prepare for v1.18 as istio source is already branched (#13134)

This commit is contained in:
Eric Van Norman 2023-04-27 14:07:29 -05:00 committed by GitHub
parent 67df7f37a4
commit 57ba4f6751
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
21 changed files with 32 additions and 212 deletions

View File

@ -77,7 +77,7 @@ baseurl := "$(URL)"
endif
# Which branch of the Istio source code do we fetch stuff from
export SOURCE_BRANCH_NAME ?= master
export SOURCE_BRANCH_NAME ?= release-1.18
site:
@scripts/gen_site.sh

View File

@ -39,7 +39,7 @@ sudo systemctl restart mysql
}
snip_running_mysql_on_the_vm_3() {
curl -LO https://raw.githubusercontent.com/istio/istio/master/samples/bookinfo/src/mysql/mysqldb-init.sql
curl -LO https://raw.githubusercontent.com/istio/istio/release-1.18/samples/bookinfo/src/mysql/mysqldb-init.sql
mysql -u root -ppassword < mysqldb-init.sql
}

View File

@ -632,12 +632,6 @@ These environment variables affect the behavior of the <code>install-cni</code>
<td>Whether ambient controller is enabled</td>
</tr>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -1302,12 +1296,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1548,12 +1536,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SKIP_CNI_BINARIES</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -8659,12 +8659,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -9325,12 +9319,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -9493,12 +9481,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -383,12 +383,6 @@ These environment variables affect the behavior of the <code>operator</code> com
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -995,12 +989,6 @@ These environment variables affect the behavior of the <code>operator</code> com
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1163,12 +1151,6 @@ These environment variables affect the behavior of the <code>operator</code> com
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -1100,12 +1100,6 @@ These environment variables affect the behavior of the <code>pilot-agent</code>
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>BOOTSTRAP_XDS_AGENT</code></td>
<td>Boolean</td>
<td><code>false</code></td>
@ -1938,12 +1932,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -2172,12 +2160,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -437,12 +437,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>Expected audience in the tokens. </td>
</tr>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -1121,12 +1115,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1313,12 +1301,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -173,7 +173,7 @@ killall istioctl
}
snip_cleanup_2() {
kubectl delete -f https://raw.githubusercontent.com/istio/istio/master/samples/addons/jaeger.yaml
kubectl delete -f https://raw.githubusercontent.com/istio/istio/release-1.18/samples/addons/jaeger.yaml
}
snip_cleanup_3() {

View File

@ -324,7 +324,7 @@ spec:
istio: ingressgateway
jwtRules:
- issuer: "testing@secure.istio.io"
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
EOF
}
@ -345,7 +345,7 @@ curl --header "Authorization: Bearer deadbeef" "$INGRESS_HOST:$INGRESS_PORT/head
ENDSNIP
snip_enduser_authentication_7() {
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s)
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s)
curl --header "Authorization: Bearer $TOKEN" "$INGRESS_HOST:$INGRESS_PORT/headers" -s -o /dev/null -w "%{http_code}\n"
}
@ -354,11 +354,11 @@ curl --header "Authorization: Bearer $TOKEN" "$INGRESS_HOST:$INGRESS_PORT/header
ENDSNIP
snip_enduser_authentication_8() {
wget --no-verbose https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/gen-jwt.py
wget --no-verbose https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/gen-jwt.py
}
snip_enduser_authentication_9() {
wget --no-verbose https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/key.pem
wget --no-verbose https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/key.pem
}
snip_enduser_authentication_10() {

View File

@ -48,7 +48,7 @@ spec:
app: httpbin
jwtRules:
- issuer: "testing@secure.istio.io"
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
outputClaimToHeaders:
- header: "x-jwt-claim-foo"
claim: "foo"
@ -64,7 +64,7 @@ kubectl exec "$(kubectl get pod -l app=sleep -n foo -o jsonpath={.items..metadat
ENDSNIP
snip_allow_requests_with_valid_jwt_and_listtyped_claims_3() {
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
}
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_3_out <<\ENDSNIP

