@@ -378,7 +378,7 @@ message OutlierDetection {
378
378
// privateKey: /etc/certs/client_private_key.pem
379
379
// caCertificates: /etc/certs/rootcacerts.pem
380
380
//
381
- // The following rule configures a client to use TLS when talking to a foreign service whose domain matches *.foo.com.
381
+ // The following rule configures a client to use TLS when talking to an external service whose domain matches *.foo.com.
382
382
//
383
383
// apiVersion: config.istio.io/v1alpha2
384
384
// kind: DestinationRule
@@ -393,19 +393,29 @@ message OutlierDetection {
393
393
message TLSSettings {
394
394
// TLS connection mode
395
395
enum TLSmode {
396
- // If set to "disable", the proxy will use not setup a TLS connection to the
397
- // upstream server.
398
- DISABLE = 0 ;
399
-
396
+ // Placeholder
397
+ TLSMODE_INVALID = 0 ;
398
+
399
+ // If set to "istio", the proxy will set up mutual TLS authentication
400
+ // using Istio CA issued certificates. This is the default when Istio
401
+ // mTLS authentication is enabled mesh-wide.
402
+ ISTIO = 1 ;
403
+
400
404
// If set to "simple", the proxy will originate a TLS connection to the
401
- // upstream server.
402
- SIMPLE = 1 ;
405
+ // upstream server. This is the default mode for external services with
406
+ // missing port specification.
407
+ SIMPLE = 2 ;
403
408
404
409
// If set to "mutual", the proxy will secure connections to the
405
410
// upstream using mutual TLS by presenting client certificates for
406
- // authentication.
407
- MUTUAL = 2 ;
408
- };
411
+ // authentication. The certificates should be specified using the
412
+ // configuration fields (clientCertificate, privateKey).
413
+ MUTUAL = 3 ;
414
+
415
+ // If set to "disable", the proxy will use not setup a TLS connection
416
+ // to the upstream server.
417
+ DISABLE = 4 ;
418
+ };
409
419
410
420
// REQUIRED: Indicates whether connections to this port should be secured
411
421
// using TLS. The value of this field determines how TLS is enforced.
0 commit comments