You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@camel.apache.org by GitBox <gi...@apache.org> on 2018/11/08 17:40:54 UTC
[GitHub] nicolaferraro opened a new issue #209: Create a Istio trait
nicolaferraro opened a new issue #209: Create a Istio trait
URL: https://github.com/apache/camel-k/issues/209
While developing the Knative integration I've noticed that outgoing connections are not allowed when the pod is embedded into the Istio mesh.
If you want to contact e.g. slack you should add a `EgressRule` like:
```
apiVersion: networking.istio.io/v1alpha3
kind: ServiceEntry
metadata:
name: slack-ext
spec:
hosts:
- hooks.slack.com
ports:
- number: 443
name: https
protocol: HTTPS
resolution: DNS
location: MESH_EXTERNAL
```
It would be great if we can add a `Istio` trait that can add those rules automatically (as child resource of the `Integration`).
Users may be able to run a integration like:
```
kamel run -t istio.egress.slack=https://hooks.slack.com slack.groovy
```
That will end up in the `Integration` resource, in the `istio` trait and then materialized by the operator.
The next big thing would be to add such egress rules automatically from the code... But we don't have such metadata in Camel. Some endpoints, instead, are self describing, such as `.to("http://..")`.
Does anyone know if there's a "wildcard" authorization for Istio egresses or external services should all be declared?
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
users@infra.apache.org
With regards,
Apache Git Services