Skip to content

[WIP/TESTING] backport: v1.17 - ci docker save(#17080)#17158

Closed
phlax wants to merge 28 commits intoenvoyproxy:mainfrom
phlax:v1.17-docker-save
Closed

[WIP/TESTING] backport: v1.17 - ci docker save(#17080)#17158
phlax wants to merge 28 commits intoenvoyproxy:mainfrom
phlax:v1.17-docker-save

Conversation

@phlax
Copy link
Member

@phlax phlax commented Jun 25, 2021

Commit Message: backport: v1.17 - ci docker save #17080
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

Shikugawa and others added 28 commits February 5, 2021 14:56
* docs: kickoff 1.17.1

Signed-off-by: Shikugawa <rei@tetrate.io>

* add version history

Signed-off-by: Shikugawa <rei@tetrate.io>

* add versionversion

Signed-off-by: Shikugawa <rei@tetrate.io>

* master -> main

Signed-off-by: Shikugawa <rei@tetrate.io>

* fix

Signed-off-by: Shikugawa <rei@tetrate.io>

* fix

Signed-off-by: Shikugawa <rei@tetrate.io>

* fix kafka server source

Signed-off-by: Shikugawa <rei@tetrate.io>

* deps: Add more SHAs to configs and kafka requirements.txt (envoyproxy#14887)

Signed-off-by: Dhi Aurrahman <dio@rockybars.com>
Signed-off-by: Shikugawa <rei@tetrate.io>

* conflict

Signed-off-by: yanavlasov <yavlasov@google.com>

* examples: test/fix websocket ci flake (envoyproxy#14941)

switch to 127.0.0.1 from localhost in ws example tests as this seeems to make ci <> websocat flakey

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Shikugawa <rei@tetrate.io>

Co-authored-by: Dhi Aurrahman <dio@rockybars.com>
Co-authored-by: yanavlasov <yavlasov@google.com>
Co-authored-by: phlax <phlax@users.noreply.github.com>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Backport of envoyproxy#14676

Signed-off-by: Asra Ali <asraa@google.com>
Signed-off-by: Piotr Sikora <piotrsikora@google.com>

Co-authored-by: asraa <asraa@google.com>
While there, refresh supported cipher suites and add more warnings.

Backport of envoyproxy#14703

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
…g timer fire (envoyproxy#14799) (envoyproxy#15006)

Fix a potential use-after-free error in ScaledRangeTimerManagerImpl by adding a processing_timers_ flag to the timer queues that is set during onQueueTimerFired processing. This flag is checked when a timer is removed to ensure that the timer's queue isn't deleted while it is in a callback triggered by onQueueTimerFired.

Signed-off-by: Craig Radcliffe <craig.radcliffe@broadcom.com>
Signed-off-by: Shikugawa <rei@tetrate.io>
Signed-off-by: Shikugawa <rei@tetrate.io>
Signed-off-by: Shikugawa <rei@tetrate.io>
Co-authored-by: Matt Klein <mklein@lyft.com>
outlier_detector: accept large base_ejection_time when max_ejection_time not specified (envoyproxy#14962)

Changed logic in config verification when max_ejection_time is not specified
and base_ejection_time is larger than max_ejection_time's default.

Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
…yproxy#15273)

envoyproxy#10854 inadvertently changed the behavior of connect timeouts. This reinstates prior behavior.

Risk Level: Low (reinstating prior behavior)
Testing: added regression test
Docs Changes: n/a
Release Notes: inline

Signed-off-by: Shikugawa <rei@tetrate.io>
Co-authored-by: alyssawilk <alyssar@chromium.org>
…nvoyproxy#15197)

* Dispatcher: keeps a stack of tracked objects. (envoyproxy#14573)

Dispatcher will now keep a stack of tracked objects; on crash it'll "unwind" and have those objects dump their state. Moreover, it'll invoke fatal actions with the tracked objects. This allows us to dump more information during crash.

See related PR: envoyproxy#14509

Will follow up with another PR dumping information at the codec/parser level.

Signed-off-by: Kevin Baichoo <kbaichoo@google.com>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

* cluster: destroy on main thread (envoyproxy#14954)

Signed-off-by: Yuchen Dai <silentdai@gmail.com>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

* Updated release notes.

Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

Co-authored-by: Kevin Baichoo <kbaichoo@google.com>
Co-authored-by: Yuchen Dai <silentdai@gmail.com>
Commit Message: ci: Fix macosx install flake

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Shikugawa <rei@tetrate.io>
…voyproxy#15224) (envoyproxy#15395)

Previously, getHeaderMapValuei() would incorrectly return BadArgument
when called in the access log phase after an early client disconnect,
because the code assumed that a HeaderMap can point to a nullptr only
when called from a callback in which given map is not available.

Fixes proxy-wasm/proxy-wasm-rust-sdk#82.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Shikugawa <rei@tetrate.io>

Co-authored-by: Piotr Sikora <piotrsikora@google.com>
…roxy#15397)

Signed-off-by: Ryan Northey ryan@synca.io
Signed-off-by: Shikugawa rei@tetrate.io

For an explanation of how to fill out the fields, please see the relevant section
in PULL_REQUESTS.md

Commit Message:
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

Signed-off-by: Ryan Northey <ryan@synca.io>
Signed-off-by: Shikugawa <rei@tetrate.io>

Co-authored-by: phlax <phlax@users.noreply.github.com>
…nvoyproxy#15396)

Fixes envoyproxy#14878, proxy-wasm/proxy-wasm-cpp-sdk#81.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Shikugawa <rei@tetrate.io>

Co-authored-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Commit Message: Fixing a crash when the decoder receives an empty metadata map.

Additional Description:
Upon receiving an empty metadata map and trying to decode it an assertion is triggered in debug mode, and a seg-fault occurs in release mode.
The proposed fix ignores the empty metadata maps and updates a stats if one is received.

Risk Level: Medium for Envoy's running with Metadata support.
Testing: Added integration tests.
Docs Changes: Added a codec stats counter description.
Release Notes: Added bug fix description.
Platform Specific Features: N/A.
Fixes a fuzz bug: 25303

Signed-off-by: Adi Suissa-Peleg <adip@google.com>
Signed-off-by: Tony Allen <tony@allen.gg>
Fix for CVE-2021-28683 (crash when peer sends an SSL Alert with an unknown code)

Signed-off-by: Greg Greenway <ggreenway@apple.com>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Tony Allen <tony@allen.gg>
Fixes CVE-2021-28682, a remotely exploitable integer overflow.

Signed-off-by: Asra Ali <asraa@google.com>
Co-authored-by: Tony Allen <tony@allen.gg>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Tony Allen <tony@allen.gg>
Signed-off-by: Tony Allen <tony@allen.gg>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
…mptyMetadata test (envoyproxy#16343)

Signed-off-by: Yan Avlasov <yavlasov@google.com>
Fixes: CVE-2021-29492

Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
…oxy#16369) (envoyproxy#16663)

Commit Message: apple dns - fix interface issue with localhost lookup
Additional Description: deleting ENVOY_BUG statement, as localhost dns resolution renders a valid non-zero interface index.
Risk Level: low
Testing: fixed previously existing test that did not have a run block.

Signed-off-by: Jose Nino <jnino@lyft.com>
Signed-off-by: Dmitri Dolguikh <ddolguik@redhat.com>

Co-authored-by: Jose Ulises Nino Rivera <junr03@users.noreply.github.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Ryan Northey <ryan@synca.io>
@repokitteh-read-only repokitteh-read-only bot added the deps Approval required for changes to Envoy's external dependencies label Jun 25, 2021
@repokitteh-read-only
Copy link

CC @envoyproxy/api-shepherds: Your approval is needed for changes made to (api/envoy[\w/]*/(v1alpha\d?|v1|v2alpha\d?|v2))|(api/envoy/type/(matcher/)?\w+.proto).
CC @envoyproxy/api-shepherds: Your approval is needed for changes made to api/envoy/.
envoyproxy/api-shepherds assignee is @adisuissa
CC @envoyproxy/api-watchers: FYI only for changes made to api/envoy/.
CC @envoyproxy/dependency-shepherds: Your approval is needed for changes made to (bazel/.*repos.*\.bzl)|(bazel/dependency_imports\.bzl)|(api/bazel/.*\.bzl)|(.*/requirements\.txt)|(.*\.patch).

🐱

Caused by: #17158 was opened by phlax.

see: more, trace.

@phlax
Copy link
Member Author

phlax commented Jun 25, 2021

apologies - wrong target branch - closing

@phlax phlax closed this Jun 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

api deps Approval required for changes to Envoy's external dependencies v2-freeze

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants