ --add-dynamic-module=$BUILD_PATH/ModSecurity-nginx-$MODSECURITY_VERSION \
+ --add-dynamic-module=$BUILD_PATH/ngx_http_geoip2_module-${GEOIP2_VERSION} \
--add-dynamic-module=$BUILD_PATH/ngx_brotli"
./configure \
@@ -520,81 +660,56 @@ make
make modules
make install
-# Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp-contrib/compare/8933841f0a7f8737f61404cf0a64acf6b079c8a5...main
-export OPENTELEMETRY_CONTRIB_COMMIT=8933841f0a7f8737f61404cf0a64acf6b079c8a5
-cd "$BUILD_PATH"
-
-git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
-
-cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
-git reset --hard ${OPENTELEMETRY_CONTRIB_COMMIT}
-
-export OTEL_TEMP_INSTALL=/tmp/otel
-mkdir -p ${OTEL_TEMP_INSTALL}
-
-cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}/instrumentation/nginx
-mkdir -p build
-cd build
-cmake -DCMAKE_BUILD_TYPE=Release \
- -G Ninja \
- -DCMAKE_CXX_STANDARD=17 \
- -DCMAKE_INSTALL_PREFIX=${OTEL_TEMP_INSTALL} \
- -DBUILD_SHARED_LIBS=ON \
- -DNGINX_VERSION=${NGINX_VERSION} \
- ..
-cmake --build . -j ${CORES} --target install
-
-mkdir -p /etc/nginx/modules
-cp ${OTEL_TEMP_INSTALL}/otel_ngx_module.so /etc/nginx/modules/otel_ngx_module.so
-
-
-cd "$BUILD_PATH/lua-resty-core"
+cd "$BUILD_PATH/lua-resty-core-$LUA_RESTY_CORE"
make install
-cd "$BUILD_PATH/lua-resty-balancer"
+cd "$BUILD_PATH/lua-resty-balancer-$LUA_RESTY_BALANCER"
make all
make install
export LUA_INCLUDE_DIR=/usr/local/include/luajit-2.1
ln -s $LUA_INCLUDE_DIR /usr/include/lua5.1
-cd "$BUILD_PATH/lua-cjson"
+cd "$BUILD_PATH/lua-cjson-$LUA_CJSON_VERSION"
make all
make install
-cd "$BUILD_PATH/lua-resty-cookie"
+cd "$BUILD_PATH/lua-resty-cookie-$LUA_RESTY_COOKIE_VERSION"
make all
make install
-cd "$BUILD_PATH/lua-resty-lrucache"
+cd "$BUILD_PATH/lua-resty-lrucache-$LUA_RESTY_CACHE"
make install
-cd "$BUILD_PATH/lua-resty-dns"
+cd "$BUILD_PATH/lua-resty-dns-$LUA_RESTY_DNS"
make install
-cd "$BUILD_PATH/lua-resty-lock"
+cd "$BUILD_PATH/lua-resty-lock-$LUA_RESTY_LOCK"
make install
# required for OCSP verification
-cd "$BUILD_PATH/lua-resty-http"
+cd "$BUILD_PATH/lua-resty-http-$LUA_RESTY_HTTP"
make install
-cd "$BUILD_PATH/lua-resty-upload"
+cd "$BUILD_PATH/lua-resty-upload-$LUA_RESTY_UPLOAD_VERSION"
make install
-cd "$BUILD_PATH/lua-resty-string"
+cd "$BUILD_PATH/lua-resty-string-$LUA_RESTY_STRING_VERSION"
make install
-cd "$BUILD_PATH/lua-resty-memcached"
+cd "$BUILD_PATH/lua-resty-memcached-$LUA_RESTY_MEMCACHED_VERSION"
make install
-cd "$BUILD_PATH/lua-resty-redis"
+cd "$BUILD_PATH/lua-resty-redis-$LUA_RESTY_REDIS_VERSION"
make install
-cd "$BUILD_PATH/lua-resty-ipmatcher"
+cd "$BUILD_PATH/lua-resty-ipmatcher-$LUA_RESTY_IPMATCHER_VERSION"
INST_LUADIR=/usr/local/lib/lua make install
-cd "$BUILD_PATH/mimalloc"
+cd "$BUILD_PATH/lua-resty-global-throttle-$LUA_RESTY_GLOBAL_THROTTLE_VERSION"
+make install
+
+cd "$BUILD_PATH/mimalloc-$MIMALOC_VERSION"
mkdir -p out/release
cd out/release
@@ -618,11 +733,11 @@ adduser -S -D -H -u 101 -h /usr/local/nginx -s /sbin/nologin -G www-data -g www-
for dir in "${writeDirs[@]}"; do
mkdir -p ${dir};
- chown -R www-data:www-data ${dir};
+ chown -R www-data.www-data ${dir};
done
rm -rf /etc/nginx/owasp-modsecurity-crs/.git
-rm -rf /etc/nginx/owasp-modsecurity-crs/tests
+rm -rf /etc/nginx/owasp-modsecurity-crs/util/regression-tests
# remove .a files
find /usr/local -name "*.a" -print | xargs /bin/rm
diff --git a/images/nginx/rootfs/patches/01_nginx-1.27.1-win32_max_err_str.patch b/images/nginx/rootfs/patches/01_nginx-1.27.1-win32_max_err_str.patch
deleted file mode 100644
index 8c3ba2791..000000000
--- a/images/nginx/rootfs/patches/01_nginx-1.27.1-win32_max_err_str.patch
+++ /dev/null
@@ -1,15 +0,0 @@
-diff --git a/src/os/win32/ngx_event_log.c b/src/os/win32/ngx_event_log.c
-index e11ed1e8..dce8eddd 100644
---- a/src/os/win32/ngx_event_log.c
-+++ b/src/os/win32/ngx_event_log.c
-@@ -8,7 +8,9 @@
- #include
-
-
--#define NGX_MAX_ERROR_STR 2048
-+#ifndef NGX_MAX_ERROR_STR
-+#define NGX_MAX_ERROR_STR 4096
-+#endif
-
-
- void ngx_cdecl
diff --git a/images/nginx/rootfs/patches/02_nginx-1.27.1-stream_balancer_export.patch b/images/nginx/rootfs/patches/02_nginx-1.27.1-stream_balancer_export.patch
deleted file mode 100644
index f56bc5257..000000000
--- a/images/nginx/rootfs/patches/02_nginx-1.27.1-stream_balancer_export.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-diff --git a/src/stream/ngx_stream_upstream_round_robin.c b/src/stream/ngx_stream_upstream_round_robin.c
-index 526de3a..b531ce1 100644
---- a/src/stream/ngx_stream_upstream_round_robin.c
-+++ b/src/stream/ngx_stream_upstream_round_robin.c
-@@ -21,10 +21,6 @@ static void ngx_stream_upstream_notify_round_robin_peer(
-
- #if (NGX_STREAM_SSL)
-
--static ngx_int_t ngx_stream_upstream_set_round_robin_peer_session(
-- ngx_peer_connection_t *pc, void *data);
--static void ngx_stream_upstream_save_round_robin_peer_session(
-- ngx_peer_connection_t *pc, void *data);
- static ngx_int_t ngx_stream_upstream_empty_set_session(
- ngx_peer_connection_t *pc, void *data);
- static void ngx_stream_upstream_empty_save_session(ngx_peer_connection_t *pc,
-@@ -690,7 +686,7 @@ ngx_stream_upstream_notify_round_robin_peer(ngx_peer_connection_t *pc,
-
- #if (NGX_STREAM_SSL)
-
--static ngx_int_t
-+ngx_int_t
- ngx_stream_upstream_set_round_robin_peer_session(ngx_peer_connection_t *pc,
- void *data)
- {
-@@ -756,7 +752,7 @@ ngx_stream_upstream_set_round_robin_peer_session(ngx_peer_connection_t *pc,
- }
-
-
--static void
-+void
- ngx_stream_upstream_save_round_robin_peer_session(ngx_peer_connection_t *pc,
- void *data)
- {
-diff --git a/src/stream/ngx_stream_upstream_round_robin.h b/src/stream/ngx_stream_upstream_round_robin.h
-index 35d9fce..75f3e31 100644
---- a/src/stream/ngx_stream_upstream_round_robin.h
-+++ b/src/stream/ngx_stream_upstream_round_robin.h
-@@ -142,5 +142,15 @@ ngx_int_t ngx_stream_upstream_get_round_robin_peer(ngx_peer_connection_t *pc,
- void ngx_stream_upstream_free_round_robin_peer(ngx_peer_connection_t *pc,
- void *data, ngx_uint_t state);
-
-+#if (NGX_STREAM_SSL)
-+ngx_int_t ngx_stream_upstream_set_round_robin_peer_session(
-+ ngx_peer_connection_t *pc, void *data);
-+void ngx_stream_upstream_save_round_robin_peer_session(
-+ ngx_peer_connection_t *pc, void *data);
-+#endif
-+
-+
-+#define HAVE_NGX_STREAM_BALANCER_EXPORT_PATCH 1
-+
-
- #endif /* _NGX_STREAM_UPSTREAM_ROUND_ROBIN_H_INCLUDED_ */
diff --git a/images/nginx/rootfs/patches/04_nginx-1.27.1-stream_proxy_timeout_fields.patch b/images/nginx/rootfs/patches/04_nginx-1.27.1-stream_proxy_timeout_fields.patch
deleted file mode 100644
index e205abb8b..000000000
--- a/images/nginx/rootfs/patches/04_nginx-1.27.1-stream_proxy_timeout_fields.patch
+++ /dev/null
@@ -1,178 +0,0 @@
-diff -u -r -p -Naur nginx-1.27.1/src/stream/ngx_stream.h nginx-1.27.1-patched/src/stream/ngx_stream.h
---- nginx-1.27.1/src/stream/ngx_stream.h 2021-11-04 21:27:55.288708527 +0800
-+++ nginx-1.27.1-patched/src/stream/ngx_stream.h 2021-11-04 21:28:50.768035209 +0800
-@@ -254,6 +254,15 @@ typedef struct {
- } ngx_stream_module_t;
-
-
-+typedef struct {
-+ ngx_msec_t connect_timeout;
-+ ngx_msec_t timeout;
-+} ngx_stream_proxy_ctx_t;
-+
-+
-+#define NGX_STREAM_HAVE_PROXY_TIMEOUT_FIELDS_PATCH 1
-+
-+
- #define NGX_STREAM_MODULE 0x4d525453 /* "STRM" */
-
- #define NGX_STREAM_MAIN_CONF 0x02000000
-@@ -307,6 +316,7 @@ void ngx_stream_finalize_session(ngx_str
- extern ngx_module_t ngx_stream_module;
- extern ngx_uint_t ngx_stream_max_module;
- extern ngx_module_t ngx_stream_core_module;
-+extern ngx_module_t ngx_stream_proxy_module;
-
-
- typedef ngx_int_t (*ngx_stream_filter_pt)(ngx_stream_session_t *s,
-diff -u -r -p -Naur nginx-1.27.1/src/stream/ngx_stream_proxy_module.c nginx-1.27.1-patched/src/stream/ngx_stream_proxy_module.c
---- nginx-1.27.1/src/stream/ngx_stream_proxy_module.c 2021-11-04 21:27:55.289708533 +0800
-+++ nginx-1.27.1-patched/src/stream/ngx_stream_proxy_module.c 2021-11-04 21:37:03.578936990 +0800
-@@ -400,6 +400,7 @@ ngx_stream_proxy_handler(ngx_stream_sess
- ngx_stream_proxy_srv_conf_t *pscf;
- ngx_stream_upstream_srv_conf_t *uscf, **uscfp;
- ngx_stream_upstream_main_conf_t *umcf;
-+ ngx_stream_proxy_ctx_t *pctx;
-
- c = s->connection;
-
-@@ -408,6 +409,17 @@ ngx_stream_proxy_handler(ngx_stream_sess
- ngx_log_debug0(NGX_LOG_DEBUG_STREAM, c->log, 0,
- "proxy connection handler");
-
-+ pctx = ngx_palloc(c->pool, sizeof(ngx_stream_proxy_ctx_t));
-+ if (pctx == NULL) {
-+ ngx_stream_proxy_finalize(s, NGX_STREAM_INTERNAL_SERVER_ERROR);
-+ return;
-+ }
-+
-+ pctx->connect_timeout = pscf->connect_timeout;
-+ pctx->timeout = pscf->timeout;
-+
-+ ngx_stream_set_ctx(s, pctx, ngx_stream_proxy_module);
-+
- u = ngx_pcalloc(c->pool, sizeof(ngx_stream_upstream_t));
- if (u == NULL) {
- ngx_stream_proxy_finalize(s, NGX_STREAM_INTERNAL_SERVER_ERROR);
-@@ -699,6 +711,7 @@ ngx_stream_proxy_connect(ngx_stream_sess
- ngx_connection_t *c, *pc;
- ngx_stream_upstream_t *u;
- ngx_stream_proxy_srv_conf_t *pscf;
-+ ngx_stream_proxy_ctx_t *ctx;
-
- c = s->connection;
-
-@@ -706,6 +719,8 @@ ngx_stream_proxy_connect(ngx_stream_sess
-
- pscf = ngx_stream_get_module_srv_conf(s, ngx_stream_proxy_module);
-
-+ ctx = ngx_stream_get_module_ctx(s, ngx_stream_proxy_module);
-+
- u = s->upstream;
-
- u->connected = 0;
-@@ -774,7 +789,7 @@ ngx_stream_proxy_connect(ngx_stream_sess
- pc->read->handler = ngx_stream_proxy_connect_handler;
- pc->write->handler = ngx_stream_proxy_connect_handler;
-
-- ngx_add_timer(pc->write, pscf->connect_timeout);
-+ ngx_add_timer(pc->write, ctx->connect_timeout);
- }
-
-
-@@ -957,12 +957,14 @@ ngx_stream_proxy_init_upstream(ngx_stream_session_t *s)
- static ngx_int_t
- ngx_stream_proxy_send_proxy_protocol(ngx_stream_session_t *s)
- {
-- u_char *p;
-- ssize_t n, size;
-- ngx_connection_t *c, *pc;
-- ngx_stream_upstream_t *u;
-- ngx_stream_proxy_srv_conf_t *pscf;
-- u_char buf[NGX_PROXY_PROTOCOL_V1_MAX_HEADER];
-+ u_char *p;
-+ u_char buf[NGX_PROXY_PROTOCOL_V1_MAX_HEADER];
-+ ssize_t n, size;
-+ ngx_connection_t *c, *pc;
-+ ngx_stream_upstream_t *u;
-+ ngx_stream_proxy_ctx_t *ctx;
-+
-+ ctx = ngx_stream_get_module_ctx(s, ngx_stream_proxy_module);
-
- c = s->connection;
-
-@@ -976,9 +993,7 @@ ngx_stream_proxy_send_proxy_protocol(ngx
- return NGX_ERROR;
- }
-
-- pscf = ngx_stream_get_module_srv_conf(s, ngx_stream_proxy_module);
--
-- ngx_add_timer(pc->write, pscf->timeout);
-+ ngx_add_timer(pc->write, ctx->timeout);
-
- pc->write->handler = ngx_stream_proxy_connect_handler;
-
-@@ -1053,6 +1068,9 @@ ngx_stream_proxy_ssl_init_connection(ngx
- ngx_connection_t *pc;
- ngx_stream_upstream_t *u;
- ngx_stream_proxy_srv_conf_t *pscf;
-+ ngx_stream_proxy_ctx_t *ctx;
-+
-+ ctx = ngx_stream_get_module_ctx(s, ngx_stream_proxy_module);
-
- u = s->upstream;
-
-@@ -1099,7 +1117,7 @@ ngx_stream_proxy_ssl_init_connection(ngx
- if (rc == NGX_AGAIN) {
-
- if (!pc->write->timer_set) {
-- ngx_add_timer(pc->write, pscf->connect_timeout);
-+ ngx_add_timer(pc->write, ctx->connect_timeout);
- }
-
- pc->ssl->handler = ngx_stream_proxy_ssl_handshake;
-@@ -1408,6 +1426,7 @@ ngx_stream_proxy_process_connection(ngx_
- ngx_stream_session_t *s;
- ngx_stream_upstream_t *u;
- ngx_stream_proxy_srv_conf_t *pscf;
-+ ngx_stream_proxy_ctx_t *ctx;
-
- c = ev->data;
- s = c->data;
-@@ -1419,6 +1438,8 @@ ngx_stream_proxy_process_connection(ngx_
- return;
- }
-
-+ ctx = ngx_stream_get_module_ctx(s, ngx_stream_proxy_module);
-+
- c = s->connection;
- pc = u->peer.connection;
-
-@@ -1438,7 +1459,7 @@ ngx_stream_proxy_process_connection(ngx_
- }
-
- if (u->connected && !c->read->delayed && !pc->read->delayed) {
-- ngx_add_timer(c->write, pscf->timeout);
-+ ngx_add_timer(c->write, ctx->timeout);
- }
-
- return;
-@@ -1600,6 +1621,9 @@ ngx_stream_proxy_process(ngx_stream_sess
- ngx_log_handler_pt handler;
- ngx_stream_upstream_t *u;
- ngx_stream_proxy_srv_conf_t *pscf;
-+ ngx_stream_proxy_ctx_t *ctx;
-+
-+ ctx = ngx_stream_get_module_ctx(s, ngx_stream_proxy_module);
-
- u = s->upstream;
-
-@@ -1807,7 +1831,7 @@ ngx_stream_proxy_process(ngx_stream_sess
- }
-
- if (!c->read->delayed && !pc->read->delayed) {
-- ngx_add_timer(c->write, pscf->timeout);
-+ ngx_add_timer(c->write, ctx->timeout);
-
- } else if (c->write->timer_set) {
- ngx_del_timer(c->write);
diff --git a/images/nginx/rootfs/patches/07_nginx-1.27.1-daemon_destroy_pool.patch b/images/nginx/rootfs/patches/07_nginx-1.27.1-daemon_destroy_pool.patch
deleted file mode 100644
index 5690b88f0..000000000
--- a/images/nginx/rootfs/patches/07_nginx-1.27.1-daemon_destroy_pool.patch
+++ /dev/null
@@ -1,12 +0,0 @@
-diff --git a/src/os/unix/ngx_daemon.c b/src/os/unix/ngx_daemon.c
-index ab672110..f259af31 100644
---- a/src/os/unix/ngx_daemon.c
-+++ b/src/os/unix/ngx_daemon.c
-@@ -23,6 +23,8 @@ ngx_daemon(ngx_log_t *log)
- break;
-
- default:
-+ /* just to make it ASAN or Valgrind clean */
-+ ngx_destroy_pool(ngx_cycle->pool);
- exit(0);
- }
diff --git a/images/nginx/rootfs/patches/11_nginx-1.27.1-privileged_agent_process.patch b/images/nginx/rootfs/patches/11_nginx-1.27.1-privileged_agent_process.patch
deleted file mode 100644
index 164004eba..000000000
--- a/images/nginx/rootfs/patches/11_nginx-1.27.1-privileged_agent_process.patch
+++ /dev/null
@@ -1,203 +0,0 @@
-diff --git a/src/core/nginx.c b/src/core/nginx.c
-index 60f8fe7..4bd244b 100644
---- a/src/core/nginx.c
-+++ b/src/core/nginx.c
-@@ -981,6 +981,7 @@ ngx_core_module_create_conf(ngx_cycle_t *cycle)
-
- ccf->daemon = NGX_CONF_UNSET;
- ccf->master = NGX_CONF_UNSET;
-+ ccf->privileged_agent = NGX_CONF_UNSET;
- ccf->timer_resolution = NGX_CONF_UNSET_MSEC;
-
- ccf->worker_processes = NGX_CONF_UNSET;
-@@ -1009,6 +1010,7 @@ ngx_core_module_init_conf(ngx_cycle_t *cycle, void *conf)
-
- ngx_conf_init_value(ccf->daemon, 1);
- ngx_conf_init_value(ccf->master, 1);
-+ ngx_conf_init_value(ccf->privileged_agent, 0);
- ngx_conf_init_msec_value(ccf->timer_resolution, 0);
-
- ngx_conf_init_value(ccf->worker_processes, 1);
-diff --git a/src/core/ngx_cycle.h b/src/core/ngx_cycle.h
-index c51b7ff..3261f90 100644
---- a/src/core/ngx_cycle.h
-+++ b/src/core/ngx_cycle.h
-@@ -22,6 +22,9 @@
- #define NGX_DEBUG_POINTS_ABORT 2
-
-
-+#define HAVE_PRIVILEGED_PROCESS_PATCH 1
-+
-+
- typedef struct ngx_shm_zone_s ngx_shm_zone_t;
-
- typedef ngx_int_t (*ngx_shm_zone_init_pt) (ngx_shm_zone_t *zone, void *data);
-@@ -81,6 +84,7 @@ struct ngx_cycle_s {
- typedef struct {
- ngx_flag_t daemon;
- ngx_flag_t master;
-+ ngx_flag_t privileged_agent;
-
- ngx_msec_t timer_resolution;
-
-diff --git a/src/os/unix/ngx_process_cycle.c b/src/os/unix/ngx_process_cycle.c
-index 7cee1c5..c4f70d6 100644
---- a/src/os/unix/ngx_process_cycle.c
-+++ b/src/os/unix/ngx_process_cycle.c
-@@ -15,6 +15,8 @@ static void ngx_start_worker_processes(ngx_cycle_t *cycle, ngx_int_t n,
- ngx_int_t type);
- static void ngx_start_cache_manager_processes(ngx_cycle_t *cycle,
- ngx_uint_t respawn);
-+static void ngx_start_privileged_agent_processes(ngx_cycle_t *cycle,
-+ ngx_uint_t respawn);
- static void ngx_pass_open_channel(ngx_cycle_t *cycle);
- static void ngx_signal_worker_processes(ngx_cycle_t *cycle, int signo);
- static ngx_uint_t ngx_reap_children(ngx_cycle_t *cycle);
-@@ -24,6 +26,7 @@ static void ngx_worker_process_init(ngx_cycle_t *cycle, ngx_int_t worker);
- static void ngx_worker_process_exit(ngx_cycle_t *cycle);
- static void ngx_channel_handler(ngx_event_t *ev);
- static void ngx_cache_manager_process_cycle(ngx_cycle_t *cycle, void *data);
-+static void ngx_privileged_agent_process_cycle(ngx_cycle_t *cycle, void *data);
- static void ngx_cache_manager_process_handler(ngx_event_t *ev);
- static void ngx_cache_loader_process_handler(ngx_event_t *ev);
-
-@@ -51,6 +54,8 @@ sig_atomic_t ngx_noaccept;
- ngx_uint_t ngx_noaccepting;
- ngx_uint_t ngx_restart;
-
-+ngx_uint_t ngx_is_privileged_agent;
-+
-
- static u_char master_process[] = "master process";
-
-@@ -130,6 +135,7 @@ ngx_master_process_cycle(ngx_cycle_t *cycle)
- ngx_start_worker_processes(cycle, ccf->worker_processes,
- NGX_PROCESS_RESPAWN);
- ngx_start_cache_manager_processes(cycle, 0);
-+ ngx_start_privileged_agent_processes(cycle, 0);
-
- ngx_new_binary = 0;
- delay = 0;
-@@ -215,6 +221,7 @@ ngx_master_process_cycle(ngx_cycle_t *cycle)
- ngx_start_worker_processes(cycle, ccf->worker_processes,
- NGX_PROCESS_RESPAWN);
- ngx_start_cache_manager_processes(cycle, 0);
-+ ngx_start_privileged_agent_processes(cycle, 0);
- ngx_noaccepting = 0;
-
- continue;
-@@ -234,6 +241,7 @@ ngx_master_process_cycle(ngx_cycle_t *cycle)
- ngx_start_worker_processes(cycle, ccf->worker_processes,
- NGX_PROCESS_JUST_RESPAWN);
- ngx_start_cache_manager_processes(cycle, 1);
-+ ngx_start_privileged_agent_processes(cycle, 1);
-
- /* allow new processes to start */
- ngx_msleep(100);
-@@ -248,6 +256,7 @@ ngx_master_process_cycle(ngx_cycle_t *cycle)
- ngx_start_worker_processes(cycle, ccf->worker_processes,
- NGX_PROCESS_RESPAWN);
- ngx_start_cache_manager_processes(cycle, 0);
-+ ngx_start_privileged_agent_processes(cycle, 0);
- live = 1;
- }
-
-@@ -393,6 +431,26 @@ ngx_start_cache_manager_processes(ngx_cycle_t *cycle, ngx_uint_t respawn)
-
-
- static void
-+ngx_start_privileged_agent_processes(ngx_cycle_t *cycle, ngx_uint_t respawn)
-+{
-+ ngx_core_conf_t *ccf;
-+
-+ ccf = (ngx_core_conf_t *) ngx_get_conf(cycle->conf_ctx,
-+ ngx_core_module);
-+
-+ if (!ccf->privileged_agent) {
-+ return;
-+ }
-+
-+ ngx_spawn_process(cycle, ngx_privileged_agent_process_cycle,
-+ "privileged agent process", "privileged agent process",
-+ respawn ? NGX_PROCESS_JUST_RESPAWN : NGX_PROCESS_RESPAWN);
-+
-+ ngx_pass_open_channel(cycle);
-+}
-+
-+
-+static void
- ngx_pass_open_channel(ngx_cycle_t *cycle)
- {
- ngx_int_t i;
-@@ -794,7 +860,10 @@ ngx_worker_process_init(ngx_cycle_t *cycle, ngx_int_t worker)
- }
- }
-
-- if (geteuid() == 0) {
-+ /*
-+ * privileged agent process has the same permission as master process
-+ */
-+ if (!ngx_is_privileged_agent && geteuid() == 0) {
- if (setgid(ccf->group) == -1) {
- ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_errno,
- "setgid(%d) failed", ccf->group);
-@@ -1149,6 +1216,47 @@ ngx_cache_manager_process_cycle(ngx_cycle_t *cycle, void *data)
-
-
- static void
-+ngx_privileged_agent_process_cycle(ngx_cycle_t *cycle, void *data)
-+{
-+ char *name = data;
-+
-+ /*
-+ * Set correct process type since closing listening Unix domain socket
-+ * in a master process also removes the Unix domain socket file.
-+ */
-+ ngx_process = NGX_PROCESS_HELPER;
-+ ngx_is_privileged_agent = 1;
-+
-+ ngx_close_listening_sockets(cycle);
-+
-+ /* Set a moderate number of connections for a helper process. */
-+ cycle->connection_n = 512;
-+
-+ ngx_worker_process_init(cycle, -1);
-+
-+ ngx_use_accept_mutex = 0;
-+
-+ ngx_setproctitle(name);
-+
-+ for ( ;; ) {
-+
-+ if (ngx_terminate || ngx_quit) {
-+ ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "exiting");
-+ ngx_worker_process_exit(cycle);
-+ }
-+
-+ if (ngx_reopen) {
-+ ngx_reopen = 0;
-+ ngx_log_error(NGX_LOG_NOTICE, cycle->log, 0, "reopening logs");
-+ ngx_reopen_files(cycle, -1);
-+ }
-+
-+ ngx_process_events_and_timers(cycle);
-+ }
-+}
-+
-+
-+static void
- ngx_cache_manager_process_handler(ngx_event_t *ev)
- {
- time_t next, n;
-diff --git a/src/os/unix/ngx_process_cycle.h b/src/os/unix/ngx_process_cycle.h
-index 69495d5..5149396 100644
---- a/src/os/unix/ngx_process_cycle.h
-+++ b/src/os/unix/ngx_process_cycle.h
-@@ -45,6 +45,7 @@ extern ngx_pid_t ngx_new_binary;
- extern ngx_uint_t ngx_inherited;
- extern ngx_uint_t ngx_daemonized;
- extern ngx_uint_t ngx_exiting;
-+extern ngx_uint_t ngx_is_privileged_agent;
-
- extern sig_atomic_t ngx_reap;
- extern sig_atomic_t ngx_sigio;
diff --git a/images/nginx/rootfs/patches/12_nginx-1.27.1-privileged_agent_process_connections.patch b/images/nginx/rootfs/patches/12_nginx-1.27.1-privileged_agent_process_connections.patch
deleted file mode 100644
index 5c38929cf..000000000
--- a/images/nginx/rootfs/patches/12_nginx-1.27.1-privileged_agent_process_connections.patch
+++ /dev/null
@@ -1,73 +0,0 @@
-diff --git a/src/core/nginx.c b/src/core/nginx.c
-index 269ff84..48329bd 100644
---- a/src/core/nginx.c
-+++ b/src/core/nginx.c
-@@ -1062,6 +1062,7 @@ ngx_core_module_create_conf(ngx_cycle_t *cycle)
- ccf->daemon = NGX_CONF_UNSET;
- ccf->master = NGX_CONF_UNSET;
- ccf->privileged_agent = NGX_CONF_UNSET;
-+ ccf->privileged_agent_connections = NGX_CONF_UNSET_UINT;
- ccf->timer_resolution = NGX_CONF_UNSET_MSEC;
- ccf->shutdown_timeout = NGX_CONF_UNSET_MSEC;
-
-@@ -1092,6 +1093,7 @@ ngx_core_module_init_conf(ngx_cycle_t *cycle, void *conf)
- ngx_conf_init_value(ccf->daemon, 1);
- ngx_conf_init_value(ccf->master, 1);
- ngx_conf_init_value(ccf->privileged_agent, 0);
-+ ngx_conf_init_uint_value(ccf->privileged_agent_connections, 512);
- ngx_conf_init_msec_value(ccf->timer_resolution, 0);
- ngx_conf_init_msec_value(ccf->shutdown_timeout, 0);
-
-diff --git a/src/core/ngx_cycle.h b/src/core/ngx_cycle.h
-index 6a9583e..4469390 100644
---- a/src/core/ngx_cycle.h
-+++ b/src/core/ngx_cycle.h
-@@ -93,6 +93,7 @@ typedef struct {
- ngx_flag_t daemon;
- ngx_flag_t master;
- ngx_flag_t privileged_agent;
-+ ngx_uint_t privileged_agent_connections;
-
- ngx_msec_t timer_resolution;
- ngx_msec_t shutdown_timeout;
-diff --git a/src/os/unix/ngx_process_cycle.c b/src/os/unix/ngx_process_cycle.c
-index df25f9d..bd259c1 100644
---- a/src/os/unix/ngx_process_cycle.c
-+++ b/src/os/unix/ngx_process_cycle.c
-@@ -1179,6 +1179,7 @@ static void
- ngx_privileged_agent_process_cycle(ngx_cycle_t *cycle, void *data)
- {
- char *name = data;
-+ ngx_core_conf_t *ccf = (ngx_core_conf_t *) ngx_get_conf(cycle->conf_ctx, ngx_core_module);
-
- /*
- * Set correct process type since closing listening Unix domain socket
-@@ -1190,7 +1191,7 @@ ngx_privileged_agent_process_cycle(ngx_cycle_t *cycle, void *data)
- ngx_close_listening_sockets(cycle);
-
- /* Set a moderate number of connections for a helper process. */
-- cycle->connection_n = 512;
-+ cycle->connection_n = ccf->privileged_agent_connections;
-
- ngx_worker_process_init(cycle, -1);
-
-diff --git a/src/os/unix/ngx_process_cycle.c b/src/os/unix/ngx_process_cycle.c
-index df25f9d..bd259c1 100644
---- a/src/os/unix/ngx_process_cycle.c
-+++ b/src/os/unix/ngx_process_cycle.c
-@@ -442,6 +442,15 @@
- return;
- }
-
-+ /* 0 is an illegal value and may result in a core dump later */
-+ if (ccf->privileged_agent_connections == 0) {
-+ ngx_log_error(NGX_LOG_ALERT, cycle->log, 0,
-+ "%ui worker_connection is not enough, "
-+ "privileged agent process cannot be spawned",
-+ ccf->privileged_agent_connections);
-+ return;
-+ }
-+
- ngx_spawn_process(cycle, ngx_privileged_agent_process_cycle,
- "privileged agent process", "privileged agent process",
- respawn ? NGX_PROCESS_JUST_RESPAWN : NGX_PROCESS_RESPAWN);
diff --git a/images/nginx/rootfs/patches/13_nginx-1.27.1-privileged_agent_process_thread_pool.patch b/images/nginx/rootfs/patches/13_nginx-1.27.1-privileged_agent_process_thread_pool.patch
deleted file mode 100644
index 829f21460..000000000
--- a/images/nginx/rootfs/patches/13_nginx-1.27.1-privileged_agent_process_thread_pool.patch
+++ /dev/null
@@ -1,12 +0,0 @@
---- a/src/core/ngx_thread_pool.c
-+++ b/src/core/ngx_thread_pool.c
-@@ -587,7 +587,8 @@
- ngx_thread_pool_conf_t *tcf;
-
- if (ngx_process != NGX_PROCESS_WORKER
-- && ngx_process != NGX_PROCESS_SINGLE)
-+ && ngx_process != NGX_PROCESS_SINGLE
-+ && !ngx_is_privileged_agent)
- {
- return NGX_OK;
- }
diff --git a/images/nginx/rootfs/patches/15_nginx-1.27.1-intercept_error_log.patch b/images/nginx/rootfs/patches/15_nginx-1.27.1-intercept_error_log.patch
deleted file mode 100644
index 5de769517..000000000
--- a/images/nginx/rootfs/patches/15_nginx-1.27.1-intercept_error_log.patch
+++ /dev/null
@@ -1,60 +0,0 @@
-diff --git a/src/core/ngx_cycle.h b/src/core/ngx_cycle.h
-index c51b7ff..4c335b9 100644
---- a/src/core/ngx_cycle.h
-+++ b/src/core/ngx_cycle.h
-@@ -22,9 +22,14 @@
- #define NGX_DEBUG_POINTS_ABORT 2
-
-
-+#define HAVE_INTERCEPT_ERROR_LOG_PATCH
-+
-+
- typedef struct ngx_shm_zone_s ngx_shm_zone_t;
-
- typedef ngx_int_t (*ngx_shm_zone_init_pt) (ngx_shm_zone_t *zone, void *data);
-+typedef ngx_int_t (*ngx_log_intercept_pt) (ngx_log_t *log, ngx_uint_t level,
-+ u_char *buf, size_t len);
-
- struct ngx_shm_zone_s {
- void *data;
-@@ -75,6 +80,10 @@ struct ngx_cycle_s {
- ngx_str_t prefix;
- ngx_str_t lock_file;
- ngx_str_t hostname;
-+
-+ ngx_log_intercept_pt intercept_error_log_handler;
-+ void *intercept_error_log_data;
-+ unsigned entered_logger; /* :1 */
- };
-
-
-diff --git a/src/core/ngx_log.c b/src/core/ngx_log.c
-index 8e9408d..ed9b11b 100644
---- a/src/core/ngx_log.c
-+++ b/src/core/ngx_log.c
-@@ -112,6 +112,8 @@ ngx_log_error_core(ngx_uint_t level, ngx_log_t *log, ngx_err_t err,
- ngx_uint_t wrote_stderr, debug_connection;
- u_char errstr[NGX_MAX_ERROR_STR];
-
-+ ngx_log_intercept_pt log_intercept = NULL;
-+
- last = errstr + NGX_MAX_ERROR_STR;
-
- p = ngx_cpymem(errstr, ngx_cached_err_log_time.data,
-@@ -153,6 +155,16 @@ ngx_log_error_core(ngx_uint_t level, ngx_log_t *log, ngx_err_t err,
- p = last - NGX_LINEFEED_SIZE;
- }
-
-+ if (ngx_cycle) {
-+ log_intercept = ngx_cycle->intercept_error_log_handler;
-+ }
-+
-+ if (log_intercept && !ngx_cycle->entered_logger) {
-+ ngx_cycle->entered_logger = 1;
-+ log_intercept(log, level, errstr, p - errstr);
-+ ngx_cycle->entered_logger = 0;
-+ }
-+
- ngx_linefeed(p);
-
- wrote_stderr = 0;
diff --git a/images/nginx/rootfs/patches/17_nginx-1.27.1-no_error_pages.patch b/images/nginx/rootfs/patches/17_nginx-1.27.1-no_error_pages.patch
deleted file mode 100644
index 593fcefd6..000000000
--- a/images/nginx/rootfs/patches/17_nginx-1.27.1-no_error_pages.patch
+++ /dev/null
@@ -1,91 +0,0 @@
-diff -upr nginx-1.27.1/src/http/ngx_http_core_module.c nginx-1.27.1-patched/src/http/ngx_http_core_module.c
---- nginx-1.27.1/src/http/ngx_http_core_module.c 2017-08-31 18:14:41.000000000 -0700
-+++ nginx-1.27.1-patched/src/http/ngx_http_core_module.c 2017-08-31 18:21:31.638098196 -0700
-@@ -64,6 +64,8 @@ static char *ngx_http_core_directio(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
- static char *ngx_http_core_error_page(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
-+static char *ngx_http_core_no_error_pages(ngx_conf_t *cf, ngx_command_t *cmd,
-+ void *conf);
- static char *ngx_http_core_open_file_cache(ngx_conf_t *cf, ngx_command_t *cmd,
- void *conf);
- static char *ngx_http_core_error_log(ngx_conf_t *cf, ngx_command_t *cmd,
-@@ -671,6 +673,14 @@ static ngx_command_t ngx_http_core_commands[] = {
- 0,
- NULL },
-
-+ { ngx_string("no_error_pages"),
-+ NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LIF_CONF
-+ |NGX_CONF_NOARGS,
-+ ngx_http_core_no_error_pages,
-+ NGX_HTTP_LOC_CONF_OFFSET,
-+ 0,
-+ NULL },
-+
- { ngx_string("post_action"),
- NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LIF_CONF
- |NGX_CONF_TAKE1,
-@@ -3564,7 +3574,6 @@ ngx_http_core_create_loc_conf(ngx_conf_t *cf)
- * clcf->types = NULL;
- * clcf->default_type = { 0, NULL };
- * clcf->error_log = NULL;
-- * clcf->error_pages = NULL;
- * clcf->client_body_path = NULL;
- * clcf->regex = NULL;
- * clcf->exact_match = 0;
-@@ -3574,6 +3583,7 @@ ngx_http_core_create_loc_conf(ngx_conf_t *cf)
- * clcf->keepalive_disable = 0;
- */
-
-+ clcf->error_pages = NGX_CONF_UNSET_PTR;
- clcf->client_max_body_size = NGX_CONF_UNSET;
- clcf->client_body_buffer_size = NGX_CONF_UNSET_SIZE;
- clcf->client_body_timeout = NGX_CONF_UNSET_MSEC;
-@@ -3776,9 +3786,7 @@ ngx_http_core_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child)
- }
- }
-
-- if (conf->error_pages == NULL && prev->error_pages) {
-- conf->error_pages = prev->error_pages;
-- }
-+ ngx_conf_merge_ptr_value(conf->error_pages, prev->error_pages, NULL);
-
- ngx_conf_merge_str_value(conf->default_type,
- prev->default_type, "text/plain");
-@@ -4815,6 +4823,10 @@ ngx_http_core_error_page(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
- ngx_http_compile_complex_value_t ccv;
-
- if (clcf->error_pages == NULL) {
-+ return "conflicts with \"no_error_pages\"";
-+ }
-+
-+ if (clcf->error_pages == NGX_CONF_UNSET_PTR) {
- clcf->error_pages = ngx_array_create(cf->pool, 4,
- sizeof(ngx_http_err_page_t));
- if (clcf->error_pages == NULL) {
-@@ -4920,6 +4932,25 @@ ngx_http_core_error_page(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
- }
-
-
-+static char *
-+ngx_http_core_no_error_pages(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
-+{
-+ ngx_http_core_loc_conf_t *clcf = conf;
-+
-+ if (clcf->error_pages == NULL) {
-+ return "is duplicate";
-+ }
-+
-+ if (clcf->error_pages != NGX_CONF_UNSET_PTR) {
-+ return "conflicts with \"error_page\"";
-+ }
-+
-+ clcf->error_pages = NULL;
-+
-+ return NGX_CONF_OK;
-+}
-+
-+
- static char *
- ngx_http_core_open_file_cache(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
- {
diff --git a/images/nginx/rootfs/patches/18_nginx-1.27.1-no_Werror.patch b/images/nginx/rootfs/patches/18_nginx-1.27.1-no_Werror.patch
deleted file mode 100644
index d0aa7a31e..000000000
--- a/images/nginx/rootfs/patches/18_nginx-1.27.1-no_Werror.patch
+++ /dev/null
@@ -1,36 +0,0 @@
-diff -urp nginx-1.27.1/auto/cc/clang nginx-1.27.1-patched/auto/cc/clang
---- nginx-1.27.1/auto/cc/clang 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.27.1-patched/auto/cc/clang 2014-03-13 20:54:26.241413360 -0700
-@@ -89,7 +89,7 @@ CFLAGS="$CFLAGS -Wconditional-uninitiali
- CFLAGS="$CFLAGS -Wno-unused-parameter"
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
-diff -urp nginx-1.27.1/auto/cc/gcc nginx-1.27.1-patched/auto/cc/gcc
---- nginx-1.27.1/auto/cc/gcc 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.27.1-patched/auto/cc/gcc 2014-03-13 20:54:13.301355329 -0700
-@@ -168,7 +168,7 @@ esac
-
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
-diff -urp nginx-1.27.1/auto/cc/icc nginx-1.27.1-patched/auto/cc/icc
---- nginx-1.27.1/auto/cc/icc 2014-03-04 03:39:24.000000000 -0800
-+++ nginx-1.27.1-patched/auto/cc/icc 2014-03-13 20:54:13.301355329 -0700
-@@ -115,7 +115,7 @@ case "$NGX_ICC_VER" in
- esac
-
- # stop on warning
--CFLAGS="$CFLAGS -Werror"
-+#CFLAGS="$CFLAGS -Werror"
-
- # debug
- CFLAGS="$CFLAGS -g"
diff --git a/images/nginx/rootfs/patches/19_nginx-1.27.1-log_escape_non_ascii.patch b/images/nginx/rootfs/patches/19_nginx-1.27.1-log_escape_non_ascii.patch
deleted file mode 100644
index bea6e52ee..000000000
--- a/images/nginx/rootfs/patches/19_nginx-1.27.1-log_escape_non_ascii.patch
+++ /dev/null
@@ -1,117 +0,0 @@
-diff --git a/src/http/modules/ngx_http_log_module.c b/src/http/modules/ngx_http_log_module.c
-index 917ed55f..b769dfd3 100644
---- a/src/http/modules/ngx_http_log_module.c
-+++ b/src/http/modules/ngx_http_log_module.c
-@@ -79,6 +79,8 @@ typedef struct {
- time_t open_file_cache_valid;
- ngx_uint_t open_file_cache_min_uses;
-
-+ ngx_flag_t escape_non_ascii;
-+
- ngx_uint_t off; /* unsigned off:1 */
- } ngx_http_log_loc_conf_t;
-
-@@ -131,7 +133,8 @@ static size_t ngx_http_log_variable_getlen(ngx_http_request_t *r,
- uintptr_t data);
- static u_char *ngx_http_log_variable(ngx_http_request_t *r, u_char *buf,
- ngx_http_log_op_t *op);
--static uintptr_t ngx_http_log_escape(u_char *dst, u_char *src, size_t size);
-+static uintptr_t ngx_http_log_escape(ngx_http_log_loc_conf_t *lcf, u_char *dst,
-+ u_char *src, size_t size);
- static size_t ngx_http_log_json_variable_getlen(ngx_http_request_t *r,
- uintptr_t data);
- static u_char *ngx_http_log_json_variable(ngx_http_request_t *r, u_char *buf,
-@@ -177,6 +180,13 @@ static ngx_command_t ngx_http_log_commands[] = {
- 0,
- NULL },
-
-+ { ngx_string("log_escape_non_ascii"),
-+ NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG,
-+ ngx_conf_set_flag_slot,
-+ NGX_HTTP_LOC_CONF_OFFSET,
-+ offsetof(ngx_http_log_loc_conf_t, escape_non_ascii),
-+ NULL },
-+
- ngx_null_command
- };
-
-@@ -935,6 +945,7 @@ static size_t
- ngx_http_log_variable_getlen(ngx_http_request_t *r, uintptr_t data)
- {
- uintptr_t len;
-+ ngx_http_log_loc_conf_t *lcf;
- ngx_http_variable_value_t *value;
-
- value = ngx_http_get_indexed_variable(r, data);
-@@ -943,7 +954,9 @@ ngx_http_log_variable_getlen(ngx_http_request_t *r, uintptr_t data)
- return 1;
- }
-
-- len = ngx_http_log_escape(NULL, value->data, value->len);
-+ lcf = ngx_http_get_module_loc_conf(r, ngx_http_log_module);
-+
-+ len = ngx_http_log_escape(lcf, NULL, value->data, value->len);
-
- value->escape = len ? 1 : 0;
-
-@@ -954,6 +967,7 @@ ngx_http_log_variable_getlen(ngx_http_request_t *r, uintptr_t data)
- static u_char *
- ngx_http_log_variable(ngx_http_request_t *r, u_char *buf, ngx_http_log_op_t *op)
- {
-+ ngx_http_log_loc_conf_t *lcf;
- ngx_http_variable_value_t *value;
-
- value = ngx_http_get_indexed_variable(r, op->data);
-@@ -967,16 +981,18 @@ ngx_http_log_variable(ngx_http_request_t *r, u_char *buf, ngx_http_log_op_t *op)
- return ngx_cpymem(buf, value->data, value->len);
-
- } else {
-- return (u_char *) ngx_http_log_escape(buf, value->data, value->len);
-+ lcf = ngx_http_get_module_loc_conf(r, ngx_http_log_module);
-+ return (u_char *) ngx_http_log_escape(lcf, buf, value->data, value->len);
- }
- }
-
-
- static uintptr_t
--ngx_http_log_escape(u_char *dst, u_char *src, size_t size)
-+ngx_http_log_escape(ngx_http_log_loc_conf_t *lcf, u_char *dst, u_char *src,
-+ size_t size)
- {
-- ngx_uint_t n;
-- static u_char hex[] = "0123456789ABCDEF";
-+ ngx_uint_t n;
-+ static u_char hex[] = "0123456789ABCDEF";
-
- static uint32_t escape[] = {
- 0xffffffff, /* 1111 1111 1111 1111 1111 1111 1111 1111 */
-@@ -996,6 +1012,12 @@ ngx_http_log_escape(u_char *dst, u_char *src, size_t size)
- 0xffffffff, /* 1111 1111 1111 1111 1111 1111 1111 1111 */
- };
-
-+ if (lcf->escape_non_ascii) {
-+ ngx_memset(&escape[4], 0xff, sizeof(uint32_t) * 4);
-+
-+ } else {
-+ ngx_memzero(&escape[4], sizeof(uint32_t) * 4);
-+ }
-
- if (dst == NULL) {
-
-@@ -1120,6 +1142,7 @@ ngx_http_log_create_loc_conf(ngx_conf_t *cf)
- }
-
- conf->open_file_cache = NGX_CONF_UNSET_PTR;
-+ conf->escape_non_ascii = NGX_CONF_UNSET;
-
- return conf;
- }
-@@ -1135,6 +1158,8 @@ ngx_http_log_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child)
- ngx_http_log_fmt_t *fmt;
- ngx_http_log_main_conf_t *lmcf;
-
-+ ngx_conf_merge_value(conf->escape_non_ascii, prev->escape_non_ascii, 1);
-+
- if (conf->open_file_cache == NGX_CONF_UNSET_PTR) {
-
- conf->open_file_cache = prev->open_file_cache;
diff --git a/images/nginx/rootfs/patches/23_nginx-1.27.1-pcre_conf_opt.patch b/images/nginx/rootfs/patches/23_nginx-1.27.1-pcre_conf_opt.patch
deleted file mode 100644
index eb17e0642..000000000
--- a/images/nginx/rootfs/patches/23_nginx-1.27.1-pcre_conf_opt.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-# HG changeset patch
-# User Yichun Zhang
-# Date 1386694955 28800
-# Node ID 9ba6b149669f1f02eeb4cdc0ebd364a949b5c469
-# Parent 30e806b8636af5fd3f03ec17df24801f390f7511
-Configure: added new option --with-pcre-conf-opt=OPTIONS.
-
-diff -r 30e806b8636a -r 9ba6b149669f auto/options
---- a/auto/options Mon Dec 09 10:16:44 2013 +0400
-+++ b/auto/options Tue Dec 10 09:02:35 2013 -0800
-@@ -286,6 +286,7 @@
- --with-pcre) USE_PCRE=YES ;;
- --with-pcre=*) PCRE="$value" ;;
- --with-pcre-opt=*) PCRE_OPT="$value" ;;
-+ --with-pcre-conf-opt=*) PCRE_CONF_OPT="$value" ;;
- --with-pcre-jit) PCRE_JIT=YES ;;
-
- --with-openssl=*) OPENSSL="$value" ;;
-@@ -441,6 +442,7 @@
- --with-pcre force PCRE library usage
- --with-pcre=DIR set path to PCRE library sources
- --with-pcre-opt=OPTIONS set additional build options for PCRE
-+ --with-pcre-conf-opt=OPTIONS set additional configure options for PCRE
- --with-pcre-jit build PCRE with JIT compilation support
-
- --with-md5=DIR set path to md5 library sources
diff --git a/images/nginx/rootfs/patches/24_nginx-1.27.1-always_enable_cc_feature_tests.patch b/images/nginx/rootfs/patches/24_nginx-1.27.1-always_enable_cc_feature_tests.patch
deleted file mode 100644
index 9517e92c4..000000000
--- a/images/nginx/rootfs/patches/24_nginx-1.27.1-always_enable_cc_feature_tests.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- nginx-1.27.1/auto/cc/conf 2015-10-30 22:47:50.000000000 +0800
-+++ nginx-1.27.1-patched/auto/cc/conf 2015-11-02 12:23:05.385156987 +0800
-@@ -144,7 +144,7 @@ fi
- CFLAGS="$CFLAGS $NGX_CC_OPT"
- NGX_TEST_LD_OPT="$NGX_LD_OPT"
-
--if [ "$NGX_PLATFORM" != win32 ]; then
-+if [ 1 ]; then
-
- if test -n "$NGX_LD_OPT"; then
- ngx_feature=--with-ld-opt=\"$NGX_LD_OPT\"
diff --git a/images/nginx/rootfs/patches/27_nginx-1.27.1-ssl_client_hello_cb_yield.patch b/images/nginx/rootfs/patches/27_nginx-1.27.1-ssl_client_hello_cb_yield.patch
deleted file mode 100644
index 0e97be992..000000000
--- a/images/nginx/rootfs/patches/27_nginx-1.27.1-ssl_client_hello_cb_yield.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-diff --git a/src/event/ngx_event_openssl.c b/src/event/ngx_event_openssl.c
-index 8ba30e58..2b2db95c 100644
---- a/src/event/ngx_event_openssl.c
-+++ b/src/event/ngx_event_openssl.c
-@@ -1712,6 +1712,9 @@ ngx_ssl_handshake(ngx_connection_t *c)
- if (sslerr == SSL_ERROR_WANT_X509_LOOKUP
- # ifdef SSL_ERROR_PENDING_SESSION
- || sslerr == SSL_ERROR_PENDING_SESSION
-+# endif
-+# ifdef SSL_ERROR_WANT_CLIENT_HELLO_CB
-+ || sslerr == SSL_ERROR_WANT_CLIENT_HELLO_CB
- # endif
- )
- {
-@@ -1889,6 +1892,23 @@ ngx_ssl_try_early_data(ngx_connection_t *c)
- }
- #endif
-
-+#ifdef SSL_ERROR_WANT_CLIENT_HELLO_CB
-+ if (sslerr == SSL_ERROR_WANT_CLIENT_HELLO_CB) {
-+ c->read->handler = ngx_ssl_handshake_handler;
-+ c->write->handler = ngx_ssl_handshake_handler;
-+
-+ if (ngx_handle_read_event(c->read, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ if (ngx_handle_write_event(c->write, 0) != NGX_OK) {
-+ return NGX_ERROR;
-+ }
-+
-+ return NGX_AGAIN;
-+ }
-+#endif
-+
- err = (sslerr == SSL_ERROR_SYSCALL) ? ngx_errno : 0;
-
- c->ssl->no_wait_shutdown = 1;
diff --git a/images/nginx/rootfs/patches/29_nginx-1.27.1-safe_resolver_ipv6_option.patch b/images/nginx/rootfs/patches/29_nginx-1.27.1-safe_resolver_ipv6_option.patch
deleted file mode 100644
index 6c54c6c4c..000000000
--- a/images/nginx/rootfs/patches/29_nginx-1.27.1-safe_resolver_ipv6_option.patch
+++ /dev/null
@@ -1,60 +0,0 @@
-# HG changeset patch
-# User Thibault Charbonnier
-# Date 1481847421 28800
-# Thu Dec 15 16:17:01 2016 -0800
-# Node ID 8bf038fe006fd8ae253d6b41fc6cf109a8912d3e
-# Parent a3dc657f4e9530623683e6b85bd7492662e4dc47
-Resolver: ignore ipv6=off resolver option when no ipv6 support
-
-Makes the resolver directive more robust: we only error out when ipv6
-resolution is desired but not supported (ipv6=on).
-
-use case 1: some configurations are sometimes re-used between builds with and
-without ipv6 support. This patch avoids the need to remove the "ipv6=off" flag.
-
-use case 2: currently, some tools rely on the --with-ipv6 configure option from
-"nginx -V" to determine if ipv6 resolution should be disabled in some cases.
-With this option disappearing in Nginx 1.11.5, this patch would allow such tools
-to assume "ipv6=off" to be safe regardless of ipv6 support in the current
-build.
-
-diff --git a/src/core/ngx_resolver.c b/src/core/ngx_resolver.c
-index dade1846..5a3f0aa4 100644
---- a/src/core/ngx_resolver.c
-+++ b/src/core/ngx_resolver.c
-@@ -425,7 +425,6 @@ ngx_resolver_create(ngx_conf_t *cf, ngx_str_t *names, ngx_uint_t n)
- continue;
- }
-
--#if (NGX_HAVE_INET6)
- if (ngx_strncmp(names[i].data, "ipv4=", 5) == 0) {
-
- if (ngx_strcmp(&names[i].data[5], "on") == 0) {
-@@ -446,10 +445,19 @@ ngx_resolver_create(ngx_conf_t *cf, ngx_str_t *names, ngx_uint_t n)
- if (ngx_strncmp(names[i].data, "ipv6=", 5) == 0) {
-
- if (ngx_strcmp(&names[i].data[5], "on") == 0) {
-+#if (NGX_HAVE_INET6)
- r->ipv6 = 1;
-+#else
-+ ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-+ "no ipv6 support but \"%V\" in resolver",
-+ &names[i]);
-+ return NULL;
-+#endif
-
- } else if (ngx_strcmp(&names[i].data[5], "off") == 0) {
-+#if (NGX_HAVE_INET6)
- r->ipv6 = 0;
-+#endif
-
- } else {
- ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
-@@ -459,7 +467,6 @@ ngx_resolver_create(ngx_conf_t *cf, ngx_str_t *names, ngx_uint_t n)
-
- continue;
- }
--#endif
-
- #if !(NGX_WIN32)
- if (ngx_strncmp(names[i].data, "local=", 6) == 0) {
diff --git a/images/nginx/rootfs/patches/32_nginx-1.27.1-proc_exit_handler.patch b/images/nginx/rootfs/patches/32_nginx-1.27.1-proc_exit_handler.patch
deleted file mode 100644
index f050c09d8..000000000
--- a/images/nginx/rootfs/patches/32_nginx-1.27.1-proc_exit_handler.patch
+++ /dev/null
@@ -1,77 +0,0 @@
-diff --git a/src/core/ngx_cycle.c b/src/core/ngx_cycle.c
-index c4e3c50..fa1408b 100644
---- a/src/core/ngx_cycle.c
-+++ b/src/core/ngx_cycle.c
-@@ -264,6 +264,9 @@ ngx_init_cycle(ngx_cycle_t *old_cycle)
- }
-
-
-+#if !(NGX_WIN32)
-+ ngx_proc_exit_top_handler = ngx_proc_exit_def_handler;
-+#endif
- conf.ctx = cycle->conf_ctx;
- conf.cycle = cycle;
- conf.pool = pool;
-diff --git a/src/os/unix/ngx_process.c b/src/os/unix/ngx_process.c
-index 12a8c68..874c9bf 100644
---- a/src/os/unix/ngx_process.c
-+++ b/src/os/unix/ngx_process.c
-@@ -34,6 +34,7 @@ ngx_int_t ngx_process_slot;
- ngx_socket_t ngx_channel;
- ngx_int_t ngx_last_process;
- ngx_process_t ngx_processes[NGX_MAX_PROCESSES];
-+ngx_proc_exit_pt ngx_proc_exit_top_handler;
-
-
- ngx_signal_t signals[] = {
-@@ -83,6 +84,13 @@ ngx_signal_t signals[] = {
- };
-
-
-+void
-+ngx_proc_exit_def_handler(ngx_pid_t pid)
-+{
-+ /* do nothing */
-+}
-+
-+
- ngx_pid_t
- ngx_spawn_process(ngx_cycle_t *cycle, ngx_spawn_proc_pt proc, void *data,
- char *name, ngx_int_t respawn)
-@@ -564,6 +572,7 @@ ngx_process_get_status(void)
- }
-
- ngx_unlock_mutexes(pid);
-+ ngx_proc_exit_top_handler(pid);
- }
- }
-
-diff --git a/src/os/unix/ngx_process.h b/src/os/unix/ngx_process.h
-index 3986639..0b55d98 100644
---- a/src/os/unix/ngx_process.h
-+++ b/src/os/unix/ngx_process.h
-@@ -18,6 +18,8 @@ typedef pid_t ngx_pid_t;
- #define NGX_INVALID_PID -1
-
- typedef void (*ngx_spawn_proc_pt) (ngx_cycle_t *cycle, void *data);
-+#define NGX_HAVE_PROC_EXIT 1
-+typedef void (*ngx_proc_exit_pt)(ngx_pid_t pid);
-
- typedef struct {
- ngx_pid_t pid;
-@@ -66,6 +68,7 @@ ngx_pid_t ngx_spawn_process(ngx_cycle_t *cycle,
- ngx_pid_t ngx_execute(ngx_cycle_t *cycle, ngx_exec_ctx_t *ctx);
- ngx_int_t ngx_init_signals(ngx_log_t *log);
- void ngx_debug_point(void);
-+void ngx_proc_exit_def_handler(ngx_pid_t pid);
-
-
- #if (NGX_HAVE_SCHED_YIELD)
-@@ -85,6 +88,7 @@ extern ngx_socket_t ngx_channel;
- extern ngx_int_t ngx_process_slot;
- extern ngx_int_t ngx_last_process;
- extern ngx_process_t ngx_processes[NGX_MAX_PROCESSES];
-+extern ngx_proc_exit_pt ngx_proc_exit_top_handler;
-
-
- #endif /* _NGX_PROCESS_H_INCLUDED_ */
diff --git a/images/nginx/rootfs/patches/00_drop-alias-root.patch b/images/nginx/rootfs/patches/drop-alias-root.patch
similarity index 100%
rename from images/nginx/rootfs/patches/00_drop-alias-root.patch
rename to images/nginx/rootfs/patches/drop-alias-root.patch
diff --git a/images/nginx/rootfs/patches/09_nginx-1.27.1-balancer_status_code.patch b/images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch
similarity index 100%
rename from images/nginx/rootfs/patches/09_nginx-1.27.1-balancer_status_code.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-balancer_status_code.patch
diff --git a/images/nginx/rootfs/patches/21_nginx-1.27.1-cache_manager_exit.patch b/images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch
similarity index 100%
rename from images/nginx/rootfs/patches/21_nginx-1.27.1-cache_manager_exit.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-cache_manager_exit.patch
diff --git a/images/nginx/rootfs/patches/10_nginx-1.27.1-delayed_posted_events.patch b/images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch
similarity index 100%
rename from images/nginx/rootfs/patches/10_nginx-1.27.1-delayed_posted_events.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-delayed_posted_events.patch
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch b/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch
new file mode 100644
index 000000000..449d214ba
--- /dev/null
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-hash_overflow.patch
@@ -0,0 +1,20 @@
+# HG changeset patch
+# User Yichun Zhang
+# Date 1412276417 25200
+# Thu Oct 02 12:00:17 2014 -0700
+# Node ID 4032b992f23b054c1a2cfb0be879330d2c6708e5
+# Parent 1ff0f68d9376e3d184d65814a6372856bf65cfcd
+Hash: buffer overflow might happen when exceeding the pre-configured limits.
+
+diff -r 1ff0f68d9376 -r 4032b992f23b src/core/ngx_hash.c
+--- a/src/core/ngx_hash.c Tue Sep 30 15:50:28 2014 -0700
++++ b/src/core/ngx_hash.c Thu Oct 02 12:00:17 2014 -0700
+@@ -312,6 +312,8 @@ ngx_hash_init(ngx_hash_init_t *hinit, ng
+ continue;
+ }
+
++ size--;
++
+ ngx_log_error(NGX_LOG_WARN, hinit->pool->log, 0,
+ "could not build optimal %s, you should increase "
+ "either %s_max_size: %i or %s_bucket_size: %i; "
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch b/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch
new file mode 100644
index 000000000..3b9d57736
--- /dev/null
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-http2.patch
@@ -0,0 +1,57 @@
+#commit 6ceef192e7af1c507826ac38a2d43f08bf265fb9
+#repository: https://github.com/nginx/nginx
+#Author: Maxim Dounin
+#Date: Tue Oct 10 15:13:39 2023 +0300
+diff --git a/src/http/v2/ngx_http_v2.c b/src/http/v2/ngx_http_v2.c
+index 7c05ff1e7..410a8be24 100644
+--- a/src/http/v2/ngx_http_v2.c
++++ b/src/http/v2/ngx_http_v2.c
+@@ -347,6 +347,7 @@ ngx_http_v2_read_handler(ngx_event_t *rev)
+ ngx_log_debug0(NGX_LOG_DEBUG_HTTP, c->log, 0, "http2 read handler");
+
+ h2c->blocked = 1;
++ h2c->new_streams = 0;
+
+ if (c->close) {
+ c->close = 0;
+@@ -1284,6 +1285,14 @@ ngx_http_v2_state_headers(ngx_http_v2_connection_t *h2c, u_char *pos,
+ goto rst_stream;
+ }
+
++ if (h2c->new_streams++ >= 2 * h2scf->concurrent_streams) {
++ ngx_log_error(NGX_LOG_INFO, h2c->connection->log, 0,
++ "client sent too many streams at once");
++
++ status = NGX_HTTP_V2_REFUSED_STREAM;
++ goto rst_stream;
++ }
++
+ if (!h2c->settings_ack
+ && !(h2c->state.flags & NGX_HTTP_V2_END_STREAM_FLAG)
+ && h2scf->preread_size < NGX_HTTP_V2_DEFAULT_WINDOW)
+@@ -1349,6 +1358,12 @@ ngx_http_v2_state_headers(ngx_http_v2_connection_t *h2c, u_char *pos,
+
+ rst_stream:
+
++ if (h2c->refused_streams++ > ngx_max(h2scf->concurrent_streams, 100)) {
++ ngx_log_error(NGX_LOG_INFO, h2c->connection->log, 0,
++ "client sent too many refused streams");
++ return ngx_http_v2_connection_error(h2c, NGX_HTTP_V2_NO_ERROR);
++ }
++
+ if (ngx_http_v2_send_rst_stream(h2c, h2c->state.sid, status) != NGX_OK) {
+ return ngx_http_v2_connection_error(h2c, NGX_HTTP_V2_INTERNAL_ERROR);
+ }
+diff --git a/src/http/v2/ngx_http_v2.h b/src/http/v2/ngx_http_v2.h
+index cb9014ccf..6751b3026 100644
+--- a/src/http/v2/ngx_http_v2.h
++++ b/src/http/v2/ngx_http_v2.h
+@@ -131,6 +131,8 @@ struct ngx_http_v2_connection_s {
+ ngx_uint_t processing;
+ ngx_uint_t frames;
+ ngx_uint_t idle;
++ ngx_uint_t new_streams;
++ ngx_uint_t refused_streams;
+ ngx_uint_t priority_limit;
+
+ size_t send_window;
\ No newline at end of file
diff --git a/images/nginx/rootfs/patches/08_nginx-1.27.1-init_cycle_pool_release.patch b/images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
similarity index 65%
rename from images/nginx/rootfs/patches/08_nginx-1.27.1-init_cycle_pool_release.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
index 4a26b92c5..9cfa4f7cb 100644
--- a/images/nginx/rootfs/patches/08_nginx-1.27.1-init_cycle_pool_release.patch
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-init_cycle_pool_release.patch
@@ -1,6 +1,6 @@
-diff -rup nginx-1.27.1/src/core/nginx.c nginx-1.27.1-patched/src/core/nginx.c
---- nginx-1.27.1/src/core/nginx.c 2017-12-17 00:00:38.136470108 -0800
-+++ nginx-1.27.1-patched/src/core/nginx.c 2017-12-16 23:59:51.680958322 -0800
+diff -rup nginx-1.21.4/src/core/nginx.c nginx-1.21.4-patched/src/core/nginx.c
+--- nginx-1.21.4/src/core/nginx.c 2017-12-17 00:00:38.136470108 -0800
++++ nginx-1.21.4-patched/src/core/nginx.c 2017-12-16 23:59:51.680958322 -0800
@@ -186,6 +186,7 @@ static u_char *ngx_prefix;
static u_char *ngx_conf_file;
static u_char *ngx_conf_params;
@@ -18,9 +18,9 @@ diff -rup nginx-1.27.1/src/core/nginx.c nginx-1.27.1-patched/src/core/nginx.c
if (ngx_save_argv(&init_cycle, argc, argv) != NGX_OK) {
return 1;
}
-diff -rup nginx-1.27.1/src/core/ngx_core.h nginx-1.27.1-patched/src/core/ngx_core.h
---- nginx-1.27.1/src/core/ngx_core.h 2017-10-10 08:22:51.000000000 -0700
-+++ nginx-1.27.1-patched/src/core/ngx_core.h 2017-12-16 23:59:51.679958370 -0800
+diff -rup nginx-1.21.4/src/core/ngx_core.h nginx-1.21.4-patched/src/core/ngx_core.h
+--- nginx-1.21.4/src/core/ngx_core.h 2017-10-10 08:22:51.000000000 -0700
++++ nginx-1.21.4-patched/src/core/ngx_core.h 2017-12-16 23:59:51.679958370 -0800
@@ -108,4 +108,6 @@ void ngx_cpuinfo(void);
#define NGX_DISABLE_SYMLINKS_NOTOWNER 2
#endif
@@ -28,9 +28,9 @@ diff -rup nginx-1.27.1/src/core/ngx_core.h nginx-1.27.1-patched/src/core/ngx_cor
+extern ngx_pool_t *saved_init_cycle_pool;
+
#endif /* _NGX_CORE_H_INCLUDED_ */
-diff -rup nginx-1.27.1/src/core/ngx_cycle.c nginx-1.27.1-patched/src/core/ngx_cycle.c
---- nginx-1.27.1/src/core/ngx_cycle.c 2017-10-10 08:22:51.000000000 -0700
-+++ nginx-1.27.1-patched/src/core/ngx_cycle.c 2017-12-16 23:59:51.678958419 -0800
+diff -rup nginx-1.21.4/src/core/ngx_cycle.c nginx-1.21.4-patched/src/core/ngx_cycle.c
+--- nginx-1.21.4/src/core/ngx_cycle.c 2017-10-10 08:22:51.000000000 -0700
++++ nginx-1.21.4-patched/src/core/ngx_cycle.c 2017-12-16 23:59:51.678958419 -0800
@@ -748,6 +748,10 @@ old_shm_zone_done:
if (ngx_process == NGX_PROCESS_MASTER || ngx_is_init_cycle(old_cycle)) {
@@ -42,9 +42,9 @@ diff -rup nginx-1.27.1/src/core/ngx_cycle.c nginx-1.27.1-patched/src/core/ngx_cy
ngx_destroy_pool(old_cycle->pool);
cycle->old_cycle = NULL;
-diff -rup nginx-1.27.1/src/os/unix/ngx_process_cycle.c nginx-1.27.1-patched/src/os/unix/ngx_process_cycle.c
---- nginx-1.27.1/src/os/unix/ngx_process_cycle.c 2017-12-17 00:00:38.142469762 -0800
-+++ nginx-1.27.1-patched/src/os/unix/ngx_process_cycle.c 2017-12-16 23:59:51.691957791 -0800
+diff -rup nginx-1.21.4/src/os/unix/ngx_process_cycle.c nginx-1.21.4-patched/src/os/unix/ngx_process_cycle.c
+--- nginx-1.21.4/src/os/unix/ngx_process_cycle.c 2017-12-17 00:00:38.142469762 -0800
++++ nginx-1.21.4-patched/src/os/unix/ngx_process_cycle.c 2017-12-16 23:59:51.691957791 -0800
@@ -687,6 +692,11 @@ ngx_master_process_exit(ngx_cycle_t *cyc
ngx_exit_cycle.files_n = ngx_cycle->files_n;
ngx_cycle = &ngx_exit_cycle;
diff --git a/images/nginx/rootfs/patches/22_nginx-1.27.1-larger_max_error_str.patch b/images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
similarity index 62%
rename from images/nginx/rootfs/patches/22_nginx-1.27.1-larger_max_error_str.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
index b821297e6..c89032c9f 100644
--- a/images/nginx/rootfs/patches/22_nginx-1.27.1-larger_max_error_str.patch
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-larger_max_error_str.patch
@@ -1,5 +1,5 @@
---- nginx-1.27.1/src/core/ngx_log.h 2013-10-08 05:07:14.000000000 -0700
-+++ nginx-1.27.1-patched/src/core/ngx_log.h 2013-12-05 20:35:35.996236720 -0800
+--- nginx-1.21.4/src/core/ngx_log.h 2013-10-08 05:07:14.000000000 -0700
++++ nginx-1.21.4-patched/src/core/ngx_log.h 2013-12-05 20:35:35.996236720 -0800
@@ -64,7 +64,9 @@ struct ngx_log_s {
};
diff --git a/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch b/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch
new file mode 100644
index 000000000..f4d6fd0e5
--- /dev/null
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-no_Werror.patch
@@ -0,0 +1,36 @@
+diff -urp nginx-1.21.4/auto/cc/clang nginx-1.21.4-patched/auto/cc/clang
+--- nginx-1.21.4/auto/cc/clang 2014-03-04 03:39:24.000000000 -0800
++++ nginx-1.21.4-patched/auto/cc/clang 2014-03-13 20:54:26.241413360 -0700
+@@ -89,7 +89,7 @@ CFLAGS="$CFLAGS -Wconditional-uninitiali
+ CFLAGS="$CFLAGS -Wno-unused-parameter"
+
+ # stop on warning
+-CFLAGS="$CFLAGS -Werror"
++#CFLAGS="$CFLAGS -Werror"
+
+ # debug
+ CFLAGS="$CFLAGS -g"
+diff -urp nginx-1.21.4/auto/cc/gcc nginx-1.21.4-patched/auto/cc/gcc
+--- nginx-1.21.4/auto/cc/gcc 2014-03-04 03:39:24.000000000 -0800
++++ nginx-1.21.4-patched/auto/cc/gcc 2014-03-13 20:54:13.301355329 -0700
+@@ -168,7 +168,7 @@ esac
+
+
+ # stop on warning
+-CFLAGS="$CFLAGS -Werror"
++#CFLAGS="$CFLAGS -Werror"
+
+ # debug
+ CFLAGS="$CFLAGS -g"
+diff -urp nginx-1.21.4/auto/cc/icc nginx-1.21.4-patched/auto/cc/icc
+--- nginx-1.21.4/auto/cc/icc 2014-03-04 03:39:24.000000000 -0800
++++ nginx-1.21.4-patched/auto/cc/icc 2014-03-13 20:54:13.301355329 -0700
+@@ -115,7 +115,7 @@ case "$NGX_ICC_VER" in
+ esac
+
+ # stop on warning
+-CFLAGS="$CFLAGS -Werror"
++#CFLAGS="$CFLAGS -Werror"
+
+ # debug
+ CFLAGS="$CFLAGS -g"
diff --git a/images/nginx/rootfs/patches/20_nginx-1.27.1-proxy_host_port_vars.patch b/images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
similarity index 87%
rename from images/nginx/rootfs/patches/20_nginx-1.27.1-proxy_host_port_vars.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
index b81a299c8..01cebd65a 100644
--- a/images/nginx/rootfs/patches/20_nginx-1.27.1-proxy_host_port_vars.patch
+++ b/images/nginx/rootfs/patches/nginx-1.21.4-proxy_host_port_vars.patch
@@ -1,5 +1,5 @@
---- nginx-1.27.1/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
-+++ nginx-1.27.1-patched/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
+--- nginx-1.21.4/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
++++ nginx-1.21.4-patched/src/http/modules/ngx_http_proxy_module.c 2017-07-16 14:02:51.000000000 +0800
@@ -793,13 +793,13 @@ static ngx_keyval_t ngx_http_proxy_cach
static ngx_http_variable_t ngx_http_proxy_vars[] = {
diff --git a/images/nginx/rootfs/patches/06_nginx-1.27.1-resolver_conf_parsing.patch b/images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch
similarity index 100%
rename from images/nginx/rootfs/patches/06_nginx-1.27.1-resolver_conf_parsing.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-resolver_conf_parsing.patch
diff --git a/images/nginx/rootfs/patches/31_nginx-1.27.1-reuseport_close_unused_fds.patch b/images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch
similarity index 100%
rename from images/nginx/rootfs/patches/31_nginx-1.27.1-reuseport_close_unused_fds.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-reuseport_close_unused_fds.patch
diff --git a/images/nginx/rootfs/patches/14_nginx-1.27.1-single_process_graceful_exit.patch b/images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch
similarity index 100%
rename from images/nginx/rootfs/patches/14_nginx-1.27.1-single_process_graceful_exit.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-single_process_graceful_exit.patch
diff --git a/images/nginx/rootfs/patches/30_nginx-1.27.1-socket_cloexec.patch b/images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch
similarity index 100%
rename from images/nginx/rootfs/patches/30_nginx-1.27.1-socket_cloexec.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-socket_cloexec.patch
diff --git a/images/nginx/rootfs/patches/25_nginx-1.27.1-ssl_cert_cb_yield.patch b/images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch
similarity index 100%
rename from images/nginx/rootfs/patches/25_nginx-1.27.1-ssl_cert_cb_yield.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-ssl_cert_cb_yield.patch
diff --git a/images/nginx/rootfs/patches/26_nginx-1.27.1-ssl_sess_cb_yield.patch b/images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch
similarity index 100%
rename from images/nginx/rootfs/patches/26_nginx-1.27.1-ssl_sess_cb_yield.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-ssl_sess_cb_yield.patch
diff --git a/images/nginx/rootfs/patches/03_nginx-1.27.1-stream_proxy_get_next_upstream_tries.patch b/images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch
similarity index 100%
rename from images/nginx/rootfs/patches/03_nginx-1.27.1-stream_proxy_get_next_upstream_tries.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-stream_proxy_get_next_upstream_tries.patch
diff --git a/images/nginx/rootfs/patches/05_nginx-1.27.1-stream_ssl_preread_no_skip.patch b/images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch
similarity index 100%
rename from images/nginx/rootfs/patches/05_nginx-1.27.1-stream_ssl_preread_no_skip.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-stream_ssl_preread_no_skip.patch
diff --git a/images/nginx/rootfs/patches/16_nginx-1.27.1-upstream_pipelining.patch b/images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch
similarity index 100%
rename from images/nginx/rootfs/patches/16_nginx-1.27.1-upstream_pipelining.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-upstream_pipelining.patch
diff --git a/images/nginx/rootfs/patches/28_nginx-1.27.1-upstream_timeout_fields.patch b/images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch
similarity index 100%
rename from images/nginx/rootfs/patches/28_nginx-1.27.1-upstream_timeout_fields.patch
rename to images/nginx/rootfs/patches/nginx-1.21.4-upstream_timeout_fields.patch
diff --git a/images/opentelemetry/Makefile b/images/opentelemetry/Makefile
new file mode 100644
index 000000000..03d92a298
--- /dev/null
+++ b/images/opentelemetry/Makefile
@@ -0,0 +1,59 @@
+# Copyright 2021 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+.DEFAULT_GOAL:=build
+
+# set default shell
+SHELL=/bin/bash -o pipefail -o errexit
+
+DIR:=$(strip $(shell dirname $(realpath $(lastword $(MAKEFILE_LIST)))))
+INIT_BUILDX=$(DIR)/../../hack/init-buildx.sh
+
+# 0.0.0 shouldn't clobber any released builds
+SHORT_SHA ?=$(shell git rev-parse --short HEAD)
+TAG ?=v$(shell date +%Y%m%d)-$(SHORT_SHA)
+
+REGISTRY ?= gcr.io/k8s-staging-ingress-nginx
+
+IMAGE = $(REGISTRY)/opentelemetry
+
+# required to enable buildx
+export DOCKER_CLI_EXPERIMENTAL=enabled
+
+# build with buildx
+PLATFORMS?=linux/amd64,linux/arm,linux/arm64,linux/s390x
+OUTPUT=
+PROGRESS=plain
+build: ensure-buildx
+ docker buildx build \
+ --platform=${PLATFORMS} $(OUTPUT) \
+ --progress=$(PROGRESS) \
+ --pull \
+ --tag $(IMAGE):$(TAG) rootfs
+
+# push the cross built image
+push: OUTPUT=--push
+push: build
+
+# enable buildx
+ensure-buildx:
+# this is required for cloudbuild
+ifeq ("$(wildcard $(INIT_BUILDX))","")
+ @curl -sSL https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/hack/init-buildx.sh | bash
+else
+ @exec $(INIT_BUILDX)
+endif
+ @echo "done"
+
+.PHONY: build push ensure-buildx
diff --git a/images/opentelemetry/README.md b/images/opentelemetry/README.md
new file mode 100644
index 000000000..f5c3d90de
--- /dev/null
+++ b/images/opentelemetry/README.md
@@ -0,0 +1,5 @@
+# OpenTelemetry library builder
+
+**How to use this image:**
+This image only contains the necessary files in /usr/local and /etc/nginx/opentelemetry to
+be copied to Ingress Controller deployment when OpenTelemetry is enabled
diff --git a/images/opentelemetry/cloudbuild.yaml b/images/opentelemetry/cloudbuild.yaml
new file mode 100644
index 000000000..baf29a051
--- /dev/null
+++ b/images/opentelemetry/cloudbuild.yaml
@@ -0,0 +1,19 @@
+timeout: 10800s
+options:
+ substitution_option: ALLOW_LOOSE
+ # job builds a multi-arch docker image for amd64,arm,arm64 and s390x.
+ machineType: E2_HIGHCPU_32
+steps:
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
+ entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
+ args:
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/opentelemetry && make push
diff --git a/images/opentelemetry/rootfs/CMakeLists.txt b/images/opentelemetry/rootfs/CMakeLists.txt
new file mode 100644
index 000000000..2a816ebf7
--- /dev/null
+++ b/images/opentelemetry/rootfs/CMakeLists.txt
@@ -0,0 +1,102 @@
+#!/bin/bash
+
+# Copyright 2021 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+cmake_minimum_required(VERSION 3.11 FATAL_ERROR)
+
+project(
+ dependencies
+ LANGUAGES CXX
+ VERSION 0.0.1)
+
+set(CMAKE_CXX_STANDARD 17)
+set(CMAKE_CXX_EXTENSIONS OFF)
+set(CMAKE_CXX_STANDARD_REQUIRED ON)
+set(CMAKE_CXX_FLAGS "-O2")
+set(CMAKE_VERBOSE_MAKEFILE ON CACHE BOOL "ON" FORCE)
+
+set(CMAKE_BUILD_TYPE
+ Release
+ CACHE STRING "Build type" FORCE)
+
+include(GNUInstallDirs)
+
+set(CMAKE_ARCHIVE_OUTPUT_DIRECTORY
+ ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_LIBDIR})
+set(CMAKE_LIBRARY_OUTPUT_DIRECTORY
+ ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_LIBDIR})
+set(CMAKE_RUNTIME_OUTPUT_DIRECTORY
+ ${PROJECT_BINARY_DIR}/${CMAKE_INSTALL_BINDIR})
+
+set(INSTALL_LIBDIR
+ ${CMAKE_INSTALL_LIBDIR}
+ CACHE PATH "directory for libraries")
+set(INSTALL_BINDIR
+ ${CMAKE_INSTALL_BINDIR}
+ CACHE PATH "directory for executables")
+set(INSTALL_INCLUDEDIR
+ ${CMAKE_INSTALL_INCLUDEDIR}
+ CACHE PATH "directory for header files")
+
+set(DEF_INSTALL_CMAKEDIR share/cmake/${PROJECT_NAME})
+set(INSTALL_CMAKEDIR
+ ${DEF_INSTALL_CMAKEDIR}
+ CACHE PATH "directory for CMake files")
+
+set_property(DIRECTORY PROPERTY EP_BASE ${CMAKE_BINARY_DIR}/subs)
+
+set(STAGED_INSTALL_PREFIX ${CMAKE_BINARY_DIR}/stage)
+message(STATUS "${PROJECT_NAME} staged install: ${STAGED_INSTALL_PREFIX}")
+
+find_package(OpenSSL REQUIRED)
+message("OpenSSL include dir: ${OPENSSL_INCLUDE_DIR}")
+message("OpenSSL libraries: ${OPENSSL_LIBRARIES}")
+
+set(GRPC_GIT_TAG
+ "v1.45.2"
+ CACHE STRING "gRPC version")
+
+include(ExternalProject)
+ExternalProject_Add(
+ gRPC
+ GIT_REPOSITORY https://github.com/grpc/grpc.git
+ GIT_TAG ${GRPC_GIT_TAG}
+ GIT_SHALLOW 1
+ UPDATE_COMMAND ""
+ CMAKE_ARGS -DCMAKE_INSTALL_PREFIX=${STAGED_INSTALL_PREFIX}
+ -DCMAKE_BUILD_TYPE=${CMAKE_BUILD_TYPE}
+ -DCMAKE_CXX_COMPILER=${CMAKE_CXX_COMPILER}
+ -DgRPC_SSL_PROVIDER=package
+ -DOPENSSL_ROOT_DIR=OpenSSL
+ -DgRPC_BUILD_TESTS=OFF
+ -DBUILD_SHARED_LIBS=OFF
+ -DgRPC_INSTALL=ON
+ -DgRPC_BUILD_GRPC_NODE_PLUGIN=OFF
+ -DgRPC_BUILD_GRPC_OBJECTIVE_C_PLUGIN=OFF
+ -DgRPC_BUILD_GRPC_PHP_PLUGIN=OFF
+ -DgRPC_BUILD_GRPC_PYTHON_PLUGIN=OFF
+ -DgRPC_BUILD_GRPC_RUBY_PLUGIN=OFF
+ CMAKE_CACHE_ARGS -DCMAKE_CXX_FLAGS:STRING=${CMAKE_CXX_FLAGS}
+ TEST_AFTER_INSTALL FALSE
+ USES_TERMINAL_BUILD TRUE
+ DOWNLOAD_NO_PROGRESS TRUE
+ LOG_CONFIGURE TRUE
+ LOG_BUILD TRUE
+ LOG_INSTALL TRUE)
+
+install(
+ DIRECTORY ${STAGED_INSTALL_PREFIX}/
+ DESTINATION .
+ USE_SOURCE_PERMISSIONS)
diff --git a/images/opentelemetry/rootfs/Dockerfile b/images/opentelemetry/rootfs/Dockerfile
new file mode 100644
index 000000000..8c8cb1783
--- /dev/null
+++ b/images/opentelemetry/rootfs/Dockerfile
@@ -0,0 +1,61 @@
+# Copyright 2021 The Kubernetes Authors. All rights reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+
+FROM alpine:3.19.0 as base
+
+RUN mkdir -p /opt/third_party/install
+COPY . /opt/third_party/
+
+# install build tools
+RUN apk update \
+ && apk upgrade \
+ && apk add -U bash \
+ && bash /opt/third_party/build.sh -p
+
+ENV NINJA_STATUS "[%p/%f/%t] "
+
+# install gRPC
+FROM base as grpc
+RUN bash /opt/third_party/build.sh -g v1.57.0
+
+# install abseil-cpp
+FROM base as absl-cpp
+RUN bash /opt/third_party/build.sh -a 20230802.0
+
+# install OpenTelemetry-cpp
+FROM base as otel-cpp
+COPY --from=grpc /opt/third_party/install/ /usr
+COPY --from=absl-cpp /opt/third_party/install/ /usr
+RUN bash /opt/third_party/build.sh -o v1.11.0
+
+# install otel_ngx_module.so
+FROM base as nginx
+COPY --from=grpc /opt/third_party/install/ /usr
+COPY --from=otel-cpp /opt/third_party/install/ /usr
+RUN bash /opt/third_party/build.sh -n
+
+FROM cgr.dev/chainguard/go:latest as build-init
+
+WORKDIR /go/src/app
+COPY . .
+
+RUN go mod download
+RUN CGO_ENABLED=0 go build -o /go/bin/init_module
+
+FROM gcr.io/distroless/static-debian11 as final
+COPY --from=build-init /go/bin/init_module /
+COPY --from=nginx /etc/nginx/modules /etc/nginx/modules
+
+CMD ["/init_module"]
diff --git a/images/opentelemetry/rootfs/build.sh b/images/opentelemetry/rootfs/build.sh
new file mode 100755
index 000000000..ebf95e219
--- /dev/null
+++ b/images/opentelemetry/rootfs/build.sh
@@ -0,0 +1,210 @@
+#!/bin/bash
+
+# Copyright 2021 The Kubernetes Authors.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+set -o errexit
+set -o nounset
+set -o pipefail
+
+export GRPC_GIT_TAG=${GRPC_GIT_TAG:="v1.43.2"}
+# Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp/compare/v1.2.0...main
+export OPENTELEMETRY_CPP_VERSION=${OPENTELEMETRY_CPP_VERSION:="1.2.0"}
+export ABSL_CPP_VERSION=${ABSL_CPP_VERSION:="20230802.0"}
+export INSTAL_DIR=/opt/third_party/install
+# improve compilation times
+CORES=$(($(grep -c ^processor /proc/cpuinfo) - 1))
+
+rm -rf \
+ /var/cache/debconf/* \
+ /var/lib/apt/lists/* \
+ /var/log/* \
+ /tmp/* \
+ /var/tmp/*
+
+export BUILD_PATH=/tmp/build
+mkdir --verbose -p "$BUILD_PATH"
+
+Help()
+{
+ # Display Help
+ echo "Add description of the script functions here."
+ echo
+ echo "Syntax: scriptTemplate [-h|g|o|n|p|]"
+ echo "options:"
+ echo "h Print Help."
+ echo "g gRPC git tag"
+ echo "o OpenTelemetry git tag"
+ echo "n install nginx"
+ echo "p prepare"
+ echo
+}
+
+prepare()
+{
+ apk add \
+ linux-headers \
+ cmake \
+ ninja \
+ openssl \
+ curl-dev \
+ openssl-dev \
+ gtest-dev \
+ c-ares-dev \
+ pcre-dev \
+ curl \
+ git \
+ build-base
+}
+
+install_grpc()
+{
+ mkdir -p $BUILD_PATH/grpc
+ cd ${BUILD_PATH}/grpc
+ cmake -DCMAKE_INSTALL_PREFIX=${INSTAL_DIR} \
+ -G Ninja \
+ -DGRPC_GIT_TAG=${GRPC_GIT_TAG} /opt/third_party
+
+ cmake --build . -j ${CORES} --target all install --verbose
+}
+
+install_absl()
+{
+ cd ${BUILD_PATH}
+ export LD_LIBRARY_PATH="${LD_LIBRARY_PATH:+LD_LIBRARY_PATH:}${INSTAL_DIR}/lib:/usr/local"
+ export PATH="${PATH}:${INSTAL_DIR}/bin"
+ git clone --recurse-submodules -j ${CORES} --depth=1 -b \
+ ${ABSL_CPP_VERSION} https://github.com/abseil/abseil-cpp.git abseil-cpp-${ABSL_CPP_VERSION}
+ cd "abseil-cpp-${ABSL_CPP_VERSION}"
+ mkdir -p .build
+ cd .build
+
+ cmake -DCMAKE_BUILD_TYPE=Release \
+ -G Ninja \
+ -DCMAKE_CXX_STANDARD=17 \
+ -DCMAKE_POSITION_INDEPENDENT_CODE=TRUE \
+ -DBUILD_TESTING=OFF \
+ -DCMAKE_INSTALL_PREFIX=${INSTAL_DIR} \
+ -DABSL_PROPAGATE_CXX_STD=ON \
+ -DBUILD_SHARED_LIBS=OFF \
+ ..
+ cmake --build . -j ${CORES} --target install
+}
+
+install_otel()
+{
+ cd ${BUILD_PATH}
+ export LD_LIBRARY_PATH="${LD_LIBRARY_PATH:+LD_LIBRARY_PATH:}${INSTAL_DIR}/lib:/usr/local"
+ export PATH="${PATH}:${INSTAL_DIR}/bin"
+ git clone --recurse-submodules -j ${CORES} --depth=1 -b \
+ ${OPENTELEMETRY_CPP_VERSION} https://github.com/open-telemetry/opentelemetry-cpp.git opentelemetry-cpp-${OPENTELEMETRY_CPP_VERSION}
+ cd "opentelemetry-cpp-${OPENTELEMETRY_CPP_VERSION}"
+ mkdir -p .build
+ cd .build
+
+ cmake -DCMAKE_BUILD_TYPE=Release \
+ -G Ninja \
+ -DCMAKE_CXX_STANDARD=17 \
+ -DCMAKE_POSITION_INDEPENDENT_CODE=TRUE \
+ -DWITH_ZIPKIN=OFF \
+ -DCMAKE_INSTALL_PREFIX=${INSTAL_DIR} \
+ -DBUILD_TESTING=OFF \
+ -DWITH_BENCHMARK=OFF \
+ -DWITH_FUNC_TESTS=OFF \
+ -DBUILD_SHARED_LIBS=OFF \
+ -DWITH_OTLP_GRPC=ON \
+ -DWITH_OTLP_HTTP=OFF \
+ -DWITH_ABSEIL=ON \
+ -DWITH_EXAMPLES=OFF \
+ -DWITH_NO_DEPRECATED_CODE=ON \
+ ..
+ cmake --build . -j ${CORES} --target install
+}
+
+get_src()
+{
+ hash="$1"
+ url="$2"
+ f=$(basename "$url")
+
+ echo "Downloading $url"
+
+ curl -sSL --fail-with-body "$url" -o "$f"
+ echo "$hash $f" | sha256sum -c - || exit 10
+ tar xzf "$f"
+ rm -rf "$f"
+}
+
+install_nginx()
+{
+ export NGINX_VERSION=1.21.6
+
+ # Check for recent changes: https://github.com/open-telemetry/opentelemetry-cpp-contrib/compare/2656a4...main
+ export OPENTELEMETRY_CONTRIB_COMMIT=aaa51e2297bcb34297f3c7aa44fa790497d2f7f3
+
+ mkdir -p /etc/nginx
+ cd "$BUILD_PATH"
+
+ # TODO fix curl
+ # get_src 0528e793a97f942868616449d49326160f9cb67b2253fb2c4864603ac6ab09a9 \
+ # "https://github.com/open-telemetry/opentelemetry-cpp-contrib/archive/$OPENTELEMETRY_CONTRIB_COMMIT.tar.gz"
+
+ git clone https://github.com/open-telemetry/opentelemetry-cpp-contrib.git \
+ opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
+ cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}
+ git reset --hard ${OPENTELEMETRY_CONTRIB_COMMIT}
+ cd ${BUILD_PATH}/opentelemetry-cpp-contrib-${OPENTELEMETRY_CONTRIB_COMMIT}/instrumentation/nginx
+ mkdir -p build
+ cd build
+ cmake -DCMAKE_BUILD_TYPE=Release \
+ -G Ninja \
+ -DCMAKE_CXX_STANDARD=17 \
+ -DCMAKE_INSTALL_PREFIX=${INSTAL_DIR} \
+ -DBUILD_SHARED_LIBS=ON \
+ -DNGINX_VERSION=${NGINX_VERSION} \
+ ..
+ cmake --build . -j ${CORES} --target install
+
+ mkdir -p /etc/nginx/modules
+ cp ${INSTAL_DIR}/otel_ngx_module.so /etc/nginx/modules/otel_ngx_module.so
+}
+
+while getopts ":pha:g:o:n" option; do
+ case $option in
+ h) # display Help
+ Help
+ exit;;
+ g) # install gRPC with git tag
+ GRPC_GIT_TAG=${OPTARG}
+ install_grpc
+ exit;;
+ o) # install OpenTelemetry tag
+ OPENTELEMETRY_CPP_VERSION=${OPTARG}
+ install_otel
+ exit;;
+ p) # prepare
+ prepare
+ exit;;
+ n) # install nginx
+ install_nginx
+ exit;;
+ a) # install abseil
+ ABSL_CPP_VERSION=${OPTARG}
+ install_absl
+ exit;;
+ \?)
+ Help
+ exit;;
+ esac
+done
diff --git a/images/opentelemetry/rootfs/go.mod b/images/opentelemetry/rootfs/go.mod
new file mode 100644
index 000000000..f34dd98ff
--- /dev/null
+++ b/images/opentelemetry/rootfs/go.mod
@@ -0,0 +1,3 @@
+module init-otel
+
+go 1.21.5
diff --git a/images/opentelemetry/rootfs/init_module.go b/images/opentelemetry/rootfs/init_module.go
new file mode 100644
index 000000000..bebec728f
--- /dev/null
+++ b/images/opentelemetry/rootfs/init_module.go
@@ -0,0 +1,104 @@
+/*
+Copyright 2023 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package main
+
+import (
+ "fmt"
+ "io"
+ "os"
+ "path/filepath"
+)
+
+func main() {
+ // Enable error handling for all operations
+ err := run()
+ if err != nil {
+ fmt.Fprintf(os.Stderr, "Error: %v\n", err)
+ os.Exit(1)
+ }
+}
+
+func run() error {
+ // Create the target directory if it doesn't exist
+ targetDir := "/modules_mount/etc/nginx/modules/otel"
+ err := os.MkdirAll(targetDir, os.ModePerm)
+ if err != nil {
+ return fmt.Errorf("failed to create target directory: %w", err)
+ }
+
+ // Copy files from source directory to target directory
+ sourceDir := "/etc/nginx/modules/"
+ err = filepath.Walk(sourceDir, func(path string, info os.FileInfo, err error) error {
+ if err != nil {
+ return err
+ }
+
+ // Skip directories
+ if info.IsDir() {
+ return nil
+ }
+
+ // Calculate the destination path
+ relPath, err := filepath.Rel(sourceDir, path)
+ if err != nil {
+ return err
+ }
+ destPath := filepath.Join(targetDir, relPath)
+
+ // Create the destination directory if it doesn't exist
+ destDir := filepath.Dir(destPath)
+ err = os.MkdirAll(destDir, os.ModePerm)
+ if err != nil {
+ return err
+ }
+
+ // Copy the file
+ err = copyFile(path, destPath)
+ if err != nil {
+ return err
+ }
+
+ return nil
+ })
+
+ if err != nil {
+ return fmt.Errorf("failed to copy files: %w", err)
+ }
+
+ return nil
+}
+
+func copyFile(sourcePath, destPath string) error {
+ sourceFile, err := os.Open(sourcePath)
+ if err != nil {
+ return err
+ }
+ defer sourceFile.Close()
+
+ destFile, err := os.Create(destPath)
+ if err != nil {
+ return err
+ }
+ defer destFile.Close()
+
+ _, err = io.Copy(destFile, sourceFile)
+ if err != nil {
+ return err
+ }
+
+ return nil
+}
diff --git a/images/test-runner/Makefile b/images/test-runner/Makefile
index 8adbf0b41..d6b974ba9 100644
--- a/images/test-runner/Makefile
+++ b/images/test-runner/Makefile
@@ -27,11 +27,6 @@ IMAGE = $(REGISTRY)/e2e-test-runner
NGINX_BASE_IMAGE ?= $(shell cat $(DIR)/../../NGINX_BASE)
-# The env below is called GO_VERSION and not GOLANG_VERSION because
-# the gcb image we use to build already defines GOLANG_VERSION and is a
-# really old version
-GO_VERSION ?= $(shell cat $(DIR)/../../GOLANG_VERSION)
-
# required to enable buildx
export DOCKER_CLI_EXPERIMENTAL=enabled
@@ -48,18 +43,18 @@ image:
--pull \
--push \
--build-arg BASE_IMAGE=${NGINX_BASE_IMAGE} \
- --build-arg GOLANG_VERSION=${GO_VERSION} \
- --build-arg ETCD_VERSION=3.5.13-0 \
- --build-arg K8S_RELEASE=v1.32.2 \
+ --build-arg GOLANG_VERSION=1.21.5 \
+ --build-arg ETCD_VERSION=3.4.3-0 \
+ --build-arg K8S_RELEASE=v1.26.0 \
--build-arg RESTY_CLI_VERSION=0.27 \
--build-arg RESTY_CLI_SHA=e5f4f3128af49ba5c4d039d0554e5ae91bbe05866f60eccfa96d3653274bff90 \
--build-arg LUAROCKS_VERSION=3.8.0 \
--build-arg LUAROCKS_SHA=ab6612ca9ab87c6984871d2712d05525775e8b50172701a0a1cabddf76de2be7 \
--build-arg CHART_TESTING_VERSION=3.8.0 \
- --build-arg YAML_LINT_VERSION=1.33.0 \
+ --build-arg YAML_LINT_VERSION=1.27.1 \
--build-arg YAMALE_VERSION=4.0.4 \
- --build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.22.2 \
+ --build-arg HELM_VERSION=3.11.2 \
+ --build-arg GINKGO_VERSION=2.13.1 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
@@ -69,18 +64,18 @@ build: ensure-buildx
--progress=${PROGRESS} \
--pull \
--build-arg BASE_IMAGE=${NGINX_BASE_IMAGE} \
- --build-arg GOLANG_VERSION=${GO_VERSION} \
- --build-arg ETCD_VERSION=3.5.13-0 \
- --build-arg K8S_RELEASE=v1.32.2 \
+ --build-arg GOLANG_VERSION=1.21.5 \
+ --build-arg ETCD_VERSION=3.4.3-0 \
+ --build-arg K8S_RELEASE=v1.26.0 \
--build-arg RESTY_CLI_VERSION=0.27 \
--build-arg RESTY_CLI_SHA=e5f4f3128af49ba5c4d039d0554e5ae91bbe05866f60eccfa96d3653274bff90 \
--build-arg LUAROCKS_VERSION=3.8.0 \
--build-arg LUAROCKS_SHA=ab6612ca9ab87c6984871d2712d05525775e8b50172701a0a1cabddf76de2be7 \
--build-arg CHART_TESTING_VERSION=3.8.0 \
- --build-arg YAML_LINT_VERSION=1.33.0 \
+ --build-arg YAML_LINT_VERSION=1.27.1 \
--build-arg YAMALE_VERSION=4.0.4 \
- --build-arg HELM_VERSION=3.14.4 \
- --build-arg GINKGO_VERSION=2.22.2 \
+ --build-arg HELM_VERSION=3.11.2 \
+ --build-arg GINKGO_VERSION=2.13.1 \
--build-arg GOLINT_VERSION=latest \
-t ${IMAGE}:${TAG} rootfs
diff --git a/images/test-runner/TAG b/images/test-runner/TAG
deleted file mode 100644
index 46b105a30..000000000
--- a/images/test-runner/TAG
+++ /dev/null
@@ -1 +0,0 @@
-v2.0.0
diff --git a/images/test-runner/cloudbuild.yaml b/images/test-runner/cloudbuild.yaml
index 93dce3ec9..b17de9b31 100644
--- a/images/test-runner/cloudbuild.yaml
+++ b/images/test-runner/cloudbuild.yaml
@@ -1,11 +1,17 @@
+timeout: 3600s
options:
- # Ignore Prow provided substitutions.
substitution_option: ALLOW_LOOSE
steps:
- - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20250116-2a05ea7e3d
- env:
- - REGISTRY=us-central1-docker.pkg.dev/k8s-staging-images/ingress-nginx
+ - name: gcr.io/k8s-staging-test-infra/gcb-docker-gcloud:v20211118-2f2d816b90
entrypoint: bash
+ env:
+ - DOCKER_CLI_EXPERIMENTAL=enabled
+ - REGISTRY=gcr.io/k8s-staging-ingress-nginx
+ # default cloudbuild has HOME=/builder/home and docker buildx is in /root/.docker/cli-plugins/docker-buildx
+ # set the home to /root explicitly to if using docker buildx
+ - HOME=/root
args:
- - -c
- - gcloud auth configure-docker && cd images/test-runner && make push
+ - -c
+ - |
+ gcloud auth configure-docker \
+ && cd images/test-runner && make push
diff --git a/images/test-runner/rootfs/Dockerfile b/images/test-runner/rootfs/Dockerfile
index d871461bf..161b6caf4 100644
--- a/images/test-runner/rootfs/Dockerfile
+++ b/images/test-runner/rootfs/Dockerfile
@@ -15,7 +15,7 @@ ARG BASE_IMAGE
ARG GOLANG_VERSION
ARG ETCD_VERSION
-FROM golang:${GOLANG_VERSION}-alpine3.21 as GO
+FROM golang:${GOLANG_VERSION}-alpine3.18 as GO
FROM registry.k8s.io/etcd:${ETCD_VERSION} as etcd
FROM ${BASE_IMAGE}
@@ -48,7 +48,7 @@ RUN mkdir -p "$GOPATH/src" "$GOPATH/bin" && chmod -R 777 "$GOPATH"
COPY --from=etcd /usr/local/bin/etcd /usr/local/bin/etcd
-RUN echo "@testing https://dl-cdn.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
+RUN echo "@testing https://nl.alpinelinux.org/alpine/edge/testing" >> /etc/apk/repositories
RUN apk update && apk upgrade && apk add --no-cache \
bash \
@@ -66,8 +66,7 @@ RUN apk update && apk upgrade && apk add --no-cache \
openssl \
cfssl@testing \
tzdata \
- libc6-compat \
- sqlite-dev
+ libc6-compat
RUN go install -v github.com/onsi/ginkgo/v2/ginkgo@v${GINKGO_VERSION} \
&& go install golang.org/x/lint/golint@${GOLINT_VERSION}
@@ -121,21 +120,9 @@ RUN wget -qO /tmp/helm.tgz \
&& rm -rf /tmp/*
# Install a YAML Linter
-# Pip not working. Check PR https://github.com/kubernetes/ingress-nginx/pull/10874
-# RUN pip install --user "yamllint==$YAML_LINT_VERSION"
-RUN apk update -U \
- && apk add yamllint \
- && yamllint --version
+RUN pip install "yamllint==$YAML_LINT_VERSION"
# Install Yamale YAML schema validator
-# Commenting pip install yamale because broken cloudbuild https://github.com/kubernetes/ingress-nginx/pull/10885
-# RUN pip install --user "yamale==$YAMALE_VERSION"
-RUN wget https://github.com/23andMe/Yamale/archive/master.zip \
- && unzip -d /tmp master.zip \
- && cd /tmp/Yamale-master \
- && python setup.py install \
- && yamale -V
-
-LABEL org.opencontainers.image.source=https://github.com/kubernetes/ingress-nginx
+RUN pip install "yamale==$YAMALE_VERSION"
WORKDIR $GOPATH
diff --git a/ingress-nginx.yaml b/ingress-nginx.yaml
new file mode 100644
index 000000000..be66255e0
--- /dev/null
+++ b/ingress-nginx.yaml
@@ -0,0 +1,68 @@
+CURRENT_VERSION: "v1.5.1"
+GOLANG_VERSION: "1.19.2"
+GIT_TAG: "controller-v1.5.1"
+NGINX_BASE_IMAGE: "registry.k8s.io/ingress-nginx/nginx:0b5e0685112e4537ee20a0bdbba451e9f6158aa3@sha256:3f5e28bb248d5170e77b77fc2a1a385724aeff41a0b34b5afad7dd9cf93de000"
+NGINX_VERSION: "1.21.6"
+VERSION_TABLE:
+ - "v1.5.1":
+ - Alpine: "3.16.2"
+ - Kubernetes: ["1.25","1.24","1.23"]
+ - NGINX: "1.21.6"
+ - CONTROLLER_IMAGE: "registry.k8s.io/ingress-nginx/controller:v1.5.1@sha256:4ba73c697770664c1e00e9f968de14e08f606ff961c76e5d7033a4a9c593c629"
+ - CHROOT_CONTROLLER_IMAGE: "registry.k8s.io/ingress-nginx/controller-chroot:v1.5.1@sha256:c1c091b88a6c936a83bd7b098662760a87868d12452529bad0d178fb36147345"
+ - "v1.4.0":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.3.1":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.3.0":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.2.1":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.1.3":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.1.2":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.1.1":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.1.0":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.5":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.4":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.3":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.2":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.1":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
+ - "v1.0.0":
+ - Alpine: "3.16.2"
+ - Kubernetes: [ "1.24","1.23", "1.22", "1.21", "1.20" ]
+ - NGINX: "1.19.10"
diff --git a/internal/admission/controller/server.go b/internal/admission/controller/server.go
index 74f55fd01..7fc61bcbb 100644
--- a/internal/admission/controller/server.go
+++ b/internal/admission/controller/server.go
@@ -47,7 +47,7 @@ type AdmissionControllerServer struct {
AdmissionController AdmissionController
}
-// NewAdmissionControllerServer instantiates an admission controller server with
+// NewAdmissionControllerServer instanciates an admission controller server with
// a default codec
func NewAdmissionControllerServer(ac AdmissionController) *AdmissionControllerServer {
return &AdmissionControllerServer{
diff --git a/internal/ingress/annotations/annotations.go b/internal/ingress/annotations/annotations.go
index e10cc9be1..302f0b4b1 100644
--- a/internal/ingress/annotations/annotations.go
+++ b/internal/ingress/annotations/annotations.go
@@ -19,10 +19,18 @@ package annotations
import (
"dario.cat/mergo"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/canary"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/modsecurity"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/opentelemetry"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/proxyssl"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/sslcipher"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/streamsnippet"
+ "k8s.io/klog/v2"
+
apiv1 "k8s.io/api/core/v1"
networking "k8s.io/api/networking/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/klog/v2"
"k8s.io/ingress-nginx/internal/ingress/annotations/alias"
"k8s.io/ingress-nginx/internal/ingress/annotations/auth"
@@ -30,27 +38,22 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/authreqglobal"
"k8s.io/ingress-nginx/internal/ingress/annotations/authtls"
"k8s.io/ingress-nginx/internal/ingress/annotations/backendprotocol"
- "k8s.io/ingress-nginx/internal/ingress/annotations/canary"
"k8s.io/ingress-nginx/internal/ingress/annotations/clientbodybuffersize"
"k8s.io/ingress-nginx/internal/ingress/annotations/connection"
"k8s.io/ingress-nginx/internal/ingress/annotations/cors"
- "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/customhttperrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/defaultbackend"
- "k8s.io/ingress-nginx/internal/ingress/annotations/disableproxyintercepterrors"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/http2pushpreload"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipallowlist"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipdenylist"
"k8s.io/ingress-nginx/internal/ingress/annotations/loadbalancing"
"k8s.io/ingress-nginx/internal/ingress/annotations/log"
"k8s.io/ingress-nginx/internal/ingress/annotations/mirror"
- "k8s.io/ingress-nginx/internal/ingress/annotations/modsecurity"
- "k8s.io/ingress-nginx/internal/ingress/annotations/opentelemetry"
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
"k8s.io/ingress-nginx/internal/ingress/annotations/portinredirect"
"k8s.io/ingress-nginx/internal/ingress/annotations/proxy"
- "k8s.io/ingress-nginx/internal/ingress/annotations/proxyssl"
"k8s.io/ingress-nginx/internal/ingress/annotations/ratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/redirect"
"k8s.io/ingress-nginx/internal/ingress/annotations/rewrite"
@@ -59,9 +62,7 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/serviceupstream"
"k8s.io/ingress-nginx/internal/ingress/annotations/sessionaffinity"
"k8s.io/ingress-nginx/internal/ingress/annotations/snippet"
- "k8s.io/ingress-nginx/internal/ingress/annotations/sslcipher"
"k8s.io/ingress-nginx/internal/ingress/annotations/sslpassthrough"
- "k8s.io/ingress-nginx/internal/ingress/annotations/streamsnippet"
"k8s.io/ingress-nginx/internal/ingress/annotations/upstreamhashby"
"k8s.io/ingress-nginx/internal/ingress/annotations/upstreamvhost"
"k8s.io/ingress-nginx/internal/ingress/annotations/xforwardedprefix"
@@ -81,7 +82,6 @@ type Ingress struct {
Canary canary.Config
CertificateAuth authtls.Config
ClientBodyBufferSize string
- CustomHeaders customheaders.Config
ConfigurationSnippet string
Connection connection.Config
CorsConfig cors.Config
@@ -97,6 +97,7 @@ type Ingress struct {
Proxy proxy.Config
ProxySSL proxyssl.Config
RateLimit ratelimit.Config
+ GlobalRateLimit globalratelimit.Config
Redirect redirect.Config
Rewrite rewrite.Config
Satisfy string
@@ -123,55 +124,51 @@ type Extractor struct {
annotations map[string]parser.IngressAnnotation
}
-func NewAnnotationFactory(cfg resolver.Resolver) map[string]parser.IngressAnnotation {
- return map[string]parser.IngressAnnotation{
- "Aliases": alias.NewParser(cfg),
- "BasicDigestAuth": auth.NewParser(auth.AuthDirectory, cfg),
- "Canary": canary.NewParser(cfg),
- "CertificateAuth": authtls.NewParser(cfg),
- "ClientBodyBufferSize": clientbodybuffersize.NewParser(cfg),
- "CustomHeaders": customheaders.NewParser(cfg),
- "ConfigurationSnippet": snippet.NewParser(cfg),
- "Connection": connection.NewParser(cfg),
- "CorsConfig": cors.NewParser(cfg),
- "CustomHTTPErrors": customhttperrors.NewParser(cfg),
- "DisableProxyInterceptErrors": disableproxyintercepterrors.NewParser(cfg),
- "DefaultBackend": defaultbackend.NewParser(cfg),
- "FastCGI": fastcgi.NewParser(cfg),
- "ExternalAuth": authreq.NewParser(cfg),
- "EnableGlobalAuth": authreqglobal.NewParser(cfg),
- "HTTP2PushPreload": http2pushpreload.NewParser(cfg),
- "Opentelemetry": opentelemetry.NewParser(cfg),
- "Proxy": proxy.NewParser(cfg),
- "ProxySSL": proxyssl.NewParser(cfg),
- "RateLimit": ratelimit.NewParser(cfg),
- "Redirect": redirect.NewParser(cfg),
- "Rewrite": rewrite.NewParser(cfg),
- "Satisfy": satisfy.NewParser(cfg),
- "ServerSnippet": serversnippet.NewParser(cfg),
- "ServiceUpstream": serviceupstream.NewParser(cfg),
- "SessionAffinity": sessionaffinity.NewParser(cfg),
- "SSLPassthrough": sslpassthrough.NewParser(cfg),
- "UsePortInRedirects": portinredirect.NewParser(cfg),
- "UpstreamHashBy": upstreamhashby.NewParser(cfg),
- "LoadBalancing": loadbalancing.NewParser(cfg),
- "UpstreamVhost": upstreamvhost.NewParser(cfg),
- "Allowlist": ipallowlist.NewParser(cfg),
- "Denylist": ipdenylist.NewParser(cfg),
- "XForwardedPrefix": xforwardedprefix.NewParser(cfg),
- "SSLCipher": sslcipher.NewParser(cfg),
- "Logs": log.NewParser(cfg),
- "BackendProtocol": backendprotocol.NewParser(cfg),
- "ModSecurity": modsecurity.NewParser(cfg),
- "Mirror": mirror.NewParser(cfg),
- "StreamSnippet": streamsnippet.NewParser(cfg),
- }
-}
-
// NewAnnotationExtractor creates a new annotations extractor
func NewAnnotationExtractor(cfg resolver.Resolver) Extractor {
return Extractor{
- NewAnnotationFactory(cfg),
+ map[string]parser.IngressAnnotation{
+ "Aliases": alias.NewParser(cfg),
+ "BasicDigestAuth": auth.NewParser(auth.AuthDirectory, cfg),
+ "Canary": canary.NewParser(cfg),
+ "CertificateAuth": authtls.NewParser(cfg),
+ "ClientBodyBufferSize": clientbodybuffersize.NewParser(cfg),
+ "ConfigurationSnippet": snippet.NewParser(cfg),
+ "Connection": connection.NewParser(cfg),
+ "CorsConfig": cors.NewParser(cfg),
+ "CustomHTTPErrors": customhttperrors.NewParser(cfg),
+ "DisableProxyInterceptErrors": disableproxyintercepterrors.NewParser(cfg),
+ "DefaultBackend": defaultbackend.NewParser(cfg),
+ "FastCGI": fastcgi.NewParser(cfg),
+ "ExternalAuth": authreq.NewParser(cfg),
+ "EnableGlobalAuth": authreqglobal.NewParser(cfg),
+ "HTTP2PushPreload": http2pushpreload.NewParser(cfg),
+ "Opentelemetry": opentelemetry.NewParser(cfg),
+ "Proxy": proxy.NewParser(cfg),
+ "ProxySSL": proxyssl.NewParser(cfg),
+ "RateLimit": ratelimit.NewParser(cfg),
+ "GlobalRateLimit": globalratelimit.NewParser(cfg),
+ "Redirect": redirect.NewParser(cfg),
+ "Rewrite": rewrite.NewParser(cfg),
+ "Satisfy": satisfy.NewParser(cfg),
+ "ServerSnippet": serversnippet.NewParser(cfg),
+ "ServiceUpstream": serviceupstream.NewParser(cfg),
+ "SessionAffinity": sessionaffinity.NewParser(cfg),
+ "SSLPassthrough": sslpassthrough.NewParser(cfg),
+ "UsePortInRedirects": portinredirect.NewParser(cfg),
+ "UpstreamHashBy": upstreamhashby.NewParser(cfg),
+ "LoadBalancing": loadbalancing.NewParser(cfg),
+ "UpstreamVhost": upstreamvhost.NewParser(cfg),
+ "Allowlist": ipallowlist.NewParser(cfg),
+ "Denylist": ipdenylist.NewParser(cfg),
+ "XForwardedPrefix": xforwardedprefix.NewParser(cfg),
+ "SSLCipher": sslcipher.NewParser(cfg),
+ "Logs": log.NewParser(cfg),
+ "BackendProtocol": backendprotocol.NewParser(cfg),
+ "ModSecurity": modsecurity.NewParser(cfg),
+ "Mirror": mirror.NewParser(cfg),
+ "StreamSnippet": streamsnippet.NewParser(cfg),
+ },
}
}
diff --git a/internal/ingress/annotations/annotations_test.go b/internal/ingress/annotations/annotations_test.go
index 5df3cdc0e..0f4f8f7d7 100644
--- a/internal/ingress/annotations/annotations_test.go
+++ b/internal/ingress/annotations/annotations_test.go
@@ -43,20 +43,16 @@ var (
annotationAffinityCookieName = parser.GetAnnotationWithPrefix("session-cookie-name")
annotationUpstreamHashBy = parser.GetAnnotationWithPrefix("upstream-hash-by")
annotationCustomHTTPErrors = parser.GetAnnotationWithPrefix("custom-http-errors")
- annotationCustomHeaders = parser.GetAnnotationWithPrefix("custom-headers")
)
type mockCfg struct {
resolver.Mock
- MockSecrets map[string]*apiv1.Secret
- MockServices map[string]*apiv1.Service
- MockConfigMaps map[string]*apiv1.ConfigMap
+ MockSecrets map[string]*apiv1.Secret
+ MockServices map[string]*apiv1.Service
}
func (m mockCfg) GetDefaultBackend() defaults.Backend {
- return defaults.Backend{
- AllowedResponseHeaders: []string{"Content-Type"},
- }
+ return defaults.Backend{}
}
func (m mockCfg) GetSecret(name string) (*apiv1.Secret, error) {
@@ -67,10 +63,6 @@ func (m mockCfg) GetService(name string) (*apiv1.Service, error) {
return m.MockServices[name], nil
}
-func (m mockCfg) GetConfigMap(name string) (*apiv1.ConfigMap, error) {
- return m.MockConfigMaps[name], nil
-}
-
func (m mockCfg) GetAuthCertificate(name string) (*resolver.AuthSSLCert, error) {
secret, err := m.GetSecret(name)
if err != nil {
@@ -325,44 +317,3 @@ func TestCustomHTTPErrors(t *testing.T) {
}
}
}
-
-func TestCustomResponseHeaders(t *testing.T) {
- mockObj := mockCfg{}
- mockObj.MockConfigMaps = map[string]*apiv1.ConfigMap{}
- mockObj.MockConfigMaps["custom-headers"] = &apiv1.ConfigMap{Data: map[string]string{"Content-Type": "application/json"}}
- mockObj.MockConfigMaps["empty-custom-headers"] = &apiv1.ConfigMap{Data: map[string]string{}}
-
- ec := NewAnnotationExtractor(mockObj)
- ing := buildIngress()
- fooAnns := []struct {
- annotations map[string]string
- headers map[string]string
- }{
- {map[string]string{annotationCustomHeaders: "custom-headers"}, map[string]string{"Content-Type": "application/json"}},
- {map[string]string{annotationCustomHeaders: "empty-custom-headers"}, map[string]string{}},
- {nil, map[string]string{}},
- }
-
- for _, foo := range fooAnns {
- ing.SetAnnotations(foo.annotations)
- rann, err := ec.Extract(ing)
- if err != nil {
- t.Errorf("error should be null: %v", err)
- }
- r := rann.CustomHeaders.Headers
-
- // Check that expected headers were created
- for i := range foo.headers {
- if r[i] != foo.headers[i] {
- t.Errorf("Returned %v but expected %v", r, foo.headers)
- }
- }
-
- // Check that no unexpected headers were created
- for i := range r {
- if r[i] != foo.headers[i] {
- t.Errorf("Returned %v but expected %v", r, foo.headers)
- }
- }
- }
-}
diff --git a/internal/ingress/annotations/authreq/main.go b/internal/ingress/annotations/authreq/main.go
index ad38c36b1..c66b0ed47 100644
--- a/internal/ingress/annotations/authreq/main.go
+++ b/internal/ingress/annotations/authreq/main.go
@@ -416,7 +416,7 @@ func (a authReq) Parse(ing *networking.Ingress) (interface{}, error) {
harr := strings.Split(hstr, ",")
for _, header := range harr {
header = strings.TrimSpace(header)
- if header != "" {
+ if len(header) > 0 {
if !ValidHeader(header) {
return nil, ing_errors.NewLocationDenied("invalid headers list")
}
@@ -505,7 +505,7 @@ func ParseStringToCacheDurations(input string) ([]string, error) {
arr := strings.Split(input, ",")
for _, duration := range arr {
duration = strings.TrimSpace(duration)
- if duration != "" {
+ if len(duration) > 0 {
if !ValidCacheDuration(duration) {
authCacheDuration = []string{DefaultCacheDuration}
return authCacheDuration, ing_errors.NewLocationDenied(fmt.Sprintf("invalid cache duration: %s", duration))
diff --git a/internal/ingress/annotations/authtls/main.go b/internal/ingress/annotations/authtls/main.go
index de4d1cc1d..adedb084a 100644
--- a/internal/ingress/annotations/authtls/main.go
+++ b/internal/ingress/annotations/authtls/main.go
@@ -41,8 +41,10 @@ const (
)
var (
- authVerifyClientRegex = regexp.MustCompile(`^(on|off|optional|optional_no_ca)$`)
- redirectRegex = regexp.MustCompile(`^((https?://)?[A-Za-z0-9\-.]+(:\d+)?)?(/[A-Za-z0-9\-_.]+)*/?$`)
+ regexChars = regexp.QuoteMeta(`()|=`)
+ authVerifyClientRegex = regexp.MustCompile(`on|off|optional|optional_no_ca`)
+ commonNameRegex = regexp.MustCompile(`^CN=[/\-.\_\~a-zA-Z0-9` + regexChars + `]*$`)
+ redirectRegex = regexp.MustCompile(`^((https?://)?[A-Za-z0-9\-.]*(:\d+)?/[A-Za-z0-9\-.]*)?$`)
)
var authTLSAnnotations = parser.Annotation{
@@ -79,7 +81,7 @@ var authTLSAnnotations = parser.Annotation{
Documentation: `This annotation defines if the received certificates should be passed or not to the upstream server in the header "ssl-client-cert"`,
},
annotationAuthTLSMatchCN: {
- Validator: parser.CommonNameAnnotationValidator,
+ Validator: parser.ValidateRegex(commonNameRegex, true),
Scope: parser.AnnotationScopeLocation,
Risk: parser.AnnotationRiskHigh,
Documentation: `This annotation adds a sanity check for the CN of the client certificate that is sent over using a string / regex starting with "CN="`,
@@ -122,9 +124,6 @@ func (assl1 *Config) Equal(assl2 *Config) bool {
if assl1.PassCertToUpstream != assl2.PassCertToUpstream {
return false
}
- if assl1.MatchCN != assl2.MatchCN {
- return false
- }
return true
}
diff --git a/internal/ingress/annotations/authtls/main_test.go b/internal/ingress/annotations/authtls/main_test.go
index 37342e513..0dd442e4f 100644
--- a/internal/ingress/annotations/authtls/main_test.go
+++ b/internal/ingress/annotations/authtls/main_test.go
@@ -333,15 +333,6 @@ func TestEquals(t *testing.T) {
}
cfg2.PassCertToUpstream = true
- // Different MatchCN
- cfg1.MatchCN = "CN=(hello-app|goodbye)"
- cfg2.MatchCN = "CN=(hello-app)"
- result = cfg1.Equal(cfg2)
- if result != false {
- t.Errorf("Expected false")
- }
- cfg2.MatchCN = "CN=(hello-app|goodbye)"
-
// Equal Configs
result = cfg1.Equal(cfg2)
if result != true {
diff --git a/internal/ingress/annotations/canary/main.go b/internal/ingress/annotations/canary/main.go
index ccfe14261..be5761675 100644
--- a/internal/ingress/annotations/canary/main.go
+++ b/internal/ingress/annotations/canary/main.go
@@ -177,8 +177,8 @@ func (c canary) Parse(ing *networking.Ingress) (interface{}, error) {
config.Cookie = ""
}
- if !config.Enabled && (config.Weight > 0 || config.Header != "" || config.HeaderValue != "" || config.Cookie != "" ||
- config.HeaderPattern != "") {
+ if !config.Enabled && (config.Weight > 0 || len(config.Header) > 0 || len(config.HeaderValue) > 0 || len(config.Cookie) > 0 ||
+ len(config.HeaderPattern) > 0) {
return nil, errors.NewInvalidAnnotationConfiguration(canaryAnnotation, "configured but not enabled")
}
diff --git a/internal/ingress/annotations/cors/main.go b/internal/ingress/annotations/cors/main.go
index cef4fb1b2..d6e92b34d 100644
--- a/internal/ingress/annotations/cors/main.go
+++ b/internal/ingress/annotations/cors/main.go
@@ -40,12 +40,12 @@ var (
// that could cause the Response to contain some internal value/variable (like returning $pid, $upstream_addr, etc)
// Origin must contain a http/s Origin (including or not the port) or the value '*'
// This Regex is composed of the following:
- // * Sets a group that can be (https?://)?*?.something.com:port? OR null
+ // * Sets a group that can be (https?://)?*?.something.com:port?
// * Allows this to be repeated as much as possible, and separated by comma
// Otherwise it should be '*'
- corsOriginRegexValidator = regexp.MustCompile(`^((((([a-z]+://)?(\*\.)?[A-Za-z0-9\-.]*(:\d+)?,?)|null)+)|\*)?$`)
+ corsOriginRegexValidator = regexp.MustCompile(`^((((https?://)?(\*\.)?[A-Za-z0-9\-.]*(:\d+)?,?)+)|\*)?$`)
// corsOriginRegex defines the regex for validation inside Parse
- corsOriginRegex = regexp.MustCompile(`^([a-z]+://(\*\.)?[A-Za-z0-9\-.]*(:\d+)?|\*|null)?$`)
+ corsOriginRegex = regexp.MustCompile(`^(https?://(\*\.)?[A-Za-z0-9\-.]*(:\d+)?|\*)?$`)
// Method must contain valid methods list (PUT, GET, POST, BLA)
// May contain or not spaces between each verb
corsMethodsRegex = regexp.MustCompile(`^([A-Za-z]+,?\s?)+$`)
@@ -78,9 +78,8 @@ var corsAnnotation = parser.Annotation{
Scope: parser.AnnotationScopeIngress,
Risk: parser.AnnotationRiskMedium,
Documentation: `This annotation controls what's the accepted Origin for CORS.
- This is a multi-valued field, separated by ','. It must follow this format: protocol://origin-site.com, protocol://origin-site.com:port, null, or *.
- It also supports single level wildcard subdomains and follows this format: https://*.foo.bar, http://*.bar.foo:8080 or myprotocol://*.abc.bar.foo:9000
- Protocol can be any lowercase string, like http, https, or mycustomprotocol.`,
+ This is a multi-valued field, separated by ','. It must follow this format: http(s)://origin-site.com or http(s)://origin-site.com:port
+ It also supports single level wildcard subdomains and follows this format: http(s)://*.foo.bar, http(s)://*.bar.foo:8080 or http(s)://*.abc.bar.foo:9000`,
},
corsAllowHeadersAnnotation: {
Validator: parser.ValidateRegex(parser.HeadersVariable, true),
diff --git a/internal/ingress/annotations/cors/main_test.go b/internal/ingress/annotations/cors/main_test.go
index 0b6b3671b..a69390a17 100644
--- a/internal/ingress/annotations/cors/main_test.go
+++ b/internal/ingress/annotations/cors/main_test.go
@@ -27,8 +27,6 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
-const enableAnnotation = "true"
-
func buildIngress() *networking.Ingress {
defaultBackend := networking.IngressBackend{
Service: &networking.IngressServiceBackend{
@@ -78,11 +76,11 @@ func TestIngressCorsConfigValid(t *testing.T) {
data := map[string]string{}
// Valid
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
+ data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = "true"
data[parser.GetAnnotationWithPrefix(corsAllowHeadersAnnotation)] = "DNT,X-CustomHeader, Keep-Alive,User-Agent"
data[parser.GetAnnotationWithPrefix(corsAllowCredentialsAnnotation)] = "false"
data[parser.GetAnnotationWithPrefix(corsAllowMethodsAnnotation)] = "GET, PATCH"
- data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "null, https://origin123.test.com:4443"
+ data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "https://origin123.test.com:4443"
data[parser.GetAnnotationWithPrefix(corsExposeHeadersAnnotation)] = "*, X-CustomResponseHeader"
data[parser.GetAnnotationWithPrefix(corsMaxAgeAnnotation)] = "600"
ing.SetAnnotations(data)
@@ -113,7 +111,7 @@ func TestIngressCorsConfigValid(t *testing.T) {
t.Errorf("expected %v but returned %v", data[parser.GetAnnotationWithPrefix(corsAllowMethodsAnnotation)], nginxCors.CorsAllowMethods)
}
- if !reflect.DeepEqual(nginxCors.CorsAllowOrigin, []string{"null", "https://origin123.test.com:4443"}) {
+ if nginxCors.CorsAllowOrigin[0] != "https://origin123.test.com:4443" {
t.Errorf("expected %v but returned %v", data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)], nginxCors.CorsAllowOrigin)
}
@@ -176,11 +174,11 @@ func TestIngressCorsConfigInvalid(t *testing.T) {
}
}
-func TestIngressCorsConfigAllowOriginWithTrailingComma(t *testing.T) {
+func TestIngresCorsConfigAllowOriginWithTrailingComma(t *testing.T) {
ing := buildIngress()
data := map[string]string{}
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
+ data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = "true"
// Include a trailing comma and an empty value between the commas.
data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "https://origin123.test.com:4443, ,https://origin321.test.com:4443,"
@@ -205,63 +203,3 @@ func TestIngressCorsConfigAllowOriginWithTrailingComma(t *testing.T) {
t.Errorf("expected %v but returned %v", expectedCorsAllowOrigins, nginxCors.CorsAllowOrigin)
}
}
-
-func TestIngressCorsConfigAllowOriginNull(t *testing.T) {
- ing := buildIngress()
-
- data := map[string]string{}
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
-
- // Include a trailing comma and an empty value between the commas.
- data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "https://origin123.test.com:4443,null,https://origin321.test.com:4443"
- ing.SetAnnotations(data)
-
- corst, err := NewParser(&resolver.Mock{}).Parse(ing)
- if err != nil {
- t.Errorf("error parsing annotations: %v", err)
- }
-
- nginxCors, ok := corst.(*Config)
- if !ok {
- t.Errorf("expected a Config type but returned %t", corst)
- }
-
- if !nginxCors.CorsEnabled {
- t.Errorf("expected %v but returned %v", data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)], nginxCors.CorsEnabled)
- }
-
- expectedCorsAllowOrigins := []string{"https://origin123.test.com:4443", "null", "https://origin321.test.com:4443"}
- if !reflect.DeepEqual(nginxCors.CorsAllowOrigin, expectedCorsAllowOrigins) {
- t.Errorf("expected %v but returned %v", expectedCorsAllowOrigins, nginxCors.CorsAllowOrigin)
- }
-}
-
-func TestIngressCorsConfigAllowOriginWithNonHttpProtocol(t *testing.T) {
- ing := buildIngress()
-
- data := map[string]string{}
- data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)] = enableAnnotation
-
- // Include a trailing comma and an empty value between the commas.
