-
Notifications
You must be signed in to change notification settings - Fork 63
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Patterns] Pattern components generated from latest Consul manifests
Signed-off-by: l5io <[email protected]>
- Loading branch information
1 parent
62dcc33
commit e6785f1
Showing
18 changed files
with
1,099 additions
and
0 deletions.
There are no files selected for viewing
63 changes: 63 additions & 0 deletions
63
templates/oam/workloads/1.10.3/ingressgateway.consul.meshery.layer5io.schema.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
{ | ||
"description": "IngressGatewaySpec defines the desired state of IngressGateway", | ||
"properties": { | ||
"listeners": { | ||
"description": "Listeners declares what ports the ingress gateway should listen on, and what services to associated to those ports.", | ||
"items": { | ||
"description": "IngressListener manages the configuration for a listener on a specific port.", | ||
"properties": { | ||
"port": { | ||
"description": "Port declares the port on which the ingress gateway should listen for traffic.", | ||
"type": "integer" | ||
}, | ||
"protocol": { | ||
"description": "Protocol declares what type of traffic this listener is expected to receive. Depending on the protocol, a listener might support multiplexing services over a single port, or additional discovery chain features. The current supported values are: (tcp | http | http2 | grpc).", | ||
"type": "string" | ||
}, | ||
"services": { | ||
"description": "Services declares the set of services to which the listener forwards traffic. \n For \"tcp\" protocol listeners, only a single service is allowed. For \"http\" listeners, multiple services can be declared.", | ||
"items": { | ||
"description": "IngressService manages configuration for services that are exposed to ingress traffic.", | ||
"properties": { | ||
"hosts": { | ||
"description": "Hosts is a list of hostnames which should be associated to this service on the defined listener. Only allowed on layer 7 protocols, this will be used to route traffic to the service by matching the Host header of the HTTP request. \n If a host is provided for a service that also has a wildcard specifier defined, the host will override the wildcard-specifier-provided \"<service-name>.*\" domain for that listener. \n This cannot be specified when using the wildcard specifier, \"*\", or when using a \"tcp\" listener.", | ||
"items": { | ||
"type": "string" | ||
}, | ||
"type": "array" | ||
}, | ||
"name": { | ||
"description": "Name declares the service to which traffic should be forwarded. \n This can either be a specific service, or the wildcard specifier, \"*\". If the wildcard specifier is provided, the listener must be of \"http\" protocol and means that the listener will forward traffic to all services. \n A name can be specified on multiple listeners, and will be exposed on both of the listeners.", | ||
"type": "string" | ||
}, | ||
"namespace": { | ||
"description": "Namespace is the namespace where the service is located. Namespacing is a Consul Enterprise feature.", | ||
"type": "string" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"type": "array" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"type": "array" | ||
}, | ||
"tls": { | ||
"description": "TLS holds the TLS configuration for this gateway.", | ||
"properties": { | ||
"enabled": { | ||
"description": "Indicates that TLS should be enabled for this gateway service.", | ||
"type": "boolean" | ||
} | ||
}, | ||
"required": [ | ||
"enabled" | ||
], | ||
"type": "object" | ||
} | ||
}, | ||
"type": "object", | ||
"$schema": "http://json-schema.org/draft-04/schema#" | ||
} |
19 changes: 19 additions & 0 deletions
19
templates/oam/workloads/1.10.3/ingressgateway.consul_definition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
{ | ||
"apiVersion": "core.oam.dev/v1alpha1", | ||
"kind": "WorkloadDefinition", | ||
"metadata": { | ||
"name": "IngressGateway.Consul" | ||
}, | ||
"spec": { | ||
"definitionRef": { | ||
"name": "ingressgateway.consul.meshery.layer5.io" | ||
}, | ||
"metadata": { | ||
"@type": "pattern.meshery.io/mesh/workload", | ||
"meshVersion": "v1.10.3", | ||
"meshName": "CONSUL", | ||
"k8sAPIVersion": "consul.hashicorp.com/v1alpha1", | ||
"k8sKind": "IngressGateway" | ||
} | ||
} | ||
} |
17 changes: 17 additions & 0 deletions
17
templates/oam/workloads/1.10.3/mesh.consul.meshery.layer5io.schema.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"description": "MeshSpec defines the desired state of Mesh", | ||
"properties": { | ||
"transparentProxy": { | ||
"description": "TransparentProxyMeshConfig controls configuration specific to proxies in \"transparent\" mode. Added in v1.10.0.", | ||
"properties": { | ||
"meshDestinationsOnly": { | ||
"description": "MeshDestinationsOnly determines whether sidecar proxies operating in \"transparent\" mode can proxy traffic to IP addresses not registered in Consul's catalog. If enabled, traffic will only be proxied to upstreams with service registrations in the catalog.", | ||
"type": "boolean" | ||
} | ||
}, | ||
"type": "object" | ||
} | ||
}, | ||
