Skip to content

Commit

Permalink
[Patterns] Pattern components generated from latest Cilium manifests
Browse files Browse the repository at this point in the history
Signed-off-by: l5io <ci@layer5.io>
  • Loading branch information
Revolyssup authored and l5io committed Jan 26, 2023
1 parent de3541a commit c755862
Show file tree
Hide file tree
Showing 8 changed files with 8 additions and 22 deletions.
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"kind":"CiliumClusterwideEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Clusterwide Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Clusterwide Envoy Config\",\n \"type\": \"object\"\n}"}
{"kind":"CiliumClusterwideEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Clusterwide Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Clusterwide Envoy Config\",\n \"type\": \"object\"\n}"}

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"kind":"CiliumEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Envoy Config\",\n \"type\": \"object\"\n}"}
{"kind":"CiliumEnvoyConfig","apiVersion":"cilium.io/v2","display-name":"Cilium Envoy Config","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"properties\": {\n \"backendServices\": {\n \"description\": \"BackendServices specifies Kubernetes services whose backends are automatically synced to Envoy using EDS. Traffic for these services is not forwarded to an Envoy listener. This allows an Envoy listener load balance traffic to these backends while normal Cilium service load balancing takes care of balancing traffic for these services at the same time.\",\n \"items\": {\n \"properties\": {\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace defaults to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n },\n \"number\": {\n \"description\": \"Port is the port number, which can be used for filtering in case of underlying is exposing multiple port numbers.\",\n \"items\": {\n \"type\": \"string\"\n },\n \"type\": \"array\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n },\n \"resources\": {\n \"description\": \"Envoy xDS resources, a list of the following Envoy resource types: type.googleapis.com/envoy.config.listener.v3.Listener, type.googleapis.com/envoy.config.route.v3.RouteConfiguration, type.googleapis.com/envoy.config.cluster.v3.Cluster, type.googleapis.com/envoy.config.endpoint.v3.ClusterLoadAssignment, and type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret.\",\n \"items\": {\n \"type\": \"object\",\n \"x-kubernetes-preserve-unknown-fields\": true\n },\n \"type\": \"array\"\n },\n \"services\": {\n \"description\": \"Services specifies Kubernetes services for which traffic is forwarded to an Envoy listener for L7 load balancing. Backends of these services are automatically synced to Envoy usign EDS.\",\n \"items\": {\n \"properties\": {\n \"listener\": {\n \"description\": \"Listener specifies the name of the Envoy listener the service traffic is redirected to. The listener must be specified in the Envoy 'resources' of the same CiliumEnvoyConfig. \\n If omitted, the first listener specified in 'resources' is used.\",\n \"type\": \"string\"\n },\n \"name\": {\n \"description\": \"Name is the name of a destination Kubernetes service that identifies traffic to be redirected.\",\n \"type\": \"string\"\n },\n \"namespace\": {\n \"description\": \"Namespace is the Kubernetes service namespace. In CiliumEnvoyConfig namespace this is overridden to the namespace of the CEC, In CiliumClusterwideEnvoyConfig namespace defaults to \\\"default\\\".\",\n \"type\": \"string\"\n }\n },\n \"required\": [\n \"name\"\n ],\n \"type\": \"object\"\n },\n \"type\": \"array\"\n }\n },\n \"title\": \"Cilium Envoy Config\",\n \"type\": \"object\"\n}"}
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"kind":"CiliumExternalWorkload","apiVersion":"cilium.io/v2","display-name":"Cilium External Workload","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"cilium","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"description\": \"Spec is the desired configuration of the external Cilium workload.\",\n \"properties\": {\n \"ipv4-alloc-cidr\": {\n \"description\": \"IPv4AllocCIDR is the range of IPv4 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\/([0-9]|[1-2][0-9]|3[0-2])$\",\n \"type\": \"string\"\n },\n \"ipv6-alloc-cidr\": {\n \"description\": \"IPv6AllocCIDR is the range of IPv6 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^s*((([0-9A-Fa-f]{1,4}:){7}(:|([0-9A-Fa-f]{1,4})))|(([0-9A-Fa-f]{1,4}:){6}:([0-9A-Fa-f]{1,4})?)|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){0,1}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){0,2}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){0,3}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){0,4}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){0,5}):([0-9A-Fa-f]{1,4})?))|(:(:|((:[0-9A-Fa-f]{1,4}){1,7}))))(%.+)?s*/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8])$\",\n \"type\": \"string\"\n }\n },\n \"title\": \"Cilium External Workload\",\n \"type\": \"object\"\n}"}
{"kind":"CiliumExternalWorkload","apiVersion":"cilium.io/v2","display-name":"Cilium External Workload","format":"JSON","metadata":{},"model":{"name":"cilium","version":"v1.13.0-rc5","display-name":"CILIUM","category":"Orchestration \u0026 Management","sub-category":"Service Mesh"},"schema":"{\n \"description\": \"Spec is the desired configuration of the external Cilium workload.\",\n \"properties\": {\n \"ipv4-alloc-cidr\": {\n \"description\": \"IPv4AllocCIDR is the range of IPv4 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\\/([0-9]|[1-2][0-9]|3[0-2])$\",\n \"type\": \"string\"\n },\n \"ipv6-alloc-cidr\": {\n \"description\": \"IPv6AllocCIDR is the range of IPv6 addresses in the CIDR format that the external workload can use to allocate IP addresses for the tunnel device and the health endpoint.\",\n \"pattern\": \"^s*((([0-9A-Fa-f]{1,4}:){7}(:|([0-9A-Fa-f]{1,4})))|(([0-9A-Fa-f]{1,4}:){6}:([0-9A-Fa-f]{1,4})?)|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){0,1}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){0,2}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){0,3}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){0,4}):([0-9A-Fa-f]{1,4})?))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){0,5}):([0-9A-Fa-f]{1,4})?))|(:(:|((:[0-9A-Fa-f]{1,4}){1,7}))))(%.+)?s*/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8])$\",\n \"type\": \"string\"\n }\n },\n \"title\": \"Cilium External Workload\",\n \"type\": \"object\"\n}"}
Loading

0 comments on commit c755862

Please sign in to comment.