v1alpha1

package
v0.0.0-...-860f878 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 30, 2024 License: Apache-2.0 Imports: 8 Imported by: 0

Documentation

Overview

Package v1alpha1 contains API Schema definitions for the operator.istio.io v1alpha1 API group +kubebuilder:object:generate=true +groupName=operator.istio.io

Index

Constants

View Source
const (
	UpdateStrategyTypeInPlace       UpdateStrategyType = "InPlace"
	UpdateStrategyTypeRevisionBased UpdateStrategyType = "RevisionBased"

	DefaultRevisionDeletionGracePeriodSeconds = 30
	MinRevisionDeletionGracePeriodSeconds     = 30
)
View Source
const (
	// IstioConditionReconciled signifies whether the controller has
	// successfully reconciled the resources defined through the CR.
	IstioConditionReconciled IstioConditionType = "Reconciled"

	// IstioReasonReconcileError indicates that the reconciliation of the resource has failed, but will be retried.
	IstioReasonReconcileError IstioConditionReason = "ReconcileError"
)
View Source
const (
	// IstioConditionReady signifies whether any Deployment, StatefulSet,
	// etc. resources are Ready.
	IstioConditionReady IstioConditionType = "Ready"

	// IstioReasonRevisionNotFound indicates that the active IstioRevision is not found.
	IstioReasonRevisionNotFound IstioConditionReason = "ActiveRevisionNotFound"

	// IstioReasonFailedToGetActiveRevision indicates that a failure occurred when getting the active IstioRevision
	IstioReasonFailedToGetActiveRevision IstioConditionReason = "FailedToGetActiveRevision"

	// IstioReasonIstiodNotReady indicates that the control plane is fully reconciled, but istiod is not ready.
	IstioReasonIstiodNotReady IstioConditionReason = "IstiodNotReady"

	// IstioReasonReadinessCheckFailed indicates that readiness could not be ascertained.
	IstioReasonReadinessCheckFailed IstioConditionReason = "ReadinessCheckFailed"
)
View Source
const (
	// IstioCNIConditionReconciled signifies whether the controller has
	// successfully reconciled the resources defined through the CR.
	IstioCNIConditionReconciled IstioCNIConditionType = "Reconciled"

	// IstioCNIReasonReconcileError indicates that the reconciliation of the resource has failed, but will be retried.
	IstioCNIReasonReconcileError IstioCNIConditionReason = "ReconcileError"
)
View Source
const (
	// IstioCNIConditionReady signifies whether the istio-cni-node DaemonSet is ready.
	IstioCNIConditionReady IstioCNIConditionType = "Ready"

	// IstioCNIDaemonSetNotReady indicates that the istio-cni-node DaemonSet is not ready.
	IstioCNIDaemonSetNotReady IstioCNIConditionReason = "DaemonSetNotReady"

	// IstioCNIReasonReadinessCheckFailed indicates that the DaemonSet readiness status could not be ascertained.
	IstioCNIReasonReadinessCheckFailed IstioCNIConditionReason = "ReadinessCheckFailed"
)
View Source
const (
	IstioRevisionKind = "IstioRevision"
	DefaultRevision   = "default"
)
View Source
const (
	// IstioRevisionConditionReconciled signifies whether the controller has
	// successfully reconciled the resources defined through the CR.
	IstioRevisionConditionReconciled IstioRevisionConditionType = "Reconciled"

	// IstioRevisionReasonReconcileError indicates that the reconciliation of the resource has failed, but will be retried.
	IstioRevisionReasonReconcileError IstioRevisionConditionReason = "ReconcileError"
)
View Source
const (
	// IstioRevisionConditionReady signifies whether any Deployment, StatefulSet,
	// etc. resources are Ready.
	IstioRevisionConditionReady IstioRevisionConditionType = "Ready"

	// IstioRevisionReasonIstiodNotReady indicates that the control plane is fully reconciled, but istiod is not ready.
	IstioRevisionReasonIstiodNotReady IstioRevisionConditionReason = "IstiodNotReady"

	// IstioRevisionReasonReadinessCheckFailed indicates that istiod readiness status could not be ascertained.
	IstioRevisionReasonReadinessCheckFailed IstioRevisionConditionReason = "ReadinessCheckFailed"
)
View Source
const (
	// IstioRevisionConditionInUse signifies whether any workload is configured to use the revision.
	IstioRevisionConditionInUse IstioRevisionConditionType = "InUse"

	// IstioRevisionReasonReferencedByWorkloads indicates that the revision is referenced by at least one pod or namespace.
	IstioRevisionReasonReferencedByWorkloads IstioRevisionConditionReason = "ReferencedByWorkloads"

	// IstioRevisionReasonNotReferenced indicates that the revision is not referenced by any pod or namespace.
	IstioRevisionReasonNotReferenced IstioRevisionConditionReason = "NotReferencedByAnything"

	// IstioRevisionReasonUsageCheckFailed indicates that the operator could not check whether any workloads use the revision.
	IstioRevisionReasonUsageCheckFailed IstioRevisionConditionReason = "UsageCheckFailed"
)
View Source
const (
	IstioCNIKind = "IstioCNI"
)
View Source
const IstioKind = "Istio"

Variables

View Source
var (
	// GroupVersion is group version used to register these objects
	GroupVersion = schema.GroupVersion{Group: "operator.istio.io", Version: "v1alpha1"}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: GroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)

Functions

This section is empty.

Types

type ArchConfig

type ArchConfig struct {
	// Sets pod scheduling weight for amd64 arch
	Amd64 uint32 `json:"amd64,omitempty"`
	// Sets pod scheduling weight for ppc64le arch.
	Ppc64Le uint32 `json:"ppc64le,omitempty"`
	// Sets pod scheduling weight for s390x arch.
	S390X uint32 `json:"s390x,omitempty"`
	// Sets pod scheduling weight for arm64 arch.
	Arm64 uint32 `json:"arm64,omitempty"`
}

ArchConfig specifies the pod scheduling target architecture(amd64, ppc64le, s390x, arm64) for all the Istio control plane components.

func (*ArchConfig) DeepCopy

func (in *ArchConfig) DeepCopy() *ArchConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ArchConfig.

func (*ArchConfig) DeepCopyInto

func (in *ArchConfig) DeepCopyInto(out *ArchConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthenticationPolicy

type AuthenticationPolicy string

AuthenticationPolicy defines how the proxy is authenticated when it connects to the control plane. It can be set for two different scopes, mesh-wide or set on a per-pod basis using the ProxyConfig annotation. Mesh policy cannot be INHERIT. +kubebuilder:validation:Enum=NONE;MUTUAL_TLS;INHERIT

const (
	// Do not encrypt proxy to control plane traffic.
	AuthenticationPolicyNone AuthenticationPolicy = "NONE"
	// Proxy to control plane traffic is wrapped into mutual TLS connections.
	AuthenticationPolicyMutualTls AuthenticationPolicy = "MUTUAL_TLS"
	// Use the policy defined by the parent scope. Should not be used for mesh
	// policy.
	AuthenticationPolicyInherit AuthenticationPolicy = "INHERIT"
)

type BaseConfig

type BaseConfig struct {
	// URL to use for validating webhook.
	ValidationURL string `json:"validationURL,omitempty"`
}

func (*BaseConfig) DeepCopy

func (in *BaseConfig) DeepCopy() *BaseConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BaseConfig.

func (*BaseConfig) DeepCopyInto

func (in *BaseConfig) DeepCopyInto(out *BaseConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIAmbientConfig

type CNIAmbientConfig struct {
	// Controls whether ambient redirection is enabled
	Enabled *bool `json:"enabled,omitempty"`
	// The directory path containing the configuration files for Ambient. Defaults to /etc/ambient-config.
	ConfigDir string `json:"configDir,omitempty"`
	// If enabled, and ambient is enabled, DNS redirection will be enabled.
	DnsCapture *bool `json:"dnsCapture,omitempty"`
}

func (*CNIAmbientConfig) DeepCopy

func (in *CNIAmbientConfig) DeepCopy() *CNIAmbientConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIAmbientConfig.

func (*CNIAmbientConfig) DeepCopyInto

func (in *CNIAmbientConfig) DeepCopyInto(out *CNIAmbientConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIConfig

type CNIConfig struct {
	// Hub to pull the container image from. Image will be `Hub/Image:Tag-Variant`.
	Hub string `json:"hub,omitempty"`
	// The container image tag to pull. Image will be `Hub/Image:Tag-Variant`.
	// +kubebuilder:validation:XIntOrString
	Tag *intstr.IntOrString `json:"tag,omitempty"`
	// The container image variant to pull. Options are "debug" or "distroless". Unset will use the default for the given version.
	Variant string `json:"variant,omitempty"`
	// Image name to pull from. Image will be `Hub/Image:Tag-Variant`.
	// If Image contains a "/", it will replace the entire `image` in the pod.
	Image string `json:"image,omitempty"`
	// Specifies the image pull policy. one of Always, Never, IfNotPresent.
	// Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated.
	//
	// More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
	PullPolicy string `json:"pullPolicy,omitempty"`
	// The directory path within the cluster node's filesystem where the CNI binaries are to be installed. Typically /var/lib/cni/bin.
	CniBinDir string `json:"cniBinDir,omitempty"`
	// The directory path within the cluster node's filesystem where the CNI configuration files are to be installed. Typically /etc/cni/net.d.
	CniConfDir string `json:"cniConfDir,omitempty"`
	// The name of the CNI plugin configuration file. Defaults to istio-cni.conf.
	CniConfFileName string `json:"cniConfFileName,omitempty"`
	// The directory path within the cluster node's filesystem where network namespaces are located.
	// Defaults to '/var/run/netns', in minikube/docker/others can be '/var/run/docker/netns'.
	CniNetnsDir string `json:"cniNetnsDir,omitempty"`
	// List of namespaces that should be ignored by the CNI plugin.
	ExcludeNamespaces []string `json:"excludeNamespaces,omitempty"`
	// K8s affinity to set on the istio-cni Pods. Can be used to exclude istio-cni from being scheduled on specified nodes.
	Affinity *k8sv1.Affinity `json:"affinity,omitempty"`
	// Additional annotations to apply to the istio-cni Pods.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	PodAnnotations map[string]string `json:"podAnnotations,omitempty"`
	// PodSecurityPolicy cluster role. No longer used anywhere.
	PspClusterRole string `json:"psp_cluster_role,omitempty"`
	// Configuration log level of istio-cni binary. By default, istio-cni sends all logs to the UDS server.
	// To see the logs, change global.logging.level to cni:debug.
	LogLevel string `json:"logLevel,omitempty"`
	// Configuration for the CNI Repair controller.
	Repair *CNIRepairConfig `json:"repair,omitempty"`
	// Configure the plugin as a chained CNI plugin. When true, the configuration is added to the CNI chain; when false,
	// the configuration is added as a standalone file in the CNI configuration directory.
	Chained *bool `json:"chained,omitempty"`
	// The resource quotas configration for the CNI DaemonSet.
	ResourceQuotas *ResourceQuotas `json:"resource_quotas,omitempty"`
	// The k8s resource requests and limits for the istio-cni Pods.
	Resources *k8sv1.ResourceRequirements `json:"resources,omitempty"`
	// No longer used for CNI. See: https://github.com/istio/istio/issues/49004
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Privileged *bool `json:"privileged,omitempty"`
	// The Container seccompProfile
	//
	// See: https://kubernetes.io/docs/tutorials/security/seccomp/
	SeccompProfile *k8sv1.SeccompProfile `json:"seccompProfile,omitempty"`
	// Configuration for Istio Ambient.
	Ambient *CNIAmbientConfig `json:"ambient,omitempty"`
	// Specifies the CNI provider. Can be either "default" or "multus". When set to "multus", an additional
	// NetworkAttachmentDefinition resource is deployed to the cluster to allow the istio-cni plugin to be
	// invoked in a cluster using the Multus CNI plugin.
	Provider string `json:"provider,omitempty"`
	// The number of pods that can be unavailable during a rolling update of the CNI DaemonSet (see
	// `updateStrategy.rollingUpdate.maxUnavailable` here:
	// https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/daemon-set-v1/#DaemonSetSpec).
	// May be specified as a number of pods or as a percent of the total number
	// of pods at the start of the update.
	// +kubebuilder:validation:XIntOrString
	RollingMaxUnavailable *intstr.IntOrString `json:"rollingMaxUnavailable,omitempty"`
}

Configuration for CNI.

func (*CNIConfig) DeepCopy

func (in *CNIConfig) DeepCopy() *CNIConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIConfig.

func (*CNIConfig) DeepCopyInto

func (in *CNIConfig) DeepCopyInto(out *CNIConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIGlobalConfig

type CNIGlobalConfig struct {
	// Default k8s resources settings for all Istio control plane components.
	//
	// See https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#resource-requests-and-limits-of-pod-and-container
	DefaultResources *k8sv1.ResourceRequirements `json:"defaultResources,omitempty"`
	// Specifies the docker hub for Istio images.
	Hub string `json:"hub,omitempty"`
	// Specifies the image pull policy for the Istio images. one of Always, Never, IfNotPresent.
	// Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated.
	//
	// More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
	ImagePullPolicy  k8sv1.PullPolicy `json:"imagePullPolicy,omitempty"`
	ImagePullSecrets []string         `json:"imagePullSecrets,omitempty"`
	LogAsJSON        *bool            `json:"logAsJson,omitempty"`
	// Specifies the global logging level settings for the Istio CNI component.
	Logging *GlobalLoggingConfig `json:"logging,omitempty"`
	// Specifies the tag for the Istio CNI image.
	// +kubebuilder:validation:XIntOrString
	Tag     *intstr.IntOrString `json:"tag,omitempty"`
	Variant string              `json:"variant,omitempty"`
}

CNIGlobalConfig is a subset of the Global Configuration used in the Istio CNI chart.

func (*CNIGlobalConfig) DeepCopy

func (in *CNIGlobalConfig) DeepCopy() *CNIGlobalConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIGlobalConfig.

func (*CNIGlobalConfig) DeepCopyInto

func (in *CNIGlobalConfig) DeepCopyInto(out *CNIGlobalConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIRepairConfig

type CNIRepairConfig struct {
	// Controls whether repair behavior is enabled.
	Enabled *bool `json:"enabled,omitempty"`
	// Hub to pull the container image from. Image will be `Hub/Image:Tag-Variant`.
	Hub string `json:"hub,omitempty"`
	// The container image tag to pull. Image will be `Hub/Image:Tag-Variant`.
	// +kubebuilder:validation:XIntOrString
	Tag *intstr.IntOrString `json:"tag,omitempty"`
	// Image name to pull from. Image will be `Hub/Image:Tag-Variant`.
	// If Image contains a "/", it will replace the entire `image` in the pod.
	Image string `json:"image,omitempty"`
	// The Repair controller has 3 modes (labelPods, deletePods, and repairPods). Pick which one meets your use cases. Note only one may be used.
	// The mode defines the action the controller will take when a pod is detected as broken.
	// If labelPods is true, the controller will label all broken pods with <brokenPodLabelKey>=<brokenPodLabelValue>.
	// This is only capable of identifying broken pods; the user is responsible for fixing them (generally, by deleting them).
	// Note this gives the DaemonSet a relatively high privilege, as modifying pod metadata/status can have wider impacts.
	LabelPods bool `json:"labelPods,omitempty"`
	// The Repair controller has 3 modes (labelPods, deletePods, and repairPods). Pick which one meets your use cases. Note only one may be used.
	// The mode defines the action the controller will take when a pod is detected as broken.
	// If repairPods is true, the controller will dynamically repair any broken pod by setting up the pod networking configuration even after it has started.
	// Note the pod will be crashlooping, so this may take a few minutes to become fully functional based on when the retry occurs.
	// This requires no RBAC privilege, but will require the CNI agent to run as a privileged pod.
	RepairPods bool `json:"repairPods,omitempty"`
	// No longer used.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	CreateEvents string `json:"createEvents,omitempty"`
	// The Repair controller has 3 modes (labelPods, deletePods, and repairPods). Pick which one meets your use cases. Note only one may be used.
	// The mode defines the action the controller will take when a pod is detected as broken.
	// If deletePods is true, the controller will delete the broken pod. The pod will then be rescheduled, hopefully onto a node that is fully ready.
	// Note this gives the DaemonSet a relatively high privilege, as it can delete any Pod.
	DeletePods bool `json:"deletePods,omitempty"`
	// The label key to apply to a broken pod when the controller is in labelPods mode.
	BrokenPodLabelKey string `json:"brokenPodLabelKey,omitempty"`
	// The label value to apply to a broken pod when the controller is in labelPods mode.
	BrokenPodLabelValue string `json:"brokenPodLabelValue,omitempty"`
	// The name of the init container to use for the repairPods mode.
	InitContainerName string `json:"initContainerName,omitempty"`
}

func (*CNIRepairConfig) DeepCopy

func (in *CNIRepairConfig) DeepCopy() *CNIRepairConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIRepairConfig.

func (*CNIRepairConfig) DeepCopyInto

func (in *CNIRepairConfig) DeepCopyInto(out *CNIRepairConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIUsageConfig

type CNIUsageConfig struct {
	// Controls whether CNI should be used.
	Enabled *bool `json:"enabled,omitempty"`
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Chained *bool `json:"chained,omitempty"`
	// Specifies the CNI provider. Can be either "default" or "multus". When set to "multus", an annotation
	// `k8s.v1.cni.cncf.io/networks` is set on injected pods to point to a NetworkAttachmentDefinition
	Provider string `json:"provider,omitempty"`
}

func (*CNIUsageConfig) DeepCopy

func (in *CNIUsageConfig) DeepCopy() *CNIUsageConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIUsageConfig.

func (*CNIUsageConfig) DeepCopyInto

func (in *CNIUsageConfig) DeepCopyInto(out *CNIUsageConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type CNIValues

type CNIValues struct {
	// Configuration for the Istio CNI plugin.
	Cni *CNIConfig `json:"cni,omitempty"`

	// Part of the global configuration applicable to the Istio CNI component.
	Global *CNIGlobalConfig `json:"global,omitempty"`
}

func (*CNIValues) DeepCopy

func (in *CNIValues) DeepCopy() *CNIValues

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CNIValues.

func (*CNIValues) DeepCopyInto

func (in *CNIValues) DeepCopyInto(out *CNIValues)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Certificate

type Certificate struct {
	// Name of the secret the certificate and its key will be stored into.
	// If it is empty, it will not be stored into a secret.
	// Instead, the certificate and its key will be stored into a hard-coded directory.
	SecretName string `json:"secretName,omitempty"`
	// The DNS names for the certificate. A certificate may contain
	// multiple DNS names.
	DnsNames []string `json:"dnsNames,omitempty"`
}

$hide_from_docs Certificate configures the provision of a certificate and its key. Example 1: key and cert stored in a secret ``` { secretName: galley-cert

  secretNamespace: istio-system
  dnsNames:
    - galley.istio-system.svc
    - galley.mydomain.com
}

``` Example 2: key and cert stored in a directory ``` { dnsNames:

  • pilot.istio-system
  • pilot.istio-system.svc
  • pilot.mydomain.com }

```

func (*Certificate) DeepCopy

func (in *Certificate) DeepCopy() *Certificate

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Certificate.

func (*Certificate) DeepCopyInto

func (in *Certificate) DeepCopyInto(out *Certificate)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ClientTLSSettings

type ClientTLSSettings struct {
	// Indicates whether connections to this port should be secured
	// using TLS. The value of this field determines how TLS is enforced.
	Mode ClientTLSSettingsTLSmode `json:"mode,omitempty"`
	// REQUIRED if mode is `MUTUAL`. The path to the file holding the
	// client-side TLS certificate to use.
	// Should be empty if mode is `ISTIO_MUTUAL`.
	ClientCertificate string `json:"clientCertificate,omitempty"`
	// REQUIRED if mode is `MUTUAL`. The path to the file holding the
	// client's private key.
	// Should be empty if mode is `ISTIO_MUTUAL`.
	PrivateKey string `json:"privateKey,omitempty"`
	// OPTIONAL: The path to the file containing certificate authority
	// certificates to use in verifying a presented server certificate. If
	// omitted, the proxy will not verify the server's certificate.
	// Should be empty if mode is `ISTIO_MUTUAL`.
	CaCertificates string `json:"caCertificates,omitempty"`
	// The name of the secret that holds the TLS certs for the
	// client including the CA certificates. This secret must exist in
	// the namespace of the proxy using the certificates.
	// An Opaque secret should contain the following keys and values:
	// `key: <privateKey>`, `cert: <clientCert>`, `cacert: <CACertificate>`,
	// `crl: <certificateRevocationList>`
	// Here CACertificate is used to verify the server certificate.
	// For mutual TLS, `cacert: <CACertificate>` can be provided in the
	// same secret or a separate secret named `<secret>-cacert`.
	// A TLS secret for client certificates with an additional
	// `ca.crt` key for CA certificates and `ca.crl` key for
	// certificate revocation list(CRL) is also supported.
	// Only one of client certificates and CA certificate
	// or credentialName can be specified.
	//
	// **NOTE:** This field is applicable at sidecars only if
	// `DestinationRule` has a `workloadSelector` specified.
	// Otherwise the field will be applicable only at gateways, and
	// sidecars will continue to use the certificate paths.
	CredentialName string `json:"credentialName,omitempty"`
	// A list of alternate names to verify the subject identity in the
	// certificate. If specified, the proxy will verify that the server
	// certificate's subject alt name matches one of the specified values.
	// If specified, this list overrides the value of subject_alt_names
	// from the ServiceEntry. If unspecified, automatic validation of upstream
	// presented certificate for new upstream connections will be done based on the
	// downstream HTTP host/authority header, provided `VERIFY_CERTIFICATE_AT_CLIENT`
	// and `ENABLE_AUTO_SNI` environmental variables are set to `true`.
	SubjectAltNames []string `json:"subjectAltNames,omitempty"`
	// SNI string to present to the server during TLS handshake.
	// If unspecified, SNI will be automatically set based on downstream HTTP
	// host/authority header for SIMPLE and MUTUAL TLS modes, provided `ENABLE_AUTO_SNI`
	// environmental variable is set to `true`.
	Sni string `json:"sni,omitempty"`
	// `insecureSkipVerify` specifies whether the proxy should skip verifying the
	// CA signature and SAN for the server certificate corresponding to the host.
	// This flag should only be set if global CA signature verification is
	// enabled, `VERIFY_CERTIFICATE_AT_CLIENT` environmental variable is set to `true`,
	// but no verification is desired for a specific host. If enabled with or
	// without `VERIFY_CERTIFICATE_AT_CLIENT` enabled, verification of the CA signature and
	// SAN will be skipped.
	//
	// `insecureSkipVerify` is `false` by default.
	// `VERIFY_CERTIFICATE_AT_CLIENT` is `false` by default in Istio version 1.9 but will
	// be `true` by default in a later version where, going forward, it will be
	// enabled by default.
	InsecureSkipVerify *bool `json:"insecureSkipVerify,omitempty"`
	// OPTIONAL: The path to the file containing the certificate revocation list (CRL)
	// to use in verifying a presented server certificate. `CRL` is a list of certificates
	// that have been revoked by the CA (Certificate Authority) before their scheduled expiration date.
	// If specified, the proxy will verify if the presented certificate is part of the revoked list of certificates.
	// If omitted, the proxy will not verify the certificate against the `crl`.
	CaCrl string `json:"caCrl,omitempty"`
}

SSL/TLS related settings for upstream connections. See Envoy's [TLS context](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/transport_sockets/tls/v3/common.proto.html#common-tls-configuration) for more details. These settings are common to both HTTP and TCP upstreams.

For example, the following rule configures a client to use mutual TLS for connections to upstream database cluster.

{{<tabset category-name="example">}} {{<tab name="v1alpha3" category-value="v1alpha3">}} ```yaml apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata:

name: db-mtls

spec:

host: mydbserver.prod.svc.cluster.local
trafficPolicy:
  tls:
    mode: MUTUAL
    clientCertificate: /etc/certs/myclientcert.pem
    privateKey: /etc/certs/client_private_key.pem
    caCertificates: /etc/certs/rootcacerts.pem

``` {{</tab>}}

{{<tab name="v1beta1" category-value="v1beta1">}} ```yaml apiVersion: networking.istio.io/v1beta1 kind: DestinationRule metadata:

name: db-mtls

spec:

host: mydbserver.prod.svc.cluster.local
trafficPolicy:
  tls:
    mode: MUTUAL
    clientCertificate: /etc/certs/myclientcert.pem
    privateKey: /etc/certs/client_private_key.pem
    caCertificates: /etc/certs/rootcacerts.pem

``` {{</tab>}} {{</tabset>}}

The following rule configures a client to use TLS when talking to a foreign service whose domain matches *.foo.com.

{{<tabset category-name="example">}} {{<tab name="v1alpha3" category-value="v1alpha3">}} ```yaml apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata:

name: tls-foo

spec:

host: "*.foo.com"
trafficPolicy:
  tls:
    mode: SIMPLE

``` {{</tab>}}

{{<tab name="v1beta1" category-value="v1beta1">}} ```yaml apiVersion: networking.istio.io/v1beta1 kind: DestinationRule metadata:

name: tls-foo

spec:

host: "*.foo.com"
trafficPolicy:
  tls:
    mode: SIMPLE

``` {{</tab>}} {{</tabset>}}

The following rule configures a client to use Istio mutual TLS when talking to rating services.

{{<tabset category-name="example">}} {{<tab name="v1alpha3" category-value="v1alpha3">}} ```yaml apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata:

name: ratings-istio-mtls

spec:

host: ratings.prod.svc.cluster.local
trafficPolicy:
  tls:
    mode: ISTIO_MUTUAL

``` {{</tab>}}

{{<tab name="v1beta1" category-value="v1beta1">}} ```yaml apiVersion: networking.istio.io/v1beta1 kind: DestinationRule metadata:

name: ratings-istio-mtls

spec:

host: ratings.prod.svc.cluster.local
trafficPolicy:
  tls:
    mode: ISTIO_MUTUAL

``` {{</tab>}} {{</tabset>}}

func (*ClientTLSSettings) DeepCopy

func (in *ClientTLSSettings) DeepCopy() *ClientTLSSettings

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClientTLSSettings.

func (*ClientTLSSettings) DeepCopyInto

func (in *ClientTLSSettings) DeepCopyInto(out *ClientTLSSettings)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ClientTLSSettingsTLSmode

type ClientTLSSettingsTLSmode string

TLS connection mode +kubebuilder:validation:Enum=DISABLE;SIMPLE;MUTUAL;ISTIO_MUTUAL

const (
	// Do not setup a TLS connection to the upstream endpoint.
	ClientTLSSettingsTLSmodeDisable ClientTLSSettingsTLSmode = "DISABLE"
	// Originate a TLS connection to the upstream endpoint.
	ClientTLSSettingsTLSmodeSimple ClientTLSSettingsTLSmode = "SIMPLE"
	// Secure connections to the upstream using mutual TLS by presenting
	// client certificates for authentication.
	ClientTLSSettingsTLSmodeMutual ClientTLSSettingsTLSmode = "MUTUAL"
	// Secure connections to the upstream using mutual TLS by presenting
	// client certificates for authentication.
	// Compared to Mutual mode, this mode uses certificates generated
	// automatically by Istio for mTLS authentication. When this mode is
	// used, all other fields in `ClientTLSSettings` should be empty.
	ClientTLSSettingsTLSmodeIstioMutual ClientTLSSettingsTLSmode = "ISTIO_MUTUAL"
)

type ConfigSource

type ConfigSource struct {
	// Address of the server implementing the Istio Mesh Configuration
	// protocol (MCP). Can be IP address or a fully qualified DNS name.
	// Use xds:// to specify a grpc-based xds backend, k8s:// to specify a k8s controller or
	// fs:/// to specify a file-based backend with absolute path to the directory.
	Address string `json:"address,omitempty"`
	// Use the tls_settings to specify the tls mode to use. If the MCP server
	// uses Istio mutual TLS and shares the root CA with Pilot, specify the TLS
	// mode as `ISTIO_MUTUAL`.
	TlsSettings *ClientTLSSettings `json:"tlsSettings,omitempty"`
	// Describes the source of configuration, if nothing is specified default is MCP
	SubscribedResources []Resource `json:"subscribedResources,omitempty"`
}

ConfigSource describes information about a configuration store inside a mesh. A single control plane instance can interact with one or more data sources.

func (*ConfigSource) DeepCopy

func (in *ConfigSource) DeepCopy() *ConfigSource

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ConfigSource.

func (*ConfigSource) DeepCopyInto

func (in *ConfigSource) DeepCopyInto(out *ConfigSource)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ConnectionPoolSettingsTCPSettingsTcpKeepalive

type ConnectionPoolSettingsTCPSettingsTcpKeepalive struct {
	// Maximum number of keepalive probes to send without response before
	// deciding the connection is dead. Default is to use the OS level configuration
	// (unless overridden, Linux defaults to 9.)
	Probes uint32 `json:"probes,omitempty"`
	// The time duration a connection needs to be idle before keep-alive
	// probes start being sent. Default is to use the OS level configuration
	// (unless overridden, Linux defaults to 7200s (ie 2 hours.)
	Time *metav1.Duration `json:"time,omitempty"`
	// The time duration between keep-alive probes.
	// Default is to use the OS level configuration
	// (unless overridden, Linux defaults to 75s.)
	Interval *metav1.Duration `json:"interval,omitempty"`
}

TCP keepalive.

func (*ConnectionPoolSettingsTCPSettingsTcpKeepalive) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ConnectionPoolSettingsTCPSettingsTcpKeepalive.

func (*ConnectionPoolSettingsTCPSettingsTcpKeepalive) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type DefaultPodDisruptionBudgetConfig

type DefaultPodDisruptionBudgetConfig struct {
	// Controls whether a PodDisruptionBudget with a default minAvailable value of 1 is created for each deployment.
	Enabled *bool `json:"enabled,omitempty"`
}

DefaultPodDisruptionBudgetConfig specifies the default pod disruption budget configuration.

