Skip to content

Commit 911b3fc

Browse files
author
Shriram Rajagopalan
committed
80-443 default
1 parent 2351810 commit 911b3fc

File tree

4 files changed

+186
-100
lines changed

4 files changed

+186
-100
lines changed

routing/v1alpha2/destination_rule.pb.go

Lines changed: 96 additions & 82 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

routing/v1alpha2/destination_rule.proto

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -378,7 +378,7 @@ message OutlierDetection {
378378
// privateKey: /etc/certs/client_private_key.pem
379379
// caCertificates: /etc/certs/rootcacerts.pem
380380
//
381-
// The following rule configures a client to use TLS when talking to a foreign service whose domain matches *.foo.com.
381+
// The following rule configures a client to use TLS when talking to an external service whose domain matches *.foo.com.
382382
//
383383
// apiVersion: config.istio.io/v1alpha2
384384
// kind: DestinationRule
@@ -393,19 +393,29 @@ message OutlierDetection {
393393
message TLSSettings {
394394
// TLS connection mode
395395
enum TLSmode {
396-
// If set to "disable", the proxy will use not setup a TLS connection to the
397-
// upstream server.
398-
DISABLE = 0;
399-
396+
// Placeholder
397+
TLSMODE_INVALID = 0;
398+
399+
// If set to "istio", the proxy will set up mutual TLS authentication
400+
// using Istio CA issued certificates. This is the default when Istio
401+
// mTLS authentication is enabled mesh-wide.
402+
ISTIO = 1;
403+
400404
// If set to "simple", the proxy will originate a TLS connection to the
401-
// upstream server.
402-
SIMPLE = 1;
405+
// upstream server. This is the default mode for external services with
406+
// missing port specification.
407+
SIMPLE = 2;
403408

404409
// If set to "mutual", the proxy will secure connections to the
405410
// upstream using mutual TLS by presenting client certificates for
406-
// authentication.
407-
MUTUAL = 2;
408-
};
411+
// authentication. The certificates should be specified using the
412+
// configuration fields (clientCertificate, privateKey).
413+
MUTUAL = 3;
414+
415+
// If set to "disable", the proxy will use not setup a TLS connection
416+
// to the upstream server.
417+
DISABLE = 4;
418+
};
409419

410420
// REQUIRED: Indicates whether connections to this port should be secured
411421
// using TLS. The value of this field determines how TLS is enforced.

0 commit comments

Comments
 (0)