Documentation ¶
Overview ¶
Package v1alpha2 contains API Schema definitions for the gateway.networking.k8s.io API group.
+k8s:openapi-gen=true +kubebuilder:object:generate=true +groupName=gateway.networking.k8s.io
Index ¶
- Constants
- Variables
- func Resource(resource string) schema.GroupResource
- type AddressType
- type AnnotationKey
- type AnnotationValue
- type BackendLBPolicy
- type BackendLBPolicyList
- type BackendLBPolicySpec
- type BackendObjectReference
- type BackendRef
- type CommonRouteSpec
- type Duration
- type GRPCRoute
- type GRPCRouteList
- type GatewayController
- type Group
- type Hostname
- type Kind
- type LocalObjectReference
- type LocalPolicyTargetReference
- type LocalPolicyTargetReferenceWithSectionName
- type Namespace
- type NamespacedPolicyTargetReference
- type ObjectName
- type ParentReference
- type PolicyAncestorStatus
- type PolicyConditionReason
- type PolicyConditionType
- type PolicyStatus
- type PortNumber
- type PreciseHostname
- type ReferenceGrant
- type ReferenceGrantFrom
- type ReferenceGrantList
- type ReferenceGrantSpec
- type ReferenceGrantTo
- type RouteConditionReason
- type RouteConditionType
- type RouteParentStatus
- type RouteStatus
- type SecretObjectReference
- type SectionName
- type SessionPersistence
- type TCPRoute
- type TCPRouteList
- type TCPRouteRule
- type TCPRouteSpec
- type TCPRouteStatus
- type TLSRoute
- type TLSRouteList
- type TLSRouteRule
- type TLSRouteSpec
- type TLSRouteStatus
- type UDPRoute
- type UDPRouteList
- type UDPRouteRule
- type UDPRouteSpec
- type UDPRouteStatus
Constants ¶
const ( // PolicyConditionAccepted indicates whether the policy has been accepted or // rejected by a targeted resource, and why. // // Possible reasons for this condition to be True are: // // * "Accepted" // // Possible reasons for this condition to be False are: // // * "Conflicted" // * "Invalid" // * "TargetNotFound" // PolicyConditionAccepted PolicyConditionType = "Accepted" // PolicyReasonAccepted is used with the "Accepted" condition when the policy // has been accepted by the targeted resource. PolicyReasonAccepted PolicyConditionReason = "Accepted" // PolicyReasonConflicted is used with the "Accepted" condition when the // policy has not been accepted by a targeted resource because there is // another policy that targets the same resource and a merge is not possible. PolicyReasonConflicted PolicyConditionReason = "Conflicted" // PolicyReasonInvalid is used with the "Accepted" condition when the policy // is syntactically or semantically invalid. PolicyReasonInvalid PolicyConditionReason = "Invalid" // PolicyReasonTargetNotFound is used with the "Accepted" condition when the // policy is attached to an invalid target resource. PolicyReasonTargetNotFound PolicyConditionReason = "TargetNotFound" )
const ( // This condition indicates whether the route has been accepted or rejected // by a Gateway, and why. // // Possible reasons for this condition to be true are: // // * "Accepted" // // Possible reasons for this condition to be False are: // // * "NotAllowedByListeners" // * "NoMatchingListenerHostname" // * "UnsupportedValue" // // Possible reasons for this condition to be Unknown are: // // * "Pending" // // Controllers may raise this condition with other reasons, // but should prefer to use the reasons listed above to improve // interoperability. RouteConditionAccepted RouteConditionType = "Accepted" // This reason is used with the "Accepted" condition when the Route has been // accepted by the Gateway. RouteReasonAccepted RouteConditionReason = "Accepted" // This reason is used with the "Accepted" condition when the route has not // been accepted by a Gateway because the Gateway has no Listener whose // allowedRoutes criteria permit the route RouteReasonNotAllowedByListeners RouteConditionReason = "NotAllowedByListeners" // This reason is used with the "Accepted" condition when the Gateway has no // compatible Listeners whose Hostname matches the route RouteReasonNoMatchingListenerHostname RouteConditionReason = "NoMatchingListenerHostname" // This reason is used with the "Accepted" condition when a value for an Enum // is not recognized. RouteReasonUnsupportedValue RouteConditionReason = "UnsupportedValue" // This reason is used with the "Accepted" when a controller has not yet // reconciled the route. RouteReasonPending RouteConditionReason = "Pending" // This condition indicates whether the controller was able to resolve all // the object references for the Route. // // Possible reasons for this condition to be true are: // // * "ResolvedRefs" // // Possible reasons for this condition to be false are: // // * "RefNotPermitted" // * "InvalidKind" // * "BackendNotFound" // // Controllers may raise this condition with other reasons, // but should prefer to use the reasons listed above to improve // interoperability. RouteConditionResolvedRefs RouteConditionType = "ResolvedRefs" // This reason is used with the "ResolvedRefs" condition when the condition // is true. RouteReasonResolvedRefs RouteConditionReason = "ResolvedRefs" // This reason is used with the "ResolvedRefs" condition when // one of the Listener's Routes has a BackendRef to an object in // another namespace, where the object in the other namespace does // not have a ReferenceGrant explicitly allowing the reference. RouteReasonRefNotPermitted RouteConditionReason = "RefNotPermitted" // This reason is used with the "ResolvedRefs" condition when // one of the Route's rules has a reference to an unknown or unsupported // Group and/or Kind. RouteReasonInvalidKind RouteConditionReason = "InvalidKind" // This reason is used with the "ResolvedRefs" condition when one of the // Route's rules has a reference to a resource that does not exist. RouteReasonBackendNotFound RouteConditionReason = "BackendNotFound" )
const GroupName = "gateway.networking.k8s.io"
GroupName specifies the group name used to register the objects.
