@@ -471,7 +471,7 @@ backend be_tcp:{{$cfgIdx}}
471
471
[sub]domain regexps. This map is used to check if
472
472
a host matches a [sub]domain with has wildcard support.
473
473
*/}}
474
- {{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
474
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_wildcard_domain.map" -}}
475
475
{{ if isTrue (env "ROUTER_ALLOW_WILDCARD_ROUTES") -}}
476
476
{{ range $idx, $cfg := .State -}}
477
477
{{ if ne $cfg.Host "" -}}
@@ -480,9 +480,14 @@ backend be_tcp:{{$cfgIdx}}
480
480
{{ end -}}
481
481
{{ end -}}
482
482
{{ end -}}
483
- {{ end -}}{{/* end if router allows wildcard routes */}}
484
- {{ end -}}{{/* end wildcard domain map template */}}
483
+ {{ end -}}{{/* end if router allows wildcard routes */ - }}
484
+ {{ end -}}{{/* end temporary wildcard domain map template */}}
485
485
486
+ {{ define "/var/lib/haproxy/conf/os_wildcard_domain.map" -}}
487
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_wildcard_domain.map" true -}}
488
+ {{ $data }}
489
+ {{ end -}}
490
+ {{ end -}}{{/* end wildcard domain map template */}}
486
491
487
492
488
493
{{/*
@@ -491,7 +496,7 @@ backend be_tcp:{{$cfgIdx}}
491
496
be_edge_http for edge routes with InsecureEdgeTerminationPolicy Allow
492
497
be_secure for reencrypt routes with InsecureEdgeTerminationPolicy Allow
493
498
*/}}
494
- {{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
499
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_http_be.map" -}}
495
500
{{ range $idx, $cfg := .State -}}
496
501
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "") -}}
497
502
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_http:{{$idx}}
@@ -506,12 +511,19 @@ backend be_tcp:{{$cfgIdx}}
506
511
{{ end -}}
507
512
{{ end -}}
508
513
514
+ {{ define "/var/lib/haproxy/conf/os_http_be.map" -}}
515
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_http_be.map" true -}}
516
+ {{ $data }}
517
+ {{ end -}}
518
+ {{ end -}}{{/* end http host map template */}}
519
+
520
+
509
521
{{/*
510
522
os_edge_reencrypt_be.map : contains a mapping of www.example.com -> <service name>. This map is similar to os_http_be.map but for tls routes.
511
523
by attaching prefix: be_edge_http for edge terminated routes
512
524
be_secure for reencrypt routes
513
525
*/}}
514
- {{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
526
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_edge_reencrypt_be.map" -}}
515
527
{{ range $idx, $cfg := .State -}}
516
528
{{ if and (ne $cfg.Host "") (eq $cfg.TLSTermination "edge") -}}
517
529
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_edge_http:{{$idx}}
@@ -520,6 +532,12 @@ backend be_tcp:{{$cfgIdx}}
520
532
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} be_secure:{{$idx}}
521
533
{{ end -}}
522
534
{{ end -}}
535
+ {{ end -}}{{/* end temporary edge http host map template */}}
536
+
537
+ {{ define "/var/lib/haproxy/conf/os_edge_reencrypt_be.map" -}}
538
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_edge_reencrypt_be.map" true -}}
539
+ {{ $data }}
540
+ {{ end -}}
523
541
{{ end -}}{{/* end edge http host map template */}}
524
542
525
543
@@ -528,37 +546,56 @@ backend be_tcp:{{$cfgIdx}}
528
546
Map is used to redirect insecure traffic to use a secure scheme (https)
529
547
if acls match for routes that have the insecure option set to redirect.
