mirror of https://github.com/istio/istio.io.git
prepare for v1.18 as istio source is already branched (#13134)
This commit is contained in:
parent
67df7f37a4
commit
57ba4f6751
|
@ -77,7 +77,7 @@ baseurl := "$(URL)"
|
|||
endif
|
||||
|
||||
# Which branch of the Istio source code do we fetch stuff from
|
||||
export SOURCE_BRANCH_NAME ?= master
|
||||
export SOURCE_BRANCH_NAME ?= release-1.18
|
||||
|
||||
site:
|
||||
@scripts/gen_site.sh
|
||||
|
|
|
@ -39,7 +39,7 @@ sudo systemctl restart mysql
|
|||
}
|
||||
|
||||
snip_running_mysql_on_the_vm_3() {
|
||||
curl -LO https://raw.githubusercontent.com/istio/istio/master/samples/bookinfo/src/mysql/mysqldb-init.sql
|
||||
curl -LO https://raw.githubusercontent.com/istio/istio/release-1.18/samples/bookinfo/src/mysql/mysqldb-init.sql
|
||||
mysql -u root -ppassword < mysqldb-init.sql
|
||||
}
|
||||
|
||||
|
|
|
@ -632,12 +632,6 @@ These environment variables affect the behavior of the <code>install-cni</code>
|
|||
<td>Whether ambient controller is enabled</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -1302,12 +1296,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1548,12 +1536,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SKIP_CNI_BINARIES</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -8659,12 +8659,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -9325,12 +9319,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -9493,12 +9481,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -383,12 +383,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -995,12 +989,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1163,12 +1151,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -1100,12 +1100,6 @@ These environment variables affect the behavior of the <code>pilot-agent</code>
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>BOOTSTRAP_XDS_AGENT</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
|
@ -1938,12 +1932,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -2172,12 +2160,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -437,12 +437,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>Expected audience in the tokens. </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -1121,12 +1115,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1313,12 +1301,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -173,7 +173,7 @@ killall istioctl
|
|||
}
|
||||
|
||||
snip_cleanup_2() {
|
||||
kubectl delete -f https://raw.githubusercontent.com/istio/istio/master/samples/addons/jaeger.yaml
|
||||
kubectl delete -f https://raw.githubusercontent.com/istio/istio/release-1.18/samples/addons/jaeger.yaml
|
||||
}
|
||||
|
||||
snip_cleanup_3() {
|
||||
|
|
|
@ -324,7 +324,7 @@ spec:
|
|||
istio: ingressgateway
|
||||
jwtRules:
|
||||
- issuer: "testing@secure.istio.io"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
|
||||
EOF
|
||||
}
|
||||
|
||||
|
@ -345,7 +345,7 @@ curl --header "Authorization: Bearer deadbeef" "$INGRESS_HOST:$INGRESS_PORT/head
|
|||
ENDSNIP
|
||||
|
||||
snip_enduser_authentication_7() {
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s)
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s)
|
||||
curl --header "Authorization: Bearer $TOKEN" "$INGRESS_HOST:$INGRESS_PORT/headers" -s -o /dev/null -w "%{http_code}\n"
|
||||
}
|
||||
|
||||
|
@ -354,11 +354,11 @@ curl --header "Authorization: Bearer $TOKEN" "$INGRESS_HOST:$INGRESS_PORT/header
|
|||
ENDSNIP
|
||||
|
||||
snip_enduser_authentication_8() {
|
||||
wget --no-verbose https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/gen-jwt.py
|
||||
wget --no-verbose https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/gen-jwt.py
|
||||
}
|
||||
|
||||
snip_enduser_authentication_9() {
|
||||
wget --no-verbose https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/key.pem
|
||||
wget --no-verbose https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/key.pem
|
||||
}
|
||||
|
||||
snip_enduser_authentication_10() {
|
||||
|
|
|
@ -48,7 +48,7 @@ spec:
|
|||
app: httpbin
|
||||
jwtRules:
|
||||
- issuer: "testing@secure.istio.io"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
|
||||
outputClaimToHeaders:
|
||||
- header: "x-jwt-claim-foo"
|
||||
claim: "foo"
|
||||
|
@ -64,7 +64,7 @@ kubectl exec "$(kubectl get pod -l app=sleep -n foo -o jsonpath={.items..metadat
|
|||
ENDSNIP
|
||||
|
||||
snip_allow_requests_with_valid_jwt_and_listtyped_claims_3() {
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
|
||||
}
|
||||
|
||||
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_3_out <<\ENDSNIP
|
||||
|
|
|
@ -47,7 +47,7 @@ spec:
|
|||
istio: ingressgateway
|
||||
jwtRules:
|
||||
- issuer: "testing@secure.istio.io"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
|
||||
EOF
|
