diff --git a/networking/v1alpha3/destination_rule.pb.go b/networking/v1alpha3/destination_rule.pb.go
index 229e1934c1..9b263002db 100644
--- a/networking/v1alpha3/destination_rule.pb.go
+++ b/networking/v1alpha3/destination_rule.pb.go
@@ -250,7 +250,6 @@ type DestinationRule struct {
// One or more named sets that represent individual versions of a
// service. Traffic policies can be overridden at subset level.
Subsets []*Subset `protobuf:"bytes,3,rep,name=subsets" json:"subsets,omitempty"`
- // $hide_from_docs
// The resolution of a DestinationRule to apply to a service occurs in the
// context of a hierarchy of namespaces. This rule controls whether those
// namespaces are allowed to select this rule.
diff --git a/networking/v1alpha3/destination_rule.proto b/networking/v1alpha3/destination_rule.proto
index ff7b277d2c..1c340f8bbf 100644
--- a/networking/v1alpha3/destination_rule.proto
+++ b/networking/v1alpha3/destination_rule.proto
@@ -118,7 +118,6 @@ message DestinationRule {
// service. Traffic policies can be overridden at subset level.
repeated Subset subsets = 3;
- // $hide_from_docs
// The resolution of a DestinationRule to apply to a service occurs in the
// context of a hierarchy of namespaces. This rule controls whether those
// namespaces are allowed to select this rule.
diff --git a/networking/v1alpha3/istio.networking.v1alpha3.pb.html b/networking/v1alpha3/istio.networking.v1alpha3.pb.html
index 8720593094..c523127b17 100644
--- a/networking/v1alpha3/istio.networking.v1alpha3.pb.html
+++ b/networking/v1alpha3/istio.networking.v1alpha3.pb.html
@@ -669,6 +669,16 @@
DestinationRule
One or more named sets that represent individual versions of a
service. Traffic policies can be overridden at subset level.
+
+
+
+exportTo |
+string[] |
+
+ The resolution of a DestinationRule to apply to a service occurs in the
+context of a hierarchy of namespaces. This rule controls whether those
+namespaces are allowed to select this rule.
+
|
@@ -3230,7 +3240,7 @@ ServiceEntry
The following example demonstrates the use of a dedicated egress gateway
through which all external service traffic is forwarded.
-The ‘export_to’ field allows for control over the visibility of a service
+The ‘exportTo’ field allows for control over the visibility of a service
declaration to other namespaces in the mesh. By default a service is exported
to all namespaces. The following example restricts the visibility to the
current namespace, represented by “.”, so that it cannot be used by other
@@ -3244,8 +3254,8 @@
ServiceEntry
spec:
hosts:
- httpbin.com
- export_to:
- - .
+ exportTo:
+ - "."
location: MESH_EXTERNAL
ports:
- number: 80
@@ -3288,7 +3298,7 @@ ServiceEntry
spec:
hosts:
- httpbin.com
- export_to:
+ exportTo:
- *
gateways:
- mesh
@@ -3494,6 +3504,29 @@ ServiceEntry
One or more endpoints associated with the service.
+ |
+
+
+exportTo |
+string[] |
+
+ A list of namespaces to which this service is exported. Exporting a service
+allows it to used by sidecars, gateways and virtual services defined in
+other namespaces. This feature provides a mechanism for service owners
+and mesh administrators to control the visibility of services across
+namespace boundaries.
+
+If no namespaces are specified then the service is exported to all
+namespaces by default.
+
+The value “.” is reserved and defines an export to the same namespace that
+the service is declared in, similarly the value “*” is reserved and
+defines an export to all namespaces.
+
+For a Kubernetes Service the equivalent effect can be achieved by setting
+the annotation “networking.istio.io/exportTo” to a comma-separated list
+of namespace names.
+
|
@@ -4573,6 +4606,25 @@ VirtualService
be applied to any port that is not a HTTP or TLS port. The first rule
matching an incoming request is used.
+
+
+
+exportTo |
+string[] |
+
+ A list of namespaces to which this virtual service is exported. Exporting a
+virtual service allows it to used by sidecars and gateways defined in
+other namespaces. This feature provides a mechanism for service owners
+and mesh administrators to control the visibility of virtual services
+across namespace boundaries.
+
+If no namespaces are specified then the virtual service is exported to all
+namespaces by default.
+
+The value “.” is reserved and defines an export to the same namespace that
+the virtual service is declared in, similarly the value “*” is reserved and
+defines an export to all namespaces.
+
|
diff --git a/networking/v1alpha3/service_entry.pb.go b/networking/v1alpha3/service_entry.pb.go
index fec6204361..091d09a45a 100644
--- a/networking/v1alpha3/service_entry.pb.go
+++ b/networking/v1alpha3/service_entry.pb.go
@@ -213,7 +213,7 @@ func (ServiceEntry_Resolution) EnumDescriptor() ([]byte, []int) {
//
// The following example demonstrates the use of a dedicated egress gateway
// through which all external service traffic is forwarded.
-// The 'export_to' field allows for control over the visibility of a service
+// The 'exportTo' field allows for control over the visibility of a service
// declaration to other namespaces in the mesh. By default a service is exported
// to all namespaces. The following example restricts the visibility to the
// current namespace, represented by ".", so that it cannot be used by other
@@ -228,8 +228,8 @@ func (ServiceEntry_Resolution) EnumDescriptor() ([]byte, []int) {
// spec:
// hosts:
// - httpbin.com
-// export_to:
-// - .
+// exportTo:
+// - "."
// location: MESH_EXTERNAL
// ports:
// - number: 80
@@ -274,7 +274,7 @@ func (ServiceEntry_Resolution) EnumDescriptor() ([]byte, []int) {
// spec:
// hosts:
// - httpbin.com
-// export_to:
+// exportTo:
// - *
// gateways:
// - mesh
@@ -442,7 +442,6 @@ type ServiceEntry struct {
Resolution ServiceEntry_Resolution `protobuf:"varint,5,opt,name=resolution,proto3,enum=istio.networking.v1alpha3.ServiceEntry_Resolution" json:"resolution,omitempty"`
// One or more endpoints associated with the service.
Endpoints []*ServiceEntry_Endpoint `protobuf:"bytes,6,rep,name=endpoints" json:"endpoints,omitempty"`
- // $hide_from_docs
// A list of namespaces to which this service is exported. Exporting a service
// allows it to used by sidecars, gateways and virtual services defined in
// other namespaces. This feature provides a mechanism for service owners
@@ -457,7 +456,7 @@ type ServiceEntry struct {
// defines an export to all namespaces.
//
// For a Kubernetes Service the equivalent effect can be achieved by setting
- // the annotation "networking.istio.io/export_to" to a comma-separated list
+ // the annotation "networking.istio.io/exportTo" to a comma-separated list
// of namespace names.
ExportTo []string `protobuf:"bytes,7,rep,name=export_to,json=exportTo" json:"export_to,omitempty"`
// The list of subject alternate names allowed for workloads that
diff --git a/networking/v1alpha3/service_entry.proto b/networking/v1alpha3/service_entry.proto
index 94d4e92a42..1527586f47 100644
--- a/networking/v1alpha3/service_entry.proto
+++ b/networking/v1alpha3/service_entry.proto
@@ -134,7 +134,7 @@ option go_package = "istio.io/api/networking/v1alpha3";
//
// The following example demonstrates the use of a dedicated egress gateway
// through which all external service traffic is forwarded.
-// The 'export_to' field allows for control over the visibility of a service
+// The 'exportTo' field allows for control over the visibility of a service
// declaration to other namespaces in the mesh. By default a service is exported
// to all namespaces. The following example restricts the visibility to the
// current namespace, represented by ".", so that it cannot be used by other
@@ -149,8 +149,8 @@ option go_package = "istio.io/api/networking/v1alpha3";
// spec:
// hosts:
// - httpbin.com
-// export_to:
-// - .
+// exportTo:
+// - "."
// location: MESH_EXTERNAL
// ports:
// - number: 80
@@ -195,7 +195,7 @@ option go_package = "istio.io/api/networking/v1alpha3";
// spec:
// hosts:
// - httpbin.com
-// export_to:
+// exportTo:
// - *
// gateways:
// - mesh
@@ -470,7 +470,6 @@ message ServiceEntry {
// One or more endpoints associated with the service.
repeated Endpoint endpoints = 6;
- // $hide_from_docs
// A list of namespaces to which this service is exported. Exporting a service
// allows it to used by sidecars, gateways and virtual services defined in
// other namespaces. This feature provides a mechanism for service owners
@@ -485,7 +484,7 @@ message ServiceEntry {
// defines an export to all namespaces.
//
// For a Kubernetes Service the equivalent effect can be achieved by setting
- // the annotation "networking.istio.io/export_to" to a comma-separated list
+ // the annotation "networking.istio.io/exportTo" to a comma-separated list
// of namespace names.
repeated string export_to = 7;
diff --git a/networking/v1alpha3/virtual_service.pb.go b/networking/v1alpha3/virtual_service.pb.go
index 46799d78cf..1d854732ba 100644
--- a/networking/v1alpha3/virtual_service.pb.go
+++ b/networking/v1alpha3/virtual_service.pb.go
@@ -134,7 +134,6 @@ type VirtualService struct {
// be applied to any port that is not a HTTP or TLS port. The first rule
// matching an incoming request is used.
Tcp []*TCPRoute `protobuf:"bytes,4,rep,name=tcp" json:"tcp,omitempty"`
- // $hide_from_docs
// A list of namespaces to which this virtual service is exported. Exporting a
// virtual service allows it to used by sidecars and gateways defined in
// other namespaces. This feature provides a mechanism for service owners
diff --git a/networking/v1alpha3/virtual_service.proto b/networking/v1alpha3/virtual_service.proto
index 925cd58bcd..d654c46cf3 100644
--- a/networking/v1alpha3/virtual_service.proto
+++ b/networking/v1alpha3/virtual_service.proto
@@ -176,7 +176,6 @@ message VirtualService {
// matching an incoming request is used.
repeated TCPRoute tcp = 4;
- // $hide_from_docs
// A list of namespaces to which this virtual service is exported. Exporting a
// virtual service allows it to used by sidecars and gateways defined in
// other namespaces. This feature provides a mechanism for service owners