View File

@ -47,7 +47,7 @@ spec:
istio: ingressgateway
jwtRules:
- issuer: "testing@secure.istio.io"
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
EOF
}
@ -97,7 +97,7 @@ HTTP/1.1 401 Unauthorized
ENDSNIP
snip_validating_ingress_routing_based_on_jwt_claims_3() {
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
}
! read -r -d '' snip_validating_ingress_routing_based_on_jwt_claims_3_out <<\ENDSNIP
@ -114,7 +114,7 @@ HTTP/1.1 200 OK
ENDSNIP
snip_validating_ingress_routing_based_on_jwt_claims_5() {
TOKEN_NO_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN_NO_GROUP" | cut -d '.' -f2 - | base64 --decode -
TOKEN_NO_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN_NO_GROUP" | cut -d '.' -f2 - | base64 --decode -
}
! read -r -d '' snip_validating_ingress_routing_based_on_jwt_claims_5_out <<\ENDSNIP

View File

@ -36,7 +36,7 @@ kubectl exec "$(kubectl get pod -l app=sleep -n foo -o jsonpath={.items..metadat
ENDSNIP
snip_deploy_the_external_authorizer_1() {
kubectl apply -n foo -f https://raw.githubusercontent.com/istio/istio/master/samples/extauthz/ext-authz.yaml
kubectl apply -n foo -f https://raw.githubusercontent.com/istio/istio/release-1.18/samples/extauthz/ext-authz.yaml
}
! read -r -d '' snip_deploy_the_external_authorizer_1_out <<\ENDSNIP

View File

@ -47,7 +47,7 @@ spec:
app: httpbin
jwtRules:
- issuer: "testing@secure.istio.io"
jwksUri: "https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/jwks.json"
jwksUri: "https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/jwks.json"
EOF
}
@ -87,7 +87,7 @@ EOF
}
snip_allow_requests_with_valid_jwt_and_listtyped_claims_5() {
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
TOKEN=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/demo.jwt -s) && echo "$TOKEN" | cut -d '.' -f2 - | base64 --decode -
}
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_5_out <<\ENDSNIP
@ -133,7 +133,7 @@ EOF
}
snip_allow_requests_with_valid_jwt_and_listtyped_claims_9() {
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/master/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
TOKEN_GROUP=$(curl https://raw.githubusercontent.com/istio/istio/release-1.18/security/tools/jwt/samples/groups-scope.jwt -s) && echo "$TOKEN_GROUP" | cut -d '.' -f2 - | base64 --decode -
}
! read -r -d '' snip_allow_requests_with_valid_jwt_and_listtyped_claims_9_out <<\ENDSNIP

