SHA256
1
0
forked from pool/traefik
traefik/traefik.spec
Richard Brown f05c6ddb4c Accepting request 666286 from home:pgeorgiadis
- Initial package release to version 1.7.7:
 * Check for watched namespace before getting kubernetes objects
 * Allow empty path with App-root annotation
 * kubernetes: sort and uniq TLS secrets
 * Skip TLS section with no secret in Kubernetes ingress

OBS-URL: https://build.opensuse.org/request/show/666286
OBS-URL: https://build.opensuse.org/package/show/devel:kubic/traefik?expand=0&rev=1
2019-01-15 15:37:50 +00:00

72 lines
2.1 KiB
RPMSpec

#
# spec file for package traefik
#
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
# Make sure that the binary is not getting stripped.
%{go_nostrip}
Name: traefik
Version: 1.7.7
Release: 0
Summary: The Cloud Native Edge Router
License: MIT
Group: Productivity/Networking/Web/Proxy
URL: https://traefik.io/
Source0: %{name}-v%{version}.tar.xz
BuildRequires: go-bindata
BuildRequires: fdupes
BuildRequires: golang(API) >= 1.10
BuildRequires: golang-packaging
Requires(pre): %fillup_prereq
%description
Traefik listens to your service registry/orchestrator API and instantly
generates the routes so your microservices are connected to the outside
world -- without further intervention from your part.
Traefik is a modern HTTP reverse proxy and load balancer that makes
deploying microservices easy. Traefik integrates with your existing
infrastructure components (Docker, Swarm mode, Kubernetes, Marathon,
Consul, Etcd, Rancher, Amazon ECS, ...) and configures itself
automatically and dynamically.
Pointing Traefik at your orchestrator should be the only configuration
step you need.
Documentation: http://docs.traefik.io/
%prep
%setup -q -c -n %{name}-v%{version}
%build
%{goprep} github.com/containous/traefik
# Start building ...
go generate
%{gobuild}
%install
%{goinstall}
%{gofilelist}
%fdupes %{buildroot}/%{_prefix}
%files -f file.lst
%{_bindir}/%{name}
%license LICENSE.md
%changelog