530
548
*/}}
531
- {{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
549
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_route_http_redirect.map" -}}
532
550
{{ range $idx, $cfg := .State -}}
533
551
{{ if and (ne $cfg.Host "") (eq $cfg.InsecureEdgeTerminationPolicy "Redirect") -}}
534
552
{{generateRouteRegexp $cfg.Host $cfg.Path $cfg.IsWildcard}} {{$idx}}
535
553
{{ end -}}
536
554
{{ end -}}
555
+ {{ end -}}{{/* end temporary redirect http host map template */}}
556
+
557
+ {{ define "/var/lib/haproxy/conf/os_route_http_redirect.map" -}}
558
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_route_http_redirect.map" true -}}
559
+ {{ $data }}
560
+ {{ end -}}
537
561
{{ end -}}{{/* end redirect http host map template */}}
538
562
539
563
540
564
{{/*
541
565
os_tcp_be.map: contains a mapping of www.example.com -> <service name>. This map is used to discover the correct backend
542
566
by attaching a prefix (be_tcp: or be_secure:) by use_backend statements if acls are matched.
543
567
*/}}
544
- {{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
568
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_tcp_be.map" -}}
545
569
{{ range $idx, $cfg := .State -}}
546
570
{{ if and (eq $cfg.Path "") (and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "passthrough" "reencrypt")) -}}
547
571
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} {{$idx}}
548
572
{{ end -}}
549
573
{{ end -}}
574
+ {{ end -}}{{/* end temporary tcp host map template */}}
575
+
576
+ {{ define "/var/lib/haproxy/conf/os_tcp_be.map" -}}
577
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_tcp_be.map" true -}}
578
+ {{ $data }}
579
+ {{ end -}}
550
580
{{ end -}}{{/* end tcp host map template */}}
551
581
582
+
552
583
{{/*
553
584
os_sni_passthrough.map: contains a mapping of routes that expect to have an sni header and should be passed
554
585
through to the host_be. Driven by the termination type of the ServiceAliasConfigs
555
586
*/}}
556
- {{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
587
+ {{ define "/var/lib/haproxy/conf/.tmp/ os_sni_passthrough.map" -}}
557
588
{{ range $idx, $cfg := .State -}}
558
589
{{ if and (eq $cfg.Path "") (eq $cfg.TLSTermination "passthrough") -}}
559
590
{{generateRouteRegexp $cfg.Host "" $cfg.IsWildcard}} 1
560
591
{{ end -}}
561
592
{{ end -}}
593
+ {{ end -}}{{/* end temporary sni passthrough map template */}}
594
+
595
+ {{ define "/var/lib/haproxy/conf/os_sni_passthrough.map" -}}
596
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/os_sni_passthrough.map" true -}}
597
+ {{ $data }}
598
+ {{ end -}}
562
599
{{ end -}}{{/* end sni passthrough map template */}}
563
600
564
601
{{/*
@@ -569,7 +606,7 @@ backend be_tcp:{{$cfgIdx}}
569
606
"<cert>: <domain-set>" is important as this allows us to use
570
607
wildcards and/or use a deny set with !<domain> in the future.
571
608
*/}}
572
- {{ define "/var/lib/haproxy/conf/cert_config.map" -}}
609
+ {{ define "/var/lib/haproxy/conf/.tmp/ cert_config.map" -}}
573
610
{{ $workingDir := .WorkingDir -}}
574
611
{{ range $idx, $cfg := .State -}}
575
612
{{ if and (ne $cfg.Host "") (matchValues (print $cfg.TLSTermination) "edge" "reencrypt") -}}
@@ -579,4 +616,10 @@ backend be_tcp:{{$cfgIdx}}
579
616
{{ end -}}
580
617
{{ end -}}
581
618
{{ end -}}
582
- {{ end }}{{/* end cert_config map template */}}
619
+ {{ end }}{{/* end temporary cert_config map template */}}
620
+
621
+ {{ define "/var/lib/haproxy/conf/cert_config.map" -}}
622
+ {{ range $idx, $data := sortedMapData "/var/lib/haproxy/conf/.tmp/cert_config.map" false -}}
623
+ {{ $data }}
624
+ {{ end -}}
625
+ {{ end -}}{{/* end cert_config map template */}}
0 commit comments