const ( // PolicyLabelKey is the label whose presence identifies a CRD that the // Gateway API Policy attachment model. The value of the label SHOULD be one // of the following: // - A label value of "Inherited" indicates that this Policy is inheritable. // An example of inheritable policy is one which if applied at the Gateway // level would affect all attached HTTPRoutes and their respective // Backends. // - A label value of "Direct" indicates that the policy only affects the // resource to which it is attached and does not affect it's sub resources. PolicyLabelKey = "gateway.networking.k8s.io/policy" )
Variables ¶
var ( // localSchemeBuilder and AddToScheme will stay in k8s.io/kubernetes. SchemeBuilder runtime.SchemeBuilder // Deprecated: use Install instead AddToScheme = localSchemeBuilder.AddToScheme Install = localSchemeBuilder.AddToScheme )
var GroupVersion = v1.GroupVersion{Group: GroupName, Version: "v1alpha2"}
GroupVersion specifies the group and the version used to register the objects.
var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: "v1alpha2"}
SchemeGroupVersion is group version used to register these objects Deprecated: use GroupVersion instead.
Functions ¶
func Resource ¶
func Resource(resource string) schema.GroupResource
Resource takes an unqualified resource and returns a Group qualified GroupResource
Types ¶
type AddressType ¶
type AddressType = v1.AddressType
AddressType defines how a network address is represented as a text string. This may take two possible forms:
* A predefined CamelCase string identifier (currently limited to `IPAddress` or `Hostname`) * A domain-prefixed string identifier (like `acme.io/CustomAddressType`)
Values `IPAddress` and `Hostname` have Extended support.
The `NamedAddress` value has been deprecated in favor of implementation specific domain-prefixed strings.
All other values, including domain-prefixed values have Implementation-specific support, which are used in implementation-specific behaviors. Support for additional predefined CamelCase identifiers may be added in future releases.
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^Hostname|IPAddress|NamedAddress|[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*\/[A-Za-z0-9\/\-._~%!$&'()*+,;=:]+$`
const ( // A textual representation of a numeric IP address. IPv4 // addresses must be in dotted-decimal form. IPv6 addresses // must be in a standard IPv6 text representation // (see [RFC 5952](https://tools.ietf.org/html/rfc5952)). // // This type is intended for specific addresses. Address ranges are not // supported (e.g. you can not use a CIDR range like 127.0.0.0/24 as an // IPAddress). // // Support: Extended IPAddressType AddressType = "IPAddress" // A Hostname represents a DNS based ingress point. This is similar to the // corresponding hostname field in Kubernetes load balancer status. For // example, this concept may be used for cloud load balancers where a DNS // name is used to expose a load balancer. // // Support: Extended HostnameAddressType AddressType = "Hostname" // A NamedAddress provides a way to reference a specific IP address by name. // For example, this may be a name or other unique identifier that refers // to a resource on a cloud provider such as a static IP. // // The `NamedAddress` type has been deprecated in favor of implementation // specific domain-prefixed strings. // // Support: Implementation-specific NamedAddressType AddressType = "NamedAddress" )
type AnnotationKey ¶
type AnnotationKey = v1.AnnotationKey
AnnotationKey is the key of an annotation in Gateway API. This is used for validation of maps such as TLS options. This matches the Kubernetes "qualified name" validation that is used for annotations and other common values.
Valid values include:
* example * example.com * example.com/path * example.com/path.html
Invalid values include:
* example~ - "~" is an invalid character * example.com. - can not start or end with "."
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9]/?)*$`
type AnnotationValue ¶
type AnnotationValue = v1.AnnotationValue
AnnotationValue is the value of an annotation in Gateway API. This is used for validation of maps such as TLS options. This roughly matches Kubernetes annotation validation, although the length validation in that case is based on the entire size of the annotations struct.
+kubebuilder:validation:MinLength=0 +kubebuilder:validation:MaxLength=4096
type BackendLBPolicy ¶ added in v1.1.0
type BackendLBPolicy struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // Spec defines the desired state of BackendLBPolicy. Spec BackendLBPolicySpec `json:"spec"` // Status defines the current state of BackendLBPolicy. Status PolicyStatus `json:"status,omitempty"` }
BackendLBPolicy provides a way to define load balancing rules for a backend.
func (*BackendLBPolicy) DeepCopy ¶ added in v1.1.0
func (in *BackendLBPolicy) DeepCopy() *BackendLBPolicy
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BackendLBPolicy.
func (*BackendLBPolicy) DeepCopyInto ¶ added in v1.1.0
func (in *BackendLBPolicy) DeepCopyInto(out *BackendLBPolicy)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*BackendLBPolicy) DeepCopyObject ¶ added in v1.1.0
func (in *BackendLBPolicy) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type BackendLBPolicyList ¶ added in v1.1.0
type BackendLBPolicyList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []BackendLBPolicy `json:"items"` }
+kubebuilder:object:root=true BackendLBPolicyList contains a list of BackendLBPolicies
func (*BackendLBPolicyList) DeepCopy ¶ added in v1.1.0
func (in *BackendLBPolicyList) DeepCopy() *BackendLBPolicyList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BackendLBPolicyList.
func (*BackendLBPolicyList) DeepCopyInto ¶ added in v1.1.0
func (in *BackendLBPolicyList) DeepCopyInto(out *BackendLBPolicyList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*BackendLBPolicyList) DeepCopyObject ¶ added in v1.1.0
func (in *BackendLBPolicyList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type BackendLBPolicySpec ¶ added in v1.1.0
type BackendLBPolicySpec struct { // TargetRef identifies an API object to apply policy to. // Currently, Backends (i.e. Service, ServiceImport, or any // implementation-specific backendRef) are the only valid API // target references. // +listType=map // +listMapKey=group // +listMapKey=kind // +listMapKey=name // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 TargetRefs []LocalPolicyTargetReference `json:"targetRefs"` // SessionPersistence defines and configures session persistence // for the backend. // // Support: Extended // // +optional SessionPersistence *SessionPersistence `json:"sessionPersistence,omitempty"` }
BackendLBPolicySpec defines the desired state of BackendLBPolicy. Note: there is no Override or Default policy configuration.
func (*BackendLBPolicySpec) DeepCopy ¶ added in v1.1.0
func (in *BackendLBPolicySpec) DeepCopy() *BackendLBPolicySpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BackendLBPolicySpec.
func (*BackendLBPolicySpec) DeepCopyInto ¶ added in v1.1.0
func (in *BackendLBPolicySpec) DeepCopyInto(out *BackendLBPolicySpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type BackendObjectReference ¶
type BackendObjectReference = v1.BackendObjectReference
BackendObjectReference defines how an ObjectReference that is specific to BackendRef. It includes a few additional fields and features than a regular ObjectReference.
Note that when a namespace different than the local namespace is specified, a ReferenceGrant object is required in the referent namespace to allow that namespace's owner to accept the reference. See the ReferenceGrant documentation for details.
The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid.
References to objects with invalid Group and Kind are not valid, and must be rejected by the implementation, with appropriate Conditions set on the containing object. +k8s:deepcopy-gen=false
type BackendRef ¶
type BackendRef = v1.BackendRef
BackendRef defines how a Route should forward a request to a Kubernetes resource.
Note that when a namespace different than the local namespace is specified, a ReferenceGrant object is required in the referent namespace to allow that namespace's owner to accept the reference. See the ReferenceGrant documentation for details. +k8s:deepcopy-gen=false
type CommonRouteSpec ¶
type CommonRouteSpec = v1.CommonRouteSpec
CommonRouteSpec defines the common attributes that all Routes MUST include within their spec. +k8s:deepcopy-gen=false
type Duration ¶ added in v0.8.1
Duration is a string value representing a duration in time. The format is as specified in GEP-2257, a strict subset of the syntax parsed by Golang time.ParseDuration.
type GRPCRoute ¶ added in v0.6.0
+genclient +kubebuilder:object:root=true +kubebuilder:resource:categories=gateway-api +kubebuilder:subresource:status +kubebuilder:printcolumn:name="Hostnames",type=string,JSONPath=`.spec.hostnames` +kubebuilder:printcolumn:name="Age",type=date,JSONPath=`.metadata.creationTimestamp` +kubebuilder:deprecatedversion:warning="The v1alpha2 version of GRPCRoute has been deprecated and will be removed in a future release of the API. Please upgrade to v1."
func (*GRPCRoute) DeepCopy ¶ added in v0.6.0
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GRPCRoute.
func (*GRPCRoute) DeepCopyInto ¶ added in v0.6.0
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*GRPCRoute) DeepCopyObject ¶ added in v0.6.0
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type GRPCRouteList ¶ added in v0.6.0
type GRPCRouteList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []GRPCRoute `json:"items"` }
+kubebuilder:object:root=true
func (*GRPCRouteList) DeepCopy ¶ added in v0.6.0
func (in *GRPCRouteList) DeepCopy() *GRPCRouteList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GRPCRouteList.
func (*GRPCRouteList) DeepCopyInto ¶ added in v0.6.0
func (in *GRPCRouteList) DeepCopyInto(out *GRPCRouteList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*GRPCRouteList) DeepCopyObject ¶ added in v0.6.0
func (in *GRPCRouteList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type GatewayController ¶
type GatewayController = v1.GatewayController
GatewayController is the name of a Gateway API controller. It must be a domain prefixed path.
Valid values include:
* "example.com/bar"
Invalid values include:
* "example.com" - must include path * "foo.example.com" - must include path
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*\/[A-Za-z0-9\/\-._~%!$&'()*+,;=:]+$`
type Group ¶
Group refers to a Kubernetes Group. It must either be an empty string or a RFC 1123 subdomain.
This validation is based off of the corresponding Kubernetes validation: https://github.com/kubernetes/apimachinery/blob/02cfb53916346d085a6c6c7c66f882e3c6b0eca6/pkg/util/validation/validation.go#L208
Valid values include:
* "" - empty string implies core Kubernetes API group * "networking.k8s.io" * "foo.example.com"
Invalid values include:
* "example.com/bar" - "/" is an invalid character
+kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$`
type Hostname ¶
Hostname is the fully qualified domain name of a network host. This matches the RFC 1123 definition of a hostname with 2 notable exceptions:
- IPs are not allowed.
- A hostname may be prefixed with a wildcard label (`*.`). The wildcard label must appear by itself as the first label.
Hostname can be "precise" which is a domain name without the terminating dot of a network host (e.g. "foo.example.com") or "wildcard", which is a domain name prefixed with a single wildcard label (e.g. `*.example.com`).
Note that as per RFC1035 and RFC1123, a *label* must consist of lower case alphanumeric characters or '-', and must start and end with an alphanumeric character. No other punctuation is allowed.
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^(\*\.)?[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$`
type Kind ¶
Kind refers to a Kubernetes Kind.
Valid values include:
* "Service" * "HTTPRoute"
Invalid values include:
* "invalid/kind" - "/" is an invalid character
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=63 +kubebuilder:validation:Pattern=`^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$`
type LocalObjectReference ¶
type LocalObjectReference = v1.LocalObjectReference
LocalObjectReference identifies an API object within the namespace of the referrer. The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid.
References to objects with invalid Group and Kind are not valid, and must be rejected by the implementation, with appropriate Conditions set on the containing object. +k8s:deepcopy-gen=false
type LocalPolicyTargetReference ¶ added in v1.1.0
type LocalPolicyTargetReference struct { // Group is the group of the target resource. Group Group `json:"group"` // Kind is kind of the target resource. Kind Kind `json:"kind"` // Name is the name of the target resource. Name ObjectName `json:"name"` }
LocalPolicyTargetReference identifies an API object to apply a direct or inherited policy to. This should be used as part of Policy resources that can target Gateway API resources. For more information on how this policy attachment model works, and a sample Policy resource, refer to the policy attachment documentation for Gateway API.
func (*LocalPolicyTargetReference) DeepCopy ¶ added in v1.1.0
func (in *LocalPolicyTargetReference) DeepCopy() *LocalPolicyTargetReference
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LocalPolicyTargetReference.
func (*LocalPolicyTargetReference) DeepCopyInto ¶ added in v1.1.0
func (in *LocalPolicyTargetReference) DeepCopyInto(out *LocalPolicyTargetReference)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type LocalPolicyTargetReferenceWithSectionName ¶ added in v1.1.0
type LocalPolicyTargetReferenceWithSectionName struct { LocalPolicyTargetReference `json:",inline"` // SectionName is the name of a section within the target resource. When // unspecified, this targetRef targets the entire resource. In the following // resources, SectionName is interpreted as the following: // // * Gateway: Listener name // * HTTPRoute: HTTPRouteRule name // * Service: Port name // // If a SectionName is specified, but does not exist on the targeted object, // the Policy must fail to attach, and the policy implementation should record // a `ResolvedRefs` or similar Condition in the Policy's status. // // +optional SectionName *SectionName `json:"sectionName,omitempty"` }
LocalPolicyTargetReferenceWithSectionName identifies an API object to apply a direct policy to. This should be used as part of Policy resources that can target single resources. For more information on how this policy attachment mode works, and a sample Policy resource, refer to the policy attachment documentation for Gateway API.
Note: This should only be used for direct policy attachment when references to SectionName are actually needed. In all other cases, LocalPolicyTargetReference should be used.
func (*LocalPolicyTargetReferenceWithSectionName) DeepCopy ¶ added in v1.1.0
func (in *LocalPolicyTargetReferenceWithSectionName) DeepCopy() *LocalPolicyTargetReferenceWithSectionName
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LocalPolicyTargetReferenceWithSectionName.
func (*LocalPolicyTargetReferenceWithSectionName) DeepCopyInto ¶ added in v1.1.0
func (in *LocalPolicyTargetReferenceWithSectionName) DeepCopyInto(out *LocalPolicyTargetReferenceWithSectionName)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type Namespace ¶
Namespace refers to a Kubernetes namespace. It must be a RFC 1123 label.
This validation is based off of the corresponding Kubernetes validation: https://github.com/kubernetes/apimachinery/blob/02cfb53916346d085a6c6c7c66f882e3c6b0eca6/pkg/util/validation/validation.go#L187
This is used for Namespace name validation here: https://github.com/kubernetes/apimachinery/blob/02cfb53916346d085a6c6c7c66f882e3c6b0eca6/pkg/api/validation/generic.go#L63
Valid values include:
* "example"
Invalid values include:
* "example.com" - "." is an invalid character
+kubebuilder:validation:Pattern=`^[a-z0-9]([-a-z0-9]*[a-z0-9])?$` +kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=63
type NamespacedPolicyTargetReference ¶ added in v1.1.0
type NamespacedPolicyTargetReference struct { // Group is the group of the target resource. Group Group `json:"group"` // Kind is kind of the target resource. Kind Kind `json:"kind"` // Name is the name of the target resource. Name ObjectName `json:"name"` // Namespace is the namespace of the referent. When unspecified, the local // namespace is inferred. Even when policy targets a resource in a different // namespace, it MUST only apply to traffic originating from the same // namespace as the policy. // // +optional Namespace *Namespace `json:"namespace,omitempty"` }
NamespacedPolicyTargetReference identifies an API object to apply a direct or inherited policy to, potentially in a different namespace. This should only be used as part of Policy resources that need to be able to target resources in different namespaces. For more information on how this policy attachment model works, and a sample Policy resource, refer to the policy attachment documentation for Gateway API.
func (*NamespacedPolicyTargetReference) DeepCopy ¶ added in v1.1.0
func (in *NamespacedPolicyTargetReference) DeepCopy() *NamespacedPolicyTargetReference
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new NamespacedPolicyTargetReference.
func (*NamespacedPolicyTargetReference) DeepCopyInto ¶ added in v1.1.0
func (in *NamespacedPolicyTargetReference) DeepCopyInto(out *NamespacedPolicyTargetReference)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type ObjectName ¶
type ObjectName = v1.ObjectName
ObjectName refers to the name of a Kubernetes object. Object names can have a variety of forms, including RFC1123 subdomains, RFC 1123 labels, or RFC 1035 labels.
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253
type ParentReference ¶ added in v0.5.0
type ParentReference = v1.ParentReference
ParentReference identifies an API object (usually a Gateway) that can be considered a parent of this resource (usually a route). The only kind of parent resource with "Core" support is Gateway. This API may be extended in the future to support additional kinds of parent resources, such as HTTPRoute.
Note that there are specific rules for ParentRefs which cross namespace boundaries. Cross-namespace references are only valid if they are explicitly allowed by something in the namespace they are referring to. For example: Gateway has the AllowedRoutes field, and ReferenceGrant provides a generic way to enable any other kind of cross-namespace reference.
The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid. +k8s:deepcopy-gen=false
type PolicyAncestorStatus ¶ added in v1.0.0
type PolicyAncestorStatus struct { // AncestorRef corresponds with a ParentRef in the spec that this // PolicyAncestorStatus struct describes the status of. AncestorRef ParentReference `json:"ancestorRef"` // ControllerName is a domain/path string that indicates the name of the // controller that wrote this status. This corresponds with the // controllerName field on GatewayClass. // // Example: "example.net/gateway-controller". // // The format of this field is DOMAIN "/" PATH, where DOMAIN and PATH are // valid Kubernetes names // (https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names). // // Controllers MUST populate this field when writing status. Controllers should ensure that // entries to status populated with their ControllerName are cleaned up when they are no // longer necessary. ControllerName GatewayController `json:"controllerName"` // Conditions describes the status of the Policy with respect to the given Ancestor. // // +listType=map // +listMapKey=type // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=8 Conditions []metav1.Condition `json:"conditions,omitempty"` }
PolicyAncestorStatus describes the status of a route with respect to an associated Ancestor.
Ancestors refer to objects that are either the Target of a policy or above it in terms of object hierarchy. For example, if a policy targets a Service, the Policy's Ancestors are, in order, the Service, the HTTPRoute, the Gateway, and the GatewayClass. Almost always, in this hierarchy, the Gateway will be the most useful object to place Policy status on, so we recommend that implementations SHOULD use Gateway as the PolicyAncestorStatus object unless the designers have a _very_ good reason otherwise.
In the context of policy attachment, the Ancestor is used to distinguish which resource results in a distinct application of this policy. For example, if a policy targets a Service, it may have a distinct result per attached Gateway.
Policies targeting the same resource may have different effects depending on the ancestors of those resources. For example, different Gateways targeting the same Service may have different capabilities, especially if they have different underlying implementations.
For example, in BackendTLSPolicy, the Policy attaches to a Service that is used as a backend in a HTTPRoute that is itself attached to a Gateway. In this case, the relevant object for status is the Gateway, and that is the ancestor object referred to in this status.
Note that a parent is also an ancestor, so for objects where the parent is the relevant object for status, this struct SHOULD still be used.
This struct is intended to be used in a slice that's effectively a map, with a composite key made up of the AncestorRef and the ControllerName.
func (*PolicyAncestorStatus) DeepCopy ¶ added in v1.0.0
func (in *PolicyAncestorStatus) DeepCopy() *PolicyAncestorStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyAncestorStatus.
func (*PolicyAncestorStatus) DeepCopyInto ¶ added in v1.0.0
func (in *PolicyAncestorStatus) DeepCopyInto(out *PolicyAncestorStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type PolicyConditionReason ¶ added in v0.6.1
type PolicyConditionReason string
PolicyConditionReason is a reason for a policy condition.
type PolicyConditionType ¶ added in v0.6.1
type PolicyConditionType string
PolicyConditionType is a type of condition for a policy. This type should be used with a Policy resource Status.Conditions field.
type PolicyStatus ¶ added in v1.0.0
type PolicyStatus struct { // Ancestors is a list of ancestor resources (usually Gateways) that are // associated with the policy, and the status of the policy with respect to // each ancestor. When this policy attaches to a parent, the controller that // manages the parent and the ancestors MUST add an entry to this list when // the controller first sees the policy and SHOULD update the entry as // appropriate when the relevant ancestor is modified. // // Note that choosing the relevant ancestor is left to the Policy designers; // an important part of Policy design is designing the right object level at // which to namespace this status. // // Note also that implementations MUST ONLY populate ancestor status for // the Ancestor resources they are responsible for. Implementations MUST // use the ControllerName field to uniquely identify the entries in this list // that they are responsible for. // // Note that to achieve this, the list of PolicyAncestorStatus structs // MUST be treated as a map with a composite key, made up of the AncestorRef // and ControllerName fields combined. // // A maximum of 16 ancestors will be represented in this list. An empty list // means the Policy is not relevant for any ancestors. // // If this slice is full, implementations MUST NOT add further entries. // Instead they MUST consider the policy unimplementable and signal that // on any related resources such as the ancestor that would be referenced // here. For example, if this list was full on BackendTLSPolicy, no // additional Gateways would be able to reference the Service targeted by // the BackendTLSPolicy. // // +kubebuilder:validation:MaxItems=16 Ancestors []PolicyAncestorStatus `json:"ancestors"` }
PolicyStatus defines the common attributes that all Policies should include within their status.
func (*PolicyStatus) DeepCopy ¶ added in v1.0.0
func (in *PolicyStatus) DeepCopy() *PolicyStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PolicyStatus.
func (*PolicyStatus) DeepCopyInto ¶ added in v1.0.0
func (in *PolicyStatus) DeepCopyInto(out *PolicyStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type PortNumber ¶
type PortNumber = v1.PortNumber
PortNumber defines a network port.
+kubebuilder:validation:Minimum=1 +kubebuilder:validation:Maximum=65535
type PreciseHostname ¶ added in v0.4.1
type PreciseHostname = v1.PreciseHostname
PreciseHostname is the fully qualified domain name of a network host. This matches the RFC 1123 definition of a hostname with 1 notable exception that numeric IP addresses are not allowed.
Note that as per RFC1035 and RFC1123, a *label* must consist of lower case alphanumeric characters or '-', and must start and end with an alphanumeric character. No other punctuation is allowed.
+kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253 +kubebuilder:validation:Pattern=`^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$`
type ReferenceGrant ¶ added in v0.5.0
type ReferenceGrant v1beta1.ReferenceGrant
ReferenceGrant identifies kinds of resources in other namespaces that are trusted to reference the specified kinds of resources in the same namespace as the policy.
Each ReferenceGrant can be used to represent a unique trust relationship. Additional Reference Grants can be used to add to the set of trusted sources of inbound references for the namespace they are defined within.
A ReferenceGrant is required for all cross-namespace references in Gateway API (with the exception of cross-namespace Route-Gateway attachment, which is governed by the AllowedRoutes configuration on the Gateway, and cross-namespace Service ParentRefs on a "consumer" mesh Route, which defines routing rules applicable only to workloads in the Route namespace). ReferenceGrants allowing a reference from a Route to a Service are only applicable to BackendRefs.
ReferenceGrant is a form of runtime verification allowing users to assert which cross-namespace object references are permitted. Implementations that support ReferenceGrant MUST NOT permit cross-namespace references which have no grant, and MUST respond to the removal of a grant by revoking the access that the grant allowed.
func (*ReferenceGrant) DeepCopy ¶ added in v0.5.0
func (in *ReferenceGrant) DeepCopy() *ReferenceGrant
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ReferenceGrant.
func (*ReferenceGrant) DeepCopyInto ¶ added in v0.5.0
func (in *ReferenceGrant) DeepCopyInto(out *ReferenceGrant)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*ReferenceGrant) DeepCopyObject ¶ added in v0.5.0
func (in *ReferenceGrant) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type ReferenceGrantFrom ¶ added in v0.5.0
type ReferenceGrantFrom = v1beta1.ReferenceGrantFrom
ReferenceGrantFrom describes trusted namespaces and kinds. +k8s:deepcopy-gen=false
type ReferenceGrantList ¶ added in v0.5.0
type ReferenceGrantList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []ReferenceGrant `json:"items"` }
+kubebuilder:object:root=true ReferenceGrantList contains a list of ReferenceGrant.
func (*ReferenceGrantList) DeepCopy ¶ added in v0.5.0
func (in *ReferenceGrantList) DeepCopy() *ReferenceGrantList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ReferenceGrantList.
func (*ReferenceGrantList) DeepCopyInto ¶ added in v0.5.0
func (in *ReferenceGrantList) DeepCopyInto(out *ReferenceGrantList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*ReferenceGrantList) DeepCopyObject ¶ added in v0.5.0
func (in *ReferenceGrantList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type ReferenceGrantSpec ¶ added in v0.5.0
type ReferenceGrantSpec = v1beta1.ReferenceGrantSpec
ReferenceGrantSpec identifies a cross namespace relationship that is trusted for Gateway API. +k8s:deepcopy-gen=false
type ReferenceGrantTo ¶ added in v0.5.0
type ReferenceGrantTo = v1beta1.ReferenceGrantTo
ReferenceGrantTo describes what Kinds are allowed as targets of the references. +k8s:deepcopy-gen=false
type RouteConditionReason ¶ added in v0.5.0
type RouteConditionReason = v1.RouteConditionReason
RouteConditionReason is a reason for a route condition.
type RouteConditionType ¶
type RouteConditionType = v1.RouteConditionType
RouteConditionType is a type of condition for a route.
type RouteParentStatus ¶
type RouteParentStatus = v1.RouteParentStatus
RouteParentStatus describes the status of a route with respect to an associated Parent. +k8s:deepcopy-gen=false
type RouteStatus ¶
type RouteStatus = v1.RouteStatus
RouteStatus defines the common attributes that all Routes MUST include within their status. +k8s:deepcopy-gen=false
type SecretObjectReference ¶
type SecretObjectReference = v1.SecretObjectReference
SecretObjectReference identifies an API object including its namespace, defaulting to Secret.
The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid.
References to objects with invalid Group and Kind are not valid, and must be rejected by the implementation, with appropriate Conditions set on the containing object. +k8s:deepcopy-gen=false
type SectionName ¶
type SectionName = v1.SectionName
SectionName is the name of a section in a Kubernetes resource.
In the following resources, SectionName is interpreted as the following:
* Gateway: Listener name * HTTPRoute: HTTPRouteRule name * Service: Port name
Section names can have a variety of forms, including RFC 1123 subdomains, RFC 1123 labels, or RFC 1035 labels.
This validation is based off of the corresponding Kubernetes validation: https://github.com/kubernetes/apimachinery/blob/02cfb53916346d085a6c6c7c66f882e3c6b0eca6/pkg/util/validation/validation.go#L208
Valid values include:
* "example" * "foo-example" * "example.com" * "foo.example.com"
Invalid values include:
* "example.com/bar" - "/" is an invalid character
+kubebuilder:validation:Pattern=`^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$` +kubebuilder:validation:MinLength=1 +kubebuilder:validation:MaxLength=253
type SessionPersistence ¶ added in v1.1.0
type SessionPersistence = v1.SessionPersistence
SessionPersistence defines the desired state of SessionPersistence. +k8s:deepcopy-gen=false
type TCPRoute ¶
type TCPRoute struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // Spec defines the desired state of TCPRoute. Spec TCPRouteSpec `json:"spec"` // Status defines the current state of TCPRoute. Status TCPRouteStatus `json:"status,omitempty"` }
TCPRoute provides a way to route TCP requests. When combined with a Gateway listener, it can be used to forward connections on the port specified by the listener to a set of backends specified by the TCPRoute.
