Skip to content

Fix logging in mixer_fault_test#2141

Closed
dmitri-d wants to merge 51 commits intoistio:release-1.1from
dmitri-d:fix-logging
Closed

Fix logging in mixer_fault_test#2141
dmitri-d wants to merge 51 commits intoistio:release-1.1from
dmitri-d:fix-logging

Conversation

@dmitri-d
Copy link
Contributor

@dmitri-d dmitri-d commented Mar 6, 2019

…with cli '-l' option

What this PR does / why we need it:

Which issue this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close that issue when PR gets merged): fixes #

Special notes for your reviewer:

Release note:

qiwzhang and others added 30 commits October 26, 2018 16:01
* Improve performance by removing MD5 for check cache keys

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* not to allocate memory from stack

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* Make debug string readable

Signed-off-by: Wayne Zhang <qiwzhang@google.com>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Signed-off-by: Wayne Zhang <qiwzhang@google.com>
Signed-off-by: Wayne Zhang <qiwzhang@google.com>
* Add a new TCP cluster rewrite filter

This commit adds a new TCP cluster rewrite filter which allows users to
rewrite TCP cluster names obtained via TLS SNI by matching via regex
configuration.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Make TCP cluster rewrite stackable on SNI filter

This commit updates the TCP Cluster Rewrite filter to be stackable on
the SNI Cluster filter.

Signed-off-by: Venil Noronha <veniln@vmware.com>
This commit updates the TCP Cluster Rewrite filter name to
envoy.filters.network.tcp_cluster_rewrite.

Signed-off-by: Venil Noronha <veniln@vmware.com>
This commit enables the static registration of the TCP Cluster Rewrite
filter by updating the build configuration.

Signed-off-by: Venil Noronha <veniln@vmware.com>
Envoy /server_info API was inconsistent intermittently causing errors on
a Proxy update on Istio. This update will bring in the API fix to Istio.

Signed-off-by: Venil Noronha <veniln@vmware.com>
* Update Envoy SHA

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>

* Fix format.

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>
Merge release-1.1 to master
To use --distdir option of Bazel (which allows to use previously
fetched tarballs instead of downloading dependencies during
build), all dependencies should use http instead of git and need
to have sha256 sums specified.

Signed-off-by: Michal Rostecki <mrostecki@suse.de>
Pull request #2002 removed signature calculation which was using
BoringSSL as a dependency. BoringSSL is not needed anymore.

Signed-off-by: Michal Rostecki <mrostecki@suse.de>
* Update Envoy SHA to fcc68f1

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>

* Update SHA256

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>
* update envoy SHA to 48b161e

* use Http::AsyncClient::RequestOptions() in AsyncClient::send()

* PerConnectionCluster::Key -> PerConnectionCluster::key()

* use Http::AsyncClient::RequestOptions() in AsyncClient::send() in the test

* fix format
* initial implementation of forward_downstream_api filter

* fix the license message in BUILD (sh comments)

* add missing dependencies

* add definition of config_lib to BUILD

* remove public visibility from forward_downstream_sni_lib

* remove envoy_cc_binary dependency

* StreamInfo::UpstreamServerName -> Network::UpstreamServerName

* fix namespace (Extensions -> Tcp)

* remove config_test
Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>
Merge release-1.1 into master
* Removes dangling pointer in capture list of lambda function. (#2080)

* Replace this with members in capture list.

* update

* fix format

* Use shared_ptr to protect members which are passed to capture list of lambda function. (#2083)

* fix bug

* introduce ControlData

* fix format

* update

* fix format

* Revise

* Pass ControlDataSharedPtr into Control and hold ref

* pass JwtAuthenticationConstSharedPtr into JwtAuthStore to hold ref

* Revise

* Update Envoy SHA to latest with protobuf.Any configs (release-1.1). (#2082)

* Update Envoy SHA to latest with protobuf.Any configs (release-1.1).

For istio/istio#10993.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>

* review: don't open /dev/stdout in tests.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>

* Update Istio API to latest (1.1 branch) (#2084)

Signed-off-by: Yangmin Zhu <ymzhu@google.com>
* Update Envoy SHA to latest with protobuf.Any configs.

For istio/istio#10993.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>

* review: don't open /dev/stdout in tests.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
sha256sum shouldn't be necessary, since we use gsha256sum on macOS.

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
@googlebot googlebot added the cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. label Mar 6, 2019
@istio-testing istio-testing requested review from lizan and rshriram March 6, 2019 21:09
@kyessenov
Copy link
Contributor

Seems reasonable.
/lgtm
/approve

@istio-testing
Copy link
Collaborator

@kyessenov: changing LGTM is restricted to assignees, and assigning you to the PR failed.

Details

In response to this:

Seems reasonable.
/lgtm
/approve

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@dmitri-d
Copy link
Contributor Author

dmitri-d commented Mar 6, 2019

@duderino: you may have fixed this in your copy already.

Explicit log-level in tests was resetting cli option I was passing to bazel via test_arg:

bazel  test -c opt --test_arg="-l trace" //test/integration:mixer_fault_test

lizan and others added 3 commits March 8, 2019 06:32
* update envoy with latest build fixes

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* update protobuf to match envoy

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* timeSystem -> timeSource

Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
@duderino
Copy link

/lgtm thanks for the PR. I'll merge post 1.1

@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dmitri-d, duderino, kyessenov

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

lizan and others added 5 commits March 12, 2019 23:35
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Copy link
Member

@venilnoronha venilnoronha left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@istio-testing istio-testing added the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 20, 2019
@istio-testing
Copy link
Collaborator

@dmitri-d: PR needs rebase.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@googlebot
Copy link
Collaborator

So there's good news and bad news.

👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there.

😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request.

Note to project maintainer: This is a terminal state, meaning the cla/google commit status will not change from this state. It's up to you to confirm consent of all the commit author(s), set the cla label to yes (if enabled on your project), and then merge this pull request when appropriate.

ℹ️ Googlers: Go here for more info.

@googlebot googlebot added cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. and removed cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. labels Mar 20, 2019
@istio-testing
Copy link
Collaborator

@dmitri-d: The following tests failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/proxy-presubmit.sh 772b892 link /test proxy-presubmit
prow/proxy-presubmit-asan.sh 772b892 link /test proxy-presubmit-asan
prow/proxy-presubmit-tsan.sh 772b892 link /test proxy-presubmit-tsan
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@dmitri-d
Copy link
Contributor Author

Opened a PR with these changes against master branch, closing this one.

@dmitri-d dmitri-d closed this Mar 20, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. needs-rebase Indicates a PR needs to be rebased before being merged

Projects

None yet

Development

Successfully merging this pull request may close these issues.