- data[parser.GetAnnotationWithPrefix(corsAllowOriginAnnotation)] = "test://localhost"
- ing.SetAnnotations(data)
-
- corst, err := NewParser(&resolver.Mock{}).Parse(ing)
- if err != nil {
- t.Errorf("error parsing annotations: %v", err)
- }
-
- nginxCors, ok := corst.(*Config)
- if !ok {
- t.Errorf("expected a Config type but returned %t", corst)
- }
-
- if !nginxCors.CorsEnabled {
- t.Errorf("expected %v but returned %v", data[parser.GetAnnotationWithPrefix(corsEnableAnnotation)], nginxCors.CorsEnabled)
- }
-
- expectedCorsAllowOrigins := []string{"test://localhost"}
- if !reflect.DeepEqual(nginxCors.CorsAllowOrigin, expectedCorsAllowOrigins) {
- t.Errorf("expected %v but returned %v", expectedCorsAllowOrigins, nginxCors.CorsAllowOrigin)
- }
-}
diff --git a/internal/ingress/annotations/customheaders/main.go b/internal/ingress/annotations/customheaders/main.go
deleted file mode 100644
index d48018d8c..000000000
--- a/internal/ingress/annotations/customheaders/main.go
+++ /dev/null
@@ -1,137 +0,0 @@
-/*
-Copyright 2023 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package customheaders
-
-import (
- "fmt"
- "reflect"
- "regexp"
- "slices"
-
- "k8s.io/klog/v2"
-
- networking "k8s.io/api/networking/v1"
-
- "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
- ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
- "k8s.io/ingress-nginx/internal/ingress/resolver"
-)
-
-// Config returns the custom response headers for an Ingress rule
-type Config struct {
- Headers map[string]string `json:"headers,omitempty"`
-}
-
-// Equal tests for equality between two Config types
-func (c1 *Config) Equal(c2 *Config) bool {
- if c1 == c2 {
- return true
- }
- if c1 == nil || c2 == nil {
- return false
- }
-
- return reflect.DeepEqual(c1.Headers, c2.Headers)
-}
-
-var (
- headerRegexp = regexp.MustCompile(`^[a-zA-Z\d\-_]+$`)
- valueRegexp = regexp.MustCompile(`^[a-zA-Z\d_ :;.,\\/"'?!(){}\[\]@<>=\-+*#$&\x60|~^%]+$`)
-)
-
-// ValidHeader checks is the provided string satisfies the header's name regex
-func ValidHeader(header string) bool {
- return headerRegexp.MatchString(header)
-}
-
-// ValidValue checks is the provided string satisfies the value regex
-func ValidValue(header string) bool {
- return valueRegexp.MatchString(header)
-}
-
-const (
- customHeadersConfigMapAnnotation = "custom-headers"
-)
-
-var customHeadersAnnotation = parser.Annotation{
- Group: "backend",
- Annotations: parser.AnnotationFields{
- customHeadersConfigMapAnnotation: {
- Validator: parser.ValidateRegex(parser.BasicCharsRegex, true),
- Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskMedium,
- Documentation: `This annotation sets the name of a ConfigMap that specifies headers to pass to the client.
- Only ConfigMaps on the same namespace are allowed`,
- },
- },
-}
-
-type customHeaders struct {
- r resolver.Resolver
- annotationConfig parser.Annotation
-}
-
-// NewParser creates a new custom response headers annotation parser
-func NewParser(r resolver.Resolver) parser.IngressAnnotation {
- return customHeaders{r: r, annotationConfig: customHeadersAnnotation}
-}
-
-func (a customHeaders) GetDocumentation() parser.AnnotationFields {
- return a.annotationConfig.Annotations
-}
-
-// Parse parses the annotations contained in the ingress to use
-// custom response headers
-func (a customHeaders) Parse(ing *networking.Ingress) (interface{}, error) {
- clientHeadersConfigMapName, err := parser.GetStringAnnotation(customHeadersConfigMapAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil {
- klog.V(3).InfoS("client-headers annotation is undefined and will not be set")
- }
-
- var headers map[string]string
- defBackend := a.r.GetDefaultBackend()
-
- if clientHeadersConfigMapName != "" {
- clientHeadersMapContents, err := a.r.GetConfigMap(clientHeadersConfigMapName)
- if err != nil {
- return nil, ing_errors.NewLocationDenied(fmt.Sprintf("unable to find configMap %q", clientHeadersConfigMapName))
- }
-
- for header, value := range clientHeadersMapContents.Data {
- if !ValidHeader(header) {
- return nil, ing_errors.NewLocationDenied("invalid header name in configmap")
- }
- if !ValidValue(value) {
- return nil, ing_errors.NewLocationDenied("invalid header value in configmap")
- }
- if !slices.Contains(defBackend.AllowedResponseHeaders, header) {
- return nil, ing_errors.NewLocationDenied(fmt.Sprintf("header %s is not allowed, defined allowed headers inside global-allowed-response-headers %v", header, defBackend.AllowedResponseHeaders))
- }
- }
-
- headers = clientHeadersMapContents.Data
- }
-
- return &Config{
- Headers: headers,
- }, nil
-}
-
-func (a customHeaders) Validate(anns map[string]string) error {
- maxrisk := parser.StringRiskToRisk(a.r.GetSecurityConfiguration().AnnotationsRiskLevel)
- return parser.CheckAnnotationRisk(anns, maxrisk, customHeadersAnnotation.Annotations)
-}
diff --git a/internal/ingress/annotations/customheaders/main_test.go b/internal/ingress/annotations/customheaders/main_test.go
deleted file mode 100644
index 81c0b795a..000000000
--- a/internal/ingress/annotations/customheaders/main_test.go
+++ /dev/null
@@ -1,113 +0,0 @@
-/*
-Copyright 2023 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package customheaders
-
-import (
- "reflect"
- "testing"
-
- api "k8s.io/api/core/v1"
- networking "k8s.io/api/networking/v1"
- meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
- "k8s.io/ingress-nginx/internal/ingress/defaults"
- "k8s.io/ingress-nginx/internal/ingress/resolver"
-)
-
-func buildIngress() *networking.Ingress {
- return &networking.Ingress{
- ObjectMeta: meta_v1.ObjectMeta{
- Name: "foo",
- Namespace: api.NamespaceDefault,
- },
- Spec: networking.IngressSpec{
- DefaultBackend: &networking.IngressBackend{
- Service: &networking.IngressServiceBackend{
- Name: "default-backend",
- Port: networking.ServiceBackendPort{
- Number: 80,
- },
- },
- },
- },
- }
-}
-
-type mockBackend struct {
- resolver.Mock
-}
-
-// GetDefaultBackend returns the backend that must be used as default
-func (m mockBackend) GetDefaultBackend() defaults.Backend {
- return defaults.Backend{
- AllowedResponseHeaders: []string{"Content-Type", "Access-Control-Max-Age"},
- }
-}
-
-func TestCustomHeadersParseInvalidAnnotations(t *testing.T) {
- ing := buildIngress()
- configMapResolver := mockBackend{}
- configMapResolver.ConfigMaps = map[string]*api.ConfigMap{}
-
- _, err := NewParser(configMapResolver).Parse(ing)
- if err != nil {
- t.Errorf("expected error parsing ingress with custom-response-headers")
- }
-
- data := map[string]string{}
- data[parser.GetAnnotationWithPrefix("custom-headers")] = "custom-headers-configmap"
- ing.SetAnnotations(data)
- i, err := NewParser(&resolver.Mock{}).Parse(ing)
- if err == nil {
- t.Errorf("expected error parsing ingress with custom-response-headers")
- }
- if i != nil {
- t.Errorf("expected %v but got %v", nil, i)
- }
-}
-
-func TestCustomHeadersParseAnnotations(t *testing.T) {
- ing := buildIngress()
-
- data := map[string]string{}
- data[parser.GetAnnotationWithPrefix("custom-headers")] = "custom-headers-configmap"
- ing.SetAnnotations(data)
-
- configMapResolver := mockBackend{}
- configMapResolver.ConfigMaps = map[string]*api.ConfigMap{}
-
- configMapResolver.ConfigMaps["custom-headers-configmap"] = &api.ConfigMap{Data: map[string]string{"Content-Type": "application/json", "Access-Control-Max-Age": "600"}}
-
- i, err := NewParser(configMapResolver).Parse(ing)
- if err != nil {
- t.Errorf("unexpected error parsing ingress with custom-response-headers: %s", err)
- }
- val, ok := i.(*Config)
- if !ok {
- t.Errorf("expected a *Config type")
- }
-
- expectedResponseHeaders := map[string]string{}
- expectedResponseHeaders["Content-Type"] = "application/json"
- expectedResponseHeaders["Access-Control-Max-Age"] = "600"
-
- c := &Config{expectedResponseHeaders}
-
- if !reflect.DeepEqual(c, val) {
- t.Errorf("expected %v but got %v", c, val)
- }
-}
diff --git a/internal/ingress/annotations/globalratelimit/main.go b/internal/ingress/annotations/globalratelimit/main.go
new file mode 100644
index 000000000..0aec29f66
--- /dev/null
+++ b/internal/ingress/annotations/globalratelimit/main.go
@@ -0,0 +1,179 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package globalratelimit
+
+import (
+ "fmt"
+ "strings"
+ "time"
+
+ networking "k8s.io/api/networking/v1"
+ "k8s.io/klog/v2"
+
+ "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
+ ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
+ "k8s.io/ingress-nginx/internal/ingress/resolver"
+ "k8s.io/ingress-nginx/internal/net"
+ "k8s.io/ingress-nginx/pkg/util/sets"
+)
+
+const defaultKey = "$remote_addr"
+
+const (
+ globalRateLimitAnnotation = "global-rate-limit"
+ globalRateLimitWindowAnnotation = "global-rate-limit-window"
+ globalRateLimitKeyAnnotation = "global-rate-limit-key"
+ globalRateLimitIgnoredCidrsAnnotation = "global-rate-limit-ignored-cidrs"
+)
+
+var globalRateLimitAnnotationConfig = parser.Annotation{
+ Group: "ratelimit",
+ Annotations: parser.AnnotationFields{
+ globalRateLimitAnnotation: {
+ Validator: parser.ValidateInt,
+ Scope: parser.AnnotationScopeIngress,
+ Risk: parser.AnnotationRiskLow,
+ Documentation: `This annotation configures maximum allowed number of requests per window`,
+ },
+ globalRateLimitWindowAnnotation: {
+ Validator: parser.ValidateDuration,
+ Scope: parser.AnnotationScopeIngress,
+ Risk: parser.AnnotationRiskLow,
+ Documentation: `Configures a time window (i.e 1m) that the limit is applied`,
+ },
+ globalRateLimitKeyAnnotation: {
+ Validator: parser.ValidateRegex(parser.NGINXVariable, true),
+ Scope: parser.AnnotationScopeIngress,
+ Risk: parser.AnnotationRiskHigh,
+ Documentation: `This annotation Configures a key for counting the samples. Defaults to $remote_addr.
+ You can also combine multiple NGINX variables here, like ${remote_addr}-${http_x_api_client} which would mean the limit will be applied to
+ requests coming from the same API client (indicated by X-API-Client HTTP request header) with the same source IP address`,
+ },
+ globalRateLimitIgnoredCidrsAnnotation: {
+ Validator: parser.ValidateCIDRs,
+ Scope: parser.AnnotationScopeIngress,
+ Risk: parser.AnnotationRiskMedium,
+ Documentation: `This annotation defines a comma separated list of IPs and CIDRs to match client IP against.
+ When there's a match request is not considered for rate limiting.`,
+ },
+ },
+}
+
+// Config encapsulates all global rate limit attributes
+type Config struct {
+ Namespace string `json:"namespace"`
+ Limit int `json:"limit"`
+ WindowSize int `json:"window-size"`
+ Key string `json:"key"`
+ IgnoredCIDRs []string `json:"ignored-cidrs"`
+}
+
+// Equal tests for equality between two Config types
+func (l *Config) Equal(r *Config) bool {
+ if l.Namespace != r.Namespace {
+ return false
+ }
+ if l.Limit != r.Limit {
+ return false
+ }
+ if l.WindowSize != r.WindowSize {
+ return false
+ }
+ if l.Key != r.Key {
+ return false
+ }
+ if len(l.IgnoredCIDRs) != len(r.IgnoredCIDRs) || !sets.StringElementsMatch(l.IgnoredCIDRs, r.IgnoredCIDRs) {
+ return false
+ }
+
+ return true
+}
+
+type globalratelimit struct {
+ r resolver.Resolver
+ annotationConfig parser.Annotation
+}
+
+// NewParser creates a new globalratelimit annotation parser
+func NewParser(r resolver.Resolver) parser.IngressAnnotation {
+ return globalratelimit{
+ r: r,
+ annotationConfig: globalRateLimitAnnotationConfig,
+ }
+}
+
+// Parse extracts globalratelimit annotations from the given ingress
+// and returns them structured as Config type
+func (a globalratelimit) Parse(ing *networking.Ingress) (interface{}, error) {
+ config := &Config{}
+
+ limit, err := parser.GetIntAnnotation(globalRateLimitAnnotation, ing, a.annotationConfig.Annotations)
+ if err != nil && ing_errors.IsInvalidContent(err) {
+ return nil, err
+ }
+ rawWindowSize, err := parser.GetStringAnnotation(globalRateLimitWindowAnnotation, ing, a.annotationConfig.Annotations)
+ if err != nil && ing_errors.IsValidationError(err) {
+ return config, ing_errors.LocationDeniedError{
+ Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
+ }
+ }
+
+ if limit == 0 || rawWindowSize == "" {
+ return config, nil
+ }
+
+ windowSize, err := time.ParseDuration(rawWindowSize)
+ if err != nil {
+ return config, ing_errors.LocationDeniedError{
+ Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: %w", err),
+ }
+ }
+
+ key, err := parser.GetStringAnnotation(globalRateLimitKeyAnnotation, ing, a.annotationConfig.Annotations)
+ if err != nil {
+ klog.Warningf("invalid %s, defaulting to %s", globalRateLimitKeyAnnotation, defaultKey)
+ }
+ if key == "" {
+ key = defaultKey
+ }
+
+ rawIgnoredCIDRs, err := parser.GetStringAnnotation(globalRateLimitIgnoredCidrsAnnotation, ing, a.annotationConfig.Annotations)
+ if err != nil && ing_errors.IsInvalidContent(err) {
+ return nil, err
+ }
+ ignoredCIDRs, err := net.ParseCIDRs(rawIgnoredCIDRs)
+ if err != nil {
+ return nil, err
+ }
+
+ config.Namespace = strings.ReplaceAll(string(ing.UID), "-", "")
+ config.Limit = limit
+ config.WindowSize = int(windowSize.Seconds())
+ config.Key = key
+ config.IgnoredCIDRs = ignoredCIDRs
+
+ return config, nil
+}
+
+func (a globalratelimit) GetDocumentation() parser.AnnotationFields {
+ return a.annotationConfig.Annotations
+}
+
+func (a globalratelimit) Validate(anns map[string]string) error {
+ maxrisk := parser.StringRiskToRisk(a.r.GetSecurityConfiguration().AnnotationsRiskLevel)
+ return parser.CheckAnnotationRisk(anns, maxrisk, globalRateLimitAnnotationConfig.Annotations)
+}
diff --git a/internal/ingress/annotations/globalratelimit/main_test.go b/internal/ingress/annotations/globalratelimit/main_test.go
new file mode 100644
index 000000000..b1a7ab71b
--- /dev/null
+++ b/internal/ingress/annotations/globalratelimit/main_test.go
@@ -0,0 +1,211 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package globalratelimit
+
+import (
+ "encoding/json"
+ "fmt"
+ "testing"
+
+ api "k8s.io/api/core/v1"
+ networking "k8s.io/api/networking/v1"
+ meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+
+ "k8s.io/ingress-nginx/internal/ingress/annotations/parser"
+ ing_errors "k8s.io/ingress-nginx/internal/ingress/errors"
+ "k8s.io/ingress-nginx/internal/ingress/resolver"
+)
+
+const (
+ UID = "31285d47-b150-4dcf-bd6f-12c46d769f6e"
+ expectedUID = "31285d47b1504dcfbd6f12c46d769f6e"
+)
+
+func buildIngress() *networking.Ingress {
+ defaultBackend := networking.IngressBackend{
+ Service: &networking.IngressServiceBackend{
+ Name: "default-backend",
+ Port: networking.ServiceBackendPort{
+ Number: 80,
+ },
+ },
+ }
+
+ return &networking.Ingress{
+ ObjectMeta: meta_v1.ObjectMeta{
+ Name: "foo",
+ Namespace: api.NamespaceDefault,
+ UID: UID,
+ },
+ Spec: networking.IngressSpec{
+ DefaultBackend: &networking.IngressBackend{
+ Service: &networking.IngressServiceBackend{
+ Name: "default-backend",
+ Port: networking.ServiceBackendPort{
+ Number: 80,
+ },
+ },
+ },
+ Rules: []networking.IngressRule{
+ {
+ Host: "foo.bar.com",
+ IngressRuleValue: networking.IngressRuleValue{
+ HTTP: &networking.HTTPIngressRuleValue{
+ Paths: []networking.HTTPIngressPath{
+ {
+ Path: "/foo",
+ Backend: defaultBackend,
+ },
+ },
+ },
+ },
+ },
+ },
+ },
+ }
+}
+
+type mockBackend struct {
+ resolver.Mock
+}
+
+func TestGlobalRateLimiting(t *testing.T) {
+ ing := buildIngress()
+
+ annRateLimit := parser.GetAnnotationWithPrefix("global-rate-limit")
+ annRateLimitWindow := parser.GetAnnotationWithPrefix("global-rate-limit-window")
+ annRateLimitKey := parser.GetAnnotationWithPrefix("global-rate-limit-key")
+ annRateLimitIgnoredCIDRs := parser.GetAnnotationWithPrefix("global-rate-limit-ignored-cidrs")
+
+ testCases := []struct {
+ title string
+ annotations map[string]string
+ expectedConfig *Config
+ expectedErr error
+ }{
+ {
+ "no annotation",
+ nil,
+ &Config{},
+ nil,
+ },
+ {
+ "minimum required annotations",
+ map[string]string{
+ annRateLimit: "100",
+ annRateLimitWindow: "2m",
+ },
+ &Config{
+ Namespace: expectedUID,
+ Limit: 100,
+ WindowSize: 120,
+ Key: "$remote_addr",
+ IgnoredCIDRs: make([]string, 0),
+ },
+ nil,
+ },
+ {
+ "global-rate-limit-key annotation",
+ map[string]string{
+ annRateLimit: "100",
+ annRateLimitWindow: "2m",
+ annRateLimitKey: "$http_x_api_user",
+ },
+ &Config{
+ Namespace: expectedUID,
+ Limit: 100,
+ WindowSize: 120,
+ Key: "$http_x_api_user",
+ IgnoredCIDRs: make([]string, 0),
+ },
+ nil,
+ },
+ {
+ "global-rate-limit-ignored-cidrs annotation",
+ map[string]string{
+ annRateLimit: "100",
+ annRateLimitWindow: "2m",
+ annRateLimitKey: "$http_x_api_user",
+ annRateLimitIgnoredCIDRs: "127.0.0.1, 200.200.24.0/24",
+ },
+ &Config{
+ Namespace: expectedUID,
+ Limit: 100,
+ WindowSize: 120,
+ Key: "$http_x_api_user",
+ IgnoredCIDRs: []string{"127.0.0.1", "200.200.24.0/24"},
+ },
+ nil,
+ },
+ {
+ "global-rate-limit-complex-key",
+ map[string]string{
+ annRateLimit: "100",
+ annRateLimitWindow: "2m",
+ annRateLimitKey: "${http_x_api_user}${otherinfo}",
+ },
+ &Config{
+ Namespace: expectedUID,
+ Limit: 100,
+ WindowSize: 120,
+ Key: "${http_x_api_user}${otherinfo}",
+ IgnoredCIDRs: make([]string, 0),
+ },
+ nil,
+ },
+ {
+ "incorrect duration for window",
+ map[string]string{
+ annRateLimit: "100",
+ annRateLimitWindow: "2mb",
+ annRateLimitKey: "$http_x_api_user",
+ },
+ &Config{},
+ ing_errors.ValidationError{
+ Reason: fmt.Errorf("failed to parse 'global-rate-limit-window' value: annotation nginx.ingress.kubernetes.io/global-rate-limit-window contains invalid value"),
+ },
+ },
+ }
+
+ for _, testCase := range testCases {
+ ing.SetAnnotations(testCase.annotations)
+
+ i, actualErr := NewParser(mockBackend{}).Parse(ing)
+ if (testCase.expectedErr == nil || actualErr == nil) && testCase.expectedErr != actualErr {
+ t.Errorf("%s expected error '%v' but got '%v'", testCase.title, testCase.expectedErr, actualErr)
+ } else if testCase.expectedErr != nil && actualErr != nil &&
+ testCase.expectedErr.Error() != actualErr.Error() {
+ t.Errorf("expected error '%v' but got '%v'", testCase.expectedErr, actualErr)
+ }
+
+ actualConfig, ok := i.(*Config)
+ if !ok {
+ t.Errorf("expected Config type but got %T", i)
+ }
+ if !testCase.expectedConfig.Equal(actualConfig) {
+ expectedJSON, err := json.Marshal(testCase.expectedConfig)
+ if err != nil {
+ t.Errorf("failed to marshal expected config: %v", err)
+ }
+ actualJSON, err := json.Marshal(actualConfig)
+ if err != nil {
+ t.Errorf("failed to marshal actual config: %v", err)
+ }
+ t.Errorf("%v: expected config '%s' but got '%s'", testCase.title, expectedJSON, actualJSON)
+ }
+ }
+}
diff --git a/internal/ingress/annotations/loadbalancing/main.go b/internal/ingress/annotations/loadbalancing/main.go
index 0e5ca8bd8..ee89d2c1b 100644
--- a/internal/ingress/annotations/loadbalancing/main.go
+++ b/internal/ingress/annotations/loadbalancing/main.go
@@ -23,22 +23,22 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
-// LB Algorithms are defined in https://github.com/kubernetes/ingress-nginx/blob/d3e75b056f77be54e01bdb18675f1bb46caece31/rootfs/etc/nginx/lua/balancer.lua#L28
+// LB Alghorithms are defined in https://github.com/kubernetes/ingress-nginx/blob/d3e75b056f77be54e01bdb18675f1bb46caece31/rootfs/etc/nginx/lua/balancer.lua#L28
const (
- loadBalanceAlgorithmAnnotation = "load-balance"
+ loadBalanceAlghoritmAnnotation = "load-balance"
)
-var loadBalanceAlgorithms = []string{"round_robin", "chash", "chashsubset", "sticky_balanced", "sticky_persistent", "ewma"}
+var loadBalanceAlghoritms = []string{"round_robin", "chash", "chashsubset", "sticky_balanced", "sticky_persistent", "ewma"}
var loadBalanceAnnotations = parser.Annotation{
Group: "backend",
Annotations: parser.AnnotationFields{
- loadBalanceAlgorithmAnnotation: {
- Validator: parser.ValidateOptions(loadBalanceAlgorithms, true, true),
+ loadBalanceAlghoritmAnnotation: {
+ Validator: parser.ValidateOptions(loadBalanceAlghoritms, true, true),
Scope: parser.AnnotationScopeLocation,
Risk: parser.AnnotationRiskLow,
- Documentation: `This annotation allows setting the load balancing algorithm that should be used. If none is specified, defaults to
+ Documentation: `This annotation allows setting the load balancing alghorithm that should be used. If none is specified, defaults to
the default configured by Ingress admin, otherwise to round_robin`,
},
},
@@ -61,7 +61,7 @@ func NewParser(r resolver.Resolver) parser.IngressAnnotation {
// used to indicate if the location/s contains a fragment of
// configuration to be included inside the paths of the rules
func (a loadbalancing) Parse(ing *networking.Ingress) (interface{}, error) {
- return parser.GetStringAnnotation(loadBalanceAlgorithmAnnotation, ing, a.annotationConfig.Annotations)
+ return parser.GetStringAnnotation(loadBalanceAlghoritmAnnotation, ing, a.annotationConfig.Annotations)
}
func (a loadbalancing) GetDocumentation() parser.AnnotationFields {
diff --git a/internal/ingress/annotations/mirror/main_test.go b/internal/ingress/annotations/mirror/main_test.go
index 805f1ef6d..1f6b44d61 100644
--- a/internal/ingress/annotations/mirror/main_test.go
+++ b/internal/ingress/annotations/mirror/main_test.go
@@ -90,7 +90,7 @@ func TestParse(t *testing.T) {
Target: "http://some.test.env.com:2121/$someparam=1&$someotherparam=2",
Host: "some.test.env.com",
}},
- {map[string]string{backendURL: "http://some.test.env.com", host: "someInvalidParam.%^&*()_=!@#'\""}, &Config{
+ {map[string]string{backendURL: "http://some.test.env.com", host: "someInvalidParm.%^&*()_=!@#'\""}, &Config{
Source: ngxURI,
RequestBody: "on",
Target: "http://some.test.env.com",
diff --git a/internal/ingress/annotations/parser/main.go b/internal/ingress/annotations/parser/main.go
index 3137afbfd..554ad9dde 100644
--- a/internal/ingress/annotations/parser/main.go
+++ b/internal/ingress/annotations/parser/main.go
@@ -210,21 +210,6 @@ func StringRiskToRisk(risk string) AnnotationRisk {
}
}
-func (a AnnotationRisk) ToString() string {
- switch a {
- case AnnotationRiskCritical:
- return "Critical"
- case AnnotationRiskHigh:
- return "High"
- case AnnotationRiskMedium:
- return "Medium"
- case AnnotationRiskLow:
- return "Low"
- default:
- return "Unknown"
- }
-}
-
func normalizeString(input string) string {
trimmedContent := []string{}
for _, line := range strings.Split(input, "\n") {
diff --git a/internal/ingress/annotations/parser/validators.go b/internal/ingress/annotations/parser/validators.go
index 3c724a311..9a46bc840 100644
--- a/internal/ingress/annotations/parser/validators.go
+++ b/internal/ingress/annotations/parser/validators.go
@@ -44,7 +44,7 @@ var (
alphaNumericChars = `\-\.\_\~a-zA-Z0-9\/:`
extendedAlphaNumeric = alphaNumericChars + ", "
regexEnabledChars = regexp.QuoteMeta(`^$[](){}*+?|&=\`)
- urlEnabledChars = regexp.QuoteMeta(`,:?&=`)
+ urlEnabledChars = regexp.QuoteMeta(`:?&=`)
)
// IsValidRegex checks if the tested string can be used as a regex, but without any weird character.
@@ -79,8 +79,6 @@ var (
// URLWithNginxVariableRegex defines a url that can contain nginx variables.
// It is a risky operation
URLWithNginxVariableRegex = regexp.MustCompile("^[" + extendedAlphaNumeric + urlEnabledChars + "$]*$")
- // MaliciousRegex defines chars that are known to inject RCE
- MaliciousRegex = regexp.MustCompile(`\r|\n`)
)
// ValidateArrayOfServerName validates if all fields on a Server name annotation are
@@ -115,28 +113,10 @@ func ValidateRegex(regex *regexp.Regexp, removeSpace bool) AnnotationValidator {
if !regex.MatchString(s) {
return fmt.Errorf("value %s is invalid", s)
}
- if MaliciousRegex.MatchString(s) {
- return fmt.Errorf("value %s contains malicious string", s)
- }
-
return nil
}
}
-// CommonNameAnnotationValidator checks whether the annotation value starts with
-// 'CN=' and is followed by a valid regex.
-func CommonNameAnnotationValidator(s string) error {
- if !strings.HasPrefix(s, "CN=") {
- return fmt.Errorf("value %s is not a valid Common Name annotation: missing prefix 'CN='", s)
- }
-
- if _, err := regexp.Compile(s[3:]); err != nil {
- return fmt.Errorf("value %s is not a valid regex: %w", s, err)
- }
-
- return nil
-}
-
// ValidateOptions receives an array of valid options that can be the value of annotation.
// If no valid option is found, it will return an error
func ValidateOptions(options []string, caseSensitive, trimSpace bool) AnnotationValidator {
@@ -196,7 +176,7 @@ func ValidateServiceName(value string) error {
return nil
}
-// checkAnnotation will check each annotation for:
+// checkAnnotations will check each annotation for:
// 1 - Does it contain the internal validation and docs config?
// 2 - Does the ingress contains annotations? (validate null pointers)
// 3 - Does it contains a validator? Should it contain a validator (not containing is a bug!)
diff --git a/internal/ingress/annotations/parser/validators_test.go b/internal/ingress/annotations/parser/validators_test.go
index 49923ba76..e7aeb15ca 100644
--- a/internal/ingress/annotations/parser/validators_test.go
+++ b/internal/ingress/annotations/parser/validators_test.go
@@ -55,21 +55,11 @@ func TestValidateArrayOfServerName(t *testing.T) {
value: "*.so*mething.com,bla.com",
wantErr: false,
},
- {
- name: "should allow comma separated query params",
- value: "https://oauth.example/oauth2/auth?allowed_groups=gid1,gid2",
- wantErr: false,
- },
{
name: "should deny names with weird characters",
value: "something.com,lolo;xpto.com,nothing.com",
wantErr: true,
},
- {
- name: "should deny names with malicous chars",
- value: "http://something.com/#;\nournewinjection",
- wantErr: true,
- },
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
@@ -114,7 +104,7 @@ func Test_checkAnnotation(t *testing.T) {
},
fields: AnnotationFields{
"otherannotation": AnnotationConfig{
- Validator: func(_ string) error { return nil },
+ Validator: func(value string) error { return nil },
},
},
},
@@ -317,59 +307,3 @@ func TestCheckAnnotationRisk(t *testing.T) {
})
}
}
-
-func TestCommonNameAnnotationValidator(t *testing.T) {
- tests := []struct {
- name string
- annotation string
- wantErr bool
- }{
- {
- name: "correct example",
- annotation: `CN=(my\.common\.name)`,
- wantErr: false,
- },
- {
- name: "no CN= prefix",
- annotation: `(my\.common\.name)`,
- wantErr: true,
- },
- {
- name: "invalid prefix",
- annotation: `CN(my\.common\.name)`,
- wantErr: true,
- },
- {
- name: "invalid regex",
- annotation: `CN=(my\.common\.name]`,
- wantErr: true,
- },
- {
- name: "wildcard regex",
- annotation: `CN=(my\..*\.name)`,
- wantErr: false,
- },
- {
- name: "somewhat complex regex",
- annotation: "CN=(my\\.app\\.dev|.*\\.bbb\\.aaaa\\.tld)",
- wantErr: false,
- },
- {
- name: "another somewhat complex regex",
- annotation: `CN=(my-app.*\.c\.defg\.net|other.app.com)`,
- wantErr: false,
- },
- {
- name: "nested parenthesis regex",
- annotation: `CN=(api-one\.(asdf)?qwer\.webpage\.organization\.org)`,
- wantErr: false,
- },
- }
- for _, tt := range tests {
- t.Run(tt.name, func(t *testing.T) {
- if err := CommonNameAnnotationValidator(tt.annotation); (err != nil) != tt.wantErr {
- t.Errorf("CommonNameAnnotationValidator() error = %v, wantErr %v", err, tt.wantErr)
- }
- })
- }
-}
diff --git a/internal/ingress/annotations/proxy/main.go b/internal/ingress/annotations/proxy/main.go
index aaa093eaf..9d2646261 100644
--- a/internal/ingress/annotations/proxy/main.go
+++ b/internal/ingress/annotations/proxy/main.go
@@ -31,7 +31,6 @@ const (
proxyReadTimeoutAnnotation = "proxy-read-timeout"
proxyBuffersNumberAnnotation = "proxy-buffers-number"
proxyBufferSizeAnnotation = "proxy-buffer-size"
- proxyBusyBuffersSizeAnnotation = "proxy-busy-buffers-size"
proxyCookiePathAnnotation = "proxy-cookie-path"
proxyCookieDomainAnnotation = "proxy-cookie-domain"
proxyBodySizeAnnotation = "proxy-body-size"
@@ -83,12 +82,6 @@ var proxyAnnotations = parser.Annotation{
Documentation: `This annotation sets the size of the buffer proxy_buffer_size used for reading the first part of the response received from the proxied server.
By default proxy buffer size is set as "4k".`,
},
- proxyBusyBuffersSizeAnnotation: {
- Validator: parser.ValidateRegex(parser.SizeRegex, true),
- Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskLow,
- Documentation: `This annotation limits the total size of buffers that can be busy sending a response to the client while the response is not yet fully read. By default proxy busy buffers size is set as "8k".`,
- },
proxyCookiePathAnnotation: {
Validator: parser.ValidateRegex(parser.URLIsValidRegex, true),
Scope: parser.AnnotationScopeLocation,
@@ -174,7 +167,6 @@ type Config struct {
ReadTimeout int `json:"readTimeout"`
BuffersNumber int `json:"buffersNumber"`
BufferSize string `json:"bufferSize"`
- BusyBuffersSize string `json:"busyBuffersSize"`
CookieDomain string `json:"cookieDomain"`
CookiePath string `json:"cookiePath"`
NextUpstream string `json:"nextUpstream"`
@@ -214,9 +206,6 @@ func (l1 *Config) Equal(l2 *Config) bool {
if l1.BufferSize != l2.BufferSize {
return false
}
- if l1.BusyBuffersSize != l2.BusyBuffersSize {
- return false
- }
if l1.CookieDomain != l2.CookieDomain {
return false
}
@@ -301,11 +290,6 @@ func (a proxy) Parse(ing *networking.Ingress) (interface{}, error) {
config.BufferSize = defBackend.ProxyBufferSize
}
- config.BusyBuffersSize, err = parser.GetStringAnnotation(proxyBusyBuffersSizeAnnotation, ing, a.annotationConfig.Annotations)
- if err != nil {
- config.BusyBuffersSize = defBackend.ProxyBusyBuffersSize
- }
-
config.CookiePath, err = parser.GetStringAnnotation(proxyCookiePathAnnotation, ing, a.annotationConfig.Annotations)
if err != nil {
config.CookiePath = defBackend.ProxyCookiePath
diff --git a/internal/ingress/annotations/proxy/main_test.go b/internal/ingress/annotations/proxy/main_test.go
index b6ce07fb2..9446ae970 100644
--- a/internal/ingress/annotations/proxy/main_test.go
+++ b/internal/ingress/annotations/proxy/main_test.go
@@ -88,7 +88,6 @@ func (m mockBackend) GetDefaultBackend() defaults.Backend {
ProxyReadTimeout: 20,
ProxyBuffersNumber: 4,
ProxyBufferSize: "10k",
- ProxyBusyBuffersSize: "15k",
ProxyBodySize: "3k",
ProxyNextUpstream: "error",
ProxyNextUpstreamTimeout: 0,
@@ -109,7 +108,6 @@ func TestProxy(t *testing.T) {
data[parser.GetAnnotationWithPrefix("proxy-read-timeout")] = "3"
data[parser.GetAnnotationWithPrefix("proxy-buffers-number")] = "8"
data[parser.GetAnnotationWithPrefix("proxy-buffer-size")] = "1k"
- data[parser.GetAnnotationWithPrefix("proxy-busy-buffers-size")] = "4k"
data[parser.GetAnnotationWithPrefix("proxy-body-size")] = "2k"
data[parser.GetAnnotationWithPrefix("proxy-next-upstream")] = off
data[parser.GetAnnotationWithPrefix("proxy-next-upstream-timeout")] = "5"
@@ -143,9 +141,6 @@ func TestProxy(t *testing.T) {
if p.BufferSize != "1k" {
t.Errorf("expected 1k as buffer-size but returned %v", p.BufferSize)
}
- if p.BusyBuffersSize != "4k" {
- t.Errorf("expected 4k as busy-buffers-size but returned %v", p.BusyBuffersSize)
- }
if p.BodySize != "2k" {
t.Errorf("expected 2k as body-size but returned %v", p.BodySize)
}
@@ -181,7 +176,6 @@ func TestProxyComplex(t *testing.T) {
data[parser.GetAnnotationWithPrefix("proxy-read-timeout")] = "3"
data[parser.GetAnnotationWithPrefix("proxy-buffers-number")] = "8"
data[parser.GetAnnotationWithPrefix("proxy-buffer-size")] = "1k"
- data[parser.GetAnnotationWithPrefix("proxy-busy-buffers-size")] = "4k"
data[parser.GetAnnotationWithPrefix("proxy-body-size")] = "2k"
data[parser.GetAnnotationWithPrefix("proxy-next-upstream")] = "error http_502"
data[parser.GetAnnotationWithPrefix("proxy-next-upstream-timeout")] = "5"
@@ -215,9 +209,6 @@ func TestProxyComplex(t *testing.T) {
if p.BufferSize != "1k" {
t.Errorf("expected 1k as buffer-size but returned %v", p.BufferSize)
}
- if p.BusyBuffersSize != "4k" {
- t.Errorf("expected 4k as buffer-size but returned %v", p.BusyBuffersSize)
- }
if p.BodySize != "2k" {
t.Errorf("expected 2k as body-size but returned %v", p.BodySize)
}
@@ -273,9 +264,6 @@ func TestProxyWithNoAnnotation(t *testing.T) {
if p.BufferSize != "10k" {
t.Errorf("expected 10k as buffer-size but returned %v", p.BufferSize)
}
- if p.BusyBuffersSize != "15k" {
- t.Errorf("expected 15k as buffer-size but returned %v", p.BusyBuffersSize)
- }
if p.BodySize != "3k" {
t.Errorf("expected 3k as body-size but returned %v", p.BodySize)
}
diff --git a/internal/ingress/annotations/proxyssl/main.go b/internal/ingress/annotations/proxyssl/main.go
index c40bc85e0..0e854cd21 100644
--- a/internal/ingress/annotations/proxyssl/main.go
+++ b/internal/ingress/annotations/proxyssl/main.go
@@ -32,7 +32,7 @@ import (
const (
defaultProxySSLCiphers = "DEFAULT"
- defaultProxySSLProtocols = "TLSv1.2"
+ defaultProxySSLProtocols = "TLSv1 TLSv1.1 TLSv1.2"
defaultProxySSLVerify = "off"
defaultProxySSLVerifyDepth = 1
defaultProxySSLServerName = "off"
@@ -40,7 +40,7 @@ const (
var (
proxySSLOnOffRegex = regexp.MustCompile(`^(on|off)$`)
- proxySSLProtocolRegex = regexp.MustCompile(`^(TLSv1\.2|TLSv1\.3| )*$`)
+ proxySSLProtocolRegex = regexp.MustCompile(`^(SSLv2|SSLv3|TLSv1|TLSv1\.1|TLSv1\.2|TLSv1\.3| )*$`)
proxySSLCiphersRegex = regexp.MustCompile(`^[A-Za-z0-9\+:\_\-!]*$`)
)
diff --git a/internal/ingress/annotations/proxyssl/main_test.go b/internal/ingress/annotations/proxyssl/main_test.go
index cfa31f1d1..a20c6813d 100644
--- a/internal/ingress/annotations/proxyssl/main_test.go
+++ b/internal/ingress/annotations/proxyssl/main_test.go
@@ -32,7 +32,7 @@ const (
proxySslCiphers = "HIGH:-SHA"
off = "off"
sslServerName = "w00t"
- defaultProtocol = "TLSv1.2 TLSv1.3"
+ defaultProtocol = "SSLv2 TLSv1 TLSv1.2 TLSv1.3"
)
func buildIngress() *networking.Ingress {
@@ -103,7 +103,7 @@ func TestAnnotations(t *testing.T) {
data[parser.GetAnnotationWithPrefix(proxySSLSecretAnnotation)] = defaultDemoSecret
data[parser.GetAnnotationWithPrefix("proxy-ssl-ciphers")] = proxySslCiphers
data[parser.GetAnnotationWithPrefix("proxy-ssl-name")] = "$host"
- data[parser.GetAnnotationWithPrefix("proxy-ssl-protocols")] = "TLSv1.3 TLSv1.2"
+ data[parser.GetAnnotationWithPrefix("proxy-ssl-protocols")] = "TLSv1.3 SSLv2 TLSv1 TLSv1.2"
data[parser.GetAnnotationWithPrefix("proxy-ssl-server-name")] = "on"
data[parser.GetAnnotationWithPrefix("proxy-ssl-session-reuse")] = off
data[parser.GetAnnotationWithPrefix("proxy-ssl-verify")] = "on"
diff --git a/internal/ingress/annotations/redirect/redirect.go b/internal/ingress/annotations/redirect/redirect.go
index edc3d279c..b58e35171 100644
--- a/internal/ingress/annotations/redirect/redirect.go
+++ b/internal/ingress/annotations/redirect/redirect.go
@@ -28,26 +28,20 @@ import (
"k8s.io/ingress-nginx/internal/ingress/resolver"
)
-const (
- defaultPermanentRedirectCode = http.StatusMovedPermanently
- defaultTemporalRedirectCode = http.StatusFound
-)
+const defaultPermanentRedirectCode = http.StatusMovedPermanently
// Config returns the redirect configuration for an Ingress rule
type Config struct {
URL string `json:"url"`
Code int `json:"code"`
FromToWWW bool `json:"fromToWWW"`
- Relative bool `json:"relative"`
}
const (
fromToWWWRedirAnnotation = "from-to-www-redirect"
temporalRedirectAnnotation = "temporal-redirect"
- temporalRedirectAnnotationCode = "temporal-redirect-code"
permanentRedirectAnnotation = "permanent-redirect"
permanentRedirectAnnotationCode = "permanent-redirect-code"
- relativeRedirectsAnnotation = "relative-redirects"
)
var redirectAnnotations = parser.Annotation{
@@ -57,7 +51,7 @@ var redirectAnnotations = parser.Annotation{
Validator: parser.ValidateBool,
Scope: parser.AnnotationScopeLocation,
Risk: parser.AnnotationRiskLow, // Low, as it allows just a set of options
- Documentation: `In some scenarios, it is required to redirect from www.domain.com to domain.com or vice versa, which way the redirect is performed depends on the configured host value in the Ingress object.`,
+ Documentation: `In some scenarios is required to redirect from www.domain.com to domain.com or vice versa. To enable this feature use this annotation.`,
},
temporalRedirectAnnotation: {
Validator: parser.ValidateRegex(parser.URLIsValidRegex, false),
@@ -66,12 +60,6 @@ var redirectAnnotations = parser.Annotation{
Documentation: `This annotation allows you to return a temporal redirect (Return Code 302) instead of sending data to the upstream.
For example setting this annotation to https://www.google.com would redirect everything to Google with a Return Code of 302 (Moved Temporarily).`,
},
- temporalRedirectAnnotationCode: {
- Validator: parser.ValidateInt,
- Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskLow, // Low, as it allows just a set of options
- Documentation: `This annotation allows you to modify the status code used for temporal redirects.`,
- },
permanentRedirectAnnotation: {
Validator: parser.ValidateRegex(parser.URLIsValidRegex, false),
Scope: parser.AnnotationScopeLocation,
@@ -85,12 +73,6 @@ var redirectAnnotations = parser.Annotation{
Risk: parser.AnnotationRiskLow, // Low, as it allows just a set of options
Documentation: `This annotation allows you to modify the status code used for permanent redirects.`,
},
- relativeRedirectsAnnotation: {
- Validator: parser.ValidateBool,
- Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskLow,
- Documentation: `If enabled, redirects issued by nginx will be relative. See https://nginx.org/en/docs/http/ngx_http_core_module.html#absolute_redirect`,
- },
},
}
@@ -117,35 +99,20 @@ func (r redirect) Parse(ing *networking.Ingress) (interface{}, error) {
return nil, err
}
- rr, err := parser.GetBoolAnnotation(relativeRedirectsAnnotation, ing, r.annotationConfig.Annotations)
- if err != nil && !errors.IsMissingAnnotations(err) {
- return nil, err
- }
-
tr, err := parser.GetStringAnnotation(temporalRedirectAnnotation, ing, r.annotationConfig.Annotations)
if err != nil && !errors.IsMissingAnnotations(err) {
return nil, err
}
if tr != "" {
- trc, err := parser.GetIntAnnotation(temporalRedirectAnnotationCode, ing, r.annotationConfig.Annotations)
- if err != nil && !errors.IsMissingAnnotations(err) {
- return nil, err
- }
-
- if trc < http.StatusMultipleChoices || trc > http.StatusTemporaryRedirect {
- trc = defaultTemporalRedirectCode
- }
-
if err := isValidURL(tr); err != nil {
return nil, err
}
return &Config{
URL: tr,
- Code: trc,
+ Code: http.StatusFound,
FromToWWW: r3w,
- Relative: rr,
}, nil
}
@@ -168,13 +135,6 @@ func (r redirect) Parse(ing *networking.Ingress) (interface{}, error) {
URL: pr,
Code: prc,
FromToWWW: r3w,
- Relative: rr,
- }, nil
- }
-
- if rr {
- return &Config{
- Relative: rr,
}, nil
}
@@ -198,9 +158,6 @@ func (r1 *Config) Equal(r2 *Config) bool {
if r1.FromToWWW != r2.FromToWWW {
return false
}
- if r1.Relative != r2.Relative {
- return false
- }
return true
}
diff --git a/internal/ingress/annotations/redirect/redirect_test.go b/internal/ingress/annotations/redirect/redirect_test.go
index f4734ae5b..bd2f98211 100644
--- a/internal/ingress/annotations/redirect/redirect_test.go
+++ b/internal/ingress/annotations/redirect/redirect_test.go
@@ -103,7 +103,7 @@ func TestPermanentRedirectWithCustomCode(t *testing.T) {
}
}
-func TestTemporalRedirectWithDefaultCode(t *testing.T) {
+func TestTemporalRedirect(t *testing.T) {
rp := NewParser(resolver.Mock{})
if rp == nil {
t.Fatalf("Expected a parser.IngressAnnotation but returned nil")
@@ -128,49 +128,10 @@ func TestTemporalRedirectWithDefaultCode(t *testing.T) {
t.Errorf("Expected %v as redirect but returned %s", defRedirectURL, redirect.URL)
}
if redirect.Code != http.StatusFound {
- t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, http.StatusFound, redirect.Code)
+ t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, defaultPermanentRedirectCode, redirect.Code)
}
-}
-
-func TestTemporalRedirectWithCustomCode(t *testing.T) {
- rp := NewParser(resolver.Mock{})
- if rp == nil {
- t.Fatalf("Expected a parser.IngressAnnotation but returned nil")
- }
-
- testCases := map[string]struct {
- input int
- expectOutput int
- }{
- "valid code": {http.StatusTemporaryRedirect, http.StatusTemporaryRedirect},
- "invalid code": {http.StatusTeapot, http.StatusFound},
- }
-
- for n, tc := range testCases {
- t.Run(n, func(t *testing.T) {
- ing := new(networking.Ingress)
-
- data := make(map[string]string, 2)
- data[parser.GetAnnotationWithPrefix(fromToWWWRedirAnnotation)] = "true"
- data[parser.GetAnnotationWithPrefix(temporalRedirectAnnotation)] = defRedirectURL
- data[parser.GetAnnotationWithPrefix(temporalRedirectAnnotationCode)] = strconv.Itoa(tc.input)
- ing.SetAnnotations(data)
-
- i, err := rp.Parse(ing)
- if err != nil {
- t.Errorf("Unexpected error with ingress: %v", err)
- }
- redirect, ok := i.(*Config)
- if !ok {
- t.Errorf("Expected a Redirect type")
- }
- if redirect.URL != defRedirectURL {
- t.Errorf("Expected %v as redirect but returned %s", defRedirectURL, redirect.URL)
- }
- if redirect.Code != tc.expectOutput {
- t.Errorf("Expected %v as redirect to have a code %d but had %d", defRedirectURL, tc.expectOutput, redirect.Code)
- }
- })
+ if redirect.FromToWWW != true {
+ t.Errorf("Expected %v as redirect to have from-to-www as %v but got %v", defRedirectURL, true, redirect.FromToWWW)
}
}
@@ -193,22 +154,3 @@ func TestIsValidURL(t *testing.T) {
t.Errorf("expected nil but got %v", err)
}
}
-
-func TestParseAnnotations(t *testing.T) {
- ing := new(networking.Ingress)
-
- data := map[string]string{}
- data[parser.GetAnnotationWithPrefix(relativeRedirectsAnnotation)] = "true"
- ing.SetAnnotations(data)
-
- _, err := NewParser(&resolver.Mock{}).Parse(ing)
- if err != nil {
- t.Errorf("unexpected error: %v", err)
- }
-
- // test ingress using the annotation without a TLS section
- _, err = NewParser(&resolver.Mock{}).Parse(ing)
- if err != nil {
- t.Errorf("unexpected error parsing ingress with relative-redirects")
- }
-}
diff --git a/internal/ingress/annotations/rewrite/main.go b/internal/ingress/annotations/rewrite/main.go
index d78a004b9..cd9ed3993 100644
--- a/internal/ingress/annotations/rewrite/main.go
+++ b/internal/ingress/annotations/rewrite/main.go
@@ -152,14 +152,14 @@ func (a rewrite) Parse(ing *networking.Ingress) (interface{}, error) {
config.SSLRedirect, err = parser.GetBoolAnnotation(sslRedirectAnnotation, ing, a.annotationConfig.Annotations)
if err != nil {
if errors.IsValidationError(err) {
- klog.Warningf("%s is invalid, defaulting to '%t'", sslRedirectAnnotation, a.r.GetDefaultBackend().SSLRedirect)
+ klog.Warningf("%sis invalid, defaulting to '%s'", sslRedirectAnnotation, a.r.GetDefaultBackend().SSLRedirect)
}
config.SSLRedirect = a.r.GetDefaultBackend().SSLRedirect
}
config.PreserveTrailingSlash, err = parser.GetBoolAnnotation(preserveTrailingSlashAnnotation, ing, a.annotationConfig.Annotations)
if err != nil {
if errors.IsValidationError(err) {
- klog.Warningf("%s is invalid, defaulting to '%t'", preserveTrailingSlashAnnotation, a.r.GetDefaultBackend().PreserveTrailingSlash)
+ klog.Warningf("%sis invalid, defaulting to '%s'", preserveTrailingSlashAnnotation, a.r.GetDefaultBackend().PreserveTrailingSlash)
}
config.PreserveTrailingSlash = a.r.GetDefaultBackend().PreserveTrailingSlash
}
@@ -167,7 +167,7 @@ func (a rewrite) Parse(ing *networking.Ingress) (interface{}, error) {
config.ForceSSLRedirect, err = parser.GetBoolAnnotation(forceSSLRedirectAnnotation, ing, a.annotationConfig.Annotations)
if err != nil {
if errors.IsValidationError(err) {
- klog.Warningf("%s is invalid, defaulting to '%t'", forceSSLRedirectAnnotation, a.r.GetDefaultBackend().ForceSSLRedirect)
+ klog.Warningf("%sis invalid, defaulting to '%s'", forceSSLRedirectAnnotation, a.r.GetDefaultBackend().ForceSSLRedirect)
}
config.ForceSSLRedirect = a.r.GetDefaultBackend().ForceSSLRedirect
}
@@ -175,7 +175,7 @@ func (a rewrite) Parse(ing *networking.Ingress) (interface{}, error) {
config.UseRegex, err = parser.GetBoolAnnotation(useRegexAnnotation, ing, a.annotationConfig.Annotations)
if err != nil {
if errors.IsValidationError(err) {
- klog.Warningf("%s is invalid, defaulting to 'false'", useRegexAnnotation)
+ klog.Warningf("%sis invalid, defaulting to 'false'", useRegexAnnotation)
}
config.UseRegex = false
}
diff --git a/internal/ingress/annotations/serversnippet/main.go b/internal/ingress/annotations/serversnippet/main.go
index bce764e69..aa15608d0 100644
--- a/internal/ingress/annotations/serversnippet/main.go
+++ b/internal/ingress/annotations/serversnippet/main.go
@@ -33,7 +33,7 @@ var serverSnippetAnnotations = parser.Annotation{
serverSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
Documentation: `This annotation allows setting a custom NGINX configuration on a server block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/annotations/serviceupstream/main.go b/internal/ingress/annotations/serviceupstream/main.go
index 7819d87d8..d1851bc7b 100644
--- a/internal/ingress/annotations/serviceupstream/main.go
+++ b/internal/ingress/annotations/serviceupstream/main.go
@@ -34,7 +34,7 @@ var serviceUpstreamAnnotations = parser.Annotation{
serviceUpstreamAnnotation: {
Validator: parser.ValidateBool,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskLow, // Critical, this annotation is not validated at all and allows arbitrary configurations
+ Risk: parser.AnnotationRiskLow, // Critical, this annotation is not validated at all and allows arbitrary configutations
Documentation: `This annotation makes NGINX use Service's Cluster IP and Port instead of Endpoints as the backend endpoints`,
},
},
diff --git a/internal/ingress/annotations/snippet/main.go b/internal/ingress/annotations/snippet/main.go
index c2df84cdd..2406093c5 100644
--- a/internal/ingress/annotations/snippet/main.go
+++ b/internal/ingress/annotations/snippet/main.go
@@ -33,7 +33,7 @@ var configurationSnippetAnnotations = parser.Annotation{
configurationSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeLocation,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
Documentation: `This annotation allows setting a custom NGINX configuration on a location block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/annotations/sslcipher/main.go b/internal/ingress/annotations/sslcipher/main.go
index 3cfd903bd..685ef90bf 100644
--- a/internal/ingress/annotations/sslcipher/main.go
+++ b/internal/ingress/annotations/sslcipher/main.go
@@ -32,8 +32,7 @@ const (
)
// Should cover something like "ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP"
-// (?:@STRENGTH) is included twice so it can appear before or after @SECLEVEL=n
-var regexValidSSLCipher = regexp.MustCompile(`^(?:(?:[A-Za-z0-9!:+\-])*(?:@STRENGTH)*(?:@SECLEVEL=[0-5])*(?:@STRENGTH)*)*$`)
+var regexValidSSLCipher = regexp.MustCompile(`^[A-Za-z0-9!:+\-]*$`)
var sslCipherAnnotations = parser.Annotation{
Group: "backend",
@@ -43,7 +42,7 @@ var sslCipherAnnotations = parser.Annotation{
Scope: parser.AnnotationScopeIngress,
Risk: parser.AnnotationRiskLow,
Documentation: `The following annotation will set the ssl_prefer_server_ciphers directive at the server level.
- This configuration specifies that server ciphers should be preferred over client ciphers when using the TLS protocols.`,
+ This configuration specifies that server ciphers should be preferred over client ciphers when using the SSLv3 and TLS protocols.`,
},
sslCipherAnnotation: {
Validator: parser.ValidateRegex(regexValidSSLCipher, true),
diff --git a/internal/ingress/annotations/sslcipher/main_test.go b/internal/ingress/annotations/sslcipher/main_test.go
index f1675d4c7..20cb4d7af 100644
--- a/internal/ingress/annotations/sslcipher/main_test.go
+++ b/internal/ingress/annotations/sslcipher/main_test.go
@@ -42,10 +42,6 @@ func TestParse(t *testing.T) {
expectErr bool
}{
{map[string]string{annotationSSLCiphers: "ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP"}, Config{"ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP", ""}, false},
- {map[string]string{annotationSSLCiphers: "ALL:!aNULL:!EXPORT56@SECLEVEL=2:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP"}, Config{"ALL:!aNULL:!EXPORT56@SECLEVEL=2:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP", ""}, false},
- {map[string]string{annotationSSLCiphers: "ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP@STRENGTH"}, Config{"ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP@STRENGTH", ""}, false},
- {map[string]string{annotationSSLCiphers: "ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP@STRENGTH@SECLEVEL=3"}, Config{"ALL:!aNULL:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP@STRENGTH@SECLEVEL=3", ""}, false},
- {map[string]string{annotationSSLCiphers: "ALL:!aNULL:!EXPORT56:RC4+RSA@STRENGTH:+HIGH@SECLEVEL=5:+MEDIUM:+LOW:+SSLv2:+EXP"}, Config{"ALL:!aNULL:!EXPORT56:RC4+RSA@STRENGTH:+HIGH@SECLEVEL=5:+MEDIUM:+LOW:+SSLv2:+EXP", ""}, false},
{
map[string]string{annotationSSLCiphers: "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256"},
Config{"ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256", ""},
diff --git a/internal/ingress/annotations/streamsnippet/main.go b/internal/ingress/annotations/streamsnippet/main.go
index 7743d3fee..71ff3b140 100644
--- a/internal/ingress/annotations/streamsnippet/main.go
+++ b/internal/ingress/annotations/streamsnippet/main.go
@@ -33,7 +33,7 @@ var streamSnippetAnnotations = parser.Annotation{
streamSnippetAnnotation: {
Validator: parser.ValidateNull,
Scope: parser.AnnotationScopeIngress,
- Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configurations
+ Risk: parser.AnnotationRiskCritical, // Critical, this annotation is not validated at all and allows arbitrary configutations
Documentation: `This annotation allows setting a custom NGINX configuration on a stream block. This annotation does not contain any validation and it's usage is not recommended!`,
},
},
diff --git a/internal/ingress/controller/checker_test.go b/internal/ingress/controller/checker_test.go
index a8a0b67ad..5fb6b09fd 100644
--- a/internal/ingress/controller/checker_test.go
+++ b/internal/ingress/controller/checker_test.go
@@ -53,7 +53,7 @@ func TestNginxCheck(t *testing.T) {
server := &httptest.Server{
Listener: listener,
Config: &http.Server{
- Handler: http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
+ Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(http.StatusOK)
fmt.Fprintf(w, "ok")
}),
diff --git a/internal/ingress/controller/config/config.go b/internal/ingress/controller/config/config.go
index beac1405d..bad82b8b0 100644
--- a/internal/ingress/controller/config/config.go
+++ b/internal/ingress/controller/config/config.go
@@ -20,9 +20,10 @@ import (
"strconv"
"time"
- apiv1 "k8s.io/api/core/v1"
"k8s.io/klog/v2"
+ apiv1 "k8s.io/api/core/v1"
+
"k8s.io/ingress-nginx/internal/ingress/defaults"
"k8s.io/ingress-nginx/pkg/apis/ingress"
"k8s.io/ingress-nginx/pkg/util/runtime"
@@ -119,7 +120,7 @@ type Configuration struct {
// By default this is disabled
AllowBackendServerHeader bool `json:"allow-backend-server-header"`
- // AccessLogParams sets additional params for access_log
+ // AccessLogParams sets additionals params for access_log
// http://nginx.org/en/docs/http/ngx_http_log_module.html#access_log
// By default it's empty
AccessLogParams string `json:"access-log-params,omitempty"`
@@ -318,6 +319,11 @@ type Configuration struct {
NginxStatusIpv4Whitelist []string `json:"nginx-status-ipv4-whitelist,omitempty"`
NginxStatusIpv6Whitelist []string `json:"nginx-status-ipv6-whitelist,omitempty"`
+ // Plugins configures plugins to use placed in the directory /etc/nginx/lua/plugins.
+ // Every plugin has to have main.lua in the root. Every plugin has to bundle all of its dependencies.
+ // The execution order follows the definition.
+ Plugins []string `json:"plugins,omitempty"`
+
// If UseProxyProtocol is enabled ProxyRealIPCIDR defines the default the IP/network address
// of your external load balancer
ProxyRealIPCIDR []string `json:"proxy-real-ip-cidr,omitempty"`
@@ -418,7 +424,7 @@ type Configuration struct {
// Example '60s'
ProxyProtocolHeaderTimeout time.Duration `json:"proxy-protocol-header-timeout,omitempty"`
- // Enables or disables the directive aio_write that writes files asynchronously
+ // Enables or disables the directive aio_write that writes files files asynchronously
// https://nginx.org/en/docs/http/ngx_http_core_module.html#aio_write
EnableAioWrite bool `json:"enable-aio-write,omitempty"`
@@ -430,10 +436,6 @@ type Configuration struct {
// By default this is disabled
UseGeoIP2 bool `json:"use-geoip2,omitempty"`
- // GeoIP2AutoReloadMinutes enables autoreload on geoip2 setting the interval in minutes
- // By default this is disabled using 0
- GeoIP2AutoReloadMinutes int `json:"geoip2-autoreload-in-minutes,omitempty"`
-
// Enables or disables the use of the NGINX Brotli Module for compression
// https://github.com/google/ngx_brotli
EnableBrotli bool `json:"enable-brotli,omitempty"`
@@ -472,13 +474,6 @@ type Configuration struct {
// http://nginx.org/en/docs/ngx_core_module.html#worker_processes
WorkerProcesses string `json:"worker-processes,omitempty"`
- // Defines whether multiple concurrent reloads of worker processes should occur.
- // Set this to false to prevent more than n x 2 workers to exist at any time, to avoid potential OOM situations and high CPU load
- // With this setting on false, configuration changes in the queue will be re-queued with an exponential backoff, until the number of worker process is the expected value.
- // By default new worker processes are spawned every time there's a change that cannot be applied dynamically with no upper limit to the number of running workers
- // http://nginx.org/en/docs/ngx_core_module.html#worker_processes
- WorkerSerialReloads bool `json:"enable-serial-reloads,omitempty"`
-
// Defines a timeout for a graceful shutdown of worker processes
// http://nginx.org/en/docs/ngx_core_module.html#worker_shutdown_timeout
WorkerShutdownTimeout string `json:"worker-shutdown-timeout,omitempty"`
@@ -549,10 +544,6 @@ type Configuration struct {
// https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_intercept_errors
DisableProxyInterceptErrors bool `json:"disable-proxy-intercept-errors,omitempty"`
- // Disable absolute redirects and enables relative redirects.
- // https://nginx.org/en/docs/http/ngx_http_core_module.html#absolute_redirect
- RelativeRedirects bool `json:"relative-redirects"`
-
// Sets the ipv4 addresses on which the server will accept requests.
BindAddressIpv4 []string `json:"bind-address-ipv4,omitempty"`
@@ -616,7 +607,7 @@ type Configuration struct {
// Default: 0.01
OtelSamplerRatio float32 `json:"otel-sampler-ratio"`
- // OtelSamplerParentBased specifies the parent based sampler to be used for any traces created
+ // OtelSamplerParentBased specifies the parent based sampler to be use for any traces created
// Default: true
OtelSamplerParentBased bool `json:"otel-sampler-parent-based"`
@@ -713,7 +704,7 @@ type Configuration struct {
DefaultSSLCertificate *ingress.SSLCert `json:"-"`
// ProxySSLLocationOnly controls whether the proxy-ssl parameters defined in the
- // proxy-ssl-* annotations are applied on location level only in the nginx.conf file
+ // proxy-ssl-* annotations are applied on on location level only in the nginx.conf file
// Default is that those are applied on server level, too
ProxySSLLocationOnly bool `json:"proxy-ssl-location-only"`
@@ -722,6 +713,31 @@ type Configuration struct {
// Default: text/html
DefaultType string `json:"default-type"`
+ // GlobalRateLimitMemcachedHost configures memcached host.
+ GlobalRateLimitMemcachedHost string `json:"global-rate-limit-memcached-host"`
+
+ // GlobalRateLimitMemcachedPort configures memcached port.
+ GlobalRateLimitMemcachedPort int `json:"global-rate-limit-memcached-port"`
+
+ // GlobalRateLimitMemcachedConnectTimeout configures timeout when connecting to memcached.
+ // The unit is millisecond.
+ GlobalRateLimitMemcachedConnectTimeout int `json:"global-rate-limit-memcached-connect-timeout"`
+
+ // GlobalRateLimitMemcachedMaxIdleTimeout configured how long connections
+ // should be kept alive in idle state. The unit is millisecond.
+ GlobalRateLimitMemcachedMaxIdleTimeout int `json:"global-rate-limit-memcached-max-idle-timeout"`
+
+ // GlobalRateLimitMemcachedPoolSize configures how many connections
+ // should be kept alive in the pool.
+ // Note that this is per NGINX worker. Make sure your memcached server can
+ // handle `MemcachedPoolSize * * `
+ // simultaneous connections.
+ GlobalRateLimitMemcachedPoolSize int `json:"global-rate-limit-memcached-pool-size"`
+
+ // GlobalRateLimitStatucCode determines the HTTP status code to return
+ // when limit is exceeding during global rate limiting.
+ GlobalRateLimitStatucCode int `json:"global-rate-limit-status-code"`
+
// DebugConnections Enables debugging log for selected client connections
// http://nginx.org/en/docs/ngx_core_module.html#debug_connection
// Default: ""
@@ -732,11 +748,6 @@ type Configuration struct {
// alphanumeric chars, "-", "_", "/".In case of additional characters,
// like used on Rewrite configurations the user should use pathType as ImplementationSpecific
StrictValidatePathType bool `json:"strict-validate-path-type"`
-
- // GRPCBufferSizeKb Sets the size of the buffer used for reading the response received
- // from the gRPC server. The response is passed to the client synchronously,
- // as soon as it is received.
