Skip to content
This repository was archived by the owner on Dec 16, 2020. It is now read-only.
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
4a6f5fa
release: kicking off 1.13.0 (#8840)
alyssawilk Nov 1, 2019
f6cf957
ci: remove release jobs from circle (#8850)
lizan Nov 1, 2019
48d361d
ssl: clean up ssl code (#8745)
venilnoronha Nov 1, 2019
1a7b32d
ci: clang-tidy check for EnumConstantCase (#8772)
derekargueta Nov 1, 2019
549e249
fuzz: bazelify fuzzit runs and run fuzzit in RBE (#8835)
lizan Nov 1, 2019
174ba21
tcp proxy: use source IP for tcp proxy hash (#8778)
yxue Nov 1, 2019
6ba4832
bazelci: fix (#8832)
lizan Nov 1, 2019
daba966
ci: add a note about envoy-build-tools (#8860)
venilnoronha Nov 2, 2019
3c2f5d6
http inspector: use http_parser in http inspector (#8808)
yxue Nov 3, 2019
d36adbb
config: Deprecate google.protobuf.Struct config members followup (#8861)
yanavlasov Nov 3, 2019
160cf76
check_format: automatically infer API headers (#8632)
htuch Nov 3, 2019
b1893aa
Remove StringUtil::join. (#8854)
jpeach Nov 3, 2019
c9784d4
hds: use default interval if HealthCheckSpecifier message doesn't def…
yskopets Nov 4, 2019
9dd7af9
tls: fix cert expiry wraparound (#8583)
jimini-lumox Nov 4, 2019
85e2038
Correct stdc++ language and size issues for MSVC (#8572)
achasveachas Nov 4, 2019
c66238a
grpc/fuzz: add a fuzzer for Grpc::decode(). (#8858)
htuch Nov 4, 2019
d5aab08
bazel: build tests only in sanitizer runs (#8878)
lizan Nov 4, 2019
a3bc473
ci: use bash for Windows and build more targets in CI (#8865)
lizan Nov 4, 2019
c60da46
Add response flags into cel expression context (#8827)
bianpengyuan Nov 5, 2019
6bbe6f3
wasm: add V8-based WebAssembly runtime. (#8592)
PiotrSikora Nov 5, 2019
24f44fc
build: provide shortcuts for GCC and Clang/libc++ configs. (#8062)
PiotrSikora Nov 5, 2019
b589cf6
quiche: implement http stream interfaces (#8556)
danzh2010 Nov 5, 2019
d9fc7f7
tls: remove 1.0 and 1.1 from client defaults (#8755)
derekargueta Nov 5, 2019
69cdcc5
test: deflake //test/extensions/access_loggers/grpc:tcp_grpc_access_l…
lizan Nov 5, 2019
2b685f3
api: Removal of v1 API (#8749)
derekargueta Nov 5, 2019
0aed05a
lds: tracking error status for lds loads (#8441)
alyssawilk Nov 5, 2019
cf74f81
access log: support filter state objects (#8803)
lizan Nov 5, 2019
9a73cd9
flags: add a note to --drain-time-s that it applies to LDS (#8902)
kyessenov Nov 6, 2019
20ca0ae
logger: Add command line option to escape c-style escape sequences in…
nareddyt Nov 6, 2019
28ce963
protobuf: update protoc-gen-validate and test nested RBAC config vali…
zuercher Nov 6, 2019
e906158
update opencensus sha (#8908)
bianpengyuan Nov 6, 2019
282bc09
api: final v1 cleanup (#8904)
derekargueta Nov 6, 2019
c1d7105
Avoid string copy for Redis command splitter (#8780)
HenryYYang Nov 6, 2019
be5e7a5
wasm: fix V8 running under UBSan with vptr checks. (#8905)
PiotrSikora Nov 6, 2019
8b27ef7
docs: Use a portable shebang in build.sh (#8915)
sel-vcc Nov 6, 2019
b0a7a65
fuzz: fix false positive in new_buffer_fuzz_test. (#8903)
htuch Nov 6, 2019
f9f8ff6
remove unused JSON utilities; update redis proxy test configs (#8913)
derekargueta Nov 6, 2019
424ed90
Update config_impl.cc (#8897)
luisotero Nov 6, 2019
619eb57
Fix compilation in http_integration.cc (#8896)
ascheglov Nov 6, 2019
443bc33
config: unification of delta and SotW gRPC xDS (#8478)
fredlas Nov 6, 2019
373af75
ext_authz: allows multiple headers of same name in Denied response (#…
cfryanr Nov 6, 2019
c2eae09
build: switch to libc++ by default (#8859)
lizan Nov 6, 2019
1c0c37d
Merge remote-tracking branch 'upstream/master' into wasm
lizan Nov 7, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
40 changes: 2 additions & 38 deletions .azure-pipelines/linux.yml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ jobs:
# This will run on every commit/PR and will make sure the corpus generated by the fuzzers as well as fixed crashes
# (on Fuzzit) is not crashing envoy. This will help find bugs BEFORE merging and not after.
fuzzit:
CI_TARGET: 'bazel.fuzzit_regression'
CI_TARGET: 'bazel.fuzzit'
timeoutInMinutes: 360
pool:
vmImage: 'Ubuntu 16.04'
Expand Down Expand Up @@ -86,7 +86,7 @@ jobs:
env:
ENVOY_DOCKER_BUILD_DIR: $(Build.StagingDirectory)
ENVOY_RBE: "true"
BAZEL_BUILD_EXTRA_OPTIONS: "--config=remote-ci --config=remote --jobs=$(RbeJobs) --curses=no"
BAZEL_BUILD_EXTRA_OPTIONS: "--config=remote-ci --jobs=$(RbeJobs) --curses=no"
BAZEL_REMOTE_CACHE: grpcs://remotebuildexecution.googleapis.com
BAZEL_REMOTE_INSTANCE: projects/envoy-ci/instances/default_instance
GCP_SERVICE_ACCOUNT_KEY: $(GcpServiceAccountKey)
Expand Down Expand Up @@ -137,39 +137,3 @@ jobs:
CIRCLE_SHA1: $(Build.SourceVersion)
DOCKERHUB_USERNAME: $(DockerUsername)
DOCKERHUB_PASSWORD: $(DockerPassword)

- job: fuzzit_fuzzing
dependsOn: [] # this removes the implicit dependency on previous stage and causes this to run in parallel.
timeoutInMinutes: 360
# this runs on every push to master / merge to master. this will build the fuzzers and will update them on Fuzzit where
# they will run asynchronously. Essentially this will make sure that the latest master version is always being fuzzed
# continuously.
condition: and(succeeded(), ne(variables['FuzzitApiKey'], ''), eq(variables['Build.SourceBranch'], 'refs/heads/master'), ne(variables['Build.Reason'], 'PullRequest'))
pool:
vmImage: 'Ubuntu 16.04'
steps:
- bash: |
echo "disk space at beginning of build:"
df -h
displayName: "Check disk space at beginning"

- bash: |
sudo mkdir -p /etc/docker
echo '{
"ipv6": true,
"fixed-cidr-v6": "2001:db8:1::/64"
}' | sudo tee /etc/docker/daemon.json
sudo service docker restart
displayName: "Enable IPv6"

- script: ci/run_envoy_docker.sh 'ci/do_ci.sh bazel.fuzzit_fuzzing'
workingDirectory: $(Build.SourcesDirectory)
env:
FUZZIT_API_KEY: $(FuzzitApiKey)
ENVOY_DOCKER_BUILD_DIR: $(Build.StagingDirectory)
ENVOY_RBE: "true"
BAZEL_BUILD_EXTRA_OPTIONS: "--config=remote-ci --config=remote --jobs=$(RbeJobs) --curses=no"
BAZEL_REMOTE_CACHE: grpcs://remotebuildexecution.googleapis.com
BAZEL_REMOTE_INSTANCE: projects/envoy-ci/instances/default_instance
GCP_SERVICE_ACCOUNT_KEY: $(GcpServiceAccountKey)
displayName: "Fuzzit Regression"
18 changes: 9 additions & 9 deletions .azure-pipelines/windows.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,15 +7,15 @@ jobs:
- job: Windows
timeoutInMinutes: 360
pool:
vmImage: 'windows-latest'
vmImage: "windows-latest"

steps:
- powershell: |
.\ci\windows_ci_setup.ps1
Write-Host "##vso[task.prependpath]$env:TOOLS_BIN_DIR"
displayName: 'Install dependencies'
env:
TOOLS_BIN_DIR: $(Pipeline.Workspace)\bin
- powershell: |
.\ci\windows_ci_setup.ps1
Write-Host "##vso[task.prependpath]$env:TOOLS_BIN_DIR"
displayName: "Install dependencies"
env:
TOOLS_BIN_DIR: $(Pipeline.Workspace)\bin

- powershell: .\ci\windows_ci_steps.ps1
displayName: 'Run Windows CI'
- bash: ci/windows_ci_steps.sh
displayName: "Run Windows CI"
8 changes: 3 additions & 5 deletions .bazelci/presubmit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,10 @@ tasks:
build_targets:
- "//source/exe:envoy-static"
rbe:
platform: rbe_ubuntu1604
platform: ubuntu1804
test_targets:
- "//test/..."
test_flags:
- "--config=remote-clang"
macos:
platform: macos
test_targets:
- "//test/..."
- "--config=remote-ci"
- "--jobs=75"
24 changes: 19 additions & 5 deletions .bazelrc
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,10 @@ build --action_env=BAZEL_LINKLIBS=-l%:libstdc++.a
build --action_env=BAZEL_LINKOPTS=-lm
build --host_javabase=@bazel_tools//tools/jdk:remote_jdk11
build --javabase=@bazel_tools//tools/jdk:remote_jdk11
build --copt=-fPIC
build --enable_platform_specific_config

