merge latest 1.1 to sds_api branch#2099
Conversation
Signed-off-by: Kuat Yessenov <kuat@google.com>
update envoy
to include the SNI inspecting method, for using SNI in telemetry and policies Signed-off-by: Vadim Eisenberg <vadime@il.ibm.com>
…a38ad58121ba5aa5af51 Signed-off-by: Vadim Eisenberg <vadime@il.ibm.com>
…_3b05bffcbaedaf6d112ba38ad58121ba5aa5af51 update Envoy's SHA to latest, to implement SNI telemetry reports and policy checks
Signed-off-by: Kuat Yessenov <kuat@google.com>
Signed-off-by: Kuat Yessenov <kuat@google.com>
…equested_server_name_attribute Add connection requested server name attribute to TCP read filter
…equested_server_name_attribute Revert "Add connection requested server name attribute to TCP read filter"
* update envoy sha * library bug fixes * bug fix * lint fixes * lint fixes * lint fixes * test fixes
…nge (istio#2076) * rename rbac permissive related attributes key due to envoy recent change * rename
… lambda function. (istio#2083) * fix bug * introduce ControlData * fix format * update * fix format * Revise * Pass ControlDataSharedPtr into Control and hold ref * pass JwtAuthenticationConstSharedPtr into JwtAuthStore to hold ref * Revise
…stio#2082) * Update Envoy SHA to latest with protobuf.Any configs (release-1.1). For istio/istio#10993. Signed-off-by: Piotr Sikora <piotrsikora@google.com> * review: don't open /dev/stdout in tests. Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Yangmin Zhu <ymzhu@google.com>
* use route directive regardless of rpc status Signed-off-by: Kuat Yessenov <kuat@google.com> * log response code Signed-off-by: Kuat Yessenov <kuat@google.com>
* Upgrade Envoy to b3be571 This updates Envoy SHA to b3be571. Signed-off-by: Venil Noronha <veniln@vmware.com> * Update tls_utility paths This updates the tls_utility library and include paths. Signed-off-by: Venil Noronha <veniln@vmware.com> * Fix http mixer filter This adds the encodeMetadata implementation to the http mixer filter to fix a build issue. Signed-off-by: Venil Noronha <veniln@vmware.com> * Fix sha256sum overwrite error This removes the ln command from the CircleCI configuration to fix a file overwrite error on macOS jobs. Signed-off-by: Venil Noronha <veniln@vmware.com>
sha256sum shouldn't be necessary, since we use gsha256sum on macOS. Signed-off-by: Piotr Sikora <piotrsikora@google.com>
* add mixer error details into metadata Signed-off-by: Lizan Zhou <lizan@tetrate.io> * format Signed-off-by: Lizan Zhou <lizan@tetrate.io> * review Signed-off-by: Lizan Zhou <lizan@tetrate.io> * comment Signed-off-by: Lizan Zhou <lizan@tetrate.io>
…stio#2097) * WIP * add local and override tests * revert attributes_builder * white list forward attributes * add tests with whitelist * fix builder test for white listed attributes
|
So there's good news and bad news. 👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there. 😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request. Note to project maintainer: This is a terminal state, meaning the |
df00531 to
cbf41ac
Compare
cbf41ac to
6454835
Compare
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JimmyCYJ, quanjielin The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
A Googler has manually verified that the CLAs look good. (Googler, please make sure the reason for overriding the CLA status is clearly documented in these comments.) |
No description provided.