"type": "object", | ||
"$schema": "http://json-schema.org/draft-04/schema#" | ||
} |
19 changes: 19 additions & 0 deletions
19
templates/oam/workloads/1.10.3/mesh.consul_definition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
{ | ||
"apiVersion": "core.oam.dev/v1alpha1", | ||
"kind": "WorkloadDefinition", | ||
"metadata": { | ||
"name": "Mesh.Consul" | ||
}, | ||
"spec": { | ||
"definitionRef": { | ||
"name": "mesh.consul.meshery.layer5.io" | ||
}, | ||
"metadata": { | ||
"@type": "pattern.meshery.io/mesh/workload", | ||
"meshVersion": "v1.10.3", | ||
"meshName": "CONSUL", | ||
"k8sAPIVersion": "consul.hashicorp.com/v1alpha1", | ||
"k8sKind": "Mesh" | ||
} | ||
} | ||
} |
75 changes: 75 additions & 0 deletions
75
templates/oam/workloads/1.10.3/proxydefaults.consul.meshery.layer5io.schema.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
{ | ||
"description": "ProxyDefaultsSpec defines the desired state of ProxyDefaults", | ||
"properties": { | ||
"config": { | ||
"description": "Config is an arbitrary map of configuration values used by Connect proxies. Any values that your proxy allows can be configured globally here. Supports JSON config values. See https://www.consul.io/docs/connect/proxies/envoy#configuration-formatting", | ||
"type": "object", | ||
"x-kubernetes-preserve-unknown-fields": true | ||
}, | ||
"expose": { | ||
"description": "Expose controls the default expose path configuration for Envoy.", | ||
"properties": { | ||
"checks": { | ||
"description": "Checks defines whether paths associated with Consul checks will be exposed. This flag triggers exposing all HTTP and GRPC check paths registered for the service.", | ||
"type": "boolean" | ||
}, | ||
"paths": { | ||
"description": "Paths is the list of paths exposed through the proxy.", | ||
"items": { | ||
"properties": { | ||
"listenerPort": { | ||
"description": "ListenerPort defines the port of the proxy's listener for exposed paths.", | ||
"type": "integer" | ||
}, | ||
"localPathPort": { | ||
"description": "LocalPathPort is the port that the service is listening on for the given path.", | ||
"type": "integer" | ||
}, | ||
"path": { | ||
"description": "Path is the path to expose through the proxy, ie. \"/metrics\".", | ||
"type": "string" | ||
}, | ||
"protocol": { | ||
"description": "Protocol describes the upstream's service protocol. Valid values are \"http\" and \"http2\", defaults to \"http\".", | ||
"type": "string" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"type": "array" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"meshGateway": { | ||
"description": "MeshGateway controls the default mesh gateway configuration for this service.", | ||
"properties": { | ||
"mode": { | ||
"description": "Mode is the mode that should be used for the upstream connection. One of none, local, or remote.", | ||
"type": "string" | ||
} | ||
}, | ||
"type": "object" | ||
}, | ||
"mode": { | ||
"description": "Mode can be one of \"direct\" or \"transparent\". \"transparent\" represents that inbound and outbound application traffic is being captured and redirected through the proxy. This mode does not enable the traffic redirection itself. Instead it signals Consul to configure Envoy as if traffic is already being redirected. \"direct\" represents that the proxy's listeners must be dialed directly by the local application and other proxies. Note: This cannot be set using the CRD and should be set using annotations on the services that are part of the mesh.", | ||
"type": "string" | ||
}, | ||
"transparentProxy": { | ||
"description": "TransparentProxy controls configuration specific to proxies in transparent mode. Note: This cannot be set using the CRD and should be set using annotations on the services that are part of the mesh.", | ||
"properties": { | ||
"dialedDirectly": { | ||
"description": "DialedDirectly indicates whether transparent proxies can dial this proxy instance directly. The discovery chain is not considered when dialing a service instance directly. This setting is useful when addressing stateful services, such as a database cluster with a leader node.", | ||
"type": "boolean" | ||
}, | ||
"outboundListenerPort": { | ||
"description": "OutboundListenerPort is the port of the listener where outbound application traffic is being redirected to.", | ||
"type": "integer" | ||
} | ||
}, | ||
"type": "object" | ||
} | ||
}, | ||
"type": "object", | ||
"$schema": "http://json-schema.org/draft-04/schema#" | ||
} |
19 changes: 19 additions & 0 deletions
19
templates/oam/workloads/1.10.3/proxydefaults.consul_definition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
{ | ||
"apiVersion": "core.oam.dev/v1alpha1", | ||
"kind": "WorkloadDefinition", | ||
"metadata": { | ||
"name": "ProxyDefaults.Consul" | ||
}, | ||
"spec": { | ||
"definitionRef": { | ||
"name": "proxydefaults.consul.meshery.layer5.io" | ||
}, | ||
"metadata": { | ||
"@type": "pattern.meshery.io/mesh/workload", | ||
"meshVersion": "v1.10.3", | ||
"meshName": "CONSUL", | ||
"k8sAPIVersion": "consul.hashicorp.com/v1alpha1", | ||
"k8sKind": "ProxyDefaults" | ||
} | ||
} | ||
} |
Oops, something went wrong.