Call out the incompatibility of wildcards and L7 permissions
This commit is contained in:
parent
f2f5aba1bf
commit
73d1d55ddd
|
@ -281,7 +281,7 @@ spec:
|
||||||
{
|
{
|
||||||
name: 'Name',
|
name: 'Name',
|
||||||
description:
|
description:
|
||||||
"The name of the destination service for all intentions defined in this config entry. This may be set to the wildcard character (`*`) to match all services that don't otherwise have intentions defined.",
|
"The name of the destination service for all intentions defined in this config entry. This may be set to the wildcard character (`*`) to match all services that don't otherwise have intentions defined. Using a wildcard is incompatible with specifying L7 [`Permissions`](https://www.consul.io/docs/connect/config-entries/service-intentions#permissions) since those can only be enforced for services with the right protocol.",
|
||||||
type: 'string: <required>',
|
type: 'string: <required>',
|
||||||
yaml: false,
|
yaml: false,
|
||||||
},
|
},
|
||||||
|
@ -290,7 +290,7 @@ spec:
|
||||||
type: `string: "default"`,
|
type: `string: "default"`,
|
||||||
enterprise: true,
|
enterprise: true,
|
||||||
description:
|
description:
|
||||||
"Specifies the namespaces the config entry will apply to. This may be set to the wildcard character (`*`) to match all services in all namespaces that don't otherwise have intentions defined.",
|
"Specifies the namespaces the config entry will apply to. This may be set to the wildcard character (`*`) to match all services in all namespaces that don't otherwise have intentions defined. Using a wildcard is incompatible with specifying L7 [`Permissions`](https://www.consul.io/docs/connect/config-entries/service-intentions#permissions) since those can only be enforced for services with the right protocol.",
|
||||||
yaml: false,
|
yaml: false,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -324,7 +324,7 @@ spec:
|
||||||
hcl: false,
|
hcl: false,
|
||||||
type: 'string: <required>',
|
type: 'string: <required>',
|
||||||
description:
|
description:
|
||||||
"The name of the destination service for all intentions defined in this config entry. This may be set to the wildcard character (`*`) to match all services that don't otherwise have intentions defined.",
|
"The name of the destination service for all intentions defined in this config entry. This may be set to the wildcard character (`*`) to match all services that don't otherwise have intentions defined. Using a wildcard is incompatible with specifying L7 [`permissions`](https://www.consul.io/docs/connect/config-entries/service-intentions#permissions) since those can only be enforced for services with the right protocol.",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: 'namespace',
|
name: 'namespace',
|
||||||
|
@ -332,7 +332,7 @@ spec:
|
||||||
enterprise: true,
|
enterprise: true,
|
||||||
type: 'string: <optional>',
|
type: 'string: <optional>',
|
||||||
description:
|
description:
|
||||||
"Specifies the namespaces the config entry will apply to. This may be set to the wildcard character (`*`) to match all services in all namespaces that don't otherwise have intentions defined. If not set, the namespace used will depend on the `connectInject.consulNamespaces` configuration. See [ServiceIntentions Special Case (Enterprise)](/docs/k8s/crds#serviceintentions-special-case-enterprise) for more details.",
|
"Specifies the namespaces the config entry will apply to. This may be set to the wildcard character (`*`) to match all services in all namespaces that don't otherwise have intentions defined. If not set, the namespace used will depend on the `connectInject.consulNamespaces` configuration. See [ServiceIntentions Special Case (Enterprise)](/docs/k8s/crds#serviceintentions-special-case-enterprise) for more details. Using a wildcard is incompatible with specifying L7 [`permissions`](https://www.consul.io/docs/connect/config-entries/service-intentions#permissions) since those can only be enforced for services with the right protocol.",
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
|
@ -396,7 +396,9 @@ spec:
|
||||||
provided permissions in this intention will be subject to the default
|
provided permissions in this intention will be subject to the default
|
||||||
intention behavior is defined by the default [ACL policy](/docs/agent/options#acl_default_policy).<br><br>
|
intention behavior is defined by the default [ACL policy](/docs/agent/options#acl_default_policy).<br><br>
|
||||||
This should be omitted for an L4 intention as it is mutually exclusive with
|
This should be omitted for an L4 intention as it is mutually exclusive with
|
||||||
the \`Action\` field.`,
|
the \`Action\` field.<br><br>
|
||||||
|
Setting \`Permissions\` is not valid if a wildcard is used for the \`Name\` or \`Namespace\` since they can only be
|
||||||
|
applied to services with a compatible protocol.`,
|
||||||
yaml: `The list of all [additional L7 attributes](#intentionpermission) that extend the intention match criteria.<br><br>
|
yaml: `The list of all [additional L7 attributes](#intentionpermission) that extend the intention match criteria.<br><br>
|
||||||
Permission precedence is applied top to bottom. For any given request the
|
Permission precedence is applied top to bottom. For any given request the
|
||||||
first permission to match in the list is terminal and stops further
|
first permission to match in the list is terminal and stops further
|
||||||
|
@ -404,7 +406,9 @@ spec:
|
||||||
provided permissions in this intention will be subject to the default
|
provided permissions in this intention will be subject to the default
|
||||||
intention behavior is defined by the default [ACL policy](/docs/agent/options#acl_default_policy).<br><br>
|
intention behavior is defined by the default [ACL policy](/docs/agent/options#acl_default_policy).<br><br>
|
||||||
This should be omitted for an L4 intention as it is mutually exclusive with
|
This should be omitted for an L4 intention as it is mutually exclusive with
|
||||||
the \`action\` field.`,
|
the \`action\` field.<br><br>
|
||||||
|
Setting \`permissions\` is not valid if a wildcard is used for the \`spec.destination.name\` or \`spec.destination.namespace\`
|
||||||
|
since they can only be applied to services with a compatible protocol.`,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
Loading…
Reference in New Issue