Skip to content

Skylark function for basic cc_library envoy targets#1322

Merged
mattklein123 merged 2 commits intoenvoyproxy:masterfrom
mrice32:passthrough_cc_lib
Jul 24, 2017
Merged

Skylark function for basic cc_library envoy targets#1322
mattklein123 merged 2 commits intoenvoyproxy:masterfrom
mrice32:passthrough_cc_lib

Conversation

@mrice32
Copy link
Member

@mrice32 mrice32 commented Jul 24, 2017

Added skylark function for envoy targets that currently call cc_library directly. This will help us, in particular, with our import. It should also be generally useful so that all envoy targets go through a skylark function declared in bazel/envoy_build_system.bzl allowing easy modifications of general classes of targets.

@mrice32
Copy link
Member Author

mrice32 commented Jul 24, 2017

cc @htuch

# passed to cc_library should be specified with this function. Note: this exists to ensure that
# all envoy targets pass through an envoy-declared skylark function where they can be modified
# before being passed to a native bazel function.
def basic_envoy_cc_library(name, **kargs):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: prefer envoy_basic_cc_library, since all other macros we provide are envoy_ prefixed.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. Will update.

@mattklein123 mattklein123 merged commit f34e961 into envoyproxy:master Jul 24, 2017
@mrice32 mrice32 deleted the passthrough_cc_lib branch May 23, 2018 01:30
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
Automatic merge from submit-queue.

Sanitize JWT verification result in HTTP headers

**What this PR does / why we need it**: To defend the attack of injecting forged JWT verification results in HTTP headers, sanitize the JWT verification result when jwt_auth filter starts.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes envoyproxy#1321

**Special notes for your reviewer**:

**Release note**:

```release-note
```
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Description: adds execution of string accessor code path to the swift and kotlin example apps.
Risk Level: low
Testing: adds new testing via c++ filter.

Fixes #1317

Signed-off-by: Jose Nino <jnino@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Description: adds execution of string accessor code path to the swift and kotlin example apps.
Risk Level: low
Testing: adds new testing via c++ filter.

Fixes #1317

Signed-off-by: Jose Nino <jnino@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake added a commit that referenced this pull request Mar 3, 2026
**Description**

Currently, there is subtle request memory corruption due to sjson
ReplaceInPlace usage.

sjson modifies the original buffer when ReplaceInPlace is set. This
causes request memory corruption during sjson.SetBytesOption calls to
replace string(eg: model overwrite). This issue is always consistently
reproducible in fallback mode. It happens in other cases as well but not
evident as original request is not reused.

---------

Signed-off-by: Johnu George <johnugeorge109@gmail.com>
Co-authored-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants