Skip to content

merge latest 1.1 to sds_api branch#2099

Merged
istio-testing merged 159 commits intoistio:sds_apifrom
quanjielin:quanlinmerge0130
Jan 31, 2019
Merged

merge latest 1.1 to sds_api branch#2099
istio-testing merged 159 commits intoistio:sds_apifrom
quanjielin:quanlinmerge0130

Conversation

@quanjielin
Copy link
Contributor

No description provided.

kyessenov and others added 30 commits July 3, 2018 12:56
Signed-off-by: Kuat Yessenov <kuat@google.com>
to include the SNI inspecting method, for using SNI in telemetry and
policies

Signed-off-by: Vadim Eisenberg <vadime@il.ibm.com>
…a38ad58121ba5aa5af51

Signed-off-by: Vadim Eisenberg <vadime@il.ibm.com>
…_3b05bffcbaedaf6d112ba38ad58121ba5aa5af51

update Envoy's SHA to latest, to implement SNI telemetry reports and policy checks
Signed-off-by: Kuat Yessenov <kuat@google.com>
Signed-off-by: Kuat Yessenov <kuat@google.com>
Signed-off-by: Kuat Yessenov <kuat@google.com>
…equested_server_name_attribute

Add connection requested server name attribute to TCP read filter
…equested_server_name_attribute

Revert "Add connection requested server name attribute to TCP read filter"
GregHanson and others added 11 commits January 4, 2019 17:07
* update envoy sha

* library bug fixes

* bug fix

* lint fixes

* lint fixes

* lint fixes

* test fixes
…nge (istio#2076)

* rename rbac permissive related attributes key due to envoy recent change

* rename
)

* Replace this with members in capture list.

* update

* fix format
… lambda function. (istio#2083)

* fix bug

* introduce ControlData

* fix format

* update

* fix format

* Revise

* Pass ControlDataSharedPtr into Control and hold ref

* pass JwtAuthenticationConstSharedPtr into JwtAuthStore to hold ref

* Revise
…stio#2082)

* Update Envoy SHA to latest with protobuf.Any configs (release-1.1).

For istio/istio#10993.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>

* review: don't open /dev/stdout in tests.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Yangmin Zhu <ymzhu@google.com>
* use route directive regardless of rpc status

Signed-off-by: Kuat Yessenov <kuat@google.com>

* log response code

Signed-off-by: Kuat Yessenov <kuat@google.com>
* Upgrade Envoy to b3be571

This updates Envoy SHA to b3be571.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Update tls_utility paths

This updates the tls_utility library and include paths.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Fix http mixer filter

This adds the encodeMetadata implementation to the http mixer filter to
fix a build issue.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Fix sha256sum overwrite error

This removes the ln command from the CircleCI configuration to fix a
file overwrite error on macOS jobs.

Signed-off-by: Venil Noronha <veniln@vmware.com>
sha256sum shouldn't be necessary, since we use gsha256sum on macOS.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
* add mixer error details into metadata

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* format

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* review

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* comment

Signed-off-by: Lizan Zhou <lizan@tetrate.io>
…stio#2097)

* WIP

* add local and override tests

* revert attributes_builder

* white list forward attributes

* add tests with whitelist

* fix builder test for white listed attributes
@googlebot
Copy link
Collaborator

So there's good news and bad news.

👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there.

😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request.

Note to project maintainer: This is a terminal state, meaning the cla/google commit status will not change from this state. It's up to you to confirm consent of all the commit author(s), set the cla label to yes (if enabled on your project), and then merge this pull request when appropriate.

@googlebot googlebot added the cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. label Jan 31, 2019
@quanjielin quanjielin force-pushed the quanlinmerge0130 branch 2 times, most recently from df00531 to cbf41ac Compare January 31, 2019 02:10
@quanjielin quanjielin removed the cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. label Jan 31, 2019
@JimmyCYJ JimmyCYJ added the cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. label Jan 31, 2019
@JimmyCYJ
Copy link
Member

/lgtm

@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: JimmyCYJ, quanjielin

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@istio-testing istio-testing merged commit 169a4a5 into istio:sds_api Jan 31, 2019
@googlebot
Copy link
Collaborator

A Googler has manually verified that the CLAs look good.

(Googler, please make sure the reason for overriding the CLA status is clearly documented in these comments.)

@quanjielin quanjielin mentioned this pull request Jan 31, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA.

Projects

None yet

Development

Successfully merging this pull request may close these issues.