- GRPCBufferSizeKb int `json:"grpc-buffer-size-kb"`
}
// NewDefault returns the default nginx configuration
@@ -755,10 +766,10 @@ func NewDefault() Configuration {
cfg := Configuration{
AllowSnippetAnnotations: false,
- AllowCrossNamespaceResources: false,
+ AllowCrossNamespaceResources: true,
AllowBackendServerHeader: false,
AnnotationValueWordBlocklist: "",
- AnnotationsRiskLevel: "High",
+ AnnotationsRiskLevel: "Critical",
AccessLogPath: "/var/log/nginx/access.log",
AccessLogParams: "",
EnableAccessLogForDefaultBackend: false,
@@ -830,15 +841,12 @@ func NewDefault() Configuration {
EnableAioWrite: true,
UseGzip: false,
UseGeoIP2: false,
- GeoIP2AutoReloadMinutes: 0,
WorkerProcesses: strconv.Itoa(runtime.NumCPU()),
- WorkerSerialReloads: false,
WorkerShutdownTimeout: "240s",
VariablesHashBucketSize: 256,
VariablesHashMaxSize: 2048,
UseHTTP2: true,
DisableProxyInterceptErrors: false,
- RelativeRedirects: false,
ProxyStreamTimeout: "600s",
ProxyStreamNextUpstream: true,
ProxyStreamNextUpstreamTimeout: "600s",
@@ -850,7 +858,6 @@ func NewDefault() Configuration {
ProxySendTimeout: 60,
ProxyBuffersNumber: 4,
ProxyBufferSize: "4k",
- ProxyBusyBuffersSize: "8k",
ProxyCookieDomain: "off",
ProxyCookiePath: "off",
ProxyNextUpstream: "error timeout",
@@ -863,7 +870,6 @@ func NewDefault() Configuration {
SSLRedirect: true,
CustomHTTPErrors: []int{},
DisableProxyInterceptErrors: false,
- RelativeRedirects: false,
DenylistSourceRange: []string{},
WhitelistSourceRange: []string{},
SkipAccessLogURLs: []string{},
@@ -873,36 +879,39 @@ func NewDefault() Configuration {
ProxyHTTPVersion: "1.1",
ProxyMaxTempFileSize: "1024m",
ServiceUpstream: false,
- AllowedResponseHeaders: []string{},
},
- UpstreamKeepaliveConnections: 320,
- UpstreamKeepaliveTime: "1h",
- UpstreamKeepaliveTimeout: 60,
- UpstreamKeepaliveRequests: 10000,
- LimitConnZoneVariable: defaultLimitConnZoneVariable,
- BindAddressIpv4: defBindAddress,
- BindAddressIpv6: defBindAddress,
- OpentelemetryTrustIncomingSpan: true,
- OpentelemetryConfig: "/etc/ingress-controller/telemetry/opentelemetry.toml",
- OtlpCollectorPort: "4317",
- OtelServiceName: "nginx",
- OtelSampler: "AlwaysOn",
- OtelSamplerRatio: 0.01,
- OtelSamplerParentBased: true,
- OtelScheduleDelayMillis: 5000,
- OtelMaxExportBatchSize: 512,
- OtelMaxQueueSize: 2048,
- LimitReqStatusCode: 503,
- LimitConnStatusCode: 503,
- SyslogPort: 514,
- NoTLSRedirectLocations: "/.well-known/acme-challenge",
- NoAuthLocations: "/.well-known/acme-challenge",
- GlobalExternalAuth: defGlobalExternalAuth,
- ProxySSLLocationOnly: false,
- DefaultType: "text/html",
- DebugConnections: []string{},
- StrictValidatePathType: true,
- GRPCBufferSizeKb: 0,
+ UpstreamKeepaliveConnections: 320,
+ UpstreamKeepaliveTime: "1h",
+ UpstreamKeepaliveTimeout: 60,
+ UpstreamKeepaliveRequests: 10000,
+ LimitConnZoneVariable: defaultLimitConnZoneVariable,
+ BindAddressIpv4: defBindAddress,
+ BindAddressIpv6: defBindAddress,
+ OpentelemetryTrustIncomingSpan: true,
+ OpentelemetryConfig: "/etc/ingress-controller/telemetry/opentelemetry.toml",
+ OtlpCollectorPort: "4317",
+ OtelServiceName: "nginx",
+ OtelSampler: "AlwaysOn",
+ OtelSamplerRatio: 0.01,
+ OtelSamplerParentBased: true,
+ OtelScheduleDelayMillis: 5000,
+ OtelMaxExportBatchSize: 512,
+ OtelMaxQueueSize: 2048,
+ LimitReqStatusCode: 503,
+ LimitConnStatusCode: 503,
+ SyslogPort: 514,
+ NoTLSRedirectLocations: "/.well-known/acme-challenge",
+ NoAuthLocations: "/.well-known/acme-challenge",
+ GlobalExternalAuth: defGlobalExternalAuth,
+ ProxySSLLocationOnly: false,
+ DefaultType: "text/html",
+ GlobalRateLimitMemcachedPort: 11211,
+ GlobalRateLimitMemcachedConnectTimeout: 50,
+ GlobalRateLimitMemcachedMaxIdleTimeout: 10000,
+ GlobalRateLimitMemcachedPoolSize: 50,
+ GlobalRateLimitStatucCode: 429,
+ DebugConnections: []string{},
+ StrictValidatePathType: false, // TODO: This will be true in future releases
}
if klog.V(5).Enabled() {
diff --git a/internal/ingress/controller/controller.go b/internal/ingress/controller/controller.go
index 652a80e49..cb8d3712c 100644
--- a/internal/ingress/controller/controller.go
+++ b/internal/ingress/controller/controller.go
@@ -91,7 +91,6 @@ type Configuration struct {
UpdateStatus bool
UseNodeInternalIP bool
ElectionID string
- ElectionTTL time.Duration
UpdateStatusOnShutdown bool
HealthCheckHost string
@@ -101,18 +100,13 @@ type Configuration struct {
EnableSSLPassthrough bool
- DisableLeaderElection bool
-
EnableProfiling bool
- EnableMetrics bool
- MetricsPerHost bool
- MetricsPerUndefinedHost bool
- MetricsBuckets *collectors.HistogramBuckets
- MetricsBucketFactor float64
- MetricsMaxBuckets uint32
- ReportStatusClasses bool
- ExcludeSocketMetrics []string
+ EnableMetrics bool
+ MetricsPerHost bool
+ MetricsBuckets *collectors.HistogramBuckets
+ ReportStatusClasses bool
+ ExcludeSocketMetrics []string
FakeCertificate *ingress.SSLCert
@@ -256,8 +250,9 @@ func (n *NGINXController) syncIngress(interface{}) error {
}
ri := utilingress.GetRemovedIngresses(n.runningConfig, pcfg)
+ re := utilingress.GetRemovedHosts(n.runningConfig, pcfg)
rc := utilingress.GetRemovedCertificateSerialNumbers(n.runningConfig, pcfg)
- n.metricCollector.RemoveMetrics(ri, rc)
+ n.metricCollector.RemoveMetrics(ri, re, rc)
n.runningConfig = pcfg
@@ -380,6 +375,10 @@ func (n *NGINXController) CheckIngress(ing *networking.Ingress) error {
if !cfg.AllowSnippetAnnotations && strings.HasSuffix(key, "-snippet") {
return fmt.Errorf("%s annotation cannot be used. Snippet directives are disabled by the Ingress administrator", key)
}
+
+ if cfg.GlobalRateLimitMemcachedHost == "" && strings.HasPrefix(key, fmt.Sprintf("%s/%s", parser.AnnotationsPrefix, "global-rate-limit")) {
+ return fmt.Errorf("'global-rate-limit*' annotations require 'global-rate-limit-memcached-host' settings configured in the global configmap")
+ }
}
k8s.SetDefaultNGINXPathType(ing)
@@ -1255,7 +1254,6 @@ func (n *NGINXController) createServers(data []*ingress.Ingress,
ReadTimeout: bdef.ProxyReadTimeout,
BuffersNumber: bdef.ProxyBuffersNumber,
BufferSize: bdef.ProxyBufferSize,
- BusyBuffersSize: bdef.ProxyBusyBuffersSize,
CookieDomain: bdef.ProxyCookieDomain,
CookiePath: bdef.ProxyCookiePath,
NextUpstream: bdef.ProxyNextUpstream,
@@ -1504,7 +1502,6 @@ func (n *NGINXController) createServers(data []*ingress.Ingress,
func locationApplyAnnotations(loc *ingress.Location, anns *annotations.Ingress) {
loc.BasicDigestAuth = anns.BasicDigestAuth
loc.ClientBodyBufferSize = anns.ClientBodyBufferSize
- loc.CustomHeaders = anns.CustomHeaders
loc.ConfigurationSnippet = anns.ConfigurationSnippet
loc.CorsConfig = anns.CorsConfig
loc.ExternalAuth = anns.ExternalAuth
@@ -1514,6 +1511,7 @@ func locationApplyAnnotations(loc *ingress.Location, anns *annotations.Ingress)
loc.Proxy = anns.Proxy
loc.ProxySSL = anns.ProxySSL
loc.RateLimit = anns.RateLimit
+ loc.GlobalRateLimit = anns.GlobalRateLimit
loc.Redirect = anns.Redirect
loc.Rewrite = anns.Rewrite
loc.UpstreamVhost = anns.UpstreamVhost
@@ -1593,11 +1591,7 @@ func mergeAlternativeBackends(ing *ingress.Ingress, upstreams map[string]*ingres
altEqualsPri := false
for _, loc := range servers[defServerName].Locations {
- priUps, ok := upstreams[loc.Backend]
- if !ok {
- klog.Warningf("cannot find primary backend %s for location %s%s", loc.Backend, servers[defServerName].Hostname, loc.Path)
- continue
- }
+ priUps := upstreams[loc.Backend]
altEqualsPri = altUps.Name == priUps.Name
if altEqualsPri {
klog.Warningf("alternative upstream %s in Ingress %s/%s is primary upstream in Other Ingress for location %s%s!",
@@ -1656,11 +1650,7 @@ func mergeAlternativeBackends(ing *ingress.Ingress, upstreams map[string]*ingres
// find matching paths
for _, loc := range server.Locations {
- priUps, ok := upstreams[loc.Backend]
- if !ok {
- klog.Warningf("cannot find primary backend %s for location %s%s", loc.Backend, server.Hostname, loc.Path)
- continue
- }
+ priUps := upstreams[loc.Backend]
altEqualsPri = altUps.Name == priUps.Name
if altEqualsPri {
klog.Warningf("alternative upstream %s in Ingress %s/%s is primary upstream in Other Ingress for location %s%s!",
diff --git a/internal/ingress/controller/controller_test.go b/internal/ingress/controller/controller_test.go
index 9d3fea470..c07fcfadf 100644
--- a/internal/ingress/controller/controller_test.go
+++ b/internal/ingress/controller/controller_test.go
@@ -170,7 +170,7 @@ func (fakeTemplate) Write(conf *ngx_config.TemplateConfig) ([]byte, error) {
func TestCheckIngress(t *testing.T) {
defer func() {
- err := filepath.Walk(os.TempDir(), func(path string, info os.FileInfo, _ error) error {
+ err := filepath.Walk(os.TempDir(), func(path string, info os.FileInfo, err error) error {
if info.IsDir() && os.TempDir() != path {
return filepath.SkipDir
}
@@ -1292,74 +1292,6 @@ func TestMergeAlternativeBackends(t *testing.T) {
},
},
},
- "alternative backend does not merge for missing upstream": {
- &ingress.Ingress{
- Ingress: networking.Ingress{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: "example",
- },
- Spec: networking.IngressSpec{
- Rules: []networking.IngressRule{
- {
- Host: "example.com",
- IngressRuleValue: networking.IngressRuleValue{
- HTTP: &networking.HTTPIngressRuleValue{
- Paths: []networking.HTTPIngressPath{
- {
- Path: "/",
- PathType: &pathTypePrefix,
- Backend: networking.IngressBackend{
- Service: &networking.IngressServiceBackend{
- Name: "http-svc-canary",
- Port: networking.ServiceBackendPort{
- Number: 80,
- },
- },
- },
- },
- },
- },
- },
- },
- },
- },
- },
- },
- map[string]*ingress.Backend{
- "example-http-svc-canary-80": {
- Name: "example-http-svc-canary-80",
- NoServer: true,
- TrafficShapingPolicy: ingress.TrafficShapingPolicy{
- Weight: 20,
- },
- },
- },
- map[string]*ingress.Server{
- "example.com": {
- Hostname: "example.com",
- Locations: []*ingress.Location{
- {
- Path: "/",
- PathType: &pathTypePrefix,
- Backend: "example-http-svc-80",
- },
- },
- },
- },
- map[string]*ingress.Backend{},
- map[string]*ingress.Server{
- "example.com": {
- Hostname: "example.com",
- Locations: []*ingress.Location{
- {
- Path: "/",
- PathType: &pathTypePrefix,
- Backend: "example-http-svc-80",
- },
- },
- },
- },
- },
}
for title, tc := range testCases {
@@ -1641,7 +1573,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 1 {
t.Errorf("servers count should be 1, got %d", len(servers))
return
@@ -1708,7 +1640,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 1 {
t.Errorf("servers count should be 1, got %d", len(servers))
return
@@ -1768,7 +1700,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 1 {
t.Errorf("servers count should be 1, got %d", len(servers))
return
@@ -1867,7 +1799,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 2, got %d", len(servers))
return
@@ -2127,7 +2059,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 2, got %d", len(servers))
return
@@ -2258,7 +2190,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(ingresses []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 2, got %d", len(servers))
return
@@ -2366,7 +2298,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(ingresses []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 2, got %d", len(servers))
return
@@ -2435,7 +2367,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 1, got %d", len(servers))
return
@@ -2505,7 +2437,7 @@ func TestGetBackendServers(t *testing.T) {
},
},
},
- Validate: func(_ []*ingress.Ingress, _ []*ingress.Backend, servers []*ingress.Server) {
+ Validate: func(ingresses []*ingress.Ingress, upstreams []*ingress.Backend, servers []*ingress.Server) {
if len(servers) != 2 {
t.Errorf("servers count should be 2, got %d", len(servers))
return
diff --git a/internal/ingress/controller/endpointslices.go b/internal/ingress/controller/endpointslices.go
index ed46e2c85..4f98e3ce7 100644
--- a/internal/ingress/controller/endpointslices.go
+++ b/internal/ingress/controller/endpointslices.go
@@ -115,7 +115,7 @@ func getEndpointsFromSlices(s *corev1.Service, port *corev1.ServicePort, proto c
useTopologyHints = false
if zoneForHints != emptyZone {
useTopologyHints = true
- // check if all endpointslices have zone hints
+ // check if all endpointslices has zone hints
for _, ep := range eps.Endpoints {
if ep.Hints == nil || len(ep.Hints.ForZones) == 0 {
useTopologyHints = false
diff --git a/internal/ingress/controller/location.go b/internal/ingress/controller/location.go
index 221c089c2..9776f8c87 100644
--- a/internal/ingress/controller/location.go
+++ b/internal/ingress/controller/location.go
@@ -100,7 +100,7 @@ func normalizePrefixPath(path string) string {
}
func needsRewrite(location *ingress.Location) bool {
- if location.Rewrite.Target != "" && location.Rewrite.Target != location.Path {
+ if len(location.Rewrite.Target) > 0 && location.Rewrite.Target != location.Path {
return true
}
diff --git a/internal/ingress/controller/nginx.go b/internal/ingress/controller/nginx.go
index 20fad5afb..578d5b4e8 100644
--- a/internal/ingress/controller/nginx.go
+++ b/internal/ingress/controller/nginx.go
@@ -35,7 +35,6 @@ import (
"syscall"
"text/template"
"time"
- "unicode"
proxyproto "github.com/armon/go-proxyproto"
"github.com/eapache/channels"
@@ -88,10 +87,9 @@ func NewNGINXController(config *Configuration, mc metric.Collector) *NGINXContro
n := &NGINXController{
isIPV6Enabled: ing_net.IsIPv6Enabled(),
- resolver: h,
- cfg: config,
- syncRateLimiter: flowcontrol.NewTokenBucketRateLimiter(config.SyncRateLimit, 1),
- workersReloading: false,
+ resolver: h,
+ cfg: config,
+ syncRateLimiter: flowcontrol.NewTokenBucketRateLimiter(config.SyncRateLimit, 1),
recorder: eventBroadcaster.NewRecorder(scheme.Scheme, apiv1.EventSource{
Component: "nginx-ingress-controller",
@@ -199,16 +197,14 @@ func NewNGINXController(config *Configuration, mc metric.Collector) *NGINXContro
filesToWatch = append(filesToWatch, path)
return nil
})
+
if err != nil {
klog.Fatalf("Error creating file watchers: %v", err)
}
for _, f := range filesToWatch {
- // This redeclaration is necessary for the closure to get the correct value for the iteration in go versions <1.22
- // See https://go.dev/blog/loopvar-preview
- f := f
_, err = file.NewFileWatcher(f, func() {
- klog.InfoS("File change detected. Reloading NGINX", "path", f)
+ klog.InfoS("File changed detected. Reloading NGINX", "path", f)
n.syncQueue.EnqueueTask(task.GetDummyObject("file-change"))
})
if err != nil {
@@ -231,8 +227,6 @@ type NGINXController struct {
syncRateLimiter flowcontrol.RateLimiter
- workersReloading bool
-
// stopLock is used to enforce that only a single call to Stop send at
// a given time. We allow stopping through an HTTP endpoint and
// allowing concurrent stoppers leads to stack traces.
@@ -277,29 +271,26 @@ func (n *NGINXController) Start() {
// TODO: For now, as the the IngressClass logics has changed, is up to the
// cluster admin to create different Leader Election IDs.
// Should revisit this in a future
+ electionID := n.cfg.ElectionID
- if !n.cfg.DisableLeaderElection {
- electionID := n.cfg.ElectionID
- setupLeaderElection(&leaderElectionConfig{
- Client: n.cfg.Client,
- ElectionID: electionID,
- ElectionTTL: n.cfg.ElectionTTL,
- OnStartedLeading: func(stopCh chan struct{}) {
- if n.syncStatus != nil {
- go n.syncStatus.Run(stopCh)
- }
+ setupLeaderElection(&leaderElectionConfig{
+ Client: n.cfg.Client,
+ ElectionID: electionID,
+ OnStartedLeading: func(stopCh chan struct{}) {
+ if n.syncStatus != nil {
+ go n.syncStatus.Run(stopCh)
+ }
- n.metricCollector.OnStartedLeading(electionID)
- // manually update SSL expiration metrics
- // (to not wait for a reload)
- n.metricCollector.SetSSLExpireTime(n.runningConfig.Servers)
- n.metricCollector.SetSSLInfo(n.runningConfig.Servers)
- },
- OnStoppedLeading: func() {
- n.metricCollector.OnStoppedLeading(electionID)
- },
- })
- }
+ n.metricCollector.OnStartedLeading(electionID)
+ // manually update SSL expiration metrics
+ // (to not wait for a reload)
+ n.metricCollector.SetSSLExpireTime(n.runningConfig.Servers)
+ n.metricCollector.SetSSLInfo(n.runningConfig.Servers)
+ },
+ OnStoppedLeading: func() {
+ n.metricCollector.OnStoppedLeading(electionID)
+ },
+ })
cmd := n.command.ExecCommand()
@@ -643,7 +634,8 @@ func (n *NGINXController) testTemplate(cfg []byte) error {
if len(cfg) == 0 {
return fmt.Errorf("invalid NGINX configuration (empty)")
}
- tmpfile, err := os.CreateTemp(filepath.Join(os.TempDir(), "nginx"), tempNginxPattern)
+ tmpDir := os.TempDir() + "/nginx"
+ tmpfile, err := os.CreateTemp(tmpDir, tempNginxPattern)
if err != nil {
return err
}
@@ -679,20 +671,11 @@ func (n *NGINXController) OnUpdate(ingressCfg ingress.Configuration) error {
cfg := n.store.GetBackendConfiguration()
cfg.Resolver = n.resolver
- workerSerialReloads := cfg.WorkerSerialReloads
- if workerSerialReloads && n.workersReloading {
- return errors.New("worker reload already in progress, requeuing reload")
- }
-
content, err := n.generateTemplate(cfg, ingressCfg)
if err != nil {
return err
}
- err = n.createLuaConfig(&cfg)
- if err != nil {
- return err
- }
err = createOpentelemetryCfg(&cfg)
if err != nil {
return err
@@ -750,41 +733,9 @@ func (n *NGINXController) OnUpdate(ingressCfg ingress.Configuration) error {
return fmt.Errorf("%v\n%v", err, string(o))
}
- // Reload status checking runs in a separate goroutine to avoid blocking the sync queue
- if workerSerialReloads {
- go n.awaitWorkersReload()
- }
-
return nil
}
-// awaitWorkersReload checks if the number of workers has returned to the expected count
-func (n *NGINXController) awaitWorkersReload() {
- n.workersReloading = true
- defer func() { n.workersReloading = false }()
-
- expectedWorkers := n.store.GetBackendConfiguration().WorkerProcesses
- var numWorkers string
- klog.V(3).Infof("waiting for worker count to be equal to %s", expectedWorkers)
- for numWorkers != expectedWorkers {
- time.Sleep(time.Second)
- o, err := exec.Command("/bin/sh", "-c", "pgrep worker | wc -l").Output()
- if err != nil {
- klog.ErrorS(err, numWorkers)
- return
- }
- // cleanup any non-printable chars from shell output
- numWorkers = strings.Map(func(r rune) rune {
- if unicode.IsPrint(r) {
- return r
- }
- return -1
- }, string(o))
-
- klog.V(3).Infof("Currently running nginx worker processes: %s, expected %s", numWorkers, expectedWorkers)
- }
-}
-
// nginxHashBucketSize computes the correct NGINX hash_bucket_size for a hash
// with the given longest key.
func nginxHashBucketSize(longestString int) int {
@@ -1082,40 +1033,14 @@ func createOpentelemetryCfg(cfg *ngx_config.Configuration) error {
return os.WriteFile(cfg.OpentelemetryConfig, tmplBuf.Bytes(), file.ReadWriteByUser)
}
-func (n *NGINXController) createLuaConfig(cfg *ngx_config.Configuration) error {
- luaconfigs := &ngx_template.LuaConfig{
- EnableMetrics: n.cfg.EnableMetrics,
- ListenPorts: ngx_template.LuaListenPorts{
- HTTPSPort: strconv.Itoa(n.cfg.ListenPorts.HTTPS),
- StatusPort: strconv.Itoa(nginx.StatusPort),
- SSLProxyPort: strconv.Itoa(n.cfg.ListenPorts.SSLProxy),
- },
- UseProxyProtocol: cfg.UseProxyProtocol,
- UseForwardedHeaders: cfg.UseForwardedHeaders,
- IsSSLPassthroughEnabled: n.cfg.EnableSSLPassthrough,
- HTTPRedirectCode: cfg.HTTPRedirectCode,
- EnableOCSP: cfg.EnableOCSP,
- MonitorBatchMaxSize: n.cfg.MonitorMaxBatchSize,
- HSTS: cfg.HSTS,
- HSTSMaxAge: cfg.HSTSMaxAge,
- HSTSIncludeSubdomains: cfg.HSTSIncludeSubdomains,
- HSTSPreload: cfg.HSTSPreload,
- }
- jsonCfg, err := json.Marshal(luaconfigs)
- if err != nil {
- return err
- }
- return os.WriteFile(luaCfgPath, jsonCfg, file.ReadWriteByUser)
-}
-
func cleanTempNginxCfg() error {
var files []string
- err := filepath.Walk(filepath.Join(os.TempDir(), "nginx"), func(path string, info os.FileInfo, err error) error {
+ err := filepath.Walk(os.TempDir(), func(path string, info os.FileInfo, err error) error {
if err != nil {
return err
}
- if info.IsDir() && path != filepath.Join(os.TempDir(), "nginx") {
+ if info.IsDir() && os.TempDir() != path {
return filepath.SkipDir
}
@@ -1134,7 +1059,7 @@ func cleanTempNginxCfg() error {
}
for _, file := range files {
- err = os.Remove(file)
+ err := os.Remove(file)
if err != nil {
return err
}
diff --git a/internal/ingress/controller/nginx_test.go b/internal/ingress/controller/nginx_test.go
index fc0a5b6d2..c68b0b188 100644
--- a/internal/ingress/controller/nginx_test.go
+++ b/internal/ingress/controller/nginx_test.go
@@ -361,11 +361,10 @@ func TestCleanTempNginxCfg(t *testing.T) {
t.Fatal(err)
}
- tmpfile, err := os.CreateTemp(filepath.Join(os.TempDir(), "nginx"), tempNginxPattern)
+ tmpfile, err := os.CreateTemp("", tempNginxPattern)
if err != nil {
t.Fatal(err)
}
- expectedDeletedFile := tmpfile.Name()
defer tmpfile.Close()
dur, err := time.ParseDuration("-10m")
@@ -379,11 +378,10 @@ func TestCleanTempNginxCfg(t *testing.T) {
t.Fatal(err)
}
- tmpfile, err = os.CreateTemp(filepath.Join(os.TempDir(), "nginx"), tempNginxPattern)
+ tmpfile, err = os.CreateTemp("", tempNginxPattern)
if err != nil {
t.Fatal(err)
}
- expectedFile := tmpfile.Name()
defer tmpfile.Close()
err = cleanTempNginxCfg()
@@ -393,8 +391,8 @@ func TestCleanTempNginxCfg(t *testing.T) {
var files []string
- err = filepath.Walk(filepath.Join(os.TempDir(), "nginx"), func(path string, info os.FileInfo, _ error) error {
- if info.IsDir() && filepath.Join(os.TempDir(), "nginx") != path {
+ err = filepath.Walk(os.TempDir(), func(path string, info os.FileInfo, err error) error {
+ if info.IsDir() && os.TempDir() != path {
return filepath.SkipDir
}
@@ -407,22 +405,12 @@ func TestCleanTempNginxCfg(t *testing.T) {
t.Fatal(err)
}
- // some other files can be created by other tests
- var found bool
- for _, file := range files {
- if file == expectedDeletedFile {
- t.Errorf("file %s should be deleted", file)
- }
- if file == expectedFile {
- found = true
- }
- }
- if !found {
- t.Errorf("file %s should not be deleted", expectedFile)
+ if len(files) != 1 {
+ t.Errorf("expected one file but %d were found", len(files))
}
}
-//nolint:unparam // Ignore `network` always receives `"tcp"` error
+//nolint:unparam // Ingnore `network` always receives `"tcp"` error
func tryListen(network, address string) (l net.Listener, err error) {
condFunc := func() (bool, error) {
l, err = net.Listen(network, address)
diff --git a/internal/ingress/controller/status.go b/internal/ingress/controller/status.go
index 5a169e1c3..e061b2cb7 100644
--- a/internal/ingress/controller/status.go
+++ b/internal/ingress/controller/status.go
@@ -36,8 +36,7 @@ import (
type leaderElectionConfig struct {
Client clientset.Interface
- ElectionID string
- ElectionTTL time.Duration
+ ElectionID string
OnStartedLeading func(chan struct{})
OnStoppedLeading func()
@@ -60,7 +59,7 @@ func setupLeaderElection(config *leaderElectionConfig) {
var stopCh chan struct{}
callbacks := leaderelection.LeaderCallbacks{
- OnStartedLeading: func(_ context.Context) {
+ OnStartedLeading: func(ctx context.Context) {
klog.V(2).InfoS("I am the new leader")
stopCh = make(chan struct{})
@@ -108,11 +107,13 @@ func setupLeaderElection(config *leaderElectionConfig) {
LockConfig: resourceLockConfig,
}
+ ttl := 30 * time.Second
+
elector, err = leaderelection.NewLeaderElector(leaderelection.LeaderElectionConfig{
Lock: lock,
- LeaseDuration: config.ElectionTTL,
- RenewDeadline: config.ElectionTTL / 2,
- RetryPeriod: config.ElectionTTL / 4,
+ LeaseDuration: ttl,
+ RenewDeadline: ttl / 2,
+ RetryPeriod: ttl / 4,
Callbacks: callbacks,
})
diff --git a/internal/ingress/controller/store/endpointslice_test.go b/internal/ingress/controller/store/endpointslice_test.go
index 0bdb3aa33..5d423a3a6 100644
--- a/internal/ingress/controller/store/endpointslice_test.go
+++ b/internal/ingress/controller/store/endpointslice_test.go
@@ -88,7 +88,7 @@ func TestEndpointSliceLister(t *testing.T) {
}
eps, err := el.MatchByKey(key)
if err != nil {
- t.Errorf("unexpected error %v", err)
+ t.Errorf("unexpeted error %v", err)
}
if err == nil && len(eps) != 1 {
t.Errorf("expected one slice %v, error, got %d slices", endpointSlice, len(eps))
@@ -130,7 +130,7 @@ func TestEndpointSliceLister(t *testing.T) {
}
eps, err := el.MatchByKey(key)
if err != nil {
- t.Errorf("unexpected error %v", err)
+ t.Errorf("unexpeted error %v", err)
}
if len(eps) != 1 {
t.Errorf("expected one slice %v, error, got %d slices", endpointSlice, len(eps))
diff --git a/internal/ingress/controller/store/store.go b/internal/ingress/controller/store/store.go
index d4bd6136f..4288785de 100644
--- a/internal/ingress/controller/store/store.go
+++ b/internal/ingress/controller/store/store.go
@@ -240,8 +240,6 @@ type k8sStore struct {
backendConfigMu *sync.RWMutex
defaultSSLCertificate string
-
- recorder record.EventRecorder
}
// New creates a new object store to be used in the ingress controller.
@@ -281,7 +279,6 @@ func New(
recorder := eventBroadcaster.NewRecorder(scheme.Scheme, corev1.EventSource{
Component: "nginx-ingress-controller",
})
- store.recorder = recorder
// k8sStore fulfills resolver.Resolver interface
store.annotations = annotations.NewAnnotationExtractor(store)
@@ -295,7 +292,7 @@ func New(
// the memory consumption of nginx-ingress-controller explode.
// In order to avoid that we filter out labels OWNER=TILLER.
labelsTweakListOptionsFunc := func(options *metav1.ListOptions) {
- if options.LabelSelector != "" {
+ if len(options.LabelSelector) > 0 {
options.LabelSelector += ",OWNER!=TILLER"
} else {
options.LabelSelector = "OWNER!=TILLER"
@@ -941,9 +938,6 @@ func (s *k8sStore) syncIngress(ing *networkingv1.Ingress) {
klog.Error(err)
return
}
- if parsed.Denied != nil {
- s.recorder.Eventf(ing, corev1.EventTypeWarning, "AnnotationParsingFailed", fmt.Sprintf("Error parsing annotations: %v", *parsed.Denied))
- }
err = s.listers.IngressWithAnnotation.Update(&ingress.Ingress{
Ingress: *copyIng,
ParsedAnnotations: parsed,
diff --git a/internal/ingress/controller/store/store_test.go b/internal/ingress/controller/store/store_test.go
index 9c719af3b..317c0f36c 100644
--- a/internal/ingress/controller/store/store_test.go
+++ b/internal/ingress/controller/store/store_test.go
@@ -1208,13 +1208,13 @@ func TestStore(t *testing.T) {
}
}(updateCh)
- namespaceSelector, err := labels.Parse("foo=bar")
+ namesapceSelector, err := labels.Parse("foo=bar")
if err != nil {
t.Errorf("unexpected error: %v", err)
}
storer := New(
ns,
- namespaceSelector,
+ namesapceSelector,
fmt.Sprintf("%v/config", ns),
fmt.Sprintf("%v/tcp", ns),
fmt.Sprintf("%v/udp", ns),
@@ -1274,7 +1274,7 @@ func TestStore(t *testing.T) {
t.Errorf("expected 0 events of type Delete but %v occurred", del)
}
})
- // test add ingress with secret it doesn't exist and then add secret
+ // test add ingress with secret it doesn't exists and then add secret
// check secret is generated on fs
// check ocsp
// check invalid secret (missing crt)
diff --git a/internal/ingress/controller/template/configmap.go b/internal/ingress/controller/template/configmap.go
index febf20be0..9dc019bcc 100644
--- a/internal/ingress/controller/template/configmap.go
+++ b/internal/ingress/controller/template/configmap.go
@@ -31,7 +31,6 @@ import (
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/ingress-nginx/internal/ingress/annotations/authreq"
- "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/parser"
"k8s.io/ingress-nginx/internal/ingress/controller/config"
ing_net "k8s.io/ingress-nginx/internal/net"
@@ -55,7 +54,6 @@ const (
nginxStatusIpv6Whitelist = "nginx-status-ipv6-whitelist"
proxyHeaderTimeout = "proxy-protocol-header-timeout"
workerProcesses = "worker-processes"
- globalAllowedResponseHeaders = "global-allowed-response-headers"
globalAuthURL = "global-auth-url"
globalAuthMethod = "global-auth-method"
globalAuthSignin = "global-auth-signin"
@@ -67,8 +65,8 @@ const (
globalAuthCacheDuration = "global-auth-cache-duration"
globalAuthAlwaysSetCookie = "global-auth-always-set-cookie"
luaSharedDictsKey = "lua-shared-dicts"
+ plugins = "plugins"
debugConnections = "debug-connections"
- workerSerialReloads = "enable-serial-reloads"
)
var (
@@ -82,6 +80,7 @@ var (
"balancer_ewma_locks": 1024,
"certificate_servers": 5120,
"ocsp_response_cache": 5120, // keep this same as certificate_servers
+ "global_throttle_cache": 10240,
}
defaultGlobalAuthRedirectParam = "rd"
)
@@ -116,7 +115,6 @@ func ReadConfig(src map[string]string) config.Configuration {
blockUserAgentList := make([]string, 0)
blockRefererList := make([]string, 0)
responseHeaders := make([]string, 0)
- allowedResponseHeaders := make([]string, 0)
luaSharedDicts := make(map[string]int)
debugConnectionsList := make([]string, 0)
@@ -125,11 +123,8 @@ func ReadConfig(src map[string]string) config.Configuration {
delete(conf, luaSharedDictsKey)
lsd := splitAndTrimSpace(val, ",")
for _, v := range lsd {
- results := strings.SplitN(strings.ReplaceAll(v, " ", ""), ":", 2)
- if len(results) != 2 {
- klog.Errorf("Ignoring poorly formatted Lua dictionary %v", v)
- continue
- }
+ v = strings.ReplaceAll(v, " ", "")
+ results := strings.SplitN(v, ":", 2)
dictName := results[0]
size := dictStrToKb(results[1])
if size < 0 {
@@ -253,22 +248,6 @@ func ReadConfig(src map[string]string) config.Configuration {
}
}
- // Verify that the configured global external authorization response headers are valid. if not, set the default value
- if val, ok := conf[globalAllowedResponseHeaders]; ok {
- delete(conf, globalAllowedResponseHeaders)
-
- if val != "" {
- harr := splitAndTrimSpace(val, ",")
- for _, header := range harr {
- if !customheaders.ValidHeader(header) {
- klog.Warningf("Global allowed response headers denied - %s.", header)
- } else {
- allowedResponseHeaders = append(allowedResponseHeaders, header)
- }
- }
- }
- }
-
// Verify that the configured global external authorization method is a valid HTTP method. if not, set the default value
if val, ok := conf[globalAuthMethod]; ok {
delete(conf, globalAuthMethod)
@@ -406,15 +385,9 @@ func ReadConfig(src map[string]string) config.Configuration {
delete(conf, workerProcesses)
}
- if val, ok := conf[workerSerialReloads]; ok {
- boolVal, err := strconv.ParseBool(val)
- if err != nil {
- to.WorkerSerialReloads = false
- klog.Warningf("failed to parse enable-serial-reloads setting, valid values are true or false, found %s", val)
- } else {
- to.WorkerSerialReloads = boolVal
- }
- delete(conf, workerSerialReloads)
+ if val, ok := conf[plugins]; ok {
+ to.Plugins = splitAndTrimSpace(val, ",")
+ delete(conf, plugins)
}
if val, ok := conf[debugConnections]; ok {
@@ -449,7 +422,6 @@ func ReadConfig(src map[string]string) config.Configuration {
to.ProxyStreamResponses = streamResponses
to.DisableIpv6DNS = !ing_net.IsIPv6Enabled()
to.LuaSharedDicts = luaSharedDicts
- to.Backend.AllowedResponseHeaders = allowedResponseHeaders
decoderConfig := &mapstructure.DecoderConfig{
Metadata: nil,
diff --git a/internal/ingress/controller/template/configmap_test.go b/internal/ingress/controller/template/configmap_test.go
index 6c7468303..dad841694 100644
--- a/internal/ingress/controller/template/configmap_test.go
+++ b/internal/ingress/controller/template/configmap_test.go
@@ -390,11 +390,6 @@ func TestLuaSharedDictsParsing(t *testing.T) {
entry: map[string]string{"lua-shared-dicts": "configuration_data: 10, my_random_dict:15 , another_example:2"},
expect: map[string]int{"configuration_data": 10240, "my_random_dict": 15360, "another_example": 2048},
},
- {
- name: "invalid format",
- entry: map[string]string{"lua-shared-dicts": "mydict: 10, invalid_dict 100"},
- expect: map[string]int{"mydict": 10240},
- },
{
name: "invalid size value should be ignored",
entry: map[string]string{"lua-shared-dicts": "mydict: 10, invalid_dict: 1a, bad_mb_dict:10mb"},
diff --git a/internal/ingress/controller/template/template.go b/internal/ingress/controller/template/template.go
index ed052e4ec..7410ce6e0 100644
--- a/internal/ingress/controller/template/template.go
+++ b/internal/ingress/controller/template/template.go
@@ -136,13 +136,6 @@ func cleanConf(in, out *bytes.Buffer) error {
case ' ', '\t':
needOutput = lineStarted
case '\r':
- rest := in.Bytes()
- if len(rest) > 0 {
- if rest[0] != '\n' {
- c = ' '
- needOutput = lineStarted
- }
- }
case '\n':
needOutput = !(!lineStarted && emptyLineWritten)
nextLineStarted = false
@@ -157,13 +150,6 @@ func cleanConf(in, out *bytes.Buffer) error {
case stateComment:
switch c {
case '\r':
- rest := in.Bytes()
- if len(rest) > 0 {
- if rest[0] != '\n' {
- c = ' '
- needOutput = lineStarted
- }
- }
case '\n':
needOutput = true
nextLineStarted = false
@@ -194,41 +180,6 @@ func cleanConf(in, out *bytes.Buffer) error {
}
}
-/* LuaConfig defines the structure that will be written as a config for lua scripts
-The json format should follow what's expected by lua:
- use_forwarded_headers = %t,
- use_proxy_protocol = %t,
- is_ssl_passthrough_enabled = %t,
- http_redirect_code = %v,
- listen_ports = { ssl_proxy = "%v", https = "%v" },
-
- hsts = %t,
- hsts_max_age = %v,
- hsts_include_subdomains = %t,
- hsts_preload = %t,
-*/
-
-type LuaConfig struct {
- EnableMetrics bool `json:"enable_metrics"`
- ListenPorts LuaListenPorts `json:"listen_ports"`
- UseForwardedHeaders bool `json:"use_forwarded_headers"`
- UseProxyProtocol bool `json:"use_proxy_protocol"`
- IsSSLPassthroughEnabled bool `json:"is_ssl_passthrough_enabled"`
- HTTPRedirectCode int `json:"http_redirect_code"`
- EnableOCSP bool `json:"enable_ocsp"`
- MonitorBatchMaxSize int `json:"monitor_batch_max_size"`
- HSTS bool `json:"hsts"`
- HSTSMaxAge string `json:"hsts_max_age"`
- HSTSIncludeSubdomains bool `json:"hsts_include_subdomains"`
- HSTSPreload bool `json:"hsts_preload"`
-}
-
-type LuaListenPorts struct {
- HTTPSPort string `json:"https"`
- StatusPort string `json:"status_port"`
- SSLProxyPort string `json:"ssl_proxy"`
-}
-
// Write populates a buffer using a template with NGINX configuration
// and the servers and upstreams created by Ingress rules
func (t *Template) Write(conf *config.TemplateConfig) ([]byte, error) {
@@ -291,6 +242,7 @@ var funcMap = text_template.FuncMap{
"filterRateLimits": filterRateLimits,
"buildRateLimitZones": buildRateLimitZones,
"buildRateLimit": buildRateLimit,
+ "configForLua": configForLua,
"locationConfigForLua": locationConfigForLua,
"buildResolvers": buildResolvers,
"buildUpstreamName": buildUpstreamName,
@@ -417,6 +369,54 @@ func luaConfigurationRequestBodySize(c interface{}) string {
return dictKbToStr(size)
}
+// configForLua returns some general configuration as Lua table represented as string
+func configForLua(input interface{}) string {
+ all, ok := input.(config.TemplateConfig)
+ if !ok {
+ klog.Errorf("expected a 'config.TemplateConfig' type but %T was given", input)
+ return "{}"
+ }
+
+ return fmt.Sprintf(`{
+ use_forwarded_headers = %t,
+ use_proxy_protocol = %t,
+ is_ssl_passthrough_enabled = %t,
+ http_redirect_code = %v,
+ listen_ports = { ssl_proxy = "%v", https = "%v" },
+
+ hsts = %t,
+ hsts_max_age = %v,
+ hsts_include_subdomains = %t,
+ hsts_preload = %t,
+
+ global_throttle = {
+ memcached = {
+ host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, pool_size = %d,
+ },
+ status_code = %d,
+ }
+ }`,
+ all.Cfg.UseForwardedHeaders,
+ all.Cfg.UseProxyProtocol,
+ all.IsSSLPassthroughEnabled,
+ all.Cfg.HTTPRedirectCode,
+ all.ListenPorts.SSLProxy,
+ all.ListenPorts.HTTPS,
+
+ all.Cfg.HSTS,
+ all.Cfg.HSTSMaxAge,
+ all.Cfg.HSTSIncludeSubdomains,
+ all.Cfg.HSTSPreload,
+
+ all.Cfg.GlobalRateLimitMemcachedHost,
+ all.Cfg.GlobalRateLimitMemcachedPort,
+ all.Cfg.GlobalRateLimitMemcachedConnectTimeout,
+ all.Cfg.GlobalRateLimitMemcachedMaxIdleTimeout,
+ all.Cfg.GlobalRateLimitMemcachedPoolSize,
+ all.Cfg.GlobalRateLimitStatucCode,
+ )
+}
+
// locationConfigForLua formats some location specific configuration into Lua table represented as string
func locationConfigForLua(l, a interface{}) string {
location, ok := l.(*ingress.Location)
@@ -431,26 +431,30 @@ func locationConfigForLua(l, a interface{}) string {
return "{}"
}
- /* Lua expects the following vars
- force_ssl_redirect = string_to_bool(ngx.var.force_ssl_redirect),
- ssl_redirect = string_to_bool(ngx.var.ssl_redirect),
- force_no_ssl_redirect = string_to_bool(ngx.var.force_no_ssl_redirect),
- preserve_trailing_slash = string_to_bool(ngx.var.preserve_trailing_slash),
- use_port_in_redirects = string_to_bool(ngx.var.use_port_in_redirects),
- */
+ ignoredCIDRs, err := convertGoSliceIntoLuaTable(location.GlobalRateLimit.IgnoredCIDRs, false)
+ if err != nil {
+ klog.Errorf("failed to convert %v into Lua table: %q", location.GlobalRateLimit.IgnoredCIDRs, err)
+ ignoredCIDRs = "{}"
+ }
- return fmt.Sprintf(`
- set $force_ssl_redirect "%t";
- set $ssl_redirect "%t";
- set $force_no_ssl_redirect "%t";
- set $preserve_trailing_slash "%t";
- set $use_port_in_redirects "%t";
- `,
+ return fmt.Sprintf(`{
+ force_ssl_redirect = %t,
+ ssl_redirect = %t,
+ force_no_ssl_redirect = %t,
+ preserve_trailing_slash = %t,
+ use_port_in_redirects = %t,
+ global_throttle = { namespace = "%v", limit = %d, window_size = %d, key = %v, ignored_cidrs = %v },
+ }`,
location.Rewrite.ForceSSLRedirect,
location.Rewrite.SSLRedirect,
isLocationInLocationList(l, all.Cfg.NoTLSRedirectLocations),
location.Rewrite.PreserveTrailingSlash,
location.UsePortInRedirects,
+ location.GlobalRateLimit.Namespace,
+ location.GlobalRateLimit.Limit,
+ location.GlobalRateLimit.WindowSize,
+ parseComplexNginxVarIntoLuaTable(location.GlobalRateLimit.Key),
+ ignoredCIDRs,
)
}
@@ -493,7 +497,7 @@ func buildResolvers(res, disableIpv6 interface{}) string {
}
func needsRewrite(location *ingress.Location) bool {
- if location.Rewrite.Target != "" && location.Rewrite.Target != location.Path {
+ if len(location.Rewrite.Target) > 0 && location.Rewrite.Target != location.Path {
return true
}
return false
@@ -602,12 +606,17 @@ func buildAuthResponseHeaders(proxySetHeader string, headers []string, lua bool)
return res
}
-func buildAuthUpstreamLuaHeaders(headers []string) string {
+func buildAuthUpstreamLuaHeaders(headers []string) []string {
+ res := []string{}
+
if len(headers) == 0 {
- return ""
+ return res
}
- return strings.Join(headers, ",")
+ for i, h := range headers {
+ res = append(res, fmt.Sprintf("ngx.var.authHeader%d = res.header['%s']", i, h))
+ }
+ return res
}
func buildAuthProxySetHeaders(headers map[string]string) []string {
@@ -762,10 +771,10 @@ func buildProxyPass(_ string, b, loc interface{}) string {
return defProxyPass
}
- if location.Rewrite.Target != "" {
+ if len(location.Rewrite.Target) > 0 {
var xForwardedPrefix string
- if location.XForwardedPrefix != "" {
+ if len(location.XForwardedPrefix) > 0 {
xForwardedPrefix = fmt.Sprintf("%s X-Forwarded-Prefix %q;\n", proxySetHeader(location), location.XForwardedPrefix)
}
@@ -1492,8 +1501,13 @@ func httpsListener(addresses []string, co string, tc *config.TemplateConfig) []s
}
}
- lo = append(lo, co, "ssl;")
+ lo = append(lo, co, "ssl")
+ if tc.Cfg.UseHTTP2 {
+ lo = append(lo, "http2")
+ }
+
+ lo = append(lo, ";")
out = append(out, strings.Join(lo, " "))
}
@@ -1667,6 +1681,54 @@ func buildServerName(hostname string) string {
return `~^(?[\w-]+)\.` + strings.Join(parts, "\\.") + `$`
}
+// parseComplexNginxVarIntoLuaTable parses things like "$my${complex}ngx\$var" into
+// [["$var", "complex", "my", "ngx"]]. In other words, 2nd and 3rd elements
+// in the result are actual NGINX variable names, whereas first and 4th elements
+// are string literals.
+func parseComplexNginxVarIntoLuaTable(ngxVar string) string {
+ r := regexp.MustCompile(`(\\\$[0-9a-zA-Z_]+)|\$\{([0-9a-zA-Z_]+)\}|\$([0-9a-zA-Z_]+)|(\$|[^$\\]+)`)
+ matches := r.FindAllStringSubmatch(ngxVar, -1)
+ components := make([][]string, len(matches))
+ for i, match := range matches {
+ components[i] = match[1:]
+ }
+
+ luaTable, err := convertGoSliceIntoLuaTable(components, true)
+ if err != nil {
+ klog.Errorf("unexpected error: %v", err)
+ luaTable = "{}"
+ }
+ return luaTable
+}
+
+func convertGoSliceIntoLuaTable(goSliceInterface interface{}, emptyStringAsNil bool) (string, error) {
+ goSlice := reflect.ValueOf(goSliceInterface)
+ kind := goSlice.Kind()
+
+ switch kind {
+ case reflect.String:
+ if emptyStringAsNil && goSlice.Interface().(string) == "" {
+ return "nil", nil
+ }
+ return fmt.Sprintf(`"%v"`, goSlice.Interface()), nil
+ case reflect.Int, reflect.Bool:
+ return fmt.Sprintf(`%v`, goSlice.Interface()), nil
+ case reflect.Slice, reflect.Array:
+ luaTable := "{ "
+ for i := 0; i < goSlice.Len(); i++ {
+ luaEl, err := convertGoSliceIntoLuaTable(goSlice.Index(i).Interface(), emptyStringAsNil)
+ if err != nil {
+ return "", err
+ }
+ luaTable = luaTable + luaEl + ", "
+ }
+ luaTable += "}"
+ return luaTable, nil
+ default:
+ return "", fmt.Errorf("could not process type: %s", kind)
+ }
+}
+
func buildOriginRegex(origin string) string {
origin = regexp.QuoteMeta(origin)
origin = strings.Replace(origin, "\\*", `[A-Za-z0-9\-]+`, 1)
@@ -1681,7 +1743,7 @@ func buildCorsOriginRegex(corsOrigins []string) string {
originsRegex := "if ($http_origin ~* ("
for i, origin := range corsOrigins {
originTrimmed := strings.TrimSpace(origin)
- if originTrimmed != "" {
+ if len(originTrimmed) > 0 {
builtOrigin := buildOriginRegex(originTrimmed)
originsRegex += builtOrigin
if i != len(corsOrigins)-1 {
diff --git a/internal/ingress/controller/template/template_test.go b/internal/ingress/controller/template/template_test.go
index 6553f5daf..3089e3b32 100644
--- a/internal/ingress/controller/template/template_test.go
+++ b/internal/ingress/controller/template/template_test.go
@@ -537,7 +537,10 @@ func TestBuildAuthResponseHeaders(t *testing.T) {
func TestBuildAuthResponseLua(t *testing.T) {
externalAuthResponseHeaders := []string{"h1", "H-With-Caps-And-Dashes"}
- expected := "h1,H-With-Caps-And-Dashes"
+ expected := []string{
+ "ngx.var.authHeader0 = res.header['h1']",
+ "ngx.var.authHeader1 = res.header['H-With-Caps-And-Dashes']",
+ }
headers := buildAuthUpstreamLuaHeaders(externalAuthResponseHeaders)
@@ -1923,6 +1926,89 @@ func TestBuildServerName(t *testing.T) {
}
}
+func TestParseComplexNginxVarIntoLuaTable(t *testing.T) {
+ testCases := []struct {
+ ngxVar string
+ expectedLuaTable string
+ }{
+ {"foo", `{ { nil, nil, nil, "foo", }, }`},
+ {"$foo", `{ { nil, nil, "foo", nil, }, }`},
+ {"${foo}", `{ { nil, "foo", nil, nil, }, }`},
+ {"\\$foo", `{ { "\$foo", nil, nil, nil, }, }`},
+ {
+ "foo\\$bar$baz${daz}xiyar$pomidor",
+ `{ { nil, nil, nil, "foo", }, { "\$bar", nil, nil, nil, }, { nil, nil, "baz", nil, }, ` +
+ `{ nil, "daz", nil, nil, }, { nil, nil, nil, "xiyar", }, { nil, nil, "pomidor", nil, }, }`,
+ },
+ }
+
+ for _, testCase := range testCases {
+ actualLuaTable := parseComplexNginxVarIntoLuaTable(testCase.ngxVar)
+ if actualLuaTable != testCase.expectedLuaTable {
+ t.Errorf("expected %v but returned %v", testCase.expectedLuaTable, actualLuaTable)
+ }
+ }
+}
+
+func TestConvertGoSliceIntoLuaTablet(t *testing.T) {
+ testCases := []struct {
+ title string
+ goSlice interface{}
+ emptyStringAsNil bool
+ expectedLuaTable string
+ expectedErr error
+ }{
+ {
+ "flat string slice",
+ []string{"one", "two", "three"},
+ false,
+ `{ "one", "two", "three", }`,
+ nil,
+ },
+ {
+ "nested string slice",
+ [][]string{{"one", "", "three"}, {"foo", "bar"}},
+ false,
+ `{ { "one", "", "three", }, { "foo", "bar", }, }`,
+ nil,
+ },
+ {
+ "converts empty string to nil when enabled",
+ [][]string{{"one", "", "three"}, {"foo", "bar"}},
+ true,
+ `{ { "one", nil, "three", }, { "foo", "bar", }, }`,
+ nil,
+ },
+ {
+ "boolean slice",
+ []bool{true, true, false},
+ false,
+ `{ true, true, false, }`,
+ nil,
+ },
+ {
+ "integer slice",
+ []int{4, 3, 6},
+ false,
+ `{ 4, 3, 6, }`,
+ nil,
+ },
+ }
+
+ for _, testCase := range testCases {
+ actualLuaTable, err := convertGoSliceIntoLuaTable(testCase.goSlice, testCase.emptyStringAsNil)
+ if testCase.expectedErr != nil && err != nil && testCase.expectedErr.Error() != err.Error() {
+ t.Errorf("expected error '%v' but returned '%v'", testCase.expectedErr, err)
+ }
+ if testCase.expectedErr == nil && err != nil {
+ t.Errorf("expected error to be nil but returned '%v'", err)
+ }
+ if testCase.expectedLuaTable != actualLuaTable {
+ t.Errorf("%v: expected '%v' but returned '%v'", testCase.title, testCase.expectedLuaTable, actualLuaTable)
+ }
+ }
+}
+
func TestCleanConf(t *testing.T) {
testDataDir, err := getTestDataDir()
if err != nil {
diff --git a/internal/ingress/controller/util.go b/internal/ingress/controller/util.go
index 975fb822a..8851f323f 100644
--- a/internal/ingress/controller/util.go
+++ b/internal/ingress/controller/util.go
@@ -98,9 +98,8 @@ func rlimitMaxNumFiles() int {
}
const (
- defBinary = "/usr/bin/nginx"
- cfgPath = "/etc/nginx/nginx.conf"
- luaCfgPath = "/etc/nginx/lua/cfg.json"
+ defBinary = "/usr/bin/nginx"
+ cfgPath = "/etc/nginx/nginx.conf"
)
// NginxExecTester defines the interface to execute
@@ -130,7 +129,7 @@ func NewNginxCommand() NginxCommand {
return command
}
-// ExecCommand instantiates an exec.Cmd object to call nginx program
+// ExecCommand instanciates an exec.Cmd object to call nginx program
func (nc NginxCommand) ExecCommand(args ...string) *exec.Cmd {
cmdArgs := []string{}
diff --git a/internal/ingress/defaults/main.go b/internal/ingress/defaults/main.go
index bec1b08e2..2bb58c858 100644
--- a/internal/ingress/defaults/main.go
+++ b/internal/ingress/defaults/main.go
@@ -69,11 +69,6 @@ type Backend struct {
// http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffer_size)
ProxyBufferSize string `json:"proxy-buffer-size"`
- // Limits the total size of buffers that can be busy sending a response to the client while
- // the response is not yet fully read.
- // http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_busy_buffers_size
- ProxyBusyBuffersSize string `json:"proxy-busy-buffers-size"`
-
// Sets a text that should be changed in the path attribute of the “Set-Cookie” header fields of
// a proxied server response.
// http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_cookie_path
@@ -130,11 +125,6 @@ type Backend struct {
// Default: false
UsePortInRedirects bool `json:"use-port-in-redirects"`
- // Enables or disables relative redirects. By default nginx uses absolute redirects.
- // http://nginx.org/en/docs/http/ngx_http_core_module.html#absolute_redirect
- // Default: false
- RelativeRedirects bool `json:"relative-redirects"`
-
// Enable stickiness by client-server mapping based on a NGINX variable, text or a combination of both.
// A consistent hashing method will be used which ensures only a few keys would be remapped to different
// servers on upstream group changes
@@ -186,9 +176,6 @@ type Backend struct {
// By default, the NGINX ingress controller uses a list of all endpoints (Pod IP/port) in the NGINX upstream configuration.
// It disables that behavior and instead uses a single upstream in NGINX, the service's Cluster IP and port.
ServiceUpstream bool `json:"service-upstream"`
-
- // AllowedResponseHeaders allows to define allow response headers for custom header annotation
- AllowedResponseHeaders []string `json:"global-allowed-response-headers"`
}
type SecurityConfiguration struct {
diff --git a/internal/ingress/errors/errors.go b/internal/ingress/errors/errors.go
index 62be8b77f..d70218334 100644
--- a/internal/ingress/errors/errors.go
+++ b/internal/ingress/errors/errors.go
@@ -137,7 +137,7 @@ func IsValidationError(e error) bool {
return ok
}
-// NewRiskyAnnotations returns a new LocationDenied error
+// NewValidationError returns a new LocationDenied error
func NewRiskyAnnotations(name string) error {
return RiskyAnnotationError{
Reason: fmt.Errorf("annotation group %s contains risky annotation based on ingress configuration", name),
diff --git a/internal/ingress/metric/collectors/admission.go b/internal/ingress/metric/collectors/admission.go
index 456f56963..7b84325c0 100644
--- a/internal/ingress/metric/collectors/admission.go
+++ b/internal/ingress/metric/collectors/admission.go
@@ -151,7 +151,7 @@ func (am *AdmissionCollector) SetAdmissionMetrics(testedIngressLength, testedIng
testedIngressTime,
renderingIngressLength,
renderingIngressTime,
- admissionTime,
ByteFormat(int64(testedConfigurationSize)),
+ admissionTime,
)
}
diff --git a/internal/ingress/metric/collectors/admission_test.go b/internal/ingress/metric/collectors/admission_test.go
index a23384a88..68208ad3e 100644
--- a/internal/ingress/metric/collectors/admission_test.go
+++ b/internal/ingress/metric/collectors/admission_test.go
@@ -59,7 +59,7 @@ func TestAdmissionCounters(t *testing.T) {
}{
{
name: "should return 0 as values on a fresh initiated collector",
- test: func(_ *AdmissionCollector) {
+ test: func(am *AdmissionCollector) {
},
want: metadataFirst + `
nginx_ingress_controller_admission_config_size{controller_class="nginx",controller_namespace="default",controller_pod="pod"} 0
diff --git a/internal/ingress/metric/collectors/controller.go b/internal/ingress/metric/collectors/controller.go
index 0df04c1d0..e1d6789bb 100644
--- a/internal/ingress/metric/collectors/controller.go
+++ b/internal/ingress/metric/collectors/controller.go
@@ -30,7 +30,7 @@ import (
var (
operation = []string{"controller_namespace", "controller_class", "controller_pod"}
ingressOperation = []string{"controller_namespace", "controller_class", "controller_pod", "namespace", "ingress"}
- sslLabelHost = []string{"namespace", "class", "host", "secret_name", "identifier"}
+ sslLabelHost = []string{"namespace", "class", "host", "secret_name"}
sslInfoLabels = []string{"namespace", "class", "host", "secret_name", "identifier", "issuer_organization", "issuer_common_name", "serial_number", "public_key_algorithm"}
orphanityLabels = []string{"controller_namespace", "controller_class", "controller_pod", "namespace", "ingress", "type"}
)
@@ -225,7 +225,7 @@ func (cm *Controller) IncCheckErrorCount(namespace, name string) {
cm.checkIngressOperationErrors.MustCurryWith(cm.constLabels).With(labels).Inc()
}
-// IncOrphanIngress sets the orphaned ingress gauge to one
+// IncOrphanIngress sets the the orphaned ingress gauge to one
func (cm *Controller) IncOrphanIngress(namespace, name, orphanityType string) {
labels := prometheus.Labels{
"namespace": namespace,
@@ -235,7 +235,7 @@ func (cm *Controller) IncOrphanIngress(namespace, name, orphanityType string) {
cm.OrphanIngress.MustCurryWith(cm.constLabels).With(labels).Set(1.0)
}
-// DecOrphanIngress sets the orphaned ingress gauge to zero (all services has their endpoints)
+// DecOrphanIngress sets the the orphaned ingress gauge to zero (all services has their endpoints)
func (cm *Controller) DecOrphanIngress(namespace, name, orphanityType string) {
labels := prometheus.Labels{
"namespace": namespace,
@@ -305,14 +305,12 @@ func (cm *Controller) SetSSLExpireTime(servers []*ingress.Server) {
}
labels["host"] = s.Hostname
labels["secret_name"] = s.SSLCert.Name
- labels["namespace"] = s.SSLCert.Namespace
- labels["identifier"] = s.SSLCert.Identifier()
cm.sslExpireTime.With(labels).Set(float64(s.SSLCert.ExpireTime.Unix()))
}
}
-// SetSSLInfo creates a metric with all certificate information
+// SetSSLInfo creates a metric with all certificates informations
func (cm *Controller) SetSSLInfo(servers []*ingress.Server) {
for _, s := range servers {
if s.SSLCert == nil || s.SSLCert.Certificate == nil || s.SSLCert.Certificate.SerialNumber == nil {
@@ -339,9 +337,9 @@ func (cm *Controller) SetSSLInfo(servers []*ingress.Server) {
}
}
-// RemoveMetrics removes metrics for certificates not available anymore by identifier
-func (cm *Controller) RemoveMetrics(certificates []string, registry prometheus.Gatherer) {
- cm.removeSSLExpireMetrics(true, certificates, registry)
+// RemoveMetrics removes metrics for hostnames not available anymore
+func (cm *Controller) RemoveMetrics(hosts, certificates []string, registry prometheus.Gatherer) {
+ cm.removeSSLExpireMetrics(true, hosts, registry)
cm.removeCertificatesMetrics(true, certificates, registry)
}
@@ -392,14 +390,14 @@ func (cm *Controller) removeCertificatesMetrics(onlyDefinedHosts bool, certifica
}
}
-func (cm *Controller) removeSSLExpireMetrics(onlyDefinedCerts bool, certificates []string, registry prometheus.Gatherer) {
+func (cm *Controller) removeSSLExpireMetrics(onlyDefinedHosts bool, hosts []string, registry prometheus.Gatherer) {
mfs, err := registry.Gather()
if err != nil {
klog.ErrorS(err, "Error gathering metrics")
return
}
- toRemove := sets.NewString(certificates...)
+ toRemove := sets.NewString(hosts...)
for _, mf := range mfs {
metricName := mf.GetName()
@@ -416,24 +414,19 @@ func (cm *Controller) removeSSLExpireMetrics(onlyDefinedCerts bool, certificates
// remove labels that are constant
deleteConstants(labels)
- identifier, ok := labels["identifier"]
- if !ok {
- continue
- }
-
host, ok := labels["host"]
if !ok {
continue
}
- if onlyDefinedCerts && !toRemove.Has(identifier) {
+ if onlyDefinedHosts && !toRemove.Has(host) {
continue
}
- klog.V(2).InfoS("Removing prometheus metric", "gauge", metricName, "host", host, "identifier", identifier)
+ klog.V(2).InfoS("Removing prometheus metric", "gauge", metricName, "host", host)
removed := cm.sslExpireTime.Delete(labels)
if !removed {
- klog.V(2).InfoS("metric removed", "metric", metricName, "host", host, "identifier", identifier, "labels", labels)
+ klog.V(2).InfoS("metric removed", "metric", metricName, "host", host, "labels", labels)
}
}
}
diff --git a/internal/ingress/metric/collectors/controller_test.go b/internal/ingress/metric/collectors/controller_test.go
index a77293c20..15735df42 100644
--- a/internal/ingress/metric/collectors/controller_test.go
+++ b/internal/ingress/metric/collectors/controller_test.go
@@ -42,7 +42,7 @@ func TestControllerCounters(t *testing.T) {
}{
{
name: "should return not increment in metrics if no operations are invoked",
- test: func(_ *Controller) {
+ test: func(cm *Controller) {
},
want: metadata + `
nginx_ingress_controller_config_last_reload_successful{controller_class="nginx",controller_namespace="default",controller_pod="pod"} 0
@@ -88,17 +88,6 @@ func TestControllerCounters(t *testing.T) {
Hostname: "demo",
SSLCert: &ingress.SSLCert{
ExpireTime: t1,
- Name: "secret-name",
- Namespace: "secret-namespace",
- Certificate: &x509.Certificate{
- PublicKeyAlgorithm: x509.ECDSA,
- Issuer: pkix.Name{
- CommonName: "certificate issuer",
- SerialNumber: "abcd1234",
- Organization: []string{"issuer org"},
- },
- SerialNumber: big.NewInt(100),
- },
},
},
{
@@ -113,7 +102,7 @@ func TestControllerCounters(t *testing.T) {
want: `
# HELP nginx_ingress_controller_ssl_expire_time_seconds Number of seconds since 1970 to the SSL Certificate expire.\n An example to check if this certificate will expire in 10 days is: "nginx_ingress_controller_ssl_expire_time_seconds < (time() + (10 * 24 * 3600))"
# TYPE nginx_ingress_controller_ssl_expire_time_seconds gauge
- nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",identifier="abcd1234-100",namespace="secret-namespace",secret_name="secret-name"} 1.351807721e+09
+ nginx_ingress_controller_ssl_expire_time_seconds{class="nginx",host="demo",namespace="default",secret_name=""} 1.351807721e+09
`,
metrics: []string{"nginx_ingress_controller_ssl_expire_time_seconds"},
},
@@ -273,7 +262,7 @@ func TestRemoveMetrics(t *testing.T) {
cm.SetSSLExpireTime(servers)
cm.SetSSLInfo(servers)
- cm.RemoveMetrics([]string{"abcd1234-100"}, reg)
+ cm.RemoveMetrics([]string{"demo"}, []string{"abcd1234-100"}, reg)
if err := GatherAndCompare(cm, "", []string{"nginx_ingress_controller_ssl_expire_time_seconds"}, reg); err != nil {
t.Errorf("unexpected collecting result:\n%s", err)
diff --git a/internal/ingress/metric/collectors/process.go b/internal/ingress/metric/collectors/process.go
index 85e8066b5..3803a47ae 100644
--- a/internal/ingress/metric/collectors/process.go
+++ b/internal/ingress/metric/collectors/process.go
@@ -112,7 +112,7 @@ func NewNGINXProcess(pod, namespace, ingressClass string) (NGINXProcessCollector
p := &namedProcess{
scrapeChan: make(chan scrapeRequest),
- Grouper: proc.NewGrouper(nm, true, false, false, 0, false, false),
+ Grouper: proc.NewGrouper(nm, true, false, false, false),
fs: fs,
}
diff --git a/internal/ingress/metric/collectors/socket.go b/internal/ingress/metric/collectors/socket.go
index 0bdd816ae..a70024c57 100644
--- a/internal/ingress/metric/collectors/socket.go
+++ b/internal/ingress/metric/collectors/socket.go
@@ -64,10 +64,11 @@ type metricMapping map[string]prometheus.Collector
type SocketCollector struct {
prometheus.Collector
- connectTime *prometheus.HistogramVec
- headerTime *prometheus.HistogramVec
- requestTime *prometheus.HistogramVec
- responseTime *prometheus.HistogramVec
+ upstreamLatency *prometheus.SummaryVec // TODO: DEPRECATED, remove
+ connectTime *prometheus.HistogramVec
+ headerTime *prometheus.HistogramVec
+ requestTime *prometheus.HistogramVec
+ responseTime *prometheus.HistogramVec
requestLength *prometheus.HistogramVec
responseLength *prometheus.HistogramVec
@@ -81,9 +82,8 @@ type SocketCollector struct {
hosts sets.Set[string]
- metricsPerHost bool
- metricsPerUndefinedHost bool
- reportStatusClasses bool
+ metricsPerHost bool
+ reportStatusClasses bool
}
var requestTags = []string{
@@ -98,9 +98,13 @@ var requestTags = []string{
"canary",
}
+// DefObjectives was removed in https://github.com/prometheus/client_golang/pull/262
+// updating the library to latest version changed the output of the metrics
+var defObjectives = map[float64]float64{0.5: 0.05, 0.9: 0.01, 0.99: 0.001}
+
// NewSocketCollector creates a new SocketCollector instance using
// the ingress watch namespace and class used by the controller
-func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPerUndefinedHost, reportStatusClasses bool, buckets HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludeMetrics []string) (*SocketCollector, error) {
+func NewSocketCollector(pod, namespace, class string, metricsPerHost, reportStatusClasses bool, buckets HistogramBuckets, excludeMetrics []string) (*SocketCollector, error) {
socket := "/tmp/nginx/prometheus-nginx.socket"
// unix sockets must be unlink()ed before being used
//nolint:errcheck // Ignore unlink error
@@ -140,19 +144,16 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
sc := &SocketCollector{
listener: listener,
- metricsPerHost: metricsPerHost,
- metricsPerUndefinedHost: metricsPerUndefinedHost,
- reportStatusClasses: reportStatusClasses,
+ metricsPerHost: metricsPerHost,
+ reportStatusClasses: reportStatusClasses,
connectTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "connect_duration_seconds",
- Help: "The time spent on establishing a connection with the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "connect_duration_seconds",
+ Help: "The time spent on establishing a connection with the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
},
requestTags,
em,
@@ -161,13 +162,11 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
headerTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "header_duration_seconds",
- Help: "The time spent on receiving first header from the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "header_duration_seconds",
+ Help: "The time spent on receiving first header from the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
},
requestTags,
em,
@@ -175,13 +174,11 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
),
responseTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "response_duration_seconds",
- Help: "The time spent on receiving the response from the upstream server",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "response_duration_seconds",
+ Help: "The time spent on receiving the response from the upstream server",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
},
requestTags,
em,
@@ -190,13 +187,11 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
requestTime: histogramMetric(
&prometheus.HistogramOpts{
- Name: "request_duration_seconds",
- Help: "The request processing time in milliseconds",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.TimeBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "request_duration_seconds",
+ Help: "The request processing time in milliseconds",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.TimeBuckets,
},
requestTags,
em,
@@ -205,13 +200,11 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
responseLength: histogramMetric(
&prometheus.HistogramOpts{
- Name: "response_size",
- Help: "The response length (including request line, header, and request body)",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.LengthBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "response_size",
+ Help: "The response length (including request line, header, and request body)",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.LengthBuckets,
},
requestTags,
em,
@@ -220,13 +213,11 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
requestLength: histogramMetric(
&prometheus.HistogramOpts{
- Name: "request_size",
- Help: "The request length (including request line, header, and request body)",
- Namespace: PrometheusNamespace,
- ConstLabels: constLabels,
- Buckets: buckets.LengthBuckets,
- NativeHistogramBucketFactor: bucketFactor,
- NativeHistogramMaxBucketNumber: maxBuckets,
+ Name: "request_size",
+ Help: "The request length (including request line, header, and request body)",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Buckets: buckets.LengthBuckets,
},
requestTags,
em,
@@ -257,6 +248,19 @@ func NewSocketCollector(pod, namespace, class string, metricsPerHost, metricsPer
em,
mm,
),
+
+ upstreamLatency: summaryMetric(
+ &prometheus.SummaryOpts{
+ Name: "ingress_upstream_latency_seconds",
+ Help: "DEPRECATED Upstream service latency per Ingress",
+ Namespace: PrometheusNamespace,
+ ConstLabels: constLabels,
+ Objectives: defObjectives,
+ },
+ []string{"ingress", "namespace", "service", "canary"},
+ em,
+ mm,
+ ),
}
sc.metricMapping = mm
@@ -271,6 +275,18 @@ func containsMetric(excludeMetrics map[string]struct{}, name string) bool {
return false
}
+func summaryMetric(opts *prometheus.SummaryOpts, requestTags []string, excludeMetrics map[string]struct{}, metricMapping metricMapping) *prometheus.SummaryVec {
+ if containsMetric(excludeMetrics, opts.Name) {
+ return nil
+ }
+ m := prometheus.NewSummaryVec(
+ *opts,
+ requestTags,
+ )
+ metricMapping[prometheus.BuildFQName(PrometheusNamespace, "", opts.Name)] = m
+ return m
+}
+
func counterMetric(opts *prometheus.CounterOpts, requestTags []string, excludeMetrics map[string]struct{}, metricMapping metricMapping) *prometheus.CounterVec {
if containsMetric(excludeMetrics, opts.Name) {
return nil
@@ -308,12 +324,12 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
for i := range statsBatch {
stats := &statsBatch[i]
- if sc.metricsPerHost && !sc.hosts.Has(stats.Host) && !sc.metricsPerUndefinedHost {
- klog.V(3).InfoS("Skipping metric for host not explicitly defined in an ingress", "host", stats.Host)
+ if sc.metricsPerHost && !sc.hosts.Has(stats.Host) {
+ klog.V(3).InfoS("Skipping metric for host not being served", "host", stats.Host)
continue
}
- if sc.reportStatusClasses && stats.Status != "" {
+ if sc.reportStatusClasses && len(stats.Status) > 0 {
stats.Status = fmt.Sprintf("%cxx", stats.Status[0])
}
@@ -342,6 +358,13 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
collectorLabels["host"] = stats.Host
}
+ latencyLabels := prometheus.Labels{
+ "namespace": stats.Namespace,
+ "ingress": stats.Ingress,
+ "service": stats.Service,
+ "canary": stats.Canary,
+ }
+
if sc.requests != nil {
requestsMetric, err := sc.requests.GetMetricWith(collectorLabels)
if err != nil {
@@ -360,6 +383,15 @@ func (sc *SocketCollector) handleMessage(msg []byte) {
connectTimeMetric.Observe(stats.Latency)
}
}
+
+ if sc.upstreamLatency != nil {
+ latencyMetric, err := sc.upstreamLatency.GetMetricWith(latencyLabels)
+ if err != nil {
+ klog.ErrorS(err, "Error fetching latency metric")
+ } else {
+ latencyMetric.Observe(stats.Latency)
+ }
+ }
}
if stats.HeaderTime != -1 && sc.headerTime != nil {
diff --git a/internal/ingress/metric/collectors/socket_test.go b/internal/ingress/metric/collectors/socket_test.go
index 3a1f29f35..71e9097c9 100644
--- a/internal/ingress/metric/collectors/socket_test.go
+++ b/internal/ingress/metric/collectors/socket_test.go
@@ -30,7 +30,8 @@ import (
func TestNewUDPLogListener(t *testing.T) {
var count uint64
- fn := func(message []byte) { //nolint:unparam,revive // Unused `message` param is required by the handleMessages function
+ //nolint:unparam // Unused `message` param is required by the handleMessages function
+ fn := func(message []byte) {
atomic.AddUint64(&count, 1)
}
@@ -83,19 +84,15 @@ func TestCollector(t *testing.T) {
prometheus.ExponentialBuckets(10, 10, 7),
}
- bucketFactor := 1.1
- maxBuckets := uint32(100)
-
cases := []struct {
- name string
- data []string
- metrics []string
- metricsPerUndefinedHost bool
- useStatusClasses bool
- excludeMetrics []string
- wantBefore string
- removeIngresses []string
- wantAfter string
+ name string
+ data []string
+ metrics []string
+ useStatusClasses bool
+ excludeMetrics []string
+ wantBefore string
+ removeIngresses []string
+ wantAfter string
}{
{
name: "invalid metric object should not increase prometheus metrics",
@@ -592,69 +589,13 @@ func TestCollector(t *testing.T) {
nginx_ingress_controller_response_duration_seconds_count{canary="",controller_class="ingress",controller_namespace="default",controller_pod="pod",host="testshop.com",ingress="web-yml",method="GET",namespace="test-app-production",path="/admin",service="test-app",status="2xx"} 1
`,
},
- {
- name: "metrics with a host should not be dropped when the host is not in the hosts slice but metricsPerUndefinedHost is true",
- data: []string{`[{
- "host":"wildcard.testshop.com",
- "status":"200",
- "bytesSent":150.0,
- "method":"GET",
- "path":"/admin",
- "requestLength":300.0,
- "requestTime":60.0,
- "upstreamLatency":1.0,
- "upstreamHeaderTime":5.0,
- "upstreamName":"test-upstream",
- "upstreamIP":"1.1.1.1:8080",
- "upstreamResponseTime":200,
- "upstreamStatus":"220",
- "namespace":"test-app-production",
- "ingress":"web-yml",
- "service":"test-app",
- "canary":""
- }]`},
- excludeMetrics: []string{"response_duration_seconds2", "test.*", "nginx_ingress_.*", "response_duration_secon"},
- metrics: []string{"nginx_ingress_controller_requests"},
- metricsPerUndefinedHost: true,
- useStatusClasses: true,
- wantBefore: `
- # HELP nginx_ingress_controller_requests The total number of client requests
- # TYPE nginx_ingress_controller_requests counter
- nginx_ingress_controller_requests{canary="",controller_class="ingress",controller_namespace="default",controller_pod="pod",host="wildcard.testshop.com",ingress="web-yml",method="GET",namespace="test-app-production",path="/admin",service="test-app",status="2xx"} 1
- `,
- },
- {
- name: "metrics with a host should be dropped when the host is not in the hosts slice",
- data: []string{`[{
- "host":"wildcard.testshop.com",
- "status":"200",
- "bytesSent":150.0,
- "method":"GET",
- "path":"/admin",
- "requestLength":300.0,
- "requestTime":60.0,
- "upstreamLatency":1.0,
- "upstreamHeaderTime":5.0,
- "upstreamName":"test-upstream",
- "upstreamIP":"1.1.1.1:8080",
- "upstreamResponseTime":200,
- "upstreamStatus":"220",
- "namespace":"test-app-production",
- "ingress":"web-yml",
- "service":"test-app",
- "canary":""
- }]`},
- excludeMetrics: []string{"response_duration_seconds2", "test.*", "nginx_ingress_.*", "response_duration_secon"},
- metrics: []string{"nginx_ingress_controller_requests"},
- useStatusClasses: true,
- },
}
for _, c := range cases {
t.Run(c.name, func(t *testing.T) {
registry := prometheus.NewPedanticRegistry()
- sc, err := NewSocketCollector("pod", "default", "ingress", true, c.metricsPerUndefinedHost, c.useStatusClasses, buckets, bucketFactor, maxBuckets, c.excludeMetrics)
+ sc, err := NewSocketCollector("pod", "default", "ingress", true, c.useStatusClasses, buckets, c.excludeMetrics)
if err != nil {
t.Errorf("%v: unexpected error creating new SocketCollector: %v", c.name, err)
}
diff --git a/internal/ingress/metric/collectors/testutils.go b/internal/ingress/metric/collectors/testutils.go
index 3fc0fc754..669e89e17 100644
--- a/internal/ingress/metric/collectors/testutils.go
+++ b/internal/ingress/metric/collectors/testutils.go
@@ -50,7 +50,7 @@ func GatherAndCompare(_ prometheus.Collector, expected string, metricNames []str
if !reflect.DeepEqual(metrics, normalizeMetricFamilies(expectedMetrics)) {
// Encode the gathered output to the readable text format for comparison.
var buf1 bytes.Buffer
- enc := expfmt.NewEncoder(&buf1, expfmt.NewFormat(expfmt.TypeTextPlain))
+ enc := expfmt.NewEncoder(&buf1, expfmt.FmtText)
for _, mf := range metrics {
if err := enc.Encode(mf); err != nil {
return fmt.Errorf("encoding result failed: %s", err)
@@ -59,7 +59,7 @@ func GatherAndCompare(_ prometheus.Collector, expected string, metricNames []str
// Encode normalized expected metrics again to generate them in the same ordering
// the registry does to spot differences more easily.
var buf2 bytes.Buffer
- enc = expfmt.NewEncoder(&buf2, expfmt.NewFormat(expfmt.TypeTextPlain))
+ enc = expfmt.NewEncoder(&buf2, expfmt.FmtText)
for _, mf := range normalizeMetricFamilies(expectedMetrics) {
if err := enc.Encode(mf); err != nil {
return fmt.Errorf("encoding result failed: %s", err)
@@ -109,7 +109,7 @@ func removeUnusedWhitespace(s string) string {
for _, l := range lines {
trimmedLine = strings.TrimSpace(l)
- if trimmedLine != "" {
+ if len(trimmedLine) > 0 {
trimmedLines = append(trimmedLines, trimmedLine)
}
}
diff --git a/internal/ingress/metric/dummy.go b/internal/ingress/metric/dummy.go
index 7b1485280..a619ccbd8 100644
--- a/internal/ingress/metric/dummy.go
+++ b/internal/ingress/metric/dummy.go
@@ -54,7 +54,7 @@ func (dc DummyCollector) IncCheckCount(string, string) {}
func (dc DummyCollector) IncCheckErrorCount(string, string) {}
// RemoveMetrics dummy implementation
-func (dc DummyCollector) RemoveMetrics(_, _ []string) {}
+func (dc DummyCollector) RemoveMetrics(_, _, _ []string) {}
// Start dummy implementation
func (dc DummyCollector) Start(_ string) {}
diff --git a/internal/ingress/metric/main.go b/internal/ingress/metric/main.go
index 9ed401d19..aa35a5c51 100644
--- a/internal/ingress/metric/main.go
+++ b/internal/ingress/metric/main.go
@@ -46,7 +46,7 @@ type Collector interface {
IncOrphanIngress(string, string, string)
DecOrphanIngress(string, string, string)
- RemoveMetrics(ingresses, certificates []string)
+ RemoveMetrics(ingresses, endpoints, certificates []string)
SetSSLExpireTime([]*ingress.Server)
SetSSLInfo(servers []*ingress.Server)
@@ -71,7 +71,7 @@ type collector struct {
}
// NewCollector creates a new metric collector the for ingress controller
-func NewCollector(metricsPerHost, metricsPerUndefinedHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, bucketFactor float64, maxBuckets uint32, excludedSocketMetrics []string) (Collector, error) {
+func NewCollector(metricsPerHost, reportStatusClasses bool, registry *prometheus.Registry, ingressclass string, buckets collectors.HistogramBuckets, excludedSocketMetrics []string) (Collector, error) {
podNamespace := os.Getenv("POD_NAMESPACE")
if podNamespace == "" {
podNamespace = "default"
@@ -89,7 +89,7 @@ func NewCollector(metricsPerHost, metricsPerUndefinedHost, reportStatusClasses b
return nil, err
}
- s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, metricsPerUndefinedHost, reportStatusClasses, buckets, bucketFactor, maxBuckets, excludedSocketMetrics)
+ s, err := collectors.NewSocketCollector(podName, podNamespace, ingressclass, metricsPerHost, reportStatusClasses, buckets, excludedSocketMetrics)
if err != nil {
return nil, err
}
@@ -131,9 +131,9 @@ func (c *collector) IncReloadErrorCount() {
c.ingressController.IncReloadErrorCount()
}
-func (c *collector) RemoveMetrics(ingresses, certificates []string) {
+func (c *collector) RemoveMetrics(ingresses, hosts, certificates []string) {
c.socket.RemoveMetrics(ingresses, c.registry)
- c.ingressController.RemoveMetrics(certificates, c.registry)
+ c.ingressController.RemoveMetrics(hosts, certificates, c.registry)
}
func (c *collector) Start(admissionStatus string) {
diff --git a/internal/ingress/resolver/main.go b/internal/ingress/resolver/main.go
index 259f44e49..7d17f4e16 100644
--- a/internal/ingress/resolver/main.go
+++ b/internal/ingress/resolver/main.go
@@ -29,10 +29,10 @@ type Resolver interface {
// GetSecurityConfiguration returns the configuration options from Ingress
GetSecurityConfiguration() defaults.SecurityConfiguration
- // GetConfigMap searches for configmap containing the namespace and name using the character /
+ // GetConfigMap searches for configmap containing the namespace and name usting the character /
GetConfigMap(string) (*apiv1.ConfigMap, error)
- // GetSecret searches for secrets containing the namespace and name using the character /
+ // GetSecret searches for secrets containing the namespace and name using a the character /
GetSecret(string) (*apiv1.Secret, error)
// GetAuthCertificate resolves a given secret name into an SSL certificate and CRL.
@@ -42,7 +42,7 @@ type Resolver interface {
// ca.crl: contains the revocation list used for authentication
GetAuthCertificate(string) (*AuthSSLCert, error)
- // GetService searches for services containing the namespace and name using the character /
+ // GetService searches for services containing the namespace and name using a the character /
GetService(string) (*apiv1.Service, error)
}
diff --git a/internal/ingress/resolver/mock.go b/internal/ingress/resolver/mock.go
index 3abfe7eda..679c3b13c 100644
--- a/internal/ingress/resolver/mock.go
+++ b/internal/ingress/resolver/mock.go
@@ -39,7 +39,7 @@ func (m Mock) GetDefaultBackend() defaults.Backend {
func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
defRisk := m.AnnotationsRiskLevel
if defRisk == "" {
- defRisk = "High"
+ defRisk = "Critical"
}
return defaults.SecurityConfiguration{
AnnotationsRiskLevel: defRisk,
@@ -47,7 +47,7 @@ func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
}
}
-// GetSecret searches for secrets containing the namespace and name using the character /
+// GetSecret searches for secrets contenating the namespace and name using a the character /
func (m Mock) GetSecret(string) (*apiv1.Secret, error) {
return nil, nil
}
@@ -60,12 +60,12 @@ func (m Mock) GetAuthCertificate(string) (*AuthSSLCert, error) {
return nil, nil
}
-// GetService searches for services containing the namespace and name using the character /
+// GetService searches for services contenating the namespace and name using a the character /
func (m Mock) GetService(string) (*apiv1.Service, error) {
return nil, nil
}
-// GetConfigMap searches for configMaps containing the namespace and name using the character /
+// GetConfigMap searches for configMaps contenating the namespace and name using a the character /
func (m Mock) GetConfigMap(name string) (*apiv1.ConfigMap, error) {
if v, ok := m.ConfigMaps[name]; ok {
return v, nil
diff --git a/internal/ingress/status/status.go b/internal/ingress/status/status.go
index ef01cdd24..81fb9044a 100644
--- a/internal/ingress/status/status.go
+++ b/internal/ingress/status/status.go
@@ -393,7 +393,7 @@ func statusAddressFromService(service string, kubeClient clientset.Interface) ([
return nil, fmt.Errorf("unable to extract IP address/es from service %v", service)
}
-// stringInIngresses returns true if s is in list
+// stringInSlice returns true if s is in list
func stringInIngresses(s string, list []v1.IngressLoadBalancerIngress) bool {
for _, v := range list {
if v.IP == s || v.Hostname == s {
diff --git a/internal/net/ssl/ssl.go b/internal/net/ssl/ssl.go
index 0592303bc..26fd706e1 100644
--- a/internal/net/ssl/ssl.go
+++ b/internal/net/ssl/ssl.go
@@ -400,6 +400,7 @@ func getFakeHostSSLCert(host string) (cert, key []byte) {
var err error
priv, err = rsa.GenerateKey(rand.Reader, 2048)
+
if err != nil {
klog.Fatalf("failed to generate fake private key: %v", err)
}
@@ -442,7 +443,7 @@ func getFakeHostSSLCert(host string) (cert, key []byte) {
// fullChainCert checks if a certificate file contains issues in the intermediate CA chain
// Returns a new certificate with the intermediate certificates.
-// If the certificate does not contain issues with the chain it returns an empty byte array
+// If the certificate does not contains issues with the chain it return an empty byte array
func fullChainCert(in []byte) ([]byte, error) {
cert, err := certUtil.DecodeCertificate(in)
if err != nil {
@@ -523,7 +524,7 @@ func (tl *TLSListener) GetCertificate(*tls.ClientHelloInfo) (*tls.Certificate, e
return tl.certificate, tl.err
}
-// TLSConfig instantiates a TLS configuration, always providing an up to date certificate
+// TLSConfig instanciates a TLS configuration, always providing an up to date certificate
func (tl *TLSListener) TLSConfig() *tls.Config {
return &tls.Config{
GetCertificate: tl.GetCertificate,
diff --git a/internal/net/ssl/ssl_test.go b/internal/net/ssl/ssl_test.go
index 47fa07c7c..9f8c5eeae 100644
--- a/internal/net/ssl/ssl_test.go
+++ b/internal/net/ssl/ssl_test.go
@@ -446,7 +446,7 @@ func TestTLSKeyReloader(t *testing.T) {
}
watcher.load()
- s := httptest.NewUnstartedServer(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {}))
+ s := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {}))
s.Config.TLSConfig = watcher.TLSConfig()
s.Listener = tls.NewListener(s.Listener, s.Config.TLSConfig)
go s.Start()
diff --git a/internal/nginx/maxmind.go b/internal/nginx/maxmind.go
index 3bd895b5d..1dc2f4d4e 100644
--- a/internal/nginx/maxmind.go
+++ b/internal/nginx/maxmind.go
@@ -132,7 +132,7 @@ func DownloadGeoLite2DB(attempts int, period time.Duration) error {
}
func createURL(mirror, licenseKey, dbName string) string {
- if mirror != "" {
+ if len(mirror) > 0 {
return fmt.Sprintf("%s/%s.tar.gz", mirror, dbName)
}
return fmt.Sprintf(maxmindURL, licenseKey, dbName)
diff --git a/internal/task/queue.go b/internal/task/queue.go
index 8753bed34..f92f2a501 100644
--- a/internal/task/queue.go
+++ b/internal/task/queue.go
@@ -36,7 +36,7 @@ var keyFunc = cache.DeletionHandlingMetaNamespaceKeyFunc
// which timestamp is older than the last successful get operation.
type Queue struct {
// queue is the work queue the worker polls
- queue workqueue.TypedRateLimitingInterface[any]
+ queue workqueue.RateLimitingInterface
// sync is called for each item in the queue
sync func(interface{}) error
// workerDone is closed when the worker exits
@@ -172,7 +172,7 @@ func NewTaskQueue(syncFn func(interface{}) error) *Queue {
// NewCustomTaskQueue creates a new custom task queue with the given sync function.
func NewCustomTaskQueue(syncFn func(interface{}) error, fn func(interface{}) (interface{}, error)) *Queue {
q := &Queue{
- queue: workqueue.NewTypedRateLimitingQueue(workqueue.DefaultTypedControllerRateLimiter[any]()),
+ queue: workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter()),
sync: syncFn,
workerDone: make(chan bool),
fn: fn,
diff --git a/magefiles/go.mod b/magefiles/go.mod
index f11ab740e..9409fed0d 100644
--- a/magefiles/go.mod
+++ b/magefiles/go.mod
@@ -1,6 +1,6 @@
module k8s.io/ingress-nginx/magefiles
-go 1.23.6
+go 1.21.5
require (
github.com/blang/semver/v4 v4.0.0
@@ -8,7 +8,7 @@ require (
github.com/helm/helm v2.17.0+incompatible
github.com/magefile/mage v1.15.0
github.com/vmware-labs/yaml-jsonpath v0.3.2
- golang.org/x/oauth2 v0.18.0
+ golang.org/x/oauth2 v0.12.0
gopkg.in/yaml.v3 v3.0.1
)
@@ -20,19 +20,19 @@ require (
github.com/fsnotify/fsnotify v1.7.0 // indirect
github.com/ghodss/yaml v1.0.0 // indirect
github.com/gobwas/glob v0.2.3 // indirect
- github.com/golang/protobuf v1.5.4 // indirect
+ github.com/golang/protobuf v1.5.3 // indirect
github.com/google/go-querystring v1.1.0 // indirect
- github.com/kr/text v0.2.0 // indirect
+ github.com/kr/pretty v0.3.1 // indirect
github.com/onsi/ginkgo v1.16.5 // indirect
- github.com/onsi/gomega v1.30.0 // indirect
+ github.com/onsi/gomega v1.27.10 // indirect
github.com/rogpeppe/go-internal v1.11.0 // indirect
- github.com/sergi/go-diff v1.3.1 // indirect
- github.com/stretchr/testify v1.9.0 // indirect
- golang.org/x/crypto v0.31.0 // indirect
- google.golang.org/appengine v1.6.8 // indirect
- google.golang.org/protobuf v1.33.0 // indirect
+ github.com/stretchr/testify v1.8.4 // indirect
+ golang.org/x/crypto v0.17.0 // indirect
+ golang.org/x/net v0.17.0 // indirect
+ google.golang.org/appengine v1.6.7 // indirect
+ google.golang.org/protobuf v1.31.0 // indirect
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
- k8s.io/apimachinery v0.29.3 // indirect
+ k8s.io/apimachinery v0.27.6 // indirect
k8s.io/helm v2.17.0+incompatible // indirect
)
diff --git a/magefiles/go.sum b/magefiles/go.sum
index 8684d4701..f9b01b2ef 100644
--- a/magefiles/go.sum
+++ b/magefiles/go.sum
@@ -22,6 +22,7 @@ github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod h1:fyg78
github.com/gobwas/glob v0.2.3 h1:A4xDbljILXROh+kObIiy5kIaPYD8e96x1tgBhUI5J+Y=
github.com/gobwas/glob v0.2.3/go.mod h1:d3Ez4x06l9bZtSvzIay5+Yzi0fmZzPgnTbPcKjJAkT8=
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
+github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8=
github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA=
github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs=
@@ -29,16 +30,15 @@ github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:W
github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0=
github.com/golang/protobuf v1.4.2/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI=
github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
-github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
-github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek=
-github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps=
+github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg=
+github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
-github.com/google/go-cmp v0.6.0 h1:ofyhxvXcZhMsU5ulbFiLKl/XBFqE1GSq7atu8tAmTRI=
-github.com/google/go-cmp v0.6.0/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
+github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
+github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
github.com/google/go-github/v48 v48.2.0 h1:68puzySE6WqUY9KWmpOsDEQfDZsso98rT6pZcz9HqcE=
github.com/google/go-github/v48 v48.2.0/go.mod h1:dDlehKBDo850ZPvCTK0sEqTCVWcrGl2LcDiajkYi89Y=
github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8=
@@ -67,47 +67,43 @@ github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042
github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
-github.com/onsi/gomega v1.30.0 h1:hvMK7xYz4D3HapigLTeGdId/NcfQx1VHMJc60ew99+8=
-github.com/onsi/gomega v1.30.0/go.mod h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
+github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI=
+github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M=
+github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA=
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
+github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs=
github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M=
github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA=
+github.com/sergi/go-diff v1.1.0 h1:we8PVUC3FE2uYfodKH/nBHMSetSfHDR6scGdBi+erh0=
github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM=
-github.com/sergi/go-diff v1.3.1 h1:xkr+Oxo4BOQKmkn/B9eMK0g5Kg/983T9DqqPHwYqD+8=
-github.com/sergi/go-diff v1.3.1/go.mod h1:aMJSSKb2lpPvRNec0+w3fl7LP9IOFzdc9Pa4NFbPK1I=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
-github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
-github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
+github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk=
+github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo=
github.com/vmware-labs/yaml-jsonpath v0.3.2 h1:/5QKeCBGdsInyDCyVNLbXyilb61MXGi9NP674f9Hobk=
github.com/vmware-labs/yaml-jsonpath v0.3.2/go.mod h1:U6whw1z03QyqgWdgXxvVnQ90zN1BWz5V+51Ewf8k+rQ=
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
-github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY=
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
-golang.org/x/crypto v0.31.0 h1:ihbySMvVjLAeSH1IbfcRTkD/iNscyz8rGzjF/E5hV6U=
-golang.org/x/crypto v0.31.0/go.mod h1:kDsLvtWBEx7MV9tJOj9bnXsPbxwJQ6csT/x4KIN4Ssk=
+golang.org/x/crypto v0.17.0 h1:r8bRNjWL3GshPW3gkd+RpvzWrZAwPS49OmTGZ/uhM4k=
+golang.org/x/crypto v0.17.0/go.mod h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
+golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks=
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
golang.org/x/net v0.0.0-20200520004742-59133d7f0dd7/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A=
golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
-golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
-golang.org/x/net v0.22.0 h1:9sGLhx7iRIHEiX0oAJ3MRZMUCElJgy7Br1nO+AMN3Tc=
-golang.org/x/net v0.22.0/go.mod h1:JKghWKKOSdJwpW2GEx0Ja7fmaKnMsbu+MWVZTokSYmg=
-golang.org/x/oauth2 v0.18.0 h1:09qnuIAgzdx1XplqJvW6CQqMCtGZykZWcXzPMPUusvI=
-golang.org/x/oauth2 v0.18.0/go.mod h1:Wf7knwG0MPoWIMMBgFlEaSUDaKskp0dCfrlJRJXbBi8=
+golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM=
+golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
+golang.org/x/oauth2 v0.12.0 h1:smVPGxink+n1ZI5pkQa8y6fZT0RW0MgCO5bFpepy4B4=
+golang.org/x/oauth2 v0.12.0/go.mod h1:A74bZ3aGXgCY0qaIC9Ahg6Lglin4AMAco8cIv9baba4=
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
@@ -116,31 +112,23 @@ golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7w
golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
golang.org/x/sys v0.0.0-20210112080510-489259a85091/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
-golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.28.0 h1:Fksou7UEQUWlKvIdsqzJmUmCX3cZuD2+P3XyyzwMhlA=
-golang.org/x/sys v0.28.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
-golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
+golang.org/x/sys v0.15.0 h1:h48lPFYpsTvQJZF4EKyI4aLHaev3CxivZmv7yZig9pc=
+golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
+golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
-golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
-golang.org/x/text v0.21.0 h1:zyQAAkrwaneQ066sspRyJaG9VNi/YJ1NfzcGB3hZ/qo=
-golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
+golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ=
+golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
-google.golang.org/appengine v1.6.8 h1:IhEN5q69dyKagZPYMSdIjS2HqprW324FRQZJcGqPAsM=
-google.golang.org/appengine v1.6.8/go.mod h1:1jJ3jBArFh5pcgW8gCtRJnepW8FzD1V44FJffLiz/Ds=
+google.golang.org/appengine v1.6.7 h1:FZR1q0exgwxzPzp/aF+VccGrSfxfPpkBqjIIEq3ru6c=
+google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM=
@@ -149,8 +137,8 @@ google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzi
google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU=
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.33.0 h1:uNO2rsAINq/JlFpSdYEKIZ0uKD/R9cpdv0T+yoGwGmI=
-google.golang.org/protobuf v1.33.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos=
+google.golang.org/protobuf v1.31.0 h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8=
+google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
@@ -168,7 +156,7 @@ gopkg.in/yaml.v3 v3.0.0-20191026110619-0b21df46bc1d/go.mod h1:K4uyk7z7BCEPqu6E+C
gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/apimachinery v0.29.3 h1:2tbx+5L7RNvqJjn7RIuIKu9XTsIZ9Z5wX2G22XAa5EU=
-k8s.io/apimachinery v0.29.3/go.mod h1:hx/S4V2PNW4OMg3WizRrHutyB5la0iCUbZym+W0EQIU=
+k8s.io/apimachinery v0.27.6 h1:mGU8jmBq5o8mWBov+mLjdTBcU+etTE19waies4AQ6NE=
+k8s.io/apimachinery v0.27.6/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E=
k8s.io/helm v2.17.0+incompatible h1:Bpn6o1wKLYqKM3+Osh8e+1/K2g/GsQJ4F4yNF2+deao=
k8s.io/helm v2.17.0+incompatible/go.mod h1:LZzlS4LQBHfciFOurYBFkCMTaZ0D1l+p0teMg7TSULI=
diff --git a/magefiles/steps/helm.go b/magefiles/steps/helm.go
index 73c9b0b3b..b53283f78 100644
--- a/magefiles/steps/helm.go
+++ b/magefiles/steps/helm.go
@@ -18,7 +18,9 @@ package steps
import (
"bytes"
+ "fmt"
"os"
+ "strings"
semver "github.com/blang/semver/v4"
"github.com/helm/helm/pkg/chartutil"
@@ -102,21 +104,18 @@ func updateVersion(version string) {
utils.CheckIfError(err, "HELM Saving new Chart")
}
-func updateChartReleaseNotes(releaseNotes []string) {
- utils.Info("HELM Updating chart release notes")
+func updateChartReleaseNotes(releasesNotes []string) {
+ utils.Info("HELM Updating the Chart Release notes")
chart, err := chartutil.LoadChartfile(HelmChartPath)
- utils.CheckIfError(err, "HELM Failed to load chart manifest: %s", HelmChartPath)
-
- releaseNotesBytes, err := yaml.Marshal(releaseNotes)
- utils.CheckIfError(err, "HELM Failed to marshal release notes")
-
- releaseNotesString := string(releaseNotesBytes)
- utils.Info("HELM Chart release notes:\n%s", releaseNotesString)
- chart.Annotations["artifacthub.io/changes"] = releaseNotesString
-
- utils.Info("HELM Saving chart release notes")
+ utils.CheckIfError(err, "HELM Could not Load Chart to update release notes %s", HelmChartPath)
+ for i := range releasesNotes {
+ releasesNotes[i] = fmt.Sprintf("- %q", releasesNotes[i])
+ }
+ releaseNoteString := strings.Join(releasesNotes, "\n")
+ utils.Info("HELM Release note string %s", releaseNoteString)
+ chart.Annotations["artifacthub.io/changes"] = releaseNoteString
err = chartutil.SaveChartfile(HelmChartPath, chart)
- utils.CheckIfError(err, "HELM Failed to save chart manifest: %s", HelmChartPath)
+ utils.CheckIfError(err, "HELM Saving updated release notes for Chart")
}
// UpdateChartValue Updates the Helm ChartValue
@@ -170,7 +169,7 @@ func runHelmDocs() error {
if err != nil {
return err
}
- err = sh.RunV("helm-docs", "--chart-search-root", "${PWD}/charts")
+ err = sh.RunV("helm-docs", "--chart-search-root=${PWD}/charts")
if err != nil {
return err
}
@@ -181,7 +180,7 @@ func installHelmDocs() error {
utils.Info("HELM Install HelmDocs")
g0 := sh.RunCmd("go")
- err := g0("install", "github.com/norwoodj/helm-docs/cmd/helm-docs@latest")
+ err := g0("install", "github.com/norwoodj/helm-docs/cmd/helm-docs@v1.11.0")
if err != nil {
return err
}
diff --git a/magefiles/steps/release.go b/magefiles/steps/release.go
index b6d46336a..1ed09850f 100644
--- a/magefiles/steps/release.go
+++ b/magefiles/steps/release.go
@@ -74,7 +74,7 @@ func (Release) NewReleaseFromOld(version, oldversion string) {
func (Release) E2EDocs() {
e2edocs, err := utils.GenerateE2EDocs()
utils.CheckIfError(err, "error on template")
- err = os.WriteFile("docs/e2e-tests.md", []byte(e2edocs), 0644)
+ err = os.WriteFile("docs/e2e-tests.md", []byte(e2edocs), 644)
utils.CheckIfError(err, "Could not write new e2e test file ")
}
@@ -158,7 +158,7 @@ func updateIndexMD(old, new string) error {
utils.CheckIfError(err, "Could not read INDEX_DOCS file %s", INDEX_DOCS)
datString := string(data)
datString = strings.Replace(datString, old, new, -1)
- err = os.WriteFile(INDEX_DOCS, []byte(datString), 0644)
+ err = os.WriteFile(INDEX_DOCS, []byte(datString), 644)
if err != nil {
utils.ErrorF("Could not write new %s %s", INDEX_DOCS, err)
return err
@@ -215,6 +215,7 @@ func (Release) LatestCommitLogs() {
}
func commitsBetweenTags(newversion, oldversion string) []string {
+
var newTag, oldTag string
tags := getAllControllerTags()
newTag, oldTag = tags[0], tags[1]
@@ -255,7 +256,7 @@ func makeReleaseNotes(newVersion, oldVersion string) (*utils.ReleaseNote, error)
// the newControllerVersion should match the latest tag
if newControllerVersion != allControllerTags[0] {
- return nil, fmt.Errorf("generating release new version %s didnt match the current latest tag %s", newControllerVersion, allControllerTags[0])
+ return nil, errors.New(fmt.Sprintf("Generating release new version %s didnt match the current latest tag %s", newControllerVersion, allControllerTags[0]))
}
// previous version
newReleaseNotes.PreviousControllerVersion = allControllerTags[1]
@@ -272,8 +273,8 @@ func makeReleaseNotes(newVersion, oldVersion string) (*utils.ReleaseNote, error)
var allUpdates []string
var depUpdates []string
var helmUpdates []string
- prRegex := regexp.MustCompile(`\(#\d+\)`)
- depBot := regexp.MustCompile(`^(\w){1,10} Bump `)
+ prRegex := regexp.MustCompile("\\(#\\d+\\)")
+ depBot := regexp.MustCompile("^(\\w){1,10} Bump ")
helmRegex := regexp.MustCompile("helm|chart")
for i, s := range commits {
// matches on PR
@@ -322,13 +323,13 @@ func makeReleaseNotes(newVersion, oldVersion string) (*utils.ReleaseNote, error)
controllerDigest := utils.FindImageDigest(data, "controller", newVersion)
if len(controllerDigest) == 0 {
utils.ErrorF("Controller Digest could not be found")
- return nil, errors.New("controller digest could not be found")
+ return nil, errors.New("Controller digest could not be found")
}
controllerChrootDigest := utils.FindImageDigest(data, "controller-chroot", newVersion)
if len(controllerChrootDigest) == 0 {
utils.ErrorF("Controller Chroot Digest could not be found")
- return nil, errors.New("controller chroot digest could not be found")
+ return nil, errors.New("Controller Chroot digest could not be found")
}
utils.Debug("Latest Controller Digest %v", controllerDigest)
diff --git a/magefiles/utils/e2edocs.go b/magefiles/utils/e2edocs.go
index 2f5626db6..2edc2ca40 100644
--- a/magefiles/utils/e2edocs.go
+++ b/magefiles/utils/e2edocs.go
@@ -25,19 +25,22 @@ import (
"os"
"path/filepath"
"regexp"
- "slices"
"strings"
"text/template"
+
+ "slices"
)
//go:embed templates/e2edocs.tpl
var tplContent embed.FS
-var skipFiles = []string{
- "test/e2e/framework/framework.go",
- "test/e2e/e2e.go",
- "test/e2e/e2e_test.go",
-}
+var (
+ skipFiles = []string{
+ "test/e2e/framework/framework.go",
+ "test/e2e/e2e.go",
+ "test/e2e/e2e_test.go",
+ }
+)
const (
testDir = "test/e2e"
@@ -45,7 +48,9 @@ const (
URL = "https://github.com/kubernetes/ingress-nginx/tree/main/"
)
-var betweenquotes = regexp.MustCompile(`("|\')(?P.*)("|\')`)
+var (
+ betweenquotes = regexp.MustCompile(`("|\')(?P.*)("|\')`)
+)
type E2ETemplate struct {
URL string
@@ -97,7 +102,7 @@ func (t *E2ETemplate) walkE2eDir(path string, d fs.DirEntry, errAggregated error
fileScanner.Split(bufio.ScanLines)
tests := make([]string, 0)
- lineN := 0
+ var lineN = 0
for fileScanner.Scan() {
lineN = lineN + 1
if !containsGinkgoTest(fileScanner.Text()) {
@@ -131,4 +136,5 @@ func GenerateE2EDocs() (string, error) {
return "", err
}
return tplBuff.String(), nil
+
}
diff --git a/magefiles/utils/helm.go b/magefiles/utils/helm.go
index cb8acae57..dea68caab 100644
--- a/magefiles/utils/helm.go
+++ b/magefiles/utils/helm.go
@@ -31,6 +31,7 @@ type IngressChartValue struct {
RunAsUser int `yaml:"runAsUser"`
AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
} `yaml:"image"`
+ ExistingPsp string `yaml:"existingPsp"`
ContainerName string `yaml:"containerName"`
ContainerPort struct {
HTTP int `yaml:"http"`
@@ -207,6 +208,13 @@ type IngressChartValue struct {
ExtraVolumes []interface{} `yaml:"extraVolumes"`
ExtraInitContainers []interface{} `yaml:"extraInitContainers"`
ExtraModules []interface{} `yaml:"extraModules"`
+ Opentelemetry struct {
+ Enabled bool `yaml:"enabled"`
+ Image string `yaml:"image"`
+ ContainerSecurityContext struct {
+ AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
+ } `yaml:"containerSecurityContext"`
+ } `yaml:"opentelemetry"`
AdmissionWebhooks struct {
Annotations struct{} `yaml:"annotations"`
Enabled bool `yaml:"enabled"`
@@ -218,6 +226,7 @@ type IngressChartValue struct {
NamespaceSelector struct{} `yaml:"namespaceSelector"`
ObjectSelector struct{} `yaml:"objectSelector"`
Labels struct{} `yaml:"labels"`
+ ExistingPsp string `yaml:"existingPsp"`
NetworkPolicyEnabled bool `yaml:"networkPolicyEnabled"`
Service struct {
Annotations struct{} `yaml:"annotations"`
@@ -320,6 +329,7 @@ type IngressChartValue struct {
ReadOnlyRootFilesystem bool `yaml:"readOnlyRootFilesystem"`
AllowPrivilegeEscalation bool `yaml:"allowPrivilegeEscalation"`
} `yaml:"image"`
+ ExistingPsp string `yaml:"existingPsp"`
ExtraArgs struct{} `yaml:"extraArgs"`
ServiceAccount struct {
Create bool `yaml:"create"`
@@ -378,6 +388,9 @@ type IngressChartValue struct {
Create bool `yaml:"create"`
Scope bool `yaml:"scope"`
} `yaml:"rbac"`
+ PodSecurityPolicy struct {
+ Enabled bool `yaml:"enabled"`
+ } `yaml:"podSecurityPolicy"`
ServiceAccount struct {
Create bool `yaml:"create"`
Name string `yaml:"name"`
diff --git a/mkdocs.yml b/mkdocs.yml
index b59546c9c..cbc2988ce 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -50,7 +50,6 @@ theme:
- navigation.tabs.sticky
- navigation.instant
- navigation.sections
- - content.code.copy
palette:
primary: "teal"
@@ -84,7 +83,6 @@ nav:
- Introduction: "user-guide/nginx-configuration/index.md"
- Basic usage: "user-guide/basic-usage.md"
- Annotations: "user-guide/nginx-configuration/annotations.md"
- - Annotations Risks: "user-guide/nginx-configuration/annotations-risk.md"
- ConfigMap: "user-guide/nginx-configuration/configmap.md"
- Custom NGINX template: "user-guide/nginx-configuration/custom-template.md"
- Log format: "user-guide/nginx-configuration/log-format.md"
@@ -125,6 +123,7 @@ nav:
- Rewrite: "examples/rewrite/README.md"
- Static IPs: "examples/static-ip/README.md"
- TLS termination: "examples/tls-termination/README.md"
+ - Pod Security Policy (PSP): "examples/psp/README.md"
- Open Policy Agent rules: "examples/openpolicyagent/README.md"
- Canary Deployments: "examples/canary/README.md"
- Developer Guide:
diff --git a/pkg/apis/ingress/types.go b/pkg/apis/ingress/types.go
index ccdd49fe9..2ad17ec3d 100644
--- a/pkg/apis/ingress/types.go
+++ b/pkg/apis/ingress/types.go
@@ -27,8 +27,8 @@ import (
"k8s.io/ingress-nginx/internal/ingress/annotations/authtls"
"k8s.io/ingress-nginx/internal/ingress/annotations/connection"
"k8s.io/ingress-nginx/internal/ingress/annotations/cors"
- "k8s.io/ingress-nginx/internal/ingress/annotations/customheaders"
"k8s.io/ingress-nginx/internal/ingress/annotations/fastcgi"
+ "k8s.io/ingress-nginx/internal/ingress/annotations/globalratelimit"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipallowlist"
"k8s.io/ingress-nginx/internal/ingress/annotations/ipdenylist"
"k8s.io/ingress-nginx/internal/ingress/annotations/log"
@@ -198,10 +198,10 @@ type Server struct {
Aliases []string `json:"aliases,omitempty"`
// RedirectFromToWWW returns if a redirect to/from prefix www is required
RedirectFromToWWW bool `json:"redirectFromToWWW,omitempty"`
- // CertificateAuth indicates this server requires mutual authentication
+ // CertificateAuth indicates the this server requires mutual authentication
// +optional
CertificateAuth authtls.Config `json:"certificateAuth"`
- // ProxySSL indicates this server uses client certificate to access backends
+ // ProxySSL indicates the this server uses client certificate to access backends
// +optional
ProxySSL proxyssl.Config `json:"proxySSL"`
// ServerSnippet returns the snippet of server
@@ -210,7 +210,7 @@ type Server struct {
// SSLCiphers returns list of ciphers to be enabled
SSLCiphers string `json:"sslCiphers,omitempty"`
// SSLPreferServerCiphers indicates that server ciphers should be preferred
- // over client ciphers when using the TLS protocols.
+ // over client ciphers when using the SSLv3 and TLS protocols.
SSLPreferServerCiphers string `json:"sslPreferServerCiphers,omitempty"`
// AuthTLSError contains the reason why the access to a server should be denied
AuthTLSError string `json:"authTLSError,omitempty"`
@@ -219,7 +219,7 @@ type Server struct {
// Location describes an URI inside a server.
// Also contains additional information about annotations in the Ingress.
//
-// In some cases when more than one annotation is defined a particular order in the execution
+// In some cases when more than one annotations is defined a particular order in the execution
// is required.
// The chain in the execution order of annotations should be:
// - Denylist
@@ -263,8 +263,7 @@ type Location struct {
BasicDigestAuth auth.Config `json:"basicDigestAuth,omitempty"`
// Denied returns an error when this location cannot not be allowed
// Requesting a denied location should return HTTP code 403.
- Denied *string `json:"denied,omitempty"`
- CustomHeaders customheaders.Config `json:"customHeaders,omitempty"`
+ Denied *string `json:"denied,omitempty"`
// CorsConfig returns the Cors Configuration for the ingress rule
// +optional
CorsConfig cors.Config `json:"corsConfig,omitempty"`
@@ -284,6 +283,10 @@ type Location struct {
// The Redirect annotation precedes RateLimit
// +optional
RateLimit ratelimit.Config `json:"rateLimit,omitempty"`
+ // GlobalRateLimit similar to RateLimit
+ // but this is applied globally across multiple replicas.
+ // +optional
+ GlobalRateLimit globalratelimit.Config `json:"globalRateLimit,omitempty"`
// Redirect describes a temporal o permanent redirection this location.
// +optional
Redirect redirect.Config `json:"redirect,omitempty"`
@@ -342,7 +345,7 @@ type Location struct {
// CustomHTTPErrors specifies the error codes that should be intercepted.
// +optional
CustomHTTPErrors []int `json:"custom-http-errors"`
- // ProxyInterceptErrors disables error interception when using CustomHTTPErrors
+ // ProxyInterceptErrors disables error intecepting when using CustomHTTPErrors
// e.g. custom 404 and 503 when service-a does not exist or is not available
// but service-a can return 404 and 503 error codes without intercept
// +optional
diff --git a/pkg/apis/ingress/types_equals.go b/pkg/apis/ingress/types_equals.go
index 6fba3bd45..eeed9a06e 100644
--- a/pkg/apis/ingress/types_equals.go
+++ b/pkg/apis/ingress/types_equals.go
@@ -390,6 +390,9 @@ func (l1 *Location) Equal(l2 *Location) bool {
if !(&l1.RateLimit).Equal(&l2.RateLimit) {
return false
}
+ if !(&l1.GlobalRateLimit).Equal(&l2.GlobalRateLimit) {
+ return false
+ }
if !(&l1.Redirect).Equal(&l2.Redirect) {
return false
}
@@ -467,10 +470,6 @@ func (l1 *Location) Equal(l2 *Location) bool {
return false
}
- if !l1.CustomHeaders.Equal(&l2.CustomHeaders) {
- return false
- }
-
return true
}
diff --git a/pkg/flags/flags.go b/pkg/flags/flags.go
index ce24160fd..d3bc4ee86 100644
--- a/pkg/flags/flags.go
+++ b/pkg/flags/flags.go
@@ -17,7 +17,6 @@ limitations under the License.
package flags
import (
- "errors"
"flag"
"fmt"
"net"
@@ -133,9 +132,6 @@ Requires setting the publish-service parameter to a valid Service reference.`)
electionID = flags.String("election-id", "ingress-controller-leader",
`Election id to use for Ingress status updates.`)
- electionTTL = flags.Duration("election-ttl", 30*time.Second,
- `Duration a leader election is valid before it's getting re-elected`)
-
updateStatusOnShutdown = flags.Bool("update-status-on-shutdown", true,
`Update the load-balancer status of Ingress objects when the controller shuts down.
Requires the update-status parameter.`)
@@ -150,17 +146,14 @@ Requires the update-status parameter.`)
enableSSLPassthrough = flags.Bool("enable-ssl-passthrough", false,
`Enable SSL Passthrough.`)
- disableLeaderElection = flags.Bool("disable-leader-election", false,
- `Disable Leader Election on NGINX Controller.`)
-
disableServiceExternalName = flags.Bool("disable-svc-external-name", false,
`Disable support for Services of type ExternalName.`)
annotationsPrefix = flags.String("annotations-prefix", parser.DefaultAnnotationsPrefix,
`Prefix of the Ingress annotations specific to the NGINX controller.`)
- enableAnnotationValidation = flags.Bool("enable-annotation-validation", true,
- `If true, will enable the annotation validation feature. Defaults to true`)
+ enableAnnotationValidation = flags.Bool("enable-annotation-validation", false,
+ `If true, will enable the annotation validation feature. This value will be defaulted to true on a future release`)
enableSSLChainCompletion = flags.Bool("enable-ssl-chain-completion", false,
`Autocomplete SSL certificate chains with missing intermediate CA certificates.
@@ -174,20 +167,16 @@ extension for this to succeed.`)
`Customized address (or addresses, separated by comma) to set as the load-balancer status of Ingress objects this controller satisfies.
Requires the update-status parameter.`)
- enableMetrics = flags.Bool("enable-metrics", false,
+ enableMetrics = flags.Bool("enable-metrics", true,
`Enables the collection of NGINX metrics.`)
metricsPerHost = flags.Bool("metrics-per-host", true,
`Export metrics per-host.`)
- metricsPerUndefinedHost = flags.Bool("metrics-per-undefined-host", false,
- `Export metrics per-host even if the host is not defined in an ingress. Requires --metrics-per-host to be set to true.`)
reportStatusClasses = flags.Bool("report-status-classes", false,
`Use status classes (2xx, 3xx, 4xx and 5xx) instead of status codes in metrics.`)
timeBuckets = flags.Float64Slice("time-buckets", prometheus.DefBuckets, "Set of buckets which will be used for prometheus histogram metrics such as RequestTime, ResponseTime.")
lengthBuckets = flags.Float64Slice("length-buckets", prometheus.LinearBuckets(10, 10, 10), "Set of buckets which will be used for prometheus histogram metrics such as RequestLength, ResponseLength.")
sizeBuckets = flags.Float64Slice("size-buckets", prometheus.ExponentialBuckets(10, 10, 7), "Set of buckets which will be used for prometheus histogram metrics such as BytesSent.")
- bucketFactor = flags.Float64("bucket-factor", 0, "Bucket factor for native histograms. Value must be > 1 for enabling native histograms.")
- maxBuckets = flags.Uint32("max-buckets", 100, "Maximum number of buckets for native histograms.")
excludeSocketMetrics = flags.StringSlice("exclude-socket-metrics", []string{}, "et of socket request metrics to exclude which won't be exported nor being calculated. E.g. 'nginx_ingress_controller_success,nginx_ingress_controller_header_duration_seconds'.")
monitorMaxBatchSize = flags.Int("monitor-max-batch-size", 10000, "Max batch size of NGINX metrics.")
@@ -237,7 +226,7 @@ Takes the form ":port". If not provided, no admission controller is starte
flags.StringVar(&nginx.MaxmindMirror, "maxmind-mirror", "", `Maxmind mirror url (example: http://geoip.local/databases.`)
flags.StringVar(&nginx.MaxmindLicenseKey, "maxmind-license-key", "", `Maxmind license key to download GeoLite2 Databases.
-https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geolite2-databases/ .`)
+https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases .`)
flags.StringVar(&nginx.MaxmindEditionIDs, "maxmind-edition-ids", "GeoLite2-City,GeoLite2-ASN", `Maxmind edition ids to download GeoLite2 Databases.`)
flags.IntVar(&nginx.MaxmindRetriesCount, "maxmind-retries-count", 1, "Number of attempts to download the GeoIP DB.")
flags.DurationVar(&nginx.MaxmindRetriesTimeout, "maxmind-retries-timeout", time.Second*0, "Maxmind downloading delay between 1st and 2nd attempt, 0s - do not retry to download if something went wrong.")
@@ -322,14 +311,6 @@ https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geol
}
}
- if *metricsPerUndefinedHost && !*metricsPerHost {
- return false, nil, errors.New("--metrics-per-undefined-host=true must be passed with --metrics-per-host=true")
- }
-
- if *electionTTL <= 0 {
- *electionTTL = 30 * time.Second
- }
-
histogramBuckets := &collectors.HistogramBuckets{
TimeBuckets: *timeBuckets,
LengthBuckets: *lengthBuckets,
@@ -343,20 +324,15 @@ https://blog.maxmind.com/2019/12/significant-changes-to-accessing-and-using-geol
KubeConfigFile: *kubeConfigFile,
UpdateStatus: *updateStatus,
ElectionID: *electionID,
- ElectionTTL: *electionTTL,
EnableProfiling: *profiling,
EnableMetrics: *enableMetrics,
MetricsPerHost: *metricsPerHost,
- MetricsPerUndefinedHost: *metricsPerUndefinedHost,
MetricsBuckets: histogramBuckets,
- MetricsBucketFactor: *bucketFactor,
- MetricsMaxBuckets: *maxBuckets,
ReportStatusClasses: *reportStatusClasses,
ExcludeSocketMetrics: *excludeSocketMetrics,
MonitorMaxBatchSize: *monitorMaxBatchSize,
DisableServiceExternalName: *disableServiceExternalName,
EnableSSLPassthrough: *enableSSLPassthrough,
- DisableLeaderElection: *disableLeaderElection,
ResyncPeriod: *resyncPeriod,
DefaultService: *defaultSvc,
Namespace: *watchNamespace,
diff --git a/pkg/flags/flags_test.go b/pkg/flags/flags_test.go
index fdf153021..bffe2b16d 100644
--- a/pkg/flags/flags_test.go
+++ b/pkg/flags/flags_test.go
@@ -19,7 +19,6 @@ package flags
import (
"os"
"testing"
- "time"
)
func TestNoMandatoryFlag(t *testing.T) {
@@ -110,131 +109,3 @@ func TestMaxmindRetryDownload(t *testing.T) {
t.Fatalf("Expected an error parsing flags but none returned")
}
}
-
-func TestDisableLeaderElectionFlag(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--disable-leader-election", "--http-port", "80", "--https-port", "443"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if !conf.DisableLeaderElection {
- t.Fatalf("Expected --disable-leader-election and conf.DisableLeaderElection as true, but found: %v", conf.DisableLeaderElection)
- }
-}
-
-func TestIfLeaderElectionDisabledFlagIsFalse(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--http-port", "80", "--https-port", "443"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if conf.DisableLeaderElection {
- t.Fatalf("Expected --disable-leader-election and conf.DisableLeaderElection as false, but found: %v", conf.DisableLeaderElection)
- }
-}
-
-func TestLeaderElectionTTLDefaultValue(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--http-port", "80", "--https-port", "443"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if conf.ElectionTTL != 30*time.Second {
- t.Fatalf("Expected --election-ttl and conf.ElectionTTL as 30s, but found: %v", conf.ElectionTTL)
- }
-}
-
-func TestLeaderElectionTTLParseValueInSeconds(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--http-port", "80", "--https-port", "443", "--election-ttl", "10s"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if conf.ElectionTTL != 10*time.Second {
- t.Fatalf("Expected --election-ttl and conf.ElectionTTL as 10s, but found: %v", conf.ElectionTTL)
- }
-}
-
-func TestLeaderElectionTTLParseValueInMinutes(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--http-port", "80", "--https-port", "443", "--election-ttl", "10m"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if conf.ElectionTTL != 10*time.Minute {
- t.Fatalf("Expected --election-ttl and conf.ElectionTTL as 10m, but found: %v", conf.ElectionTTL)
- }
-}
-
-func TestLeaderElectionTTLParseValueInHours(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--http-port", "80", "--https-port", "443", "--election-ttl", "1h"}
-
- _, conf, err := ParseFlags()
- if err != nil {
- t.Fatalf("Unexpected error parsing default flags: %v", err)
- }
-
- if conf.ElectionTTL != 1*time.Hour {
- t.Fatalf("Expected --election-ttl and conf.ElectionTTL as 1h, but found: %v", conf.ElectionTTL)
- }
-}
-
-func TestMetricsPerUndefinedHost(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--metrics-per-undefined-host=true"}
-
- _, _, err := ParseFlags()
- if err != nil {
- t.Fatalf("Expected no error but got: %s", err)
- }
-}
-
-func TestMetricsPerUndefinedHostWithMetricsPerHostFalse(t *testing.T) {
- ResetForTesting(func() { t.Fatal("Parsing failed") })
-
- oldArgs := os.Args
- defer func() { os.Args = oldArgs }()
- os.Args = []string{"cmd", "--metrics-per-host=false", "--metrics-per-undefined-host=true"}
-
- _, _, err := ParseFlags()
- if err == nil {
- t.Fatalf("Expected an error parsing flags but none returned")
- }
-}
diff --git a/pkg/util/runtime/cpu_linux.go b/pkg/util/runtime/cpu_linux.go
index 7db609053..cfc49d924 100644
--- a/pkg/util/runtime/cpu_linux.go
+++ b/pkg/util/runtime/cpu_linux.go
@@ -36,42 +36,15 @@ import (
//
// https://www.kernel.org/doc/Documentation/scheduler/sched-bwc.txt
func NumCPU() int {
- return NumCPUWithCustomPath("")
-}
-
-func NumCPUWithCustomPath(path string) int {
cpus := runtime.NumCPU()
- cgroupVersionCheckPath := path
-
- if cgroupVersionCheckPath == "" {
- cgroupVersionCheckPath = "/sys/fs/cgroup/"
+ cgroupPath, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
+ if err != nil {
+ return cpus
}
- cgroupVersion := GetCgroupVersion(cgroupVersionCheckPath)
- cpuQuota := int64(-1)
- cpuPeriod := int64(-1)
-
- if cgroupVersion == 1 {
- cgroupPath := ""
- if path == "" {
- cgroupPathRd, err := libcontainercgroups.FindCgroupMountpoint("", "cpu")
- if err != nil {
- return cpus
- }
- cgroupPath = cgroupPathRd
- } else {
- cgroupPath = path
- }
- cpuQuota = readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
- cpuPeriod = readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
- } else if cgroupVersion == 2 {
- cgroupPath := "/sys/fs/cgroup/"
- if path != "" {
- cgroupPath = path
- }
- cpuQuota, cpuPeriod = readCgroup2FileToInt64Tuple(cgroupPath, "cpu.max")
- }
+ cpuQuota := readCgroupFileToInt64(cgroupPath, "cpu.cfs_quota_us")
+ cpuPeriod := readCgroupFileToInt64(cgroupPath, "cpu.cfs_period_us")
if cpuQuota == -1 || cpuPeriod == -1 {
return cpus
@@ -80,66 +53,16 @@ func NumCPUWithCustomPath(path string) int {
return int(math.Ceil(float64(cpuQuota) / float64(cpuPeriod)))
}
-func GetCgroupVersion(cgroupPath string) int64 {
- // /sys/fs/cgroup/cgroup.controllers will not exist with cgroupsv1
- if _, err := os.Stat(filepath.Join(cgroupPath, "cgroup.controllers")); err == nil {
- return 2
- }
-
- return 1
-}
-
-func readCgroup2StringToInt64Tuple(cgroupString string) (quota, period int64) {
- // file contents looks like: $MAX $PERIOD
- // $MAX can have value "max" indicating no limit
- // it is possible for $PERIOD to be unset
-
- values := strings.Fields(cgroupString)
-
- if values[0] == "max" {
- return -1, -1
- }
-
- cpuQuota, err := strconv.ParseInt(values[0], 10, 64)
- if err != nil {
- return -1, -1
- }
-
- if len(values) == 1 {
- return cpuQuota, 100000
- }
-
- cpuPeriod, err := strconv.ParseInt(values[1], 10, 64)
- if err != nil {
- return -1, -1
- }
-
- return cpuQuota, cpuPeriod
-}
-
-func readCgroup2FileToInt64Tuple(cgroupPath, cgroupFile string) (quota, period int64) {
- contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
- if err != nil {
- return -1, -1
- }
-
- return readCgroup2StringToInt64Tuple(string(contents))
-}
-
-func readCgroupStringToInt64(contents string) int64 {
- strValue := strings.TrimSpace(contents)
- if value, err := strconv.ParseInt(strValue, 10, 64); err == nil {
- return value
- }
-
- return -1
-}
-
func readCgroupFileToInt64(cgroupPath, cgroupFile string) int64 {
contents, err := os.ReadFile(filepath.Join(cgroupPath, cgroupFile))
if err != nil {
return -1
}
- return readCgroupStringToInt64(string(contents))
+ strValue := strings.TrimSpace(string(contents))
+ if value, err := strconv.ParseInt(strValue, 10, 64); err == nil {
+ return value
+ }
+
+ return -1
}
diff --git a/rootfs/Dockerfile b/rootfs/Dockerfile
index 9b7753b5d..86517c6c1 100644
--- a/rootfs/Dockerfile
+++ b/rootfs/Dockerfile
@@ -59,7 +59,7 @@ RUN bash -xeu -c ' \
); \
for dir in "${writeDirs[@]}"; do \
mkdir -p ${dir}; \
- chown -R www-data:www-data ${dir}; \
+ chown -R www-data.www-data ${dir}; \
done' \
# LD_LIBRARY_PATH does not work so below is needed for opentelemetry/other modules
# Put libs of newer modules under `/modules_mount//lib` and add that path below
@@ -84,4 +84,5 @@ RUN ln -sf /dev/stdout /var/log/nginx/access.log \
&& ln -sf /dev/stderr /var/log/nginx/error.log
ENTRYPOINT ["/usr/bin/dumb-init", "--"]
+
CMD ["/nginx-ingress-controller"]
diff --git a/rootfs/Dockerfile-chroot b/rootfs/Dockerfile-chroot
index 481b311e2..a210aa7bf 100644
--- a/rootfs/Dockerfile-chroot
+++ b/rootfs/Dockerfile-chroot
@@ -23,7 +23,7 @@ RUN apk update \
&& apk upgrade \
&& /chroot.sh
-FROM alpine:3.21
+FROM alpine:3.19.0
ARG TARGETARCH
ARG VERSION
@@ -78,7 +78,7 @@ RUN bash -xeu -c ' \
); \
for dir in "${writeDirs[@]}"; do \
mkdir -p ${dir}; \
- chown -R www-data:www-data ${dir}; \
+ chown -R www-data.www-data ${dir}; \
done' \
# LD_LIBRARY_PATH does not work so below is needed for opentelemetry/other modules
# Put libs of newer modules under `/modules_mount//lib` and add that path below
@@ -103,7 +103,7 @@ RUN ln -sf /chroot/etc/nginx /etc/nginx \
&& touch /chroot/var/log/nginx/access.log \
&& chown www-data:www-data /chroot/var/log/nginx/access.log \
&& echo "" > /chroot/etc/resolv.conf \
- && chown -R www-data:www-data /chroot/var/log/nginx /chroot/etc/resolv.conf \
+ && chown -R www-data.www-data /chroot/var/log/nginx /chroot/etc/resolv.conf \
&& mknod -m 0666 /chroot/dev/null c 1 3 \
&& mknod -m 0666 /chroot/dev/random c 1 8 \
&& mknod -m 0666 /chroot/dev/urandom c 1 9 \
@@ -119,6 +119,7 @@ RUN mkdir -p /chroot/modules_mount \
USER www-data
EXPOSE 80 443
+
ENTRYPOINT ["/usr/bin/dumb-init", "--"]
CMD ["/nginx-ingress-controller"]
diff --git a/rootfs/chroot.sh b/rootfs/chroot.sh
index 4875ae535..38547b69c 100755
--- a/rootfs/chroot.sh
+++ b/rootfs/chroot.sh
@@ -39,7 +39,7 @@ writeDirs=( \
for dir in "${writeDirs[@]}"; do
mkdir -p ${dir};
- chown -R www-data:www-data ${dir};
+ chown -R www-data.www-data ${dir};
done
mkdir -p /chroot/lib /chroot/proc /chroot/usr /chroot/bin /chroot/dev /chroot/run
@@ -47,5 +47,4 @@ cp /etc/passwd /etc/group /etc/hosts /chroot/etc/
cp -a /usr/* /chroot/usr/
cp -a /etc/nginx/* /chroot/etc/nginx/
cp -a /etc/ingress-controller/* /chroot/etc/ingress-controller/
-cp /lib/ld-musl-* /chroot/lib/
-cp /usr/lib/libcrypto* /usr/lib/libssl* /usr/lib/libz* /chroot/usr/lib/
+cp /lib/ld-musl-* /lib/libcrypto* /lib/libssl* /lib/libz* /chroot/lib/
diff --git a/rootfs/etc/nginx/lua/OWNERS b/rootfs/etc/nginx/lua/OWNERS
index efb131316..79814fdba 100644
--- a/rootfs/etc/nginx/lua/OWNERS
+++ b/rootfs/etc/nginx/lua/OWNERS
@@ -1,4 +1,4 @@
-# See the OWNERS docs: https://www.kubernetes.dev/docs/guide/owners
+# See the OWNERS docs: https://github.com/kubernetes/community/blob/master/contributors/guide/owners.md
labels:
-- area/lua
+- area/lua
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/certificate.lua b/rootfs/etc/nginx/lua/certificate.lua
index 1b3d3b21f..48c8d7134 100644
--- a/rootfs/etc/nginx/lua/certificate.lua
+++ b/rootfs/etc/nginx/lua/certificate.lua
@@ -103,7 +103,6 @@ local function do_ocsp_request(url, ocsp_request)
["Host"] = parsed_url[2],
},
body = ocsp_request,
- ssl_server_name = parsed_url[2],
})
if not http_response then
return nil, err
diff --git a/rootfs/etc/nginx/lua/global_throttle.lua b/rootfs/etc/nginx/lua/global_throttle.lua
new file mode 100644
index 000000000..bea8cfd17
--- /dev/null
+++ b/rootfs/etc/nginx/lua/global_throttle.lua
@@ -0,0 +1,131 @@
+local resty_global_throttle = require("resty.global_throttle")
+local resty_ipmatcher = require("resty.ipmatcher")
+local util = require("util")
+
+local ngx = ngx
+local ngx_exit = ngx.exit
+local ngx_log = ngx.log
+local ngx_ERR = ngx.ERR
+local ngx_INFO = ngx.INFO
+
+local _M = {}
+
+local DECISION_CACHE = ngx.shared.global_throttle_cache
+
+-- it does not make sense to cache decision for too little time
+-- the benefit of caching likely is negated if we cache for too little time
+-- Lua Shared Dict's time resolution for expiry is 0.001.