See https://kubernetes.io/docs/concepts/workloads/pods/disruptions/

func (*DefaultPodDisruptionBudgetConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DefaultPodDisruptionBudgetConfig.

func (*DefaultPodDisruptionBudgetConfig) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ForwardClientCertDetails

type ForwardClientCertDetails string

ForwardClientCertDetails controls how the x-forwarded-client-cert (XFCC) header is handled by the gateway proxy. See [Envoy XFCC](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto.html#enum-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-forwardclientcertdetails) header handling for more details. +kubebuilder:validation:Enum=UNDEFINED;SANITIZE;FORWARD_ONLY;APPEND_FORWARD;SANITIZE_SET;ALWAYS_FORWARD_ONLY

const (
	// Field is not set
	ForwardClientCertDetailsUndefined ForwardClientCertDetails = "UNDEFINED"
	// Do not send the XFCC header to the next hop. This is the default value.
	ForwardClientCertDetailsSanitize ForwardClientCertDetails = "SANITIZE"
	// When the client connection is mTLS (Mutual TLS), forward the XFCC header
	// in the request.
	ForwardClientCertDetailsForwardOnly ForwardClientCertDetails = "FORWARD_ONLY"
	// When the client connection is mTLS, append the client certificate
	// information to the request’s XFCC header and forward it.
	ForwardClientCertDetailsAppendForward ForwardClientCertDetails = "APPEND_FORWARD"
	// When the client connection is mTLS, reset the XFCC header with the client
	// certificate information and send it to the next hop.
	ForwardClientCertDetailsSanitizeSet ForwardClientCertDetails = "SANITIZE_SET"
	// Always forward the XFCC header in the request, regardless of whether the
	// client connection is mTLS.
	ForwardClientCertDetailsAlwaysForwardOnly ForwardClientCertDetails = "ALWAYS_FORWARD_ONLY"
)

type GlobalConfig

type GlobalConfig struct {
	// Specifies pod scheduling arch(amd64, ppc64le, s390x, arm64) and weight as follows:
	//
	//	0 - Never scheduled
	//	1 - Least preferred
	//	2 - No preference
	//	3 - Most preferred
	//
	// Deprecated: replaced by the affinity k8s settings which allows architecture nodeAffinity configuration of this behavior.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Arch *ArchConfig `json:"arch,omitempty"`
	// List of certSigners to allow "approve" action in the ClusterRole
	CertSigners []string `json:"certSigners,omitempty"`
	// TODO: remove this?
	// No longer used.
	ConfigRootNamespace string `json:"configRootNamespace,omitempty"`
	// Controls whether the server-side validation is enabled.
	ConfigValidation *bool `json:"configValidation,omitempty"`
	// TODO: remove this?
	// No longer used.
	DefaultConfigVisibilitySettings []string `json:"defaultConfigVisibilitySettings,omitempty"`
	// Default k8s node selector for all the Istio control plane components
	//
	// See https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	DefaultNodeSelector map[string]string `json:"defaultNodeSelector,omitempty"`
	// Specifies the default pod disruption budget configuration.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	DefaultPodDisruptionBudget *DefaultPodDisruptionBudgetConfig `json:"defaultPodDisruptionBudget,omitempty"`
	// Default k8s resources settings for all Istio control plane components.
	//
	// See https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#resource-requests-and-limits-of-pod-and-container
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	DefaultResources *k8sv1.ResourceRequirements `json:"defaultResources,omitempty"`
	// Default node tolerations to be applied to all deployments so that all pods can be
	// scheduled to nodes with matching taints. Each component can overwrite
	// these default values by adding its tolerations block in the relevant section below
	// and setting the desired values.
	// Configure this field in case that all pods of Istio control plane are expected to
	// be scheduled to particular nodes with specified taints.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	DefaultTolerations []k8sv1.Toleration `json:"defaultTolerations,omitempty"`
	// Specifies the docker hub for Istio images.
	Hub string `json:"hub,omitempty"`
	// Specifies the image pull policy for the Istio images. one of Always, Never, IfNotPresent.
	// Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. Cannot be updated.
	//
	// More info: https://kubernetes.io/docs/concepts/containers/images#updating-images
	ImagePullPolicy *k8sv1.PullPolicy `json:"imagePullPolicy,omitempty"`
	// ImagePullSecrets for the control plane ServiceAccount, list of secrets in the same namespace
	// to use for pulling any images in pods that reference this ServiceAccount.
	// Must be set for any cluster configured with private docker registry.
	ImagePullSecrets []string `json:"imagePullSecrets,omitempty"`
	// Specifies the default namespace for the Istio control plane components.
	IstioNamespace string `json:"istioNamespace,omitempty"`
	// Specifies whether istio components should output logs in json format by adding --log_as_json argument to each container.
	LogAsJson *bool `json:"logAsJson,omitempty"`
	// Specifies the global logging level settings for the Istio control plane components.
	Logging *GlobalLoggingConfig `json:"logging,omitempty"`
	// The Mesh Identifier. It should be unique within the scope where
	// meshes will interact with each other, but it is not required to be
	// globally/universally unique. For example, if any of the following are true,
	// then two meshes must have different Mesh IDs:
	// - Meshes will have their telemetry aggregated in one place
	// - Meshes will be federated together
	// - Policy will be written referencing one mesh from the other
	//
	// If an administrator expects that any of these conditions may become true in
	// the future, they should ensure their meshes have different Mesh IDs
	// assigned.
	//
	// Within a multicluster mesh, each cluster must be (manually or auto)
	// configured to have the same Mesh ID value. If an existing cluster 'joins' a
	// multicluster mesh, it will need to be migrated to the new mesh ID. Details
	// of migration TBD, and it may be a disruptive operation to change the Mesh
	// ID post-install.
	//
	// If the mesh admin does not specify a value, Istio will use the value of the
	// mesh's Trust Domain. The best practice is to select a proper Trust Domain
	// value.
	MeshID string `json:"meshID,omitempty"`
	// Configure the mesh networks to be used by the Split Horizon EDS.
	//
	// The following example defines two networks with different endpoints association methods.
	// For `network1` all endpoints that their IP belongs to the provided CIDR range will be
	// mapped to network1. The gateway for this network example is specified by its public IP
	// address and port.
	// The second network, `network2`, in this example is defined differently with all endpoints
	// retrieved through the specified Multi-Cluster registry being mapped to network2. The
	// gateway is also defined differently with the name of the gateway service on the remote
	// cluster. The public IP for the gateway will be determined from that remote service (only
	// LoadBalancer gateway service type is currently supported, for a NodePort type gateway service,
	// it still need to be configured manually).
	//
	// meshNetworks:
	//
	//	network1:
	//	  endpoints:
	//	  - fromCidr: "192.168.0.1/24"
	//	  gateways:
	//	  - address: 1.1.1.1
	//	    port: 80
	//	network2:
	//	  endpoints:
	//	  - fromRegistry: reg1
	//	  gateways:
	//	  - registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
	//	    port: 443
	MeshNetworks map[string]Network `json:"meshNetworks,omitempty"`
	// Specifies the Configuration for Istio mesh across multiple clusters through Istio gateways.
	MultiCluster *MultiClusterConfig `json:"multiCluster,omitempty"`
	// Network defines the network this cluster belong to. This name
	// corresponds to the networks in the map of mesh networks.
	Network string `json:"network,omitempty"`
	// Custom DNS config for the pod to resolve names of services in other
	// clusters. Use this to add additional search domains, and other settings.
	// see https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#dns-config
	// This does not apply to gateway pods as they typically need a different
	// set of DNS settings than the normal application pods (e.g. in multicluster scenarios).
	PodDNSSearchNamespaces []string `json:"podDNSSearchNamespaces,omitempty"`
	// Controls whether the creation of the sidecar injector ConfigMap should be skipped.
	// Defaults to false. When set to true, the sidecar injector ConfigMap will not be created.
	OmitSidecarInjectorConfigMap *bool `json:"omitSidecarInjectorConfigMap,omitempty"`
	// Controls whether to restrict the applications namespace the controller manages;
	// If set it to false, the controller watches all namespaces.
	OneNamespace *bool `json:"oneNamespace,omitempty"`
	// Controls whether the WebhookConfiguration resource(s) should be created. The current behavior
	// of Istiod is to manage its own webhook configurations.
	// When this option is set to true, Istio Operator, instead of webhooks, manages the
	// webhook configurations. When this option is set as false, webhooks manage their
	// own webhook configurations.
	OperatorManageWebhooks *bool `json:"operatorManageWebhooks,omitempty"`
	// Specifies the k8s priorityClassName for the istio control plane components.
	//
	// See https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	PriorityClassName string `json:"priorityClassName,omitempty"`
	// Specifies how proxies are configured within Istio.
	Proxy *ProxyConfig `json:"proxy,omitempty"`
	// Specifies the Configuration for proxy_init container which sets the pods' networking to intercept the inbound/outbound traffic.
	ProxyInit *ProxyInitConfig `json:"proxy_init,omitempty"`
	// Specifies the Configuration for the SecretDiscoveryService instead of using K8S secrets to mount the certificates.
	Sds *SDSConfig `json:"sds,omitempty"`
	// Specifies the tag for the Istio docker images.
	// +kubebuilder:validation:XIntOrString
	Tag *intstr.IntOrString `json:"tag,omitempty"`
	// The variant of the Istio container images to use. Options are "debug" or "distroless". Unset will use the default for the given version.
	Variant string `json:"variant,omitempty"`
	// Specifies the Configuration for each of the supported tracers.
	Tracer *TracerConfig `json:"tracer,omitempty"`
	// Controls whether to use of Mesh Configuration Protocol to distribute configuration.
	UseMCP *bool `json:"useMCP,omitempty"`
	// Specifies the Istio control plane’s pilot Pod IP address or remote cluster DNS resolvable hostname.
	RemotePilotAddress string `json:"remotePilotAddress,omitempty"`
	// Specifies the configution of istiod
	Istiod *IstiodConfig `json:"istiod,omitempty"`
	// Configure the Pilot certificate provider.
	// Currently, four providers are supported: "kubernetes", "istiod", "custom" and "none".
	PilotCertProvider string `json:"pilotCertProvider,omitempty"`
	// Configure the policy for validating JWT.
	// This is deprecated and has no effect.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	JwtPolicy string `json:"jwtPolicy,omitempty"`
	// Specifies the configuration for Security Token Service.
	Sts *STSConfig `json:"sts,omitempty"`
	// Configures the revision this control plane is a part of
	Revision string `json:"revision,omitempty"`
	// Controls whether the in-cluster MTLS key and certs are loaded from the secret volume mounts.
	MountMtlsCerts *bool `json:"mountMtlsCerts,omitempty"`
	// The address of the CA for CSR.
	CaAddress string `json:"caAddress,omitempty"`
	// Controls whether one external istiod is enabled.
	ExternalIstiod *bool `json:"externalIstiod,omitempty"`
	// Controls whether a remote cluster is the config cluster for an external istiod
	ConfigCluster *bool `json:"configCluster,omitempty"`
	// The name of the CA for workloads.
	// For example, when caName=GkeWorkloadCertificate, GKE workload certificates
	// will be used as the certificates for workloads.
	// The default value is "" and when caName="", the CA will be configured by other
	// mechanisms (e.g., environmental variable CA_PROVIDER).
	CaName string `json:"caName,omitempty"`
	// TODO: remove this?
	// No longer used.
	Autoscalingv2API *bool `json:"autoscalingv2API,omitempty"`
	// Platform in which Istio is deployed. Possible values are: "openshift" and "gcp"
	// An empty value means it is a vanilla Kubernetes distribution, therefore no special
	// treatment will be considered.
	Platform string `json:"platform,omitempty"`
	// Defines which IP family to use for single stack or the order of IP families for dual-stack.
	// Valid list items are "IPv4", "IPv6".
	// More info: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
	IpFamilies []string `json:"ipFamilies,omitempty"`
	// Controls whether Services are configured to use IPv4, IPv6, or both. Valid options
	// are PreferDualStack, RequireDualStack, and SingleStack.
	// More info: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
	IpFamilyPolicy string `json:"ipFamilyPolicy,omitempty"` // The next available key is 72
}

Global Configuration for Istio components.

func (*GlobalConfig) DeepCopy

func (in *GlobalConfig) DeepCopy() *GlobalConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GlobalConfig.

func (*GlobalConfig) DeepCopyInto

func (in *GlobalConfig) DeepCopyInto(out *GlobalConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type GlobalLoggingConfig

type GlobalLoggingConfig struct {
	// Comma-separated minimum per-scope logging level of messages to output, in the form of <scope>:<level>,<scope>:<level>
	// The control plane has different scopes depending on component, but can configure default log level across all components
	// If empty, default scope and level will be used as configured in code
	Level string `json:"level,omitempty"`
}

GlobalLoggingConfig specifies the global logging level settings for the Istio control plane components.

func (*GlobalLoggingConfig) DeepCopy

func (in *GlobalLoggingConfig) DeepCopy() *GlobalLoggingConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GlobalLoggingConfig.

func (*GlobalLoggingConfig) DeepCopyInto

func (in *GlobalLoggingConfig) DeepCopyInto(out *GlobalLoggingConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type HTTPRetry

type HTTPRetry struct {
	// Number of retries to be allowed for a given request. The interval
	// between retries will be determined automatically (25ms+). When request
	// `timeout` of the [HTTP route](https://istio.io/docs/reference/config/networking/virtual-service/#HTTPRoute)
	// or `per_try_timeout` is configured, the actual number of retries attempted also depends on
	// the specified request `timeout` and `per_try_timeout` values. MUST BE >= 0. If `0`, retries will be disabled.
	// The maximum possible number of requests made will be 1 + `attempts`.
	Attempts int32 `json:"attempts,omitempty"`
	// Timeout per attempt for a given request, including the initial call and any retries. Format: 1h/1m/1s/1ms. MUST BE >=1ms.
	// Default is same value as request
	// `timeout` of the [HTTP route](https://istio.io/docs/reference/config/networking/virtual-service/#HTTPRoute),
	// which means no timeout.
	PerTryTimeout *metav1.Duration `json:"perTryTimeout,omitempty"`
	// Specifies the conditions under which retry takes place.
	// One or more policies can be specified using a ‘,’ delimited list.
	// If `retry_on` specifies a valid HTTP status, it will be added to retriable_status_codes retry policy.
	// See the [retry policies](https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/router_filter#x-envoy-retry-on)
	// and [gRPC retry policies](https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/router_filter#x-envoy-retry-grpc-on) for more details.
	RetryOn string `json:"retryOn,omitempty"`
	// Flag to specify whether the retries should retry to other localities.
	// See the [retry plugin configuration](https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/http/http_connection_management#retry-plugin-configuration) for more details.
	RetryRemoteLocalities *bool `json:"retryRemoteLocalities,omitempty"`
}

Describes the retry policy to use when a HTTP request fails. For example, the following rule sets the maximum number of retries to 3 when calling ratings:v1 service, with a 2s timeout per retry attempt. A retry will be attempted if there is a connect-failure, refused_stream or when the upstream server responds with Service Unavailable(503).

{{<tabset category-name="example">}} {{<tab name="v1alpha3" category-value="v1alpha3">}} ```yaml apiVersion: networking.istio.io/v1alpha3 kind: VirtualService metadata:

name: ratings-route

spec:

hosts:
- ratings.prod.svc.cluster.local
http:
- route:
  - destination:
      host: ratings.prod.svc.cluster.local
      subset: v1
  retries:
    attempts: 3
    perTryTimeout: 2s
    retryOn: connect-failure,refused-stream,503

``` {{</tab>}}

{{<tab name="v1beta1" category-value="v1beta1">}} ```yaml apiVersion: networking.istio.io/v1beta1 kind: VirtualService metadata:

name: ratings-route

spec:

hosts:
- ratings.prod.svc.cluster.local
http:
- route:
  - destination:
      host: ratings.prod.svc.cluster.local
      subset: v1
  retries:
    attempts: 3
    perTryTimeout: 2s
    retryOn: gateway-error,connect-failure,refused-stream

``` {{</tab>}} {{</tabset>}}

func (*HTTPRetry) DeepCopy

func (in *HTTPRetry) DeepCopy() *HTTPRetry

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HTTPRetry.

func (*HTTPRetry) DeepCopyInto

func (in *HTTPRetry) DeepCopyInto(out *HTTPRetry)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IngressControllerMode

type IngressControllerMode string

Mode for the ingress controller. +kubebuilder:validation:Enum=UNSPECIFIED;DEFAULT;STRICT;OFF

const (
	// Unspecified Istio ingress controller.
	IngressControllerModeUnspecified IngressControllerMode = "UNSPECIFIED"
	// Selects all Ingress resources, with or without Istio annotation.
	IngressControllerModeDefault IngressControllerMode = "DEFAULT"
	// Selects only resources with istio annotation.
	IngressControllerModeStrict IngressControllerMode = "STRICT"
	// No ingress or sync.
	IngressControllerModeOff IngressControllerMode = "OFF"
)

type Istio

type Istio struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`

	// +kubebuilder:default={version: "v1.21.0", namespace: "istio-system", updateStrategy: {type:"InPlace"}}
	Spec IstioSpec `json:"spec,omitempty"`

	Status IstioStatus `json:"status,omitempty"`
}

Istio represents an Istio Service Mesh deployment consisting of one or more control plane instances (represented by one or more IstioRevision objects). To deploy an Istio Service Mesh, a user creates an Istio object with the desired Istio version and configuration. The operator then creates an IstioRevision object, which in turn creates the underlying Deployment objects for istiod and other control plane components, similar to how a Deployment object in Kubernetes creates ReplicaSets that create the Pods.

func (*Istio) DeepCopy

func (in *Istio) DeepCopy() *Istio

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Istio.

func (*Istio) DeepCopyInto

func (in *Istio) DeepCopyInto(out *Istio)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*Istio) DeepCopyObject

func (in *Istio) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioCNI

type IstioCNI struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`

	// +kubebuilder:default={version: "v1.21.0", namespace: "istio-cni"}
	Spec IstioCNISpec `json:"spec,omitempty"`

	Status IstioCNIStatus `json:"status,omitempty"`
}

IstioCNI represents a deployment of the Istio CNI component.

func (*IstioCNI) DeepCopy

func (in *IstioCNI) DeepCopy() *IstioCNI

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCNI.

func (*IstioCNI) DeepCopyInto

func (in *IstioCNI) DeepCopyInto(out *IstioCNI)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioCNI) DeepCopyObject

func (in *IstioCNI) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioCNICondition

type IstioCNICondition struct {
	// The type of this condition.
	Type IstioCNIConditionType `json:"type,omitempty"`

	// The status of this condition. Can be True, False or Unknown.
	Status metav1.ConditionStatus `json:"status,omitempty"`

	// Unique, single-word, CamelCase reason for the condition's last transition.
	Reason IstioCNIConditionReason `json:"reason,omitempty"`

	// Human-readable message indicating details about the last transition.
	Message string `json:"message,omitempty"`

	// Last time the condition transitioned from one status to another.
	LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty"`
}

IstioCNICondition represents a specific observation of the IstioCNI object's state.

func (*IstioCNICondition) DeepCopy

func (in *IstioCNICondition) DeepCopy() *IstioCNICondition

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCNICondition.

func (*IstioCNICondition) DeepCopyInto

func (in *IstioCNICondition) DeepCopyInto(out *IstioCNICondition)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioCNIConditionReason

type IstioCNIConditionReason string

IstioCNIConditionReason represents a short message indicating how the condition came to be in its present state.

const (
	// IstioCNIReasonHealthy indicates that the control plane is fully reconciled and that all components are ready.
	IstioCNIReasonHealthy IstioCNIConditionReason = "Healthy"
)

type IstioCNIConditionType

type IstioCNIConditionType string

IstioCNIConditionType represents the type of the condition. Condition stages are: Installed, Reconciled, Ready

type IstioCNIList

type IstioCNIList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []IstioCNI `json:"items"`
}

IstioCNIList contains a list of IstioCNI

func (*IstioCNIList) DeepCopy

func (in *IstioCNIList) DeepCopy() *IstioCNIList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCNIList.

func (*IstioCNIList) DeepCopyInto

func (in *IstioCNIList) DeepCopyInto(out *IstioCNIList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioCNIList) DeepCopyObject

func (in *IstioCNIList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioCNISpec

type IstioCNISpec struct {
	// +sail:version
	// Defines the version of Istio to install.
	// Must be one of: v1.21.0, latest.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=1,displayName="Istio Version",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:fieldGroup:General", "urn:alm:descriptor:com.tectonic.ui:select:v1.21.0", "urn:alm:descriptor:com.tectonic.ui:select:latest"}
	// +kubebuilder:validation:Enum=v1.21.0;latest
	// +kubebuilder:default=v1.21.0
	Version string `json:"version"`

	// +sail:profile
	// The built-in installation configuration profile to use.
	// The 'default' profile is always applied. On OpenShift, the 'openshift' profile is also applied on top of 'default'.
	// Must be one of: ambient, default, demo, empty, external, minimal, openshift-ambient, openshift, preview, remote, stable.
	// +++PROFILES-DROPDOWN-HIDDEN-UNTIL-WE-FULLY-IMPLEMENT-THEM+++operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Profile",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:fieldGroup:General", "urn:alm:descriptor:com.tectonic.ui:select:ambient", "urn:alm:descriptor:com.tectonic.ui:select:default", "urn:alm:descriptor:com.tectonic.ui:select:demo", "urn:alm:descriptor:com.tectonic.ui:select:empty", "urn:alm:descriptor:com.tectonic.ui:select:external", "urn:alm:descriptor:com.tectonic.ui:select:minimal", "urn:alm:descriptor:com.tectonic.ui:select:preview", "urn:alm:descriptor:com.tectonic.ui:select:remote"}
	// +operator-sdk:csv:customresourcedefinitions:type=spec,xDescriptors={"urn:alm:descriptor:com.tectonic.ui:hidden"}
	// +kubebuilder:validation:Enum=ambient;default;demo;empty;external;minimal;openshift-ambient;openshift;preview;remote;stable
	Profile string `json:"profile,omitempty"`

	// Namespace to which the Istio CNI component should be installed.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,xDescriptors={"urn:alm:descriptor:io.kubernetes:Namespace"}
	// +kubebuilder:default=istio-cni
	Namespace string `json:"namespace"`

	// Defines the values to be passed to the Helm charts when installing Istio CNI.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Helm Values"
	Values *CNIValues `json:"values,omitempty"`
}

IstioCNISpec defines the desired state of IstioCNI

func (*IstioCNISpec) DeepCopy

func (in *IstioCNISpec) DeepCopy() *IstioCNISpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCNISpec.

func (*IstioCNISpec) DeepCopyInto

func (in *IstioCNISpec) DeepCopyInto(out *IstioCNISpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioCNIStatus

type IstioCNIStatus struct {
	// ObservedGeneration is the most recent generation observed for this
	// IstioCNI object. It corresponds to the object's generation, which is
	// updated on mutation by the API Server. The information in the status
	// pertains to this particular generation of the object.
	ObservedGeneration int64 `json:"observedGeneration,omitempty"`

	// Represents the latest available observations of the object's current state.
	Conditions []IstioCNICondition `json:"conditions,omitempty"`

	// Reports the current state of the object.
	State IstioCNIConditionReason `json:"state,omitempty"`
}

IstioCNIStatus defines the observed state of IstioCNI

func (*IstioCNIStatus) DeepCopy

func (in *IstioCNIStatus) DeepCopy() *IstioCNIStatus

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCNIStatus.

func (*IstioCNIStatus) DeepCopyInto

func (in *IstioCNIStatus) DeepCopyInto(out *IstioCNIStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioCNIStatus) GetCondition

func (s *IstioCNIStatus) GetCondition(conditionType IstioCNIConditionType) IstioCNICondition

GetCondition returns the condition of the specified type

func (*IstioCNIStatus) SetCondition

func (s *IstioCNIStatus) SetCondition(condition IstioCNICondition)

SetCondition sets a specific condition in the list of conditions

type IstioCondition

type IstioCondition struct {
	// The type of this condition.
	Type IstioConditionType `json:"type,omitempty"`

	// The status of this condition. Can be True, False or Unknown.
	Status metav1.ConditionStatus `json:"status,omitempty"`

	// Unique, single-word, CamelCase reason for the condition's last transition.
	Reason IstioConditionReason `json:"reason,omitempty"`

	// Human-readable message indicating details about the last transition.
	Message string `json:"message,omitempty"`

	// Last time the condition transitioned from one status to another.
	LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty"`
}

IstioCondition represents a specific observation of the IstioCondition object's state.

func (*IstioCondition) DeepCopy

func (in *IstioCondition) DeepCopy() *IstioCondition

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioCondition.

func (*IstioCondition) DeepCopyInto

func (in *IstioCondition) DeepCopyInto(out *IstioCondition)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioConditionReason

type IstioConditionReason string

IstioConditionReason represents a short message indicating how the condition came to be in its present state.

const (
	// IstioReasonHealthy indicates that the control plane is fully reconciled and that all components are ready.
	IstioReasonHealthy IstioConditionReason = "Healthy"
)

type IstioConditionType

type IstioConditionType string

IstioConditionType represents the type of the condition. Condition stages are: Installed, Reconciled, Ready

type IstioList

type IstioList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []Istio `json:"items"`
}

IstioList contains a list of Istio

func (*IstioList) DeepCopy

func (in *IstioList) DeepCopy() *IstioList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioList.

func (*IstioList) DeepCopyInto

func (in *IstioList) DeepCopyInto(out *IstioList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioList) DeepCopyObject

func (in *IstioList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioRevision

type IstioRevision struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`

	Spec   IstioRevisionSpec   `json:"spec,omitempty"`
	Status IstioRevisionStatus `json:"status,omitempty"`
}

IstioRevision represents a single revision of an Istio Service Mesh deployment. Users shouldn't create IstioRevision objects directly. Instead, they should create an Istio object and allow the operator to create the underlying IstioRevision object(s). +kubebuilder:validation:XValidation:rule="self.metadata.name == 'default' ? (!has(self.spec.values.revision) || size(self.spec.values.revision) == 0) : self.spec.values.revision == self.metadata.name",message="spec.values.revision must match metadata.name"

func (*IstioRevision) DeepCopy

func (in *IstioRevision) DeepCopy() *IstioRevision

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioRevision.

func (*IstioRevision) DeepCopyInto

func (in *IstioRevision) DeepCopyInto(out *IstioRevision)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioRevision) DeepCopyObject

func (in *IstioRevision) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioRevisionCondition

type IstioRevisionCondition struct {
	// The type of this condition.
	Type IstioRevisionConditionType `json:"type,omitempty"`