func (*TCPRoute) DeepCopy ¶
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TCPRoute.
func (*TCPRoute) DeepCopyInto ¶
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TCPRoute) DeepCopyObject ¶
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type TCPRouteList ¶
type TCPRouteList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []TCPRoute `json:"items"` }
TCPRouteList contains a list of TCPRoute
func (*TCPRouteList) DeepCopy ¶
func (in *TCPRouteList) DeepCopy() *TCPRouteList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TCPRouteList.
func (*TCPRouteList) DeepCopyInto ¶
func (in *TCPRouteList) DeepCopyInto(out *TCPRouteList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TCPRouteList) DeepCopyObject ¶
func (in *TCPRouteList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type TCPRouteRule ¶
type TCPRouteRule struct { // BackendRefs defines the backend(s) where matching requests should be // sent. If unspecified or invalid (refers to a non-existent resource or a // Service with no endpoints), the underlying implementation MUST actively // reject connection attempts to this backend. Connection rejections must // respect weight; if an invalid backend is requested to have 80% of // connections, then 80% of connections must be rejected instead. // // Support: Core for Kubernetes Service // // Support: Extended for Kubernetes ServiceImport // // Support: Implementation-specific for any other resource // // Support for weight: Extended // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 BackendRefs []BackendRef `json:"backendRefs,omitempty"` }
TCPRouteRule is the configuration for a given rule.
func (*TCPRouteRule) DeepCopy ¶
func (in *TCPRouteRule) DeepCopy() *TCPRouteRule
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TCPRouteRule.
func (*TCPRouteRule) DeepCopyInto ¶
func (in *TCPRouteRule) DeepCopyInto(out *TCPRouteRule)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TCPRouteSpec ¶
type TCPRouteSpec struct { CommonRouteSpec `json:",inline"` // Rules are a list of TCP matchers and actions. // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 Rules []TCPRouteRule `json:"rules"` }
TCPRouteSpec defines the desired state of TCPRoute
func (*TCPRouteSpec) DeepCopy ¶
func (in *TCPRouteSpec) DeepCopy() *TCPRouteSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TCPRouteSpec.
func (*TCPRouteSpec) DeepCopyInto ¶
func (in *TCPRouteSpec) DeepCopyInto(out *TCPRouteSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TCPRouteStatus ¶
type TCPRouteStatus struct {
RouteStatus `json:",inline"`
}
TCPRouteStatus defines the observed state of TCPRoute
func (*TCPRouteStatus) DeepCopy ¶
func (in *TCPRouteStatus) DeepCopy() *TCPRouteStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TCPRouteStatus.
func (*TCPRouteStatus) DeepCopyInto ¶
func (in *TCPRouteStatus) DeepCopyInto(out *TCPRouteStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TLSRoute ¶
type TLSRoute struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // Spec defines the desired state of TLSRoute. Spec TLSRouteSpec `json:"spec"` // Status defines the current state of TLSRoute. Status TLSRouteStatus `json:"status,omitempty"` }
The TLSRoute resource is similar to TCPRoute, but can be configured to match against TLS-specific metadata. This allows more flexibility in matching streams for a given TLS listener.
If you need to forward traffic to a single target for a TLS listener, you could choose to use a TCPRoute with a TLS listener.
func (*TLSRoute) DeepCopy ¶
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSRoute.
func (*TLSRoute) DeepCopyInto ¶
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TLSRoute) DeepCopyObject ¶
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type TLSRouteList ¶
type TLSRouteList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []TLSRoute `json:"items"` }
TLSRouteList contains a list of TLSRoute
func (*TLSRouteList) DeepCopy ¶
func (in *TLSRouteList) DeepCopy() *TLSRouteList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSRouteList.
func (*TLSRouteList) DeepCopyInto ¶
func (in *TLSRouteList) DeepCopyInto(out *TLSRouteList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*TLSRouteList) DeepCopyObject ¶
func (in *TLSRouteList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type TLSRouteRule ¶
type TLSRouteRule struct { // BackendRefs defines the backend(s) where matching requests should be // sent. If unspecified or invalid (refers to a non-existent resource or // a Service with no endpoints), the rule performs no forwarding; if no // filters are specified that would result in a response being sent, the // underlying implementation must actively reject request attempts to this // backend, by rejecting the connection or returning a 500 status code. // Request rejections must respect weight; if an invalid backend is // requested to have 80% of requests, then 80% of requests must be rejected // instead. // // Support: Core for Kubernetes Service // // Support: Extended for Kubernetes ServiceImport // // Support: Implementation-specific for any other resource // // Support for weight: Extended // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 BackendRefs []BackendRef `json:"backendRefs,omitempty"` }
TLSRouteRule is the configuration for a given rule.
func (*TLSRouteRule) DeepCopy ¶
func (in *TLSRouteRule) DeepCopy() *TLSRouteRule
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSRouteRule.