+local CACHE_THRESHOLD = 0.001
+
+local DEFAULT_RAW_KEY = "remote_addr"
+
+local function should_ignore_request(ignored_cidrs)
+ if not ignored_cidrs or #ignored_cidrs == 0 then
+ return false
+ end
+
+ local ignored_cidrs_matcher, err = resty_ipmatcher.new(ignored_cidrs)
+ if not ignored_cidrs_matcher then
+ ngx_log(ngx_ERR, "failed to initialize resty-ipmatcher: ", err)
+ return false
+ end
+
+ local is_ignored
+ is_ignored, err = ignored_cidrs_matcher:match(ngx.var.remote_addr)
+ if err then
+ ngx_log(ngx_ERR, "failed to match ip: '",
+ ngx.var.remote_addr, "': ", err)
+ return false
+ end
+
+ return is_ignored
+end
+
+local function is_enabled(config, location_config)
+ if config.memcached.host == "" or config.memcached.port == 0 then
+ return false
+ end
+ if location_config.limit == 0 or
+ location_config.window_size == 0 then
+ return false
+ end
+
+ if should_ignore_request(location_config.ignored_cidrs) then
+ return false
+ end
+
+ return true
+end
+
+local function get_namespaced_key_value(namespace, key_value)
+ return namespace .. key_value
+end
+
+function _M.throttle(config, location_config)
+ if not is_enabled(config, location_config) then
+ return
+ end
+
+ local key_value = util.generate_var_value(location_config.key)
+ if not key_value or key_value == "" then
+ key_value = ngx.var[DEFAULT_RAW_KEY]
+ end
+
+ local namespaced_key_value =
+ get_namespaced_key_value(location_config.namespace, key_value)
+
+ local is_limit_exceeding = DECISION_CACHE:get(namespaced_key_value)
+ if is_limit_exceeding then
+ ngx.var.global_rate_limit_exceeding = "c"
+ return ngx_exit(config.status_code)
+ end
+
+ local my_throttle, err = resty_global_throttle.new(
+ location_config.namespace,
+ location_config.limit,
+ location_config.window_size,
+ {
+ provider = "memcached",
+ host = config.memcached.host,
+ port = config.memcached.port,
+ connect_timeout = config.memcached.connect_timeout,
+ max_idle_timeout = config.memcached.max_idle_timeout,
+ pool_size = config.memcached.pool_size,
+ }
+ )
+ if err then
+ ngx.log(ngx.ERR, "faled to initialize resty_global_throttle: ", err)
+ -- fail open
+ return
+ end
+
+ local desired_delay, estimated_final_count
+ estimated_final_count, desired_delay, err = my_throttle:process(key_value)
+ if err then
+ ngx.log(ngx.ERR, "error while processing key: ", err)
+ -- fail open
+ return
+ end
+
+ if desired_delay then
+ if desired_delay > CACHE_THRESHOLD then
+ local ok
+ ok, err =
+ DECISION_CACHE:safe_add(namespaced_key_value, true, desired_delay)
+ if not ok then
+ if err ~= "exists" then
+ ngx_log(ngx_ERR, "failed to cache decision: ", err)
+ end
+ end
+ end
+
+ ngx.var.global_rate_limit_exceeding = "y"
+ ngx_log(ngx_INFO, "limit is exceeding for ",
+ location_config.namespace, "/", key_value,
+ " with estimated_final_count: ", estimated_final_count)
+
+ return ngx_exit(config.status_code)
+ end
+end
+
+return _M
diff --git a/rootfs/etc/nginx/lua/lua_ingress.lua b/rootfs/etc/nginx/lua/lua_ingress.lua
index a513928cf..49e0f5b05 100644
--- a/rootfs/etc/nginx/lua/lua_ingress.lua
+++ b/rootfs/etc/nginx/lua/lua_ingress.lua
@@ -1,8 +1,8 @@
local ngx_re_split = require("ngx.re").split
-local string_to_bool = require("util").string_to_bool
local certificate_configured_for_current_request =
require("certificate").configured_for_current_request
+local global_throttle = require("global_throttle")
local ngx = ngx
local io = io
@@ -109,16 +109,7 @@ end
-- rewrite gets called in every location context.
-- This is where we do variable assignments to be used in subsequent
-- phases or redirection
-function _M.rewrite()
-
- local location_config = {
- force_ssl_redirect = string_to_bool(ngx.var.force_ssl_redirect),
- ssl_redirect = string_to_bool(ngx.var.ssl_redirect),
- force_no_ssl_redirect = string_to_bool(ngx.var.force_no_ssl_redirect),
- preserve_trailing_slash = string_to_bool(ngx.var.preserve_trailing_slash),
- use_port_in_redirects = string_to_bool(ngx.var.use_port_in_redirects),
- }
-
+function _M.rewrite(location_config)
ngx.var.pass_access_scheme = ngx.var.scheme
ngx.var.best_http_host = ngx.var.http_host or ngx.var.host
@@ -173,6 +164,7 @@ function _M.rewrite()
return ngx_redirect(uri, config.http_redirect_code)
end
+ global_throttle.throttle(config.global_throttle, location_config.global_throttle)
end
function _M.header()
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua
deleted file mode 100644
index 977d3e964..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local balancer = require("balancer")
-balancer.balance()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua
deleted file mode 100644
index 0442df7d8..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local tcp_udp_balancer = require("tcp_udp_balancer")
-tcp_udp_balancer.balance()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua
deleted file mode 100644
index d33d2171b..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_certificate.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local certificate = require("certificate")
-certificate.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua
deleted file mode 100644
index 7864f40ef..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_configuration.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local configuration = require("configuration")
-configuration.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua
deleted file mode 100644
index ed81e7ff3..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local tcp_udp_configuration = require("tcp_udp_configuration")
-tcp_udp_configuration.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_external_auth.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_external_auth.lua
deleted file mode 100644
index 6c68cf07c..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_external_auth.lua
+++ /dev/null
@@ -1,30 +0,0 @@
-local auth_path = ngx.var.auth_path
-local auth_keepalive_share_vars = ngx.var.auth_keepalive_share_vars
-local auth_response_headers = ngx.var.auth_response_headers
-local ngx_re_split = require("ngx.re").split
-local ipairs = ipairs
-local ngx_log = ngx.log
-local ngx_ERR = ngx.ERR
-
-local res = ngx.location.capture(auth_path, {
- method = ngx.HTTP_GET, body = '',
- share_all_vars = auth_keepalive_share_vars })
-
-if res.status == ngx.HTTP_OK then
- local header_parts, err = ngx_re_split(auth_response_headers, ",")
- if err then
- ngx_log(ngx_ERR, err)
- return
- end
- ngx.var.auth_cookie = res.header['Set-Cookie']
- for i, header_name in ipairs(header_parts) do
- local varname = "authHeader" .. tostring(i)
- ngx.var[varname] = res.header[header_name]
- end
- return
-end
-
-if res.status == ngx.HTTP_UNAUTHORIZED or res.status == ngx.HTTP_FORBIDDEN then
- ngx.exit(res.status)
-end
-ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua
deleted file mode 100644
index 926ab7a03..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local tcp_udp_balancer = require("tcp_udp_balancer")
-tcp_udp_balancer.init_worker()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua
deleted file mode 100644
index ade3114b1..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua
+++ /dev/null
@@ -1,9 +0,0 @@
-local configuration = require("configuration")
-local backend_data = configuration.get_backends_data()
-if not backend_data then
- ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
- return
-end
-
-ngx.say("OK")
-ngx.exit(ngx.HTTP_OK)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua
deleted file mode 100644
index 8f3d57be6..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_log.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local monitor = require("monitor")
-monitor.call()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua
deleted file mode 100644
index 72f6a6430..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_log_block.lua
+++ /dev/null
@@ -1,11 +0,0 @@
-local balancer = require("balancer")
-local monitor = require("monitor")
-
-local luaconfig = ngx.shared.luaconfig
-local enablemetrics = luaconfig:get("enablemetrics")
-
-balancer.log()
-
-if enablemetrics then
- monitor.call()
-end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua
deleted file mode 100644
index 0d16faba0..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua
+++ /dev/null
@@ -1 +0,0 @@
-ngx.var.cache_key = ngx.encode_base64(ngx.sha1_bin(ngx.var.tmp_cache_key))
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua b/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua
deleted file mode 100644
index 311a9b433..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua
+++ /dev/null
@@ -1,2 +0,0 @@
-local lua_ingress = require("lua_ingress")
-lua_ingress.header()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua b/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua
deleted file mode 100644
index 66fdd6d55..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_rewrite.lua
+++ /dev/null
@@ -1,5 +0,0 @@
-local lua_ingress = require("lua_ingress")
-local balancer = require("balancer")
-
-lua_ingress.rewrite()
-balancer.rewrite()
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua b/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua
deleted file mode 100644
index 4b9445d00..000000000
--- a/rootfs/etc/nginx/lua/nginx/ngx_srv_redirect.lua
+++ /dev/null
@@ -1,24 +0,0 @@
-local request_uri = ngx.var.request_uri
-local redirect_to = ngx.arg[1]
-
-local luaconfig = ngx.shared.luaconfig
-local use_forwarded_headers = luaconfig:get("use_forwarded_headers")
-
-if string.sub(request_uri, -1) == "/" then
- request_uri = string.sub(request_uri, 1, -2)
-end
-
-local redirectScheme = ngx.var.scheme
-local redirectPort = ngx.var.server_port
-
-if use_forwarded_headers then
- if ngx.var.http_x_forwarded_proto then
- redirectScheme = ngx.var.http_x_forwarded_proto
- end
- if ngx.var.http_x_forwarded_port then
- redirectPort = ngx.var.http_x_forwarded_port
- end
-end
-
-return string.format("%s://%s:%s%s", redirectScheme,
- redirect_to, redirectPort, request_uri)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init.lua b/rootfs/etc/nginx/lua/ngx_conf_init.lua
deleted file mode 100644
index 9789386ac..000000000
--- a/rootfs/etc/nginx/lua/ngx_conf_init.lua
+++ /dev/null
@@ -1,53 +0,0 @@
-local cjson = require("cjson.safe")
-
-collectgarbage("collect")
-local f = io.open("/etc/nginx/lua/cfg.json", "r")
-local content = f:read("*a")
-f:close()
-local configfile = cjson.decode(content)
-
-local luaconfig = ngx.shared.luaconfig
-luaconfig:set("enablemetrics", configfile.enable_metrics)
-luaconfig:set("use_forwarded_headers", configfile.use_forwarded_headers)
--- init modules
-local ok, res
-ok, res = pcall(require, "lua_ingress")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- lua_ingress = res
- lua_ingress.set_config(configfile)
-end
-ok, res = pcall(require, "configuration")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- configuration = res
- if not configfile.listen_ports.status_port then
- error("required status port not found")
- end
- configuration.prohibited_localhost_port = configfile.listen_ports.status_port
-end
-ok, res = pcall(require, "balancer")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- balancer = res
-end
-if configfile.enable_metrics then
- ok, res = pcall(require, "monitor")
- if not ok then
- error("require failed: " .. tostring(res))
- else
- monitor = res
- end
-end
-ok, res = pcall(require, "certificate")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- certificate = res
- if configfile.enable_ocsp then
- certificate.is_ocsp_stapling_enabled = configfile.enable_ocsp
- end
-end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua b/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua
deleted file mode 100644
index a78062d0a..000000000
--- a/rootfs/etc/nginx/lua/ngx_conf_init_stream.lua
+++ /dev/null
@@ -1,30 +0,0 @@
-local cjson = require("cjson.safe")
-collectgarbage("collect")
-local f = io.open("/etc/nginx/lua/cfg.json", "r")
-local content = f:read("*a")
-f:close()
-local configfile = cjson.decode(content)
--- init modules
-local ok, res
-ok, res = pcall(require, "configuration")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- configuration = res
-end
-ok, res = pcall(require, "tcp_udp_configuration")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- tcp_udp_configuration = res
- if not configfile.listen_ports.status_port then
- error("required status port not found")
- end
- tcp_udp_configuration.prohibited_localhost_port = configfile.listen_ports.status_port
-end
-ok, res = pcall(require, "tcp_udp_balancer")
-if not ok then
- error("require failed: " .. tostring(res))
-else
- tcp_udp_balancer = res
-end
diff --git a/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua b/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua
deleted file mode 100644
index cba866136..000000000
--- a/rootfs/etc/nginx/lua/ngx_conf_init_worker.lua
+++ /dev/null
@@ -1,15 +0,0 @@
-local cjson = require("cjson.safe")
-
-local f = io.open("/etc/nginx/lua/cfg.json", "r")
-local content = f:read("*a")
-f:close()
-local configfile = cjson.decode(content)
-
-local lua_ingress = require("lua_ingress")
-local balancer = require("balancer")
-local monitor = require("monitor")
-lua_ingress.init_worker()
-balancer.init_worker()
-if configfile.enable_metrics and configfile.monitor_batch_max_size then
- monitor.init_worker(configfile.monitor_batch_max_size)
-end
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/plugins.lua b/rootfs/etc/nginx/lua/plugins.lua
new file mode 100644
index 000000000..55e208a32
--- /dev/null
+++ b/rootfs/etc/nginx/lua/plugins.lua
@@ -0,0 +1,61 @@
+local require = require
+local ngx = ngx
+local ipairs = ipairs
+local string_format = string.format
+local ngx_log = ngx.log
+local INFO = ngx.INFO
+local ERR = ngx.ERR
+local pcall = pcall
+
+local _M = {}
+local MAX_NUMBER_OF_PLUGINS = 20
+local plugins = {}
+
+local function load_plugin(name)
+ local path = string_format("plugins.%s.main", name)
+
+ local ok, plugin = pcall(require, path)
+ if not ok then
+ ngx_log(ERR, string_format("error loading plugin \"%s\": %s", path, plugin))
+ return
+ end
+ local index = #plugins
+ if (plugin.name == nil or plugin.name == '') then
+ plugin.name = name
+ end
+ plugins[index + 1] = plugin
+end
+
+function _M.init(names)
+ local count = 0
+ for _, name in ipairs(names) do
+ if count >= MAX_NUMBER_OF_PLUGINS then
+ ngx_log(ERR, "the total number of plugins exceed the maximum number: ", MAX_NUMBER_OF_PLUGINS)
+ break
+ end
+ load_plugin(name)
+ count = count + 1 -- ignore loading failure, just count the total
+ end
+end
+
+function _M.run()
+ local phase = ngx.get_phase()
+
+ for _, plugin in ipairs(plugins) do
+ if plugin[phase] then
+ ngx_log(INFO, string_format("running plugin \"%s\" in phase \"%s\"", plugin.name, phase))
+
+ -- TODO: consider sandboxing this, should we?
+ -- probably yes, at least prohibit plugin from accessing env vars etc
+ -- but since the plugins are going to be installed by ingress-nginx
+ -- operator they can be assumed to be safe also
+ local ok, err = pcall(plugin[phase])
+ if not ok then
+ ngx_log(ERR, string_format("error while running plugin \"%s\" in phase \"%s\": %s",
+ plugin.name, phase, err))
+ end
+ end
+ end
+end
+
+return _M
diff --git a/rootfs/etc/nginx/lua/plugins/README.md b/rootfs/etc/nginx/lua/plugins/README.md
new file mode 100644
index 000000000..64f4912f0
--- /dev/null
+++ b/rootfs/etc/nginx/lua/plugins/README.md
@@ -0,0 +1,36 @@
+# Custom Lua plugins
+
+ingress-nginx uses [https://github.com/openresty/lua-nginx-module](https://github.com/openresty/lua-nginx-module) to run custom Lua code
+within Nginx workers. It is recommended to familiarize yourself with that ecosystem before deploying your custom Lua based ingress-nginx plugin.
+
+### Writing a plugin
+
+Every ingress-nginx Lua plugin is expected to have `main.lua` file and all of its dependencies.
+`main.lua` is the entry point of the plugin. The plugin manager uses convention over configuration
+strategy and automatically runs functions defined in `main.lua` in the corresponding Nginx phase based on their name.
+
+Nginx has different [request processing phases](https://nginx.org/en/docs/dev/development_guide.html#http_phases).
+By defining functions with the following names, you can run your custom Lua code in the corresponding Nginx phase:
+
+ - `init_worker`: useful for initializing some data per Nginx worker process
+ - `rewrite`: useful for modifying request, changing headers, redirection, dropping request, doing authentication etc
+ - `header_filter`: this is called when backend response header is received, it is useful for modifying response headers
+ - `body_filter`: this is called when response body is received, it is useful for logging response body
+ - `log`: this is called when request processing is completed and a response is delivered to the client
+
+Check this [`hello_world`](https://github.com/kubernetes/ingress-nginx/tree/main/rootfs/etc/nginx/lua/plugins/hello_world) plugin as a simple example or refer to [OpenID Connect integration](https://github.com/ElvinEfendi/ingress-nginx-openidc/tree/master/rootfs/etc/nginx/lua/plugins/openidc) for more advanced usage.
+
+Do not forget to write tests for your plugin.
+
+### Installing a plugin
+
+There are two options:
+
+ - mount your plugin into `/etc/nginx/lua/plugins/` in the ingress-nginx pod
+ - build your own ingress-nginx image like it is done in the [example](https://github.com/ElvinEfendi/ingress-nginx-openidc/tree/master/rootfs/etc/nginx/lua/plugins/openidc) and install your plugin during image build
+
+Mounting is the quickest option.
+
+### Enabling plugins
+
+Once your plugin is ready you need to use [`plugins` configuration setting](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#plugins) to activate it. Let's say you want to activate `hello_world` and `open_idc` plugins, then you set `plugins` setting to `"hello_world, open_idc"`. _Note_ that the plugins will be executed in the given order.
diff --git a/rootfs/etc/nginx/lua/plugins/hello_world/main.lua b/rootfs/etc/nginx/lua/plugins/hello_world/main.lua
new file mode 100644
index 000000000..03316c3ee
--- /dev/null
+++ b/rootfs/etc/nginx/lua/plugins/hello_world/main.lua
@@ -0,0 +1,13 @@
+local ngx = ngx
+
+local _M = {}
+
+function _M.rewrite()
+ local ua = ngx.var.http_user_agent
+
+ if ua == "hello" then
+ ngx.req.set_header("x-hello-world", "1")
+ end
+end
+
+return _M
diff --git a/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua b/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua
new file mode 100644
index 000000000..5eda52259
--- /dev/null
+++ b/rootfs/etc/nginx/lua/plugins/hello_world/test/main_test.lua
@@ -0,0 +1,24 @@
+
+local main = require("plugins.hello_world.main")
+
+-- The unit tests are run within a timer phase in a headless Nginx process.
+-- Since `set_header` and `ngx.var.http_` API are disabled in this phase we have to stub it
+-- to avoid `API disabled in the current context` error.
+
+describe("main", function()
+ describe("rewrite", function()
+ it("sets x-hello-world header to 1 when user agent is hello", function()
+ ngx.var = { http_user_agent = "hello" }
+ stub(ngx.req, "set_header")
+ main.rewrite()
+ assert.stub(ngx.req.set_header).was_called_with("x-hello-world", "1")
+ end)
+
+ it("does not set x-hello-world header to 1 when user agent is not hello", function()
+ ngx.var = { http_user_agent = "not-hello" }
+ stub(ngx.req, "set_header")
+ main.rewrite()
+ assert.stub(ngx.req.set_header).was_not_called_with("x-hello-world", "1")
+ end)
+ end)
+end)
diff --git a/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua b/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
index 70723143b..80d0c0d0e 100644
--- a/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
+++ b/rootfs/etc/nginx/lua/test/balancer/sticky_test.lua
@@ -357,7 +357,7 @@ describe("Sticky", function()
for _ = 1, 100 do
local new_upstream = sticky_balancer_instance:balance()
if change_on_failure == false then
- -- upstream should be the same in spite of error, if change_on_failure option is false
+ -- upstream should be the same inspite of error, if change_on_failure option is false
assert.equal(new_upstream, old_upstream)
else
-- upstream should change after error, if change_on_failure option is true
diff --git a/rootfs/etc/nginx/lua/test/global_throttle_test.lua b/rootfs/etc/nginx/lua/test/global_throttle_test.lua
new file mode 100644
index 000000000..b8db740ad
--- /dev/null
+++ b/rootfs/etc/nginx/lua/test/global_throttle_test.lua
@@ -0,0 +1,258 @@
+local util = require("util")
+
+local function assert_request_rejected(config, location_config, opts)
+ stub(ngx, "exit")
+
+ local global_throttle = require_without_cache("global_throttle")
+ assert.has_no.errors(function()
+ global_throttle.throttle(config, location_config)
+ end)
+
+ assert.stub(ngx.exit).was_called_with(config.status_code)
+ if opts.with_cache then
+ assert.are.same("c", ngx.var.global_rate_limit_exceeding)
+ else
+ assert.are.same("y", ngx.var.global_rate_limit_exceeding)
+ end
+end
+
+local function assert_request_not_rejected(config, location_config)
+ stub(ngx, "exit")
+ local cache_safe_add_spy = spy.on(ngx.shared.global_throttle_cache, "safe_add")
+
+ local global_throttle = require_without_cache("global_throttle")
+ assert.has_no.errors(function()
+ global_throttle.throttle(config, location_config)
+ end)
+
+ assert.stub(ngx.exit).was_not_called()
+ assert.is_nil(ngx.var.global_rate_limit_exceeding)
+ assert.spy(cache_safe_add_spy).was_not_called()
+end
+
+local function assert_short_circuits(f)
+ local cache_get_spy = spy.on(ngx.shared.global_throttle_cache, "get")
+
+ local resty_global_throttle = require_without_cache("resty.global_throttle")
+ local resty_global_throttle_new_spy = spy.on(resty_global_throttle, "new")
+
+ local global_throttle = require_without_cache("global_throttle")
+
+ f(global_throttle)
+
+ assert.spy(resty_global_throttle_new_spy).was_not_called()
+ assert.spy(cache_get_spy).was_not_called()
+end
+
+local function assert_fails_open(config, location_config, ...)
+ stub(ngx, "exit")
+ stub(ngx, "log")
+
+ local global_throttle = require_without_cache("global_throttle")
+
+ assert.has_no.errors(function()
+ global_throttle.throttle(config, location_config)
+ end)
+
+ assert.stub(ngx.exit).was_not_called()
+ assert.stub(ngx.log).was_called_with(ngx.ERR, ...)
+ assert.is_nil(ngx.var.global_rate_limit_exceeding)
+end
+
+local function stub_resty_global_throttle_process(ret1, ret2, ret3, f)
+ local resty_global_throttle = require_without_cache("resty.global_throttle")
+ local resty_global_throttle_mock = {
+ process = function(self, key) return ret1, ret2, ret3 end
+ }
+ stub(resty_global_throttle, "new", resty_global_throttle_mock)
+
+ f()
+
+ assert.stub(resty_global_throttle.new).was_called()
+end
+
+local function cache_rejection_decision(namespace, key_value, desired_delay)
+ local namespaced_key_value = namespace .. key_value
+ local ok, err = ngx.shared.global_throttle_cache:safe_add(namespaced_key_value, true, desired_delay)
+ assert.is_nil(err)
+ assert.is_true(ok)
+ assert.is_true(ngx.shared.global_throttle_cache:get(namespaced_key_value))
+end
+
+describe("global_throttle", function()
+ local snapshot
+
+ local NAMESPACE = "31285d47b1504dcfbd6f12c46d769f6e"
+ local LOCATION_CONFIG = {
+ namespace = NAMESPACE,
+ limit = 10,
+ window_size = 60,
+ key = {},
+ ignored_cidrs = {},
+ }
+ local CONFIG = {
+ memcached = {
+ host = "memc.default.svc.cluster.local", port = 11211,
+ connect_timeout = 50, max_idle_timeout = 10000, pool_size = 50,
+ },
+ status_code = 429,
+ }
+
+ before_each(function()
+ snapshot = assert:snapshot()
+
+ ngx.var = { remote_addr = "127.0.0.1", global_rate_limit_exceeding = nil }
+ end)
+
+ after_each(function()
+ snapshot:revert()
+
+ ngx.shared.global_throttle_cache:flush_all()
+ reset_ngx()
+ end)
+
+ it("short circuits when memcached is not configured", function()
+ assert_short_circuits(function(global_throttle)
+ assert.has_no.errors(function()
+ global_throttle.throttle({ memcached = { host = "", port = 0 } }, LOCATION_CONFIG)
+ end)
+ end)
+ end)
+
+ it("short circuits when limit or window_size is not configured", function()
+ assert_short_circuits(function(global_throttle)
+ local location_config_copy = util.deepcopy(LOCATION_CONFIG)
+ location_config_copy.limit = 0
+ assert.has_no.errors(function()
+ global_throttle.throttle(CONFIG, location_config_copy)
+ end)
+ end)
+
+ assert_short_circuits(function(global_throttle)
+ local location_config_copy = util.deepcopy(LOCATION_CONFIG)
+ location_config_copy.window_size = 0
+ assert.has_no.errors(function()
+ global_throttle.throttle(CONFIG, location_config_copy)
+ end)
+ end)
+ end)
+
+ it("short circuits when remote_addr is in ignored_cidrs", function()
+ local global_throttle = require_without_cache("global_throttle")
+ local location_config = util.deepcopy(LOCATION_CONFIG)
+ location_config.ignored_cidrs = { ngx.var.remote_addr }
+ assert_short_circuits(function(global_throttle)
+ assert.has_no.errors(function()
+ global_throttle.throttle(CONFIG, location_config)
+ end)
+ end)
+ end)
+
+ it("rejects when exceeding limit has already been cached", function()
+ local key_value = "foo"
+ local location_config = util.deepcopy(LOCATION_CONFIG)
+ location_config.key = { { nil, nil, nil, key_value } }
+ cache_rejection_decision(NAMESPACE, key_value, 0.5)
+
+ assert_request_rejected(CONFIG, location_config, { with_cache = true })
+ end)
+
+ describe("when resty_global_throttle fails", function()
+ it("fails open in case of initialization error", function()
+ local too_long_namespace = ""
+ for i=1,36,1 do
+ too_long_namespace = too_long_namespace .. "a"
+ end
+
+ local location_config = util.deepcopy(LOCATION_CONFIG)
+ location_config.namespace = too_long_namespace
+
+ assert_fails_open(CONFIG, location_config, "faled to initialize resty_global_throttle: ", "'namespace' can be at most 35 characters")
+ end)
+
+ it("fails open in case of key processing error", function()
+ stub_resty_global_throttle_process(nil, nil, "failed to process", function()
+ assert_fails_open(CONFIG, LOCATION_CONFIG, "error while processing key: ", "failed to process")
+ end)
+ end)
+ end)
+
+ it("initializes resty_global_throttle with the right parameters", function()
+ local resty_global_throttle = require_without_cache("resty.global_throttle")
+ local resty_global_throttle_original_new = resty_global_throttle.new
+ resty_global_throttle.new = function(namespace, limit, window_size, store_opts)
+ local o, err = resty_global_throttle_original_new(namespace, limit, window_size, store_opts)
+ if not o then
+ return nil, err
+ end
+ o.process = function(self, key) return 1, nil, nil end
+
+ local expected = LOCATION_CONFIG
+ assert.are.same(expected.namespace, namespace)
+ assert.are.same(expected.limit, limit)
+ assert.are.same(expected.window_size, window_size)
+
+ assert.are.same("memcached", store_opts.provider)
+ assert.are.same(CONFIG.memcached.host, store_opts.host)
+ assert.are.same(CONFIG.memcached.port, store_opts.port)
+ assert.are.same(CONFIG.memcached.connect_timeout, store_opts.connect_timeout)
+ assert.are.same(CONFIG.memcached.max_idle_timeout, store_opts.max_idle_timeout)
+ assert.are.same(CONFIG.memcached.pool_size, store_opts.pool_size)
+
+ return o, nil
+ end
+ local resty_global_throttle_new_spy = spy.on(resty_global_throttle, "new")
+
+ local global_throttle = require_without_cache("global_throttle")
+
+ assert.has_no.errors(function()
+ global_throttle.throttle(CONFIG, LOCATION_CONFIG)
+ end)
+
+ assert.spy(resty_global_throttle_new_spy).was_called()
+ end)
+
+ it("rejects request and caches decision when limit is exceeding after processing a key", function()
+ local desired_delay = 0.015
+
+ stub_resty_global_throttle_process(LOCATION_CONFIG.limit + 1, desired_delay, nil, function()
+ assert_request_rejected(CONFIG, LOCATION_CONFIG, { with_cache = false })
+
+ local cache_key = LOCATION_CONFIG.namespace .. ngx.var.remote_addr
+ assert.is_true(ngx.shared.global_throttle_cache:get(cache_key))
+
+ -- we assume it won't take more than this after caching
+ -- until we execute the assertion below
+ local delta = 0.001
+ local ttl = ngx.shared.global_throttle_cache:ttl(cache_key)
+ assert.is_true(ttl > desired_delay - delta)
+ assert.is_true(ttl <= desired_delay)
+ end)
+ end)
+
+ it("rejects request and skip caching of decision when limit is exceeding after processing a key but desired delay is lower than the threshold", function()
+ local desired_delay = 0.0009
+
+ stub_resty_global_throttle_process(LOCATION_CONFIG.limit, desired_delay, nil, function()
+ assert_request_rejected(CONFIG, LOCATION_CONFIG, { with_cache = false })
+
+ local cache_key = LOCATION_CONFIG.namespace .. ngx.var.remote_addr
+ assert.is_nil(ngx.shared.global_throttle_cache:get(cache_key))
+ end)
+ end)
+
+ it("allows the request when limit is not exceeding after processing a key", function()
+ stub_resty_global_throttle_process(LOCATION_CONFIG.limit - 3, nil, nil,
+ function()
+ assert_request_not_rejected(CONFIG, LOCATION_CONFIG)
+ end
+ )
+ end)
+
+ it("rejects with custom status code", function()
+ cache_rejection_decision(NAMESPACE, ngx.var.remote_addr, 0.3)
+ local config = util.deepcopy(CONFIG)
+ config.status_code = 503
+ assert_request_rejected(config, LOCATION_CONFIG, { with_cache = true })
+ end)
+end)
diff --git a/rootfs/etc/nginx/lua/test/plugins_test.lua b/rootfs/etc/nginx/lua/test/plugins_test.lua
new file mode 100644
index 000000000..d7f789d0f
--- /dev/null
+++ b/rootfs/etc/nginx/lua/test/plugins_test.lua
@@ -0,0 +1,23 @@
+describe("plugins", function()
+ describe("#run", function()
+ it("runs the plugins in the given order", function()
+ ngx.get_phase = function() return "rewrite" end
+ local plugins = require("plugins")
+ local called_plugins = {}
+ local plugins_to_mock = {"plugins.pluginfirst.main", "plugins.pluginsecond.main", "plugins.pluginthird.main"}
+ for i=1, 3, 1
+ do
+ package.loaded[plugins_to_mock[i]] = {
+ rewrite = function()
+ called_plugins[#called_plugins + 1] = plugins_to_mock[i]
+ end
+ }
+ end
+ assert.has_no.errors(function()
+ plugins.init({"pluginfirst", "pluginsecond", "pluginthird"})
+ end)
+ assert.has_no.errors(plugins.run)
+ assert.are.same(plugins_to_mock, called_plugins)
+ end)
+ end)
+end)
\ No newline at end of file
diff --git a/rootfs/etc/nginx/lua/util.lua b/rootfs/etc/nginx/lua/util.lua
index 1e4cd7c01..7389f3226 100644
--- a/rootfs/etc/nginx/lua/util.lua
+++ b/rootfs/etc/nginx/lua/util.lua
@@ -146,10 +146,6 @@ function _M.is_blank(str)
return str == nil or string_len(str) == 0
end
-function _M.string_to_bool(str)
- return str == "true"
-end
-
-- this implementation is taken from:
-- https://github.com/luafun/luafun/blob/master/fun.lua#L33
-- SHA: 04c99f9c393e54a604adde4b25b794f48104e0d0
diff --git a/rootfs/etc/nginx/template/nginx.tmpl b/rootfs/etc/nginx/template/nginx.tmpl
index 6b8e750b0..94dc12412 100644
--- a/rootfs/etc/nginx/template/nginx.tmpl
+++ b/rootfs/etc/nginx/template/nginx.tmpl
@@ -30,7 +30,7 @@ load_module /etc/nginx/modules/ngx_http_modsecurity_module.so;
{{ end }}
{{ if (shouldLoadOpentelemetryModule $cfg $servers) }}
-load_module /etc/nginx/modules/otel_ngx_module.so;
+load_module /modules_mount/etc/nginx/modules/otel/otel_ngx_module.so;
{{ end }}
daemon off;
@@ -68,11 +68,71 @@ http {
{{ buildLuaSharedDictionaries $cfg $servers }}
- lua_shared_dict luaconfig 5m;
+ init_by_lua_block {
+ collectgarbage("collect")
- init_by_lua_file /etc/nginx/lua/ngx_conf_init.lua;
+ -- init modules
+ local ok, res
- init_worker_by_lua_file /etc/nginx/lua/ngx_conf_init_worker.lua;
+ ok, res = pcall(require, "lua_ingress")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ lua_ingress = res
+ lua_ingress.set_config({{ configForLua $all }})
+ end
+
+ ok, res = pcall(require, "configuration")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ configuration = res
+ configuration.prohibited_localhost_port = '{{ .StatusPort }}'
+ end
+
+ ok, res = pcall(require, "balancer")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ balancer = res
+ end
+
+ {{ if $all.EnableMetrics }}
+ ok, res = pcall(require, "monitor")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ monitor = res
+ end
+ {{ end }}
+
+ ok, res = pcall(require, "certificate")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ certificate = res
+ certificate.is_ocsp_stapling_enabled = {{ $cfg.EnableOCSP }}
+ end
+
+ ok, res = pcall(require, "plugins")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ plugins = res
+ end
+ -- load all plugins that'll be used here
+ plugins.init({ {{ range $idx, $plugin := $cfg.Plugins }}{{ if $idx }},{{ end }}{{ $plugin | quote }}{{ end }} })
+ }
+
+ init_worker_by_lua_block {
+ lua_ingress.init_worker()
+ balancer.init_worker()
+ {{ if $all.EnableMetrics }}
+ monitor.init_worker({{ $all.MonitorMaxBatchSize }})
+ {{ end }}
+
+ plugins.run()
+ }
{{/* Enable the real_ip module only if we use either X-Forwarded headers or Proxy Protocol. */}}
{{/* we use the value of the real IP for the geo_ip module */}}
@@ -112,9 +172,6 @@ http {
{{ range $index, $file := $all.MaxmindEditionFiles }}
{{ if eq $file "GeoLite2-Country.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoLite2-Country.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_country_code source=$remote_addr country iso_code;
$geoip2_country_name source=$remote_addr country names en;
$geoip2_country_geoname_id source=$remote_addr country geoname_id;
@@ -126,9 +183,6 @@ http {
{{ if eq $file "GeoIP2-Country.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoIP2-Country.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_country_code source=$remote_addr country iso_code;
$geoip2_country_name source=$remote_addr country names en;
$geoip2_country_geoname_id source=$remote_addr country geoname_id;
@@ -140,9 +194,6 @@ http {
{{ if eq $file "GeoLite2-City.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoLite2-City.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_city_country_code source=$remote_addr country iso_code;
$geoip2_city_country_name source=$remote_addr country names en;
$geoip2_city_country_geoname_id source=$remote_addr country geoname_id;
@@ -166,9 +217,6 @@ http {
{{ if eq $file "GeoIP2-City.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoIP2-City.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_city_country_code source=$remote_addr country iso_code;
$geoip2_city_country_name source=$remote_addr country names en;
$geoip2_city_country_geoname_id source=$remote_addr country geoname_id;
@@ -192,9 +240,6 @@ http {
{{ if eq $file "GeoLite2-ASN.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoLite2-ASN.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_asn source=$remote_addr autonomous_system_number;
$geoip2_org source=$remote_addr autonomous_system_organization;
}
@@ -202,9 +247,6 @@ http {
{{ if eq $file "GeoIP2-ASN.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoIP2-ASN.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_asn source=$remote_addr autonomous_system_number;
$geoip2_org source=$remote_addr autonomous_system_organization;
}
@@ -212,9 +254,6 @@ http {
{{ if eq $file "GeoIP2-ISP.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoIP2-ISP.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_isp source=$remote_addr isp;
$geoip2_isp_org source=$remote_addr organization;
$geoip2_asn source=$remote_addr default=0 autonomous_system_number;
@@ -229,9 +268,6 @@ http {
{{ if eq $file "GeoIP2-Anonymous-IP.mmdb" }}
geoip2 /etc/ingress-controller/geoip/GeoIP2-Anonymous-IP.mmdb {
- {{ if (gt $cfg.GeoIP2AutoReloadMinutes 0) }}
- auto_reload {{ $cfg.GeoIP2AutoReloadMinutes }}m;
- {{ end }}
$geoip2_is_anon source=$remote_addr is_anonymous;
$geoip2_is_anonymous source=$remote_addr default=0 is_anonymous;
$geoip2_is_anonymous_vpn source=$remote_addr default=0 is_anonymous_vpn;
@@ -271,10 +307,6 @@ http {
client_body_buffer_size {{ $cfg.ClientBodyBufferSize }};
client_body_timeout {{ $cfg.ClientBodyTimeout }}s;
- {{ if gt $cfg.GRPCBufferSizeKb 0 }}
- grpc_buffer_size {{ $cfg.GRPCBufferSizeKb }}k;
- {{ end }}
-
{{ if and (ne $cfg.HTTP2MaxHeaderSize "") (ne $cfg.HTTP2MaxFieldSize "") }}
http2_max_field_size {{ $cfg.HTTP2MaxFieldSize }};
http2_max_header_size {{ $cfg.HTTP2MaxHeaderSize }};
@@ -459,10 +491,6 @@ http {
proxy_intercept_errors on;
{{ end }}
- {{ if $cfg.RelativeRedirects }}
- absolute_redirect off;
- {{ end }}
-
{{ range $errCode := $cfg.CustomHTTPErrors }}
error_page {{ $errCode }} = @custom_upstream-default-backend_{{ $errCode }};{{ end }}
@@ -494,7 +522,9 @@ http {
server 0.0.0.1; # placeholder
- balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer.lua;
+ balancer_by_lua_block {
+ balancer.balance()
+ }
{{ if (gt $cfg.UpstreamKeepaliveConnections 0) }}
keepalive {{ $cfg.UpstreamKeepaliveConnections }};
@@ -559,7 +589,9 @@ http {
{{ buildHTTPListener $all $redirect.From }}
{{ buildHTTPSListener $all $redirect.From }}
- ssl_certificate_by_lua_file /etc/nginx/lua/nginx/ngx_conf_certificate.lua;
+ ssl_certificate_by_lua_block {
+ certificate.call()
+ }
{{ if gt (len $cfg.BlockUserAgents) 0 }}
if ($block_ua) {
@@ -572,7 +604,30 @@ http {
}
{{ end }}
- set_by_lua_file $redirect_to /etc/nginx/lua/nginx/ngx_srv_redirect.lua {{ $redirect.To }};
+ set_by_lua_block $redirect_to {
+ local request_uri = ngx.var.request_uri
+ if string.sub(request_uri, -1) == "/" then
+ request_uri = string.sub(request_uri, 1, -2)
+ end
+
+ {{ if $cfg.UseForwardedHeaders }}
+ local redirectScheme
+ if not ngx.var.http_x_forwarded_proto then
+ redirectScheme = ngx.var.scheme
+ else
+ redirectScheme = ngx.var.http_x_forwarded_proto
+ end
+ {{ else }}
+ local redirectScheme = ngx.var.scheme
+ {{ end }}
+
+ {{ if ne $all.ListenPorts.HTTPS 443 }}
+ {{ $redirect_port := (printf ":%v" $all.ListenPorts.HTTPS) }}
+ return string.format("%s://%s%s%s", redirectScheme, "{{ $redirect.To }}", "{{ $redirect_port }}", request_uri)
+ {{ else }}
+ return string.format("%s://%s%s", redirectScheme, "{{ $redirect.To }}", request_uri)
+ {{ end }}
+ }
return {{ $all.Cfg.HTTPRedirectCode }} $redirect_to;
}
@@ -603,10 +658,6 @@ http {
server {
server_name {{ buildServerName $server.Hostname }} {{range $server.Aliases }}{{ . }} {{ end }};
- {{ if $cfg.UseHTTP2 }}
- http2 on;
- {{ end }}
-
{{ if gt (len $cfg.BlockUserAgents) 0 }}
if ($block_ua) {
return 403;
@@ -667,7 +718,17 @@ http {
}
location /is-dynamic-lb-initialized {
- content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_is_dynamic_lb_initialized.lua;
+ content_by_lua_block {
+ local configuration = require("configuration")
+ local backend_data = configuration.get_backends_data()
+ if not backend_data then
+ ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
+ return
+ end
+
+ ngx.say("OK")
+ ngx.exit(ngx.HTTP_OK)
+ }
}
location {{ .StatusPath }} {
@@ -679,11 +740,15 @@ http {
client_body_buffer_size {{ luaConfigurationRequestBodySize $cfg }};
proxy_buffering off;
- content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_configuration.lua;
+ content_by_lua_block {
+ configuration.call()
+ }
}
location / {
- return 404;
+ content_by_lua_block {
+ ngx.exit(ngx.HTTP_NOT_FOUND)
+ }
}
}
}
@@ -695,9 +760,39 @@ stream {
{{ buildResolvers $cfg.Resolver $cfg.DisableIpv6DNS }}
- init_by_lua_file /etc/nginx/lua/ngx_conf_init_stream.lua;
+ init_by_lua_block {
+ collectgarbage("collect")
- init_worker_by_lua_file /etc/nginx/lua/nginx/ngx_conf_init_tcp_udp.lua;
+ -- init modules
+ local ok, res
+
+ ok, res = pcall(require, "configuration")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ configuration = res
+ end
+
+ ok, res = pcall(require, "tcp_udp_configuration")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ tcp_udp_configuration = res
+ tcp_udp_configuration.prohibited_localhost_port = '{{ .StatusPort }}'
+
+ end
+
+ ok, res = pcall(require, "tcp_udp_balancer")
+ if not ok then
+ error("require failed: " .. tostring(res))
+ else
+ tcp_udp_balancer = res
+ end
+ }
+
+ init_worker_by_lua_block {
+ tcp_udp_balancer.init_worker()
+ }
lua_add_variable $proxy_upstream_name;
@@ -719,7 +814,10 @@ stream {
upstream upstream_balancer {
server 0.0.0.1:1234; # placeholder
- balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer_tcp_udp.lua;
+
+ balancer_by_lua_block {
+ tcp_udp_balancer.balance()
+ }
}
server {
@@ -727,7 +825,9 @@ stream {
access_log off;
- content_by_lua_file /etc/nginx/lua/nginx/ngx_conf_content_tcp_udp.lua;
+ content_by_lua_block {
+ tcp_udp_configuration.call()
+ }
}
# TCP services
@@ -827,9 +927,11 @@ stream {
rewrite (.*) / break;
proxy_pass http://upstream_balancer;
- {{ if $enableMetrics }}
- log_by_lua_file /etc/nginx/lua/nginx/ngx_conf_log.lua;
- {{ end }}
+ log_by_lua_block {
+ {{ if $enableMetrics }}
+ monitor.call()
+ {{ end }}
+ }
}
{{ end }}
{{ end }}
@@ -889,7 +991,9 @@ stream {
ssl_reject_handshake {{ if $all.Cfg.SSLRejectHandshake }}on{{ else }}off{{ end }};
{{ end }}
- ssl_certificate_by_lua_file /etc/nginx/lua/nginx/ngx_conf_certificate.lua;
+ ssl_certificate_by_lua_block {
+ certificate.call()
+ }
{{ if not (empty $server.AuthTLSError) }}
# {{ $server.AuthTLSError }}
@@ -990,7 +1094,9 @@ stream {
set $tmp_cache_key '{{ $server.Hostname }}{{ $authPath }}{{ $externalAuth.AuthCacheKey }}';
set $cache_key '';
- rewrite_by_lua_file /etc/nginx/lua/nginx/ngx_conf_rewrite_auth.lua;
+ rewrite_by_lua_block {
+ ngx.var.cache_key = ngx.encode_base64(ngx.sha1_bin(ngx.var.tmp_cache_key))
+ }
proxy_cache auth_cache;
@@ -1041,7 +1147,6 @@ stream {
{{ end }}
proxy_buffer_size {{ $location.Proxy.BufferSize }};
proxy_buffers {{ $location.Proxy.BuffersNumber }} {{ $location.Proxy.BufferSize }};
- proxy_busy_buffers_size {{ $location.Proxy.BusyBuffersSize }};
proxy_request_buffering {{ $location.Proxy.RequestBuffering }};
proxy_ssl_server_name on;
@@ -1116,6 +1221,7 @@ stream {
set $service_name {{ $ing.Service | quote }};
set $service_port {{ $ing.ServicePort | quote }};
set $location_path {{ $ing.Path | escapeLiteralDollar | quote }};
+ set $global_rate_limit_exceeding n;
{{ buildOpentelemetryForLocation $all.Cfg.EnableOpentelemetry $all.Cfg.OpentelemetryTrustIncomingSpan $location }}
@@ -1124,13 +1230,35 @@ stream {
mirror_request_body {{ $location.Mirror.RequestBody }};
{{ end }}
- {{ locationConfigForLua $location $all }}
+ rewrite_by_lua_block {
+ lua_ingress.rewrite({{ locationConfigForLua $location $all }})
+ balancer.rewrite()
+ plugins.run()
+ }
- rewrite_by_lua_file /etc/nginx/lua/nginx/ngx_rewrite.lua;
+ # be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
+ # will always succeed when there's `access_by_lua_block` that does not have any lua code doing `ngx.exit(ngx.DECLINED)`
+ # other authentication method such as basic auth or external auth useless - all requests will be allowed.
+ #access_by_lua_block {
+ #}
- header_filter_by_lua_file /etc/nginx/lua/nginx/ngx_conf_srv_hdr_filter.lua;
+ header_filter_by_lua_block {
+ lua_ingress.header()
+ plugins.run()
+ }
- log_by_lua_file /etc/nginx/lua/nginx/ngx_conf_log_block.lua;
+ body_filter_by_lua_block {
+ plugins.run()
+ }
+
+ log_by_lua_block {
+ balancer.log()
+ {{ if $all.EnableMetrics }}
+ monitor.call()
+ {{ end }}
+
+ plugins.run()
+ }
{{ if not $location.Logs.Access }}
access_log off;
@@ -1190,10 +1318,20 @@ stream {
{{- end }}
# `auth_request` module does not support HTTP keepalives in upstream block:
# https://trac.nginx.org/nginx/ticket/1579
- set $auth_path '{{ $authPath }}';
- set $auth_keepalive_share_vars {{ $externalAuth.KeepaliveShareVars }};
- set $auth_response_headers '{{ buildAuthUpstreamLuaHeaders $externalAuth.ResponseHeaders }}';
- access_by_lua_file /etc/nginx/lua/nginx/ngx_conf_external_auth.lua;
+ access_by_lua_block {
+ local res = ngx.location.capture('{{ $authPath }}', { method = ngx.HTTP_GET, body = '', share_all_vars = {{ $externalAuth.KeepaliveShareVars }} })
+ if res.status == ngx.HTTP_OK then
+ ngx.var.auth_cookie = res.header['Set-Cookie']
+ {{- range $line := buildAuthUpstreamLuaHeaders $externalAuth.ResponseHeaders }}
+ {{ $line }}
+ {{- end }}
+ return
+ end
+ if res.status == ngx.HTTP_UNAUTHORIZED or res.status == ngx.HTTP_FORBIDDEN then
+ ngx.exit(res.status)
+ end
+ ngx.exit(ngx.HTTP_INTERNAL_SERVER_ERROR)
+ }
{{ else }}
auth_request {{ $authPath }};
auth_request_set $auth_cookie $upstream_http_set_cookie;
@@ -1297,7 +1435,6 @@ stream {
proxy_buffering {{ $location.Proxy.ProxyBuffering }};
proxy_buffer_size {{ $location.Proxy.BufferSize }};
proxy_buffers {{ $location.Proxy.BuffersNumber }} {{ $location.Proxy.BufferSize }};
- proxy_busy_buffers_size {{ $location.Proxy.BusyBuffersSize }};
{{ if isValidByteSize $location.Proxy.ProxyMaxTempFileSize true }}
proxy_max_temp_file_size {{ $location.Proxy.ProxyMaxTempFileSize }};
{{ end }}
@@ -1312,13 +1449,6 @@ stream {
proxy_next_upstream_timeout {{ $location.Proxy.NextUpstreamTimeout }};
proxy_next_upstream_tries {{ $location.Proxy.NextUpstreamTries }};
- {{ if or (eq $location.BackendProtocol "GRPC") (eq $location.BackendProtocol "GRPCS") }}
- # Grpc settings
- grpc_connect_timeout {{ $location.Proxy.ConnectTimeout }}s;
- grpc_send_timeout {{ $location.Proxy.SendTimeout }}s;
- grpc_read_timeout {{ $location.Proxy.ReadTimeout }}s;
- {{ end }}
-
{{/* Add any additional configuration defined */}}
{{ $location.ConfigurationSnippet }}
@@ -1327,13 +1457,6 @@ stream {
{{ $all.Cfg.LocationSnippet }}
{{ end }}
- {{ if $location.CustomHeaders }}
- # Custom Response Headers
- {{ range $k, $v := $location.CustomHeaders.Headers }}
- more_set_headers {{ printf "%s: %s" $k $v | escapeLiteralDollar | quote }};
- {{ end }}
- {{ end }}
-
{{/* if we are sending the request to a custom default backend, we add the required headers */}}
{{ if (hasPrefix $location.Backend "custom-default-backend-") }}
proxy_set_header X-Code 503;
@@ -1349,10 +1472,6 @@ stream {
satisfy {{ $location.Satisfy }};
{{ end }}
- {{ if $location.Redirect.Relative }}
- absolute_redirect off;
- {{ end }}
-
{{/* if a location-specific error override is set, add the proxy_intercept here */}}
{{ if and $location.CustomHTTPErrors (not $location.DisableProxyInterceptErrors) }}