# Enable position independent code, this option is not supported on Windows and default on on macOS.
build:linux --copt=-fPIC

# We already have absl in the build, define absl=1 to tell googletest to use absl for backtrace.
build --define absl=1
Expand Down Expand Up @@ -91,8 +94,6 @@ build:clang-msan --linkopt -fsanitize=memory
build:clang-msan --copt -fsanitize-memory-track-origins=2

# Clang with libc++
# TODO(cmluciano) fix and re-enable _LIBCPP_VERSION testing for TCMALLOC in Envoy::Stats::TestUtil::hasDeterministicMallocStats
# and update stats_integration_test with appropriate m_per_cluster value
build:libc++ --config=clang
build:libc++ --action_env=CXXFLAGS=-stdlib=libc++
build:libc++ --action_env=LDFLAGS=-stdlib=libc++
Expand Down Expand Up @@ -139,8 +140,15 @@ build:remote --remote_download_toplevel
build:remote-clang --config=remote
build:remote-clang --config=rbe-toolchain-clang

build:remote-clang-libc++ --config=remote
build:remote-clang-libc++ --config=rbe-toolchain-clang-libc++

build:remote-gcc --config=remote
build:remote-gcc --config=rbe-toolchain-gcc

# Docker sandbox
build:docker-sandbox --experimental_docker_image=envoyproxy/envoy-build@sha256:3ca8acc35fdb57ab26e1bb5f9488f37095f45acd77a12602510410dbefa00b58
# NOTE: Update this from https://github.com/envoyproxy/envoy-build-tools/blob/master/toolchains/rbe_toolchains_config.bzl#L7
build:docker-sandbox --experimental_docker_image=envoyproxy/envoy-build-ubuntu@sha256:3ca8acc35fdb57ab26e1bb5f9488f37095f45acd77a12602510410dbefa00b58
build:docker-sandbox --spawn_strategy=docker
build:docker-sandbox --strategy=Javac=docker
build:docker-sandbox --strategy=Closure=docker
Expand All @@ -152,12 +160,18 @@ build:docker-sandbox --experimental_enable_docker_sandbox
build:docker-clang --config=docker-sandbox
build:docker-clang --config=rbe-toolchain-clang

build:docker-clang-libc++ --config=docker-sandbox
build:docker-clang-libc++ --config=rbe-toolchain-clang-libc++

build:docker-gcc --config=docker-sandbox
build:docker-gcc --config=rbe-toolchain-gcc

# CI configurations
build:remote-ci --remote_cache=grpcs://remotebuildexecution.googleapis.com
build:remote-ci --remote_executor=grpcs://remotebuildexecution.googleapis.com

# Fuzz builds
build:asan-fuzzer --config=asan
build:asan-fuzzer --config=clang-asan
build:asan-fuzzer --define=FUZZING_ENGINE=libfuzzer
build:asan-fuzzer --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
build:asan-fuzzer --copt=-fsanitize=fuzzer-no-link
Expand Down
155 changes: 77 additions & 78 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,88 +10,87 @@ executors:
working_directory: /source

jobs:
release:
executor: ubuntu-build
environment:
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run:
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=enabled" # v8 + WAVM (build only).
command: ci/do_circle_ci.sh bazel.release.server_only
- run:
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, WAVM segfaults in tests.
command: ci/do_circle_ci.sh bazel.release ${BAZEL_TEST_TARGETS}
- store_artifacts:
path: /build/envoy/generated
destination: /
release:
executor: ubuntu-build
environment:
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run:
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=enabled" # v8 + WAVM (build only).
command: ci/do_circle_ci.sh bazel.release.server_only
- run:
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, WAVM segfaults in tests.
command: ci/do_circle_ci.sh bazel.release ${BAZEL_TEST_TARGETS}
- store_artifacts:
path: /build/envoy/generated
destination: /

asan:
executor: ubuntu-build
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, ASan detects leaks in WAVM library.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run: ci/do_circle_ci.sh bazel.asan ${BAZEL_TEST_TARGETS}
- store_artifacts:
path: /build/envoy/generated
destination: /
asan:
executor: ubuntu-build
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, ASan detects leaks in WAVM library.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run: ci/do_circle_ci.sh bazel.asan ${BAZEL_TEST_TARGETS}
- store_artifacts:
path: /build/envoy/generated
destination: /

