[WIP/TESTING] backport: v1.17 - ci docker save(#17080)#17158
Closed
phlax wants to merge 28 commits intoenvoyproxy:mainfrom
Closed
[WIP/TESTING] backport: v1.17 - ci docker save(#17080)#17158phlax wants to merge 28 commits intoenvoyproxy:mainfrom
phlax wants to merge 28 commits intoenvoyproxy:mainfrom
Conversation
* docs: kickoff 1.17.1 Signed-off-by: Shikugawa <rei@tetrate.io> * add version history Signed-off-by: Shikugawa <rei@tetrate.io> * add versionversion Signed-off-by: Shikugawa <rei@tetrate.io> * master -> main Signed-off-by: Shikugawa <rei@tetrate.io> * fix Signed-off-by: Shikugawa <rei@tetrate.io> * fix Signed-off-by: Shikugawa <rei@tetrate.io> * fix kafka server source Signed-off-by: Shikugawa <rei@tetrate.io> * deps: Add more SHAs to configs and kafka requirements.txt (envoyproxy#14887) Signed-off-by: Dhi Aurrahman <dio@rockybars.com> Signed-off-by: Shikugawa <rei@tetrate.io> * conflict Signed-off-by: yanavlasov <yavlasov@google.com> * examples: test/fix websocket ci flake (envoyproxy#14941) switch to 127.0.0.1 from localhost in ws example tests as this seeems to make ci <> websocat flakey Signed-off-by: Ryan Northey <ryan@synca.io> Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: Dhi Aurrahman <dio@rockybars.com> Co-authored-by: yanavlasov <yavlasov@google.com> Co-authored-by: phlax <phlax@users.noreply.github.com>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Backport of envoyproxy#14676 Signed-off-by: Asra Ali <asraa@google.com> Signed-off-by: Piotr Sikora <piotrsikora@google.com> Co-authored-by: asraa <asraa@google.com>
While there, refresh supported cipher suites and add more warnings. Backport of envoyproxy#14703 Signed-off-by: Piotr Sikora <piotrsikora@google.com>
…g timer fire (envoyproxy#14799) (envoyproxy#15006) Fix a potential use-after-free error in ScaledRangeTimerManagerImpl by adding a processing_timers_ flag to the timer queues that is set during onQueueTimerFired processing. This flag is checked when a timer is removed to ensure that the timer's queue isn't deleted while it is in a callback triggered by onQueueTimerFired. Signed-off-by: Craig Radcliffe <craig.radcliffe@broadcom.com> Signed-off-by: Shikugawa <rei@tetrate.io>
…envoyproxy#15016) (envoyproxy#15078) Fixes proxy-wasm/proxy-wasm-cpp-host#125. Signed-off-by: Piotr Sikora <piotrsikora@google.com>
…15199) Signed-off-by: Asra Ali <asraa@google.com>
Signed-off-by: Shikugawa <rei@tetrate.io>
Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: Matt Klein <mklein@lyft.com>
outlier_detector: accept large base_ejection_time when max_ejection_time not specified (envoyproxy#14962) Changed logic in config verification when max_ejection_time is not specified and base_ejection_time is larger than max_ejection_time's default. Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
…yproxy#15273) envoyproxy#10854 inadvertently changed the behavior of connect timeouts. This reinstates prior behavior. Risk Level: Low (reinstating prior behavior) Testing: added regression test Docs Changes: n/a Release Notes: inline Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: alyssawilk <alyssar@chromium.org>
…nvoyproxy#15197) * Dispatcher: keeps a stack of tracked objects. (envoyproxy#14573) Dispatcher will now keep a stack of tracked objects; on crash it'll "unwind" and have those objects dump their state. Moreover, it'll invoke fatal actions with the tracked objects. This allows us to dump more information during crash. See related PR: envoyproxy#14509 Will follow up with another PR dumping information at the codec/parser level. Signed-off-by: Kevin Baichoo <kbaichoo@google.com> Signed-off-by: Christoph Pakulski <christoph@tetrate.io> * cluster: destroy on main thread (envoyproxy#14954) Signed-off-by: Yuchen Dai <silentdai@gmail.com> Signed-off-by: Christoph Pakulski <christoph@tetrate.io> * Updated release notes. Signed-off-by: Christoph Pakulski <christoph@tetrate.io> Co-authored-by: Kevin Baichoo <kbaichoo@google.com> Co-authored-by: Yuchen Dai <silentdai@gmail.com>