# Custom error pages per ingress
diff --git a/rootfs/nginx-chroot-wrapper.sh b/rootfs/nginx-chroot-wrapper.sh
index 0c8bdf3b7..f7318142f 100755
--- a/rootfs/nginx-chroot-wrapper.sh
+++ b/rootfs/nginx-chroot-wrapper.sh
@@ -15,4 +15,4 @@
# limitations under the License.
cat /etc/resolv.conf > /chroot/etc/resolv.conf
-unshare -S 101 -R /chroot nginx "$@"
+unshare -S 101 -R /chroot nginx "$@"
diff --git a/test/data/cleanConf.expected.conf b/test/data/cleanConf.expected.conf
index 9c0513b37..7c4a16824 100644
--- a/test/data/cleanConf.expected.conf
+++ b/test/data/cleanConf.expected.conf
@@ -67,6 +67,8 @@ http {
balancer.init_worker()
monitor.init_worker(10000)
+
+ plugins.run()
}
map $request_uri $loggable {
@@ -118,6 +120,7 @@ http {
use_port_in_redirects = false,
})
balancer.rewrite()
+ plugins.run()
}
# be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
@@ -127,6 +130,7 @@ http {
header_filter_by_lua_block {
lua_ingress.header()
+ plugins.run()
}
}
diff --git a/test/data/cleanConf.src.conf b/test/data/cleanConf.src.conf
index 6da578106..89954cf0d 100644
--- a/test/data/cleanConf.src.conf
+++ b/test/data/cleanConf.src.conf
@@ -86,8 +86,11 @@ lua_shared_dict ocsp_response_cache 5M;
init_worker_by_lua_block {
lua_ingress.init_worker()
balancer.init_worker()
-
+
monitor.init_worker(10000)
+
+
+ plugins.run()
}
@@ -161,6 +164,7 @@ lua_shared_dict ocsp_response_cache 5M;
use_port_in_redirects = false,
})
balancer.rewrite()
+ plugins.run()
}
# be careful with `access_by_lua_block` and `satisfy any` directives as satisfy any
@@ -170,6 +174,7 @@ lua_shared_dict ocsp_response_cache 5M;
header_filter_by_lua_block {
lua_ingress.header()
+ plugins.run()
}
diff --git a/test/data/config.json b/test/data/config.json
index df8a9fd3d..d64cfe0d2 100644
--- a/test/data/config.json
+++ b/test/data/config.json
@@ -1,63353 +1,60275 @@
{
- "backlogSize": 32768,
- "isIPV6Enabled": true,
- "cfg": {
- "disable-ipv6": false,
- "bind-address-ipv4": ["1.1.1.1", "2.2.2.2"],
- "bind-address-ipv6": [
- "[2001:db8:a0b:12f0::1]",
- "[3731:54:65fe:2::a7]",
- "[33:33:33::33::33]"
- ],
- "backend": {
- "custom-http-errors": [404],
- "proxy-buffers-number": "4",
- "proxy-buffer-size": "4k",
- "proxy-connect-timeout": 5,
- "proxy-read-timeout": 60,
- "proxy-send-timeout": 60,
- "skip-access-log-urls": ["~*health-check", "~*info"],
- "ssl-redirect": true,
- "upstream-fail-timeout": 0,
- "upstream-max-fails": 0,
- "upstream-hash-by": "$request_uri",
- "whitelist-source-range": null
- },
- "bodySize": "1m",
- "enableSpdy": false,
- "errorLogLevel": "notice",
- "gzipTypes": "application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component",
- "hsts": true,
- "hstsIncludeSubdomains": true,
- "hstsMaxAge": "31536000",
- "keepAlive": 75,
- "mapHashBucketSize": 64,
- "maxWorkerConnections": 16384,
- "nginxStatusIpv4Whitelist": "127.0.0.1",
- "nginxStatusIpv6Whitelist": "::1",
- "proxyRealIpCidr": "0.0.0.0/0",
- "retryNonIdempotent": false,
- "serverNameHashBucketSize": 64,
- "serverNameHashMaxSize": 16384,
- "sslBufferSize": "4k",
- "sslCiphers": "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA",
- "sslProtocols": "TLSv1.2",
- "sslSessionCache": true,
- "sslSessionCacheSize": "10m",
- "sslSessionTickets": true,
- "sslSessionTimeout": "10m",
- "useGzip": true,
- "useHttp2": true,
- "proxyStreamTimeout": "600s",
- "workerProcesses": 1,
- "limitConnZoneVariable": "$remote_addr"
- },
- "customErrors": true,
- "defResolver": "",
- "healthzURI": "/healthz",
- "passthroughBackends": [
- {
- "namespace": "default-kubernetes-443",
- "hostname": "foo-898.bar.com"
- },
- {
- "namespace": "default-echoheaders-x-80",
- "hostname": "foo-997.bar.com"
- },
- {
- "namespace": "default-kubernetes-443",
- "hostname": "kubernetes.foo-bar.com"
- }
- ],
- "servers": [
- {
- "hostname": "_",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/testpath",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": ["1.1.1.1"]
- },
- "whitelist": {
- "cidr": ["1.1.1.1"]
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": ["1.1.1.1"]
- },
- "whitelist": {
- "cidr": ["1.1.1.1"]
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "bar.baz.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/foo",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/bar",
- "isDefBackend": false,
- "backend": "default-echoheaders-y-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": null
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "default-backend.sample.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": null
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "external-auth-01.sample.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "https://httpbun.com/basic-auth/user/passwd",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-1.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-10.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-100.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-1000.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-101.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-102.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-103.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-104.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-105.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-106.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-107.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-108.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-109.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-11.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-110.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-111.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-112.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-113.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-114.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-115.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-116.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-117.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-118.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-119.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-12.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-120.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-121.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-122.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-123.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-124.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-125.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-126.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-127.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-128.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-129.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-13.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-130.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-131.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-132.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-133.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-134.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-135.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-136.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-137.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-138.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-139.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-14.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-140.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-141.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-142.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-143.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-144.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-145.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-146.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-147.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-148.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-149.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-15.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-150.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-151.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-152.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-153.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-154.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-155.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-156.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-157.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-158.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-159.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-16.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-160.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-161.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-162.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-163.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-164.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-165.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-166.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-167.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-168.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-169.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-17.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-170.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-171.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-172.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-173.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-174.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-175.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-176.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-177.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-178.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-179.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-18.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-180.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-181.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-182.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-183.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-184.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-185.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-186.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-187.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-188.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-189.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-19.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-190.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-191.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-192.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-193.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-194.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-195.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-196.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-197.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-198.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-199.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-2.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-20.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-200.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-201.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-202.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-203.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-204.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-205.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-206.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-207.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-208.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-209.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-21.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-210.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-211.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-212.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-213.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-214.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-215.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-216.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-217.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-218.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-219.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-22.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-220.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-221.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-222.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-223.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-224.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-225.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-226.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-227.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-228.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-229.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-23.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-230.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-231.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-232.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-233.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-234.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-235.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-236.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-237.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-238.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-239.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-24.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-240.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-241.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-242.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-243.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-244.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-245.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-246.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-247.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-248.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-249.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-25.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-250.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-251.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-252.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-253.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-254.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-255.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-256.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-257.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-258.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-259.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-26.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-260.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-261.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-262.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-263.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-264.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-265.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-266.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-267.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-268.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-269.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-27.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-270.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-271.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-272.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-273.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-274.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-275.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-276.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-277.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-278.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-279.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-28.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-280.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-281.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-282.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-283.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-284.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-285.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-286.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-287.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-288.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-289.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-29.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-290.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-291.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-292.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-293.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-294.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-295.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-296.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-297.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-298.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-299.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-3.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-30.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-300.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-301.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-302.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-303.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-304.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-305.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-306.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-307.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-308.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-309.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-31.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-310.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-311.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-312.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-313.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-314.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-315.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-316.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-317.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-318.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-319.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-32.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-320.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-321.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-322.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-323.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-324.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-325.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-326.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-327.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-328.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-329.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-33.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-330.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-331.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-332.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-333.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-334.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-335.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-336.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-337.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-338.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-339.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-34.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-340.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-341.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-342.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-343.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-344.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-345.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-346.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-347.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-348.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-349.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-35.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-350.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-351.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-352.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-353.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-354.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-355.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-356.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-357.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-358.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-359.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-36.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-360.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-361.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-362.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-363.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-364.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-365.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-366.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-367.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-368.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-369.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-37.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-370.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-371.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-372.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-373.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-374.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-375.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-376.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-377.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-378.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-379.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-38.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-380.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-381.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-382.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-383.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-384.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-385.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-386.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-387.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-388.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-389.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-39.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-390.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-391.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-392.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-393.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-394.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-395.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-396.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-397.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-398.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-399.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-4.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-40.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-400.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-401.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-402.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-403.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-404.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-405.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-406.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-407.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-408.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-409.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-41.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-410.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-411.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-412.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-413.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-414.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-415.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-416.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-417.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-418.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-419.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-42.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-420.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-421.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-422.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-423.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-424.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-425.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-426.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-427.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-428.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-429.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-43.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-430.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-431.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-432.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-433.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-434.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-435.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-436.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-437.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-438.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-439.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-44.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-440.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-441.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-442.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-443.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-444.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-445.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-446.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-447.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-448.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-449.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-45.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-450.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-451.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-452.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-453.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-454.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-455.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-456.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-457.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-458.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-459.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-46.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-460.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-461.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-462.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-463.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-464.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-465.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-466.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-467.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-468.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-469.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-47.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-470.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-471.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-472.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-473.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-474.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-475.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-476.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-477.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-478.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-479.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-48.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-480.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-481.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-482.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-483.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-484.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-485.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-486.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-487.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-488.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-489.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-49.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-490.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-491.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-492.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-493.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-494.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-495.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-496.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-497.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-498.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-499.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-5.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-50.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-500.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-501.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-502.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-503.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-504.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-505.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-506.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-507.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-508.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-509.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-51.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-510.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-511.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-512.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-513.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-514.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-515.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-516.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-517.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-518.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-519.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-52.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-520.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-521.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-522.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-523.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-524.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-525.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-526.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-527.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-528.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-529.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-53.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-530.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-531.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-532.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-533.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-534.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-535.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-536.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-537.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-538.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-539.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-54.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-540.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-541.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-542.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-543.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-544.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-545.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-546.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-547.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-548.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-549.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-55.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-550.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-551.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-552.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-553.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-554.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-555.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-556.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-557.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-558.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-559.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-56.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-560.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-561.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-562.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-563.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-564.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-565.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-566.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-567.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-568.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-569.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-57.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-570.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-571.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-572.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-573.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-574.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-575.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-576.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-577.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-578.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-579.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-58.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-580.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-581.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-582.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-583.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-584.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-585.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-586.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-587.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-588.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-589.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-59.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-590.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-591.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-592.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-593.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-594.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-595.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-596.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-597.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-598.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-599.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-6.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-60.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-600.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-601.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-602.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-603.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-604.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-605.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-606.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-607.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-608.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-609.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-61.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-610.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-611.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-612.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-613.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-614.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-615.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-616.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-617.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-618.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-619.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-62.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-620.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-621.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-622.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-623.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-624.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-625.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-626.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-627.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-628.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-629.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-63.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-630.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-631.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-632.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-633.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-634.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-635.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-636.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-637.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-638.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-639.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-64.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-640.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-641.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-642.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-643.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-644.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-645.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-646.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-647.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-648.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-649.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-65.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-650.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-651.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-652.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-653.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-654.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-655.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-656.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-657.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-658.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-659.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-66.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-660.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-661.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-662.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-663.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-664.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-665.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-666.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-667.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-668.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-669.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-67.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-670.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-671.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-672.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-673.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-674.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-675.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-676.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-677.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-678.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-679.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-68.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-680.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-681.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-682.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-683.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-684.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-685.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-686.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-687.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-688.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-689.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-69.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-690.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-691.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-692.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-693.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-694.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-695.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-696.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-697.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-698.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-699.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-7.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-70.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-700.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-701.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-702.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-703.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-704.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-705.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-706.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-707.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-708.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-709.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-71.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-710.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-711.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-712.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-713.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-714.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-715.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-716.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-717.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-718.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-719.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-72.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-720.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-721.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-722.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-723.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-724.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-725.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-726.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-727.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-728.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-729.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-73.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-730.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-731.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-732.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-733.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-734.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-735.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-736.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-737.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-738.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-739.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-74.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-740.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-741.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-742.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-743.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-744.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-745.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-746.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-747.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-748.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-749.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-75.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-750.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-751.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-752.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-753.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-754.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-755.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-756.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-757.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-758.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-759.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-76.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-760.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-761.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-762.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-763.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-764.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-765.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-766.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-767.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-768.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-769.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-77.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-770.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-771.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-772.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-773.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-774.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-775.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-776.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-777.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-778.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-779.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-78.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-780.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-781.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-782.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-783.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-784.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-785.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-786.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-787.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-788.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-789.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-79.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-790.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-791.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-792.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-793.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-794.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-795.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-796.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-797.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-798.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-799.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-8.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-80.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-800.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-801.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-802.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-803.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-804.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-805.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-806.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-807.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-808.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-809.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-81.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-810.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-811.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-812.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-813.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-814.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-815.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-816.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-817.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-818.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-819.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-82.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-820.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-821.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-822.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-823.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-824.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-825.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-826.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-827.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-828.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-829.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-83.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-830.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-831.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-832.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-833.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-834.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-835.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-836.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-837.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-838.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-839.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-84.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-840.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-841.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-842.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-843.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-844.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-845.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-846.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-847.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-848.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-849.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-85.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-850.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-851.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-852.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-853.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-854.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-855.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-856.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-857.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-858.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-859.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-86.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-860.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-861.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-862.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-863.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-864.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-865.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-866.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-867.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-868.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-869.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-87.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-870.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-871.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-872.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-873.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-874.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-875.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-876.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-877.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-878.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-879.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-88.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-880.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-881.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-882.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-883.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-884.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-885.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-886.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-887.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-888.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-889.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-89.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-890.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-891.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-892.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-893.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-894.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-895.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-896.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-897.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-898.bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-kubernetes-443",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-899.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-9.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-90.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-900.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-901.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-902.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-903.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-904.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-905.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-906.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-907.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-908.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-909.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-91.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-910.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-911.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-912.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-913.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-914.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-915.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-916.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-917.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-918.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-919.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-92.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-920.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-921.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-922.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-923.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-924.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-925.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-926.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-927.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-928.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-929.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-93.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-930.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-931.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-932.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-933.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-934.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-935.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-936.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-937.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-938.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-939.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-94.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-940.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-941.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-942.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-943.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-944.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-945.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-946.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-947.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-948.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-949.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-95.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-950.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-951.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-952.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-953.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-954.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-955.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-956.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-957.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-958.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-959.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-96.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-960.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-961.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-962.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-963.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-964.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-965.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-966.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-967.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-968.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-969.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-97.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-970.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-971.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-972.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-973.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-974.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-975.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-976.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-977.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-978.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-979.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-98.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-980.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-981.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-982.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-983.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-984.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-985.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-986.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-987.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-988.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-989.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-99.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-990.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-991.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-992.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "default/aledbf-ca-secret",
- "certFilename": "/ingress-controller/ssl/default-aledbf-ca-secret.pem",
- "keyFilename": "",
- "caFilename": "/ingress-controller/ssl/ca-default-aledbf-ca-secret.pem",
- "pemSha": "69d055bd017208111377c971ba5ee0987fecee65"
- }
- }
- ]
- },
- {
- "hostname": "foo-993.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-994.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-995.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-996.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-997.bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo-998.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "https://httpbun.com/basic-auth/user/passwd",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/foo",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo2.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-xtp-echo-port",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foo3.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-xtp-echo-port",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "foos.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "jenkins.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/jenkins",
- "isDefBackend": false,
- "backend": "default-jenkins-8080",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "default_jenkins_conn",
- "limit": 2,
- "burst": 10,
- "sharedSize": 5
- },
- "rps": {
- "name": "default_jenkins_rps",
- "limit": 0,
- "burst": 10,
- "sharedSize": 5
- }
- },
- "redirect": {
- "target": "/",
- "addBaseUrl": true,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "kubernetes.foo-bar.com",
- "sslPassthrough": true,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-kubernetes-443",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "no-root.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/api",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "rewrite.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/something",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "/",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- },
- {
- "path": "/",
- "isDefBackend": true,
- "backend": "upstream-default-backend",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": null
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "whitelist.bar.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": true
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- },
- {
- "hostname": "with-root.com",
- "sslPassthrough": false,
- "sslCertificate": "",
- "sslPemChecksum": "",
- "locations": [
- {
- "path": "/",
- "isDefBackend": false,
- "backend": "default-echoheaders-x-80",
- "basicDigestAuth": {
- "type": "",
- "realm": "",
- "file": "",
- "secured": false
- },
- "externalAuth": {
- "url": "",
- "method": "",
- "sendBody": false
- },
- "rateLimit": {
- "connections": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- },
- "rps": {
- "name": "",
- "limit": 0,
- "burst": 0,
- "sharedSize": 0
- }
- },
- "redirect": {
- "target": "",
- "addBaseUrl": false,
- "sslRedirect": false
- },
- "denylist": {
- "cidr": []
- },
- "whitelist": {
- "cidr": []
- },
- "proxy": {
- "connectTimeout": 5,
- "sendTimeout": 60,
- "readTimeout": 60,
- "bufferSize": "4k"
- },
- "certificateAuth": {
- "secret": "",
- "certFilename": "",
- "keyFilename": "",
- "caFilename": "",
- "pemSha": ""
- }
- }
- ]
- }
- ],
- "sslDHParam": "",
- "tcpBackends": [],
- "udpBackends": [],
- "backends": [
- {
- "name": "default-echoheaders-80",
- "secure": false,
- "endpoints": [
- {
- "address": "10.2.3.2",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- },
- {
- "address": "10.2.3.5",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "default-echoheaders-x-80",
- "secure": false,
- "endpoints": [
- {
- "address": "10.2.3.4",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "default-echoheaders-xtp-echo-port",
- "secure": false,
- "endpoints": [
- {
- "address": "127.0.0.1",
- "port": "8181",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "default-echoheaders-y-80",
- "secure": false,
- "endpoints": [
- {
- "address": "10.2.3.4",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "default-jenkins-8080",
- "secure": false,
- "endpoints": [
- {
- "address": "127.0.0.1",
- "port": "8181",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "default-kubernetes-443",
- "secure": false,
- "endpoints": [
- {
- "address": "172.17.4.99",
- "port": "443",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- },
- {
- "name": "upstream-default-backend",
- "secure": false,
- "endpoints": [
- {
- "address": "10.2.3.11",
- "port": "8080",
- "maxFails": 0,
- "failTimeout": 0
- }
- ]
- }
- ]
+ "backlogSize": 32768,
+ "isIPV6Enabled": true,
+ "cfg": {
+ "disable-ipv6": false,
+ "bind-address-ipv4": ["1.1.1.1", "2.2.2.2"],
+ "bind-address-ipv6": ["[2001:db8:a0b:12f0::1]", "[3731:54:65fe:2::a7]", "[33:33:33::33::33]"],
+ "backend": {
+ "custom-http-errors": [404],
+ "proxy-buffers-number": "4",
+ "proxy-buffer-size": "4k",
+ "proxy-connect-timeout": 5,
+ "proxy-read-timeout": 60,
+ "proxy-send-timeout": 60,
+ "skip-access-log-urls": ["~*health-check", "~*info"],
+ "ssl-redirect": true,
+ "upstream-fail-timeout": 0,
+ "upstream-max-fails": 0,
+ "upstream-hash-by": "$request_uri",
+ "whitelist-source-range": null
+ },
+ "bodySize": "1m",
+ "enableSpdy": false,
+ "errorLogLevel": "notice",
+ "gzipTypes": "application/atom+xml application/javascript application/x-javascript application/json application/rss+xml application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/svg+xml image/x-icon text/css text/javascript text/plain text/x-component",
+ "hsts": true,
+ "hstsIncludeSubdomains": true,
+ "hstsMaxAge": "31536000",
+ "keepAlive": 75,
+ "mapHashBucketSize": 64,
+ "maxWorkerConnections": 16384,
+ "nginxStatusIpv4Whitelist": "127.0.0.1",
+ "nginxStatusIpv6Whitelist": "::1",
+ "proxyRealIpCidr": "0.0.0.0/0",
+ "retryNonIdempotent": false,
+ "serverNameHashBucketSize": 64,
+ "serverNameHashMaxSize": 16384,
+ "sslBufferSize": "4k",
+ "sslCiphers": "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA",
+ "sslProtocols": "TLSv1 TLSv1.1 TLSv1.2",
+ "sslSessionCache": true,
+ "sslSessionCacheSize": "10m",
+ "sslSessionTickets": true,
+ "sslSessionTimeout": "10m",
+ "useGzip": true,
+ "useHttp2": true,
+ "proxyStreamTimeout": "600s",
+ "workerProcesses": 1,
+ "limitConnZoneVariable": "$remote_addr"
+ },
+ "customErrors": true,
+ "defResolver": "",
+ "healthzURI": "/healthz",
+ "passthroughBackends": [{
+ "namespace": "default-kubernetes-443",
+ "hostname": "foo-898.bar.com"
+ }, {
+ "namespace": "default-echoheaders-x-80",
+ "hostname": "foo-997.bar.com"
+ }, {
+ "namespace": "default-kubernetes-443",
+ "hostname": "kubernetes.foo-bar.com"
+ }],
+ "servers": [{
+ "hostname": "_",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/testpath",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "whitelist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "whitelist": {
+ "cidr": ["1.1.1.1"]
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "bar.baz.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/foo",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/bar",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-y-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": null
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "default-backend.sample.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": null
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "external-auth-01.sample.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "https://httpbun.com/basic-auth/user/passwd",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-1.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-10.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-100.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-1000.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-101.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-102.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-103.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-104.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-105.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-106.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-107.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-108.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-109.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-11.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-110.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-111.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-112.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-113.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-114.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-115.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-116.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-117.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-118.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-119.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-12.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-120.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-121.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-122.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-123.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-124.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-125.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-126.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-127.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-128.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-129.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-13.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-130.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-131.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-132.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-133.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-134.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-135.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-136.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-137.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-138.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-139.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-14.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-140.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-141.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-142.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-143.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-144.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-145.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-146.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-147.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-148.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-149.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-15.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-150.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-151.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-152.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-153.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-154.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-155.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-156.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-157.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-158.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-159.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-16.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-160.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-161.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-162.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-163.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-164.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-165.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-166.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-167.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-168.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-169.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-17.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-170.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-171.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-172.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-173.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-174.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-175.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-176.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-177.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-178.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-179.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-18.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-180.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-181.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-182.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-183.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-184.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-185.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-186.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-187.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-188.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-189.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-19.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-190.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-191.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-192.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-193.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-194.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-195.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-196.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-197.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-198.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-199.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-2.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-20.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-200.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-201.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-202.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-203.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-204.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-205.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-206.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-207.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-208.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-209.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-21.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-210.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-211.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-212.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-213.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-214.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-215.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-216.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-217.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-218.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-219.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-22.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-220.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-221.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-222.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-223.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-224.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-225.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-226.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-227.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-228.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-229.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-23.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-230.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-231.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-232.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-233.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-234.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-235.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-236.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-237.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-238.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-239.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-24.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-240.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-241.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-242.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-243.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-244.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-245.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-246.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-247.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-248.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-249.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-25.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-250.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-251.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-252.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-253.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-254.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-255.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-256.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-257.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-258.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-259.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-26.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-260.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-261.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-262.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-263.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-264.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-265.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-266.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-267.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-268.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-269.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-27.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-270.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-271.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-272.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-273.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-274.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-275.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-276.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-277.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-278.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-279.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-28.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-280.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-281.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-282.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-283.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-284.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-285.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-286.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-287.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-288.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-289.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-29.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-290.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-291.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-292.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-293.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-294.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-295.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-296.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-297.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-298.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-299.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-3.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-30.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-300.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-301.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-302.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-303.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-304.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-305.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-306.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-307.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-308.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-309.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-31.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-310.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-311.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-312.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-313.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-314.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-315.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-316.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-317.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-318.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-319.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-32.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-320.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-321.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-322.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-323.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-324.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-325.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-326.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-327.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-328.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-329.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-33.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-330.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-331.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-332.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-333.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-334.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-335.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-336.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-337.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-338.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-339.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-34.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-340.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-341.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-342.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-343.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-344.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-345.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-346.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-347.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-348.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-349.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-35.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-350.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-351.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-352.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-353.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-354.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-355.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-356.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-357.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-358.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-359.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-36.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-360.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-361.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-362.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-363.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-364.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-365.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-366.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-367.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-368.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-369.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-37.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-370.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-371.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-372.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-373.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-374.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-375.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-376.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-377.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-378.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-379.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-38.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-380.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-381.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-382.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-383.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-384.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-385.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-386.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-387.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-388.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-389.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-39.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-390.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-391.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-392.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-393.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-394.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-395.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-396.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-397.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-398.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-399.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-4.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-40.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-400.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-401.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-402.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-403.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-404.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-405.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-406.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-407.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-408.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-409.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-41.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-410.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-411.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-412.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-413.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-414.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-415.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-416.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-417.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-418.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-419.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-42.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-420.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-421.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-422.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-423.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-424.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-425.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-426.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-427.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-428.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-429.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-43.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-430.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-431.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-432.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-433.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-434.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-435.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-436.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-437.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-438.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-439.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-44.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-440.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-441.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-442.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-443.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-444.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-445.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-446.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-447.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-448.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-449.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-45.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-450.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-451.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-452.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-453.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-454.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-455.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-456.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-457.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-458.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-459.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-46.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-460.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-461.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-462.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-463.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-464.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-465.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-466.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-467.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-468.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-469.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-47.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-470.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-471.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-472.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-473.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-474.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-475.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-476.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-477.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-478.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-479.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-48.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-480.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-481.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-482.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-483.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-484.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-485.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-486.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-487.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-488.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-489.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-49.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-490.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-491.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-492.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-493.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-494.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-495.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-496.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-497.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-498.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-499.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-5.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-50.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-500.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-501.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-502.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-503.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-504.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-505.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-506.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-507.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-508.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-509.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-51.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-510.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-511.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-512.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-513.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-514.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-515.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-516.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-517.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-518.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-519.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-52.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-520.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-521.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-522.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-523.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-524.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-525.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-526.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-527.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-528.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-529.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-53.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-530.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-531.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-532.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-533.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-534.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-535.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-536.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-537.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-538.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-539.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-54.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-540.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-541.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-542.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-543.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-544.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-545.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-546.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-547.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-548.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-549.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-55.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-550.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-551.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-552.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-553.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-554.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-555.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-556.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-557.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-558.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-559.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-56.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-560.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-561.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-562.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-563.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-564.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-565.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-566.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-567.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-568.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-569.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-57.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-570.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-571.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-572.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-573.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-574.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-575.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-576.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-577.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-578.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-579.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-58.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-580.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-581.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-582.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-583.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-584.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-585.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-586.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-587.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-588.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-589.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-59.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-590.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-591.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-592.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-593.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-594.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-595.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-596.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-597.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-598.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-599.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-6.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-60.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-600.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-601.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-602.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-603.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-604.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-605.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-606.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-607.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-608.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-609.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-61.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-610.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-611.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-612.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-613.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-614.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-615.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-616.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-617.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-618.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-619.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-62.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-620.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-621.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-622.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-623.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-624.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-625.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-626.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-627.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-628.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-629.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-63.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-630.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-631.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-632.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-633.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-634.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-635.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-636.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-637.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-638.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-639.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-64.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-640.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-641.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-642.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-643.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-644.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-645.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-646.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-647.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-648.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-649.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-65.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-650.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-651.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-652.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-653.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-654.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-655.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-656.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-657.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-658.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-659.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-66.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-660.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-661.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-662.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-663.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-664.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-665.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-666.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-667.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-668.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-669.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-67.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-670.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-671.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-672.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-673.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-674.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-675.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-676.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-677.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-678.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-679.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-68.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-680.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-681.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-682.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-683.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-684.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-685.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-686.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-687.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-688.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-689.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-69.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-690.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-691.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-692.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-693.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-694.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-695.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-696.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-697.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-698.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-699.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-7.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-70.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-700.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-701.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-702.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-703.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-704.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-705.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-706.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-707.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-708.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-709.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-71.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-710.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-711.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-712.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-713.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-714.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-715.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-716.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-717.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-718.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-719.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-72.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-720.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-721.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-722.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-723.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-724.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-725.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-726.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-727.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-728.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-729.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-73.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-730.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-731.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-732.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-733.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-734.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-735.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-736.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-737.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-738.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-739.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-74.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-740.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-741.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-742.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-743.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-744.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-745.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-746.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-747.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-748.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-749.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-75.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-750.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-751.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-752.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-753.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-754.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-755.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-756.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-757.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-758.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-759.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-76.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-760.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-761.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-762.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-763.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-764.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-765.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-766.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-767.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-768.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-769.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-77.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-770.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-771.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-772.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-773.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-774.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-775.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-776.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-777.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-778.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-779.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-78.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-780.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-781.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-782.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-783.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-784.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-785.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-786.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-787.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-788.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-789.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-79.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-790.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-791.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-792.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-793.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-794.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-795.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-796.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-797.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-798.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-799.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-8.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-80.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-800.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-801.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-802.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-803.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-804.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-805.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-806.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-807.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-808.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-809.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-81.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-810.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-811.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-812.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-813.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-814.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-815.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-816.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-817.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-818.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-819.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-82.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-820.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-821.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-822.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-823.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-824.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-825.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-826.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-827.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-828.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-829.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-83.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-830.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-831.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-832.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-833.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-834.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-835.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-836.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-837.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-838.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-839.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-84.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-840.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-841.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-842.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-843.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-844.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-845.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-846.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-847.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-848.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-849.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-85.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-850.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-851.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-852.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-853.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-854.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-855.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-856.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-857.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-858.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-859.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-86.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-860.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-861.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-862.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-863.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-864.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-865.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-866.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-867.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-868.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-869.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-87.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-870.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-871.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-872.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-873.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-874.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-875.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-876.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-877.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-878.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-879.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-88.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-880.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-881.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-882.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-883.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-884.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-885.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-886.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-887.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-888.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-889.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-89.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-890.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-891.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-892.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-893.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-894.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-895.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-896.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-897.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-898.bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-kubernetes-443",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-899.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-9.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-90.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-900.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-901.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-902.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-903.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-904.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-905.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-906.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-907.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-908.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-909.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-91.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-910.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-911.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-912.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-913.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-914.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-915.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-916.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-917.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-918.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-919.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-92.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-920.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-921.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-922.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-923.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-924.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-925.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-926.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-927.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-928.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-929.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-93.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-930.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-931.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-932.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-933.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-934.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-935.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-936.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-937.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-938.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-939.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-94.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-940.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-941.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-942.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-943.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-944.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-945.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-946.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-947.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-948.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-949.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-95.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-950.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-951.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-952.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-953.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-954.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-955.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-956.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-957.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-958.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-959.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-96.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-960.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-961.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-962.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-963.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-964.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-965.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-966.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-967.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-968.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-969.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-97.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-970.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-971.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-972.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-973.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-974.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-975.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-976.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-977.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-978.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-979.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-98.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-980.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-981.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-982.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-983.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-984.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-985.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-986.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-987.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-988.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-989.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-99.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-990.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-991.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-992.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "default/aledbf-ca-secret",
+ "certFilename": "/ingress-controller/ssl/default-aledbf-ca-secret.pem",
+ "keyFilename": "",
+ "caFilename": "/ingress-controller/ssl/ca-default-aledbf-ca-secret.pem",
+ "pemSha": "69d055bd017208111377c971ba5ee0987fecee65"
+ }
+ }]
+ }, {
+ "hostname": "foo-993.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-994.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-995.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-996.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-997.bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo-998.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "https://httpbun.com/basic-auth/user/passwd",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/foo",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo2.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-xtp-echo-port",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foo3.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-xtp-echo-port",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "foos.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "jenkins.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/jenkins",
+ "isDefBackend": false,
+ "backend": "default-jenkins-8080",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "default_jenkins_conn",
+ "limit": 2,
+ "burst": 10,
+ "sharedSize": 5
+ },
+ "rps": {
+ "name": "default_jenkins_rps",
+ "limit": 0,
+ "burst": 10,
+ "sharedSize": 5
+ }
+ },
+ "redirect": {
+ "target": "/",
+ "addBaseUrl": true,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "kubernetes.foo-bar.com",
+ "sslPassthrough": true,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-kubernetes-443",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "no-root.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/api",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "rewrite.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/something",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "/",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }, {
+ "path": "/",
+ "isDefBackend": true,
+ "backend": "upstream-default-backend",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": null
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "whitelist.bar.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": true
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }, {
+ "hostname": "with-root.com",
+ "sslPassthrough": false,
+ "sslCertificate": "",
+ "sslPemChecksum": "",
+ "locations": [{
+ "path": "/",
+ "isDefBackend": false,
+ "backend": "default-echoheaders-x-80",
+ "basicDigestAuth": {
+ "type": "",
+ "realm": "",
+ "file": "",
+ "secured": false
+ },
+ "externalAuth": {
+ "url": "",
+ "method": "",
+ "sendBody": false
+ },
+ "rateLimit": {
+ "connections": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ },
+ "rps": {
+ "name": "",
+ "limit": 0,
+ "burst": 0,
+ "sharedSize": 0
+ }
+ },
+ "redirect": {
+ "target": "",
+ "addBaseUrl": false,
+ "sslRedirect": false
+ },
+ "denylist": {
+ "cidr": []
+ },
+ "whitelist": {
+ "cidr": []
+ },
+ "proxy": {
+ "connectTimeout": 5,
+ "sendTimeout": 60,
+ "readTimeout": 60,
+ "bufferSize": "4k"
+ },
+ "certificateAuth": {
+ "secret": "",
+ "certFilename": "",
+ "keyFilename": "",
+ "caFilename": "",
+ "pemSha": ""
+ }
+ }]
+ }],
+ "sslDHParam": "",
+ "tcpBackends": [],
+ "udpBackends": [],
+ "backends": [{
+ "name": "default-echoheaders-80",
+ "secure": false,
+ "endpoints": [{
+ "address": "10.2.3.2",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }, {
+ "address": "10.2.3.5",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "default-echoheaders-x-80",
+ "secure": false,
+ "endpoints": [{
+ "address": "10.2.3.4",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "default-echoheaders-xtp-echo-port",
+ "secure": false,
+ "endpoints": [{
+ "address": "127.0.0.1",
+ "port": "8181",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "default-echoheaders-y-80",
+ "secure": false,
+ "endpoints": [{
+ "address": "10.2.3.4",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "default-jenkins-8080",
+ "secure": false,
+ "endpoints": [{
+ "address": "127.0.0.1",
+ "port": "8181",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "default-kubernetes-443",
+ "secure": false,
+ "endpoints": [{
+ "address": "172.17.4.99",
+ "port": "443",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }, {
+ "name": "upstream-default-backend",
+ "secure": false,
+ "endpoints": [{
+ "address": "10.2.3.11",
+ "port": "8080",
+ "maxFails": 0,
+ "failTimeout": 0
+ }]
+ }]
}
diff --git a/test/e2e-image/Dockerfile b/test/e2e-image/Dockerfile
index c16545e43..222156f13 100644
--- a/test/e2e-image/Dockerfile
+++ b/test/e2e-image/Dockerfile
@@ -1,7 +1,7 @@
ARG E2E_BASE_IMAGE
FROM ${E2E_BASE_IMAGE} AS BASE
-FROM alpine:3.21
+FROM alpine:3.19.0
RUN apk update \
&& apk upgrade && apk add -U --no-cache \
@@ -9,8 +9,7 @@ RUN apk update \
bash \
tzdata \
libc6-compat \
- openssl \
- sqlite-dev
+ openssl
COPY --from=BASE /go/bin/ginkgo /usr/local/bin/
COPY --from=BASE /usr/local/bin/helm /usr/local/bin/
diff --git a/test/e2e-image/Makefile b/test/e2e-image/Makefile
index f72651f48..ed6c6d52d 100644
--- a/test/e2e-image/Makefile
+++ b/test/e2e-image/Makefile
@@ -1,6 +1,6 @@
DIR:=$(shell dirname $(realpath $(firstword $(MAKEFILE_LIST))))
-E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20250112-a188f4eb@sha256:043038b1e30e5a0b64f3f919f096c5c9488ac3f617ac094b07fb9db8215f9441"
+E2E_BASE_IMAGE ?= "registry.k8s.io/ingress-nginx/e2e-test-runner:v20231208-4c39e6acc@sha256:0607184ca9c53c9c24a47b6f52347dd96137b05c6f276efa67051929a39e8f7a"
image:
echo "..entered Makefile in /test/e2e-image"
diff --git a/test/e2e-image/namespace-overlays/disableleaderelection/values.yaml b/test/e2e-image/namespace-overlays/disableleaderelection/values.yaml
deleted file mode 100644
index f312a9fb4..000000000
--- a/test/e2e-image/namespace-overlays/disableleaderelection/values.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-# TODO: remove the need to use fullnameOverride
-fullnameOverride: nginx-ingress
-controller:
- image:
- repository: ingress-controller/controller
- chroot: true
- tag: 1.0.0-dev
- digest:
- digestChroot:
- scope:
- # Necessary to allow the ingress controller to get the topology information from the nodes
- enabled: false
- config:
- worker-processes: "1"
- readinessProbe:
- initialDelaySeconds: 3
- periodSeconds: 1
- livenessProbe:
- initialDelaySeconds: 3
- periodSeconds: 1
- service:
- type: NodePort
- extraArgs:
- # e2e tests do not require information about ingress status
- update-status: "false"
- terminationGracePeriodSeconds: 1
- admissionWebhooks:
- enabled: false
-
- disableLeaderElection: true
-
-rbac:
- create: true
- scope: false
diff --git a/test/e2e/HTTPBUN_IMAGE b/test/e2e/HTTPBUN_IMAGE
index 491b333c7..7e83b49fe 100644
--- a/test/e2e/HTTPBUN_IMAGE
+++ b/test/e2e/HTTPBUN_IMAGE
@@ -1 +1 @@
-registry.k8s.io/ingress-nginx/httpbun:v1.1.1@sha256:4569515d9b74470c915566a010792e7202b6769443fb1f3bb1b1e87376028634
+registry.k8s.io/ingress-nginx/e2e-test-httpbun:v20231011-8b53cabe0
diff --git a/test/e2e/admission/admission.go b/test/e2e/admission/admission.go
index 873e6719d..c41105e2d 100644
--- a/test/e2e/admission/admission.go
+++ b/test/e2e/admission/admission.go
@@ -44,6 +44,33 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
f.NewSlowEchoDeployment()
})
+ ginkgo.It("reject ingress with global-rate-limit annotations when memcached is not configured", func() {
+ host := admissionTestHost
+
+ annotations := map[string]string{
+ "nginx.ingress.kubernetes.io/global-rate-limit": "100",
+ "nginx.ingress.kubernetes.io/global-rate-limit-window": "1m",
+ }
+ ing := framework.NewSingleIngress("first-ingress", "/", host, f.Namespace, framework.EchoService, 80, annotations)
+
+ ginkgo.By("rejects ingress when memcached is not configured")
+
+ _, err := f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), ing, metav1.CreateOptions{})
+ assert.NotNil(ginkgo.GinkgoT(), err, "creating ingress with global throttle annotations when memcached is not configured")
+
+ ginkgo.By("accepts ingress when memcached is not configured")
+
+ f.UpdateNginxConfigMapData("global-rate-limit-memcached-host", "memc.default.svc.cluster.local")
+
+ _, err = f.KubeClientSet.NetworkingV1().Ingresses(f.Namespace).Create(context.TODO(), ing, metav1.CreateOptions{})
+ assert.Nil(ginkgo.GinkgoT(), err, "creating ingress with global throttle annotations when memcached is configured")
+
+ f.WaitForNginxServer(host,
+ func(server string) bool {
+ return strings.Contains(server, fmt.Sprintf("server_name %v", host))
+ })
+ })
+
ginkgo.It("should not allow overlaps of host and paths without canary annotations", func() {
host := admissionTestHost
@@ -100,8 +127,14 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should return an error if there is an error validating the ingress definition", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := admissionTestHost
@@ -208,8 +241,14 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should return an error if the Ingress V1 definition contains invalid annotations", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
out, err := createIngress(f.Namespace, invalidV1Ingress)
assert.Empty(ginkgo.GinkgoT(), out)
@@ -222,8 +261,14 @@ var _ = framework.IngressNginxDescribeSerial("[Admission] admission controller",
})
ginkgo.It("should not return an error for an invalid Ingress when it has unknown class", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
out, err := createIngress(f.Namespace, invalidV1IngressWithOtherClass)
assert.Equal(ginkgo.GinkgoT(), "ingress.networking.k8s.io/extensions-invalid-other created\n", out)
assert.Nil(ginkgo.GinkgoT(), err, "creating an invalid ingress with unknown class using kubectl")
diff --git a/test/e2e/annotations/auth.go b/test/e2e/annotations/auth.go
index ddda1dce5..ea33fdf32 100644
--- a/test/e2e/annotations/auth.go
+++ b/test/e2e/annotations/auth.go
@@ -277,8 +277,14 @@ var _ = framework.DescribeAnnotation("auth-*", func() {
"nginx.ingress.kubernetes.io/auth-snippet": `
proxy_set_header My-Custom-Header 42;`,
}
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
@@ -291,8 +297,15 @@ var _ = framework.DescribeAnnotation("auth-*", func() {
ginkgo.It(`should not set snippet "proxy_set_header My-Custom-Header 42;" when external auth is not configured`, func() {
host := authHost
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/auth-snippet": `
@@ -653,7 +666,7 @@ http {
func(server string) bool {
return strings.Contains(server, `upstream auth-external-auth`) &&
strings.Contains(server, `keepalive 10;`) &&
- strings.Contains(server, `set $auth_keepalive_share_vars false;`)
+ strings.Contains(server, `share_all_vars = false`)
})
})
@@ -673,7 +686,7 @@ http {
func(server string) bool {
return strings.Contains(server, `upstream auth-external-auth`) &&
strings.Contains(server, `keepalive 10;`) &&
- strings.Contains(server, `set $auth_keepalive_share_vars true;`)
+ strings.Contains(server, `share_all_vars = true`)
})
})
})
diff --git a/test/e2e/annotations/authtls.go b/test/e2e/annotations/authtls.go
index 3315065f1..c7a05c053 100644
--- a/test/e2e/annotations/authtls.go
+++ b/test/e2e/annotations/authtls.go
@@ -322,49 +322,6 @@ var _ = framework.DescribeAnnotation("auth-tls-*", func() {
Status(http.StatusOK)
})
- ginkgo.It("should reload the nginx config when auth-tls-match-cn is updated", func() {
- host := authTLSFooHost
- nameSpace := f.Namespace
-
- clientConfig, err := framework.CreateIngressMASecret(
- f.KubeClientSet,
- host,
- host,
- nameSpace)
- assert.Nil(ginkgo.GinkgoT(), err)
-
- // First add an annotation that forbids our connection
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/auth-tls-secret": nameSpace + "/" + host,
- "nginx.ingress.kubernetes.io/auth-tls-verify-client": "on",
- "nginx.ingress.kubernetes.io/auth-tls-match-cn": "CN=notvalid",
- }
-
- ingress := f.EnsureIngress(framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, nameSpace, framework.EchoService, 80, annotations))
-
- assertSslClientCertificateConfig(f, host, "on", "1")
-
- f.HTTPTestClientWithTLSConfig(clientConfig).
- GET("/").
- WithURL(f.GetURL(framework.HTTPS)).
- WithHeader("Host", host).
- Expect().
- Status(http.StatusForbidden)
-
- // Update the annotation to something that allows the connection
- ingress.Annotations["nginx.ingress.kubernetes.io/auth-tls-match-cn"] = "CN=authtls"
- f.UpdateIngress(ingress)
-
- assertSslClientCertificateConfig(f, host, "on", "1")
-
- f.HTTPTestClientWithTLSConfig(clientConfig).
- GET("/").
- WithURL(f.GetURL(framework.HTTPS)).
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
- })
-
ginkgo.It("should return 200 using auth-tls-match-cn where atleast one of the regex options matches CN from client", func() {
host := authTLSFooHost
nameSpace := f.Namespace
diff --git a/test/e2e/annotations/cors.go b/test/e2e/annotations/cors.go
index 58f4445f7..a14a5761f 100644
--- a/test/e2e/annotations/cors.go
+++ b/test/e2e/annotations/cors.go
@@ -669,33 +669,4 @@ var _ = framework.DescribeAnnotation("cors-*", func() {
Headers().
NotContainsKey("Access-Control-Allow-Origin")
})
-
- ginkgo.It("should allow - origins with non-http[s] protocols", func() {
- host := corsHost
- origin := "test://localhost"
- origin2 := "tauri://localhost:3000"
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/enable-cors": "true",
- "nginx.ingress.kubernetes.io/cors-allow-origin": "test://localhost, tauri://localhost:3000",
- }
-
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", host).
- WithHeader("Origin", origin).
- Expect().
- Status(http.StatusOK).Headers().
- ValueEqual("Access-Control-Allow-Origin", []string{"test://localhost"})
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", host).
- WithHeader("Origin", origin2).
- Expect().
- Status(http.StatusOK).Headers().
- ValueEqual("Access-Control-Allow-Origin", []string{"tauri://localhost:3000"})
- })
})
diff --git a/test/e2e/annotations/customheaders.go b/test/e2e/annotations/customheaders.go
deleted file mode 100644
index 274ce8278..000000000
--- a/test/e2e/annotations/customheaders.go
+++ /dev/null
@@ -1,110 +0,0 @@
-/*
-Copyright 2023 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package annotations
-
-import (
- "fmt"
- "net/http"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-const (
- customHeaderHost = "custom-headers"
-)
-
-var _ = framework.DescribeAnnotation("custom-headers-*", func() {
- f := framework.NewDefaultFramework("custom-headers")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- })
-
- ginkgo.It("should return status code 200 when no custom-headers is configured", func() {
- ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, nil)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(customHeaderHost,
- func(server string) bool {
- return strings.Contains(server, "server_name custom-headers")
- })
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", customHeaderHost).
- Expect().
- Status(http.StatusOK).
- Body().Contains(fmt.Sprintf("host=%v", customHeaderHost))
- })
-
- ginkgo.It("should return status code 503 when custom-headers is configured with an invalid secret", func() {
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/custom-headers": f.Namespace + "/custom-headers",
- }
-
- ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(customHeaderHost,
- func(server string) bool {
- return strings.Contains(server, "server_name custom-headers")
- })
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", customHeaderHost).
- Expect().
- Status(http.StatusServiceUnavailable).
- Body().Contains("503 Service Temporarily Unavailable")
- })
-
- ginkgo.It(`should set "more_set_headers 'My-Custom-Header' '42';" when custom-headers are set`, func() {
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/custom-headers": f.Namespace + "/custom-headers",
- }
-
- f.CreateConfigMap("custom-headers", map[string]string{
- "My-Custom-Header": "42",
- "My-Custom-Header-Dollar": "$remote_addr",
- })
- f.UpdateNginxConfigMapData("global-allowed-response-headers", "My-Custom-Header,My-Custom-Header-Dollar")
-
- ing := framework.NewSingleIngress(customHeaderHost, "/", customHeaderHost, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(customHeaderHost,
- func(server string) bool {
- return strings.Contains(server, `more_set_headers "My-Custom-Header: 42";`)
- })
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", customHeaderHost).
- Expect().
- Status(http.StatusOK).
- Header("My-Custom-Header").Contains("42")
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", customHeaderHost).
- Expect().
- Status(http.StatusOK).
- Header("My-Custom-Header-Dollar").Contains("$remote_addr")
- })
-})
diff --git a/test/e2e/annotations/fromtowwwredirect.go b/test/e2e/annotations/fromtowwwredirect.go
index a3fb3b9b5..b69cce93e 100644
--- a/test/e2e/annotations/fromtowwwredirect.go
+++ b/test/e2e/annotations/fromtowwwredirect.go
@@ -58,12 +58,18 @@ var _ = framework.DescribeAnnotation("from-to-www-redirect", func() {
WithHeader("Host", fmt.Sprintf("%s.%s", "www", host)).
Expect().
Status(http.StatusPermanentRedirect).
- Header("Location").Equal("http://fromtowwwredirect.bar.com:80/foo")
+ Header("Location").Equal("http://fromtowwwredirect.bar.com/foo")
})
ginkgo.It("should redirect from www HTTPS to HTTPS", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
ginkgo.By("setting up server for redirect from www")
@@ -101,7 +107,7 @@ var _ = framework.DescribeAnnotation("from-to-www-redirect", func() {
WithHeader("Host", toHost).
Expect().
Status(http.StatusPermanentRedirect).
- Header("Location").Equal(fmt.Sprintf("https://%v:443", fromHost))
+ Header("Location").Equal(fmt.Sprintf("https://%v", fromHost))
ginkgo.By("sending request to domain should not redirect to www")
f.HTTPTestClientWithTLSConfig(&tls.Config{
diff --git a/test/e2e/annotations/globalratelimit.go b/test/e2e/annotations/globalratelimit.go
new file mode 100644
index 000000000..96be467fe
--- /dev/null
+++ b/test/e2e/annotations/globalratelimit.go
@@ -0,0 +1,88 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package annotations
+
+import (
+ "fmt"
+ "net/http"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+var _ = framework.DescribeAnnotation("annotation-global-rate-limit", func() {
+ f := framework.NewDefaultFramework("global-rate-limit")
+ host := "global-rate-limit-annotation"
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ })
+
+ ginkgo.It("generates correct configuration", func() {
+ annotations := make(map[string]string)
+ annotations["nginx.ingress.kubernetes.io/global-rate-limit"] = "5"
+ annotations["nginx.ingress.kubernetes.io/global-rate-limit-window"] = "2m"
+
+ // We need to allow { and } characters for this annotation to work
+ f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "load_module, lua_package, _by_lua, location, root")
+ // Sleep a while just to guarantee that the configmap is applied
+ framework.Sleep()
+
+ ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ ing = f.EnsureIngress(ing)
+ namespace := strings.ReplaceAll(string(ing.UID), "-", "")
+
+ serverConfig := ""
+ f.WaitForNginxServer(host, func(server string) bool {
+ serverConfig = server
+ return true
+ })
+ assert.Contains(ginkgo.GinkgoT(), serverConfig,
+ fmt.Sprintf(`global_throttle = { namespace = "%v", `+
+ `limit = 5, window_size = 120, key = { { nil, nil, "remote_addr", nil, }, }, `+
+ `ignored_cidrs = { } }`,
+ namespace))
+
+ f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
+
+ ginkgo.By("regenerating the correct configuration after update")
+ annotations["nginx.ingress.kubernetes.io/global-rate-limit-key"] = "${remote_addr}${http_x_api_client}"
+ annotations["nginx.ingress.kubernetes.io/global-rate-limit-ignored-cidrs"] = "192.168.1.1, 234.234.234.0/24"
+ ing.SetAnnotations(annotations)
+
+ f.WaitForReload(func() {
+ ing = f.UpdateIngress(ing)
+ })
+
+ serverConfig = ""
+ f.WaitForNginxServer(host, func(server string) bool {
+ serverConfig = server
+ return true
+ })
+ assert.Contains(ginkgo.GinkgoT(), serverConfig,
+ fmt.Sprintf(`global_throttle = { namespace = "%v", `+
+ `limit = 5, window_size = 120, `+
+ `key = { { nil, "remote_addr", nil, nil, }, { nil, "http_x_api_client", nil, nil, }, }, `+
+ `ignored_cidrs = { "192.168.1.1", "234.234.234.0/24", } }`,
+ namespace))
+
+ f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
+ })
+})
diff --git a/test/e2e/annotations/grpc.go b/test/e2e/annotations/grpc.go
index 2a9c5a983..b3be82c2a 100644
--- a/test/e2e/annotations/grpc.go
+++ b/test/e2e/annotations/grpc.go
@@ -22,13 +22,11 @@ import (
"fmt"
"strings"
- delaypb "github.com/Anddd7/pb/grpcbin"
pb "github.com/moul/pb/grpcbin/go-grpc"
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
- "google.golang.org/grpc/credentials/insecure"
"google.golang.org/grpc/metadata"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -37,10 +35,7 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework"
)
-const (
- echoHost = "echo"
- host = "grpc"
-)
+const echoHost = "echo"
var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
f := framework.NewDefaultFramework("grpc", framework.WithHTTPBunEnabled())
@@ -48,6 +43,8 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
ginkgo.It("should use grpc_pass in the configuration file", func() {
f.NewGRPCFortuneTellerDeployment()
+ host := "grpc"
+
annotations := map[string]string{
"nginx.ingress.kubernetes.io/backend-protocol": "GRPC",
}
@@ -107,7 +104,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
})
//nolint:goconst //string interpolation
- conn, err := grpc.NewClient(f.GetNginxIP()+":443",
+ conn, err := grpc.Dial(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -168,7 +165,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
return strings.Contains(server, "grpc_pass grpc://upstream_balancer;")
})
- conn, err := grpc.NewClient(f.GetNginxIP()+":443",
+ conn, err := grpc.Dial(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -193,8 +190,14 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
ginkgo.It("should return OK for service with backend protocol GRPCS", func() {
f.NewGRPCBinDeployment()
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := echoHost
@@ -236,7 +239,7 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
return strings.Contains(server, "grpc_pass grpcs://upstream_balancer;")
})
- conn, err := grpc.NewClient(f.GetNginxIP()+":443",
+ conn, err := grpc.Dial(f.GetNginxIP()+":443",
grpc.WithTransportCredentials(
credentials.NewTLS(&tls.Config{
ServerName: echoHost,
@@ -256,89 +259,4 @@ var _ = framework.DescribeAnnotation("backend-protocol - GRPC", func() {
metadata := res.GetMetadata()
assert.Equal(ginkgo.GinkgoT(), metadata["content-type"].Values[0], "application/grpc")
})
-
- ginkgo.It("should return OK when request not exceed timeout", func() {
- f.NewGRPCBinDelayDeployment()
-
- proxyTimeout := "10"
- ingressName := "grpcbin-delay"
-
- annotations := make(map[string]string)
- annotations["nginx.ingress.kubernetes.io/backend-protocol"] = "GRPC"
- annotations["nginx.ingress.kubernetes.io/proxy-connect-timeout"] = proxyTimeout
- annotations["nginx.ingress.kubernetes.io/proxy-send-timeout"] = proxyTimeout
- annotations["nginx.ingress.kubernetes.io/proxy-read-timeout"] = proxyTimeout
-
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, ingressName, 50051, annotations)
-
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, fmt.Sprintf("grpc_connect_timeout %ss;", proxyTimeout)) &&
- strings.Contains(server, fmt.Sprintf("grpc_send_timeout %ss;", proxyTimeout)) &&
- strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
- })
-
- conn, err := grpc.NewClient(
- f.GetNginxIP()+":80",
- grpc.WithTransportCredentials(insecure.NewCredentials()),
- grpc.WithAuthority(host),
- )
- assert.Nil(ginkgo.GinkgoT(), err, "error creating a connection")
- defer conn.Close()
-
- client := delaypb.NewGrpcbinServiceClient(conn)
-
- res, err := client.Unary(context.Background(), &delaypb.UnaryRequest{
- Data: "hello",
- })
- assert.Nil(ginkgo.GinkgoT(), err)
-
- metadata := res.GetResponseAttributes().RequestHeaders
- assert.Equal(ginkgo.GinkgoT(), metadata["content-type"], "application/grpc")
- assert.Equal(ginkgo.GinkgoT(), metadata[":authority"], host)
- })
-
- ginkgo.It("should return Error when request exceed timeout", func() {
- f.NewGRPCBinDelayDeployment()
-
- proxyTimeout := "10"
- ingressName := "grpcbin-delay"
-
- annotations := make(map[string]string)
- annotations["nginx.ingress.kubernetes.io/backend-protocol"] = "GRPC"
- annotations["nginx.ingress.kubernetes.io/proxy-connect-timeout"] = proxyTimeout
- annotations["nginx.ingress.kubernetes.io/proxy-send-timeout"] = proxyTimeout
- annotations["nginx.ingress.kubernetes.io/proxy-read-timeout"] = proxyTimeout
-
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, ingressName, 50051, annotations)
-
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, fmt.Sprintf("grpc_connect_timeout %ss;", proxyTimeout)) &&
- strings.Contains(server, fmt.Sprintf("grpc_send_timeout %ss;", proxyTimeout)) &&
- strings.Contains(server, fmt.Sprintf("grpc_read_timeout %ss;", proxyTimeout))
- })
-
- conn, err := grpc.NewClient(
- f.GetNginxIP()+":80",
- grpc.WithTransportCredentials(insecure.NewCredentials()),
- grpc.WithAuthority(host),
- )
- assert.Nil(ginkgo.GinkgoT(), err, "error creating a connection")
- defer conn.Close()
-
- client := delaypb.NewGrpcbinServiceClient(conn)
-
- _, err = client.Unary(context.Background(), &delaypb.UnaryRequest{
- Data: "hello",
- RequestAttributes: &delaypb.RequestAttributes{
- Delay: 15,
- },
- })
- assert.Error(ginkgo.GinkgoT(), err)
- })
})
diff --git a/test/e2e/annotations/modsecurity/modsecurity.go b/test/e2e/annotations/modsecurity/modsecurity.go
index 730fc76e7..a3e7d80ba 100644
--- a/test/e2e/annotations/modsecurity/modsecurity.go
+++ b/test/e2e/annotations/modsecurity/modsecurity.go
@@ -100,8 +100,14 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity with snippet", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -167,8 +173,14 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity with snippet and block requests", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -200,8 +212,14 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity globally and with modsecurity-snippet block requests", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -233,11 +251,16 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity when enable-owasp-modsecurity-crs is set to true", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
-
- f.UpdateNginxConfigMapData("enable-modsecurity", "true")
- f.UpdateNginxConfigMapData("enable-owasp-modsecurity-crs", "true")
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ "enable-modsecurity": "true",
+ "enable-owasp-modsecurity-crs": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -267,8 +290,6 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should enable modsecurity through the config map", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
host := modSecurityFooHost
nameSpace := f.Namespace
@@ -289,9 +310,17 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
f.EnsureIngress(ing)
expectedComment := "SecRuleEngine On"
- f.UpdateNginxConfigMapData("enable-modsecurity", "true")
- f.UpdateNginxConfigMapData("enable-owasp-modsecurity-crs", "true")
- f.UpdateNginxConfigMapData("modsecurity-snippet", expectedComment)
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ "enable-modsecurity": "true",
+ "enable-owasp-modsecurity-crs": "true",
+ "modsecurity-snippet": expectedComment,
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
f.WaitForNginxServer(host,
func(server string) bool {
@@ -310,9 +339,6 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
host := modSecurityFooHost
nameSpace := f.Namespace
- f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
- defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
-
snippet := `SecRequestBodyAccess On
SecAuditEngine RelevantOnly
SecAuditLogParts ABIJDEFHZ
@@ -352,9 +378,14 @@ var _ = framework.DescribeAnnotation("modsecurity owasp", func() {
})
ginkgo.It("should disable default modsecurity conf setting when modsecurity-snippet is specified", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
-
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := modSecurityFooHost
nameSpace := f.Namespace
diff --git a/test/e2e/annotations/proxy.go b/test/e2e/annotations/proxy.go
index 8e9866021..235b828e7 100644
--- a/test/e2e/annotations/proxy.go
+++ b/test/e2e/annotations/proxy.go
@@ -160,13 +160,11 @@ var _ = framework.DescribeAnnotation("proxy-*", func() {
proxyBuffering := "on"
proxyBuffersNumber := "8"
proxyBufferSize := "8k"
- proxyBusyBuffersSize := "16k"
annotations := make(map[string]string)
annotations["nginx.ingress.kubernetes.io/proxy-buffering"] = proxyBuffering
annotations["nginx.ingress.kubernetes.io/proxy-buffers-number"] = proxyBuffersNumber
annotations["nginx.ingress.kubernetes.io/proxy-buffer-size"] = proxyBufferSize
- annotations["nginx.ingress.kubernetes.io/proxy-busy-buffers-size"] = proxyBusyBuffersSize
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
@@ -176,7 +174,6 @@ var _ = framework.DescribeAnnotation("proxy-*", func() {
return strings.Contains(server, fmt.Sprintf("proxy_buffering %s;", proxyBuffering)) &&
strings.Contains(server, fmt.Sprintf("proxy_buffer_size %s;", proxyBufferSize)) &&
strings.Contains(server, fmt.Sprintf("proxy_buffers %s %s;", proxyBuffersNumber, proxyBufferSize)) &&
- strings.Contains(server, fmt.Sprintf("proxy_busy_buffers_size %s;", proxyBusyBuffersSize)) &&
strings.Contains(server, fmt.Sprintf("proxy_request_buffering %s;", proxyBuffering))
})
})
diff --git a/test/e2e/annotations/proxyssl.go b/test/e2e/annotations/proxyssl.go
index 898cbed48..989d681c1 100644
--- a/test/e2e/annotations/proxyssl.go
+++ b/test/e2e/annotations/proxyssl.go
@@ -47,7 +47,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "DEFAULT", "TLSv1.2", "off", 1, "")
+ assertProxySSL(f, host, "", "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "off", 1, "")
f.HTTPTestClient().
GET("/").
@@ -77,7 +77,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "DEFAULT", "TLSv1.2", "on", 2, "on")
+ assertProxySSL(f, host, "", "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "on", 2, "on")
f.HTTPTestClient().
GET("/").
@@ -105,7 +105,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, annotations)
f.EnsureIngress(ing)
- assertProxySSL(f, host, "", "HIGH:!AES", "TLSv1.2", "off", 1, "")
+ assertProxySSL(f, host, "", "HIGH:!AES", "TLSv1 TLSv1.1 TLSv1.2", "off", 1, "")
f.HTTPTestClient().
GET("/").
@@ -171,7 +171,7 @@ var _ = framework.DescribeAnnotation("proxy-ssl-*", func() {
wlValue := "true"
f.UpdateNginxConfigMapData(wlKey, wlValue)
- assertProxySSL(f, host, secretName, "DEFAULT", "TLSv1.2", "on", 1, "on")
+ assertProxySSL(f, host, secretName, "DEFAULT", "TLSv1 TLSv1.1 TLSv1.2", "on", 1, "on")
f.WaitForNginxCustomConfiguration("## start server proxyssl.com", "location ", func(server string) bool {
return (!strings.Contains(server, "proxy_ssl_trusted_certificate") &&
diff --git a/test/e2e/annotations/relativeredirects.go b/test/e2e/annotations/relativeredirects.go
deleted file mode 100644
index 430b357e4..000000000
--- a/test/e2e/annotations/relativeredirects.go
+++ /dev/null
@@ -1,107 +0,0 @@
-/*
-Copyright 2023 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package annotations
-
-import (
- "fmt"
- "net/http"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-const (
- relativeRedirectsHostname = "rr.foo.com"
- relativeRedirectsRedirectPath = "/something"
- relativeRedirectsRelativeRedirectURL = "/new-location"
-)
-
-var _ = framework.DescribeAnnotation("relative-redirects", func() {
- f := framework.NewDefaultFramework("relative-redirects")
-
- ginkgo.BeforeEach(func() {
- f.NewHttpbunDeployment()
- f.NewEchoDeployment()
- })
-
- ginkgo.It("configures Nginx correctly", func() {
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/relative-redirects": "true",
- }
-
- ing := framework.NewSingleIngress(relativeRedirectsHostname, "/", relativeRedirectsHostname, f.Namespace, framework.HTTPBunService, 80, annotations)
- f.EnsureIngress(ing)
-
- var serverConfig string
- f.WaitForNginxServer(relativeRedirectsHostname, func(srvCfg string) bool {
- serverConfig = srvCfg
- return strings.Contains(serverConfig, fmt.Sprintf("server_name %s", relativeRedirectsHostname))
- })
-
- ginkgo.By("turning off absolute_redirect directive")
- assert.Contains(ginkgo.GinkgoT(), serverConfig, "absolute_redirect off;")
- })
-
- ginkgo.It("should respond with absolute URL in Location", func() {
- absoluteRedirectURL := fmt.Sprintf("http://%s%s", relativeRedirectsHostname, relativeRedirectsRelativeRedirectURL)
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/permanent-redirect": relativeRedirectsRelativeRedirectURL,
- "nginx.ingress.kubernetes.io/relative-redirects": "false",
- }
-
- ginkgo.By("setup ingress")
- ing := framework.NewSingleIngress(relativeRedirectsHostname, relativeRedirectsRedirectPath, relativeRedirectsHostname, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(relativeRedirectsHostname, func(srvCfg string) bool {
- return strings.Contains(srvCfg, fmt.Sprintf("server_name %s", relativeRedirectsHostname))
- })
-
- ginkgo.By("sending request to redirected URL path")
- f.HTTPTestClient().
- GET(relativeRedirectsRedirectPath).
- WithHeader("Host", relativeRedirectsHostname).
- Expect().
- Status(http.StatusMovedPermanently).
- Header("Location").Equal(absoluteRedirectURL)
- })
-
- ginkgo.It("should respond with relative URL in Location", func() {
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/permanent-redirect": relativeRedirectsRelativeRedirectURL,
- "nginx.ingress.kubernetes.io/relative-redirects": "true",
- }
-
- ginkgo.By("setup ingress")
- ing := framework.NewSingleIngress(relativeRedirectsHostname, relativeRedirectsRedirectPath, relativeRedirectsHostname, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(relativeRedirectsHostname, func(srvCfg string) bool {
- return strings.Contains(srvCfg, fmt.Sprintf("server_name %s", relativeRedirectsHostname))
- })
-
- ginkgo.By("sending request to redirected URL path")
- f.HTTPTestClient().
- GET(relativeRedirectsRedirectPath).
- WithHeader("Host", relativeRedirectsHostname).
- Expect().
- Status(http.StatusMovedPermanently).
- Header("Location").Equal(relativeRedirectsRelativeRedirectURL)
- })
-})
diff --git a/test/e2e/annotations/serversnippet.go b/test/e2e/annotations/serversnippet.go
index c94960a3d..1195b728a 100644
--- a/test/e2e/annotations/serversnippet.go
+++ b/test/e2e/annotations/serversnippet.go
@@ -33,8 +33,14 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
})
ginkgo.It(`add valid directives to server via server snippet`, func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "serversnippet.foo.com"
annotations := map[string]string{
@@ -62,8 +68,14 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
})
ginkgo.It(`drops server snippet if disabled by the administrator`, func() {
- f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
- defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "noserversnippet.foo.com"
annotations := map[string]string{
@@ -73,6 +85,11 @@ var _ = framework.DescribeAnnotation("server-snippet", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ f.UpdateNginxConfigMapData("allow-snippet-annotations", "false")
+ defer func() {
+ // Return to the original value
+ f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
+ }()
// Sleep a while just to guarantee that the configmap is applied
framework.Sleep()
f.EnsureIngress(ing)
diff --git a/test/e2e/annotations/snippet.go b/test/e2e/annotations/snippet.go
index 9e3160dcc..0c6148a4f 100644
--- a/test/e2e/annotations/snippet.go
+++ b/test/e2e/annotations/snippet.go
@@ -33,8 +33,15 @@ var _ = framework.DescribeAnnotation("configuration-snippet", func() {
ginkgo.It("set snippet more_set_headers in all locations", func() {
host := "configurationsnippet.foo.com"
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Foo1: Bar1";`,
@@ -64,8 +71,6 @@ var _ = framework.DescribeAnnotation("configuration-snippet", func() {
})
ginkgo.It("drops snippet more_set_header in all locations if disabled by admin", func() {
- f.UpdateNginxConfigMapData("annotations-risk-level", "Critical") // To enable snippet configurations
- defer f.UpdateNginxConfigMapData("annotations-risk-level", "High")
host := "noconfigurationsnippet.foo.com"
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Foo1: Bar1";`,
diff --git a/test/e2e/annotations/sslciphers.go b/test/e2e/annotations/sslciphers.go
index aece7fc41..58010421d 100644
--- a/test/e2e/annotations/sslciphers.go
+++ b/test/e2e/annotations/sslciphers.go
@@ -54,27 +54,4 @@ var _ = framework.DescribeAnnotation("ssl-ciphers", func() {
Expect().
Status(http.StatusOK)
})
-
- ginkgo.It("should keep ssl ciphers", func() {
- host := "ciphers.foo.com"
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/ssl-ciphers": "ALL:!aNULL:!EXPORT56:RC4+RSA@STRENGTH:+HIGH@SECLEVEL=0:+MEDIUM:+LOW:+SSLv2:+EXP",
- "nginx.ingress.kubernetes.io/ssl-prefer-server-ciphers": "true",
- }
-
- ing := framework.NewSingleIngress(host, "/something", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, "ssl_ciphers ALL:!aNULL:!EXPORT56:RC4+RSA@STRENGTH:+HIGH@SECLEVEL=0:+MEDIUM:+LOW:+SSLv2:+EXP;") &&
- strings.Contains(server, "ssl_prefer_server_ciphers on;")
- })
- f.HTTPTestClient().
- GET("/something").
- WithURL(f.GetURL(framework.HTTPS)).
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
- })
})
diff --git a/test/e2e/annotations/streamsnippet.go b/test/e2e/annotations/streamsnippet.go
index f91cdc34e..432537b4a 100644
--- a/test/e2e/annotations/streamsnippet.go
+++ b/test/e2e/annotations/streamsnippet.go
@@ -39,8 +39,14 @@ var _ = framework.DescribeSetting("stream-snippet", func() {
})
ginkgo.It("should add value of stream-snippet to nginx config", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "foo.com"
diff --git a/test/e2e/cgroups/cgroups.go b/test/e2e/cgroups/cgroups.go
deleted file mode 100644
index eab194324..000000000
--- a/test/e2e/cgroups/cgroups.go
+++ /dev/null
@@ -1,115 +0,0 @@
-/*
-Copyright 2020 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package cgroups
-
-import (
- "log"
- "os"
- "path/filepath"
-
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-
- "k8s.io/ingress-nginx/pkg/util/runtime"
-)
-
-var _ = framework.IngressNginxDescribeSerial("[CGroups] cgroups", func() {
- f := framework.NewDefaultFramework("cgroups")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- f.NewSlowEchoDeployment()
- })
-
- ginkgo.It("detects cgroups version v1", func() {
- cgroupPath := "/testing/sys/fs/cgroup/"
- if err := os.MkdirAll(cgroupPath, os.ModePerm); err != nil {
- log.Fatal(err)
- }
-
- quotaFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
- if err != nil {
- log.Fatal(err)
- }
-
- periodFile, err := os.Create(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
- if err != nil {
- log.Fatal(err)
- }
-
- _, err = quotaFile.WriteString("4")
- if err != nil {
- log.Fatal(err)
- }
-
- err = quotaFile.Sync()
- if err != nil {
- log.Fatal(err)
- }
-
- _, err = periodFile.WriteString("2")
- if err != nil {
- log.Fatal(err)
- }
-
- err = periodFile.Sync()
- if err != nil {
- log.Fatal(err)
- }
-
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(cgroupPath), int64(1))
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPUWithCustomPath(cgroupPath), 2)
-
- os.Remove(filepath.Join(cgroupPath, "cpu.cfs_quota_us"))
- os.Remove(filepath.Join(cgroupPath, "cpu.cfs_period_us"))
- })
-
- ginkgo.It("detect cgroups version v2", func() {
- cgroupPath := "/testing/sys/fs/cgroup/"
- if err := os.MkdirAll(cgroupPath, os.ModePerm); err != nil {
- log.Fatal(err)
- }
-
- _, err := os.Create(filepath.Join(cgroupPath, "cgroup.controllers"))
- if err != nil {
- log.Fatal(err)
- }
-
- file, err := os.Create(filepath.Join(cgroupPath, "cpu.max"))
- if err != nil {
- log.Fatal(err)
- }
-
- _, err = file.WriteString("4 2")
- if err != nil {
- log.Fatal(err)
- }
-
- err = file.Sync()
- if err != nil {
- log.Fatal(err)
- }
-
- assert.Equal(ginkgo.GinkgoT(), runtime.GetCgroupVersion(cgroupPath), int64(2))
- assert.Equal(ginkgo.GinkgoT(), runtime.NumCPUWithCustomPath(cgroupPath), 2)
-
- os.Remove(filepath.Join(cgroupPath, "cpu.max"))
- os.Remove(filepath.Join(cgroupPath, "cgroup.controllers"))
- })
-})
diff --git a/test/e2e/disableleaderelection/disable_leader.go b/test/e2e/disableleaderelection/disable_leader.go
deleted file mode 100644
index fd7369dfb..000000000
--- a/test/e2e/disableleaderelection/disable_leader.go
+++ /dev/null
@@ -1,93 +0,0 @@
-/*
-Copyright 2024 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package disableleaderelection
-
-import (
- "net/http"
- "strings"
-
- "github.com/onsi/ginkgo/v2"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-var _ = framework.IngressNginxDescribe("[Disable Leader] Routing works when leader election was disabled", func() {
- f := framework.NewDefaultFramework("disableleaderelection")
-
- ginkgo.BeforeEach(func() {
- f.NewEchoDeployment()
- })
-
- ginkgo.It("should create multiple ingress routings rules when leader election has disabled", func() {
- host1 := "leader.election.disabled.com"
- host2 := "leader.election.disabled2.com"
-
- ing1 := framework.NewSingleIngress(host1, "/foo", host1, f.Namespace, framework.EchoService, 80, nil)
- f.EnsureIngress(ing1)
-
- ing2 := framework.NewSingleIngress(host2, "/ping", host2, f.Namespace, framework.EchoService, 80, nil)
- f.EnsureIngress(ing2)
-
- f.WaitForNginxServer(host1,
- func(server string) bool {
- return strings.Contains(server, host1) &&
- strings.Contains(server, "location /foo")
- })
-
- f.WaitForNginxServer(host2,
- func(server string) bool {
- return strings.Contains(server, host2) &&
- strings.Contains(server, "location /ping")
- })
-
- f.HTTPTestClient().
- GET("/foo").
- WithHeader("Host", host1).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/bar").
- WithHeader("Host", host1).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/foo").
- WithHeader("Host", host2).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/ping").
- WithHeader("Host", host2).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/pong").
- WithHeader("Host", host2).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/ping").
- WithHeader("Host", host1).
- Expect().