coverage:
executor: ubuntu-build
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, LSan detects leaks in WAVM library.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
VALIDATE_COVERAGE: 0
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run:
command:
ci/do_circle_ci.sh bazel.coverage ${BAZEL_TEST_TARGETS}
no_output_timeout: 60m
- store_artifacts:
path: /build/envoy/generated
destination: /
coverage:
executor: ubuntu-build
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, LSan detects leaks in WAVM library.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
VALIDATE_COVERAGE: 0
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run:
command: ci/do_circle_ci.sh bazel.coverage ${BAZEL_TEST_TARGETS}
no_output_timeout: 60m
- store_artifacts:
path: /build/envoy/generated
destination: /

format:
executor: ubuntu-build
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run: pip install -r tools/requirements.txt
- run: ci/do_circle_ci.sh check_format
- run: ci/do_circle_ci.sh check_repositories
- run: ci/do_circle_ci.sh check_spelling
# TODO(PiotrSikora): re-enable once fixed.
# - run: ci/do_circle_ci.sh check_spelling_pedantic
format:
executor: ubuntu-build
steps:
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- run: pip install -r tools/requirements.txt
- run: ci/do_circle_ci.sh check_format
- run: ci/do_circle_ci.sh check_repositories
- run: ci/do_circle_ci.sh check_spelling
# TODO(PiotrSikora): re-enable once fixed.
# - run: ci/do_circle_ci.sh check_spelling_pedantic

macos:
macos:
xcode: "11.0.0"
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, WAVM segfaults in tests.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
CC: clang
CXX: clang++
steps:
- run: sudo sntp -sS time.apple.com
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- restore_cache:
keys:
- macos-bazel-cache-{{ checksum "bazel/repository_locations.bzl" }}
- run: ci/mac_ci_setup.sh
- run: ci/mac_ci_steps.sh ${BAZEL_TEST_TARGETS}
- save_cache:
key: macos-bazel-cache-{{ checksum "bazel/repository_locations.bzl" }}
paths:
- /private/var/tmp/_bazel_distiller/
macos:
macos:
xcode: "11.0.0"
environment:
BAZEL_BUILD_EXTRA_OPTIONS: "--define wasm=v8" # v8 only, WAVM segfaults in tests.
BAZEL_TEST_TARGETS: "//test/extensions/access_loggers/wasm/... //test/extensions/filters/http/wasm/... //test/extensions/wasm/... //test/extensions/common/wasm/..."
CC: clang
CXX: clang++
steps:
- run: sudo sntp -sS time.apple.com
- run: rm -rf /home/circleci/project/.git # CircleCI git caching is likely broken
- checkout
- restore_cache:
keys:
- macos-bazel-cache-{{ checksum "bazel/repository_locations.bzl" }}
- run: ci/mac_ci_setup.sh
- run: ci/mac_ci_steps.sh ${BAZEL_TEST_TARGETS}
- save_cache:
key: macos-bazel-cache-{{ checksum "bazel/repository_locations.bzl" }}
paths:
- /private/var/tmp/_bazel_distiller/

workflows:
version: 2
Expand Down
3 changes: 3 additions & 0 deletions .clang-tidy
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,9 @@ CheckOptions:
- key: readability-identifier-naming.EnumCase
value: 'CamelCase'

- key: readability-identifier-naming.EnumConstantCase
value: 'CamelCase'

- key: readability-identifier-naming.ParameterCase
value: 'lower_case'

Expand Down
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.12.0
1.13.0-dev
4 changes: 2 additions & 2 deletions api/bazel/repository_locations.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@ BAZEL_SKYLIB_SHA256 = "2ef429f5d7ce7111263289644d233707dba35e39696377ebab8b0bc70
OPENCENSUS_PROTO_GIT_SHA = "5cec5ea58c3efa81fa808f2bd38ce182da9ee731" # Jul 25, 2019
OPENCENSUS_PROTO_SHA256 = "faeb93f293ff715b0cb530d273901c0e2e99277b9ed1c0a0326bca9ec5774ad2"

PGV_GIT_SHA = "fd7de029969b7c0ef8b754660b997399b6fd812a" # Sep 4, 2019
PGV_SHA256 = "55c6ad4a1b405938524ab55b18349c824d3fc6eaef580e1ef2a9dfe39f737b9e"
PGV_GIT_SHA = "a18376249eb51cdd517f67fe8703897322812e6d" # Nov 5, 2019
PGV_SHA256 = "8e45a3582e7fa9d0005ad6ff1ed9208e793b847f1c455d2bbe5b1c580338ffaf"

GOOGLEAPIS_GIT_SHA = "be480e391cc88a75cf2a81960ef79c80d5012068" # Jul 24, 2019
GOOGLEAPIS_SHA = "c1969e5b72eab6d9b6cfcff748e45ba57294aeea1d96fd04cd081995de0605c2"
Expand Down
Loading