Table of Contents
NOTE: ImagePullOptions are currently unsupported.
|pullSecret||string||If a username/password is required, specify the name of a secret with keys: * username:
The secret must live in the Enterprises Agent namespace.
|insecureSkipVerify||bool||If true skip verifying the image server's TLS certificate.|
|plainHttp||bool||If true use HTTP instead of HTTPS.|
Specify options for fetching WASM Filters from an HTTP URI.
|uri||string||The HTTP URI from which to fetch the filter.|
|sha||string||Required. The Sha256 Checksum of the filter binary (will be verified by the proxy).|
Deploys one or more WASM Envoy Filters to selected Sidecars and Gateways in a Mesh.
|workloadSelector||common.mesh.gloo.solo.io.WorkloadSelector||repeated||Sidecars/Gateways whose Workloads match these selectors will attach the specified WASM Filters. Leave empty to have all workloads in the mesh apply receive the WASM Filter.|
|filters||networking.enterprise.mesh.gloo.solo.io.WasmFilterSpec||repeated||Specify WASM filter parameters.|
|weight||uint32||Weight is used to determine the order of WASM Filters when applying multiple WasmDeployments to a single workload. Deployed WASM filters will be sorted in order of highest to lowest weight. WasmDeployments with equal weights will be sorted non-deterministically. Note that all WASM Filters are currently inserted just before the Envoy router filter in the HTTP Connection Manager's HTTP Filter Chain.|
|observedGeneration||int64||The most recent generation observed in the the WasmDeployment metadata. if the observedGeneration does not match
|error||string||Any errors encountered while processing this generation of the resource. This can include failures to pull a WASM image as well as missing or invalid fields in the spec.|
|workloadStates||networking.enterprise.mesh.gloo.solo.io.WasmDeploymentStatus.WorkloadStatesEntry||repeated||The state of the WasmDeployment as it has been applied to each individual Workload.|
Specify the WASM Filter to deploy.
|wasmImageSource||networking.enterprise.mesh.gloo.solo.io.WasmImageSource||fetch the image from a WASM OCI Registry Images can be built and pushed to registries using
|staticFilterConfig||google.protobuf.Any||Provide configuration as a static
|dynamicFilterConfig||string||Provide configuration from a dynamic configuration source. This is used to connect proxies to a user-provided configuration server rather than using the WasmDeployment CR to update filter configuration. NOTE: Not currently implemented. This field serves as a placeholder. passing it to the plugin.
|vmId||string||An ID which will be used along with a hash of the wasm code (or the name of the registered Null VM plugin) to determine which VM will be used to load the WASM filter. All filters on the same proxy which use the same
|filterContext||istio.networking.v1alpha3.EnvoyFilter.PatchContext||The specific config generation context to which to attach the filter. Istio generates envoy configuration in the context of a gateway, inbound traffic to sidecar and outbound traffic from sidecar. Uses the Istio default (
|insertBeforeFilter||string||The filter in the Envoy HTTP Filter Chain immediately before which the WASM filter will be inserted. Defaults to
Specify options for fetching WASM Filters from a WASM-compatible OCI Registry. Images can be built and pushed to registries using
|wasmImageTag||string||The full tag of the wasm image. It must include the registry address at the beginning, e.g. “webassemblyhub.io/ilackarms/helloworld:v0.1”.|
WorkloadState is the state of the WasmDeployment resource as it has been applied to an individual Workload.
|DEPLOYMENT_PENDING||0||Indicates that filters have not yet been deployed to the target Workload.|
|FILTERS_DEPLOYED||1||Indicates the WASM Filters have been deployed to the target Workload (along with any cluster dependencies).|
|DEPLOYMENT_FAILED||2||Indicates deploying the WASM Filters to this Workload failed.|