Skip to content

Commit

Permalink
Removing v1alpha2 directory from docs
Browse files Browse the repository at this point in the history
  • Loading branch information
robscott committed Apr 11, 2024
1 parent c57c131 commit 32287dc
Show file tree
Hide file tree
Showing 6 changed files with 10 additions and 14 deletions.
10 changes: 5 additions & 5 deletions geps/gep-1426/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,7 @@ If `port` is not set, the implementation MUST associate the route with all ports

GAMMA implementations SHOULD NOT infer any functionality from the `hostnames` field on `xRoute`s (currently, `TLSRoute`, `HTTPRoute`, and `GRPCRoute` have this field) due to current under-specification and reserved potential for future usage or API changes.

For the use case of filtering incoming traffic from selected HTTP hostnames, it is recommended to guide users toward configuring [`HTTPHeaderMatch`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io%2fv1beta1.HTTPHeaderMatch) rules for the [`Host`](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Host) header. Functionality to be explored in future GEPs may include supporting concurrent usage of an `xRoute` traffic configuration for multiple North/South `Gateways` and East/West mesh use cases or redirection of egress traffic to an in-cluster `Service`.
For the use case of filtering incoming traffic from selected HTTP hostnames, it is recommended to guide users toward configuring [`HTTPHeaderMatch`](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1beta1.HTTPHeaderMatch) rules for the [`Host`](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Host) header. Functionality to be explored in future GEPs may include supporting concurrent usage of an `xRoute` traffic configuration for multiple North/South `Gateways` and East/West mesh use cases or redirection of egress traffic to an in-cluster `Service`.

### Namespace boundaries

Expand Down Expand Up @@ -234,7 +234,7 @@ A controller could create a matching selector-less `Service` (i.e. no endpoints)

Ownership/trust would remain based on naming pattern: `serviceName.namespace.svc.[USER_DOMAIN]`

Separate `HttpService`, `TlsService` and `TcpService` resources could have the benefit of allowing us to define protocol specific elements to the spec along with an embedded `CommonServiceSpec`, similar to [`CommonRouteSpec`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.CommonRouteSpec), and keep similar patterns as `Service`.
Separate `HttpService`, `TlsService` and `TcpService` resources could have the benefit of allowing us to define protocol specific elements to the spec along with an embedded `CommonServiceSpec`, similar to [`CommonRouteSpec`](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.CommonRouteSpec), and keep similar patterns as `Service`.

##### Drawbacks

Expand Down Expand Up @@ -292,7 +292,7 @@ spec:
name: cool-mesh
```

It is currently undefined how this approach may interact with either explicitly configured [`hostnames`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteSpec) or implicit "transparent proxy" routing for Kubernetes `Services` to determine how traffic should be intercepted and redirected.
It is currently undefined how this approach may interact with either explicitly configured [`hostnames`](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteSpec) or implicit "transparent proxy" routing for Kubernetes `Services` to determine how traffic should be intercepted and redirected.

This approach is not entirely abandoned, as it could supplement the proposed approach if explicit attachment to a specific mesh is deemed necessary. Additionally, this approach may offer a future option for attaching an `HTTPRoute` to a mesh, but not a specific service (e.g. to implement mesh-wide egress functionality for all requests to a specific hostname).

Expand All @@ -313,7 +313,7 @@ spec:
* Would require separate `HTTPRoute` resources to explicitly define _different_ traffic routing rules for the same service on different meshes.
#### Nested `services` and `hostnames` fields in [`ParentReference`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.ParentReference)
#### Nested `services` and `hostnames` fields in [`ParentReference`](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.ParentReference)
In core conformance, the `services` would only be valid for `Mesh` types, and `hostnames` field only for `Gateway`. Mesh implementations could still use a `Host` header match if they wanted limit rules to specific hostnames.
Expand Down Expand Up @@ -353,7 +353,7 @@ This is done by configuring the `parentRef`, to point to the `istio` `Mesh`. Thi
### New field on `HTTPRoute` for `Service` binding
A new field `serviceBinding` would be added to `HTTPRoute` to attach to the `Service`. Alternatively, this could be a new field in [`HTTPRouteMatch`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteMatch). As with the proposed implementation, this approach could be combined with a `Mesh` resource or similar as the `parentRef`, which would just define that the route would be applied to a mesh.
A new field `serviceBinding` would be added to `HTTPRoute` to attach to the `Service`. Alternatively, this could be a new field in [`HTTPRouteMatch`](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteMatch). As with the proposed implementation, this approach could be combined with a `Mesh` resource or similar as the `parentRef`, which would just define that the route would be applied to a mesh.
```
spec:
Expand Down
10 changes: 5 additions & 5 deletions geps/gep-1897/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -291,7 +291,7 @@ type BackendTLSPolicyConfig struct {
// multiple certificates to a backend, but this behavior is
// implementation-specific. Also implementation-specific is
// a CertRef of other object kinds, e.g. Secret.
//
//
// Support: Core - An optional single reference to a Kubernetes
// ConfigMap.
//
Expand All @@ -306,7 +306,7 @@ type BackendTLSPolicyConfig struct {
// StandardCerts specifies whether system CA certificates may
// be used in the TLS handshake between the gateway and
// backend pod.
//
//
// If StandardCerts is unspecified or set to "", then CertRefs must
// be specified with at least one entry for a valid configuration.
// If StandardCerts is unspecified or set to "", then CertRefs must
Expand Down Expand Up @@ -409,8 +409,8 @@ const (
// accepted as valid.
// Possible reason for this condition to be True is:
//
// * “Accepted”
//
// * “Accepted”
//
// Possible reasons for this condition to be False are:
//
// * “Invalid”
Expand Down Expand Up @@ -600,7 +600,7 @@ the implementation would be required to fully implement the policy or mark the b

[Policy Attachment](https://gateway-api.sigs.k8s.io/reference/policy-attachment/#direct-policy-attachment)

[Gateway API TLS](https://gateway-api.sigs.k8s.io/v1alpha2/guides/tls/)
[Gateway API TLS](https://gateway-api.sigs.k8s.io/guides/tls/)

[SIG-NET Gateway API: TLS to the K8s.Service/Backend](https://docs.google.com/document/d/1RTYh2brg_vLX9o3pTcrWxtZSsf8Y5NQvIG52lpFcZlo)

Expand Down
1 change: 0 additions & 1 deletion site-src/v1alpha2/api-types

This file was deleted.

1 change: 0 additions & 1 deletion site-src/v1alpha2/contributing

This file was deleted.

1 change: 0 additions & 1 deletion site-src/v1alpha2/guides

This file was deleted.

1 change: 0 additions & 1 deletion site-src/v1alpha2/reference

This file was deleted.

0 comments on commit 32287dc

Please sign in to comment.