Commit Message: ci: Fix macosx install flake Signed-off-by: Ryan Northey <ryan@synca.io> Signed-off-by: Shikugawa <rei@tetrate.io>
…voyproxy#15224) (envoyproxy#15395) Previously, getHeaderMapValuei() would incorrectly return BadArgument when called in the access log phase after an early client disconnect, because the code assumed that a HeaderMap can point to a nullptr only when called from a callback in which given map is not available. Fixes proxy-wasm/proxy-wasm-rust-sdk#82. Signed-off-by: Piotr Sikora <piotrsikora@google.com> Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: Piotr Sikora <piotrsikora@google.com>
…roxy#15397) Signed-off-by: Ryan Northey ryan@synca.io Signed-off-by: Shikugawa rei@tetrate.io For an explanation of how to fill out the fields, please see the relevant section in PULL_REQUESTS.md Commit Message: Additional Description: Risk Level: Testing: Docs Changes: Release Notes: Platform Specific Features: [Optional Runtime guard:] [Optional Fixes #Issue] [Optional Deprecated:] [Optional API Considerations:] Signed-off-by: Ryan Northey <ryan@synca.io> Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: phlax <phlax@users.noreply.github.com>
…nvoyproxy#15396) Fixes envoyproxy#14878, proxy-wasm/proxy-wasm-cpp-sdk#81. Signed-off-by: Piotr Sikora <piotrsikora@google.com> Signed-off-by: Shikugawa <rei@tetrate.io> Co-authored-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Commit Message: Fixing a crash when the decoder receives an empty metadata map. Additional Description: Upon receiving an empty metadata map and trying to decode it an assertion is triggered in debug mode, and a seg-fault occurs in release mode. The proposed fix ignores the empty metadata maps and updates a stats if one is received. Risk Level: Medium for Envoy's running with Metadata support. Testing: Added integration tests. Docs Changes: Added a codec stats counter description. Release Notes: Added bug fix description. Platform Specific Features: N/A. Fixes a fuzz bug: 25303 Signed-off-by: Adi Suissa-Peleg <adip@google.com> Signed-off-by: Tony Allen <tony@allen.gg>
Fix for CVE-2021-28683 (crash when peer sends an SSL Alert with an unknown code) Signed-off-by: Greg Greenway <ggreenway@apple.com> Co-authored-by: Christoph Pakulski <christoph@tetrate.io> Signed-off-by: Tony Allen <tony@allen.gg>
Fixes CVE-2021-28682, a remotely exploitable integer overflow. Signed-off-by: Asra Ali <asraa@google.com> Co-authored-by: Tony Allen <tony@allen.gg> Co-authored-by: Christoph Pakulski <christoph@tetrate.io> Signed-off-by: Tony Allen <tony@allen.gg>
Signed-off-by: Tony Allen <tony@allen.gg>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
…mptyMetadata test (envoyproxy#16343) Signed-off-by: Yan Avlasov <yavlasov@google.com>
Fixes: CVE-2021-29492 Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
…oxy#16369) (envoyproxy#16663) Commit Message: apple dns - fix interface issue with localhost lookup Additional Description: deleting ENVOY_BUG statement, as localhost dns resolution renders a valid non-zero interface index. Risk Level: low Testing: fixed previously existing test that did not have a run block. Signed-off-by: Jose Nino <jnino@lyft.com> Signed-off-by: Dmitri Dolguikh <ddolguik@redhat.com> Co-authored-by: Jose Ulises Nino Rivera <junr03@users.noreply.github.com>
Signed-off-by: Yan Avlasov <yavlasov@google.com>
Signed-off-by: Ryan Northey <ryan@synca.io>
|
CC @envoyproxy/api-shepherds: Your approval is needed for changes made to |
Member
Author
|
apologies - wrong target branch - closing |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Commit Message: backport: v1.17 - ci docker save #17080
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]