generated from layer5io/layer5-repo-template
-
Notifications
You must be signed in to change notification settings - Fork 36
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Patterns] Pattern components generated from latest Cilium manifests
Signed-off-by: l5io <ci@layer5.io>
- Loading branch information
1 parent
de3541a
commit c755862
Showing
8 changed files
with
8 additions
and
22 deletions.
There are no files selected for viewing
2 changes: 1 addition & 1 deletion
2
...odel/components/v1.13.0-rc5/ciliumclusterwideenvoyconfig.meshery.layer5.io_meshmodel.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"kind":"CiliumClusterwideEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Clusterwide Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Clusterwide Envoy Config\",\n \"type\": \"object\"\n}"} | ||
{"kind":"CiliumClusterwideEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Clusterwide Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Clusterwide Envoy Config\",\n \"type\": \"object\"\n}"} |
2 changes: 1 addition & 1 deletion
2
...el/components/v1.13.0-rc5/ciliumclusterwidenetworkpolicy.meshery.layer5.io_meshmodel.json
Large diffs are not rendered by default.
Oops, something went wrong.
2 changes: 1 addition & 1 deletion
2
...shmodel/components/v1.13.0-rc5/ciliumegressgatewaypolicy.meshery.layer5.io_meshmodel.json
Large diffs are not rendered by default.
Oops, something went wrong.
2 changes: 1 addition & 1 deletion
2
...lates/meshmodel/components/v1.13.0-rc5/ciliumenvoyconfig.meshery.layer5.io_meshmodel.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"kind":"CiliumEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Envoy Config\",\n \"type\": \"object\"\n}"} | ||
{"kind":"CiliumEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Envoy Config\",\n \"type\": \"object\"\n}"} |
2 changes: 1 addition & 1 deletion
2
.../meshmodel/components/v1.13.0-rc5/ciliumexternalworkload.meshery.layer5.io_meshmodel.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
{"kind":"CiliumExternalWorkload","apiVersion":"cilium.io/v2","display-name":"Cilium External Workload","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"description\": \"Spec is the desired configuration of the external Cilium workload.\",\n \"properties\": {\n \"ipv4-alloc-cidr\": {\n \"description\": \"IPv4AllocCIDR is the range of IPv4 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\/([0-9]|[1-2][0-9]|3[0-2])$\",\n \"type\": \"string\"\n },\n \"ipv6-alloc-cidr\": {\n \"description\": \"IPv6AllocCIDR is the range of IPv6 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^s*((([0-9A-Fa-f]{1,4}:){7}(:|([0-9A-Fa-f]{1,4})))|(([0-9A-Fa-f]{1,4}:){6}:([0-9A-Fa-f]{1,4})?)|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){0,1}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){0,2}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){0,3}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){0,4}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){0,5}):([0-9A-Fa-f]{1,4})?))|(:(:|((:[0-9A-Fa-f]{1,4}){1,7}))))(%.+)?s*/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8])$\",\n \"type\": \"string\"\n }\n },\n \"title\": \"Cilium External Workload\",\n \"type\": \"object\"\n}"} | ||
{"kind":"CiliumExternalWorkload","apiVersion":"cilium.io/v2","display-name":"Cilium External Workload","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"description\": \"Spec is the desired configuration of the external Cilium workload.\",\n \"properties\": {\n \"ipv4-alloc-cidr\": {\n \"description\": \"IPv4AllocCIDR is the range of IPv4 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\/([0-9]|[1-2][0-9]|3[0-2])$\",\n \"type\": \"string\"\n },\n \"ipv6-alloc-cidr\": {\n \"description\": \"IPv6AllocCIDR is the range of IPv6 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^s*((([0-9A-Fa-f]{1,4}:){7}(:|([0-9A-Fa-f]{1,4})))|(([0-9A-Fa-f]{1,4}:){6}:([0-9A-Fa-f]{1,4})?)|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){0,1}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){0,2}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){0,3}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){0,4}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){0,5}):([0-9A-Fa-f]{1,4})?))|(:(:|((:[0-9A-Fa-f]{1,4}){1,7}))))(%.+)?s*/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8])$\",\n \"type\": \"string\"\n }\n },\n \"title\": \"Cilium External Workload\",\n \"type\": \"object\"\n}"} |
Oops, something went wrong.