Skip to content

Commit d58b01c

Browse files
soloio-botsoloio-bot
and
soloio-bot
authored
Sync APIs. @tag-name=gloo-v1.17.11 (#1321)
Co-authored-by: soloio-bot <[email protected]>
1 parent 6bb58ff commit d58b01c

File tree

14 files changed

+88
-88
lines changed

14 files changed

+88
-88
lines changed

api/gloo/enterprise.gloo/v1/auth_config.proto

+30-30
Large diffs are not rendered by default.

api/gloo/gloo/external/envoy/config/core/v3/address.proto

+2-2
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ message SocketAddress {
7373
string resolver_name = 5;
7474

7575
// When binding to an IPv6 address above, this enables `IPv4 compatibility
76-
// <https://tools.ietf.org/html/rfc3493#page-11>`_. Binding to ``::`` will
76+
// <https://datatracker.ietf.org/doc/html/rfc3493#page-11>`_. Binding to ``::`` will
7777
// allow both IPv4 and IPv6 connections, with peer IPv4 addresses mapped into
7878
// IPv6 space as ``::FFFF:<IPv4-address>``.
7979
bool ipv4_compat = 6;
@@ -133,7 +133,7 @@ message Address {
133133
}
134134

135135
// CidrRange specifies an IP Address and a prefix length to construct
136-
// the subnet mask for a `CIDR <https://tools.ietf.org/html/rfc4632>`_ range.
136+
// the subnet mask for a `CIDR <https://datatracker.ietf.org/doc/html/rfc4632>`_ range.
137137
message CidrRange {
138138
option (solo.io.udpa.annotations.versioning).previous_message_type = "solo.io.envoy.api.v2.core.CidrRange";
139139

api/gloo/gloo/external/envoy/config/core/v3/grpc_service.proto

+2-2
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ message GrpcService {
137137

138138
// Security token service configuration that allows Google gRPC to
139139
// fetch security token from an OAuth 2.0 authorization server.
140-
// See https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-16 and
140+
// See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-token-exchange-16 and
141141
// https://github.com/grpc/grpc/pull/19587.
142142
// [#next-free-field: 10]
143143
message StsService {
@@ -209,7 +209,7 @@ message GrpcService {
209209
MetadataCredentialsFromPlugin from_plugin = 6;
210210

211211
// Custom security token service which implements OAuth 2.0 token exchange.
212-
// https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-16
212+
// https://datatracker.ietf.org/doc/html/draft-ietf-oauth-token-exchange-16
213213
// See https://github.com/grpc/grpc/pull/19587.
214214
StsService sts_service = 7;
215215
}

api/gloo/gloo/external/envoy/extensions/filters/http/jwt_authn/v3/config.proto

+7-7
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ option (udpa.annotations.file_status).package_version_status = ACTIVE;
2626

2727
// Please see following for JWT authentication flow:
2828
//
29-
// * `JSON Web Token (JWT) <https://tools.ietf.org/html/rfc7519>`_
30-
// * `The OAuth 2.0 Authorization Framework <https://tools.ietf.org/html/rfc6749>`_
29+
// * `JSON Web Token (JWT) <https://datatracker.ietf.org/doc/html/rfc7519>`_
30+
// * `The OAuth 2.0 Authorization Framework <https://datatracker.ietf.org/doc/html/rfc6749>`_
3131
// * `OpenID Connect <http://openid.net/connect>`_
3232
//
3333
// A JwtProvider message specifies how a JSON Web Token (JWT) can be verified. It specifies:
@@ -59,7 +59,7 @@ message JwtProvider {
5959
option (udpa.annotations.versioning).previous_message_type =
6060
"envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider";
6161

62-
// Specify the `principal <https://tools.ietf.org/html/rfc7519#section-4.1.1>`_ that issued
62+
// Specify the `principal <https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.1>`_ that issued
6363
// the JWT, usually a URL or an email address.
6464
//
6565
// It is optional. If specified, it has to match the *iss* field in JWT.
@@ -81,7 +81,7 @@ message JwtProvider {
8181
//
8282
string issuer = 1;
8383

84-
// The list of JWT `audiences <https://tools.ietf.org/html/rfc7519#section-4.1.3>`_ are
84+
// The list of JWT `audiences <https://datatracker.ietf.org/doc/html/rfc7519#section-4.1.3>`_ are
8585
// allowed to access. A JWT containing any of these audiences will be accepted. If not specified,
8686
// will not check audiences in the token.
8787
//
@@ -95,7 +95,7 @@ message JwtProvider {
9595
//
9696
repeated string audiences = 2;
9797

98-
// `JSON Web Key Set (JWKS) <https://tools.ietf.org/html/rfc7517#appendix-A>`_ is needed to
98+
// `JSON Web Key Set (JWKS) <https://datatracker.ietf.org/doc/html/rfc7517#appendix-A>`_ is needed to
9999
// validate signature of a JWT. This field specifies where to fetch JWKS.
100100
oneof jwks_source_specifier {
101101
option (validate.required) = true;
@@ -146,11 +146,11 @@ message JwtProvider {
146146
// If no explicit location is specified, the following default locations are tried in order:
147147
//
148148
// 1. The Authorization header using the `Bearer schema
149-
// <https://tools.ietf.org/html/rfc6750#section-2.1>`_. Example::
149+
// <https://datatracker.ietf.org/doc/html/rfc6750#section-2.1>`_. Example::
150150
//
151151
// Authorization: Bearer <token>.
152152
//
153-
// 2. `access_token <https://tools.ietf.org/html/rfc6750#section-2.3>`_ query parameter.
153+
// 2. `access_token <https://datatracker.ietf.org/doc/html/rfc6750#section-2.3>`_ query parameter.
154154
//
155155
// Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations
156156
// its provider specified or from the default locations.

api/gloo/gloo/external/xds/core/v3/cidr.proto

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ option go_package = "github.com/cncf/xds/go/xds/core/v3";
1515
option (xds.annotations.v3.file_status).work_in_progress = true;
1616

1717
// CidrRange specifies an IP Address and a prefix length to construct
18-
// the subnet mask for a `CIDR <https://tools.ietf.org/html/rfc4632>`_ range.
18+
// the subnet mask for a `CIDR <https://datatracker.ietf.org/doc/html/rfc4632>`_ range.
1919
message CidrRange {
2020
// IPv4 or IPv6 address, e.g. ``192.0.0.0`` or ``2001:db8::``.
2121
string address_prefix = 1 [(validate.rules).string = {min_len: 1}];

api/gloo/gloo/external/xds/core/v3/resource_locator.proto

+1-1
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ message ResourceLocator {
8585
// require percent encoding in a directive value are [',', '#', '[', ']',
8686
// '%']. These are the RFC3986 fragment reserved characters with the addition
8787
// of the xDS scheme specific ','. See
88-
// https://tools.ietf.org/html/rfc3986#page-49 for further details on URI ABNF
88+
// https://datatracker.ietf.org/doc/html/rfc3986#page-49 for further details on URI ABNF
8989
// and reserved characters.
9090
message Directive {
9191
oneof directive {

api/gloo/gloo/v1/options/protocol/protocol.proto

+1-1
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ message Http2ProtocolOptions {
126126
// This overrides any HCM :ref:`stream_error_on_invalid_http_messaging
127127
// <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>`
128128
//
129-
// See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
129+
// See `RFC7540, sec. 8.1 <https://datatracker.ietf.org/doc/html/rfc7540#section-8.1>`_ for details.
130130
google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
131131
}
132132

api/gloo/gloo/v1/upstream.proto

+1-1
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ message UpstreamSpec {
126126
// This overrides any HCM :ref:`stream_error_on_invalid_http_messaging
127127
// <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>`
128128
//
129-
// See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
129+
// See `RFC7540, sec. 8.1 <https://datatracker.ietf.org/doc/html/rfc7540#section-8.1>`_ for details.
130130
google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 26;
131131

132132
// Tells envoy that the upstream is an HTTP proxy (e.g., another proxy in a DMZ) that supports HTTP Connect.

0 commit comments

Comments
 (0)