- Status(http.StatusNotFound)
- })
-})
diff --git a/test/e2e/e2e.go b/test/e2e/e2e.go
index 9bf005164..25d714f88 100644
--- a/test/e2e/e2e.go
+++ b/test/e2e/e2e.go
@@ -32,10 +32,8 @@ import (
_ "k8s.io/ingress-nginx/test/e2e/admission"
_ "k8s.io/ingress-nginx/test/e2e/annotations"
_ "k8s.io/ingress-nginx/test/e2e/annotations/modsecurity"
- _ "k8s.io/ingress-nginx/test/e2e/cgroups"
_ "k8s.io/ingress-nginx/test/e2e/dbg"
_ "k8s.io/ingress-nginx/test/e2e/defaultbackend"
- _ "k8s.io/ingress-nginx/test/e2e/disableleaderelection"
_ "k8s.io/ingress-nginx/test/e2e/endpointslices"
_ "k8s.io/ingress-nginx/test/e2e/gracefulshutdown"
_ "k8s.io/ingress-nginx/test/e2e/ingress"
diff --git a/test/e2e/endpointslices/topology.go b/test/e2e/endpointslices/topology.go
index 70f7ff86b..38c5f8b76 100644
--- a/test/e2e/endpointslices/topology.go
+++ b/test/e2e/endpointslices/topology.go
@@ -84,7 +84,7 @@ var _ = framework.IngressNginxDescribeSerial("[TopologyHints] topology aware rou
}
if gotHints {
- // we have 2 replicas, if there is just one backend it means that we are routing according slices hints to same zone as controller is
+ // we have 2 replics, if there is just one backend it means that we are routing according slices hints to same zone as controller is
assert.Equal(ginkgo.GinkgoT(), 1, gotBackends)
} else {
// two replicas should have two endpoints without topology hints
diff --git a/test/e2e/framework/deployment.go b/test/e2e/framework/deployment.go
index f213e2e98..08a5353b2 100644
--- a/test/e2e/framework/deployment.go
+++ b/test/e2e/framework/deployment.go
@@ -43,11 +43,11 @@ const HTTPBunService = "httpbun"
// NipService name of external service using nip.io
const NIPService = "external-nip"
-// HTTPBunImage is the default image that is used to deploy HTTPBun with the framework
+// HTTPBunImage is the default image that is used to deploy HTTPBun with the framwork
var HTTPBunImage = os.Getenv("HTTPBUN_IMAGE")
// EchoImage is the default image to be used by the echo service
-const EchoImage = "registry.k8s.io/ingress-nginx/e2e-test-echo:v1.1.1@sha256:a1e0152e2eeab26e3f6fd3986f3d82b17bc7711717cae5392dcd18dd447ba6ef" //#nosec G101
+const EchoImage = "registry.k8s.io/ingress-nginx/e2e-test-echo@sha256:4938d1d91a2b7d19454460a8c1b010b89f6ff92d2987fd889ac3e8fc3b70d91a" //#nosec G101
// TODO: change all Deployment functions to use these options
// in order to reduce complexity and have a unified API across the
diff --git a/test/e2e/framework/exec.go b/test/e2e/framework/exec.go
index 8d528c37a..9e4b55122 100644
--- a/test/e2e/framework/exec.go
+++ b/test/e2e/framework/exec.go
@@ -102,7 +102,7 @@ func (f *Framework) NamespaceContent() (string, error) {
}
eout := strings.TrimSpace(execErr.String())
- if eout != "" {
+ if len(eout) > 0 {
return "", fmt.Errorf("stderr: %v", eout)
}
@@ -117,7 +117,11 @@ func (f *Framework) newIngressController(namespace, namespaceOverlay string) err
isChroot = "false"
}
- cmd := exec.Command("./wait-for-nginx.sh", namespace, namespaceOverlay, isChroot)
+ enableAnnotationValidations, ok := os.LookupEnv("ENABLE_VALIDATIONS")
+ if !ok {
+ enableAnnotationValidations = "false"
+ }
+ cmd := exec.Command("./wait-for-nginx.sh", namespace, namespaceOverlay, isChroot, enableAnnotationValidations)
out, err := cmd.CombinedOutput()
if err != nil {
return fmt.Errorf("unexpected error waiting for ingress controller deployment: %v.\nLogs:\n%v", err, string(out))
diff --git a/test/e2e/framework/fastcgi_helloserver.go b/test/e2e/framework/fastcgi_helloserver.go
index c414c4da3..73f9ef340 100644
--- a/test/e2e/framework/fastcgi_helloserver.go
+++ b/test/e2e/framework/fastcgi_helloserver.go
@@ -59,7 +59,7 @@ func (f *Framework) NewNewFastCGIHelloServerDeploymentWithReplicas(replicas int3
Containers: []corev1.Container{
{
Name: "fastcgi-helloserver",
- Image: "registry.k8s.io/ingress-nginx/fastcgi-helloserver:v1.1.1@sha256:6af4d8c7745c6727aab759db616a58fd68d784d07ce7a32d1ad149c331fd9a6f",
+ Image: "registry.k8s.io/ingress-nginx/e2e-test-fastcgi-helloserver@sha256:0e08c836cc58f1ea862578de99b13bc4264fe071e816f96dc1d79857bfba7473",
Env: []corev1.EnvVar{},
Ports: []corev1.ContainerPort{
{
diff --git a/test/e2e/framework/framework.go b/test/e2e/framework/framework.go
index 204da7df0..b62ad691c 100644
--- a/test/e2e/framework/framework.go
+++ b/test/e2e/framework/framework.go
@@ -16,7 +16,6 @@ package framework
import (
"context"
"crypto/tls"
- "encoding/json"
"fmt"
"net"
"net/http"
@@ -26,7 +25,6 @@ import (
"k8s.io/ingress-nginx/test/e2e/framework/httpexpect"
"github.com/onsi/ginkgo/v2"
- ginkgotypes "github.com/onsi/ginkgo/v2/types"
"github.com/stretchr/testify/assert"
appsv1 "k8s.io/api/apps/v1"
v1 "k8s.io/api/core/v1"
@@ -101,7 +99,7 @@ func NewDefaultFramework(baseName string, opts ...func(*Framework)) *Framework {
}
// NewSimpleFramework makes a new framework that allows the usage of a namespace
-// for arbitrary tests.
+// for arbitraty tests.
func NewSimpleFramework(baseName string, opts ...func(*Framework)) *Framework {
defer ginkgo.GinkgoRecover()
@@ -180,7 +178,7 @@ func (f *Framework) AfterEach() {
assert.Nil(ginkgo.GinkgoT(), err, "deleting IngressClass")
}(f.KubeClientSet, f.IngressClass)
- if !ginkgo.CurrentSpecReport().Failed() || ginkgo.CurrentSpecReport().State.Is(ginkgotypes.SpecStateInterrupted) {
+ if !ginkgo.CurrentSpecReport().Failed() {
return
}
@@ -284,15 +282,6 @@ func (f *Framework) WaitForNginxConfiguration(matcher func(cfg string) bool) {
Sleep(1 * time.Second)
}
-// WaitForLuaConfiguration waits until the nginx configuration contains a particular configuration
-// `cfg` passed to matcher is normalized by replacing all tabs and spaces with single space.
-func (f *Framework) WaitForLuaConfiguration(matcher func(jsonCfg map[string]interface{}) bool) {
- //nolint:staticcheck // TODO: will replace it since wait.Poll is deprecated
- err := wait.Poll(Poll, DefaultTimeout, f.matchLuaConditions(matcher))
- assert.Nil(ginkgo.GinkgoT(), err, "waiting for nginx lua configuration condition/s")
- Sleep(1 * time.Second)
-}
-
// WaitForNginxCustomConfiguration waits until the nginx configuration given part (from, to) contains a particular configuration
func (f *Framework) WaitForNginxCustomConfiguration(from, to string, matcher func(cfg string) bool) {
//nolint:staticcheck // TODO: will replace it since wait.Poll is deprecated
@@ -323,7 +312,7 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
return false, nil
}
- if klog.V(10).Enabled() && o != "" {
+ if klog.V(10).Enabled() && len(o) > 0 {
klog.InfoS("NGINX", "configuration", o)
}
@@ -336,29 +325,6 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
}
}
-func (f *Framework) matchLuaConditions(matcher func(jsonCfg map[string]interface{}) bool) wait.ConditionFunc {
- return func() (bool, error) {
- cmd := "cat /etc/nginx/lua/cfg.json"
-
- o, err := f.ExecCommand(f.pod, cmd)
- if err != nil {
- return false, nil
- }
-
- if klog.V(10).Enabled() && o != "" {
- klog.InfoS("Lua", "configuration", o)
- }
-
- luaConfig := make(map[string]interface{}) // Use unstructured so we can walk through JSON
- if err := json.Unmarshal([]byte(o), &luaConfig); err != nil {
- return false, err
- }
-
- // passes the lua interface to the function
- return matcher(luaConfig), nil
- }
-}
-
func (f *Framework) matchNginxCustomConditions(from, to string, matcher func(cfg string) bool) wait.ConditionFunc {
return func() (bool, error) {
cmd := fmt.Sprintf("cat /etc/nginx/nginx.conf| awk '/%v/,/%v/'", from, to)
@@ -368,7 +334,7 @@ func (f *Framework) matchNginxCustomConditions(from, to string, matcher func(cfg
return false, nil
}
- if klog.V(10).Enabled() && o != "" {
+ if klog.V(10).Enabled() && len(o) > 0 {
klog.InfoS("NGINX", "configuration", o)
}
@@ -416,20 +382,6 @@ func (f *Framework) SetNginxConfigMapData(cmData map[string]string) {
f.WaitForReload(fn)
}
-// SetNginxConfigMapData sets ingress-nginx's nginx-ingress-controller configMap data
-func (f *Framework) AllowSnippetConfiguration() func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "true",
- "annotations-risk-level": "Critical", // To enable snippet configurations
- })
- return func() {
- f.SetNginxConfigMapData(map[string]string{
- "allow-snippet-annotations": "false",
- "annotations-risk-level": "High",
- })
- }
-}
-
// CreateConfigMap creates a new configmap in the current namespace
func (f *Framework) CreateConfigMap(name string, data map[string]string) {
_, err := f.KubeClientSet.CoreV1().ConfigMaps(f.Namespace).Create(context.TODO(), &v1.ConfigMap{
@@ -548,7 +500,7 @@ func (f *Framework) newHTTPTestClient(config *tls.Config, setIngressURL bool) *h
Transport: &http.Transport{
TLSClientConfig: config,
},
- CheckRedirect: func(_ *http.Request, _ []*http.Request) error {
+ CheckRedirect: func(req *http.Request, via []*http.Request) error {
return http.ErrUseLastResponse
},
}, httpexpect.NewAssertReporter())
diff --git a/test/e2e/framework/grpc_delay.go b/test/e2e/framework/grpc_delay.go
deleted file mode 100644
index 58d10b2e9..000000000
--- a/test/e2e/framework/grpc_delay.go
+++ /dev/null
@@ -1,109 +0,0 @@
-/*
-Copyright 2024 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package framework
-
-import (
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
- appsv1 "k8s.io/api/apps/v1"
- corev1 "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/fields"
- "k8s.io/apimachinery/pkg/util/intstr"
-)
-
-// NewGRPCBinDelayDeployment creates a new single replica
-// deployment of the grpcbin image in a particular namespace
-func (f *Framework) NewGRPCBinDelayDeployment() {
- f.NewNewGRPCBinDelayDeploymentWithReplicas(1)
-}
-
-// NewNewGRPCBinDelayDeploymentWithReplicas creates a new deployment of the
-// grpcbin image in a particular namespace. Number of replicas is configurable
-func (f *Framework) NewNewGRPCBinDelayDeploymentWithReplicas(replicas int32) {
- name := "grpcbin-delay"
-
- deployment := &appsv1.Deployment{
- ObjectMeta: metav1.ObjectMeta{
- Name: name,
- Namespace: f.Namespace,
- },
- Spec: appsv1.DeploymentSpec{
- Replicas: NewInt32(replicas),
- Selector: &metav1.LabelSelector{
- MatchLabels: map[string]string{
- "app": name,
- },
- },
- Template: corev1.PodTemplateSpec{
- ObjectMeta: metav1.ObjectMeta{
- Labels: map[string]string{
- "app": name,
- },
- },
- Spec: corev1.PodSpec{
- TerminationGracePeriodSeconds: NewInt64(0),
- Containers: []corev1.Container{
- {
- Name: name,
- Image: "ghcr.io/anddd7/grpcbin:v1.0.6",
- Env: []corev1.EnvVar{},
- Ports: []corev1.ContainerPort{
- {
- Name: "grpc",
- ContainerPort: 50051,
- },
- },
- },
- },
- },
- },
- },
- }
-
- d := f.EnsureDeployment(deployment)
-
- err := waitForPodsReady(f.KubeClientSet, DefaultTimeout, int(replicas), f.Namespace, &metav1.ListOptions{
- LabelSelector: fields.SelectorFromSet(fields.Set(d.Spec.Template.ObjectMeta.Labels)).String(),
- })
- assert.Nil(ginkgo.GinkgoT(), err, "failed to wait for to become ready")
-
- service := &corev1.Service{
- ObjectMeta: metav1.ObjectMeta{
- Name: name,
- Namespace: f.Namespace,
- },
- Spec: corev1.ServiceSpec{
- Ports: []corev1.ServicePort{
- {
- Name: "grpc",
- Port: 50051,
- TargetPort: intstr.FromInt(50051),
- Protocol: "TCP",
- },
- },
- Selector: map[string]string{
- "app": name,
- },
- },
- }
-
- f.EnsureService(service)
-
- err = WaitForEndpoints(f.KubeClientSet, DefaultTimeout, name, f.Namespace, int(replicas))
- assert.Nil(ginkgo.GinkgoT(), err, "waiting for endpoints to become ready")
-}
diff --git a/test/e2e/framework/httpexpect/request.go b/test/e2e/framework/httpexpect/request.go
index 4daba136e..0ae85dd79 100644
--- a/test/e2e/framework/httpexpect/request.go
+++ b/test/e2e/framework/httpexpect/request.go
@@ -93,7 +93,7 @@ func (h *HTTPRequest) ForceResolve(ip string, port uint16) *HTTPRequest {
return h
}
newTransport := oldTransport.Clone()
- newTransport.DialContext = func(ctx context.Context, network, _ string) (net.Conn, error) {
+ newTransport.DialContext = func(ctx context.Context, network, addr string) (net.Conn, error) {
return dialer.DialContext(ctx, network, resolveAddr)
}
h.client.Transport = newTransport
diff --git a/test/e2e/gracefulshutdown/shutdown.go b/test/e2e/gracefulshutdown/shutdown.go
index e9883338f..604143da8 100644
--- a/test/e2e/gracefulshutdown/shutdown.go
+++ b/test/e2e/gracefulshutdown/shutdown.go
@@ -37,7 +37,7 @@ var _ = framework.IngressNginxDescribe("[Shutdown] ingress controller", func() {
f.NewSlowEchoDeployment()
})
- ginkgo.It("should shutdown in less than 60 seconds without pending connections", func() {
+ ginkgo.It("should shutdown in less than 60 secons without pending connections", func() {
f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.Namespace, framework.SlowEchoService, 80, nil))
f.WaitForNginxServer(host,
diff --git a/test/e2e/ingress/multiple_rules.go b/test/e2e/ingress/multiple_rules.go
index 9247dc1d3..f44b2f8dd 100644
--- a/test/e2e/ingress/multiple_rules.go
+++ b/test/e2e/ingress/multiple_rules.go
@@ -36,8 +36,14 @@ var _ = framework.IngressNginxDescribe("single ingress - multiple hosts", func()
})
ginkgo.It("should set the correct $service_name NGINX variable", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_input_headers "service-name: $service_name";`,
diff --git a/test/e2e/ingress/pathtype_exact.go b/test/e2e/ingress/pathtype_exact.go
index 2660e32a4..d0564cbf6 100644
--- a/test/e2e/ingress/pathtype_exact.go
+++ b/test/e2e/ingress/pathtype_exact.go
@@ -35,8 +35,14 @@ var _ = framework.IngressNginxDescribe("[Ingress] [PathType] exact", func() {
})
ginkgo.It("should choose exact location for /exact", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "exact.path"
diff --git a/test/e2e/ingress/pathtype_mixed.go b/test/e2e/ingress/pathtype_mixed.go
index 3212089c9..e7bf2532e 100644
--- a/test/e2e/ingress/pathtype_mixed.go
+++ b/test/e2e/ingress/pathtype_mixed.go
@@ -37,8 +37,14 @@ var _ = framework.IngressNginxDescribe("[Ingress] [PathType] mix Exact and Prefi
exactPathType := networking.PathTypeExact
ginkgo.It("should choose the correct location", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "mixed.path"
diff --git a/test/e2e/ingress/pathtype_prefix.go b/test/e2e/ingress/pathtype_prefix.go
index ce11ca8bf..fa664ce27 100644
--- a/test/e2e/ingress/pathtype_prefix.go
+++ b/test/e2e/ingress/pathtype_prefix.go
@@ -68,138 +68,4 @@ var _ = framework.IngressNginxDescribe("[Ingress] [PathType] prefix checks", fun
Expect().
Status(http.StatusOK)
})
-
- ginkgo.It("should test prefix path using simple regex pattern for /id/{int}", func() {
- host := "echo.com.br"
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/use-regex": `true`,
- }
-
- ing := framework.NewSingleIngress(host, "/id/[0-9]+", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.HTTPTestClient().
- GET("/id/1").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/12").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/123").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/aaa").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/id/123a").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
- })
-
- ginkgo.It("should test prefix path using regex pattern for /id/{int} ignoring non-digits characters at end of string", func() {
- host := "echo.regex.br"
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/use-regex": `true`,
- }
-
- ing := framework.NewSingleIngress(host, "/id/[0-9]+$", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.HTTPTestClient().
- GET("/id/1").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/aaa").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/id/123a").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
- })
-
- ginkgo.It("should test prefix path using fixed path size regex pattern /id/{int}{3}", func() {
- host := "echo.regex.size.br"
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/use-regex": `true`,
- }
-
- ing := framework.NewSingleIngress(host, "/id/[0-9]{3}$", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.HTTPTestClient().
- GET("/id/99").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/id/123").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/9999").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/id/123a").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
- })
-
- ginkgo.It("should correctly route multi-segment path patterns", func() {
- host := "echo.multi.segment.br"
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/use-regex": `true`,
- }
-
- ing := framework.NewSingleIngress(host, "/id/[0-9]+/post/[a-zA-Z]+$", host, f.Namespace, framework.EchoService, 80, annotations)
- f.EnsureIngress(ing)
-
- f.HTTPTestClient().
- GET("/id/123/post/abc").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
-
- f.HTTPTestClient().
- GET("/id/123/post/abc123").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
-
- f.HTTPTestClient().
- GET("/id/abc/post/abc").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusNotFound)
- })
})
diff --git a/test/e2e/lua/dynamic_configuration.go b/test/e2e/lua/dynamic_configuration.go
index a5e2196ce..8ec1ef839 100644
--- a/test/e2e/lua/dynamic_configuration.go
+++ b/test/e2e/lua/dynamic_configuration.go
@@ -48,7 +48,12 @@ var _ = framework.IngressNginxDescribe("[Lua] dynamic configuration", func() {
ginkgo.It("configures balancer Lua middleware correctly", func() {
f.WaitForNginxConfiguration(func(cfg string) bool {
- return strings.Contains(cfg, "balancer_by_lua_file /etc/nginx/lua/nginx/ngx_conf_balancer.lua")
+ return strings.Contains(cfg, "balancer.init_worker()") && strings.Contains(cfg, "balancer.balance()")
+ })
+
+ host := "foo.com"
+ f.WaitForNginxServer(host, func(server string) bool {
+ return strings.Contains(server, "balancer.rewrite()") && strings.Contains(server, "balancer.log()")
})
})
diff --git a/test/e2e/metrics/metrics.go b/test/e2e/metrics/metrics.go
index bec09bb37..907b53732 100644
--- a/test/e2e/metrics/metrics.go
+++ b/test/e2e/metrics/metrics.go
@@ -36,7 +36,6 @@ const waitForMetrics = 2 * time.Second
var _ = framework.IngressNginxDescribe("[metrics] exported prometheus metrics", func() {
f := framework.NewDefaultFramework("metrics")
host := "foo.com"
- wildcardHost := "wildcard." + host
ginkgo.BeforeEach(func() {
f.NewEchoDeployment()
@@ -92,50 +91,4 @@ var _ = framework.IngressNginxDescribe("[metrics] exported prometheus metrics",
assert.Nil(ginkgo.GinkgoT(), err)
assert.NotNil(ginkgo.GinkgoT(), mf)
})
- ginkgo.It("request metrics per undefined host are present when flag is set", func() {
- err := f.UpdateIngressControllerDeployment(func(deployment *appsv1.Deployment) error {
- args := deployment.Spec.Template.Spec.Containers[0].Args
- args = append(args, "--metrics-per-undefined-host=true")
- deployment.Spec.Template.Spec.Containers[0].Args = args
- _, err := f.KubeClientSet.AppsV1().Deployments(f.Namespace).Update(context.TODO(), deployment, metav1.UpdateOptions{})
- return err
- })
- assert.Nil(ginkgo.GinkgoT(), err, "updating deployment")
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", wildcardHost).
- Expect().
- Status(http.StatusNotFound)
- time.Sleep(waitForMetrics)
-
- ip := f.GetNginxPodIP()
- reqMetrics, err := f.GetMetric("nginx_ingress_controller_requests", ip)
- assert.Nil(ginkgo.GinkgoT(), err)
- assert.NotNil(ginkgo.GinkgoT(), reqMetrics.Metric)
- assert.Len(ginkgo.GinkgoT(), reqMetrics.Metric, 1)
-
- containedLabel := false
- for _, label := range reqMetrics.Metric[0].Label {
- if *label.Name == "host" && *label.Value == wildcardHost {
- containedLabel = true
- break
- }
- }
-
- assert.Truef(ginkgo.GinkgoT(), containedLabel, "expected reqMetrics to contain label with \"name\"=\"host\" \"value\"=%q, but it did not: %s", wildcardHost, reqMetrics.String())
- })
- ginkgo.It("request metrics per undefined host are not present when flag is not set", func() {
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", wildcardHost).
- Expect().
- Status(http.StatusNotFound)
- time.Sleep(waitForMetrics)
-
- ip := f.GetNginxPodIP()
- reqMetrics, err := f.GetMetric("nginx_ingress_controller_requests", ip)
- assert.EqualError(ginkgo.GinkgoT(), err, "there is no metric with name nginx_ingress_controller_requests")
- assert.Nil(ginkgo.GinkgoT(), reqMetrics)
- })
})
diff --git a/test/e2e/run-chart-test.sh b/test/e2e/run-chart-test.sh
index 7e3f2fe9b..eedb2bef5 100755
--- a/test/e2e/run-chart-test.sh
+++ b/test/e2e/run-chart-test.sh
@@ -62,7 +62,7 @@ export KUBECONFIG="${KUBECONFIG:-$HOME/.kube/kind-config-$KIND_CLUSTER_NAME}"
if [ "${SKIP_CLUSTER_CREATION:-false}" = "false" ]; then
echo "[dev-env] creating Kubernetes cluster with kind"
- export K8S_VERSION=${K8S_VERSION:-v1.32.0@sha256:c48c62eac5da28cdadcf560d1d8616cfa6783b58f0d94cf63ad1bf49600cb027}
+ export K8S_VERSION=${K8S_VERSION:-v1.26.3@sha256:61b92f38dff6ccc29969e7aa154d34e38b89443af1a2c14e6cfbd2df6419c66f}
kind create cluster \
--verbosity=${KIND_LOG_LEVEL} \
@@ -78,7 +78,7 @@ fi
if [ "${SKIP_IMAGE_CREATION:-false}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.22.2
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.13.1
fi
echo "[dev-env] building image"
make -C ${DIR}/../../ clean-image build image
@@ -91,28 +91,25 @@ echo "[dev-env] copying docker images to cluster..."
kind load docker-image --name="${KIND_CLUSTER_NAME}" --nodes=${KIND_WORKERS} ${REGISTRY}/controller:${TAG}
if [ "${SKIP_CERT_MANAGER_CREATION:-false}" = "false" ]; then
- echo "[dev-env] deploying cert-manager..."
-
- # Get OS & platform for downloading cmctl.
- os="$(uname -o | tr "[:upper:]" "[:lower:]" | sed "s/gnu\///")"
- platform="$(uname -m | sed "s/aarch64/arm64/;s/x86_64/amd64/")"
-
- # Download cmctl. Cannot validate checksum as OS & platform may vary.
- curl --fail --location "https://github.com/cert-manager/cmctl/releases/download/v2.1.1/cmctl_${os}_${platform}.tar.gz" | tar --extract --gzip cmctl
-
- # Install cert-manager.
- ./cmctl x install
- ./cmctl check api --wait 1m
+ curl -fsSL -o cmctl.tar.gz https://github.com/cert-manager/cert-manager/releases/download/v1.11.1/cmctl-linux-amd64.tar.gz
+ tar xzf cmctl.tar.gz
+ chmod +x cmctl
+ ./cmctl help
+ echo "[dev-env] apply cert-manager ..."
+ kubectl apply --wait -f https://github.com/cert-manager/cert-manager/releases/download/v1.11.0/cert-manager.yaml
+ kubectl wait --timeout=30s --for=condition=available deployment/cert-manager -n cert-manager
+ kubectl get validatingwebhookconfigurations cert-manager-webhook -ojson | jq '.webhooks[].clientConfig'
+ kubectl get endpoints -n cert-manager cert-manager-webhook
+ ./cmctl check api --wait=2m
fi
echo "[dev-env] running helm chart e2e tests..."
-docker run \
- --name ct \
- --volume "${KUBECONFIG}:/root/.kube/config:ro" \
- --volume "${DIR}/../../:/workdir" \
- --network host \
- --workdir /workdir \
- --entrypoint ct \
- --rm \
- registry.k8s.io/ingress-nginx/e2e-test-runner:v20250112-a188f4eb@sha256:043038b1e30e5a0b64f3f919f096c5c9488ac3f617ac094b07fb9db8215f9441 \
- install --charts charts/ingress-nginx
+docker run --rm --interactive --network host \
+ --name ct \
+ --volume $KUBECONFIG:/root/.kube/config \
+ --volume "${DIR}/../../":/workdir \
+ --workdir /workdir \
+ registry.k8s.io/ingress-nginx/e2e-test-runner:v20231208-4c39e6acc@sha256:0607184ca9c53c9c24a47b6f52347dd96137b05c6f276efa67051929a39e8f7a \
+ ct install \
+ --charts charts/ingress-nginx \
+ --helm-extra-args "--timeout 60s"
diff --git a/test/e2e/run-e2e-suite.sh b/test/e2e/run-e2e-suite.sh
index 909368e96..015895e56 100755
--- a/test/e2e/run-e2e-suite.sh
+++ b/test/e2e/run-e2e-suite.sh
@@ -78,7 +78,7 @@ kubectl run --rm \
--env="E2E_NODES=${E2E_NODES}" \
--env="FOCUS=${FOCUS}" \
--env="IS_CHROOT=${IS_CHROOT:-false}"\
- --env="SKIP_OPENTELEMETRY_TESTS=${SKIP_OPENTELEMETRY_TESTS:-false}"\
+ --env="ENABLE_VALIDATIONS=${ENABLE_VALIDATIONS:-false}"\
--env="E2E_CHECK_LEAKS=${E2E_CHECK_LEAKS}" \
--env="NGINX_BASE_IMAGE=${NGINX_BASE_IMAGE}" \
--env="HTTPBUN_IMAGE=${HTTPBUN_IMAGE}" \
diff --git a/test/e2e/run-kind-e2e.sh b/test/e2e/run-kind-e2e.sh
index e41d31afd..d213ac4b7 100755
--- a/test/e2e/run-kind-e2e.sh
+++ b/test/e2e/run-kind-e2e.sh
@@ -39,13 +39,14 @@ fi
KIND_LOG_LEVEL="1"
IS_CHROOT="${IS_CHROOT:-false}"
+ENABLE_VALIDATIONS="${ENABLE_VALIDATIONS:-false}"
export KIND_CLUSTER_NAME=${KIND_CLUSTER_NAME:-ingress-nginx-dev}
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
# Use 1.0.0-dev to make sure we use the latest configuration in the helm template
export TAG=1.0.0-dev
export ARCH=${ARCH:-amd64}
export REGISTRY=ingress-controller
-NGINX_BASE_IMAGE=${NGINX_BASE_IMAGE:-$(cat "$DIR"/../../NGINX_BASE)}
+NGINX_BASE_IMAGE=$(cat "$DIR"/../../NGINX_BASE)
export NGINX_BASE_IMAGE=$NGINX_BASE_IMAGE
export DOCKER_CLI_EXPERIMENTAL=enabled
export KUBECONFIG="${KUBECONFIG:-$HOME/.kube/kind-config-$KIND_CLUSTER_NAME}"
@@ -63,7 +64,7 @@ echo "Running e2e with nginx base image ${NGINX_BASE_IMAGE}"
if [ "${SKIP_CLUSTER_CREATION}" = "false" ]; then
echo "[dev-env] creating Kubernetes cluster with kind"
- export K8S_VERSION=${K8S_VERSION:-v1.32.0@sha256:c48c62eac5da28cdadcf560d1d8616cfa6783b58f0d94cf63ad1bf49600cb027}
+ export K8S_VERSION=${K8S_VERSION:-v1.26.3@sha256:61b92f38dff6ccc29969e7aa154d34e38b89443af1a2c14e6cfbd2df6419c66f}
# delete the cluster if it exists
if kind get clusters | grep "${KIND_CLUSTER_NAME}"; then
@@ -84,10 +85,10 @@ fi
if [ "${SKIP_INGRESS_IMAGE_CREATION}" = "false" ]; then
echo "[dev-env] building image"
if [ "${IS_CHROOT}" = "true" ]; then
- make BASE_IMAGE="${NGINX_BASE_IMAGE}" -C "${DIR}"/../../ clean-image build image-chroot
+ make -C "${DIR}"/../../ clean-image build image-chroot
docker tag ${REGISTRY}/controller-chroot:${TAG} ${REGISTRY}/controller:${TAG}
else
- make BASE_IMAGE="${NGINX_BASE_IMAGE}" -C "${DIR}"/../../ clean-image build image
+ make -C "${DIR}"/../../ clean-image build image
fi
echo "[dev-env] .. done building controller images"
@@ -95,7 +96,7 @@ fi
if [ "${SKIP_E2E_IMAGE_CREATION}" = "false" ]; then
if ! command -v ginkgo &> /dev/null; then
- go install github.com/onsi/ginkgo/v2/ginkgo@v2.22.2
+ go install github.com/onsi/ginkgo/v2/ginkgo@v2.13.1
fi
echo "[dev-env] .. done building controller images"
diff --git a/test/e2e/settings/badannotationvalues.go b/test/e2e/settings/badannotationvalues.go
index aa9906909..f61b5bada 100644
--- a/test/e2e/settings/badannotationvalues.go
+++ b/test/e2e/settings/badannotationvalues.go
@@ -34,8 +34,14 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is an invalid character in some annotation", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "invalid-value-test"
annotations := map[string]string{
@@ -44,6 +50,7 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "something_forbidden,otherthing_forbidden,{")
f.EnsureIngress(ing)
@@ -66,8 +73,14 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is a forbidden word in some annotation", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "forbidden-value-test"
@@ -80,6 +93,7 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
}
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ f.UpdateNginxConfigMapData("allow-snippet-annotations", "true")
f.UpdateNginxConfigMapData("annotation-value-word-blocklist", "something_forbidden,otherthing_forbidden,content_by_lua_block")
// Sleep a while just to guarantee that the configmap is applied
framework.Sleep()
@@ -103,9 +117,14 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should allow an ingress if there is a default blocklist config in place", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
-
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
hostValid := "custom-allowed-value-test"
annotationsValid := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `
@@ -136,8 +155,14 @@ var _ = framework.DescribeAnnotation("Bad annotation values", func() {
})
ginkgo.It("[BAD_ANNOTATIONS] should drop an ingress if there is a custom blocklist config in place and allow others to pass", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
host := "custom-forbidden-value-test"
annotations := map[string]string{
diff --git a/test/e2e/settings/geoip2.go b/test/e2e/settings/geoip2.go
index 9c6d59dc5..7da26d810 100644
--- a/test/e2e/settings/geoip2.go
+++ b/test/e2e/settings/geoip2.go
@@ -69,9 +69,15 @@ var _ = framework.DescribeSetting("Geoip2", func() {
ginkgo.It("should only allow requests from specific countries", func() {
ginkgo.Skip("GeoIP test are temporarily disabled")
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
- f.UpdateNginxConfigMapData("use-geoip2", "true")
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ "use-geoip2": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
httpSnippetAllowingOnlyAustralia := `map $geoip2_city_country_code $blocked_country {
default 1;
@@ -118,52 +124,4 @@ var _ = framework.DescribeSetting("Geoip2", func() {
Expect().
Status(http.StatusOK)
})
-
- ginkgo.It("should up and running nginx controller using autoreload flag", func() {
- edition := "GeoLite2-Country"
-
- err := f.UpdateIngressControllerDeployment(func(deployment *appsv1.Deployment) error {
- args := deployment.Spec.Template.Spec.Containers[0].Args
- args = append(args, "--maxmind-edition-ids="+edition)
- deployment.Spec.Template.Spec.Containers[0].Args = args
- _, err := f.KubeClientSet.AppsV1().Deployments(f.Namespace).Update(context.TODO(), deployment, metav1.UpdateOptions{})
- return err
- })
- assert.Nil(ginkgo.GinkgoT(), err, "updating ingress controller deployment flags")
-
- filename := fmt.Sprintf("/etc/ingress-controller/geoip/%s.mmdb", edition)
- exec, err := f.ExecIngressPod(fmt.Sprintf(`sh -c "mkdir -p '%s' && wget -O '%s' '%s' 2>&1"`, filepath.Dir(filename), filename, testdataURL))
- framework.Logf(exec)
- assert.Nil(ginkgo.GinkgoT(), err, fmt.Sprintln("error downloading test geoip2 db", filename))
-
- f.SetNginxConfigMapData(map[string]string{
- "use-geoip2": "true",
- "geoip2-autoreload-in-minutes": "5",
- })
-
- // Check Configmap Autoreload Patterns
- f.WaitForNginxConfiguration(
- func(cfg string) bool {
- return strings.Contains(cfg, fmt.Sprintf("geoip2 %s", filename)) &&
- strings.Contains(cfg, "auto_reload 5m;")
- },
- )
-
- // Check if Nginx could up, running and routing with auto_reload configs
- host := "ping.com"
- ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, nil)
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, host) &&
- strings.Contains(server, "location /")
- })
-
- f.HTTPTestClient().
- GET("/").
- WithHeader("Host", host).
- Expect().
- Status(http.StatusOK)
- })
})
diff --git a/test/e2e/settings/global_external_auth.go b/test/e2e/settings/global_external_auth.go
index f589a63e9..741e6f955 100644
--- a/test/e2e/settings/global_external_auth.go
+++ b/test/e2e/settings/global_external_auth.go
@@ -32,8 +32,8 @@ import (
)
const (
- disable = "false"
- noAuthLocationSetting = "no-auth-locations"
+ disable = "false"
+ noAuthLocaltionSetting = "no-auth-locations"
)
var _ = framework.DescribeSetting("[Security] global-auth-url", func() {
@@ -51,7 +51,7 @@ var _ = framework.DescribeSetting("[Security] global-auth-url", func() {
fooPath := "/foo"
barPath := "/bar"
- noAuthSetting := noAuthLocationSetting
+ noAuthSetting := noAuthLocaltionSetting
noAuthLocations := barPath
enableGlobalExternalAuthAnnotation := "nginx.ingress.kubernetes.io/enable-global-auth"
diff --git a/test/e2e/settings/globalratelimit.go b/test/e2e/settings/globalratelimit.go
new file mode 100644
index 000000000..e266350ad
--- /dev/null
+++ b/test/e2e/settings/globalratelimit.go
@@ -0,0 +1,96 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package settings
+
+import (
+ "fmt"
+ "net/http"
+ "strconv"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+var _ = framework.DescribeSetting("settings-global-rate-limit", func() {
+ f := framework.NewDefaultFramework("global-rate-limit")
+ host := "global-rate-limit"
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ })
+
+ ginkgo.It("generates correct NGINX configuration", func() {
+ annotations := make(map[string]string)
+ ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, annotations)
+ f.EnsureIngress(ing)
+
+ ginkgo.By("generating correct defaults")
+
+ ngxCfg := ""
+ f.WaitForNginxConfiguration(func(cfg string) bool {
+ if strings.Contains(cfg, "global_throttle") {
+ ngxCfg = cfg
+ return true
+ }
+ return false
+ })
+
+ assert.Contains(ginkgo.GinkgoT(), ngxCfg, fmt.Sprintf(`global_throttle = { `+
+ `memcached = { host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, `+
+ `pool_size = %d, }, status_code = %d, }`,
+ "", 11211, 50, 10000, 50, 429))
+
+ f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
+
+ ginkgo.By("applying customizations")
+
+ memcachedHost := "memc.default.svc.cluster.local"
+ memcachedPort := 11211
+ memcachedConnectTimeout := 100
+ memcachedMaxIdleTimeout := 5000
+ memcachedPoolSize := 100
+ statusCode := 503
+
+ f.SetNginxConfigMapData(map[string]string{
+ "global-rate-limit-memcached-host": memcachedHost,
+ "global-rate-limit-memcached-port": strconv.Itoa(memcachedPort),
+ "global-rate-limit-memcached-connect-timeout": strconv.Itoa(memcachedConnectTimeout),
+ "global-rate-limit-memcached-max-idle-timeout": strconv.Itoa(memcachedMaxIdleTimeout),
+ "global-rate-limit-memcached-pool-size": strconv.Itoa(memcachedPoolSize),
+ "global-rate-limit-status-code": strconv.Itoa(statusCode),
+ })
+
+ ngxCfg = ""
+ f.WaitForNginxConfiguration(func(cfg string) bool {
+ if strings.Contains(cfg, "global_throttle") {
+ ngxCfg = cfg
+ return true
+ }
+ return false
+ })
+
+ assert.Contains(ginkgo.GinkgoT(), ngxCfg, fmt.Sprintf(`global_throttle = { `+
+ `memcached = { host = "%v", port = %d, connect_timeout = %d, max_idle_timeout = %d, `+
+ `pool_size = %d, }, status_code = %d, }`,
+ memcachedHost, memcachedPort, memcachedConnectTimeout, memcachedMaxIdleTimeout,
+ memcachedPoolSize, statusCode))
+
+ f.HTTPTestClient().GET("/").WithHeader("Host", host).Expect().Status(http.StatusOK)
+ })
+})
diff --git a/test/e2e/settings/grpc.go b/test/e2e/settings/grpc.go
deleted file mode 100644
index ae3175034..000000000
--- a/test/e2e/settings/grpc.go
+++ /dev/null
@@ -1,110 +0,0 @@
-/*
-Copyright 2024 The Kubernetes Authors.
-
-Licensed under the Apache License, Version 2.0 (the "License");
-you may not use this file except in compliance with the License.
-You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law or agreed to in writing, software
-distributed under the License is distributed on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-See the License for the specific language governing permissions and
-limitations under the License.
-*/
-
-package settings
-
-import (
- "context"
- "crypto/tls"
- "fmt"
- "strings"
-
- pb "github.com/moul/pb/grpcbin/go-grpc"
- "github.com/onsi/ginkgo/v2"
- "github.com/stretchr/testify/assert"
- "google.golang.org/grpc"
- "google.golang.org/grpc/credentials"
- corev1 "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/util/intstr"
-
- "k8s.io/ingress-nginx/test/e2e/framework"
-)
-
-const echoHost = "echo"
-
-var _ = framework.DescribeSetting("GRPC", func() {
- f := framework.NewDefaultFramework("grpc-buffersize", framework.WithHTTPBunEnabled())
-
- ginkgo.It("should set the correct GRPC Buffer Size", func() {
- f.SetNginxConfigMapData(map[string]string{
- "grpc-buffer-size-kb": "8",
- })
-
- f.WaitForNginxConfiguration(
- func(cfg string) bool {
- return strings.Contains(cfg, "grpc_buffer_size 8k")
- })
-
- f.NewGRPCBinDeployment()
-
- host := echoHost
-
- svc := &corev1.Service{
- ObjectMeta: metav1.ObjectMeta{
- Name: "grpcbin-test",
- Namespace: f.Namespace,
- },
- Spec: corev1.ServiceSpec{
- ExternalName: fmt.Sprintf("grpcbin.%v.svc.cluster.local", f.Namespace),
- Type: corev1.ServiceTypeExternalName,
- Ports: []corev1.ServicePort{
- {
- Name: host,
- Port: 9000,
- TargetPort: intstr.FromInt(9000),
- Protocol: "TCP",
- },
- },
- },
- }
- f.EnsureService(svc)
-
- annotations := map[string]string{
- "nginx.ingress.kubernetes.io/backend-protocol": "GRPC",
- }
-
- ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, "grpcbin-test", 9000, annotations)
-
- f.EnsureIngress(ing)
-
- f.WaitForNginxServer(host,
- func(server string) bool {
- return strings.Contains(server, "grpc_pass grpc://upstream_balancer;")
- })
-
- conn, err := grpc.NewClient(f.GetNginxIP()+":443",
- grpc.WithTransportCredentials(
- credentials.NewTLS(&tls.Config{
- ServerName: echoHost,
- InsecureSkipVerify: true, //nolint:gosec // Ignore certificate validation in testing
- }),
- ),
- )
- assert.Nil(ginkgo.GinkgoT(), err, "error creating a connection")
- defer conn.Close()
-
- client := pb.NewGRPCBinClient(conn)
- ctx := context.Background()
-
- res, err := client.HeadersUnary(ctx, &pb.EmptyMessage{})
- assert.Nil(ginkgo.GinkgoT(), err)
-
- metadata := res.GetMetadata()
- assert.Equal(ginkgo.GinkgoT(), metadata["content-type"].Values[0], "application/grpc")
- assert.Equal(ginkgo.GinkgoT(), metadata[":authority"].Values[0], host)
- })
-})
diff --git a/test/e2e/settings/gzip.go b/test/e2e/settings/gzip.go
index c7e580e07..68e80d3a0 100644
--- a/test/e2e/settings/gzip.go
+++ b/test/e2e/settings/gzip.go
@@ -18,7 +18,6 @@ package settings
import (
"fmt"
- "net/http"
"strings"
"github.com/onsi/ginkgo/v2"
@@ -30,27 +29,11 @@ import (
var _ = framework.DescribeSetting("gzip", func() {
f := framework.NewDefaultFramework("gzip")
- host := "gzip"
-
- ginkgo.BeforeEach(func() {
- f.NewHttpbunDeployment()
- f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.Namespace, framework.HTTPBunService, 80, nil))
- })
-
ginkgo.It("should be disabled by default", func() {
f.WaitForNginxConfiguration(
func(cfg string) bool {
return !strings.Contains(cfg, "gzip on;")
- },
- )
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentEncoding()
+ })
})
ginkgo.It("should be enabled with default settings", func() {
@@ -67,16 +50,7 @@ var _ = framework.DescribeSetting("gzip", func() {
strings.Contains(cfg, fmt.Sprintf("gzip_types %s;", defaultCfg.GzipTypes)) &&
strings.Contains(cfg, "gzip_proxied any;") &&
strings.Contains(cfg, "gzip_vary on;")
- },
- )
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentEncoding("gzip")
+ })
})
ginkgo.It("should set gzip_comp_level to 4", func() {
@@ -87,16 +61,7 @@ var _ = framework.DescribeSetting("gzip", func() {
func(cfg string) bool {
return strings.Contains(cfg, "gzip on;") &&
strings.Contains(cfg, "gzip_comp_level 4;")
- },
- )
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentEncoding("gzip")
+ })
})
ginkgo.It("should set gzip_disable to msie6", func() {
@@ -107,87 +72,28 @@ var _ = framework.DescribeSetting("gzip", func() {
func(cfg string) bool {
return strings.Contains(cfg, "gzip on;") &&
strings.Contains(cfg, `gzip_disable "msie6";`)
- },
- )
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- WithHeader("User-Agent", "Mozilla/4.8 [en] (Windows NT 5.1; U)").
- Expect().
- Status(http.StatusOK).
- ContentEncoding("gzip")
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- WithHeader("User-Agent", "Mozilla/45.0 (compatible; MSIE 6.0; Windows NT 5.1)").
- Expect().
- Status(http.StatusOK).
- ContentEncoding()
+ })
})
ginkgo.It("should set gzip_min_length to 100", func() {
f.UpdateNginxConfigMapData("use-gzip", "true")
f.UpdateNginxConfigMapData("gzip-min-length", "100")
- f.UpdateNginxConfigMapData("gzip-types", "application/octet-stream")
f.WaitForNginxConfiguration(
func(cfg string) bool {
return strings.Contains(cfg, "gzip on;") &&
- strings.Contains(cfg, "gzip_min_length 100;") &&
- strings.Contains(cfg, "gzip_types application/octet-stream;")
- },
- )
-
- f.HTTPTestClient().
- GET("/bytes/99").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentType("application/octet-stream").
- ContentEncoding()
-
- f.HTTPTestClient().
- GET("/bytes/100").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentType("application/octet-stream").
- ContentEncoding("gzip")
+ strings.Contains(cfg, "gzip_min_length 100;")
+ })
})
- ginkgo.It("should set gzip_types to text/html", func() {
+ ginkgo.It("should set gzip_types to application/javascript", func() {
f.UpdateNginxConfigMapData("use-gzip", "true")
- f.UpdateNginxConfigMapData("gzip-types", "text/html")
+ f.UpdateNginxConfigMapData("gzip-types", "application/javascript")
f.WaitForNginxConfiguration(
func(cfg string) bool {
return strings.Contains(cfg, "gzip on;") &&
- strings.Contains(cfg, "gzip_types text/html;")
- },
- )
-
- f.HTTPTestClient().
- GET("/xml").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentType("application/xml").
- ContentEncoding()
-
- f.HTTPTestClient().
- GET("/html").
- WithHeader("Host", host).
- WithHeader("Accept-Encoding", "gzip").
- Expect().
- Status(http.StatusOK).
- ContentType("text/html").
- ContentEncoding("gzip")
+ strings.Contains(cfg, "gzip_types application/javascript;")
+ })
})
})
diff --git a/test/e2e/settings/no_tls_redirect_locations.go b/test/e2e/settings/no_tls_redirect_locations.go
index 18fd09e26..8339eb23e 100644
--- a/test/e2e/settings/no_tls_redirect_locations.go
+++ b/test/e2e/settings/no_tls_redirect_locations.go
@@ -33,7 +33,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.EnsureIngress(ing)
f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, "set $force_no_ssl_redirect \"false\"")
+ return !strings.Contains(server, "force_no_ssl_redirect = true,")
})
wlKey := "no-tls-redirect-locations"
@@ -42,7 +42,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.UpdateNginxConfigMapData(wlKey, wlValue)
f.WaitForNginxConfiguration(func(server string) bool {
- return strings.Contains(server, "set $force_no_ssl_redirect \"true\"")
+ return strings.Contains(server, "force_no_ssl_redirect = true,")
})
})
})
diff --git a/test/e2e/settings/ocsp/ocsp.go b/test/e2e/settings/ocsp/ocsp.go
index b2d50292a..f6f106b06 100644
--- a/test/e2e/settings/ocsp/ocsp.go
+++ b/test/e2e/settings/ocsp/ocsp.go
@@ -34,7 +34,6 @@ import (
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/ingress-nginx/test/e2e/framework"
@@ -48,15 +47,12 @@ var _ = framework.DescribeSetting("OCSP", func() {
})
ginkgo.It("should enable OCSP and contain stapling information in the connection", func() {
+ ginkgo.Skip("Skipped due to a bug with cfssl and Alpine")
host := "www.example.com"
f.UpdateNginxConfigMapData("enable-ocsp", "true")
err := prepareCertificates(f.Namespace)
- if err != nil {
- ginkgo.By(fmt.Sprintf("Prepare Certs error %v", err.Error()))
- }
-
assert.Nil(ginkgo.GinkgoT(), err)
ing := framework.NewSingleIngressWithTLS(host, "/", host, []string{host}, f.Namespace, framework.EchoService, 80, nil)
@@ -108,9 +104,8 @@ var _ = framework.DescribeSetting("OCSP", func() {
err = framework.WaitForEndpoints(f.KubeClientSet, framework.DefaultTimeout, "ocspserve", f.Namespace, 1)
assert.Nil(ginkgo.GinkgoT(), err, "waiting for endpoints to become ready")
- f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
- val, ok, err := unstructured.NestedBool(jsonCfg, "enable_ocsp")
- return err == nil && ok && val
+ f.WaitForNginxConfiguration(func(cfg string) bool {
+ return strings.Contains(cfg, "certificate.is_ocsp_stapling_enabled = true")
})
f.WaitForNginxServer(host,
@@ -297,7 +292,7 @@ func ocspserveDeployment(namespace string) (*appsv1.Deployment, *corev1.Service)
Containers: []corev1.Container{
{
Name: name,
- Image: "registry.k8s.io/ingress-nginx/cfssl:v1.1.1@sha256:bcd576c6d0a01d4710969195e804c02da62b71b5c35c6816df9b7584d5445437",
+ Image: "registry.k8s.io/ingress-nginx/e2e-test-cfssl@sha256:48869cf72b0ceb1d8c82029f85961e423daf3ff8a04f4a455150000f90a90606",
Command: []string{
"/bin/bash",
"-c",
diff --git a/test/e2e/settings/plugins.go b/test/e2e/settings/plugins.go
new file mode 100644
index 000000000..659acd42c
--- /dev/null
+++ b/test/e2e/settings/plugins.go
@@ -0,0 +1,55 @@
+/*
+Copyright 2020 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package settings
+
+import (
+ "fmt"
+ "net/http"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+var _ = framework.IngressNginxDescribe("plugins", func() {
+ f := framework.NewDefaultFramework("plugins")
+
+ ginkgo.BeforeEach(func() {
+ f.NewEchoDeployment()
+ })
+
+ ginkgo.It("should exist a x-hello-world header", func() {
+ f.UpdateNginxConfigMapData("plugins", "hello_world, invalid")
+
+ host := "example.com"
+ f.EnsureIngress(framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, nil))
+
+ f.WaitForNginxConfiguration(
+ func(server string) bool {
+ return strings.Contains(server, fmt.Sprintf("server_name %v", host)) &&
+ strings.Contains(server, `plugins.init({ "hello_world","invalid" })`)
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", host).
+ WithHeader("User-Agent", "hello").
+ Expect().
+ Status(http.StatusOK).
+ Body().Contains("x-hello-world=1")
+ })
+})
diff --git a/test/e2e/settings/pod_security_policy.go b/test/e2e/settings/pod_security_policy.go
new file mode 100644
index 000000000..b21fb870e
--- /dev/null
+++ b/test/e2e/settings/pod_security_policy.go
@@ -0,0 +1,142 @@
+/*
+Copyright 2018 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package settings
+
+import (
+ "context"
+ "net/http"
+ "strconv"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+ appsv1 "k8s.io/api/apps/v1"
+ corev1 "k8s.io/api/core/v1"
+ policyv1beta1 "k8s.io/api/policy/v1beta1"
+ rbacv1 "k8s.io/api/rbac/v1"
+ k8sErrors "k8s.io/apimachinery/pkg/api/errors"
+ metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+const (
+ ingressControllerPSP = "ingress-controller-psp"
+)
+
+var _ = framework.IngressNginxDescribe("[Security] Pod Security Policies", func() {
+ f := framework.NewDefaultFramework("pod-security-policies")
+
+ ginkgo.It("should be running with a Pod Security Policy", func() {
+ k8sversion, err := f.KubeClientSet.Discovery().ServerVersion()
+ if err != nil {
+ assert.Nil(ginkgo.GinkgoT(), err, "getting version")
+ }
+
+ numversion, err := strconv.Atoi(k8sversion.Minor)
+ if err != nil {
+ assert.Nil(ginkgo.GinkgoT(), err, "converting version")
+ }
+
+ if numversion > 24 {
+ ginkgo.Skip("PSP not supported in this version")
+ }
+
+ psp := createPodSecurityPolicy()
+ _, err = f.KubeClientSet.PolicyV1beta1().PodSecurityPolicies().Create(context.TODO(), psp, metav1.CreateOptions{})
+ if !k8sErrors.IsAlreadyExists(err) {
+ assert.Nil(ginkgo.GinkgoT(), err, "creating Pod Security Policy")
+ }
+
+ role, err := f.KubeClientSet.RbacV1().Roles(f.Namespace).Get(context.TODO(), "nginx-ingress", metav1.GetOptions{})
+ assert.Nil(ginkgo.GinkgoT(), err, "getting ingress controller cluster role")
+ assert.NotNil(ginkgo.GinkgoT(), role)
+
+ role.Rules = append(role.Rules, rbacv1.PolicyRule{
+ APIGroups: []string{"policy"},
+ Resources: []string{"podsecuritypolicies"},
+ ResourceNames: []string{ingressControllerPSP},
+ Verbs: []string{"use"},
+ })
+
+ _, err = f.KubeClientSet.RbacV1().Roles(f.Namespace).Update(context.TODO(), role, metav1.UpdateOptions{})
+ assert.Nil(ginkgo.GinkgoT(), err, "updating ingress controller cluster role to use a pod security policy")
+
+ // update the deployment just to trigger a rolling update and the use of the security policy
+ err = f.UpdateIngressControllerDeployment(func(deployment *appsv1.Deployment) error {
+ args := deployment.Spec.Template.Spec.Containers[0].Args
+ args = append(args, "--v=2")
+ deployment.Spec.Template.Spec.Containers[0].Args = args
+ _, err := f.KubeClientSet.AppsV1().Deployments(f.Namespace).Update(context.TODO(), deployment, metav1.UpdateOptions{})
+
+ return err
+ })
+ assert.Nil(ginkgo.GinkgoT(), err, "unexpected error updating ingress controller deployment flags")
+
+ f.WaitForNginxListening(80)
+
+ f.NewEchoDeployment()
+
+ f.WaitForNginxConfiguration(
+ func(cfg string) bool {
+ return strings.Contains(cfg, "server_tokens off")
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", "foo.bar.com").
+ Expect().
+ Status(http.StatusNotFound)
+ })
+})
+
+func createPodSecurityPolicy() *policyv1beta1.PodSecurityPolicy {
+ trueValue := true
+ return &policyv1beta1.PodSecurityPolicy{
+ ObjectMeta: metav1.ObjectMeta{
+ Name: ingressControllerPSP,
+ },
+ Spec: policyv1beta1.PodSecurityPolicySpec{
+ AllowPrivilegeEscalation: &trueValue,
+ RequiredDropCapabilities: []corev1.Capability{"All"},
+ RunAsUser: policyv1beta1.RunAsUserStrategyOptions{
+ Rule: "RunAsAny",
+ },
+ SELinux: policyv1beta1.SELinuxStrategyOptions{
+ Rule: "RunAsAny",
+ },
+ FSGroup: policyv1beta1.FSGroupStrategyOptions{
+ Ranges: []policyv1beta1.IDRange{
+ {
+ Min: 1,
+ Max: 65535,
+ },
+ },
+ Rule: "MustRunAs",
+ },
+ SupplementalGroups: policyv1beta1.SupplementalGroupsStrategyOptions{
+ Ranges: []policyv1beta1.IDRange{
+ {
+ Min: 1,
+ Max: 65535,
+ },
+ },
+ Rule: "MustRunAs",
+ },
+ },
+ }
+}
diff --git a/test/e2e/settings/pod_security_policy_volumes.go b/test/e2e/settings/pod_security_policy_volumes.go
new file mode 100644
index 000000000..f8fc58300
--- /dev/null
+++ b/test/e2e/settings/pod_security_policy_volumes.go
@@ -0,0 +1,127 @@
+/*
+Copyright 2018 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package settings
+
+import (
+ "context"
+ "net/http"
+ "strconv"
+ "strings"
+
+ "github.com/onsi/ginkgo/v2"
+ "github.com/stretchr/testify/assert"
+
+ appsv1 "k8s.io/api/apps/v1"
+ corev1 "k8s.io/api/core/v1"
+ rbacv1 "k8s.io/api/rbac/v1"
+ k8sErrors "k8s.io/apimachinery/pkg/api/errors"
+ metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+
+ "k8s.io/ingress-nginx/test/e2e/framework"
+)
+
+var _ = framework.IngressNginxDescribe("[Security] Pod Security Policies with volumes", func() {
+ f := framework.NewDefaultFramework("pod-security-policies-volumes")
+
+ ginkgo.It("should be running with a Pod Security Policy", func() {
+ k8sversion, err := f.KubeClientSet.Discovery().ServerVersion()
+ if err != nil {
+ assert.Nil(ginkgo.GinkgoT(), err, "getting version")
+ }
+
+ numversion, err := strconv.Atoi(k8sversion.Minor)
+ if err != nil {
+ assert.Nil(ginkgo.GinkgoT(), err, "converting version")
+ }
+
+ if numversion > 24 {
+ ginkgo.Skip("PSP not supported in this version")
+ }
+ psp := createPodSecurityPolicy()
+ _, err = f.KubeClientSet.PolicyV1beta1().PodSecurityPolicies().Create(context.TODO(), psp, metav1.CreateOptions{})
+ if !k8sErrors.IsAlreadyExists(err) {
+ assert.Nil(ginkgo.GinkgoT(), err, "creating Pod Security Policy")
+ }
+
+ role, err := f.KubeClientSet.RbacV1().Roles(f.Namespace).Get(context.TODO(), "nginx-ingress", metav1.GetOptions{})
+ assert.Nil(ginkgo.GinkgoT(), err, "getting ingress controller cluster role")
+ assert.NotNil(ginkgo.GinkgoT(), role)
+
+ role.Rules = append(role.Rules, rbacv1.PolicyRule{
+ APIGroups: []string{"policy"},
+ Resources: []string{"podsecuritypolicies"},
+ ResourceNames: []string{ingressControllerPSP},
+ Verbs: []string{"use"},
+ })
+
+ _, err = f.KubeClientSet.RbacV1().Roles(f.Namespace).Update(context.TODO(), role, metav1.UpdateOptions{})
+ assert.Nil(ginkgo.GinkgoT(), err, "updating ingress controller cluster role to use a pod security policy")
+
+ err = f.UpdateIngressControllerDeployment(func(deployment *appsv1.Deployment) error {
+ args := deployment.Spec.Template.Spec.Containers[0].Args
+ args = append(args, "--v=2")
+ deployment.Spec.Template.Spec.Containers[0].Args = args
+
+ deployment.Spec.Template.Spec.Volumes = []corev1.Volume{
+ {
+ Name: "ssl", VolumeSource: corev1.VolumeSource{
+ EmptyDir: &corev1.EmptyDirVolumeSource{},
+ },
+ },
+ {
+ Name: "tmp", VolumeSource: corev1.VolumeSource{
+ EmptyDir: &corev1.EmptyDirVolumeSource{},
+ },
+ },
+ }
+
+ fsGroup := int64(33)
+ deployment.Spec.Template.Spec.SecurityContext = &corev1.PodSecurityContext{
+ FSGroup: &fsGroup,
+ }
+
+ deployment.Spec.Template.Spec.Containers[0].VolumeMounts = []corev1.VolumeMount{
+ {
+ Name: "ssl", MountPath: "/etc/my-amazing-ssl",
+ },
+ {
+ Name: "tmp", MountPath: "/my-other-tmp",
+ },
+ }
+
+ _, err := f.KubeClientSet.AppsV1().Deployments(f.Namespace).Update(context.TODO(), deployment, metav1.UpdateOptions{})
+
+ return err
+ })
+ assert.Nil(ginkgo.GinkgoT(), err, "updating ingress controller deployment")
+
+ f.WaitForNginxListening(80)
+
+ f.NewEchoDeployment()
+
+ f.WaitForNginxConfiguration(
+ func(cfg string) bool {
+ return strings.Contains(cfg, "server_tokens off")
+ })
+
+ f.HTTPTestClient().
+ GET("/").
+ WithHeader("Host", "foo.bar.com").
+ Expect().
+ Status(http.StatusNotFound)
+ })
+})
diff --git a/test/e2e/settings/proxy_host.go b/test/e2e/settings/proxy_host.go
index bb5dc9c01..35aafc53d 100644
--- a/test/e2e/settings/proxy_host.go
+++ b/test/e2e/settings/proxy_host.go
@@ -34,9 +34,14 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
})
ginkgo.It("should exist a proxy_host", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
-
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
upstreamName := fmt.Sprintf("%v-%v-80", f.Namespace, framework.EchoService)
annotations := map[string]string{
"nginx.ingress.kubernetes.io/configuration-snippet": `more_set_headers "Custom-Header: $proxy_host"`,
@@ -58,8 +63,14 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
})
ginkgo.It("should exist a proxy_host using the upstream-vhost annotation value", func() {
- disableSnippet := f.AllowSnippetConfiguration()
- defer disableSnippet()
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "true",
+ })
+ defer func() {
+ f.SetNginxConfigMapData(map[string]string{
+ "allow-snippet-annotations": "false",
+ })
+ }()
upstreamName := fmt.Sprintf("%v-%v-80", f.Namespace, framework.EchoService)
upstreamVHost := "different.host"
diff --git a/test/e2e/settings/server_snippet.go b/test/e2e/settings/server_snippet.go
index 1e2084bd8..8ddf10fd9 100644
--- a/test/e2e/settings/server_snippet.go
+++ b/test/e2e/settings/server_snippet.go
@@ -38,7 +38,6 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "true",
- "annotations-risk-level": "Critical",
"server-snippet": `
more_set_headers "Globalfoo: Foooo";`,
})
@@ -46,7 +45,6 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
defer func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
- "annotations-risk-level": "High",
})
}()
annotations := map[string]string{
@@ -103,7 +101,6 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
- "annotations-risk-level": "Critical", // To allow Configuration Snippet
"server-snippet": `
more_set_headers "Globalfoo: Foooo";`,
})
@@ -111,7 +108,6 @@ var _ = framework.DescribeSetting("configmap server-snippet", func() {
defer func() {
f.SetNginxConfigMapData(map[string]string{
"allow-snippet-annotations": "false",
- "annotations-risk-level": "High",
})
}()
annotations := map[string]string{
diff --git a/test/e2e/settings/tls.go b/test/e2e/settings/tls.go
index 1ebf358c1..51f760df8 100644
--- a/test/e2e/settings/tls.go
+++ b/test/e2e/settings/tls.go
@@ -25,11 +25,10 @@ import (
"github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
- "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/ingress-nginx/test/e2e/framework"
)
-var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers", func() {
+var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", func() {
f := framework.NewDefaultFramework("settings-tls")
host := "settings-tls"
@@ -110,9 +109,8 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers", fu
ginkgo.It("setting max-age parameter", func() {
f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
- f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
- val, ok, err := unstructured.NestedString(jsonCfg, "hsts_max_age")
- return err == nil && ok && val == "86400"
+ f.WaitForNginxConfiguration(func(server string) bool {
+ return strings.Contains(server, `hsts_max_age = 86400,`)
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
@@ -130,9 +128,8 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers", fu
hstsIncludeSubdomains: "false",
})
- f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
- val, ok, err := unstructured.NestedBool(jsonCfg, "hsts_include_subdomains")
- return err == nil && ok && !val
+ f.WaitForNginxConfiguration(func(server string) bool {
+ return strings.Contains(server, `hsts_include_subdomains = false,`)
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
@@ -151,9 +148,8 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers", fu
hstsIncludeSubdomains: "false",
})
- f.WaitForLuaConfiguration(func(jsonCfg map[string]interface{}) bool {
- val, ok, err := unstructured.NestedBool(jsonCfg, "hsts_preload")
- return err == nil && ok && val
+ f.WaitForNginxConfiguration(func(server string) bool {
+ return strings.Contains(server, `hsts_preload = true,`)
})
f.HTTPTestClientWithTLSConfig(tlsConfig).
diff --git a/test/e2e/settings/validations/validations.go b/test/e2e/settings/validations/validations.go
index 881de39b4..ac95a453a 100644
--- a/test/e2e/settings/validations/validations.go
+++ b/test/e2e/settings/validations/validations.go
@@ -48,8 +48,8 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
framework.Sleep()
annotations := map[string]string{
- "nginx.ingress.kubernetes.io/default-backend": "bla", // low risk
- "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
+ "nginx.ingress.kubernetes.io/default-backend": "default/bla", // low risk
+ "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
}
ginkgo.By("allow ingress with low/medium risk annotations")
@@ -82,8 +82,8 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
framework.Sleep()
annotations := map[string]string{
- "nginx.ingress.kubernetes.io/default-backend": "bla", // low risk
- "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
+ "nginx.ingress.kubernetes.io/default-backend": "default/bla", // low risk
+ "nginx.ingress.kubernetes.io/denylist-source-range": "1.1.1.1/32", // medium risk
}
ginkgo.By("allow ingress with low/medium risk annotations")
diff --git a/test/e2e/tcpudp/tcp.go b/test/e2e/tcpudp/tcp.go
index 856184d18..f06d6c9a3 100644
--- a/test/e2e/tcpudp/tcp.go
+++ b/test/e2e/tcpudp/tcp.go
@@ -133,7 +133,7 @@ var _ = framework.IngressNginxDescribe("[TCP] tcp-services", func() {
// Execute the test. Use the `external name` service to resolve a domain name.
resolver := net.Resolver{
PreferGo: true,
- Dial: func(ctx context.Context, _, _ string) (net.Conn, error) {
+ Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
d := net.Dialer{}
return d.DialContext(ctx, "tcp", fmt.Sprintf("%v:5353", ip))
},
diff --git a/test/e2e/wait-for-nginx.sh b/test/e2e/wait-for-nginx.sh
index 73023aba1..0726bde10 100755
--- a/test/e2e/wait-for-nginx.sh
+++ b/test/e2e/wait-for-nginx.sh
@@ -24,6 +24,7 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
export NAMESPACE=$1
export NAMESPACE_OVERLAY=$2
export IS_CHROOT=$3
+export ENABLE_VALIDATIONS=$4
echo "deploying NGINX Ingress controller in namespace $NAMESPACE"
@@ -47,6 +48,16 @@ metadata:
EOF
+OTEL_MODULE=$(cat <