Skip to content

Commit 94da608

Browse files
authored
Merge pull request #155 from nginxinc/remove-http2-annotation
Remove http2 annotation
2 parents 168c0b0 + bf2950a commit 94da608

File tree

2 files changed

+1
-8
lines changed

2 files changed

+1
-8
lines changed

examples/customization/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The table below summarizes some of the options. More options (extensions) are av
1717
| `nginx.org/proxy-pass-headers` | `proxy-pass-headers` | Sets the value of one or more [proxy_pass_header](http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_pass_header) directives. Example: `"nginx.org/proxy-pass-headers": "header-a,header-b"` | N/A |
1818
| N/A | `server-names-hash-bucket-size` | Sets the value of the [server_names_hash_bucket_size](http://nginx.org/en/docs/http/ngx_http_core_module.html#server_names_hash_bucket_size) directive. | Depends on the size of the processor’s cache line. |
1919
| N/A | `server-names-hash-max-size` | Sets the value of the [server_names_hash_max_size](http://nginx.org/en/docs/http/ngx_http_core_module.html#server_names_hash_max_size) directive. | `512` |
20-
| `nginx.org/http2` | `http2` | Enables HTTP/2 in servers with SSL enabled. | `False` |
20+
| N/A | `http2` | Enables HTTP/2 in servers with SSL enabled. | `False` |
2121
| `nginx.org/redirect-to-https` | `redirect-to-https` | Sets the 301 redirect rule based on the value of the `http_x_forwarded_proto` header on the server block to force incoming traffic to be over HTTPS. Useful when terminating SSL in a load balancer in front of the Ingress controller — see [115](https://github.com/nginxinc/kubernetes-ingress/issues/115) | `False` |
2222
| N/A | `log-format` | Sets the custom [log format](http://nginx.org/en/docs/http/ngx_http_log_module.html#log_format). | See the [template file](../../nginx-controller/nginx/nginx.conf.tmpl). |
2323
| `nginx.org/hsts` | `hsts` | Enables [HTTP Strict Transport Security (HSTS)](https://www.nginx.com/blog/http-strict-transport-security-hsts-and-nginx/): the HSTS header is added to the responses from backends. The `preload` directive is included in the header. | `False` |

nginx-controller/nginx/configurator.go

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -269,13 +269,6 @@ func (cnf *Configurator) createConfig(ingEx *IngressEx) Config {
269269
if clientMaxBodySize, exists := ingEx.Ingress.Annotations["nginx.org/client-max-body-size"]; exists {
270270
ingCfg.ClientMaxBodySize = clientMaxBodySize
271271
}
272-
if HTTP2, exists, err := GetMapKeyAsBool(ingEx.Ingress.Annotations, "nginx.org/http2", ingEx.Ingress); exists {
273-
if err != nil {
274-
glog.Error(err)
275-
} else {
276-
ingCfg.HTTP2 = HTTP2
277-
}
278-
}
279272
if redirectToHTTPS, exists, err := GetMapKeyAsBool(ingEx.Ingress.Annotations, "nginx.org/redirect-to-https", ingEx.Ingress); exists {
280273
if err != nil {
281274
glog.Error(err)

0 commit comments

Comments
 (0)