View File

@ -632,12 +632,6 @@ These environment variables affect the behavior of the <code>install-cni</code>
<td>Whether ambient controller is enabled</td>
</tr>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -1302,12 +1296,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1548,12 +1536,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SKIP_CNI_BINARIES</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -8659,12 +8659,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -9325,12 +9319,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -9493,12 +9481,6 @@ These environment variables affect the behavior of the <code>istioctl</code> com
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -383,12 +383,6 @@ These environment variables affect the behavior of the <code>operator</code> com
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -995,12 +989,6 @@ These environment variables affect the behavior of the <code>operator</code> com
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1163,12 +1151,6 @@ These environment variables affect the behavior of the <code>operator</code> com
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -1100,12 +1100,6 @@ These environment variables affect the behavior of the <code>pilot-agent</code>
</thead>
<tbody>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>BOOTSTRAP_XDS_AGENT</code></td>
<td>Boolean</td>
<td><code>false</code></td>
@ -1938,12 +1932,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -2172,12 +2160,6 @@ Only applies when traffic from all groups (i.e. &#34;*&#34;) is being redirected
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -437,12 +437,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>Expected audience in the tokens. </td>
</tr>
<tr>
<td><code>AUTO_RELOAD_PLUGIN_CERTS</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, if user introduces new intermediate plug-in CA, user need not to restart istiod to pick up certs.Istiod picks newly added intermediate plug-in CA certs and updates it. Plug-in new Root-CA not supported.</td>
</tr>
<tr>
<td><code>CA_TRUSTED_NODE_ACCOUNTS</code></td>
<td>String</td>
<td><code></code></td>
@ -1121,12 +1115,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>The interval for istiod to fetch the jwks_uri for the jwks public key.</td>
</tr>
<tr>
<td><code>PILOT_LEGACY_INGRESS_BEHAVIOR</code></td>
<td>Boolean</td>
<td><code>false</code></td>
<td>If this is set to true, istio ingress will perform the legacy behavior, which does not meet https://kubernetes.io/docs/concepts/services-networking/ingress/#multiple-matches.</td>
</tr>
<tr>
<td><code>PILOT_MAX_REQUESTS_PER_SECOND</code></td>
<td>Floating-Point</td>
<td><code>25</code></td>
@ -1313,12 +1301,6 @@ These environment variables affect the behavior of the <code>pilot-discovery</co
<td>Additional config map to load for shared MeshConfig settings. The standard mesh config will take precedence.</td>
</tr>
<tr>
<td><code>SIDECAR_IGNORE_PORT_IN_HOST_MATCH</code></td>
<td>Boolean</td>
<td><code>true</code></td>
<td>If enabled, port will not be used in vhost domain matches.</td>
</tr>
<tr>
<td><code>SPIFFE_BUNDLE_ENDPOINTS</code></td>
<td>String</td>
<td><code></code></td>

View File

@ -25,7 +25,7 @@ archive_date: YYYY-MM-DD
archive_search_refinement: "V1.1"
# GitHub branch names used when the docs have links to GitHub
source_branch_name: master
source_branch_name: release-1.18
doc_branch_name: master
####### Static values

10
go.mod
View File

@ -11,8 +11,8 @@ replace github.com/imdario/mergo => github.com/imdario/mergo v0.3.5
require (
github.com/pmezard/go-difflib v1.0.0
golang.org/x/sync v0.1.0
istio.io/istio v0.0.0-20230423015454-71c4b42e532a
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3
k8s.io/apimachinery v0.27.0
k8s.io/client-go v0.27.0
)
@ -49,7 +49,7 @@ require (
github.com/docker/docker v23.0.3+incompatible // indirect
github.com/docker/docker-credential-helpers v0.7.0 // indirect
github.com/emicklei/go-restful/v3 v3.10.1 // indirect
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c // indirect
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac // indirect
github.com/envoyproxy/protoc-gen-validate v0.9.1 // indirect
github.com/evanphx/json-patch v5.6.0+incompatible // indirect
github.com/evanphx/json-patch/v5 v5.6.0 // indirect
@ -199,8 +199,8 @@ require (
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
helm.sh/helm/v3 v3.11.2 // indirect
istio.io/api v0.0.0-20230414193140-04eb39977e2a // indirect
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135 // indirect
istio.io/api v0.0.0-20230426171729-6ffd9df402e9 // indirect
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1 // indirect
k8s.io/api v0.27.0 // indirect
k8s.io/apiextensions-apiserver v0.27.0 // indirect
k8s.io/apiserver v0.27.0 // indirect

