You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[#1399](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1399) Support to configure rewrite rule set via CRDs
10
+
*[#1370](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1370) Support for selecting SSL Profile using annotation on the HTTPS listener
11
+
*[#1377](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1377) Ability to modify container securityContext and additional volumes in Helm
12
+
13
+
## Fixes
14
+
*[#1433](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1433) Drop duplicate hostnames when setting listener hostnames
15
+
*[#1432](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1432) Fixes ingress class matching logic
16
+
*[#1401](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1401) Fix root cause for issue related to HTTPS being removed when AGIC pod is restarted
17
+
*[#1435](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1435) Limit AAD token retries to 10 retries (with 10 second interval) and exit Pod to inform customer of misconfiguration
18
+
*[#1441](https://github.com/Azure/application-gateway-kubernetes-ingress/pull/1441) Assume backend protocol as HTTPS when container port is 443 (already assumed for service port 443)
# --reuse-values when upgrading, reuse the last release's values and merge in any overrides from the command line via --set and -f. If '--reset-values' is specified, this is ignored
> Note: This annotation is supported since 1.6.0-rc1.
358
358
359
359
Users can configure [a ssl profile on the Application Gateway per listener](https://docs.microsoft.com/en-us/azure/application-gateway/application-gateway-configure-listener-specific-ssl-policy).
360
360
When the annotation is present with a profile name and the profile is pre-installed in the Application Gateway, Kubernetes Ingress controller will create a routing rule with a HTTPS listener and apply the changes to your App Gateway.
@@ -880,7 +880,7 @@ spec:
880
880
881
881
## Rewrite Rule Set Custom Resource
882
882
883
-
> Note: This annotation is not yet released.
883
+
> Note: This annotation is supported since 1.6.0-rc1.
884
884
885
885
This annotation allows to assign a header/URL rewrite rule set created via the AzureApplicationGatewayRewrite CR to be associated to all rules in an ingress resource. AzureApplicationGatewayRewrite CR should be present in the same namespace as the ingress.
Copy file name to clipboardExpand all lines: docs/features/rewrite-rule-set-custom-resource.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
## Rewrite Rule Set Custom Resource (not released yet)
1
+
## Rewrite Rule Set Custom Resource (supported since 1.6.0-rc1)
2
2
3
-
> Note: This feature is not released yet. Please use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](../annotations.md#rewrite-rule-set) which allows using an existing rewrite rule set on Application Gateway.
3
+
> Note: This feature is supported since 1.6.0-rc1. Please use [`appgw.ingress.kubernetes.io/rewrite-rule-set`](../annotations.md#rewrite-rule-set) which allows using an existing rewrite rule set on Application Gateway.
4
4
5
5
Application Gateway allows you to rewrite selected content of requests and responses. With this feature, you can translate URLs, query string parameters as well as modify request and response headers. It also allows you to add conditions to ensure that the URL or the specified headers are rewritten only when certain conditions are met. These conditions are based on the request and response information. Rewrite Rule Set Custom Resource brings this feature to AGIC.
0 commit comments