Skip to content

Commit 1bd3124

Browse files
authored
Merge pull request #2776 from frankbu/doc-links
Fix broken doc links
2 parents c22c31d + 072cf3a commit 1bd3124

File tree

11 files changed

+33
-33
lines changed

11 files changed

+33
-33
lines changed

geps/gep-1426/index.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ A controller could create a matching selector-less `Service` (i.e. no endpoints)
240240

241241
Ownership/trust would remain based on naming pattern: `serviceName.namespace.svc.[USER_DOMAIN]`
242242

243-
Separate `HttpService`, `TlsService` and `TcpService` resources could have the benefit of allowing us to define protocol specific elements to the spec along with an embedded `CommonServiceSpec`, similar to [`CommonRouteSpec`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1beta1.CommonRouteSpec), and keep similar patterns as `Service`.
243+
Separate `HttpService`, `TlsService` and `TcpService` resources could have the benefit of allowing us to define protocol specific elements to the spec along with an embedded `CommonServiceSpec`, similar to [`CommonRouteSpec`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.CommonRouteSpec), and keep similar patterns as `Service`.
244244

245245
##### Drawbacks
246246

@@ -298,7 +298,7 @@ spec:
298298
name: cool-mesh
299299
```
300300

301-
It is currently undefined how this approach may interact with either explicitly configured [`hostnames`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteSpec) or implicit "transparent proxy" routing for Kubernetes `Services` to determine how traffic should be intercepted and redirected.
301+
It is currently undefined how this approach may interact with either explicitly configured [`hostnames`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteSpec) or implicit "transparent proxy" routing for Kubernetes `Services` to determine how traffic should be intercepted and redirected.
302302

303303
This approach is not entirely abandoned, as it could supplement the proposed approach if explicit attachment to a specific mesh is deemed necessary. Additionally, this approach may offer a future option for attaching an `HTTPRoute` to a mesh, but not a specific service (e.g. to implement mesh-wide egress functionality for all requests to a specific hostname).
304304

@@ -319,7 +319,7 @@ spec:
319319
320320
* Would require separate `HTTPRoute` resources to explicitly define _different_ traffic routing rules for the same service on different meshes.
321321
322-
#### Nested `services` and `hostnames` fields in [`ParentReference`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1beta1.ParentReference)
322+
#### Nested `services` and `hostnames` fields in [`ParentReference`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.ParentReference)
323323
324324
In core conformance, the `services` would only be valid for `Mesh` types, and `hostnames` field only for `Gateway`. Mesh implementations could still use a `Host` header match if they wanted limit rules to specific hostnames.
325325
@@ -359,7 +359,7 @@ This is done by configuring the `parentRef`, to point to the `istio` `Mesh`. Thi
359359
360360
### New field on `HTTPRoute` for `Service` binding
361361
362-
A new field `serviceBinding` would be added to `HTTPRoute` to attach to the `Service`. Alternatively, this could be a new field in [`HTTPRouteMatch`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteMatch). As with the proposed implementation, this approach could be combined with a `Mesh` resource or similar as the `parentRef`, which would just define that the route would be applied to a mesh.
362+
A new field `serviceBinding` would be added to `HTTPRoute` to attach to the `Service`. Alternatively, this could be a new field in [`HTTPRouteMatch`](https://gateway-api.sigs.k8s.io/v1alpha2/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteMatch). As with the proposed implementation, this approach could be combined with a `Mesh` resource or similar as the `parentRef`, which would just define that the route would be applied to a mesh.
363363
364364
```
365365
spec:

site-src/api-types/backendtlspolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,5 +140,5 @@ uses `PolicyAncestorStatus` to allow you to know which parentReference set that
140140
[tls]: /references/spec/#gateway.networking.k8s.io/v1alpha2.BackendTLSPolicy.TLS
141141
[caCertRefs]: /references/spec/#gateway.networking.k8s.io/v1alpha2.BackendTLSPolicyConfig.CACertRefs
142142
[wellKnownCACerts]: /references/spec/#gateway.networking.k8s.io/v1alpha2.BackendTLSPolicyConfig.WellKnownCACerts
143-
[hostname]: /references/spec/#gateway.networking.k8s.io/v1beta1.PreciseHostname
143+
[hostname]: /references/spec/#gateway.networking.k8s.io/v1.PreciseHostname
144144
[targetRef]: /references/spec/#gateway.networking.k8s.io/v1alpha2.PolicyTargetReference