20
go.sum
View File

@ -196,8 +196,8 @@ github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5y
github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk=
github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.mod h1:hliV/p42l8fGbc6Y9bQ70uLwIvmJyVE5k4iMKlh8wCQ=
github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c h1:aJBi1cy+24oYLrP3o+vXs1haoEWmYyxCkN5GCyzajZE=
github.com/envoyproxy/go-control-plane v0.11.1-0.20230419001925-dcc0071ca62c/go.mod h1:84cjSkVxFD9Pi/gvI5AOq5NPhGsmS8oPsJLtCON6eK8=
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac h1:AA3Tqmx+0UnwpyxPBVJVzyAtrUMbk8pDmYC/WThleb4=
github.com/envoyproxy/go-control-plane v0.11.1-0.20230420152043-c9825d328dac/go.mod h1:84cjSkVxFD9Pi/gvI5AOq5NPhGsmS8oPsJLtCON6eK8=
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
github.com/envoyproxy/protoc-gen-validate v0.9.1 h1:PS7VIOgmSVhWUEeZwTe7z7zouA22Cr590PzXKbZHOVY=
github.com/envoyproxy/protoc-gen-validate v0.9.1/go.mod h1:OKNgG7TCp5pF4d6XftA0++PMirau2/yoOwVac3AbF2w=
@ -1291,14 +1291,14 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
istio.io/api v0.0.0-20230414193140-04eb39977e2a h1:A+FBNGJpU/CYENpjXVza4fAtQctbnVVmmoKTefpwP1g=
istio.io/api v0.0.0-20230414193140-04eb39977e2a/go.mod h1:dDMe1TsOtrRoUlBzdxqNolWXpXPQjLfbcXvqPMtQ6eo=
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135 h1:CYoyEj49rPgmtcEHEkfdXLDxlUgMU5uXH8dQWpA1V6w=
istio.io/client-go v1.18.0-alpha.0.0.20230414194936-9bf3f4eb1135/go.mod h1:Or2ObkQ2iuksZcgUS2acFugRTkpXU1N4Pusw4qZkf/4=
istio.io/istio v0.0.0-20230423015454-71c4b42e532a h1:yIl5eyPIJtn90HnK7NhOiFhd0r3yoj8GbeHDA2laZoc=
istio.io/istio v0.0.0-20230423015454-71c4b42e532a/go.mod h1:gP1/fp/MqGEOKdMKpKdIYSDRmzPyRzL1ddy22SuiVfY=
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6 h1:OIiV+EmNj+gLCr2BKkGTBJ/lsBZb3W1P4W/S5xZSn1U=
istio.io/pkg v0.0.0-20230414193540-2f73360f3fc6/go.mod h1:ZcwaaLCBsaAszynqi6s8Bs6VL3yeTtuXDon9QuzSD5E=
istio.io/api v0.0.0-20230426171729-6ffd9df402e9 h1:ntKi4JM7uogCCEfVkP/JbWNWv88PkSMP1txZTbtVdlA=
istio.io/api v0.0.0-20230426171729-6ffd9df402e9/go.mod h1:dDMe1TsOtrRoUlBzdxqNolWXpXPQjLfbcXvqPMtQ6eo=
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1 h1:7CG3Gfn5Kh+uINYLGyKu8cstpGPVg6h/2vv7fPQg4tA=
istio.io/client-go v1.18.0-alpha.0.0.20230426172528-6893da5b6da1/go.mod h1:HwUGi4qgwnaUwAjfujDVfQ2wLO9yyQxayFD8kc9xmnY=
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e h1:CJ5rTCtEYgXI2Vt1XcBhKcf570S9KtsJiOlfco15Ot8=
istio.io/istio v0.0.0-20230427165129-c37f54c11d3e/go.mod h1:zpFKyZDEeeiArK7Fkxd7fZbjd4BbvR1BGu+akD7ZwKs=
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3 h1:MkIZAAezmy4F7Q6HQHVwssYBDONzn/W9OWXinPpKUlg=
istio.io/pkg v0.0.0-20230425065533-aed3cf39bcd3/go.mod h1:ZcwaaLCBsaAszynqi6s8Bs6VL3yeTtuXDon9QuzSD5E=
k8s.io/api v0.18.2/go.mod h1:SJCWI7OLzhZSvbY7U8zwNl9UA4o1fizoug34OV/2r78=
k8s.io/api v0.18.3/go.mod h1:UOaMwERbqJMfeeeHc8XJKawj4P9TgDRnViIqqBeH2QA=
k8s.io/api v0.18.4/go.mod h1:lOIQAKYgai1+vz9J7YcDZwC26Z0zQewYOGWdyIPUUQ4=