	// The status of this condition. Can be True, False or Unknown.
	Status metav1.ConditionStatus `json:"status,omitempty"`

	// Unique, single-word, CamelCase reason for the condition's last transition.
	Reason IstioRevisionConditionReason `json:"reason,omitempty"`

	// Human-readable message indicating details about the last transition.
	Message string `json:"message,omitempty"`

	// Last time the condition transitioned from one status to another.
	LastTransitionTime metav1.Time `json:"lastTransitionTime,omitempty"`
}

IstioRevisionCondition represents a specific observation of the IstioRevision object's state.

func (*IstioRevisionCondition) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioRevisionCondition.

func (*IstioRevisionCondition) DeepCopyInto

func (in *IstioRevisionCondition) DeepCopyInto(out *IstioRevisionCondition)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioRevisionConditionReason

type IstioRevisionConditionReason string

IstioRevisionConditionReason represents a short message indicating how the condition came to be in its present state.

const (
	// IstioRevisionReasonHealthy indicates that the control plane is fully reconciled and that all components are ready.
	IstioRevisionReasonHealthy IstioRevisionConditionReason = "Healthy"
)

type IstioRevisionConditionType

type IstioRevisionConditionType string

IstioRevisionConditionType represents the type of the condition. Condition stages are: Installed, Reconciled, Ready

type IstioRevisionList

type IstioRevisionList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []IstioRevision `json:"items"`
}

IstioRevisionList contains a list of IstioRevision

func (*IstioRevisionList) DeepCopy

func (in *IstioRevisionList) DeepCopy() *IstioRevisionList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioRevisionList.

func (*IstioRevisionList) DeepCopyInto

func (in *IstioRevisionList) DeepCopyInto(out *IstioRevisionList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioRevisionList) DeepCopyObject

func (in *IstioRevisionList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

type IstioRevisionSpec

type IstioRevisionSpec struct {
	// +sail:version
	// Defines the version of Istio to install.
	// Must be one of: v1.21.0, latest.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=1,displayName="Istio Version",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:fieldGroup:General", "urn:alm:descriptor:com.tectonic.ui:select:v1.21.0", "urn:alm:descriptor:com.tectonic.ui:select:latest"}
	// +kubebuilder:validation:Enum=v1.21.0;latest
	Version string `json:"version"`

	// Namespace to which the Istio components should be installed.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,xDescriptors={"urn:alm:descriptor:io.kubernetes:Namespace"}
	Namespace string `json:"namespace"`

	// Defines the values to be passed to the Helm charts when installing Istio.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Helm Values"
	Values *Values `json:"values,omitempty"`
}

IstioRevisionSpec defines the desired state of IstioRevision +kubebuilder:validation:XValidation:rule="self.values.global.istioNamespace == self.__namespace__",message="spec.values.global.istioNamespace must match spec.namespace"

func (*IstioRevisionSpec) DeepCopy

func (in *IstioRevisionSpec) DeepCopy() *IstioRevisionSpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioRevisionSpec.

func (*IstioRevisionSpec) DeepCopyInto

func (in *IstioRevisionSpec) DeepCopyInto(out *IstioRevisionSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioRevisionStatus

type IstioRevisionStatus struct {
	// ObservedGeneration is the most recent generation observed for this
	// IstioRevision object. It corresponds to the object's generation, which is
	// updated on mutation by the API Server. The information in the status
	// pertains to this particular generation of the object.
	ObservedGeneration int64 `json:"observedGeneration,omitempty"`

	// Represents the latest available observations of the object's current state.
	Conditions []IstioRevisionCondition `json:"conditions,omitempty"`

	// Reports the current state of the object.
	State IstioRevisionConditionReason `json:"state,omitempty"`
}

IstioRevisionStatus defines the observed state of IstioRevision

func (*IstioRevisionStatus) DeepCopy

func (in *IstioRevisionStatus) DeepCopy() *IstioRevisionStatus

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioRevisionStatus.

func (*IstioRevisionStatus) DeepCopyInto

func (in *IstioRevisionStatus) DeepCopyInto(out *IstioRevisionStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioRevisionStatus) GetCondition

GetCondition returns the condition of the specified type

func (*IstioRevisionStatus) SetCondition

func (s *IstioRevisionStatus) SetCondition(condition IstioRevisionCondition)

SetCondition sets a specific condition in the list of conditions

type IstioSpec

type IstioSpec struct {
	// +sail:version
	// Defines the version of Istio to install.
	// Must be one of: v1.21.0, latest.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=1,displayName="Istio Version",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:fieldGroup:General", "urn:alm:descriptor:com.tectonic.ui:select:v1.21.0", "urn:alm:descriptor:com.tectonic.ui:select:latest"}
	// +kubebuilder:validation:Enum=v1.21.0;latest
	// +kubebuilder:default=v1.21.0
	Version string `json:"version"`

	// Defines the update strategy to use when the version in the Istio CR is updated.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Update Strategy"
	// +kubebuilder:default={type: "InPlace"}
	UpdateStrategy *IstioUpdateStrategy `json:"updateStrategy,omitempty"`

	// +sail:profile
	// The built-in installation configuration profile to use.
	// The 'default' profile is always applied. On OpenShift, the 'openshift' profile is also applied on top of 'default'.
	// Must be one of: ambient, default, demo, empty, external, minimal, openshift-ambient, openshift, preview, remote, stable.
	// +++PROFILES-DROPDOWN-HIDDEN-UNTIL-WE-FULLY-IMPLEMENT-THEM+++operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Profile",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:fieldGroup:General", "urn:alm:descriptor:com.tectonic.ui:select:ambient", "urn:alm:descriptor:com.tectonic.ui:select:default", "urn:alm:descriptor:com.tectonic.ui:select:demo", "urn:alm:descriptor:com.tectonic.ui:select:empty", "urn:alm:descriptor:com.tectonic.ui:select:external", "urn:alm:descriptor:com.tectonic.ui:select:minimal", "urn:alm:descriptor:com.tectonic.ui:select:preview", "urn:alm:descriptor:com.tectonic.ui:select:remote"}
	// +operator-sdk:csv:customresourcedefinitions:type=spec,xDescriptors={"urn:alm:descriptor:com.tectonic.ui:hidden"}
	// +kubebuilder:validation:Enum=ambient;default;demo;empty;external;minimal;openshift-ambient;openshift;preview;remote;stable
	Profile string `json:"profile,omitempty"`

	// Namespace to which the Istio components should be installed.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,xDescriptors={"urn:alm:descriptor:io.kubernetes:Namespace"}
	// +kubebuilder:default=istio-system
	Namespace string `json:"namespace"`

	// Defines the values to be passed to the Helm charts when installing Istio.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,displayName="Helm Values"
	Values *Values `json:"values,omitempty"`
}

IstioSpec defines the desired state of Istio +kubebuilder:validation:XValidation:rule="!has(self.values) || !has(self.values.global) || !has(self.values.global.istioNamespace) || self.values.global.istioNamespace == self.__namespace__",message="spec.values.global.istioNamespace must match spec.namespace"

func (*IstioSpec) DeepCopy

func (in *IstioSpec) DeepCopy() *IstioSpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioSpec.

func (*IstioSpec) DeepCopyInto

func (in *IstioSpec) DeepCopyInto(out *IstioSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstioStatus

type IstioStatus struct {
	// ObservedGeneration is the most recent generation observed for this
	// Istio object. It corresponds to the object's generation, which is
	// updated on mutation by the API Server. The information in the status
	// pertains to this particular generation of the object.
	ObservedGeneration int64 `json:"observedGeneration,omitempty"`

	// Represents the latest available observations of the object's current state.
	Conditions []IstioCondition `json:"conditions,omitempty"`

	// Reports the current state of the object.
	State IstioConditionReason `json:"state,omitempty"`

	// Reports information about the underlying IstioRevisions.
	Revisions RevisionSummary `json:"revisions,omitempty"`
}

IstioStatus defines the observed state of Istio

func (*IstioStatus) DeepCopy

func (in *IstioStatus) DeepCopy() *IstioStatus

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioStatus.

func (*IstioStatus) DeepCopyInto

func (in *IstioStatus) DeepCopyInto(out *IstioStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*IstioStatus) GetCondition

func (s *IstioStatus) GetCondition(conditionType IstioConditionType) IstioCondition

GetCondition returns the condition of the specified type

func (*IstioStatus) SetCondition

func (s *IstioStatus) SetCondition(condition IstioCondition)

SetCondition sets a specific condition in the list of conditions

type IstioUpdateStrategy

type IstioUpdateStrategy struct {
	// Type of strategy to use. Can be "InPlace" or "RevisionBased". When the "InPlace" strategy
	// is used, the existing Istio control plane is updated in-place. The workloads therefore
	// don't need to be moved from one control plane instance to another. When the "RevisionBased"
	// strategy is used, a new Istio control plane instance is created for every change to the
	// Istio.spec.version field. The old control plane remains in place until all workloads have
	// been moved to the new control plane instance.
	//
	// The "InPlace" strategy is the default.	TODO: change default to "RevisionBased"
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=1,displayName="Type",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:select:InPlace", "urn:alm:descriptor:com.tectonic.ui:select:RevisionBased"}
	// +kubebuilder:validation:Enum=InPlace;RevisionBased
	// +kubebuilder:default=InPlace
	Type UpdateStrategyType `json:"type,omitempty"`

	// Defines how many seconds the operator should wait before removing a non-active revision after all
	// the workloads have stopped using it. You may want to set this value on the order of minutes.
	// The minimum and the default value is 30.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=2,displayName="Inactive Revision Deletion Grace Period (seconds)",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:number"}
	// +kubebuilder:validation:Minimum=30
	InactiveRevisionDeletionGracePeriodSeconds *int64 `json:"inactiveRevisionDeletionGracePeriodSeconds,omitempty"`

	// Defines whether the workloads should be moved from one control plane instance to another
	// automatically. If updateWorkloads is true, the operator moves the workloads from the old
	// control plane instance to the new one after the new control plane is ready.
	// If updateWorkloads is false, the user must move the workloads manually by updating the
	// istio.io/rev labels on the namespace and/or the pods.
	// Defaults to false.
	// +operator-sdk:csv:customresourcedefinitions:type=spec,order=3,displayName="Update Workloads Automatically",xDescriptors={"urn:alm:descriptor:com.tectonic.ui:booleanSwitch"}
	UpdateWorkloads bool `json:"updateWorkloads,omitempty"`
}

IstioUpdateStrategy defines how the control plane should be updated when the version in the Istio CR is updated.

func (*IstioUpdateStrategy) DeepCopy

func (in *IstioUpdateStrategy) DeepCopy() *IstioUpdateStrategy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstioUpdateStrategy.

func (*IstioUpdateStrategy) DeepCopyInto

func (in *IstioUpdateStrategy) DeepCopyInto(out *IstioUpdateStrategy)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstiodConfig

type IstiodConfig struct {
	// If enabled, istiod will perform config analysis
	EnableAnalysis *bool `json:"enableAnalysis,omitempty"`
}

func (*IstiodConfig) DeepCopy

func (in *IstiodConfig) DeepCopy() *IstiodConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstiodConfig.

func (*IstiodConfig) DeepCopyInto

func (in *IstiodConfig) DeepCopyInto(out *IstiodConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type IstiodRemoteConfig

type IstiodRemoteConfig struct {
	// URL to use for sidecar injector webhook.
	InjectionURL string `json:"injectionURL,omitempty"`
	// Path to use for the sidecar injector webhook service.
	InjectionPath string `json:"injectionPath,omitempty"`
}

func (*IstiodRemoteConfig) DeepCopy

func (in *IstiodRemoteConfig) DeepCopy() *IstiodRemoteConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IstiodRemoteConfig.

func (*IstiodRemoteConfig) DeepCopyInto

func (in *IstiodRemoteConfig) DeepCopyInto(out *IstiodRemoteConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type LocalityLoadBalancerSetting

type LocalityLoadBalancerSetting struct {
	// Optional: only one of distribute, failover or failoverPriority can be set.
	// Explicitly specify loadbalancing weight across different zones and geographical locations.
	// Refer to [Locality weighted load balancing](https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/upstream/load_balancing/locality_weight)
	// If empty, the locality weight is set according to the endpoints number within it.
	Distribute []*LocalityLoadBalancerSettingDistribute `json:"distribute,omitempty"`
	// Optional: only one of distribute, failover or failoverPriority can be set.
	// Explicitly specify the region traffic will land on when endpoints in local region becomes unhealthy.
	// Should be used together with OutlierDetection to detect unhealthy endpoints.
	// Note: if no OutlierDetection specified, this will not take effect.
	Failover []*LocalityLoadBalancerSettingFailover `json:"failover,omitempty"`
	// failoverPriority is an ordered list of labels used to sort endpoints to do priority based load balancing.
	// This is to support traffic failover across different groups of endpoints.
	// Two kinds of labels can be specified:
	//
	//   - Specify only label keys `[key1, key2, key3]`, istio would compare the label values of client with endpoints.
	//     Suppose there are total N label keys `[key1, key2, key3, ...keyN]` specified:
	//
	//     1. Endpoints matching all N labels with the client proxy have priority P(0) i.e. the highest priority.
	//     2. Endpoints matching the first N-1 labels with the client proxy have priority P(1) i.e. second highest priority.
	//     3. By extension of this logic, endpoints matching only the first label with the client proxy has priority P(N-1) i.e. second lowest priority.
	//     4. All the other endpoints have priority P(N) i.e. lowest priority.
	//
	//   - Specify labels with key and value `[key1=value1, key2=value2, key3=value3]`, istio would compare the labels with endpoints.
	//     Suppose there are total N labels `[key1=value1, key2=value2, key3=value3, ...keyN=valueN]` specified:
	//
	//     1. Endpoints matching all N labels have priority P(0) i.e. the highest priority.
	//     2. Endpoints matching the first N-1 labels have priority P(1) i.e. second highest priority.
	//     3. By extension of this logic, endpoints matching only the first label has priority P(N-1) i.e. second lowest priority.
	//     4. All the other endpoints have priority P(N) i.e. lowest priority.
	//
	// Note: For a label to be considered for match, the previous labels must match, i.e. nth label would be considered matched only if first n-1 labels match.
	//
	// It can be any label specified on both client and server workloads.
	// The following labels which have special semantic meaning are also supported:
	//
	//   - `topology.istio.io/network` is used to match the network metadata of an endpoint, which can be specified by pod/namespace label `topology.istio.io/network`, sidecar env `ISTIO_META_NETWORK` or MeshNetworks.
	//   - `topology.istio.io/cluster` is used to match the clusterID of an endpoint, which can be specified by pod label `topology.istio.io/cluster` or pod env `ISTIO_META_CLUSTER_ID`.
	//   - `topology.kubernetes.io/region` is used to match the region metadata of an endpoint, which maps to Kubernetes node label `topology.kubernetes.io/region` or the deprecated label `failure-domain.beta.kubernetes.io/region`.
	//   - `topology.kubernetes.io/zone` is used to match the zone metadata of an endpoint, which maps to Kubernetes node label `topology.kubernetes.io/zone` or the deprecated label `failure-domain.beta.kubernetes.io/zone`.
	//   - `topology.istio.io/subzone` is used to match the subzone metadata of an endpoint, which maps to Istio node label `topology.istio.io/subzone`.
	//
	// The below topology config indicates the following priority levels:
	//
	// “`yaml
	// failoverPriority:
	// - "topology.istio.io/network"
	// - "topology.kubernetes.io/region"
	// - "topology.kubernetes.io/zone"
	// - "topology.istio.io/subzone"
	// “`
	//
	// 1. endpoints match same [network, region, zone, subzone] label with the client proxy have the highest priority.
	// 2. endpoints have same [network, region, zone] label but different [subzone] label with the client proxy have the second highest priority.
	// 3. endpoints have same [network, region] label but different [zone] label with the client proxy have the third highest priority.
	// 4. endpoints have same [network] but different [region] labels with the client proxy have the fourth highest priority.
	// 5. all the other endpoints have the same lowest priority.
	//
	// Suppose a service associated endpoints reside in multi clusters, the below example represents:
	// 1. endpoints in `clusterA` and has `version=v1` label have P(0) priority.
	// 2. endpoints not in `clusterA` but has `version=v1` label have P(1) priority.
	// 2. all the other endpoints have P(2) priority.
	//
	// “`yaml
	// failoverPriority:
	// - "version=v1"
	// - "topology.istio.io/cluster=clusterA"
	// “`
	//
	// Optional: only one of distribute, failover or failoverPriority can be set.
	// And it should be used together with `OutlierDetection` to detect unhealthy endpoints, otherwise has no effect.
	FailoverPriority []string `json:"failoverPriority,omitempty"`
	// enable locality load balancing, this is DestinationRule-level and will override mesh wide settings in entirety.
	// e.g. true means that turn on locality load balancing for this DestinationRule no matter what mesh wide settings is.
	Enabled *bool `json:"enabled,omitempty"`
}

Locality-weighted load balancing allows administrators to control the distribution of traffic to endpoints based on the localities of where the traffic originates and where it will terminate. These localities are specified using arbitrary labels that designate a hierarchy of localities in {region}/{zone}/{sub-zone} form. For additional detail refer to [Locality Weight](https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/upstream/load_balancing/locality_weight) The following example shows how to setup locality weights mesh-wide.

Given a mesh with workloads and their service deployed to "us-west/zone1/*" and "us-west/zone2/*". This example specifies that when traffic accessing a service originates from workloads in "us-west/zone1/*", 80% of the traffic will be sent to endpoints in "us-west/zone1/*", i.e the same zone, and the remaining 20% will go to endpoints in "us-west/zone2/*". This setup is intended to favor routing traffic to endpoints in the same locality. A similar setting is specified for traffic originating in "us-west/zone2/*".

```yaml

distribute:
  - from: us-west/zone1/*
    to:
      "us-west/zone1/*": 80
      "us-west/zone2/*": 20
  - from: us-west/zone2/*
    to:
      "us-west/zone1/*": 20
      "us-west/zone2/*": 80

```

If the goal of the operator is not to distribute load across zones and regions but rather to restrict the regionality of failover to meet other operational requirements an operator can set a 'failover' policy instead of a 'distribute' policy.

The following example sets up a locality failover policy for regions. Assume a service resides in zones within us-east, us-west & eu-west this example specifies that when endpoints within us-east become unhealthy traffic should failover to endpoints in any zone or sub-zone within eu-west and similarly us-west should failover to us-east.

```yaml

failover:
  - from: us-east
    to: eu-west
  - from: us-west
    to: us-east

``` Locality load balancing settings.

func (*LocalityLoadBalancerSetting) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LocalityLoadBalancerSetting.

func (*LocalityLoadBalancerSetting) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type LocalityLoadBalancerSettingDistribute

type LocalityLoadBalancerSettingDistribute struct {
	// Originating locality, '/' separated, e.g. 'region/zone/sub_zone'.
	From string `json:"from,omitempty"`
	// Map of upstream localities to traffic distribution weights. The sum of
	// all weights should be 100. Any locality not present will
	// receive no traffic.
	To map[string]uint32 `json:"to,omitempty"`
}

Describes how traffic originating in the 'from' zone or sub-zone is distributed over a set of 'to' zones. Syntax for specifying a zone is {region}/{zone}/{sub-zone} and terminal wildcards are allowed on any segment of the specification. Examples:

`*` - matches all localities

`us-west/*` - all zones and sub-zones within the us-west region

`us-west/zone-1/*` - all sub-zones within us-west/zone-1

func (*LocalityLoadBalancerSettingDistribute) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LocalityLoadBalancerSettingDistribute.

func (*LocalityLoadBalancerSettingDistribute) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type LocalityLoadBalancerSettingFailover

type LocalityLoadBalancerSettingFailover struct {
	// Originating region.
	From string `json:"from,omitempty"`
	// Destination region the traffic will fail over to when endpoints in
	// the 'from' region becomes unhealthy.
	To string `json:"to,omitempty"`
}

Specify the traffic failover policy across regions. Since zone and sub-zone failover is supported by default this only needs to be specified for regions when the operator needs to constrain traffic failover so that the default behavior of failing over to any endpoint globally does not apply. This is useful when failing over traffic across regions would not improve service health or may need to be restricted for other reasons like regulatory controls.

func (*LocalityLoadBalancerSettingFailover) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LocalityLoadBalancerSettingFailover.

func (*LocalityLoadBalancerSettingFailover) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfig

type MeshConfig struct {
	// Port on which Envoy should listen for all outbound traffic to other services.
	// Default port is 15001.
	ProxyListenPort int32 `json:"proxyListenPort,omitempty"`
	// Port on which Envoy should listen for all inbound traffic to the pod/vm will be captured to.
	// Default port is 15006.
	ProxyInboundListenPort int32 `json:"proxyInboundListenPort,omitempty"`
	// Port on which Envoy should listen for HTTP PROXY requests if set.
	ProxyHttpPort int32 `json:"proxyHttpPort,omitempty"`
	// Connection timeout used by Envoy. (MUST BE >=1ms)
	// Default timeout is 10s.
	ConnectTimeout *metav1.Duration `json:"connectTimeout,omitempty"`
	// $hide_from_docs
	// Automatic protocol detection uses a set of heuristics to
	// determine whether the connection is using TLS or not (on the
	// server side), as well as the application protocol being used
	// (e.g., http vs tcp). These heuristics rely on the client sending
	// the first bits of data. For server first protocols like MySQL,
	// MongoDB, etc. Envoy will timeout on the protocol detection after
	// the specified period, defaulting to non mTLS plain TCP
	// traffic. Set this field to tweak the period that Envoy will wait
	// for the client to send the first bits of data. (MUST BE >=1ms or
	// 0s to disable). Default detection timeout is 0s (no timeout).
	//
	// Setting a timeout is not recommended nor safe. Even high timeouts (>5s) will be hit
	// occasionally, and when they occur the result is typically broken traffic that may not
	// recover on its own. Exceptionally high values might solve this, but injecting 60s delays
	// onto new connections is generally not tenable anyways.
	ProtocolDetectionTimeout *metav1.Duration `json:"protocolDetectionTimeout,omitempty"`
	// If set then set `SO_KEEPALIVE` on the socket to enable TCP Keepalives.
	TcpKeepalive *ConnectionPoolSettingsTCPSettingsTcpKeepalive `json:"tcpKeepalive,omitempty"`
	// Class of ingress resources to be processed by Istio ingress
	// controller. This corresponds to the value of
	// `kubernetes.io/ingress.class` annotation.
	IngressClass string `json:"ingressClass,omitempty"`
	// Name of the Kubernetes service used for the istio ingress controller.
	// If no ingress controller is specified, the default value `istio-ingressgateway` is used.
	IngressService string `json:"ingressService,omitempty"`
	// Defines whether to use Istio ingress controller for annotated or all ingress resources.
	// Default mode is `STRICT`.
	IngressControllerMode MeshConfigIngressControllerMode `json:"ingressControllerMode,omitempty"`
	// Defines which gateway deployment to use as the Ingress controller. This field corresponds to
	// the Gateway.selector field, and will be set as `istio: INGRESS_SELECTOR`.
	// By default, `ingressgateway` is used, which will select the default IngressGateway as it has the
	// `istio: ingressgateway` labels.
	// It is recommended that this is the same value as ingress_service.
	IngressSelector string `json:"ingressSelector,omitempty"`
	// Flag to control generation of trace spans and request IDs.
	// Requires a trace span collector defined in the proxy configuration.
	EnableTracing bool `json:"enableTracing,omitempty"`
	// File address for the proxy access log (e.g. /dev/stdout).
	// Empty value disables access logging.
	AccessLogFile string `json:"accessLogFile,omitempty"`
	// Format for the proxy access log
	// Empty value results in proxy's default access log format
	AccessLogFormat string `json:"accessLogFormat,omitempty"`
	// Encoding for the proxy access log (`TEXT` or `JSON`).
	// Default value is `TEXT`.
	AccessLogEncoding MeshConfigAccessLogEncoding `json:"accessLogEncoding,omitempty"`
	// This flag enables Envoy's gRPC Access Log Service.
	// See [Access Log Service](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/grpc/v3/als.proto)
	// for details about Envoy's gRPC Access Log Service API.
	// Default value is `false`.
	EnableEnvoyAccessLogService bool `json:"enableEnvoyAccessLogService,omitempty"`
	// This flag disables Envoy Listener logs.
	// See [Listener Access Log](https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/listener/v3/listener.proto#envoy-v3-api-field-config-listener-v3-listener-access-log)
	// Istio Enables Envoy's listener access logs on "NoRoute" response flag.
	// Default value is `false`.
	DisableEnvoyListenerLog bool `json:"disableEnvoyListenerLog,omitempty"`
	// Default proxy config used by gateway and sidecars.
	// In case of Kubernetes, the proxy config is applied once during the injection process,
	// and remain constant for the duration of the pod. The rest of the mesh config can be changed
	// at runtime and config gets distributed dynamically.
	// On Kubernetes, this can be overridden on individual pods with the `proxy.istio.io/config` annotation.
	DefaultConfig *MeshConfigProxyConfig `json:"defaultConfig,omitempty"`
	// Set the default behavior of the sidecar for handling outbound
	// traffic from the application.  If your application uses one or
	// more external services that are not known apriori, setting the
	// policy to `ALLOW_ANY` will cause the sidecars to route any unknown
	// traffic originating from the application to its requested
	// destination. Users are strongly encouraged to use ServiceEntries
	// to explicitly declare any external dependencies, instead of using
	// `ALLOW_ANY`, so that traffic to these services can be
	// monitored. Can be overridden at a Sidecar level by setting the
	// `OutboundTrafficPolicy` in the [Sidecar
	// API](https://istio.io/docs/reference/config/networking/sidecar/#OutboundTrafficPolicy).
	// Default mode is `ALLOW_ANY` which means outbound traffic to unknown destinations will be allowed.
	OutboundTrafficPolicy *MeshConfigOutboundTrafficPolicy `json:"outboundTrafficPolicy,omitempty"`
	// Set the default behavior of the sidecar for handling inbound
	// traffic to the application.  If your application listens on
	// localhost, you will need to set this to `LOCALHOST`.
	InboundTrafficPolicy *MeshConfigInboundTrafficPolicy `json:"inboundTrafficPolicy,omitempty"`
	// ConfigSource describes a source of configuration data for networking
	// rules, and other Istio configuration artifacts. Multiple data sources
	// can be configured for a single control plane.
	ConfigSources []*ConfigSource `json:"configSources,omitempty"`
	// This flag is used to enable mutual `TLS` automatically for service to service communication
	// within the mesh, default true.
	// If set to true, and a given service does not have a corresponding `DestinationRule` configured,
	// or its `DestinationRule` does not have ClientTLSSettings specified, Istio configures client side
	// TLS configuration appropriately. More specifically,
	// If the upstream authentication policy is in `STRICT` mode, use Istio provisioned certificate
	// for mutual `TLS` to connect to upstream.
	// If upstream service is in plain text mode, use plain text.
	// If the upstream authentication policy is in PERMISSIVE mode, Istio configures clients to use
	// mutual `TLS` when server sides are capable of accepting mutual `TLS` traffic.
	// If service `DestinationRule` exists and has `ClientTLSSettings` specified, that is always used instead.
	EnableAutoMtls *bool `json:"enableAutoMtls,omitempty"`
	// The trust domain corresponds to the trust root of a system.
	// Refer to [SPIFFE-ID](https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain)
	TrustDomain string `json:"trustDomain,omitempty"`
	// The trust domain aliases represent the aliases of `trust_domain`.
	// For example, if we have
	// “`yaml
	// trustDomain: td1
	// trustDomainAliases: ["td2", "td3"]
	// “`
	// Any service with the identity `td1/ns/foo/sa/a-service-account`, `td2/ns/foo/sa/a-service-account`,
	// or `td3/ns/foo/sa/a-service-account` will be treated the same in the Istio mesh.
	TrustDomainAliases []string `json:"trustDomainAliases,omitempty"`
	// The extra root certificates for workload-to-workload communication.
	// The plugin certificates (the 'cacerts' secret) or self-signed certificates (the 'istio-ca-secret' secret)
	// are automatically added by Istiod.
	// The CA certificate that signs the workload certificates is automatically added by Istio Agent.
	CaCertificates []*MeshConfigCertificateData `json:"caCertificates,omitempty"`
	// The default value for the ServiceEntry.export_to field and services
	// imported through container registry integrations, e.g. this applies to
	// Kubernetes Service resources. The value is a list of namespace names and
	// reserved namespace aliases. The allowed namespace aliases are:
	// “`
	// * - All Namespaces
	// . - Current Namespace
	// ~ - No Namespace
	// “`
	// If not set the system will use "*" as the default value which implies that
	// services are exported to all namespaces.
	//
	// `All namespaces` is a reasonable default for implementations that don't
	// need to restrict access or visibility of services across namespace
	// boundaries. If that requirement is present it is generally good practice to
	// make the default `Current namespace` so that services are only visible
	// within their own namespaces by default. Operators can then expand the
	// visibility of services to other namespaces as needed. Use of `No Namespace`
	// is expected to be rare but can have utility for deployments where
	// dependency management needs to be precise even within the scope of a single
	// namespace.
	//
	// For further discussion see the reference documentation for `ServiceEntry`,
	// `Sidecar`, and `Gateway`.
	DefaultServiceExportTo []string `json:"defaultServiceExportTo,omitempty"`
	// The default value for the VirtualService.export_to field. Has the same
	// syntax as `default_service_export_to`.
	//
	// If not set the system will use "*" as the default value which implies that
	// virtual services are exported to all namespaces
	DefaultVirtualServiceExportTo []string `json:"defaultVirtualServiceExportTo,omitempty"`
	// The default value for the `DestinationRule.export_to` field. Has the same
	// syntax as `default_service_export_to`.
	//
	// If not set the system will use "*" as the default value which implies that
	// destination rules are exported to all namespaces
	DefaultDestinationRuleExportTo []string `json:"defaultDestinationRuleExportTo,omitempty"`
	// The namespace to treat as the administrative root namespace for
	// Istio configuration. When processing a leaf namespace Istio will search for
	// declarations in that namespace first and if none are found it will
	// search in the root namespace. Any matching declaration found in the root
	// namespace is processed as if it were declared in the leaf namespace.
	//
	// The precise semantics of this processing are documented on each resource
	// type.
	RootNamespace string `json:"rootNamespace,omitempty"`
	// Locality based load balancing distribution or failover settings.
	// If unspecified, locality based load balancing will be enabled by default.
	// However, this requires outlierDetection to actually take effect for a particular
	// service, see https://istio.io/latest/docs/tasks/traffic-management/locality-load-balancing/failover/
	LocalityLbSetting *LocalityLoadBalancerSetting `json:"localityLbSetting,omitempty"`
	// Configures DNS refresh rate for Envoy clusters of type `STRICT_DNS`
	// Default refresh rate is `60s`.
	DnsRefreshRate *metav1.Duration `json:"dnsRefreshRate,omitempty"`
	// Specify if http1.1 connections should be upgraded to http2 by default.
	// if sidecar is installed on all pods in the mesh, then this should be set to `UPGRADE`.
	// If one or more services or namespaces do not have sidecar(s), then this should be set to `DO_NOT_UPGRADE`.
	// It can be enabled by destination using the `destinationRule.trafficPolicy.connectionPool.http.h2UpgradePolicy` override.
	H2UpgradePolicy MeshConfigH2UpgradePolicy `json:"h2UpgradePolicy,omitempty"`
	// Name to be used while emitting statistics for inbound clusters. The same pattern is used while computing stat prefix for
	// network filters like TCP and Redis.
	// By default, Istio emits statistics with the pattern `inbound|<port>|<port-name>|<service-FQDN>`.
	// For example `inbound|7443|grpc-reviews|reviews.prod.svc.cluster.local`. This can be used to override that pattern.
	//
	// A Pattern can be composed of various pre-defined variables. The following variables are supported.
	//
	// - `%SERVICE%` - Will be substituted with name of the service.
	// - `%SERVICE_FQDN%` - Will be substituted with FQDN of the service.
	// - `%SERVICE_PORT%` - Will be substituted with port of the service.
	// - `%TARGET_PORT%`  - Will be substituted with the target port of the service.
	// - `%SERVICE_PORT_NAME%` - Will be substituted with port name of the service.
	//
	// Following are some examples of supported patterns for reviews:
	//
	// - `%SERVICE_FQDN%_%SERVICE_PORT%` will use reviews.prod.svc.cluster.local_7443 as the stats name.
	// - `%SERVICE%` will use reviews.prod as the stats name.
	InboundClusterStatName string `json:"inboundClusterStatName,omitempty"`
	// Name to be used while emitting statistics for outbound clusters. The same pattern is used while computing stat prefix for
	// network filters like TCP and Redis.
	// By default, Istio emits statistics with the pattern `outbound|<port>|<subsetname>|<service-FQDN>`.
	// For example `outbound|8080|v2|reviews.prod.svc.cluster.local`. This can be used to override that pattern.
	//
	// A Pattern can be composed of various pre-defined variables. The following variables are supported.
	//
	// - `%SERVICE%` - Will be substituted with name of the service.
	// - `%SERVICE_FQDN%` - Will be substituted with FQDN of the service.
	// - `%SERVICE_PORT%` - Will be substituted with port of the service.
	// - `%SERVICE_PORT_NAME%` - Will be substituted with port name of the service.
	// - `%SUBSET_NAME%` - Will be substituted with subset.
	//
	// Following are some examples of supported patterns for reviews:
	//
	// - `%SERVICE_FQDN%_%SERVICE_PORT%` will use `reviews.prod.svc.cluster.local_7443` as the stats name.
	// - `%SERVICE%` will use reviews.prod as the stats name.
	OutboundClusterStatName string `json:"outboundClusterStatName,omitempty"`
	// $hide_from_docs
	// Configure the provision of certificates.
	//
	// Note: Deprecated, please refer to Cert-Manager or other cert provisioning solutions to sign DNS certificates.
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	Certificates []*Certificate `json:"certificates,omitempty"`
	// $hide_from_docs
	// Settings to be applied to select services.
	ServiceSettings []*MeshConfigServiceSettings `json:"serviceSettings,omitempty"`
	// If enabled, Istio agent will merge metrics exposed by the application with metrics from Envoy
	// and Istio agent. The sidecar injection will replace `prometheus.io` annotations present on the pod
	// and redirect them towards Istio agent, which will then merge metrics of from the application with Istio metrics.
	// This relies on the annotations `prometheus.io/scrape`, `prometheus.io/port`, and
	// `prometheus.io/path` annotations.
	// If you are running a separately managed Envoy with an Istio sidecar, this may cause issues, as the metrics will collide.
	// In this case, it is recommended to disable aggregation on that deployment with the
	// `prometheus.istio.io/merge-metrics: "false"` annotation.
	// If not specified, this will be enabled by default.
	EnablePrometheusMerge *bool `json:"enablePrometheusMerge,omitempty"`
	// $hide_from_docs
	// `VerifyCertificateAtClient` sets the mesh global default for peer certificate validation
	// at the client-side proxy when `SIMPLE` TLS or `MUTUAL` TLS (non `ISTIO_MUTUAL`) origination
	// modes are used. This setting can be overridden at the host level via DestinationRule API.
	// By default, `VerifyCertificateAtClient` is `true`.
	//
	// `CaCertificates`: If set, proxy verifies CA signature based on given CaCertificates. If unset,
	// and VerifyCertificateAtClient is true, proxy uses default System CA bundle. If unset and
	// `VerifyCertificateAtClient` is false, proxy will not verify the CA.
	//
	// `SubjectAltNames`: If set, proxy verifies subject alt names are present in the SAN. If unset,
	// and `VerifyCertificateAtClient` is true, proxy uses host in destination rule to verify the SANs.
	// If unset, and `VerifyCertificateAtClient` is false, proxy does not verify SANs.
	//
	// For SAN, client-side proxy will exact match host in `DestinationRule` as well as one level
	// wildcard if the specified host in DestinationRule doesn't contain a wildcard.
	// For example, if the host in `DestinationRule` is `x.y.com`, client-side proxy will
	// match either `x.y.com` or `*.y.com` for the SAN in the presented server certificate.
	// For wildcard host name in DestinationRule, client-side proxy will do a suffix match. For example,
	// if host is `*.x.y.com`, client-side proxy will verify the presented server certificate SAN matches
	// “.x.y.com` suffix.
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	VerifyCertificateAtClient *bool `json:"verifyCertificateAtClient,omitempty"`
	// $hide_from_docs
	// If specified, Istiod will authorize and forward the CSRs from the workloads to the specified external CA
	// using the Istio CA gRPC API.
	Ca *MeshConfigCA `json:"ca,omitempty"`
	// Defines a list of extension providers that extend Istio's functionality. For example, the AuthorizationPolicy
	// can be used with an extension provider to delegate the authorization decision to a custom authorization system.
	// +kubebuilder:validation:MaxItems=1000
	ExtensionProviders []*MeshConfigExtensionProvider `json:"extensionProviders,omitempty"`
	// Specifies extension providers to use by default in Istio configuration resources.
	DefaultProviders *MeshConfigDefaultProviders `json:"defaultProviders,omitempty"`
	// A list of Kubernetes selectors that specify the set of namespaces that Istio considers when
	// computing configuration updates for sidecars. This can be used to reduce Istio's computational load
	// by limiting the number of entities (including services, pods, and endpoints) that are watched and processed.
	// If omitted, Istio will use the default behavior of processing all namespaces in the cluster.
	// Elements in the list are disjunctive (OR semantics), i.e. a namespace will be included if it matches any selector.
	// The following example selects any namespace that matches either below:
	// 1. The namespace has both of these labels: `env: prod` and `region: us-east1`
	// 2. The namespace has label `app` equal to `cassandra` or `spark`.
	// “`yaml
	// discoverySelectors:
	//   - matchLabels:
	//     env: prod
	//     region: us-east1
	//   - matchExpressions:
	//   - key: app
	//     operator: In
	//     values:
	//   - cassandra
	//   - spark
	//
	// “`
	// Refer to the [Kubernetes selector docs](https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectors)
	// for additional detail on selector semantics.
	DiscoverySelectors []*metav1.LabelSelector `json:"discoverySelectors,omitempty"`
	// ProxyPathNormalization configures how URL paths in incoming and outgoing HTTP requests are
	// normalized by the sidecars and gateways.
	// The normalized paths will be used in all aspects through the requests' lifetime on the
	// sidecars and gateways, which includes routing decisions in outbound direction (client proxy),
	// authorization policy match and enforcement in inbound direction (server proxy), and the URL
	// path proxied to the upstream service.
	// If not set, the NormalizationType.DEFAULT configuration will be used.
	PathNormalization *MeshConfigProxyPathNormalization `json:"pathNormalization,omitempty"`
	// Configure the default HTTP retry policy.
	// The default number of retry attempts is set at 2 for these errors:
	//
	//	"connect-failure,refused-stream,unavailable,cancelled,retriable-status-codes".
	//
	// Setting the number of attempts to 0 disables retry policy globally.
	// This setting can be overridden on a per-host basis using the Virtual Service
	// API.
	// All settings in the retry policy except `perTryTimeout` can currently be
	// configured globally via this field.
	DefaultHttpRetryPolicy *HTTPRetry `json:"defaultHttpRetryPolicy,omitempty"`
	// The below configuration parameters can be used to specify TLSConfig for mesh traffic.
	// For example, a user could enable min TLS version for ISTIO_MUTUAL traffic and specify a curve for non ISTIO_MUTUAL traffic like below:
	// “`yaml
	// meshConfig:
	//
	//	meshMTLS:
	//	  minProtocolVersion: TLSV1_3
	//	tlsDefaults:
	//	  Note: applicable only for non ISTIO_MUTUAL scenarios
	//	  ecdhCurves:
	//	    - P-256
	//	    - P-512
	//
	// “`
	// Configuration of mTLS for traffic between workloads with ISTIO_MUTUAL TLS traffic.
	//
	// Note: Mesh mTLS does not respect ECDH curves.
	MeshMTLS *MeshConfigTLSConfig `json:"meshMTLS,omitempty"`
	// Configuration of TLS for all traffic except for ISTIO_MUTUAL mode.
	// Currently, this supports configuration of ecdh_curves and cipher_suites only.
	// For ISTIO_MUTUAL TLS settings, use meshMTLS configuration.
	TlsDefaults *MeshConfigTLSConfig `json:"tlsDefaults,omitempty"`
}

MeshConfig defines mesh-wide settings for the Istio service mesh.

func (*MeshConfig) DeepCopy

func (in *MeshConfig) DeepCopy() *MeshConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfig.

func (*MeshConfig) DeepCopyInto

func (in *MeshConfig) DeepCopyInto(out *MeshConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigAccessLogEncoding

type MeshConfigAccessLogEncoding string

+kubebuilder:validation:Enum=TEXT;JSON

const (
	// text encoding for the proxy access log
	MeshConfigAccessLogEncodingText MeshConfigAccessLogEncoding = "TEXT"
	// json encoding for the proxy access log
	MeshConfigAccessLogEncodingJson MeshConfigAccessLogEncoding = "JSON"
)

type MeshConfigAuthPolicy

type MeshConfigAuthPolicy string

$hide_from_docs +kubebuilder:validation:Enum=NONE;MUTUAL_TLS

const (
	MeshConfigAuthPolicyNone      MeshConfigAuthPolicy = "NONE"
	MeshConfigAuthPolicyMutualTls MeshConfigAuthPolicy = "MUTUAL_TLS"
)

type MeshConfigCA

type MeshConfigCA struct {
	// REQUIRED. Address of the CA server implementing the Istio CA gRPC API.
	// Can be IP address or a fully qualified DNS name with port
	// Eg: custom-ca.default.svc.cluster.local:8932, 192.168.23.2:9000
	// +kubebuilder:validation:Required
	Address string `json:"address"`
	// Use the tls_settings to specify the tls mode to use.
	// Regarding tls_settings:
	// - DISABLE MODE is legitimate for the case Istiod is making the request via an Envoy sidecar.
	// DISABLE MODE can also be used for testing
	// - TLS MUTUAL MODE be on by default. If the CA certificates
	// (cert bundle to verify the CA server's certificate) is omitted, Istiod will
	// use the system root certs to verify the CA server's certificate.
	TlsSettings *ClientTLSSettings `json:"tlsSettings,omitempty"`
	// timeout for forward CSR requests from Istiod to External CA
	// Default: 10s
	RequestTimeout *metav1.Duration `json:"requestTimeout,omitempty"`
	// Use istiod_side to specify CA Server integrate to Istiod side or Agent side
	// Default: true
	IstiodSide bool `json:"istiodSide,omitempty"`
}

func (*MeshConfigCA) DeepCopy

func (in *MeshConfigCA) DeepCopy() *MeshConfigCA

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigCA.

func (*MeshConfigCA) DeepCopyInto

func (in *MeshConfigCA) DeepCopyInto(out *MeshConfigCA)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigCertificateData

type MeshConfigCertificateData struct {
	// The PEM data of the certificate.
	Pem string `json:"pem,omitempty"`

	// The SPIFFE bundle endpoint URL that complies to:
	// https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE_Trust_Domain_and_Bundle.md#the-spiffe-trust-domain-and-bundle
	// The endpoint should support authentication based on Web PKI:
	// https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE_Trust_Domain_and_Bundle.md#521-web-pki
	// The certificate is retrieved from the endpoint.
	SpiffeBundleUrl string `json:"spiffeBundleUrl,omitempty"` // Optional. Specify the kubernetes signers (External CA) that use this trustAnchor
	// when Istiod is acting as RA(registration authority)
	// If set, they are used for these signers. Otherwise, this trustAnchor is used for all signers.
	CertSigners []string `json:"certSigners,omitempty"`
	// Optional. Specify the list of trust domains to which this trustAnchor data belongs.
	// If set, they are used for these trust domains. Otherwise, this trustAnchor is used for default trust domain
	// and its aliases.
	// Note that we can have multiple trustAnchor data for a same trust_domain.
	// In that case, trustAnchors with a same trust domain will be merged and used together to verify peer certificates.
	// If neither cert_signers nor trust_domains is set, this trustAnchor is used for all trust domains and all signers.
	// If only trust_domains is set, this trustAnchor is used for these trust_domains and all signers.
	// If only cert_signers is set, this trustAnchor is used for these cert_signers and all trust domains.
	// If both cert_signers and trust_domains is set, this trustAnchor is only used for these signers and trust domains.
	TrustDomains []string `json:"trustDomains,omitempty"`
}

+kubebuilder:validation:XValidation:message="At most one of [pem spiffeBundleUrl] should be set",rule="(has(self.pem)?1:0) + (has(self.spiffeBundleUrl)?1:0) <= 1"

func (*MeshConfigCertificateData) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigCertificateData.

func (*MeshConfigCertificateData) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigDefaultProviders

type MeshConfigDefaultProviders struct {
	// Name of the default provider(s) for tracing.
	Tracing []string `json:"tracing,omitempty"`
	// Name of the default provider(s) for metrics.
	Metrics []string `json:"metrics,omitempty"`
	// Name of the default provider(s) for access logging.
	AccessLogging []string `json:"accessLogging,omitempty"`
}

Holds the name references to the providers that will be used by default in other Istio configuration resources if the provider is not specified.

These names must match a provider defined in `extension_providers` that is one of the supported tracing providers.

func (*MeshConfigDefaultProviders) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigDefaultProviders.

func (*MeshConfigDefaultProviders) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProvider

type MeshConfigExtensionProvider struct {
	// REQUIRED. A unique name identifying the extension provider.
	// +kubebuilder:validation:Required
	Name string `json:"name"`

	// Configures an external authorizer that implements the Envoy ext_authz filter authorization check service using the HTTP API.
	EnvoyExtAuthzHttp *MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider `json:"envoyExtAuthzHttp,omitempty"`

	// Configures an external authorizer that implements the Envoy ext_authz filter authorization check service using the gRPC API.
	EnvoyExtAuthzGrpc *MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider `json:"envoyExtAuthzGrpc,omitempty"`

	// Configures a tracing provider that uses the Zipkin API.
	Zipkin *MeshConfigExtensionProviderZipkinTracingProvider `json:"zipkin,omitempty"`

	// $hide_from_docs
	// Configures a Lightstep tracing provider.
	// Deprecated: For Istio 1.15+, please use an OpenTelemetryTracingProvider instead, more details can be found at https://github.com/istio/istio/issues/40027
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	Lightstep *MeshConfigExtensionProviderLightstepTracingProvider `json:"lightstep,omitempty"`

	// Configures a Datadog tracing provider.
	Datadog *MeshConfigExtensionProviderDatadogTracingProvider `json:"datadog,omitempty"`

	// Configures a Stackdriver provider.
	Stackdriver *MeshConfigExtensionProviderStackdriverProvider `json:"stackdriver,omitempty"`

	// $hide_from_docs
	// Configures an OpenCensusAgent tracing provider.
	// Deprecated: OpenCensus is deprecated, more details can be found at https://opentelemetry.io/blog/2023/sunsetting-opencensus/
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	Opencensus *MeshConfigExtensionProviderOpenCensusAgentTracingProvider `json:"opencensus,omitempty"`

	// Configures a Apache SkyWalking provider.
	Skywalking *MeshConfigExtensionProviderSkyWalkingTracingProvider `json:"skywalking,omitempty"`

	// Configures an OpenTelemetry tracing provider.
	Opentelemetry *MeshConfigExtensionProviderOpenTelemetryTracingProvider `json:"opentelemetry,omitempty"`

	// Configures a Prometheus metrics provider.
	Prometheus *MeshConfigExtensionProviderPrometheusMetricsProvider `json:"prometheus,omitempty"`

	// Configures an Envoy File Access Log provider.
	EnvoyFileAccessLog *MeshConfigExtensionProviderEnvoyFileAccessLogProvider `json:"envoyFileAccessLog,omitempty"`

	// Configures an Envoy Access Logging Service provider for HTTP traffic.
	EnvoyHttpAls *MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider `json:"envoyHttpAls,omitempty"`

	// Configures an Envoy Access Logging Service provider for TCP traffic.
	EnvoyTcpAls *MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider `json:"envoyTcpAls,omitempty"`

	// Configures an Envoy Open Telemetry Access Logging Service provider.
	EnvoyOtelAls *MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider `json:"envoyOtelAls,omitempty"`
}

+kubebuilder:validation:XValidation:message="At most one of [envoyExtAuthzHttp envoyExtAuthzGrpc zipkin lightstep datadog stackdriver opencensus skywalking opentelemetry prometheus envoyFileAccessLog envoyHttpAls envoyTcpAls envoyOtelAls] should be set",rule="(has(self.envoyExtAuthzHttp)?1:0) + (has(self.envoyExtAuthzGrpc)?1:0) + (has(self.zipkin)?1:0) + (has(self.lightstep)?1:0) + (has(self.datadog)?1:0) + (has(self.stackdriver)?1:0) + (has(self.opencensus)?1:0) + (has(self.skywalking)?1:0) + (has(self.opentelemetry)?1:0) + (has(self.prometheus)?1:0) + (has(self.envoyFileAccessLog)?1:0) + (has(self.envoyHttpAls)?1:0) + (has(self.envoyTcpAls)?1:0) + (has(self.envoyOtelAls)?1:0) <= 1"

func (*MeshConfigExtensionProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProvider.

func (*MeshConfigExtensionProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderDatadogTracingProvider

type MeshConfigExtensionProviderDatadogTracingProvider struct {
	// REQUIRED. Specifies the service for the Datadog agent.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "datadog.default.svc.cluster.local" or "bar/datadog.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
}

Defines configuration for a Datadog tracer.

func (*MeshConfigExtensionProviderDatadogTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderDatadogTracingProvider.

func (*MeshConfigExtensionProviderDatadogTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider

type MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider struct {
	// REQUIRED. Specifies the service that implements the Envoy ext_authz gRPC authorization service.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "my-ext-authz.foo.svc.cluster.local" or "bar/my-ext-authz.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// The maximum duration that the proxy will wait for a response from the provider, this is the timeout for a specific request (default timeout: 600s).
	// When this timeout condition is met, the proxy marks the communication to the authorization service as failure.
	// In this situation, the response sent back to the client will depend on the configured `fail_open` field.
	Timeout *metav1.Duration `json:"timeout,omitempty"`
	// If true, the HTTP request or TCP connection will be allowed even if the communication with the authorization service has failed,
	// or if the authorization service has returned a HTTP 5xx error.
	// Default is false. For HTTP request, it will be rejected with 403 (HTTP Forbidden). For TCP connection, it will be closed immediately.
	FailOpen bool `json:"failOpen,omitempty"`
	// Sets the HTTP status that is returned to the client when there is a network error to the authorization service.
	// The default status is "403" (HTTP Forbidden).
	StatusOnError string `json:"statusOnError,omitempty"`
	// If set, the client request body will be included in the authorization request sent to the authorization service.
	IncludeRequestBodyInCheck *MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody `json:"includeRequestBodyInCheck,omitempty"`
}

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider.

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationGrpcProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider

type MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider struct {
	// REQUIRED. Specifies the service that implements the Envoy ext_authz HTTP authorization service.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "my-ext-authz.foo.svc.cluster.local" or "bar/my-ext-authz.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// The maximum duration that the proxy will wait for a response from the provider (default timeout: 600s).
	// When this timeout condition is met, the proxy marks the communication to the authorization service as failure.
	// In this situation, the response sent back to the client will depend on the configured `fail_open` field.
	Timeout *metav1.Duration `json:"timeout,omitempty"`
	// Sets a prefix to the value of authorization request header *Path*.
	// For example, setting this to "/check" for an original user request at path "/admin" will cause the
	// authorization check request to be sent to the authorization service at the path "/check/admin" instead of "/admin".
	PathPrefix string `json:"pathPrefix,omitempty"`
	// If true, the user request will be allowed even if the communication with the authorization service has failed,
	// or if the authorization service has returned a HTTP 5xx error.
	// Default is false and the request will be rejected with "Forbidden" response.
	FailOpen bool `json:"failOpen,omitempty"`
	// Sets the HTTP status that is returned to the client when there is a network error to the authorization service.
	// The default status is "403" (HTTP Forbidden).
	StatusOnError string `json:"statusOnError,omitempty"`
	// DEPRECATED. Use include_request_headers_in_check instead.
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	IncludeHeadersInCheck []string `json:"includeHeadersInCheck,omitempty"`
	// List of client request headers that should be included in the authorization request sent to the authorization service.
	// Note that in addition to the headers specified here following headers are included by default:
	// 1. *Host*, *Method*, *Path* and *Content-Length* are automatically sent.
	// 2. *Content-Length* will be set to 0 and the request will not have a message body. However, the authorization
	// request can include the buffered client request body (controlled by include_request_body_in_check setting),
	// consequently the value of Content-Length of the authorization request reflects the size of its payload size.
	//
	// Exact, prefix and suffix matches are supported (similar to the
	// [authorization policy rule syntax](https://istio.io/latest/docs/reference/config/security/authorization-policy/#Rule)
	// except the presence match):
	// - Exact match: "abc" will match on value "abc".
	// - Prefix match: "abc*" will match on value "abc" and "abcd".
	// - Suffix match: "*abc" will match on value "abc" and "xabc".
	IncludeRequestHeadersInCheck []string `json:"includeRequestHeadersInCheck,omitempty"`
	// Set of additional fixed headers that should be included in the authorization request sent to the authorization service.
	// Key is the header name and value is the header value.
	// Note that client request of the same key or headers specified in include_request_headers_in_check will be overridden.
	IncludeAdditionalHeadersInCheck map[string]string `json:"includeAdditionalHeadersInCheck,omitempty"`
	// If set, the client request body will be included in the authorization request sent to the authorization service.
	IncludeRequestBodyInCheck *MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody `json:"includeRequestBodyInCheck,omitempty"`
	// List of headers from the authorization service that should be added or overridden in the original request and
	// forwarded to the upstream when the authorization check result is allowed (HTTP code 200).
	// If not specified, the original request will not be modified and forwarded to backend as-is.
	// Note, any existing headers will be overridden.
	//
	// Exact, prefix and suffix matches are supported (similar to the
	// [authorization policy rule syntax](https://istio.io/latest/docs/reference/config/security/authorization-policy/#Rule)
	// except the presence match):
	// - Exact match: "abc" will match on value "abc".
	// - Prefix match: "abc*" will match on value "abc" and "abcd".
	// - Suffix match: "*abc" will match on value "abc" and "xabc".
	HeadersToUpstreamOnAllow []string `json:"headersToUpstreamOnAllow,omitempty"`
	// List of headers from the authorization service that should be forwarded to downstream when the authorization
	// check result is not allowed (HTTP code other than 200).
	// If not specified, all the authorization response headers, except *Authority (Host)* will be in the response to
	// the downstream.
	// When a header is included in this list, *Path*, *Status*, *Content-Length*, *WWWAuthenticate* and *Location* are
	// automatically added.
	// Note, the body from the authorization service is always included in the response to downstream.
	//
	// Exact, prefix and suffix matches are supported (similar to the
	// [authorization policy rule syntax](https://istio.io/latest/docs/reference/config/security/authorization-policy/#Rule)
	// except the presence match):
	// - Exact match: "abc" will match on value "abc".
	// - Prefix match: "abc*" will match on value "abc" and "abcd".
	// - Suffix match: "*abc" will match on value "abc" and "xabc".
	HeadersToDownstreamOnDeny []string `json:"headersToDownstreamOnDeny,omitempty"`
	// List of headers from the authorization service that should be forwarded to downstream when the authorization
	// check result is allowed (HTTP code 200).
	// If not specified, the original response will not be modified and forwarded to downstream as-is.
	// Note, any existing headers will be overridden.
	//
	// Exact, prefix and suffix matches are supported (similar to the
	// [authorization policy rule syntax](https://istio.io/latest/docs/reference/config/security/authorization-policy/#Rule)
	// except the presence match):
	// - Exact match: "abc" will match on value "abc".
	// - Prefix match: "abc*" will match on value "abc" and "abcd".
	// - Suffix match: "*abc" will match on value "abc" and "xabc".
	HeadersToDownstreamOnAllow []string `json:"headersToDownstreamOnAllow,omitempty"`
}

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider.