||||
}
|
||||
|
||||
|
@ -97,7 +97,7 @@ HTTP/1.1 401 Unauthorized
|
|||
ENDSNIP
|
||||
|
||||
snip_validating_ingress_routing_based_on_jwt_claims_3() {
|
||||
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
}
|
||||
|
||||
! read -r -d '' snip_validating_ingress_routing_based_on_jwt_claims_3_out <<\ENDSNIP
|
||||
|
@ -114,7 +114,7 @@ HTTP/1.1 200 OK
|
|||
ENDSNIP
|
||||
|
||||
snip_validating_ingress_routing_based_on_jwt_claims_5() {
|
||||
TOKEN_NO_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN_NO_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
TOKEN_NO_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN_NO_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
}
|
||||
|
||||
! read -r -d '' snip_validating_ingress_routing_based_on_jwt_claims_5_out <<\ENDSNIP
|
||||
|
|
|
@ -36,7 +36,7 @@ kubectl exec "$(kubectl get pod -l app=sleep -n foo -o jsonpath={.items..metadat
|
|||
ENDSNIP
|
||||
|
||||
snip_deploy_the_external_authorizer_1() {
|
||||
kubectl apply -n foo -f https://raw.githubusercontent.com/istio/istio/master/samples/extauthz/ext-authz.yaml
|
||||
kubectl apply -n foo -f https://raw.githubusercontent.com/istio/istio/release-1.18/samples/extauthz/ext-authz.yaml
|
||||
}
|
||||
|
||||
! read -r -d '' snip_deploy_the_external_authorizer_1_out <<\ENDSNIP
|
||||
|
|
|
@ -47,7 +47,7 @@ spec:
|
|||
app: httpbin
|
||||
jwtRules:
|
||||
- issuer: "testing@secure.istio.io"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
|
||||
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
|
||||
EOF
|
||||
}
|
||||
|
||||
|
@ -87,7 +87,7 @@ EOF
|
|||
}
|
||||
|
||||
snip_allow_requests_with_valid_jwt_and_listtyped_claims_5() {
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
|
||||
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
|
||||
}
|
||||
|
||||
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_5_out <<\ENDSNIP
|
||||
|
@ -133,7 +133,7 @@ EOF
|
|||
}
|
||||
|
||||
snip_allow_requests_with_valid_jwt_and_listtyped_claims_9() {
|
||||
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
|
||||
}
|
||||
|
||||
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_9_out <<\ENDSNIP
|
||||
|
|
|
@ -632,12 +632,6 @@ These environment variables affect the behavior of the <code>install-cni</code>
|
|||
<td>Whether ambient controller is enabled</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -1302,12 +1296,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1548,12 +1536,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SKIP_CNI_BINARIES</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -8659,12 +8659,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -9325,12 +9319,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -9493,12 +9481,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -383,12 +383,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -995,12 +989,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1163,12 +1151,6 @@ These environment variables affect the behavior of the <code>operator</code> com
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -1100,12 +1100,6 @@ These environment variables affect the behavior of the <code>pilot-agent</code>
|
|||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>BOOTSTRAP_XDS_AGENT</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
|
@ -1938,12 +1932,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -2172,12 +2160,6 @@ Only applies when traffic from all groups (i.e. "*") is being redirected
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -437,12 +437,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>Expected audience in the tokens. </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
@ -1121,12 +1115,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>false</code></td>
|
||||
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
|
||||
<td>Floating-Point</td>
|
||||
<td><code>25</code></td>
|
||||
|
@ -1313,12 +1301,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
|
|||
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
|
||||
<td>Boolean</td>
|
||||
<td><code>true</code></td>
|
||||
<td>If enabled, port will not be used in vhost domain matches.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
|
||||
<td>String</td>
|
||||
<td><code></code></td>
|
||||
|
|
|
@ -25,7 +25,7 @@ archive_date: YYYY-MM-DD
|
|||
archive_search_refinement: "V1.1"
|
||||
|
||||
# GitHub branch names used when the docs have links to GitHub
|
||||
source_branch_name: master
|
||||
source_branch_name: release-1.18
|
||||
doc_branch_name: master
|
||||
|
||||
####### Static values
|
||||
|
|
10
go.mod
10
go.mod
|
@ -11,8 +11,8 @@ replace github.com/imdario/mergo => github.com/imdario/mergo v0.3.5
|
|||
require (
|
||||
github.com/pmezard/go-difflib v1.0.0
|
||||
golang.org/x/sync v0.1.0
|
||||
istio.io/istio v0.0.0-20230423015454-71c4b42e532a
|
||||
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6
|
||||
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e
|
||||
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3
|
||||
k8s.io/apimachinery v0.27.0
|
||||
k8s.io/client-go v0.27.0
|
||||
)
|
||||
|
@ -49,7 +49,7 @@ require (
|
|||
github.com/docker/docker v23.0.3+incompatible // indirect
|
||||
github.com/docker/docker-credential-helpers v0.7.0 // indirect
|
||||
github.com/emicklei/go-restful/v3 v3.10.1 // indirect
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c // indirect
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac // indirect
|
||||
github.com/envoyproxy/protoc-gen-validate v0.9.1 // indirect
|
||||
github.com/evanphx/json-patch v5.6.0+incompatible // indirect
|
||||
github.com/evanphx/json-patch/v5 v5.6.0 // indirect
|
||||
|
@ -199,8 +199,8 @@ require (
|
|||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
gopkg.in/yaml.v3 v3.0.1 // indirect
|
||||
helm.sh/helm/v3 v3.11.2 // indirect
|
||||
istio.io/api v0.0.0-20230414193140-04eb39977e2a // indirect
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135 // indirect
|
||||
istio.io/api v0.0.0-20230426171729-6ffd9df402e9 // indirect
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1 // indirect
|
||||
k8s.io/api v0.27.0 // indirect
|
||||
k8s.io/apiextensions-apiserver v0.27.0 // indirect
|
||||
k8s.io/apiserver v0.27.0 // indirect
|
||||
|
|
20
go.sum
20
go.sum
|
@ -196,8 +196,8 @@ github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5y
|
|||
github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
|
||||
github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.mod h1:hliV/p42l8fGbc6Y9bQ70uLwIvmJyVE5k4iMKlh8wCQ=
|
||||
github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c h1:aJBi1cy+24oYLrP3o+vXs1haoEWmYyxCkN5GCyzajZE=
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c/go.mod h1:84cjSkVxFD9Pi/gvI5AOq5NPhGsmS8oPsJLtCON6eK8=
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac h1:AA3Tqmx+0UnwpyxPBVJVzyAtrUMbk8pDmYC/WThleb4=
|
||||
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac/go.mod h1:84cjSkVxFD9Pi/gvI5AOq5NPhGsmS8oPsJLtCON6eK8=
|
||||
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
|
||||
github.com/envoyproxy/protoc-gen-validate v0.9.1 h1:PS7VIOgmSVhWUEeZwTe7z7zouA22Cr590PzXKbZHOVY=
|
||||
github.com/envoyproxy/protoc-gen-validate v0.9.1/go.mod h1:OKNgG7TCp5pF4d6XftA0++PMirau2/yoOwVac3AbF2w=
|
||||
|
@ -1291,14 +1291,14 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
|
|||
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
|
||||
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||
istio.io/api v0.0.0-20230414193140-04eb39977e2a h1:A+FBNGJpU/CYENpjXVza4fAtQctbnVVmmoKTefpwP1g=
|
||||
istio.io/api v0.0.0-20230414193140-04eb39977e2a/go.mod h1:dDMe1TsOtrRoUlBzdxqNolWXpXPQjLfbcXvqPMtQ6eo=
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135 h1:CYoyEj49rPgmtcEHEkfdXLDxlUgMU5uXH8dQWpA1V6w=
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135/go.mod h1:Or2ObkQ2iuksZcgUS2acFugRTkpXU1N4Pusw4qZkf/4=
|
||||
istio.io/istio v0.0.0-20230423015454-71c4b42e532a h1:yIl5eyPIJtn90HnK7NhOiFhd0r3yoj8GbeHDA2laZoc=
|
||||
istio.io/istio v0.0.0-20230423015454-71c4b42e532a/go.mod h1:gP1/fp/MqGEOKdMKpKdIYSDRmzPyRzL1ddy22SuiVfY=
|
||||
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6 h1:OIiV+EmNj+gLCr2BKkGTBJ/lsBZb3W1P4W/S5xZSn1U=
|
||||
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6/go.mod h1:ZcwaaLCBsaAszynqi6s8Bs6VL3yeTtuXDon9QuzSD5E=
|
||||
istio.io/api v0.0.0-20230426171729-6ffd9df402e9 h1:ntKi4JM7uogCCEfVkP/JbWNWv88PkSMP1txZTbtVdlA=
|
||||
istio.io/api v0.0.0-20230426171729-6ffd9df402e9/go.mod h1:dDMe1TsOtrRoUlBzdxqNolWXpXPQjLfbcXvqPMtQ6eo=
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1 h1:7CG3Gfn5Kh+uINYLGyKu8cstpGPVg6h/2vv7fPQg4tA=
|
||||
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1/go.mod h1:HwUGi4qgwnaUwAjfujDVfQ2wLO9yyQxayFD8kc9xmnY=
|
||||
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e h1:CJ5rTCtEYgXI2Vt1XcBhKcf570S9KtsJiOlfco15Ot8=
|
||||
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e/go.mod h1:zpFKyZDEeeiArK7Fkxd7fZbjd4BbvR1BGu+akD7ZwKs=
|
||||
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3 h1:MkIZAAezmy4F7Q6HQHVwssYBDONzn/W9OWXinPpKUlg=
|
||||
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3/go.mod h1:ZcwaaLCBsaAszynqi6s8Bs6VL3yeTtuXDon9QuzSD5E=
|
||||
k8s.io/api v0.18.2/go.mod h1:SJCWI7OLzhZSvbY7U8zwNl9UA4o1fizoug34OV/2r78=
|
||||
k8s.io/api v0.18.3/go.mod h1:UOaMwERbqJMfeeeHc8XJKawj4P9TgDRnViIqqBeH2QA=
|
||||
k8s.io/api v0.18.4/go.mod h1:lOIQAKYgai1+vz9J7YcDZwC26Z0zQewYOGWdyIPUUQ4=
|
||||
|
|
Loading…
Reference in New Issue