Skip to content

Document exportTo restrictions#816

Closed
frankbu wants to merge 30 commits intorelease-1.1from
export_to
Closed

Document exportTo restrictions#816
frankbu wants to merge 30 commits intorelease-1.1from
export_to

Conversation

@frankbu
Copy link
Contributor

@frankbu frankbu commented Feb 25, 2019

No description provided.

rshriram and others added 27 commits November 14, 2018 08:06
* Adding weights to service entry endpoints (#704)

* add dynamic state to attribute list

Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>

* Adding weights to service entry endpoints

Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>

* undo

* update protolock

Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>
To use --distdir option of Bazel (which allows to use previously
fetched tarballs instead of downloading dependencies during
build), all dependencies should use http instead of git and need
to have sha256 sums specified.

Signed-off-by: Michal Rostecki <mrostecki@suse.de>
 Merge release-1.1 into master
 Merge release-1.1 into master
Merge release-1.1 into master
* assorted doc updates (#757)

Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>

* add optional incremental flag to ResponseSink and ResourceSource services (#762)

* Add option to select worload using lables for authn policy. (#755)

* Add option to select workload using labels for authn policy

* Make proto-commit
Signed-off-by: Kuat Yessenov <kuat@google.com>
Merge release-1.1 into master. (Final batch)
Signed-off-by: Caleb Gilmour <caleb.gilmour@datadoghq.com>
Signed-off-by: Caleb Gilmour <caleb.gilmour@datadoghq.com>
@googlebot googlebot added the cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. label Feb 25, 2019
@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: frankbu

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

// the destination rule is declared in. Similarly, the value "*" is reserved and
// defines an export to all namespaces.
//
// NOTE: in the current release, the `exportTo` value is restricted to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// NOTE: in the current release, the `exportTo` value is restricted to
// NOTE: in the current release, the `export_to` value is restricted to

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need to use the camelCase in comments so they look right in the generated doc.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ack

// the annotation "networking.istio.io/exportTo" to a comma-separated list
// of namespace names.
//
// NOTE: in the current release, the `exportTo` value is restricted to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// NOTE: in the current release, the `exportTo` value is restricted to
// NOTE: in the current release, the `export_to` value is restricted to

// the virtual service is declared in. Similarly, the value "*" is reserved and
// defines an export to all namespaces.
//
// NOTE: in the current release, the `exportTo` value is restricted to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
// NOTE: in the current release, the `exportTo` value is restricted to
// NOTE: in the current release, the `export_to` value is restricted to

@googlebot
Copy link
Collaborator

So there's good news and bad news.

👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there.

😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request.

Note to project maintainer: This is a terminal state, meaning the cla/google commit status will not change from this state. It's up to you to confirm consent of all the commit author(s), set the cla label to yes (if enabled on your project), and then merge this pull request when appropriate.

ℹ️ Googlers: Go here for more info.

@googlebot googlebot added cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. and removed cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. labels Feb 26, 2019
@istio-testing
Copy link
Collaborator

@frankbu: The following test failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/api-presubmit.sh 2bfb918 link /test api-presubmit
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@frankbu
Copy link
Contributor Author

frankbu commented Feb 26, 2019

Merged the wrong branch. Closing this one and opening new PR.

@frankbu frankbu closed this Feb 26, 2019
@frankbu frankbu deleted the export_to branch February 26, 2019 15:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA.

Projects

None yet

Development

Successfully merging this pull request may close these issues.