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationHttpProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody

type MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody struct {
	// Sets the maximum size of a message body that the ext-authz filter will hold in memory.
	// If max_request_bytes is reached, and allow_partial_message is false, Envoy will return a 413 (Payload Too Large).
	// Otherwise the request will be sent to the provider with a partial message.
	// Note that this setting will have precedence over the fail_open field, the 413 will be returned even when the
	// fail_open is set to true.
	MaxRequestBytes uint32 `json:"maxRequestBytes,omitempty"`
	// When this field is true, ext-authz filter will buffer the message until max_request_bytes is reached.
	// The authorization request will be dispatched and no 413 HTTP error will be returned by the filter.
	// A "x-envoy-auth-partial-body: false|true" metadata header will be added to the authorization request message
	// indicating if the body data is partial.
	AllowPartialMessage bool `json:"allowPartialMessage,omitempty"`
	// If true, the body sent to the external authorization service in the gRPC authorization request is set with raw bytes
	// in the [raw_body field](https://github.com/envoyproxy/envoy/blame/cffb095d59d7935abda12b9509bcd136808367bb/api/envoy/service/auth/v3/attribute_context.proto#L153).
	// Otherwise, it will be filled with UTF-8 string in the [body field](https://github.com/envoyproxy/envoy/blame/cffb095d59d7935abda12b9509bcd136808367bb/api/envoy/service/auth/v3/attribute_context.proto#L147).
	// This field only works with the envoy_ext_authz_grpc provider and has no effect for the envoy_ext_authz_http provider.
	PackAsBytes bool `json:"packAsBytes,omitempty"`
}

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody.

func (*MeshConfigExtensionProviderEnvoyExternalAuthorizationRequestBody) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyFileAccessLogProvider

type MeshConfigExtensionProviderEnvoyFileAccessLogProvider struct {
	// Path to a local file to write the access log entries.
	// This may be used to write to streams, via `/dev/stderr` and `/dev/stdout`
	// If unspecified, defaults to `/dev/stdout`.
	Path string `json:"path,omitempty"`
	// Optional. Allows overriding of the default access log format.
	LogFormat *MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat `json:"logFormat,omitempty"`
}

Defines configuration for Envoy-based access logging that writes to local files (and/or standard streams).

func (*MeshConfigExtensionProviderEnvoyFileAccessLogProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyFileAccessLogProvider.

func (*MeshConfigExtensionProviderEnvoyFileAccessLogProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat

type MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat struct {
	// Textual format for the envoy access logs. Envoy [command operators](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#command-operators) may be
	// used in the format. The [format string documentation](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#config-access-log-format-strings)
	// provides more information.
	//
	// NOTE: Istio will insert a newline ('\n') on all formats (if missing).
	//
	// Example: `text: "%LOCAL_REPLY_BODY%:%RESPONSE_CODE%:path=%REQ(:path)%"`
	Text string `json:"text,omitempty"`

	// JSON structured format for the envoy access logs. Envoy [command operators](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#command-operators)
	// can be used as values for fields within the Struct. Values are rendered
	// as strings, numbers, or boolean values, as appropriate
	// (see: [format dictionaries](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#config-access-log-format-dictionaries)). Nested JSON is
	// supported for some command operators (e.g. `FILTER_STATE` or `DYNAMIC_METADATA`).
	// Use `labels: {}` for default envoy JSON log format.
	//
	// Example:
	// “`
	// labels:
	//
	//	status: "%RESPONSE_CODE%"
	//	message: "%LOCAL_REPLY_BODY%"
	//
	// “`
	Labels map[string]string `json:"labels,omitempty"`
}

+kubebuilder:validation:XValidation:message="At most one of [text labels] should be set",rule="(has(self.text)?1:0) + (has(self.labels)?1:0) <= 1"

func (*MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat.

func (*MeshConfigExtensionProviderEnvoyFileAccessLogProviderLogFormat) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider

type MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider struct {
	// REQUIRED. Specifies the service that implements the Envoy ALS gRPC authorization service.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "envoy-als.foo.svc.cluster.local" or "bar/envoy-als.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. The friendly name of the access log.
	// Defaults:
	// -  "http_envoy_accesslog"
	// -  "listener_envoy_accesslog"
	LogName string `json:"logName,omitempty"`
	// Optional. Additional filter state objects to log.
	FilterStateObjectsToLog []string `json:"filterStateObjectsToLog,omitempty"`
	// Optional. Additional request headers to log.
	AdditionalRequestHeadersToLog []string `json:"additionalRequestHeadersToLog,omitempty"`
	// Optional. Additional response headers to log.
	AdditionalResponseHeadersToLog []string `json:"additionalResponseHeadersToLog,omitempty"`
	// Optional. Additional response trailers to log.
	AdditionalResponseTrailersToLog []string `json:"additionalResponseTrailersToLog,omitempty"`
}

Defines configuration for an Envoy [Access Logging Service](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/grpc/v3/als.proto#grpc-access-log-service-als) integration for HTTP traffic.

func (*MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider.

func (*MeshConfigExtensionProviderEnvoyHttpGrpcV3LogProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider

type MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider struct {
	// REQUIRED. Specifies the service that implements the Envoy ALS gRPC authorization service.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "envoy-als.foo.svc.cluster.local" or "bar/envoy-als.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. The friendly name of the access log.
	// Defaults:
	// - "otel_envoy_accesslog"
	LogName string `json:"logName,omitempty"`
	// Optional. Format for the proxy access log
	// Empty value results in proxy's default access log format, following Envoy access logging formatting.
	LogFormat *MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat `json:"logFormat,omitempty"`
}

Defines configuration for an Envoy [OpenTelemetry (gRPC) Access Log](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/open_telemetry/v3/logs_service.proto)

func (*MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider.

func (*MeshConfigExtensionProviderEnvoyOpenTelemetryLogProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat

type MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat struct {
	// Textual format for the envoy access logs. Envoy [command operators](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#command-operators) may be
	// used in the format. The [format string documentation](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#config-access-log-format-strings)
	// provides more information.
	// Alias to `body` filed in [Open Telemetry](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/open_telemetry/v3/logs_service.proto)
	// Example: `text: "%LOCAL_REPLY_BODY%:%RESPONSE_CODE%:path=%REQ(:path)%"`
	Text string `json:"text,omitempty"`
	// Optional. Additional attributes that describe the specific event occurrence.
	// Structured format for the envoy access logs. Envoy [command operators](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#command-operators)
	// can be used as values for fields within the Struct. Values are rendered
	// as strings, numbers, or boolean values, as appropriate
	// (see: [format dictionaries](https://www.envoyproxy.io/docs/envoy/latest/configuration/observability/access_log/usage#config-access-log-format-dictionaries)). Nested JSON is
	// supported for some command operators (e.g. FILTER_STATE or DYNAMIC_METADATA).
	// Alias to `attributes` filed in [Open Telemetry](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/open_telemetry/v3/logs_service.proto)
	//
	// Example:
	// “`
	// labels:
	//
	//	status: "%RESPONSE_CODE%"
	//	message: "%LOCAL_REPLY_BODY%"
	//
	// “`
	Labels map[string]string `json:"labels,omitempty"`
}

func (*MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat.

func (*MeshConfigExtensionProviderEnvoyOpenTelemetryLogProviderLogFormat) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider

type MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider struct {
	// REQUIRED. Specifies the service that implements the Envoy ALS gRPC authorization service.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "envoy-als.foo.svc.cluster.local" or "bar/envoy-als.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. The friendly name of the access log.
	// Defaults:
	// - "tcp_envoy_accesslog"
	// - "listener_envoy_accesslog"
	LogName string `json:"logName,omitempty"`
	// Optional. Additional filter state objects to log.
	FilterStateObjectsToLog []string `json:"filterStateObjectsToLog,omitempty"`
}

Defines configuration for an Envoy [Access Logging Service](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/access_loggers/grpc/v3/als.proto#grpc-access-log-service-als) integration for TCP traffic.

func (*MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider.

func (*MeshConfigExtensionProviderEnvoyTcpGrpcV3LogProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderHttpHeader

type MeshConfigExtensionProviderHttpHeader struct {
	// REQUIRED. The HTTP header name.
	// +kubebuilder:validation:Required
	Name string `json:"name"`
	// REQUIRED. The HTTP header value.
	// +kubebuilder:validation:Required
	Value string `json:"value"`
}

func (*MeshConfigExtensionProviderHttpHeader) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderHttpHeader.

func (*MeshConfigExtensionProviderHttpHeader) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderHttpService

type MeshConfigExtensionProviderHttpService struct {
	// REQUIRED. Specifies the path on the service.
	// +kubebuilder:validation:Required
	Path string `json:"path"`
	// Optional. Specifies the timeout for the HTTP request.
	// If not specified, the default is 3s.
	Timeout *metav1.Duration `json:"timeout,omitempty"`
	// Optional. Allows specifying custom HTTP headers that will be added
	// to each HTTP request sent.
	Headers []*MeshConfigExtensionProviderHttpHeader `json:"headers,omitempty"`
}

Defines configuration for an HTTP service that can be used by an Extension Provider. that does communication via HTTP.

func (*MeshConfigExtensionProviderHttpService) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderHttpService.

func (*MeshConfigExtensionProviderHttpService) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderLightstepTracingProvider

type MeshConfigExtensionProviderLightstepTracingProvider struct {
	// REQUIRED. Specifies the service for the Lightstep collector.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "lightstep.default.svc.cluster.local" or "bar/lightstep.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// The Lightstep access token.
	AccessToken string `json:"accessToken,omitempty"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
}

Defines configuration for a Lightstep tracer. Note: Lightstep has moved to OpenTelemetry-based integrations. Istio 1.15+ will generate OpenTelemetry-compatible configuration when using this option.

func (*MeshConfigExtensionProviderLightstepTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderLightstepTracingProvider.

func (*MeshConfigExtensionProviderLightstepTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderOpenCensusAgentTracingProvider

type MeshConfigExtensionProviderOpenCensusAgentTracingProvider struct {
	// REQUIRED. Specifies the service for the OpenCensusAgent.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "ocagent.default.svc.cluster.local" or "bar/ocagent.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Specifies the set of context propagation headers used for distributed
	// tracing. Default is `["W3C_TRACE_CONTEXT"]`. If multiple values are specified,
	// the proxy will attempt to read each header for each request and will
	// write all headers.
	Context []MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext `json:"context,omitempty"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
}

Defines configuration for an OpenCensus tracer writing to an OpenCensus backend.

WARNING: OpenCensusAgentTracingProviders should be used with extreme care. Configuration of OpenCensus providers CANNOT be changed during the course of proxy's lifetime due to a limitation in the implementation of OpenCensus driver in Envoy. This means only a single provider configuration may be used for OpenCensus at any given time for a proxy or group of proxies AND that any change to the provider configuration MUST be accompanied by a restart of all proxies that will use that configuration.

NOTE: Stackdriver tracing uses OpenCensus configuration under the hood and, as a result, cannot be used alongside OpenCensus provider configuration.

func (*MeshConfigExtensionProviderOpenCensusAgentTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderOpenCensusAgentTracingProvider.

func (*MeshConfigExtensionProviderOpenCensusAgentTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext

type MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext string

TraceContext selects the context propagation headers used for distributed tracing. +kubebuilder:validation:Enum=UNSPECIFIED;W3C_TRACE_CONTEXT;GRPC_BIN;CLOUD_TRACE_CONTEXT;B3

const (
	// $hide_from_docs
	// Unspecified context. Should not be used for now, but added to reserve
	// the 0 enum value if TraceContext is used outside of a repeated field.
	MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContextUnspecified MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext = "UNSPECIFIED"
	// Use W3C Trace Context propagation using the `traceparent` HTTP header.
	// See the
	// [Trace Context documentation](https://www.w3.org/TR/trace-context/) for details.
	MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContextW3cTraceContext MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext = "W3C_TRACE_CONTEXT"
	// Use gRPC binary context propagation using the `grpc-trace-bin` http header.
	MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContextGrpcBin MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext = "GRPC_BIN"
	// Use Cloud Trace context propagation using the
	// `X-Cloud-Trace-Context` http header.
	MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContextCloudTraceContext MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext = "CLOUD_TRACE_CONTEXT"
	// Use multi-header B3 context propagation using the `X-B3-TraceId`,
	// `X-B3-SpanId`, and `X-B3-Sampled` HTTP headers. See
	// [B3 header propagation README](https://github.com/openzipkin/b3-propagation)
	// for details.
	MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContextB3 MeshConfigExtensionProviderOpenCensusAgentTracingProviderTraceContext = "B3"
)

type MeshConfigExtensionProviderOpenTelemetryTracingProvider

type MeshConfigExtensionProviderOpenTelemetryTracingProvider struct {
	// REQUIRED. Specifies the OpenTelemetry endpoint that will receive OTLP traces.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "otlp.default.svc.cluster.local" or "bar/otlp.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
	// Optional. Specifies the configuration for exporting OTLP traces via HTTP.
	// When empty, traces will be exported via gRPC.
	//
	// The following example shows how to configure the OpenTelemetry ExtensionProvider to export via HTTP:
	//
	// 1. Add/change the OpenTelemetry extension provider in `MeshConfig`
	// “`yaml
	//   - name: otel-tracing
	//     opentelemetry:
	//     port: 443
	//     service: my.olly-backend.com
	//     http:
	//     path: "/api/otlp/traces"
	//     timeout: 10s
	//     headers:
	//   - name: "my-custom-header"
	//     value: "some value"
	//
	// “`
	//
	// 2. Deploy a `ServiceEntry` for the observability back-end
	// “`yaml
	// apiVersion: networking.istio.io/v1alpha3
	// kind: ServiceEntry
	// metadata:
	//
	//	name: my-olly-backend
	//
	// spec:
	//
	//	hosts:
	//	- my.olly-backend.com
	//	ports:
	//	- number: 443
	//	  name: https-port
	//	  protocol: HTTPS
	//	resolution: DNS
	//	location: MESH_EXTERNAL
	//
	// ---
	// apiVersion: networking.istio.io/v1alpha3
	// kind: DestinationRule
	// metadata:
	//
	//	name: my-olly-backend
	//
	// spec:
	//
	//	host: my.olly-backend.com
	//	trafficPolicy:
	//	  portLevelSettings:
	//	  - port:
	//	      number: 443
	//	    tls:
	//	      mode: SIMPLE
	//
	// “`
	Http *MeshConfigExtensionProviderHttpService `json:"http,omitempty"`
	// Optional. Specifies [Resource Detectors](https://opentelemetry.io/docs/specs/otel/resource/sdk/)
	// to be used by the OpenTelemetry Tracer. When multiple resources are provided, they are merged
	// according to the OpenTelemetry [Resource specification](https://opentelemetry.io/docs/specs/otel/resource/sdk/#merge).
	//
	// The following example shows how to configure the Environment Resource Detector, that will
	// read the attributes from the environment variable `OTEL_RESOURCE_ATTRIBUTES`:
	//
	// “`yaml
	//   - name: otel-tracing
	//     opentelemetry:
	//     port: 443
	//     service: my.olly-backend.com
	//     resource_detectors:
	//     environment: {}
	//
	// “`
	ResourceDetectors *MeshConfigExtensionProviderResourceDetectors `json:"resourceDetectors,omitempty"`
}

Defines configuration for an OpenTelemetry tracing backend. Istio 1.16.1 or higher is needed.

func (*MeshConfigExtensionProviderOpenTelemetryTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderOpenTelemetryTracingProvider.

func (*MeshConfigExtensionProviderOpenTelemetryTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderPrometheusMetricsProvider

type MeshConfigExtensionProviderPrometheusMetricsProvider struct {
}

func (*MeshConfigExtensionProviderPrometheusMetricsProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderPrometheusMetricsProvider.

func (*MeshConfigExtensionProviderPrometheusMetricsProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderResourceDetectors

type MeshConfigExtensionProviderResourceDetectors struct {
	Environment *MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector `json:"environment,omitempty"`
	Dynatrace   *MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector   `json:"dynatrace,omitempty"`
}

func (*MeshConfigExtensionProviderResourceDetectors) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderResourceDetectors.

func (*MeshConfigExtensionProviderResourceDetectors) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector

type MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector struct {
}

Dynatrace Resource Detector. The resource detector reads from the Dynatrace enrichment files and adds host/process related attributes to the OpenTelemetry resource.

See: [Enrich ingested data with Dynatrace-specific dimensions](https://docs.dynatrace.com/docs/shortlink/enrichment-files)

func (*MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector.

func (*MeshConfigExtensionProviderResourceDetectorsDynatraceResourceDetector) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector

type MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector struct {
}

OpenTelemetry Environment Resource Detector. The resource detector reads attributes from the environment variable `OTEL_RESOURCE_ATTRIBUTES` and adds them to the OpenTelemetry resource.

See: [Resource specification](https://opentelemetry.io/docs/specs/otel/resource/sdk/#specifying-resource-information-via-an-environment-variable)

func (*MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector.

func (*MeshConfigExtensionProviderResourceDetectorsEnvironmentResourceDetector) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderSkyWalkingTracingProvider

type MeshConfigExtensionProviderSkyWalkingTracingProvider struct {
	// REQUIRED. Specifies the service for the SkyWalking receiver.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "skywalking.default.svc.cluster.local" or "bar/skywalking.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. The SkyWalking OAP access token.
	AccessToken string `json:"accessToken,omitempty"`
}

Defines configuration for a SkyWalking tracer.

func (*MeshConfigExtensionProviderSkyWalkingTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderSkyWalkingTracingProvider.

func (*MeshConfigExtensionProviderSkyWalkingTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderStackdriverProvider

type MeshConfigExtensionProviderStackdriverProvider struct {
	// debug enables trace output to stdout.
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	Debug bool `json:"debug,omitempty"`
	// The global default max number of attributes per span.
	// default is 200.
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	MaxNumberOfAttributes *int64 `json:"maxNumberOfAttributes,omitempty"`
	// The global default max number of annotation events per span.
	// default is 200.
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	MaxNumberOfAnnotations *int64 `json:"maxNumberOfAnnotations,omitempty"`
	// The global default max number of message events per span.
	// default is 200.
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/config.proto.
	MaxNumberOfMessageEvents *int64 `json:"maxNumberOfMessageEvents,omitempty"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
	// Optional. Controls Stackdriver logging behavior.
	Logging *MeshConfigExtensionProviderStackdriverProviderLogging `json:"logging,omitempty"`
}

Defines configuration for Stackdriver.

WARNING: Stackdriver tracing uses OpenCensus configuration under the hood and, as a result, cannot be used alongside any OpenCensus provider configuration. This is due to a limitation in the implementation of OpenCensus driver in Envoy.

func (*MeshConfigExtensionProviderStackdriverProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderStackdriverProvider.

func (*MeshConfigExtensionProviderStackdriverProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderStackdriverProviderLogging

type MeshConfigExtensionProviderStackdriverProviderLogging struct {
	// Collection of tag names and tag expressions to include in the log
	// entry. Conflicts are resolved by the tag name by overriding previously
	// supplied values.
	//
	// Example:
	//
	//	labels:
	//	  path: request.url_path
	//	  foo: request.headers['x-foo']
	Labels map[string]string `json:"labels,omitempty"`
}

func (*MeshConfigExtensionProviderStackdriverProviderLogging) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderStackdriverProviderLogging.

func (*MeshConfigExtensionProviderStackdriverProviderLogging) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigExtensionProviderZipkinTracingProvider

type MeshConfigExtensionProviderZipkinTracingProvider struct {
	// REQUIRED. Specifies the service that the Zipkin API.
	// The format is `[<Namespace>/]<Hostname>`. The specification of `<Namespace>` is required only when it is insufficient
	// to unambiguously resolve a service in the service registry. The `<Hostname>` is a fully qualified host name of a
	// service defined by the Kubernetes service or ServiceEntry.
	//
	// Example: "zipkin.default.svc.cluster.local" or "bar/zipkin.example.com".
	// +kubebuilder:validation:Required
	Service string `json:"service"`
	// REQUIRED. Specifies the port of the service.
	// +kubebuilder:validation:Required
	Port uint32 `json:"port"`
	// Optional. Controls the overall path length allowed in a reported span.
	// NOTE: currently only controls max length of the path tag.
	MaxTagLength uint32 `json:"maxTagLength,omitempty"`
	// Optional. A 128 bit trace id will be used in Istio.
	// If true, will result in a 64 bit trace id being used.
	Enable64BitTraceId bool `json:"enable64bitTraceId,omitempty"`
}

Defines configuration for a Zipkin tracer.

func (*MeshConfigExtensionProviderZipkinTracingProvider) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigExtensionProviderZipkinTracingProvider.

func (*MeshConfigExtensionProviderZipkinTracingProvider) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigH2UpgradePolicy

type MeshConfigH2UpgradePolicy string

Default Policy for upgrading http1.1 connections to http2. +kubebuilder:validation:Enum=DO_NOT_UPGRADE;UPGRADE

const (
	// Do not upgrade connections to http2.
	MeshConfigH2UpgradePolicyDoNotUpgrade MeshConfigH2UpgradePolicy = "DO_NOT_UPGRADE"
	// Upgrade the connections to http2.
	MeshConfigH2UpgradePolicyUpgrade MeshConfigH2UpgradePolicy = "UPGRADE"
)

type MeshConfigInboundTrafficPolicy

type MeshConfigInboundTrafficPolicy struct {
	Mode MeshConfigInboundTrafficPolicyMode `json:"mode,omitempty"`
}

func (*MeshConfigInboundTrafficPolicy) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigInboundTrafficPolicy.

func (*MeshConfigInboundTrafficPolicy) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigInboundTrafficPolicyMode

type MeshConfigInboundTrafficPolicyMode string

+kubebuilder:validation:Enum=PASSTHROUGH;LOCALHOST

const (
	// inbound traffic will be passed through to the destination listening
	// on Pod IP. This matches the behavior without Istio enabled at all
	// allowing proxy to be transparent.
	MeshConfigInboundTrafficPolicyModePassthrough MeshConfigInboundTrafficPolicyMode = "PASSTHROUGH"
	// inbound traffic will be sent to the destinations listening on localhost.
	MeshConfigInboundTrafficPolicyModeLocalhost MeshConfigInboundTrafficPolicyMode = "LOCALHOST"
)

type MeshConfigIngressControllerMode

type MeshConfigIngressControllerMode string

+kubebuilder:validation:Enum=UNSPECIFIED;OFF;DEFAULT;STRICT

const (
	// Unspecified Istio ingress controller.
	MeshConfigIngressControllerModeUnspecified MeshConfigIngressControllerMode = "UNSPECIFIED"
	// Disables Istio ingress controller.
	MeshConfigIngressControllerModeOff MeshConfigIngressControllerMode = "OFF"
	// Istio ingress controller will act on ingress resources that do not
	// contain any annotation or whose annotations match the value
	// specified in the ingress_class parameter described earlier. Use this
	// mode if Istio ingress controller will be the default ingress
	// controller for the entire Kubernetes cluster.
	MeshConfigIngressControllerModeDefault MeshConfigIngressControllerMode = "DEFAULT"
	// Istio ingress controller will only act on ingress resources whose
	// annotations match the value specified in the ingress_class parameter
	// described earlier. Use this mode if Istio ingress controller will be
	// a secondary ingress controller (e.g., in addition to a
	// cloud-provided ingress controller).
	MeshConfigIngressControllerModeStrict MeshConfigIngressControllerMode = "STRICT"
)

type MeshConfigOutboundTrafficPolicy

type MeshConfigOutboundTrafficPolicy struct {
	Mode MeshConfigOutboundTrafficPolicyMode `json:"mode,omitempty"`
}

func (*MeshConfigOutboundTrafficPolicy) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigOutboundTrafficPolicy.

func (*MeshConfigOutboundTrafficPolicy) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigOutboundTrafficPolicyMode

type MeshConfigOutboundTrafficPolicyMode string

+kubebuilder:validation:Enum=REGISTRY_ONLY;ALLOW_ANY

const (
	// outbound traffic will be restricted to services defined in the
	// service registry as well as those defined through ServiceEntries
	MeshConfigOutboundTrafficPolicyModeRegistryOnly MeshConfigOutboundTrafficPolicyMode = "REGISTRY_ONLY"
	// outbound traffic to unknown destinations will be allowed, in case
	// there are no services or ServiceEntries for the destination port
	MeshConfigOutboundTrafficPolicyModeAllowAny MeshConfigOutboundTrafficPolicyMode = "ALLOW_ANY"
)

type MeshConfigProxyConfig

type MeshConfigProxyConfig struct {
	// Path to the generated configuration file directory.
	// Proxy agent generates the actual configuration and stores it in this directory.
	ConfigPath string `json:"configPath,omitempty"`
	// Path to the proxy binary
	BinaryPath string `json:"binaryPath,omitempty"`

	// Service cluster defines the name for the `service_cluster` that is
	// shared by all Envoy instances. This setting corresponds to
	// `--service-cluster` flag in Envoy.  In a typical Envoy deployment, the
	// `service-cluster` flag is used to identify the caller, for
	// source-based routing scenarios.
	//
	// Since Istio does not assign a local `service/service` version to each
	// Envoy instance, the name is same for all of them.  However, the
	// source/caller's identity (e.g., IP address) is encoded in the
	// `--service-node` flag when launching Envoy.  When the RDS service
	// receives API calls from Envoy, it uses the value of the `service-node`
	// flag to compute routes that are relative to the service instances
	// located at that IP address.
	ServiceCluster string `json:"serviceCluster,omitempty"`