func (*TLSRouteRule) DeepCopyInto ¶
func (in *TLSRouteRule) DeepCopyInto(out *TLSRouteRule)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TLSRouteSpec ¶
type TLSRouteSpec struct { CommonRouteSpec `json:",inline"` // Hostnames defines a set of SNI names that should match against the // SNI attribute of TLS ClientHello message in TLS handshake. This matches // the RFC 1123 definition of a hostname with 2 notable exceptions: // // 1. IPs are not allowed in SNI names per RFC 6066. // 2. A hostname may be prefixed with a wildcard label (`*.`). The wildcard // label must appear by itself as the first label. // // If a hostname is specified by both the Listener and TLSRoute, there // must be at least one intersecting hostname for the TLSRoute to be // attached to the Listener. For example: // // * A Listener with `test.example.com` as the hostname matches TLSRoutes // that have either not specified any hostnames, or have specified at // least one of `test.example.com` or `*.example.com`. // * A Listener with `*.example.com` as the hostname matches TLSRoutes // that have either not specified any hostnames or have specified at least // one hostname that matches the Listener hostname. For example, // `test.example.com` and `*.example.com` would both match. On the other // hand, `example.com` and `test.example.net` would not match. // // If both the Listener and TLSRoute have specified hostnames, any // TLSRoute hostnames that do not match the Listener hostname MUST be // ignored. For example, if a Listener specified `*.example.com`, and the // TLSRoute specified `test.example.com` and `test.example.net`, // `test.example.net` must not be considered for a match. // // If both the Listener and TLSRoute have specified hostnames, and none // match with the criteria above, then the TLSRoute is not accepted. The // implementation must raise an 'Accepted' Condition with a status of // `False` in the corresponding RouteParentStatus. // // Support: Core // // +optional // +kubebuilder:validation:MaxItems=16 Hostnames []Hostname `json:"hostnames,omitempty"` // Rules are a list of TLS matchers and actions. // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 Rules []TLSRouteRule `json:"rules"` }
TLSRouteSpec defines the desired state of a TLSRoute resource.
func (*TLSRouteSpec) DeepCopy ¶
func (in *TLSRouteSpec) DeepCopy() *TLSRouteSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSRouteSpec.
func (*TLSRouteSpec) DeepCopyInto ¶
func (in *TLSRouteSpec) DeepCopyInto(out *TLSRouteSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type TLSRouteStatus ¶
type TLSRouteStatus struct {
RouteStatus `json:",inline"`
}
TLSRouteStatus defines the observed state of TLSRoute
func (*TLSRouteStatus) DeepCopy ¶
func (in *TLSRouteStatus) DeepCopy() *TLSRouteStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TLSRouteStatus.
func (*TLSRouteStatus) DeepCopyInto ¶
func (in *TLSRouteStatus) DeepCopyInto(out *TLSRouteStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type UDPRoute ¶
type UDPRoute struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // Spec defines the desired state of UDPRoute. Spec UDPRouteSpec `json:"spec"` // Status defines the current state of UDPRoute. Status UDPRouteStatus `json:"status,omitempty"` }
UDPRoute provides a way to route UDP traffic. When combined with a Gateway listener, it can be used to forward traffic on the port specified by the listener to a set of backends specified by the UDPRoute.
func (*UDPRoute) DeepCopy ¶
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UDPRoute.
func (*UDPRoute) DeepCopyInto ¶
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*UDPRoute) DeepCopyObject ¶
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type UDPRouteList ¶
type UDPRouteList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []UDPRoute `json:"items"` }
UDPRouteList contains a list of UDPRoute
func (*UDPRouteList) DeepCopy ¶
func (in *UDPRouteList) DeepCopy() *UDPRouteList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UDPRouteList.
func (*UDPRouteList) DeepCopyInto ¶
func (in *UDPRouteList) DeepCopyInto(out *UDPRouteList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*UDPRouteList) DeepCopyObject ¶
func (in *UDPRouteList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
type UDPRouteRule ¶
type UDPRouteRule struct { // BackendRefs defines the backend(s) where matching requests should be // sent. If unspecified or invalid (refers to a non-existent resource or a // Service with no endpoints), the underlying implementation MUST actively // reject connection attempts to this backend. Packet drops must // respect weight; if an invalid backend is requested to have 80% of // the packets, then 80% of packets must be dropped instead. // // Support: Core for Kubernetes Service // // Support: Extended for Kubernetes ServiceImport // // Support: Implementation-specific for any other resource // // Support for weight: Extended // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 BackendRefs []BackendRef `json:"backendRefs,omitempty"` }
UDPRouteRule is the configuration for a given rule.
func (*UDPRouteRule) DeepCopy ¶
func (in *UDPRouteRule) DeepCopy() *UDPRouteRule
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UDPRouteRule.
func (*UDPRouteRule) DeepCopyInto ¶
func (in *UDPRouteRule) DeepCopyInto(out *UDPRouteRule)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type UDPRouteSpec ¶
type UDPRouteSpec struct { CommonRouteSpec `json:",inline"` // Rules are a list of UDP matchers and actions. // // +kubebuilder:validation:MinItems=1 // +kubebuilder:validation:MaxItems=16 Rules []UDPRouteRule `json:"rules"` }
UDPRouteSpec defines the desired state of UDPRoute.
func (*UDPRouteSpec) DeepCopy ¶
func (in *UDPRouteSpec) DeepCopy() *UDPRouteSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UDPRouteSpec.
func (*UDPRouteSpec) DeepCopyInto ¶
func (in *UDPRouteSpec) DeepCopyInto(out *UDPRouteSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type UDPRouteStatus ¶
type UDPRouteStatus struct {
RouteStatus `json:",inline"`
}
UDPRouteStatus defines the observed state of UDPRoute.
func (*UDPRouteStatus) DeepCopy ¶
func (in *UDPRouteStatus) DeepCopy() *UDPRouteStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new UDPRouteStatus.
func (*UDPRouteStatus) DeepCopyInto ¶
func (in *UDPRouteStatus) DeepCopyInto(out *UDPRouteStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.