Skip to content

Commit 2ae5060

Browse files
committed
Fix generation script
1 parent f943852 commit 2ae5060

13 files changed

+164
-191
lines changed

authentication/v1alpha1/istio.authentication.v1alpha1.pb.html

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ <h2 id="Policy">Policy</h2>
181181
name: mTLS-enable
182182
namespace: frod
183183
spec:
184-
match:
184+
destinations:
185185
peers:
186186
- mtls: &lbrace;}
187187
</code></pre>
@@ -194,7 +194,7 @@ <h2 id="Policy">Policy</h2>
194194
name: mTLS-enable
195195
namespace: frod
196196
spec:
197-
match:
197+
destinations:
198198
- name: productpage
199199
port:
200200
number: 9000
@@ -221,7 +221,7 @@ <h2 id="Policy">Policy</h2>
221221
<tbody>
222222
<tr id="Policy.destinations">
223223
<td><code>destinations</code></td>
224-
<td><code><a href="#istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination[]</a></code></td>
224+
<td><code><a href="#istio.networking.v1alpha3.Destination">istio.networking.v1alpha3.Destination[]</a></code></td>
225225
<td>
226226
<p>List of destinations (workloads) that the policy should be applied on.
227227
If empty, policy will be used on all destinations in the same namespace.</p>
@@ -252,7 +252,7 @@ <h2 id="Policy">Policy</h2>
252252
</tbody>
253253
</table>
254254
</section>
255-
<h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</h2>
255+
<h2 id="istio.networking.v1alpha3.Destination">istio.networking.v1alpha3.Destination</h2>
256256
<section>
257257
<p>Destination indicates the network addressable service to which the
258258
request/connection will be sent after processing a routing rule. The
@@ -280,14 +280,14 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
280280
for details.</p></li>
281281
</ol>
282282

283-
<p>For example, the following rule routes all traffic by default to pods of
284-
reviews service with label &ldquo;version: v1&rdquo; on a subset named v1, and some
283+
<p>The following example routes all traffic by default to pods of the
284+
reviews service with label &ldquo;version: v1&rdquo; (i.e., subset v1), and some
285285
to subset v2, in a kubernetes environment.</p>
286286

287-
<pre><code>apiVersion: config.istio.io/v1alpha2
288-
kind: RouteRule
287+
<pre><code>apiVersion: networking.istio.io/v1alpha3
288+
kind: VirtualService
289289
metadata:
290-
name: my-rule
290+
name: reviews-route
291291
spec:
292292
hosts:
293293
- reviews # namespace is same as the client/caller's namespace
@@ -311,10 +311,10 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
311311

312312
<p>And the associated DestinationRule</p>
313313

314-
<pre><code>apiVersion: config.istio.io/v1alpha2
314+
<pre><code>apiVersion: networking.istio.io/v1alpha3
315315
kind: DestinationRule
316316
metadata:
317-
name: my-destination-rule
317+
name: reviews-destination
318318
spec:
319319
name: reviews
320320
subsets:
@@ -326,14 +326,14 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
326326
version: v2
327327
</code></pre>
328328

329-
<p>The following rule sets a timeout of 5s for all calls to
329+
<p>The following VirtualService sets a timeout of 5s for all calls to
330330
productpage.prod service. Notice that there are no subsets defined in
331331
this rule. Istio will fetch all instances of productpage.prod service
332332
from the service registry and populate the sidecar&rsquo;s load balancing
333333
pool.</p>
334334

335-
<pre><code>apiVersion: config.istio.io/v1alpha2
336-
kind: RouteRule
335+
<pre><code>apiVersion: networking.istio.io/v1alpha3
336+
kind: VirtualService
337337
metadata:
338338
name: my-productpage-rule
339339
spec:
@@ -346,11 +346,11 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
346346
name: productpage.prod
347347
</code></pre>
348348

349-
<p>The following rule sets a timeout of 5s for all calls to the external
349+
<p>The following sets a timeout of 5s for all calls to the external
350350
service wikipedia.org, as there is no internal service of that name.</p>
351351

352-
<pre><code>apiVersion: config.istio.io/v1alpha2
353-
kind: RouteRule
352+
<pre><code>apiVersion: networking.istio.io/v1alpha3
353+
kind: VirtualService
354354
metadata:
355355
name: my-wiki-rule
356356
spec:
@@ -372,7 +372,7 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
372372
</tr>
373373
</thead>
374374
<tbody>
375-
<tr id="istio.routing.v1alpha2.Destination.name">
375+
<tr id="istio.networking.v1alpha3.Destination.name">
376376
<td><code>name</code></td>
377377
<td><code>string</code></td>
378378
<td>
@@ -381,10 +381,10 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
381381
address.</p>
382382

383383
<p>If short names are used, the FQDN of the service will be resolved in a
384-
platform specific manner. For example in Kubernetes, when a rule with
384+
platform specific manner. For example in Kubernetes, when a route with
385385
a short name &ldquo;reviews&rdquo; in the destination is applied to a client in
386386
the &ldquo;bookinfo&rdquo; namespace, the final destination is resolved to
387-
reviews.bookinfo.svc.cluster.local. If the rule refers to the
387+
reviews.bookinfo.svc.cluster.local. If the route refers to the
388388
destination as &ldquo;reviews.sales&rdquo;, the resolution process first looks for
389389
a &ldquo;reviews&rdquo; service in the &ldquo;sales&rdquo; namespace. In both cases, the
390390
sidecar will route to the IP addresses of the pods constituting the
@@ -395,19 +395,19 @@ <h2 id="istio.routing.v1alpha2.Destination">istio.routing.v1alpha2.Destination</
395395

396396
</td>
397397
</tr>
398-
<tr id="istio.routing.v1alpha2.Destination.subset">
398+
<tr id="istio.networking.v1alpha3.Destination.subset">
399399
<td><code>subset</code></td>
400400
<td><code>string</code></td>
401401
<td>
402402
<p>The name of a subset within the service. Applicable only to services
403-
within the mesh. The subset must be defined in the corresponding
403+
within the mesh. The subset must be defined in a corresponding
404404
DestinationRule.</p>
405405

406406
</td>
407407
</tr>
408-
<tr id="istio.routing.v1alpha2.Destination.port">
408+
<tr id="istio.networking.v1alpha3.Destination.port">
409409
<td><code>port</code></td>
410-
<td><code><a href="#istio.routing.v1alpha2.PortSelector">istio.routing.v1alpha2.PortSelector</a></code></td>
410+
<td><code><a href="#istio.networking.v1alpha3.PortSelector">istio.networking.v1alpha3.PortSelector</a></code></td>
411411
<td>
412412
<p>Specifies the port on the destination. Many services only expose a
413413
single port or label ports with the protocols they support, in these

authentication/v1alpha1/policy.pb.go

Lines changed: 33 additions & 34 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

authentication/v1alpha1/policy.proto

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414

1515
syntax = "proto3";
1616

17-
import "routing/v1alpha2/route_rule.proto";
17+
import "networking/v1alpha3/virtual_service.proto";
1818

1919
// $title: Authentication Policy
2020
// $overview: Authentication policy for Istio services.
@@ -146,7 +146,7 @@ message Mechanism {
146146
// name: mTLS-enable
147147
// namespace: frod
148148
// spec:
149-
// match:
149+
// destinations:
150150
// peers:
151151
// - mtls: {}
152152
// ```
@@ -159,7 +159,7 @@ message Mechanism {
159159
// name: mTLS-enable
160160
// namespace: frod
161161
// spec:
162-
// match:
162+
// destinations:
163163
// - name: productpage
164164
// port:
165165
// number: 9000
@@ -177,7 +177,7 @@ message Mechanism {
177177
message Policy {
178178
// List of destinations (workloads) that the policy should be applied on.
179179
// If empty, policy will be used on all destinations in the same namespace.
180-
repeated istio.routing.v1alpha2.Destination destinations = 1;
180+
repeated istio.networking.v1alpha3.Destination destinations = 1;
181181

182182
// List of credential that should be checked by peer authentication. They
183183
// will be validated in sequence, until the first one satisfied. If none of

0 commit comments

Comments
 (0)