	// Used by Envoy proxies to assign the values for the service names in trace
	// spans.
	TracingServiceName ProxyConfigTracingServiceName `json:"tracingServiceName,omitempty"` // The time in seconds that Envoy will drain connections during a hot
	// restart. MUST be >=1s (e.g., _1s/1m/1h_)
	// Default drain duration is `45s`.
	DrainDuration *metav1.Duration `json:"drainDuration,omitempty"`
	// Address of the discovery service exposing xDS with mTLS connection.
	// The inject configuration may override this value.
	DiscoveryAddress string `json:"discoveryAddress,omitempty"`
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/proxy.proto.
	DiscoveryRefreshDelay *metav1.Duration `json:"discoveryRefreshDelay,omitempty"`
	// Address of the Zipkin service (e.g. _zipkin:9411_).
	// DEPRECATED: Use [tracing][istio.mesh.v1alpha1.ProxyConfig.tracing] instead.
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/proxy.proto.
	ZipkinAddress string `json:"zipkinAddress,omitempty"`
	// IP Address and Port of a statsd UDP listener (e.g. `10.75.241.127:9125`).
	StatsdUdpAddress string `json:"statsdUdpAddress,omitempty"`
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/proxy.proto.
	EnvoyMetricsServiceAddress string `json:"envoyMetricsServiceAddress,omitempty"`
	// Port on which Envoy should listen for administrative commands.
	// Default port is `15000`.
	ProxyAdminPort int32 `json:"proxyAdminPort,omitempty"`
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/proxy.proto.
	AvailabilityZone string `json:"availabilityZone,omitempty"`
	// AuthenticationPolicy defines how the proxy is authenticated when it connects to the control plane.
	// Default is set to `MUTUAL_TLS`.
	ControlPlaneAuthPolicy AuthenticationPolicy `json:"controlPlaneAuthPolicy,omitempty"`
	// File path of custom proxy configuration, currently used by proxies
	// in front of Mixer and Pilot.
	CustomConfigFile string `json:"customConfigFile,omitempty"`
	// Maximum length of name field in Envoy's metrics. The length of the name field
	// is determined by the length of a name field in a service and the set of labels that
	// comprise a particular version of the service. The default value is set to 189 characters.
	// Envoy's internal metrics take up 67 characters, for a total of 256 character name per metric.
	// Increase the value of this field if you find that the metrics from Envoys are truncated.
	StatNameLength int32 `json:"statNameLength,omitempty"`
	// The number of worker threads to run.
	// If unset, this will be automatically determined based on CPU requests/limits.
	// If set to 0, all cores on the machine will be used.
	// Default is 2 worker threads.
	Concurrency *int32 `json:"concurrency,omitempty"`
	// Path to the proxy bootstrap template file
	ProxyBootstrapTemplatePath string `json:"proxyBootstrapTemplatePath,omitempty"`
	// The mode used to redirect inbound traffic to Envoy.
	InterceptionMode ProxyConfigInboundInterceptionMode `json:"interceptionMode,omitempty"`
	// Tracing configuration to be used by the proxy.
	Tracing *Tracing `json:"tracing,omitempty"`
	// Secret Discovery Service(SDS) configuration to be used by the proxy.
	// $hide_from_docs
	//
	// Deprecated: Marked as deprecated in mesh/v1alpha1/proxy.proto.
	Sds *SDS `json:"sds,omitempty"`
	// Address of the service to which access logs from Envoys should be
	// sent. (e.g. `accesslog-service:15000`). See [Access Log
	// Service](https://www.envoyproxy.io/docs/envoy/latest/api-v2/config/accesslog/v2/als.proto)
	// for details about Envoy's gRPC Access Log Service API.
	EnvoyAccessLogService *RemoteService `json:"envoyAccessLogService,omitempty"`
	// Address of the Envoy Metrics Service implementation (e.g. `metrics-service:15000`).
	// See [Metric Service](https://www.envoyproxy.io/docs/envoy/latest/api-v2/config/metrics/v2/metrics_service.proto)
	// for details about Envoy's Metrics Service API.
	EnvoyMetricsService *RemoteService `json:"envoyMetricsService,omitempty"`
	// Additional environment variables for the proxy.
	// Names starting with `ISTIO_META_` will be included in the generated bootstrap and sent to the XDS server.
	ProxyMetadata map[string]string `json:"proxyMetadata,omitempty"`
	// Envoy [runtime configuration](https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/operations/runtime) to set during bootstrapping.
	// This enables setting experimental, unsafe, unsupported, and deprecated features that should be used with extreme caution.
	RuntimeValues map[string]string `json:"runtimeValues,omitempty"`
	// Port on which the agent should listen for administrative commands such as readiness probe.
	// Default is set to port `15020`.
	StatusPort int32 `json:"statusPort,omitempty"`
	// An additional list of tags to extract from the in-proxy Istio telemetry. These extra tags can be
	// added by configuring the telemetry extension. Each additional tag needs to be present in this list.
	// Extra tags emitted by the telemetry extensions must be listed here so that they can be processed
	// and exposed as Prometheus metrics.
	// Deprecated: `istio.stats` is a native filter now, this field is no longer needed.
	ExtraStatTags []string `json:"extraStatTags,omitempty"`
	// Topology encapsulates the configuration which describes where the proxy is
	// located i.e. behind a (or N) trusted proxy (proxies) or directly exposed
	// to the internet. This configuration only effects gateways and is applied
	// to all the gateways in the cluster unless overridden via annotations of the
	// gateway workloads.
	GatewayTopology *Topology `json:"gatewayTopology,omitempty"`
	// The amount of time allowed for connections to complete on proxy shutdown.
	// On receiving `SIGTERM` or `SIGINT`, `istio-agent` tells the active Envoy to start draining,
	// preventing any new connections and allowing existing connections to complete. It then
	// sleeps for the `termination_drain_duration` and then kills any remaining active Envoy processes.
	// If not set, a default of `5s` will be applied.
	TerminationDrainDuration *metav1.Duration `json:"terminationDrainDuration,omitempty"`
	// The unique identifier for the [service mesh](https://istio.io/docs/reference/glossary/#service-mesh)
	// All control planes running in the same service mesh should specify the same mesh ID.
	// Mesh ID is used to label telemetry reports for cases where telemetry from multiple meshes is mixed together.
	MeshId string `json:"meshId,omitempty"`
	// VM Health Checking readiness probe. This health check config exactly mirrors the
	// kubernetes readiness probe configuration both in schema and logic.
	// Only one health check method of 3 can be set at a time.
	ReadinessProbe *k8sv1.Probe `json:"readinessProbe,omitempty"`
	// Proxy stats matcher defines configuration for reporting custom Envoy stats.
	// To reduce memory and CPU overhead from Envoy stats system, Istio proxies by
	// default create and expose only a subset of Envoy stats. This option is to
	// control creation of additional Envoy stats with prefix, suffix, and regex
	// expressions match on the name of the stats. This replaces the stats
	// inclusion annotations
	// (`sidecar.istio.io/statsInclusionPrefixes`,
	// `sidecar.istio.io/statsInclusionRegexps`, and
	// `sidecar.istio.io/statsInclusionSuffixes`). For example, to enable stats
	// for circuit breakers, request retries, upstream connections, and request timeouts,
	// you can specify stats matcher as follows:
	// “`yaml
	// proxyStatsMatcher:
	//
	//	inclusionRegexps:
	//	  - .*outlier_detection.*
	//	  - .*upstream_rq_retry.*
	//	  - .*upstream_cx_.*
	//	inclusionSuffixes:
	//	  - upstream_rq_timeout
	//
	// “`
	// Note including more Envoy stats might increase number of time series
	// collected by prometheus significantly. Care needs to be taken on Prometheus
	// resource provision and configuration to reduce cardinality.
	ProxyStatsMatcher *ProxyConfigProxyStatsMatcher `json:"proxyStatsMatcher,omitempty"`
	// Boolean flag for enabling/disabling the holdApplicationUntilProxyStarts behavior.
	// This feature adds hooks to delay application startup until the pod proxy
	// is ready to accept traffic, mitigating some startup race conditions.
	// Default value is 'false'.
	HoldApplicationUntilProxyStarts *bool `json:"holdApplicationUntilProxyStarts,omitempty"`
	// The PEM data of the extra root certificates for workload-to-workload communication.
	// This includes the certificates defined in MeshConfig and any other certificates that Istiod uses as CA.
	// The plugin certificates (the 'cacerts' secret), self-signed certificates (the 'istio-ca-secret' secret)
	// are added automatically by Istiod.
	CaCertificatesPem []string `json:"caCertificatesPem,omitempty"`
	// Specifies the details of the proxy image.
	Image *ProxyImage `json:"image,omitempty"`
	// Specifies the details of the Private Key Provider configuration for gateway and sidecar proxies.
	PrivateKeyProvider *PrivateKeyProvider `json:"privateKeyProvider,omitempty"`
	// Define the set of headers to add/modify for HTTP request/responses.
	//
	// To enable an optional header, simply set the field. If no specific configuration is required, an empty object (`{}`) will enable it.
	// Note: currently all headers are enabled by default.
	//
	// Below shows an example of customizing the `server` header and disabling the `X-Envoy-Attempt-Count` header:
	//
	// “`yaml
	// proxyHeaders:
	//
	//	server:
	//	  value: "my-custom-server"
	//	requestId: {} // Explicitly enable Request IDs. As this is the default, this has no effect.
	//	attemptCount:
	//	  disabled: true
	//
	// “`
	//
	// Some headers are enabled by default, and require explicitly disabling. See below for an example of disabling all default-enabled headers:
	//
	// “`yaml
	// proxyHeaders:
	//
	//	forwardedClientCert: SANITIZE
	//	server:
	//	  disabled: true
	//	requestId:
	//	  disabled: true
	//	attemptCount:
	//	  disabled: true
	//	envoyDebugHeaders:
	//	  disabled: true
	//	metadataExchangeHeaders:
	//	  mode: IN_MESH
	//
	// “`
	ProxyHeaders *ProxyConfigProxyHeaders `json:"proxyHeaders,omitempty"`
}

ProxyConfig defines variables for individual Envoy instances. This can be configured on a per-workload basis as well as by the mesh-wide defaults. To set the mesh wide defaults, configure the `defaultConfig` section of `meshConfig`. For example:

``` meshConfig:

defaultConfig:
  discoveryAddress: istiod:15012

```

This can also be configured on a per-workload basis by configuring the `proxy.istio.io/config` annotation on the pod. For example:

``` annotations:

proxy.istio.io/config: |
  discoveryAddress: istiod:15012

```

If both are configured, the two are merged with per field semantics; the field set in annotation will fully replace the field from mesh config defaults. This is different than a deep merge provided by protobuf. For example, `"tracing": { "sampling": 5 }` would completely override a setting configuring a tracing provider such as `"tracing": { "zipkin": { "address": "..." } }`.

Note: fields in ProxyConfig are not dynamically configured; changes will require restart of workloads to take effect. +kubebuilder:validation:XValidation:message="At most one of [serviceCluster tracingServiceName] should be set",rule="(has(self.serviceCluster)?1:0) + (has(self.tracingServiceName)?1:0) <= 1"

func (*MeshConfigProxyConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigProxyConfig.

func (*MeshConfigProxyConfig) DeepCopyInto

func (in *MeshConfigProxyConfig) DeepCopyInto(out *MeshConfigProxyConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigProxyPathNormalization

type MeshConfigProxyPathNormalization struct {
	Normalization MeshConfigProxyPathNormalizationNormalizationType `json:"normalization,omitempty"`
}

func (*MeshConfigProxyPathNormalization) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigProxyPathNormalization.

func (*MeshConfigProxyPathNormalization) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigProxyPathNormalizationNormalizationType

type MeshConfigProxyPathNormalizationNormalizationType string

+kubebuilder:validation:Enum=DEFAULT;NONE;BASE;MERGE_SLASHES;DECODE_AND_MERGE_SLASHES

const (
	// Apply default normalizations. Currently, this is BASE.
	MeshConfigProxyPathNormalizationNormalizationTypeDefault MeshConfigProxyPathNormalizationNormalizationType = "DEFAULT"
	// No normalization, paths are used as is.
	MeshConfigProxyPathNormalizationNormalizationTypeNone MeshConfigProxyPathNormalizationNormalizationType = "NONE"
	// Normalize according to [RFC 3986](https://tools.ietf.org/html/rfc3986).
	// For Envoy proxies, this is the [`normalize_path`](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto.html) option.
	// For example, `/a/../b` normalizes to `/b`.
	MeshConfigProxyPathNormalizationNormalizationTypeBase MeshConfigProxyPathNormalizationNormalizationType = "BASE"
	// In addition to the `BASE` normalization, consecutive slashes are also merged.
	// For example, `/a//b` normalizes to `a/b`.
	MeshConfigProxyPathNormalizationNormalizationTypeMergeSlashes MeshConfigProxyPathNormalizationNormalizationType = "MERGE_SLASHES"
	// In addition to normalization in `MERGE_SLASHES`, slash characters are UTF-8 decoded (case insensitive) prior to merging.
	// This means `%2F`, `%2f`, `%5C`, and `%5c` sequences in the request path will be rewritten to `/` or `\`.
	// For example, `/a%2f/b` normalizes to `a/b`.
	MeshConfigProxyPathNormalizationNormalizationTypeDecodeAndMergeSlashes MeshConfigProxyPathNormalizationNormalizationType = "DECODE_AND_MERGE_SLASHES"
)

type MeshConfigServiceSettings

type MeshConfigServiceSettings struct {
	// The settings to apply to the selected services.
	Settings *MeshConfigServiceSettingsSettings `json:"settings,omitempty"`
	// The services to which the Settings should be applied. Services are selected using the hostname
	// matching rules used by DestinationRule.
	//
	// For example: foo.bar.svc.cluster.local, *.baz.svc.cluster.local
	Hosts []string `json:"hosts,omitempty"`
}

$hide_from_docs Settings to be applied to select services.

For example, the following configures all services in namespace "foo" as well as the "bar" service in namespace "baz" to be considered cluster-local:

```yaml serviceSettings:

  • settings: cluster_local: true hosts:
  • "*.foo.svc.cluster.local"
  • "bar.baz.svc.cluster.local"

```

func (*MeshConfigServiceSettings) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigServiceSettings.

func (*MeshConfigServiceSettings) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigServiceSettingsSettings

type MeshConfigServiceSettingsSettings struct {
	// If true, specifies that the client and service endpoints must reside in the same cluster.
	// By default, in multi-cluster deployments, the Istio control plane assumes all service
	// endpoints to be reachable from any client in any of the clusters which are part of the
	// mesh. This configuration option limits the set of service endpoints visible to a client
	// to be cluster scoped.
	//
	// There are some common scenarios when this can be useful:
	//
	//   - A service (or group of services) is inherently local to the cluster and has local storage
	//     for that cluster. For example, the kube-system namespace (e.g. the Kube API Server).
	//   - A mesh administrator wants to slowly migrate services to Istio. They might start by first
	//     having services cluster-local and then slowly transition them to mesh-wide. They could do
	//     this service-by-service (e.g. mysvc.myns.svc.cluster.local) or as a group
	//     (e.g. *.myns.svc.cluster.local).
	//
	// By default Istio will consider kubernetes.default.svc (i.e. the API Server) as well as all
	// services in the kube-system namespace to be cluster-local, unless explicitly overridden here.
	ClusterLocal bool `json:"clusterLocal,omitempty"`
}

Settings for the selected services.

func (*MeshConfigServiceSettingsSettings) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigServiceSettingsSettings.

func (*MeshConfigServiceSettingsSettings) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigTLSConfig

type MeshConfigTLSConfig struct {
	// Optional: the minimum TLS protocol version. The default minimum
	// TLS version will be TLS 1.2. As servers may not be Envoy and be
	// set to TLS 1.2 (e.g., workloads using mTLS without sidecars), the
	// minimum TLS version for clients may also be TLS 1.2.
	// In the current Istio implementation, the maximum TLS protocol version
	// is TLS 1.3.
	MinProtocolVersion MeshConfigTLSConfigTLSProtocol `json:"minProtocolVersion,omitempty"`
	// Optional: If specified, the TLS connection will only support the specified ECDH curves for the DH key exchange.
	// If not specified, the default curves enforced by Envoy will be used. For details about the default curves, refer to
	// [Ecdh Curves](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/transport_sockets/tls/v3/common.proto).
	EcdhCurves []string `json:"ecdhCurves,omitempty"`
	// Optional: If specified, the TLS connection will only support the specified cipher list when negotiating TLS 1.0-1.2.
	// If not specified, the following cipher suites will be used:
	// “`
	// ECDHE-ECDSA-AES256-GCM-SHA384
	// ECDHE-RSA-AES256-GCM-SHA384
	// ECDHE-ECDSA-AES128-GCM-SHA256
	// ECDHE-RSA-AES128-GCM-SHA256
	// AES256-GCM-SHA384
	// AES128-GCM-SHA256
	// “`
	CipherSuites []string `json:"cipherSuites,omitempty"`
}

func (*MeshConfigTLSConfig) DeepCopy

func (in *MeshConfigTLSConfig) DeepCopy() *MeshConfigTLSConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshConfigTLSConfig.

func (*MeshConfigTLSConfig) DeepCopyInto

func (in *MeshConfigTLSConfig) DeepCopyInto(out *MeshConfigTLSConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MeshConfigTLSConfigTLSProtocol

type MeshConfigTLSConfigTLSProtocol string

TLS protocol versions. +kubebuilder:validation:Enum=TLS_AUTO;TLSV1_2;TLSV1_3

const (
	// Automatically choose the optimal TLS version.
	MeshConfigTLSConfigTLSProtocolTlsAuto MeshConfigTLSConfigTLSProtocol = "TLS_AUTO"
	// TLS version 1.2
	MeshConfigTLSConfigTLSProtocolTlsv12 MeshConfigTLSConfigTLSProtocol = "TLSV1_2"
	// TLS version 1.3
	MeshConfigTLSConfigTLSProtocolTlsv13 MeshConfigTLSConfigTLSProtocol = "TLSV1_3"
)

type MeshNetworks

type MeshNetworks struct {
	// The set of networks inside this mesh. Each network should
	// have a unique name and information about how to infer the endpoints in
	// the network as well as the gateways associated with the network.
	Networks map[string]*Network `json:"networks,omitempty"`
}

MeshNetworks (config map) provides information about the set of networks inside a mesh and how to route to endpoints in each network. For example

MeshNetworks(file/config map):

```yaml networks:

network1:
  endpoints:
  - fromRegistry: registry1 #must match kubeconfig name in Kubernetes secret
  - fromCidr: 192.168.100.0/22 #a VM network for example
  gateways:
  - registryServiceName: istio-ingressgateway.istio-system.svc.cluster.local
    port: 15443
    locality: us-east-1a
  - address: 192.168.100.1
    port: 15443
    locality: us-east-1a

```

func (*MeshNetworks) DeepCopy

func (in *MeshNetworks) DeepCopy() *MeshNetworks

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MeshNetworks.

func (*MeshNetworks) DeepCopyInto

func (in *MeshNetworks) DeepCopyInto(out *MeshNetworks)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type MultiClusterConfig

type MultiClusterConfig struct {
	// Enables the connection between two kubernetes clusters via their respective ingressgateway services.
	// Use if the pods in each cluster cannot directly talk to one another.
	Enabled *bool `json:"enabled,omitempty"`
	// The name of the cluster this installation will run in. This is required for sidecar injection
	// to properly label proxies
	ClusterName string `json:"clusterName,omitempty"`
	// The suffix for global service names.
	GlobalDomainSuffix string `json:"globalDomainSuffix,omitempty"`
	// Enable envoy filter to translate `globalDomainSuffix` to cluster local suffix for cross cluster communication.
	IncludeEnvoyFilter *bool `json:"includeEnvoyFilter,omitempty"`
}

MultiClusterConfig specifies the Configuration for Istio mesh across multiple clusters through the istio gateways.

func (*MultiClusterConfig) DeepCopy

func (in *MultiClusterConfig) DeepCopy() *MultiClusterConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MultiClusterConfig.

func (*MultiClusterConfig) DeepCopyInto

func (in *MultiClusterConfig) DeepCopyInto(out *MultiClusterConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Network

type Network struct {
	// The list of endpoints in the network (obtained through the
	// constituent service registries or from CIDR ranges). All endpoints in
	// the network are directly accessible to one another.
	Endpoints []*NetworkNetworkEndpoints `json:"endpoints,omitempty"`
	// Set of gateways associated with the network.
	Gateways []*NetworkIstioNetworkGateway `json:"gateways,omitempty"`
}

Network provides information about the endpoints in a routable L3 network. A single routable L3 network can have one or more service registries. Note that the network has no relation to the locality of the endpoint. The endpoint locality will be obtained from the service registry.

func (*Network) DeepCopy

func (in *Network) DeepCopy() *Network

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Network.

func (*Network) DeepCopyInto

func (in *Network) DeepCopyInto(out *Network)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type NetworkIstioNetworkGateway

type NetworkIstioNetworkGateway struct {
	// A fully qualified domain name of the gateway service.  Pilot will
	// lookup the service from the service registries in the network and
	// obtain the endpoint IPs of the gateway from the service
	// registry. Note that while the service name is a fully qualified
	// domain name, it need not be resolvable outside the orchestration
	// platform for the registry. e.g., this could be
	// istio-ingressgateway.istio-system.svc.cluster.local.
	RegistryServiceName string `json:"registryServiceName,omitempty"`

	// IP address or externally resolvable DNS address associated with the gateway.
	Address string `json:"address,omitempty"` // The port associated with the gateway.
	Port    uint32 `json:"port,omitempty"`
	// The locality associated with an explicitly specified gateway (i.e. ip)
	Locality string `json:"locality,omitempty"`
}

The gateway associated with this network. Traffic from remote networks will arrive at the specified gateway:port. All incoming traffic must use mTLS. +kubebuilder:validation:XValidation:message="At most one of [registryServiceName address] should be set",rule="(has(self.registryServiceName)?1:0) + (has(self.address)?1:0) <= 1"

func (*NetworkIstioNetworkGateway) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new NetworkIstioNetworkGateway.

func (*NetworkIstioNetworkGateway) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type NetworkNetworkEndpoints

type NetworkNetworkEndpoints struct {
	// A CIDR range for the set of endpoints in this network. The CIDR
	// ranges for endpoints from different networks must not overlap.
	FromCidr string `json:"fromCidr,omitempty"`

	// Add all endpoints from the specified registry into this network.
	// The names of the registries should correspond to the kubeconfig file name
	// inside the secret that was used to configure the registry (Kubernetes
	// multicluster) or supplied by MCP server.
	FromRegistry string `json:"fromRegistry,omitempty"`
}

NetworkEndpoints describes how the network associated with an endpoint should be inferred. An endpoint will be assigned to a network based on the following rules:

1. Implicitly: If the registry explicitly provides information about the network to which the endpoint belongs to. In some cases, its possible to indicate the network associated with the endpoint by adding the `ISTIO_META_NETWORK` environment variable to the sidecar.

2. Explicitly:

a. By matching the registry name with one of the "fromRegistry"
in the mesh config. A "from_registry" can only be assigned to a
single network.

b. By matching the IP against one of the CIDR ranges in a mesh
config network. The CIDR ranges must not overlap and be assigned to
a single network.

(2) will override (1) if both are present. +kubebuilder:validation:XValidation:message="At most one of [fromCidr fromRegistry] should be set",rule="(has(self.fromCidr)?1:0) + (has(self.fromRegistry)?1:0) <= 1"

func (*NetworkNetworkEndpoints) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new NetworkNetworkEndpoints.

func (*NetworkNetworkEndpoints) DeepCopyInto

func (in *NetworkNetworkEndpoints) DeepCopyInto(out *NetworkNetworkEndpoints)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type OutboundTrafficPolicyConfig

type OutboundTrafficPolicyConfig struct {
	Mode OutboundTrafficPolicyConfigMode `json:"mode,omitempty"`
}

OutboundTrafficPolicyConfig controls the default behavior of the sidecar for handling outbound traffic from the application.

func (*OutboundTrafficPolicyConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new OutboundTrafficPolicyConfig.

func (*OutboundTrafficPolicyConfig) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type OutboundTrafficPolicyConfigMode

type OutboundTrafficPolicyConfigMode string

Specifies the sidecar's default behavior when handling outbound traffic from the application. +kubebuilder:validation:Enum=ALLOW_ANY;REGISTRY_ONLY

const (
	// Outbound traffic to unknown destinations will be allowed, in case there are no services or ServiceEntries for the destination port
	OutboundTrafficPolicyConfigModeAllowAny OutboundTrafficPolicyConfigMode = "ALLOW_ANY"
	// Restrict outbound traffic to services defined in the service registry as well as those defined through ServiceEntries
	OutboundTrafficPolicyConfigModeRegistryOnly OutboundTrafficPolicyConfigMode = "REGISTRY_ONLY"
)

type PilotConfig

type PilotConfig struct {
	// Controls whether Pilot is enabled.
	Enabled *bool `json:"enabled,omitempty"`
	// Controls whether a HorizontalPodAutoscaler is installed for Pilot.
	AutoscaleEnabled *bool `json:"autoscaleEnabled,omitempty"`
	// Minimum number of replicas in the HorizontalPodAutoscaler for Pilot.
	AutoscaleMin uint32 `json:"autoscaleMin,omitempty"`
	// Maximum number of replicas in the HorizontalPodAutoscaler for Pilot.
	AutoscaleMax uint32 `json:"autoscaleMax,omitempty"`
	// See https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#configurable-scaling-behavior
	AutoscaleBehavior *autoscalingv2.HorizontalPodAutoscalerBehavior `json:"autoscaleBehavior,omitempty"`
	// Number of replicas in the Pilot Deployment.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	ReplicaCount uint32 `json:"replicaCount,omitempty"`
	// Image name used for Pilot.
	//
	// This can be set either to image name if hub is also set, or can be set to the full hub:name string.
	//
	// Examples: custom-pilot, docker.io/someuser:custom-pilot
	Image string `json:"image,omitempty"`
	// Trace sampling fraction.
	//
	// Used to set the fraction of time that traces are sampled. Higher values are more accurate but add CPU overhead.
	//
	// Allowed values: 0.0 to 1.0
	TraceSampling float64 `json:"traceSampling,omitempty"`
	// K8s resources settings.
	//
	// See https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#resource-requests-and-limits-of-pod-and-container
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Resources *k8sv1.ResourceRequirements `json:"resources,omitempty"`
	// Namespace that the configuration management feature is installed into, if different from Pilot namespace.
	ConfigNamespace string `json:"configNamespace,omitempty"`
	// Target CPU utilization used in HorizontalPodAutoscaler.
	//
	// See https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Cpu *TargetUtilizationConfig `json:"cpu,omitempty"`
	// K8s node selector.
	//
	// See https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#nodeselector
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	NodeSelector map[string]string `json:"nodeSelector,omitempty"`
	// Maximum duration that a sidecar can be connected to a pilot.
	//
	// This setting balances out load across pilot instances, but adds some resource overhead.
	//
	// Examples: 300s, 30m, 1h
	KeepaliveMaxServerConnectionAge *metav1.Duration `json:"keepaliveMaxServerConnectionAge,omitempty"`
	// Labels that are added to Pilot deployment.
	//
	// See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
	DeploymentLabels map[string]string `json:"deploymentLabels,omitempty"`
	// Labels that are added to Pilot pods.
	//
	// See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
	PodLabels map[string]string `json:"podLabels,omitempty"`
	// Configuration settings passed to Pilot as a ConfigMap.
	//
	// This controls whether the mesh config map, generated from values.yaml is generated.
	// If false, pilot wil use default values or user-supplied values, in that order of preference.
	ConfigMap *bool `json:"configMap,omitempty"`
	// Controls whether Pilot is configured through the Mesh Control Protocol (MCP).
	//
	// If set to true, Pilot requires an MCP server (like Galley) to be installed.
	UseMCP *bool `json:"useMCP,omitempty"`
	// Environment variables passed to the Pilot container.
	//
	// Examples:
	// env:
	//
	//	ENV_VAR_1: value1
	//	ENV_VAR_2: value2
	Env map[string]string `json:"env,omitempty"`
	// K8s affinity to set on the Pilot Pods.
	Affinity *k8sv1.Affinity `json:"affinity,omitempty"`
	// K8s rolling update strategy
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	// +kubebuilder:validation:XIntOrString
	RollingMaxSurge *intstr.IntOrString `json:"rollingMaxSurge,omitempty"`
	// The number of pods that can be unavailable during a rolling update (see
	// `strategy.rollingUpdate.maxUnavailable` here:
	// https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/deployment-v1/#DeploymentSpec).
	// May be specified as a number of pods or as a percent of the total number
	// of pods at the start of the update.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	// +kubebuilder:validation:XIntOrString
	RollingMaxUnavailable *intstr.IntOrString `json:"rollingMaxUnavailable,omitempty"`
	// The node tolerations to be applied to the Pilot deployment so that it can be
	// scheduled to particular nodes with matching taints.
	// More info: https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#scheduling
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Tolerations []k8sv1.Toleration `json:"tolerations,omitempty"`
	// Specifies whether protocol sniffing is enabled for outbound traffic.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	EnableProtocolSniffingForOutbound *bool `json:"enableProtocolSniffingForOutbound,omitempty"`
	// Specifies whether protocol sniffing is enabled for inbound traffic.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	EnableProtocolSniffingForInbound *bool `json:"enableProtocolSniffingForInbound,omitempty"`
	// K8s annotations for pods.
	//
	// See: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	PodAnnotations map[string]string `json:"podAnnotations,omitempty"`
	// K8s annotations for the Service.
	//
	// See: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/
	ServiceAnnotations map[string]string `json:"serviceAnnotations,omitempty"`
	// ConfigSource describes a source of configuration data for networking
	// rules, and other Istio configuration artifacts. Multiple data sources
	// can be configured for a single control plane.
	ConfigSource *PilotConfigSource `json:"configSource,omitempty"`
	// Specifies an extra root certificate in PEM format. This certificate will be trusted
	// by pilot when resolving JWKS URIs.
	JwksResolverExtraRootCA string `json:"jwksResolverExtraRootCA,omitempty"`
	// Hub to pull the container image from. Image will be `Hub/Image:Tag-Variant`.
	Hub string `json:"hub,omitempty"`
	// The container image tag to pull. Image will be `Hub/Image:Tag-Variant`.
	// +kubebuilder:validation:XIntOrString
	Tag *intstr.IntOrString `json:"tag,omitempty"`
	// The container image variant to pull. Options are "debug" or "distroless". Unset will use the default for the given version.
	Variant string `json:"variant,omitempty"`
	// The seccompProfile for the Pilot container.
	//
	// See: https://kubernetes.io/docs/tutorials/security/seccomp/
	SeccompProfile *k8sv1.SeccompProfile `json:"seccompProfile,omitempty"`
	// The k8s topologySpreadConstraints for the Pilot pods.
	TopologySpreadConstraints []k8sv1.TopologySpreadConstraint `json:"topologySpreadConstraints,omitempty"`
	// Additional container arguments for the Pilot container.
	ExtraContainerArgs []string `json:"extraContainerArgs,omitempty"`
	// Additional volumeMounts to add to the Pilot container.
	VolumeMounts []k8sv1.VolumeMount `json:"volumeMounts,omitempty"`
	// Additional volumes to add to the Pilot Pod.
	Volumes []k8sv1.Volume `json:"volumes,omitempty"`
	// Defines which IP family to use for single stack or the order of IP families for dual-stack.
	// Valid list items are "IPv4", "IPv6".
	// More info: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
	IpFamilies []string `json:"ipFamilies,omitempty"`
	// Controls whether Services are configured to use IPv4, IPv6, or both. Valid options
	// are PreferDualStack, RequireDualStack, and SingleStack.
	// More info: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
	IpFamilyPolicy string `json:"ipFamilyPolicy,omitempty"`
	// Target memory utilization used in HorizontalPodAutoscaler.
	//
	// See https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Memory *TargetUtilizationConfig `json:"memory,omitempty"`
	// Configures whether to use an existing CNI installation for workloads
	Cni *CNIUsageConfig `json:"cni,omitempty"`
}

Configuration for Pilot.

func (*PilotConfig) DeepCopy

func (in *PilotConfig) DeepCopy() *PilotConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PilotConfig.

func (*PilotConfig) DeepCopyInto

func (in *PilotConfig) DeepCopyInto(out *PilotConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PilotConfigSource

type PilotConfigSource struct {
	// Describes the source of configuration, if nothing is specified default is MCP.
	SubscribedResources []string `json:"subscribedResources,omitempty"`
}

PilotConfigSource describes information about a configuration store inside a mesh. A single control plane instance can interact with one or more data sources.

func (*PilotConfigSource) DeepCopy

func (in *PilotConfigSource) DeepCopy() *PilotConfigSource

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PilotConfigSource.

func (*PilotConfigSource) DeepCopyInto

func (in *PilotConfigSource) DeepCopyInto(out *PilotConfigSource)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PilotPolicyConfig

type PilotPolicyConfig struct {
	// Controls whether Istio policy is applied to Pilot.
	Enabled *bool `json:"enabled,omitempty"`
}

Controls whether Istio policy is applied to Pilot.

func (*PilotPolicyConfig) DeepCopy

func (in *PilotPolicyConfig) DeepCopy() *PilotPolicyConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PilotPolicyConfig.

func (*PilotPolicyConfig) DeepCopyInto

func (in *PilotPolicyConfig) DeepCopyInto(out *PilotPolicyConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PolicyTargetReference

type PolicyTargetReference struct {
	// group is the group of the target resource.
	Group string `json:"group,omitempty"`
	// kind is kind of the target resource.
	Kind string `json:"kind,omitempty"`
	// name is the name of the target resource.
	Name string `json:"name,omitempty"`
	// namespace is the namespace of the referent. When unspecified, the local
	// namespace is inferred.
	Namespace string `json:"namespace,omitempty"`
}

PolicyTargetReference format as defined by [GEP-713](https://gateway-api.sigs.k8s.io/geps/gep-713/#policy-targetref-api).

