#!/bin/bash # shellcheck disable=SC2034,SC2153,SC2155,SC2164 # Copyright Istio Authors. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. #################################################################################################### # WARNING: THIS IS AN AUTO-GENERATED FILE, DO NOT EDIT. PLEASE MODIFY THE ORIGINAL MARKDOWN FILE: # docs/tasks/security/authorization/authz-ingress/index.md #################################################################################################### source "content/en/boilerplates/snips/gateway-api-support.sh" snip_before_you_begin_1() { kubectl create ns foo kubectl label namespace foo istio-injection=enabled kubectl apply -f samples/httpbin/httpbin.yaml -n foo } snip_before_you_begin_2() { kubectl apply -f samples/httpbin/httpbin-gateway.yaml -n foo } snip_before_you_begin_3() { kubectl get pods -n istio-system -o name -l istio=ingressgateway | sed 's|pod/||' | while read -r pod; do istioctl proxy-config log "$pod" -n istio-system --level rbac:debug; done } snip_before_you_begin_4() { kubectl apply -f samples/httpbin/gateway-api/httpbin-gateway.yaml -n foo } snip_before_you_begin_5() { kubectl wait --for=condition=programmed gtw -n foo httpbin-gateway } snip_before_you_begin_6() { kubectl get pods -n foo -o name -l gateway.networking.k8s.io/gateway-name=httpbin-gateway | sed 's|pod/||' | while read -r pod; do istioctl proxy-config log "$pod" -n foo --level rbac:debug; done } snip_before_you_begin_7() { export INGRESS_HOST=$(kubectl get gtw httpbin-gateway -n foo -o jsonpath='{.status.addresses[0].value}') export INGRESS_PORT=$(kubectl get gtw httpbin-gateway -n foo -o jsonpath='{.spec.listeners[?(@.name=="http")].port}') } snip_before_you_begin_8() { curl "$INGRESS_HOST:$INGRESS_PORT"/headers -s -o /dev/null -w "%{http_code}\n" } ! IFS=$'\n' read -r -d '' snip_before_you_begin_8_out <<\ENDSNIP 200 ENDSNIP ! IFS=$'\n' read -r -d '' snip_source_ip_address_of_the_original_client_1 <<\ENDSNIP apiVersion: install.istio.io/v1alpha1 kind: IstioOperator spec: meshConfig: accessLogEncoding: JSON accessLogFile: /dev/stdout components: ingressGateways: - enabled: true k8s: hpaSpec: maxReplicas: 10 minReplicas: 5 serviceAnnotations: service.beta.kubernetes.io/aws-load-balancer-type: "nlb" ENDSNIP ! IFS=$'\n' read -r -d '' snip_source_ip_address_of_the_original_client_2 <<\ENDSNIP apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway metadata: name: httpbin-gateway annotations: service.beta.kubernetes.io/aws-load-balancer-type: "nlb" spec: gatewayClassName: istio ... ENDSNIP ! IFS=$'\n' read -r -d '' snip_tcpudp_proxy_load_balancer_1 <<\ENDSNIP apiVersion: install.istio.io/v1alpha1 kind: IstioOperator spec: meshConfig: accessLogEncoding: JSON accessLogFile: /dev/stdout defaultConfig: gatewayTopology: proxyProtocol: {} components: ingressGateways: - enabled: true name: istio-ingressgateway k8s: hpaSpec: maxReplicas: 10 minReplicas: 5 serviceAnnotations: service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" ... ENDSNIP ! IFS=$'\n' read -r -d '' snip_tcpudp_proxy_load_balancer_2 <<\ENDSNIP apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway metadata: name: httpbin-gateway annotations: service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: "*" proxy.istio.io/config: '{"gatewayTopology" : { "proxyProtocol": {} }}' spec: gatewayClassName: istio ... --- apiVersion: autoscaling/v2 kind: HorizontalPodAutoscaler metadata: name: httpbin-gateway spec: scaleTargetRef: apiVersion: apps/v1 kind: Deployment name: httpbin-gateway-istio minReplicas: 5 maxReplicas: 10 ENDSNIP snip_network_load_balancer_1() { kubectl patch svc istio-ingressgateway -n istio-system -p '{"spec":{"externalTrafficPolicy":"Local"}}' } snip_network_load_balancer_2() { kubectl patch svc httpbin-gateway-istio -n foo -p '{"spec":{"externalTrafficPolicy":"Local"}}' } ! IFS=$'\n' read -r -d '' snip_httphttps_load_balancer_1 <<\ENDSNIP apiVersion: install.istio.io/v1alpha1 kind: IstioOperator spec: meshConfig: accessLogEncoding: JSON accessLogFile: /dev/stdout defaultConfig: gatewayTopology: numTrustedProxies: 1 ENDSNIP snip_ipbased_allow_list_and_deny_list_1() { kubectl apply -f - <