site-src/api-types/gatewayclass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,5 +139,5 @@ example.net/gateway/v2.1 // Use version 2.1
139139
example.net/gateway // Use the default version
140140
```
141141

142-
[gatewayclass]: /reference/spec/#gateway.networking.k8s.io/v1beta1.GatewayClass
142+
[gatewayclass]: /reference/spec/#gateway.networking.k8s.io/v1.GatewayClass
143143
[ingress-class-api]: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class

site-src/api-types/grpcroute.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -260,10 +260,10 @@ resolution applies to merging, refer to the [API specification][grpcrouterule].
260260

261261
[grpcroute]: /reference/spec/#gateway.networking.k8s.io/v1alpha2.GRPCPRoute
262262
[grpcrouterule]: /reference/spec/#gateway.networking.k8s.io/v1alpha2.GRPCRouteRule
263-
[hostname]: /reference/spec/#gateway.networking.k8s.io/v1beta1.Hostname
263+
[hostname]: /reference/spec/#gateway.networking.k8s.io/v1.Hostname
264264
[rfc-3986]: https://tools.ietf.org/html/rfc3986
265265
[matches]: /reference/spec/#gateway.networking.k8s.io/v1alpha2.GRPCRouteMatch
266266
[filters]: /reference/spec/#gateway.networking.k8s.io/v1alpha2.GRPCRouteFilter
267267
[backendRef]: /reference/spec/#gateway.networking.k8s.io/v1alpha2.GRPCBackendRef
268-
[parentRef]: /reference/spec/#gateway.networking.k8s.io/v1beta1.ParentRef
268+
[parentRef]: /reference/spec/#gateway.networking.k8s.io/v1.ParentRef
269269

site-src/api-types/httproute.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -302,13 +302,13 @@ only one Route rule may match each request. For more information on how conflict
302302
resolution applies to merging, refer to the [API specification][httprouterule].
303303

304304

305-
[httproute]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRoute
306-
[httprouterule]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteRule
307-
[hostname]: /reference/spec/#gateway.networking.k8s.io/v1beta1.Hostname
305+
[httproute]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRoute
306+
[httprouterule]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteRule
307+
[hostname]: /reference/spec/#gateway.networking.k8s.io/v1.Hostname
308308
[rfc-3986]: https://tools.ietf.org/html/rfc3986
309-
[matches]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteMatch
310-
[filters]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteFilter
311-
[backendRef]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPBackendRef
312-
[parentRef]: /reference/spec/#gateway.networking.k8s.io/v1beta1.ParentRef
309+
[matches]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteMatch
310+
[filters]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteFilter
311+
[backendRef]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPBackendRef
312+
[parentRef]: /reference/spec/#gateway.networking.k8s.io/v1.ParentRef
313313
[timeouts]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteTimeouts
314314
[appProtocol]: https://kubernetes.io/docs/concepts/services-networking/service/#application-protocol

site-src/guides/grpc-routing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,6 @@ been considered.
8080
{% include 'experimental/v1alpha2/grpc-routing/reflection-grpcroute.yaml' %}
8181
```
8282

83-
[gateway]: /reference/spec/#gateway.networking.k8s.io/v1beta1.Gateway
83+
[gateway]: /reference/spec/#gateway.networking.k8s.io/v1.Gateway
8484
[spec]: /reference/spec/#gateway.networking.k8s.io%2fv1alpha2.GRPCRouteSpec
8585
[svc]:https://kubernetes.io/docs/concepts/services-networking/service/

site-src/guides/http-redirect-rewrite.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ use both filter types at once.
1212

1313
Redirects return HTTP 3XX responses to a client, instructing it to retrieve a
1414
different resource. [`RequestRedirect` rule
15-
filters](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRequestRedirectFilter)
15+
filters](/reference/spec/#gateway.networking.k8s.io/v1.HTTPRequestRedirectFilter)
1616
instruct Gateways to emit a redirect response to requests matching a filtered
1717
HTTPRoute rule.
1818

@@ -87,7 +87,7 @@ https://redirect.example/paprika/teaspoon` response headers.
8787

8888
Rewrites modify components of a client request before proxying it upstream. A
8989
[`URLRewrite`
90-
filter](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPURLRewriteFilter)
90+
filter](/reference/spec/#gateway.networking.k8s.io/v1.HTTPURLRewriteFilter)
9191
can change the upstream request hostname and/or path. For example, the
9292
following HTTPRoute will accept a request for
9393
`https://rewrite.example/cardamom` and send it upstream to `example-svc` with