PolicyTargetReferences specifies the targeted resource which the policy can be applied to. It must only target a single resource at a time, but it can be used to target larger resources such as Gateways that may apply to multiple child resources. The PolicyTargetReference will be used instead of a WorkloadSelector in the RequestAuthentication, AuthorizationPolicy, Telemetry, and WasmPlugin CRDs to target a Kubernetes Gateway.

The following is an example of an AuthorizationPolicy bound to a waypoint proxy using a PolicyTargetReference. The example sets `action` to `DENY` to create a deny policy. It denies all the requests with `POST` method on port `8080` directed through the `waypoint` Gateway in the `foo` namespace.

{{<tabset category-name="example">}} {{<tab name="v1" category-value="v1">}} ```yaml apiVersion: security.istio.io/v1 kind: AuthorizationPolicy metadata:

name: httpbin
namespace: foo

spec:

targetRef:
  name: waypoint
  kind: Gateway
  group: gateway.networking.k8s.io
action: DENY
rules:
- to:
  - operation:
      methods: ["POST"]
      ports: ["8080"]

``` {{</tab>}} {{</tabset>}}

func (*PolicyTargetReference) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyTargetReference.

func (*PolicyTargetReference) DeepCopyInto

func (in *PolicyTargetReference) DeepCopyInto(out *PolicyTargetReference)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PortSelector

type PortSelector struct {
	// Port number
	// +kubebuilder:validation:Minimum=1
	// +kubebuilder:validation:Maximum=65535
	Number uint32 `json:"number,omitempty"`
}

PortSelector is the criteria for specifying if a policy can be applied to a listener having a specific port.

func (*PortSelector) DeepCopy

func (in *PortSelector) DeepCopy() *PortSelector

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortSelector.

func (*PortSelector) DeepCopyInto

func (in *PortSelector) DeepCopyInto(out *PortSelector)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PortsConfig

type PortsConfig struct {
	// Port name.
	Name string `json:"name,omitempty"`
	// Port number.
	Port int32 `json:"port,omitempty"`
	// NodePort number.
	NodePort int32 `json:"nodePort,omitempty"`
	// Target port number.
	TargetPort int32 `json:"targetPort,omitempty"`
	// Protocol name.
	Protocol string `json:"protocol,omitempty"`
}

Configuration for a port.

func (*PortsConfig) DeepCopy

func (in *PortsConfig) DeepCopy() *PortsConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortsConfig.

func (*PortsConfig) DeepCopyInto

func (in *PortsConfig) DeepCopyInto(out *PortsConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PrivateKeyProvider

type PrivateKeyProvider struct {
	// Use CryptoMb private key provider
	Cryptomb *PrivateKeyProviderCryptoMb `json:"cryptomb,omitempty"`

	// Use QAT private key provider
	Qat *PrivateKeyProviderQAT `json:"qat,omitempty"`
}

PrivateKeyProvider defines private key configuration for gateways and sidecars. This can be configured mesh wide or individual per-workload basis. +kubebuilder:validation:XValidation:message="At most one of [cryptomb qat] should be set",rule="(has(self.cryptomb)?1:0) + (has(self.qat)?1:0) <= 1"

func (*PrivateKeyProvider) DeepCopy

func (in *PrivateKeyProvider) DeepCopy() *PrivateKeyProvider

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PrivateKeyProvider.

func (*PrivateKeyProvider) DeepCopyInto

func (in *PrivateKeyProvider) DeepCopyInto(out *PrivateKeyProvider)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PrivateKeyProviderCryptoMb

type PrivateKeyProviderCryptoMb struct {
	// How long to wait until the per-thread processing queue should be processed. If the processing queue
	// gets full (eight sign or decrypt requests are received) it is processed immediately.
	// However, if the queue is not filled before the delay has expired, the requests already in the queue
	// are processed, even if the queue is not full.
	// In effect, this value controls the balance between latency and throughput.
	// The duration needs to be set to a value greater than or equal to 1 millisecond.
	PollDelay *metav1.Duration `json:"pollDelay,omitempty"`
	// If the private key provider isn’t available (eg. the required hardware capability doesn’t existed)
	// Envoy will fallback to the BoringSSL default implementation when the fallback is true.
	// The default value is false.
	Fallback *bool `json:"fallback,omitempty"`
}

CryptoMb PrivateKeyProvider configuration

func (*PrivateKeyProviderCryptoMb) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PrivateKeyProviderCryptoMb.

func (*PrivateKeyProviderCryptoMb) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type PrivateKeyProviderQAT

type PrivateKeyProviderQAT struct {
	// How long to wait before polling the hardware accelerator after a request has been submitted there.
	// Having a small value leads to quicker answers from the hardware but causes more polling loop spins,
	// leading to potentially larger CPU usage.
	// The duration needs to be set to a value greater than or equal to 1 millisecond.
	PollDelay *metav1.Duration `json:"pollDelay,omitempty"`
	// If the private key provider isn’t available (eg. the required hardware capability doesn’t existed)
	// Envoy will fallback to the BoringSSL default implementation when the fallback is true.
	// The default value is false.
	Fallback *bool `json:"fallback,omitempty"`
}

QAT (QuickAssist Technology) PrivateKeyProvider configuration

func (*PrivateKeyProviderQAT) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PrivateKeyProviderQAT.

func (*PrivateKeyProviderQAT) DeepCopyInto

func (in *PrivateKeyProviderQAT) DeepCopyInto(out *PrivateKeyProviderQAT)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfig

type ProxyConfig struct {
	// Controls the 'policy' in the sidecar injector.
	AutoInject string `json:"autoInject,omitempty"`
	// Domain for the cluster, default: "cluster.local".
	//
	// K8s allows this to be customized, see https://kubernetes.io/docs/tasks/administer-cluster/dns-custom-nameservers/
	ClusterDomain string `json:"clusterDomain,omitempty"`
	// Per Component log level for proxy, applies to gateways and sidecars.
	//
	// If a component level is not set, then the global "logLevel" will be used. If left empty, "misc:error" is used.
	ComponentLogLevel string `json:"componentLogLevel,omitempty"`
	// Enables core dumps for newly injected sidecars.
	//
	// If set, newly injected sidecars will have core dumps enabled.
	EnableCoreDump *bool `json:"enableCoreDump,omitempty"`
	// Specifies the Istio ingress ports not to capture.
	ExcludeInboundPorts string `json:"excludeInboundPorts,omitempty"`
	// Lists the excluded IP ranges of Istio egress traffic that the sidecar captures.
	ExcludeIPRanges string `json:"excludeIPRanges,omitempty"`
	// Image name or path for the proxy, default: "proxyv2".
	//
	// If registry or tag are not specified, global.hub and global.tag are used.
	//
	// Examples: my-proxy (uses global.hub/tag), docker.io/myrepo/my-proxy:v1.0.0
	Image string `json:"image,omitempty"`
	// Lists the IP ranges of Istio egress traffic that the sidecar captures.
	//
	// Example: "172.30.0.0/16,172.20.0.0/16"
	// This would only capture egress traffic on those two IP Ranges, all other outbound traffic would # be allowed by the sidecar."
	IncludeIPRanges string `json:"includeIPRanges,omitempty"`
	// Log level for proxy, applies to gateways and sidecars. If left empty, "warning" is used. Expected values are: trace\|debug\|info\|warning\|error\|critical\|off
	LogLevel string `json:"logLevel,omitempty"`
	// Enables privileged securityContext for the istio-proxy container.
	//
	// See https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
	Privileged *bool `json:"privileged,omitempty"`
	// Sets the initial delay for readiness probes in seconds.
	ReadinessInitialDelaySeconds uint32 `json:"readinessInitialDelaySeconds,omitempty"`
	// Sets the interval between readiness probes in seconds.
	ReadinessPeriodSeconds uint32 `json:"readinessPeriodSeconds,omitempty"`
	// Sets the number of successive failed probes before indicating readiness failure.
	ReadinessFailureThreshold uint32 `json:"readinessFailureThreshold,omitempty"`
	// Configures the startup probe for the istio-proxy container.
	StartupProbe *StartupProbe `json:"startupProbe,omitempty"`
	// Default port used for the Pilot agent's health checks.
	StatusPort uint32 `json:"statusPort,omitempty"`
	// K8s resources settings.
	//
	// See https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#resource-requests-and-limits-of-pod-and-container
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Resources *k8sv1.ResourceRequirements `json:"resources,omitempty"`
	// Specify which tracer to use. One of: zipkin, lightstep, datadog, stackdriver.
	// If using stackdriver tracer outside GCP, set env GOOGLE_APPLICATION_CREDENTIALS to the GCP credential file.
	Tracer Tracer `json:"tracer,omitempty"`
	// A comma separated list of outbound ports to be excluded from redirection to Envoy.
	ExcludeOutboundPorts string `json:"excludeOutboundPorts,omitempty"`
	// The k8s lifecycle hooks definition (pod.spec.containers.lifecycle) for the proxy container.
	// More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
	Lifecycle *k8sv1.Lifecycle `json:"lifecycle,omitempty"`
	// Controls if sidecar is injected at the front of the container list and blocks the start of the other containers until the proxy is ready
	//
	// Deprecated: replaced by ProxyConfig setting which allows per-pod configuration of this behavior.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	HoldApplicationUntilProxyStarts *bool `json:"holdApplicationUntilProxyStarts,omitempty"`
	// A comma separated list of inbound ports for which traffic is to be redirected to Envoy.
	// The wildcard character '*' can be used to configure redirection for all ports.
	IncludeInboundPorts string `json:"includeInboundPorts,omitempty"`
	// A comma separated list of outbound ports for which traffic is to be redirected to Envoy, regardless of the destination IP.
	IncludeOutboundPorts string `json:"includeOutboundPorts,omitempty"`
}

Configuration for Proxy.

func (*ProxyConfig) DeepCopy

func (in *ProxyConfig) DeepCopy() *ProxyConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfig.

func (*ProxyConfig) DeepCopyInto

func (in *ProxyConfig) DeepCopyInto(out *ProxyConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigInboundInterceptionMode

type ProxyConfigInboundInterceptionMode string

The mode used to redirect inbound traffic to Envoy. This setting has no effect on outbound traffic: iptables `REDIRECT` is always used for outbound connections. +kubebuilder:validation:Enum=REDIRECT;TPROXY;NONE

const (
	// The `REDIRECT` mode uses iptables `REDIRECT` to `NAT` and redirect to Envoy. This mode loses
	// source IP addresses during redirection. This is the default redirection mode.
	ProxyConfigInboundInterceptionModeRedirect ProxyConfigInboundInterceptionMode = "REDIRECT"
	// The `TPROXY` mode uses iptables `TPROXY` to redirect to Envoy. This mode preserves both the
	// source and destination IP addresses and ports, so that they can be used for advanced
	// filtering and manipulation. This mode also configures the sidecar to run with the
	// `CAP_NET_ADMIN` capability, which is required to use `TPROXY`.
	ProxyConfigInboundInterceptionModeTproxy ProxyConfigInboundInterceptionMode = "TPROXY"
	// The `NONE` mode does not configure redirect to Envoy at all. This is an advanced
	// configuration that typically requires changes to user applications.
	ProxyConfigInboundInterceptionModeNone ProxyConfigInboundInterceptionMode = "NONE"
)

type ProxyConfigProxyHeaders

type ProxyConfigProxyHeaders struct {
	// Controls the `X-Forwarded-Client-Cert` header for inbound sidecar requests. To set this on gateways, use the `Topology` setting.
	// To disable the header, configure either `SANITIZE` (to always remove the header, if present) or `FORWARD_ONLY` (to leave the header as-is).
	// By default, `APPEND_FORWARD` will be used.
	ForwardedClientCert ForwardClientCertDetails `json:"forwardedClientCert,omitempty"`
	// Controls the `X-Request-Id` header. If enabled, a request ID is generated for each request if one is not already set.
	// This applies to all types of traffic (inbound, outbound, and gateways).
	// If disabled, no request ID will be generate for the request. If it is already present, it will be preserved.
	// Warning: request IDs are a critical component to mesh tracing and logging, so disabling this is not recommended.
	// This header is enabled by default if not configured.
	RequestId *ProxyConfigProxyHeadersRequestId `json:"requestId,omitempty"`
	// Controls the `server` header. If enabled, the `Server: istio-envoy` header is set in response headers for inbound traffic (including gateways).
	// If disabled, the `Server` header is not modified. If it is already present, it will be preserved.
	Server *ProxyConfigProxyHeadersServer `json:"server,omitempty"`
	// Controls the `X-Envoy-Attempt-Count` header.
	// If enabled, this header will be added on outbound request headers (including gateways) that have retries configured.
	// If disabled, this header will not be set. If it is already present, it will be preserved.
	// This header is enabled by default if not configured.
	AttemptCount *ProxyConfigProxyHeadersAttemptCount `json:"attemptCount,omitempty"`
	// Controls various `X-Envoy-*` headers, such as `X-Envoy-Overloaded` and `X-Envoy-Upstream-Service-Time. If enabled,
	// these headers will be included.
	// If disabled, these headers will not be set. If they are already present, they will be preserved.
	// See the [Envoy documentation](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/http/router/v3/router.proto#envoy-v3-api-field-extensions-filters-http-router-v3-router-suppress-envoy-headers) for more details.
	// These headers are enabled by default if not configured.
	EnvoyDebugHeaders *ProxyConfigProxyHeadersEnvoyDebugHeaders `json:"envoyDebugHeaders,omitempty"`
	// Controls Istio metadata exchange headers `X-Envoy-Peer-Metadata` and `X-Envoy-Peer-Metadata-Id`.
	// By default, the behavior is unspecified.
	// If IN_MESH, these headers will not be appended to outbound requests from sidecars to services not in-mesh.
	MetadataExchangeHeaders *ProxyConfigProxyHeadersMetadataExchangeHeaders `json:"metadataExchangeHeaders,omitempty"`
}

func (*ProxyConfigProxyHeaders) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeaders.

func (*ProxyConfigProxyHeaders) DeepCopyInto

func (in *ProxyConfigProxyHeaders) DeepCopyInto(out *ProxyConfigProxyHeaders)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyHeadersAttemptCount

type ProxyConfigProxyHeadersAttemptCount struct {
	Disabled *bool `json:"disabled,omitempty"`
}

func (*ProxyConfigProxyHeadersAttemptCount) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeadersAttemptCount.

func (*ProxyConfigProxyHeadersAttemptCount) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyHeadersEnvoyDebugHeaders

type ProxyConfigProxyHeadersEnvoyDebugHeaders struct {
	Disabled *bool `json:"disabled,omitempty"`
}

func (*ProxyConfigProxyHeadersEnvoyDebugHeaders) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeadersEnvoyDebugHeaders.

func (*ProxyConfigProxyHeadersEnvoyDebugHeaders) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyHeadersMetadataExchangeHeaders

type ProxyConfigProxyHeadersMetadataExchangeHeaders struct {
	Mode ProxyConfigProxyHeadersMetadataExchangeMode `json:"mode,omitempty"`
}

func (*ProxyConfigProxyHeadersMetadataExchangeHeaders) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeadersMetadataExchangeHeaders.

func (*ProxyConfigProxyHeadersMetadataExchangeHeaders) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyHeadersMetadataExchangeMode

type ProxyConfigProxyHeadersMetadataExchangeMode string

+kubebuilder:validation:Enum=UNDEFINED;IN_MESH

const (
	// Existing Istio behavior for the metadata exchange headers is unchanged.
	ProxyConfigProxyHeadersMetadataExchangeModeUndefined ProxyConfigProxyHeadersMetadataExchangeMode = "UNDEFINED"
	// Only append the istio metadata exchange headers for services considered in-mesh.
	// Traffic is considered in-mesh if it is secured with Istio mutual TLS. This means that `MESH_EXTERNAL` services, unmatched passthrough traffic, and requests to workloads without Istio enabled will be considered out of mesh.
	ProxyConfigProxyHeadersMetadataExchangeModeInMesh ProxyConfigProxyHeadersMetadataExchangeMode = "IN_MESH"
)

type ProxyConfigProxyHeadersRequestId

type ProxyConfigProxyHeadersRequestId struct {
	Disabled *bool `json:"disabled,omitempty"`
}

func (*ProxyConfigProxyHeadersRequestId) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeadersRequestId.

func (*ProxyConfigProxyHeadersRequestId) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyHeadersServer

type ProxyConfigProxyHeadersServer struct {
	Disabled *bool `json:"disabled,omitempty"`
	// If set, and the server header is enabled, this value will be set as the server header. By default, `istio-envoy` will be used.
	Value string `json:"value,omitempty"`
}

func (*ProxyConfigProxyHeadersServer) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyHeadersServer.

func (*ProxyConfigProxyHeadersServer) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigProxyStatsMatcher

type ProxyConfigProxyStatsMatcher struct {
	// Proxy stats name prefix matcher for inclusion.
	InclusionPrefixes []string `json:"inclusionPrefixes,omitempty"`
	// Proxy stats name suffix matcher for inclusion.
	InclusionSuffixes []string `json:"inclusionSuffixes,omitempty"`
	// Proxy stats name regexps matcher for inclusion.
	InclusionRegexps []string `json:"inclusionRegexps,omitempty"`
}

Proxy stats name matchers for stats creation. Note this is in addition to the minimum Envoy stats that Istio generates by default.

func (*ProxyConfigProxyStatsMatcher) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyConfigProxyStatsMatcher.

func (*ProxyConfigProxyStatsMatcher) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyConfigTracingServiceName

type ProxyConfigTracingServiceName string

Allows specification of various Istio-supported naming schemes for the Envoy `service_cluster` value. The `servce_cluster` value is primarily used by Envoys to provide service names for tracing spans. +kubebuilder:validation:Enum=APP_LABEL_AND_NAMESPACE;CANONICAL_NAME_ONLY;CANONICAL_NAME_AND_NAMESPACE

const (
	// Default scheme. Uses the `app` label and workload namespace to construct
	// a cluster name. If the `app` label does not exist `istio-proxy` is used.
	ProxyConfigTracingServiceNameAppLabelAndNamespace ProxyConfigTracingServiceName = "APP_LABEL_AND_NAMESPACE"
	// Uses the canonical name for a workload (*excluding namespace*).
	ProxyConfigTracingServiceNameCanonicalNameOnly ProxyConfigTracingServiceName = "CANONICAL_NAME_ONLY"
	// Uses the canonical name and namespace for a workload.
	ProxyConfigTracingServiceNameCanonicalNameAndNamespace ProxyConfigTracingServiceName = "CANONICAL_NAME_AND_NAMESPACE"
)

type ProxyImage

type ProxyImage struct {
	// The image type of the image.
	// Istio publishes default, debug, and distroless images.
	// Other values are allowed if those image types (example: centos) are published to the specified hub.
	// supported values: default, debug, distroless.
	ImageType string `json:"imageType,omitempty"`
}

The following values are used to construct proxy image url. format: `${hub}/${image_name}/${tag}-${image_type}`, example: `docker.io/istio/proxyv2:1.11.1` or `docker.io/istio/proxyv2:1.11.1-distroless`. This information was previously part of the Values API.

func (*ProxyImage) DeepCopy

func (in *ProxyImage) DeepCopy() *ProxyImage

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyImage.

func (*ProxyImage) DeepCopyInto

func (in *ProxyImage) DeepCopyInto(out *ProxyImage)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ProxyInitConfig

type ProxyInitConfig struct {
	// Specifies the image for the proxy_init container.
	Image string `json:"image,omitempty"`
	// K8s resources settings.
	//
	// See https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/#resource-requests-and-limits-of-pod-and-container
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Resources *k8sv1.ResourceRequirements `json:"resources,omitempty"`
}

Configuration for proxy_init container which sets the pods' networking to intercept the inbound/outbound traffic.

func (*ProxyInitConfig) DeepCopy

func (in *ProxyInitConfig) DeepCopy() *ProxyInitConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProxyInitConfig.

func (*ProxyInitConfig) DeepCopyInto

func (in *ProxyInitConfig) DeepCopyInto(out *ProxyInitConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type RemoteService

type RemoteService struct {
	// Address of a remove service used for various purposes (access log
	// receiver, metrics receiver, etc.). Can be IP address or a fully
	// qualified DNS name.
	Address string `json:"address,omitempty"`
	// Use the `tls_settings` to specify the tls mode to use. If the remote service
	// uses Istio mutual TLS and shares the root CA with Pilot, specify the TLS
	// mode as `ISTIO_MUTUAL`.
	TlsSettings *ClientTLSSettings `json:"tlsSettings,omitempty"`
	// If set then set `SO_KEEPALIVE` on the socket to enable TCP Keepalives.
	TcpKeepalive *ConnectionPoolSettingsTCPSettingsTcpKeepalive `json:"tcpKeepalive,omitempty"`
}

func (*RemoteService) DeepCopy

func (in *RemoteService) DeepCopy() *RemoteService

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RemoteService.

func (*RemoteService) DeepCopyInto

func (in *RemoteService) DeepCopyInto(out *RemoteService)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Resource

type Resource string

Resource describes the source of configuration +kubebuilder:validation:Enum=SERVICE_REGISTRY

const (
	// Set to only receive service entries that are generated by the platform.
	// These auto generated service entries are combination of services and endpoints
	// that are generated by a specific platform e.g. k8
	ResourceServiceRegistry Resource = "SERVICE_REGISTRY"
)

type ResourceQuotas

type ResourceQuotas struct {
	// Controls whether to create resource quotas or not for the CNI DaemonSet.
	Enabled *bool `json:"enabled,omitempty"`
	// The hard limit on the number of pods in the namespace where the CNI DaemonSet is deployed.
	Pods int64 `json:"pods,omitempty"`
}

Configuration for the resource quotas for the CNI DaemonSet.

func (*ResourceQuotas) DeepCopy

func (in *ResourceQuotas) DeepCopy() *ResourceQuotas

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ResourceQuotas.

func (*ResourceQuotas) DeepCopyInto

func (in *ResourceQuotas) DeepCopyInto(out *ResourceQuotas)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ResourcesRequestsConfig

type ResourcesRequestsConfig struct {
	// CPU requests.
	Cpu string `json:"cpu,omitempty"`
	// Memory requests.
	Memory string `json:"memory,omitempty"`
}

Configuration for K8s resource requests.

func (*ResourcesRequestsConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ResourcesRequestsConfig.

func (*ResourcesRequestsConfig) DeepCopyInto

func (in *ResourcesRequestsConfig) DeepCopyInto(out *ResourcesRequestsConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type RevisionSummary

type RevisionSummary struct {
	// Total number of IstioRevisions currently associated with this Istio.
	Total int32 `json:"total"`

	// Number of IstioRevisions that are Ready.
	Ready int32 `json:"ready"`

	// Number of IstioRevisions that are currently in use.
	InUse int32 `json:"inUse"`
}

RevisionSummary contains information on the number of IstioRevisions associated with this Istio.

func (*RevisionSummary) DeepCopy

func (in *RevisionSummary) DeepCopy() *RevisionSummary

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RevisionSummary.

func (*RevisionSummary) DeepCopyInto

func (in *RevisionSummary) DeepCopyInto(out *RevisionSummary)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SDS

type SDS struct {
	// True if SDS is enabled.
	Enabled bool `json:"enabled,omitempty"`
	// Path of k8s service account JWT path.
	K8SSaJwtPath string `json:"k8sSaJwtPath,omitempty"`
}

SDS defines secret discovery service(SDS) configuration to be used by the proxy. For workload, its values are set in sidecar injector(passed as arguments to istio-proxy container). For pilot/mixer, it's passed as arguments to istio-proxy container in pilot/mixer deployment yaml files directly. $hide_from_docs

func (*SDS) DeepCopy

func (in *SDS) DeepCopy() *SDS

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SDS.

func (*SDS) DeepCopyInto

func (in *SDS) DeepCopyInto(out *SDS)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SDSConfig

type SDSConfig struct {
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	Token *SDSConfigToken `json:"token,omitempty"`
}

Configuration for the SecretDiscoveryService instead of using K8S secrets to mount the certificates.

func (*SDSConfig) DeepCopy

func (in *SDSConfig) DeepCopy() *SDSConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SDSConfig.

func (*SDSConfig) DeepCopyInto

func (in *SDSConfig) DeepCopyInto(out *SDSConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SDSConfigToken

type SDSConfigToken struct {
	Aud string `json:"aud,omitempty"`
}

func (*SDSConfigToken) DeepCopy

func (in *SDSConfigToken) DeepCopy() *SDSConfigToken

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SDSConfigToken.

func (*SDSConfigToken) DeepCopyInto

func (in *SDSConfigToken) DeepCopyInto(out *SDSConfigToken)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type STSConfig

type STSConfig struct {
	ServicePort uint32 `json:"servicePort,omitempty"`
}

Configuration for Security Token Service (STS) server.

See https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-16

func (*STSConfig) DeepCopy

func (in *STSConfig) DeepCopy() *STSConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new STSConfig.

func (*STSConfig) DeepCopyInto

func (in *STSConfig) DeepCopyInto(out *STSConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretVolume

type SecretVolume struct {
	MountPath  string `json:"mountPath,omitempty"`
	Name       string `json:"name,omitempty"`
	SecretName string `json:"secretName,omitempty"`
}

Configuration for secret volume mounts.

See https://kubernetes.io/docs/concepts/configuration/secret/#using-secrets.

func (*SecretVolume) DeepCopy

func (in *SecretVolume) DeepCopy() *SecretVolume

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretVolume.

func (*SecretVolume) DeepCopyInto

func (in *SecretVolume) DeepCopyInto(out *SecretVolume)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SidecarInjectorConfig

type SidecarInjectorConfig struct {
	// Enables sidecar auto-injection in namespaces by default.
	EnableNamespacesByDefault *bool `json:"enableNamespacesByDefault,omitempty"`
	// Setting this to `IfNeeded` will result in the sidecar injector being run again if additional mutations occur. Default: Never
	ReinvocationPolicy string `json:"reinvocationPolicy,omitempty"`
	// Instructs Istio to not inject the sidecar on those pods, based on labels that are present in those pods.
	//
	// Annotations in the pods have higher precedence than the label selectors.
	// Order of evaluation: Pod Annotations → NeverInjectSelector → AlwaysInjectSelector → Default Policy.
	// See https://istio.io/docs/setup/kubernetes/additional-setup/sidecar-injection/#more-control-adding-exceptions
	NeverInjectSelector []metav1.LabelSelector `json:"neverInjectSelector,omitempty"`
	// See NeverInjectSelector.
	AlwaysInjectSelector []metav1.LabelSelector `json:"alwaysInjectSelector,omitempty"`
	// If true, webhook or istioctl injector will rewrite PodSpec for liveness health check to redirect request to sidecar. This makes liveness check work even when mTLS is enabled.
	RewriteAppHTTPProbe *bool `json:"rewriteAppHTTPProbe,omitempty"`
	// injectedAnnotations are additional annotations that will be added to the pod spec after injection
