-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provider agnostic gateway name/namespace #771
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## envoygateway #771 +/- ##
===============================================
Coverage ? 81.96%
===============================================
Files ? 86
Lines ? 6638
Branches ? 0
===============================================
Hits ? 5441
Misses ? 812
Partials ? 385
Flags with carried forward coverage won't be shown. Click here to find out more.
|
56f1624
to
76cda8d
Compare
What about sticking to the gateway providers specific namespace names, i.e. |
5e412d6
to
888f81d
Compare
@adam-cattermole we keeping this PR? |
@maleck13 Yep, it's just a little out of date as it's based on the envoy gateway authpolicy branch which is yet to be merged |
91d8c0a
to
4620878
Compare
7819f2f
to
a031a61
Compare
442001f
to
db0ede4
Compare
Signed-off-by: Adam Cattermole <[email protected]>
Signed-off-by: Adam Cattermole <[email protected]>
Signed-off-by: Adam Cattermole <[email protected]>
a031a61
to
c5a415c
Compare
Signed-off-by: Adam Cattermole <[email protected]>
c5a415c
to
2b2578f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sweet 🍻
* Provider agnostic gateway name/namespace Signed-off-by: Adam Cattermole <[email protected]> * Update docs gateway name/namespace Signed-off-by: Adam Cattermole <[email protected]> * Use istio/envoy-gateway for provider namespace Signed-off-by: Adam Cattermole <[email protected]> * Use EG_NAMESPACE when patching Signed-off-by: Adam Cattermole <[email protected]> --------- Signed-off-by: Adam Cattermole <[email protected]>
* envoygateway dev environment install (#678) * envoygateway dev environment install * egctl on detected os and arch * Makefile: pulling out os and arch Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * development environment: envoygateway v1.1.0 (#778) Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * Runtime istio updated to 1.20.8 (ossm 2.6) and Istio go dep to 1.22.3 (#785) * deployed istio updated to 1.20.8 (ossm 2.6) Golang istio.io/istio deps upgraded to 1.22.3 It is required because golang envoygateway 1.1 dep conflicts on github.com/envoyproxy/go-control-plane/envoy/extensions/injected_credentials/generic/v3 package istio.io/istio 1.20.0 requires a package from github.com/envoyproxy/go-control-plane in 0.12.0 that does not exist when github.com/envoyproxy/go-control-plane is upgraded to 0.12.1 due to envoygateway 1.1 Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * updated manifests --------- Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * Envoy Gateway AuthPolicy (#737) * Enable envoygateway integration tests Signed-off-by: Adam Cattermole <[email protected]> * Add egapiv1 to scheme Signed-off-by: Adam Cattermole <[email protected]> * Fix lint issues Signed-off-by: Adam Cattermole <[email protected]> * Add envoy SecurityPolicy controller Signed-off-by: Adam Cattermole <[email protected]> * Add envoy ReferenceGrant controller Signed-off-by: Adam Cattermole <[email protected]> * Update manifests and bundle Signed-off-by: Adam Cattermole <[email protected]> * Update envoy gatewayclass to match GATEWAYAPI_PROVIDER name Signed-off-by: Adam Cattermole <[email protected]> * Set gateway class in tests from provider Signed-off-by: Adam Cattermole <[email protected]> * Enable new controllers in integration tests Signed-off-by: Adam Cattermole <[email protected]> * Add policy target object tracking to topology index Signed-off-by: Adam Cattermole <[email protected]> * Add istio AuthorizationPolicy controller Signed-off-by: Adam Cattermole <[email protected]> * Prepare for envoygateway integration tests Signed-off-by: Adam Cattermole <[email protected]> * Generify for integration tests Signed-off-by: Adam Cattermole <[email protected]> * Add envoygateway auth integration tests Signed-off-by: Adam Cattermole <[email protected]> * Do not set GATEWAYAPI_PROVIDER for tests that do not use it Signed-off-by: Adam Cattermole <[email protected]> * Set owner references in new controllers Signed-off-by: Adam Cattermole <[email protected]> * Enable security policy deletion tests Signed-off-by: Adam Cattermole <[email protected]> * Shorten github workflow integration test names Signed-off-by: Adam Cattermole <[email protected]> * Refactor SecurityPolicy controller For Kuadrants Signed-off-by: Adam Cattermole <[email protected]> * Update deletion logic Signed-off-by: Adam Cattermole <[email protected]> * Use new PolicyType Signed-off-by: Adam Cattermole <[email protected]> * test: Explicitly set parentRef gateway namespace Signed-off-by: Adam Cattermole <[email protected]> --------- Signed-off-by: Adam Cattermole <[email protected]> * envoygateway kuadrant status controller check added (#847) Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * Envoygateway wasm controller (#848) * envoygateway controllers to setup wasm module Limitador cluster controller based on EnvoyPatchPolicy Wasm controller based on EnvoyExtensionPolicy Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * envoygateway: enable envoypatchpolicy Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * envoygateway: wasm module tests Signed-off-by: Eguzki Astiz Lezaun <[email protected]> --------- Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * fix lint issues Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * bundle/manifests/kuadrant-operator.clusterserviceversion.yaml: autogeneration update Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * go.[mod|sum] updated Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * envoygateway: doc Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * Provider agnostic gateway name/namespace (#771) * Provider agnostic gateway name/namespace Signed-off-by: Adam Cattermole <[email protected]> * Update docs gateway name/namespace Signed-off-by: Adam Cattermole <[email protected]> * Use istio/envoy-gateway for provider namespace Signed-off-by: Adam Cattermole <[email protected]> * Use EG_NAMESPACE when patching Signed-off-by: Adam Cattermole <[email protected]> --------- Signed-off-by: Adam Cattermole <[email protected]> * Update doc/install/install-kubernetes.md Co-authored-by: Adam Cattermole <[email protected]> Signed-off-by: Eguzki Astiz Lezaun <[email protected]> * Update doc/install/install-kubernetes.md Co-authored-by: Adam Cattermole <[email protected]> Signed-off-by: Eguzki Astiz Lezaun <[email protected]> --------- Signed-off-by: Eguzki Astiz Lezaun <[email protected]> Signed-off-by: Adam Cattermole <[email protected]> Co-authored-by: Adam Cattermole <[email protected]>
Changes
Builds on top of the authpolicy branch which should be merged firstkuadrant-ingressgateway
for both istio and envoygatewayistio-system
/envoy-gateway-system
to begateway-system
for both providersOpen to suggestions for the naming above, happy to change.
These changes makes it so that a user can follow the user-guides directly without amendment regardless of which gateway api provider they provision with (
make local-setup GATEWAYAPI_PROVIDER=istio
/make local-setup GATEWAYAPI_PROVIDER=envoygateway
)