site-src/guides/http-routing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,6 @@ missing or not `canary` then it'll be forwarded to `bar-svc`.
5757
{% include 'standard/http-routing/bar-httproute.yaml' %}
5858
```
5959

60-
[gateway]: /reference/spec/#gateway.networking.k8s.io/v1beta1.Gateway
61-
[spec]: /reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteSpec
60+
[gateway]: /reference/spec/#gateway.networking.k8s.io/v1.Gateway
61+
[spec]: /reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteSpec
6262
[svc]:https://kubernetes.io/docs/concepts/services-networking/service/

site-src/guides/migrating-from-ingress.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -147,20 +147,20 @@ Gateway API has the following primary extension points:
147147
* *External references.* A feature (field) of a Gateway API resource can
148148
reference a custom resource specific to the Gateway implementation that
149149
configures that feature. For example:
150-
* [HTTPRouteFilter](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteFilter)
150+
* [HTTPRouteFilter](/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteFilter)
151151
can reference an external resource via the `extensionRef` field, thus
152152
configuring an implementation-specific filter.
153-
* [BackendObjectReference](/reference/spec/#gateway.networking.k8s.io/v1beta1.BackendObjectReference)
153+
* [BackendObjectReference](/reference/spec/#gateway.networking.k8s.io/v1.BackendObjectReference)
154154
supports resources other than Services.
155-
* [SecretObjectReference](/reference/spec/#gateway.networking.k8s.io/v1beta1.SecretObjectReference)
155+
* [SecretObjectReference](/reference/spec/#gateway.networking.k8s.io/v1.SecretObjectReference)
156156
supports resources other than Secrets.
157157
* *Custom implementations*. For some features, it is left up to an
158158
implementation to define how to support them. Those features correspond to the
159159
implementation-specific
160160
(custom) [conformance level](/concepts/conformance/#2-support-levels). For
161161
example:
162162
* The `RegularExpression` type of
163-
the [HTTPPathMatch](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPPathMatch).
163+
the [HTTPPathMatch](/reference/spec/#gateway.networking.k8s.io/v1.HTTPPathMatch).
164164
* *Policies.* A Gateway implementation can define custom resources called
165165
Policies for exposing data plane features like authentication. Gateway API
166166
does not prescribe the details of those resources. However, it prescribes a
@@ -194,7 +194,7 @@ resource will get dedicated entry points.
194194
In Gateway API, entry points must be explicitly defined in
195195
a [Gateway](/api-types/gateway/) resource. For example, if you want the data
196196
plane to handle HTTP traffic on port 80, you need to define
197-
a [listener](/reference/spec/#gateway.networking.k8s.io/v1beta1.Listener) for
197+
a [listener](/reference/spec/#gateway.networking.k8s.io/v1.Listener) for
198198
that traffic. Typically, a Gateway implementation provides a dedicated data
199199
plane for each Gateway resource.
200200

@@ -207,7 +207,7 @@ the [TLS section](https://kubernetes.io/docs/concepts/services-networking/ingres
207207
where the TLS certificate and key are stored in a Secret.
208208

209209
In Gateway API, TLS termination is a property of
210-
the [Gateway listener](/reference/spec/#gateway.networking.k8s.io/v1beta1.Listener),
210+
the [Gateway listener](/reference/spec/#gateway.networking.k8s.io/v1.Listener),
211211
and similarly to the Ingress, a TLS certificate and key are also stored in a
212212
Secret.
213213

@@ -218,21 +218,21 @@ application admin own TLS termination.
218218

219219
The [path-based routing rules](https://kubernetes.io/docs/concepts/services-networking/ingress/#path-types)
220220
of the Ingress resource map directly to
221-
the [routing rules](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteRule)
221+
the [routing rules](/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteRule)
222222
of the [HTTPRoute](/api-types/httproute/).
223223

224224
The [host-header-based routing rules](https://kubernetes.io/docs/concepts/services-networking/ingress/#name-based-virtual-hosting)
225225
map to
226-
the [hostnames](/reference/spec/#gateway.networking.k8s.io/v1beta1.Hostname) of
226+
the [hostnames](/reference/spec/#gateway.networking.k8s.io/v1.Hostname) of
227227
the HTTPRoute. However, note that in the Ingress, each hostname has separate
228228
routing rules, while in the HTTPRoute the routing rules apply to all hostnames.
229229

230230
> The Ingress API uses the term host while Gateway API uses the hostname.
231231
> This guide will use Gateway API term to refer to the Ingress host.
232232
233-
> The `hostnames` of an HTTPRoute must match the `hostname` of the [Gateway listener](/reference/spec/#gateway.networking.k8s.io/v1beta1.Listener).
233+
> The `hostnames` of an HTTPRoute must match the `hostname` of the [Gateway listener](/reference/spec/#gateway.networking.k8s.io/v1.Listener).
234234
> Otherwise, the listener will ignore the routing rules for the unmatched
235-
> hostnames. See the [HTTPRoute documentation](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteSpec).
235+
> hostnames. See the [HTTPRoute documentation](/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteSpec).
236236
237237
HTTPRoutes are owned by the application developer.
238238

@@ -270,7 +270,7 @@ An Ingress resource must specify
270270
a [class](https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class)
271271
to select which Ingress controller to use. An HTTPRoute must specify which
272272
Gateway (or Gateways) to attach to via
273-
a [parentRef](/reference/spec/#gateway.networking.k8s.io/v1beta1.ParentRef).
273+
a [parentRef](/reference/spec/#gateway.networking.k8s.io/v1.ParentRef).
274274

275275
### Implementation-Specific Ingress Features (Annotations)
276276

site-src/guides/multiple-ns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ Gateway that these Routes want to attach to.
155155

156156
After these three Routes are deployed, they will all be attached to the
157157
`shared-gateway` Gateway. The Gateway merges these Routes into a single flat
158-
list of routing rules. [Routing precedence](/reference/spec/#gateway.networking.k8s.io/v1beta1.HTTPRouteRule)
158+
list of routing rules. [Routing precedence](/reference/spec/#gateway.networking.k8s.io/v1.HTTPRouteRule)
159159
between these routing rules is determined by most specific match and
160160
conflicts are handled according to [conflict
161161
resolution](/concepts/guidelines#conflicts). This provides predictable and

0 commit comments

Comments
 (0)