	// This is primarily to support PSP annotations.
	InjectedAnnotations map[string]string `json:"injectedAnnotations,omitempty"`

	// Configure the injection url for sidecar injector webhook
	InjectionURL string `json:"injectionURL,omitempty"`
	// Templates defines a set of custom injection templates that can be used. For example, defining:
	//
	// templates:
	//
	//	hello: |
	//	  metadata:
	//	    labels:
	//	      hello: world
	//
	// Then starting a pod with the `inject.istio.io/templates: hello` annotation, will result in the pod
	// being injected with the hello=world labels.
	// This is intended for advanced configuration only; most users should use the built in template
	Templates map[string]string `json:"templates,omitempty"`
	// defaultTemplates: ["sidecar", "hello"]
	DefaultTemplates []string `json:"defaultTemplates,omitempty"`
	// If enabled, the legacy webhook selection logic will be used. This relies on filtering of webhook
	// requests in Istiod, rather than at the webhook selection level.
	// This is option is intended for migration purposes only and will be removed in Istio 1.10.
	//
	// Deprecated: Marked as deprecated in pkg/apis/istio/v1alpha1/values_types.proto.
	UseLegacySelectors *bool `json:"useLegacySelectors,omitempty"`
}

SidecarInjectorConfig is described in istio.io documentation.

func (*SidecarInjectorConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SidecarInjectorConfig.

func (*SidecarInjectorConfig) DeepCopyInto

func (in *SidecarInjectorConfig) DeepCopyInto(out *SidecarInjectorConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type StartupProbe

type StartupProbe struct {
	// Enables or disables a startup probe.
	// For optimal startup times, changing this should be tied to the readiness probe values.
	//
	// If the probe is enabled, it is recommended to have delay=0s,period=15s,failureThreshold=4.
	// This ensures the pod is marked ready immediately after the startup probe passes (which has a 1s poll interval),
	// and doesn't spam the readiness endpoint too much
	//
	// If the probe is disabled, it is recommended to have delay=1s,period=2s,failureThreshold=30.
	// This ensures the startup is reasonable fast (polling every 2s). 1s delay is used since the startup is not often ready instantly.
	Enabled *bool `json:"enabled,omitempty"`
	// Minimum consecutive failures for the probe to be considered failed after having succeeded.
	FailureThreshold uint32 `json:"failureThreshold,omitempty"`
}

func (*StartupProbe) DeepCopy

func (in *StartupProbe) DeepCopy() *StartupProbe

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new StartupProbe.

func (*StartupProbe) DeepCopyInto

func (in *StartupProbe) DeepCopyInto(out *StartupProbe)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TargetUtilizationConfig

type TargetUtilizationConfig struct {
	// K8s utilization setting for HorizontalPodAutoscaler target.
	//
	// See https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
	TargetAverageUtilization int32 `json:"targetAverageUtilization,omitempty"`
}

Configuration for CPU or memory target utilization for HorizontalPodAutoscaler target.

func (*TargetUtilizationConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TargetUtilizationConfig.

func (*TargetUtilizationConfig) DeepCopyInto

func (in *TargetUtilizationConfig) DeepCopyInto(out *TargetUtilizationConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TelemetryConfig

type TelemetryConfig struct {
	// Controls whether telemetry is exported for Pilot.
	Enabled *bool `json:"enabled,omitempty"`
	// Configuration for Telemetry v2.
	V2 *TelemetryV2Config `json:"v2,omitempty"`
}

Controls telemetry configuration

func (*TelemetryConfig) DeepCopy

func (in *TelemetryConfig) DeepCopy() *TelemetryConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TelemetryConfig.

func (*TelemetryConfig) DeepCopyInto

func (in *TelemetryConfig) DeepCopyInto(out *TelemetryConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TelemetryV2Config

type TelemetryV2Config struct {
	// Controls whether pilot will configure telemetry v2.
	Enabled *bool `json:"enabled,omitempty"`
	// Telemetry v2 settings for prometheus.
	Prometheus *TelemetryV2PrometheusConfig `json:"prometheus,omitempty"`
	// Telemetry v2 settings for stackdriver.
	Stackdriver *TelemetryV2StackDriverConfig `json:"stackdriver,omitempty"`
}

Controls whether pilot will configure telemetry v2.

func (*TelemetryV2Config) DeepCopy

func (in *TelemetryV2Config) DeepCopy() *TelemetryV2Config

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TelemetryV2Config.

func (*TelemetryV2Config) DeepCopyInto

func (in *TelemetryV2Config) DeepCopyInto(out *TelemetryV2Config)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TelemetryV2PrometheusConfig

type TelemetryV2PrometheusConfig struct {
	// Controls whether stats envoyfilter would be enabled or not.
	Enabled *bool `json:"enabled,omitempty"`
}

Controls telemetry v2 prometheus settings.

func (*TelemetryV2PrometheusConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TelemetryV2PrometheusConfig.

func (*TelemetryV2PrometheusConfig) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TelemetryV2StackDriverConfig

type TelemetryV2StackDriverConfig struct {
	Enabled *bool `json:"enabled,omitempty"`
}

TelemetryV2StackDriverConfig controls telemetry v2 stackdriver settings.

func (*TelemetryV2StackDriverConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TelemetryV2StackDriverConfig.

func (*TelemetryV2StackDriverConfig) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Topology

type Topology struct {
	// Number of trusted proxies deployed in front of the Istio gateway proxy.
	// When this option is set to value N greater than zero, the trusted client
	// address is assumed to be the Nth address from the right end of the
	// X-Forwarded-For (XFF) header from the incoming request. If the
	// X-Forwarded-For (XFF) header is missing or has fewer than N addresses, the
	// gateway proxy falls back to using the immediate downstream connection's
	// source address as the trusted client address.
	// Note that the gateway proxy will append the downstream connection's source
	// address to the X-Forwarded-For (XFF) address and set the
	// X-Envoy-External-Address header to the trusted client address before
	// forwarding it to the upstream services in the cluster.
	// The default value of num_trusted_proxies is 0.
	// See [Envoy XFF](https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_conn_man/headers#config-http-conn-man-headers-x-forwarded-for)
	// header handling for more details.
	NumTrustedProxies uint32 `json:"numTrustedProxies,omitempty"`
	// Configures how the gateway proxy handles x-forwarded-client-cert (XFCC)
	// header in the incoming request.
	ForwardClientCertDetails ForwardClientCertDetails `json:"forwardClientCertDetails,omitempty"`
	// Enables [PROXY protocol](http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt) for
	// downstream connections on a gateway.
	ProxyProtocol *TopologyProxyProtocolConfiguration `json:"proxyProtocol,omitempty"`
}

Topology describes the configuration for relative location of a proxy with respect to intermediate trusted proxies and the client. These settings control how the client attributes are retrieved from the incoming traffic by the gateway proxy and propagated to the upstream services in the cluster.

func (*Topology) DeepCopy

func (in *Topology) DeepCopy() *Topology

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Topology.

func (*Topology) DeepCopyInto

func (in *Topology) DeepCopyInto(out *Topology)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TopologyProxyProtocolConfiguration

type TopologyProxyProtocolConfiguration struct {
}

PROXY protocol configuration.

func (*TopologyProxyProtocolConfiguration) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TopologyProxyProtocolConfiguration.

func (*TopologyProxyProtocolConfiguration) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Tracer

type Tracer string

Specifies which tracer to use. +kubebuilder:validation:Enum=zipkin;lightstep;datadog;stackdriver;openCensusAgent;none

const (
	TracerZipkin          Tracer = "zipkin"
	TracerLightstep       Tracer = "lightstep"
	TracerDatadog         Tracer = "datadog"
	TracerStackdriver     Tracer = "stackdriver"
	TracerOpencensusagent Tracer = "openCensusAgent"
	TracerNone            Tracer = "none"
)

type TracerConfig

type TracerConfig struct {
	// Configuration for the datadog tracing service.
	Datadog *TracerDatadogConfig `json:"datadog,omitempty"`
	// Configuration for the lightstep tracing service.
	Lightstep *TracerLightStepConfig `json:"lightstep,omitempty"`
	// Configuration for the zipkin tracing service.
	Zipkin *TracerZipkinConfig `json:"zipkin,omitempty"`
	// Configuration for the stackdriver tracing service.
	Stackdriver *TracerStackdriverConfig `json:"stackdriver,omitempty"`
}

Configuration for each of the supported tracers.

func (*TracerConfig) DeepCopy

func (in *TracerConfig) DeepCopy() *TracerConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracerConfig.

func (*TracerConfig) DeepCopyInto

func (in *TracerConfig) DeepCopyInto(out *TracerConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracerDatadogConfig

type TracerDatadogConfig struct {
	// Address in host:port format for reporting trace data to the Datadog agent.
	Address string `json:"address,omitempty"`
}

Configuration for the datadog tracing service.

func (*TracerDatadogConfig) DeepCopy

func (in *TracerDatadogConfig) DeepCopy() *TracerDatadogConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracerDatadogConfig.

func (*TracerDatadogConfig) DeepCopyInto

func (in *TracerDatadogConfig) DeepCopyInto(out *TracerDatadogConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracerLightStepConfig

type TracerLightStepConfig struct {
	// Sets the lightstep satellite pool address in host:port format for reporting trace data.
	Address string `json:"address,omitempty"`
	// Sets the lightstep access token.
	AccessToken string `json:"accessToken,omitempty"`
}

Configuration for the lightstep tracing service.

func (*TracerLightStepConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracerLightStepConfig.

func (*TracerLightStepConfig) DeepCopyInto

func (in *TracerLightStepConfig) DeepCopyInto(out *TracerLightStepConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracerStackdriverConfig

type TracerStackdriverConfig struct {
	// enables trace output to stdout.
	Debug *bool `json:"debug,omitempty"`
	// The global default max number of attributes per span.
	MaxNumberOfAttributes uint32 `json:"maxNumberOfAttributes,omitempty"`
	// The global default max number of annotation events per span.
	MaxNumberOfAnnotations uint32 `json:"maxNumberOfAnnotations,omitempty"`
	// The global default max number of message events per span.
	MaxNumberOfMessageEvents uint32 `json:"maxNumberOfMessageEvents,omitempty"`
}

Configuration for the stackdriver tracing service.

func (*TracerStackdriverConfig) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracerStackdriverConfig.

func (*TracerStackdriverConfig) DeepCopyInto

func (in *TracerStackdriverConfig) DeepCopyInto(out *TracerStackdriverConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracerZipkinConfig

type TracerZipkinConfig struct {
	// Address of zipkin instance in host:port format for reporting trace data.
	//
	// Example: <zipkin-collector-service>.<zipkin-collector-namespace>:941
	Address string `json:"address,omitempty"`
}

Configuration for the zipkin tracing service.

func (*TracerZipkinConfig) DeepCopy

func (in *TracerZipkinConfig) DeepCopy() *TracerZipkinConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracerZipkinConfig.

func (*TracerZipkinConfig) DeepCopyInto

func (in *TracerZipkinConfig) DeepCopyInto(out *TracerZipkinConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Tracing

type Tracing struct {
	// Use a Zipkin tracer.
	Zipkin *TracingZipkin `json:"zipkin,omitempty"`

	// Use a Lightstep tracer.
	// NOTE: For Istio 1.15+, this configuration option will result
	// in using OpenTelemetry-based Lightstep integration.
	Lightstep *TracingLightstep `json:"lightstep,omitempty"`

	// Use a Datadog tracer.
	Datadog *TracingDatadog `json:"datadog,omitempty"`

	// Use a Stackdriver tracer.
	Stackdriver *TracingStackdriver `json:"stackdriver,omitempty"`

	// Use an OpenCensus tracer exporting to an OpenCensus agent.
	OpenCensusAgent *TracingOpenCensusAgent `json:"openCensusAgent,omitempty"` // Configures the custom tags to be added to active span by all proxies (i.e. sidecars
	// and gateways).
	// The key represents the name of the tag.
	// Ex:
	// “`yaml
	// custom_tags:
	//
	//	new_tag_name:
	//	  header:
	//	    name: custom-http-header-name
	//	    default_value: defaulted-value-from-custom-header
	//
	// “`
	// $hide_from_docs
	CustomTags map[string]*TracingCustomTag `json:"customTags,omitempty"`
	// Configures the maximum length of the request path to extract and include in the
	// HttpUrl tag. Used to truncate length request paths to meet the needs of tracing
	// backend. If not set, then a length of 256 will be used.
	// $hide_from_docs
	MaxPathTagLength uint32 `json:"maxPathTagLength,omitempty"`
	// The percentage of requests (0.0 - 100.0) that will be randomly selected for trace generation,
	// if not requested by the client or not forced. Default is 1.0.
	Sampling float64 `json:"sampling,omitempty"`
	// Use the tls_settings to specify the tls mode to use. If the remote tracing service
	// uses Istio mutual TLS and shares the root CA with Pilot, specify the TLS
	// mode as `ISTIO_MUTUAL`.
	TlsSettings *ClientTLSSettings `json:"tlsSettings,omitempty"`
}

Tracing defines configuration for the tracing performed by Envoy instances. +kubebuilder:validation:XValidation:message="At most one of [zipkin lightstep datadog stackdriver openCensusAgent] should be set",rule="(has(self.zipkin)?1:0) + (has(self.lightstep)?1:0) + (has(self.datadog)?1:0) + (has(self.stackdriver)?1:0) + (has(self.openCensusAgent)?1:0) <= 1"

func (*Tracing) DeepCopy

func (in *Tracing) DeepCopy() *Tracing

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Tracing.

func (*Tracing) DeepCopyInto

func (in *Tracing) DeepCopyInto(out *Tracing)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingCustomTag

type TracingCustomTag struct {
	// The custom tag's value is the specified literal.
	Literal *TracingLiteral `json:"literal,omitempty"`

	// The custom tag's value should be populated from an environmental
	// variable
	Environment *TracingEnvironment `json:"environment,omitempty"`

	// The custom tag's value is populated by an http header from
	// an incoming request.
	Header *TracingRequestHeader `json:"header,omitempty"`
}

Configure custom tags that will be added to any active span. Tags can be generated via literals, environment variables or an incoming request header. $hide_from_docs +kubebuilder:validation:XValidation:message="At most one of [literal environment header] should be set",rule="(has(self.literal)?1:0) + (has(self.environment)?1:0) + (has(self.header)?1:0) <= 1"

func (*TracingCustomTag) DeepCopy

func (in *TracingCustomTag) DeepCopy() *TracingCustomTag

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingCustomTag.

func (*TracingCustomTag) DeepCopyInto

func (in *TracingCustomTag) DeepCopyInto(out *TracingCustomTag)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingDatadog

type TracingDatadog struct {
	// Address of the Datadog Agent.
	Address string `json:"address,omitempty"`
}

Datadog defines configuration for a Datadog tracer.

func (*TracingDatadog) DeepCopy

func (in *TracingDatadog) DeepCopy() *TracingDatadog

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingDatadog.

func (*TracingDatadog) DeepCopyInto

func (in *TracingDatadog) DeepCopyInto(out *TracingDatadog)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingEnvironment

type TracingEnvironment struct {
	// Name of the environment variable used to populate the tag's value
	Name string `json:"name,omitempty"`
	// When the environment variable is not found,
	// the tag's value will be populated with this default value if specified,
	// otherwise the tag will not be populated.
	DefaultValue string `json:"defaultValue,omitempty"`
}

Environment is the proxy's environment variable to be used for populating the custom span tag. $hide_from_docs

func (*TracingEnvironment) DeepCopy

func (in *TracingEnvironment) DeepCopy() *TracingEnvironment

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingEnvironment.

func (*TracingEnvironment) DeepCopyInto

func (in *TracingEnvironment) DeepCopyInto(out *TracingEnvironment)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingLightstep

type TracingLightstep struct {
	// Address of the Lightstep Satellite pool.
	Address string `json:"address,omitempty"`
	// The Lightstep access token.
	AccessToken string `json:"accessToken,omitempty"`
}

$hide_from_docs Defines configuration for a Lightstep tracer.

func (*TracingLightstep) DeepCopy

func (in *TracingLightstep) DeepCopy() *TracingLightstep

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingLightstep.

func (*TracingLightstep) DeepCopyInto

func (in *TracingLightstep) DeepCopyInto(out *TracingLightstep)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingLiteral

type TracingLiteral struct {
	// Static literal value used to populate the tag value.
	Value string `json:"value,omitempty"`
}

Literal type represents a static value. $hide_from_docs

func (*TracingLiteral) DeepCopy

func (in *TracingLiteral) DeepCopy() *TracingLiteral

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingLiteral.

func (*TracingLiteral) DeepCopyInto

func (in *TracingLiteral) DeepCopyInto(out *TracingLiteral)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingOpenCensusAgent

type TracingOpenCensusAgent struct {
	// gRPC address for the OpenCensus agent (e.g. dns://authority/host:port or
	// unix:path). See [gRPC naming
	// docs](https://github.com/grpc/grpc/blob/master/doc/naming.md) for
	// details.
	Address string `json:"address,omitempty"`
	// Specifies the set of context propagation headers used for distributed
	// tracing. Default is `["W3C_TRACE_CONTEXT"]`. If multiple values are specified,
	// the proxy will attempt to read each header for each request and will
	// write all headers.
	Context []TracingOpenCensusAgentTraceContext `json:"context,omitempty"`
}

OpenCensusAgent defines configuration for an OpenCensus tracer writing to an OpenCensus agent backend. See [Envoy's OpenCensus trace configuration](https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/trace/v3/opencensus.proto) and [OpenCensus trace config](https://github.com/census-instrumentation/opencensus-proto/blob/master/src/opencensus/proto/trace/v1/trace_config.proto) for details.

func (*TracingOpenCensusAgent) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingOpenCensusAgent.

func (*TracingOpenCensusAgent) DeepCopyInto

func (in *TracingOpenCensusAgent) DeepCopyInto(out *TracingOpenCensusAgent)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingOpenCensusAgentTraceContext

type TracingOpenCensusAgentTraceContext string

TraceContext selects the context propagation headers used for distributed tracing. +kubebuilder:validation:Enum=UNSPECIFIED;W3C_TRACE_CONTEXT;GRPC_BIN;CLOUD_TRACE_CONTEXT;B3

const (
	// $hide_from_docs
	// Unspecified context. Should not be used for now, but added to reserve
	// the 0 enum value if TraceContext is used outside of a repeated field.
	TracingOpenCensusAgentTraceContextUnspecified TracingOpenCensusAgentTraceContext = "UNSPECIFIED"
	// Use W3C Trace Context propagation using the `traceparent` HTTP header.
	// See the
	// [Trace Context documentation](https://www.w3.org/TR/trace-context/) for details.
	TracingOpenCensusAgentTraceContextW3cTraceContext TracingOpenCensusAgentTraceContext = "W3C_TRACE_CONTEXT"
	// Use gRPC binary context propagation using the `grpc-trace-bin` http header.
	TracingOpenCensusAgentTraceContextGrpcBin TracingOpenCensusAgentTraceContext = "GRPC_BIN"
	// Use Cloud Trace context propagation using the
	// `X-Cloud-Trace-Context` http header.
	TracingOpenCensusAgentTraceContextCloudTraceContext TracingOpenCensusAgentTraceContext = "CLOUD_TRACE_CONTEXT"
	// Use multi-header B3 context propagation using the `X-B3-TraceId`,
	// `X-B3-SpanId`, and `X-B3-Sampled` HTTP headers. See
	// [B3 header propagation README](https://github.com/openzipkin/b3-propagation)
	// for details.
	TracingOpenCensusAgentTraceContextB3 TracingOpenCensusAgentTraceContext = "B3"
)

type TracingRequestHeader

type TracingRequestHeader struct {
	// HTTP header name used to obtain the value from to populate the tag value.
	Name string `json:"name,omitempty"`
	// Default value to be used for the tag when the named HTTP header does not exist.
	// The tag will be skipped if no default value is provided.
	DefaultValue string `json:"defaultValue,omitempty"`
}

RequestHeader is the HTTP request header which will be used to populate the span tag. A default value can be configured if the header does not exist. $hide_from_docs

func (*TracingRequestHeader) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingRequestHeader.

func (*TracingRequestHeader) DeepCopyInto

func (in *TracingRequestHeader) DeepCopyInto(out *TracingRequestHeader)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingStackdriver

type TracingStackdriver struct {
	// debug enables trace output to stdout.
	// $hide_from_docs
	Debug bool `json:"debug,omitempty"`
	// The global default max number of attributes per span.
	// default is 200.
	// $hide_from_docs
	MaxNumberOfAttributes *int64 `json:"maxNumberOfAttributes,omitempty"`
	// The global default max number of annotation events per span.
	// default is 200.
	// $hide_from_docs
	MaxNumberOfAnnotations *int64 `json:"maxNumberOfAnnotations,omitempty"`
	// The global default max number of message events per span.
	// default is 200.
	// $hide_from_docs
	MaxNumberOfMessageEvents *int64 `json:"maxNumberOfMessageEvents,omitempty"`
}

Stackdriver defines configuration for a Stackdriver tracer. See [Envoy's OpenCensus trace configuration](https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/trace/v3/opencensus.proto) and [OpenCensus trace config](https://github.com/census-instrumentation/opencensus-proto/blob/master/src/opencensus/proto/trace/v1/trace_config.proto) for details.

func (*TracingStackdriver) DeepCopy

func (in *TracingStackdriver) DeepCopy() *TracingStackdriver

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingStackdriver.

func (*TracingStackdriver) DeepCopyInto

func (in *TracingStackdriver) DeepCopyInto(out *TracingStackdriver)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type TracingZipkin

type TracingZipkin struct {
	// Address of the Zipkin service (e.g. _zipkin:9411_).
	Address string `json:"address,omitempty"`
}

Zipkin defines configuration for a Zipkin tracer.

func (*TracingZipkin) DeepCopy

func (in *TracingZipkin) DeepCopy() *TracingZipkin

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TracingZipkin.

func (*TracingZipkin) DeepCopyInto

func (in *TracingZipkin) DeepCopyInto(out *TracingZipkin)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type UpdateStrategyType

type UpdateStrategyType string

type Values

type Values struct {
	// Global configuration for Istio components.
	Global *GlobalConfig `json:"global,omitempty"`
	// Configuration for the Pilot component.
	Pilot *PilotConfig `json:"pilot,omitempty"`

	// Controls whether telemetry is exported for Pilot.
	Telemetry *TelemetryConfig `json:"telemetry,omitempty"`
	// Configuration for the sidecar injector webhook.
	SidecarInjectorWebhook *SidecarInjectorConfig `json:"sidecarInjectorWebhook,omitempty"`

	// Identifies the revision this installation is associated with.
	Revision string `json:"revision,omitempty"`

	// Defines runtime configuration of components, including Istiod and istio-agent behavior.
	// See https://istio.io/docs/reference/config/istio.mesh.v1alpha1/ for all available options.
	// TODO can this import the real mesh config API?
	MeshConfig *MeshConfig `json:"meshConfig,omitempty"`
	// Configuration for the base component.
	Base *BaseConfig `json:"base,omitempty"`
	// Configuration for istiod-remote.
	IstiodRemote *IstiodRemoteConfig `json:"istiodRemote,omitempty"`
	// Specifies the aliases for the Istio control plane revision. A MutatingWebhookConfiguration
	// is created for each alias.
	RevisionTags []string `json:"revisionTags,omitempty"`
	// The name of the default revision in the cluster.
	DefaultRevision string `json:"defaultRevision,omitempty"`
	// Specifies which installation configuration profile to apply.
	Profile string `json:"profile,omitempty"`
	// Specifies the compatibility version to use. When this is set, the control plane will
	// be configured with the same defaults as the specified version.
	CompatibilityVersion string `json:"compatibilityVersion,omitempty"`
}

func (*Values) DeepCopy

func (in *Values) DeepCopy() *Values

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Values.

func (*Values) DeepCopyInto

func (in *Values) DeepCopyInto(out *Values)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type WorkloadMode

type WorkloadMode string

WorkloadMode allows selection of the role of the underlying workload in network traffic. A workload is considered as acting as a SERVER if it is the destination of the traffic (that is, traffic direction, from the perspective of the workload is *inbound*). If the workload is the source of the network traffic, it is considered to be in CLIENT mode (traffic is *outbound* from the workload). +kubebuilder:validation:Enum=UNDEFINED;CLIENT;SERVER;CLIENT_AND_SERVER

const (
	// Default value, which will be interpreted by its own usage.
	WorkloadModeUndefined WorkloadMode = "UNDEFINED"
	// Selects for scenarios when the workload is the
	// source of the network traffic. In addition,
	// if the workload is a gateway, selects this.
	WorkloadModeClient WorkloadMode = "CLIENT"
	// Selects for scenarios when the workload is the
	// destination of the network traffic.
	WorkloadModeServer WorkloadMode = "SERVER"
	// Selects for scenarios when the workload is either the
	// source or destination of the network traffic.
	WorkloadModeClientAndServer WorkloadMode = "CLIENT_AND_SERVER"
)

type WorkloadSelector

type WorkloadSelector struct {
	// One or more labels that indicate a specific set of pods/VMs
	// on which a policy should be applied. The scope of label search is restricted to
	// the configuration namespace in which the resource is present.
	MatchLabels map[string]string `json:"matchLabels,omitempty"`
}

WorkloadSelector specifies the criteria used to determine if a policy can be applied to a proxy. The matching criteria includes the metadata associated with a proxy, workload instance info such as labels attached to the pod/VM, or any other info that the proxy provides to Istio during the initial handshake. If multiple conditions are specified, all conditions need to match in order for the workload instance to be selected. Currently, only label based selection mechanism is supported.

func (*WorkloadSelector) DeepCopy

func (in *WorkloadSelector) DeepCopy() *WorkloadSelector

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WorkloadSelector.

func (*WorkloadSelector) DeepCopyInto

func (in *WorkloadSelector) DeepCopyInto(out *WorkloadSelector)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type ZeroVPNConfig

type ZeroVPNConfig struct {
	// Controls whether ZeroVPN is enabled.
	Enabled *bool  `json:"enabled,omitempty"`
	Suffix  string `json:"suffix,omitempty"`
}

ZeroVPNConfig enables cross-cluster access using SNI matching.

func (*ZeroVPNConfig) DeepCopy

func (in *ZeroVPNConfig) DeepCopy() *ZeroVPNConfig

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ZeroVPNConfig.

func (*ZeroVPNConfig) DeepCopyInto

func (in *ZeroVPNConfig) DeepCopyInto(out *ZeroVPNConfig)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL