Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
51 commits
Select commit Hold shift + click to select a range
8538792
cleanup: replace std::string to absl::string (#19032)
ME-ON1 Nov 19, 2021
eda5458
Remove unused test dependencies (#19054)
yanavlasov Nov 19, 2021
7dec99d
HTTP1: Refactor HTTP1 Active Request to be defer deletable. (#19062)
KBaichoo Nov 19, 2021
dc2ac22
stream_info: reworking upstream data (#19020)
alyssawilk Nov 19, 2021
23e5fc2
udp_proxy: added per packet load balancing possibility (#18605)
michalmaka Nov 19, 2021
0d0cf0d
os syscalls: add getifaddrs to singleton (#18821)
junr03 Nov 19, 2021
d79a3ab
Update QUICHE from 4f552f349 to 81314ecbd (#19066)
DavidSchinazi Nov 19, 2021
91c2e6b
Support for x-forwarded-host header. (#18639)
arun-vasudev Nov 23, 2021
400564b
Update QUICHE from 81314ecbd to c2ddf95dc (#19081)
RyanTheOptimist Nov 23, 2021
5c83001
Fix a small typo (#19058)
hs0210 Nov 23, 2021
25bf301
Fix a broken example in Lua filter docs (#19086)
peterj Nov 24, 2021
bb95af8
Specify type for matching Subject Alternative Name. (#18628)
pradeepcrao Nov 24, 2021
e903a6e
Listener: Add global conn limit opt out. (#18876)
wez470 Nov 24, 2021
a7a00d9
quic: turn off GRO (#19088)
danzh2010 Nov 24, 2021
8134744
broken link path fix for items http_filters/grpc_json_transcoder_filt…
ankatare Nov 25, 2021
a042c13
Remove requested_server_name_ field from StreamInfo (#19102)
soulxu Nov 26, 2021
bfde85e
dep: Remove dependency - six (#19085)
kfaseela Nov 26, 2021
671b783
build(deps): bump slack-sdk in /.github/actions/pr_notifier (#19093)
dependabot[bot] Nov 26, 2021
1260a04
build(deps): bump charset-normalizer in /tools/dependency (#19105)
dependabot[bot] Nov 26, 2021
29569d8
kafka: dependency upgrades (#18995)
adamkotwasinski Nov 26, 2021
2950cf0
build(deps): bump frozendict from 2.0.7 to 2.1.0 in /tools/base (#19080)
dependabot[bot] Nov 29, 2021
56a3258
dep: update Proxy-Wasm C++ host (2021-11-18). (#19074)
mathetake Nov 29, 2021
2bf8478
tcp: fix overenthusiastic bounds on the new pool (#19036)
alyssawilk Nov 29, 2021
e3cb8ee
cve_scan: Use `envoy.dependency.cve_scan` (#19047)
phlax Nov 29, 2021
1143dd7
tools: Fix dependency checker release dates bug (#19109)
phlax Nov 29, 2021
209b7ba
Update QUICHE from c2ddf95dc to 7f2d442e3 (#19095)
RyanTheOptimist Nov 29, 2021
3b45d6c
Overload: Reset H2 server stream only use codec level reset mechanism…
KBaichoo Nov 29, 2021
b432368
http2: drain only once when reached max_requests_per_connection (#19078)
YaoZengzeng Nov 29, 2021
bf324a7
Fix verify_and_print_latest_release logic (#19111)
kfaseela Nov 30, 2021
d1fc2e3
lua: support body setBytes with header content length set automatical…
StarryVae Nov 30, 2021
3001370
ext-authz: fix missing UAEX flag on Denied CheckResponse (#18965)
pims Nov 30, 2021
c07bfee
build(deps): bump sphinx from 4.3.0 to 4.3.1 in /tools/base (#19122)
dependabot[bot] Nov 30, 2021
55a97dd
Stats: Filter stats to be flushed to sinks (#18805)
pradeepcrao Nov 30, 2021
76a70b4
Extend StatefulHeaderFormatter to allow forwarding HTTP1 reason phras…
syhpoon Nov 30, 2021
c716ec6
access_log: Added new command operator %VIRTUAL_CLUSTER_NAME% to retr…
agrawroh Nov 30, 2021
7ee1f77
Remove wrong ASSERT from MockOsSysCalls::setsockopt(). (#19126)
efimki Nov 30, 2021
3baae86
http2: remove unnecessary negative_capacity_ (#19057)
YaoZengzeng Nov 30, 2021
a02d3ce
http: testing failed writes (#19021)
alyssawilk Dec 1, 2021
ccc563e
Update boringssl version (#19152)
kfaseela Dec 1, 2021
510f1a9
listener: disallow duplicate port specification (#19145)
mattklein123 Dec 1, 2021
ef1faea
access_log: added new access_log command operator %UPSTREAM_REQUEST_A…
agrawroh Dec 1, 2021
8c9df52
docs: Add 1.20.1 release notes to main (#19163)
ggreenway Dec 1, 2021
77ca6cc
accesslogs: add CEL-based extension filter (#18363)
douglas-reid Dec 2, 2021
4b5eee6
Support proactive checks in overload manager Api (#18256)
Dec 2, 2021
94d0fdd
test: fix headerMapEqualIgnoreOrder utility missing a check (#19158)
tangsaidi Dec 2, 2021
2e0ad0b
thrift: don't close the downstream on an upstream overflow (#19133)
Dec 2, 2021
904f88a
test: adding HTTP/3 fail socket write test (#19171)
alyssawilk Dec 2, 2021
0e33d22
try fix for oss-fuzz build (#19164)
asraa Dec 2, 2021
e2e0a74
wasm: Fix potential segfault when reading filter_state (#17880)
lavignes Dec 3, 2021
3c27f5f
Simple benchmark to compare OwnedImpl::add to WatermarkBuffer::add (#…
antoniovicente Dec 3, 2021
b44d311
doc: fix incorrect link (#19179)
YaoZengzeng Dec 3, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions .github/actions/pr_notifier/requirements.txt
Original file line number Diff line number Diff line change
Expand Up @@ -111,9 +111,9 @@ six==1.16.0 \
--hash=sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926 \
--hash=sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254
# via pynacl
slack_sdk==3.11.2 \
--hash=sha256:131bf605894525c2d66da064677eabc19f53f02ce0f82a3f2fa130d4ec3bc1b0 \
--hash=sha256:35245ec34c8549fbb5c43ccc17101afd725b3508bb784da46530b214f496bf93
slack_sdk==3.12.0 \
--hash=sha256:a384d91c10229f94a9b2cae2ec5af2a683a3d5aee1287c01238630ab42747287 \
--hash=sha256:f779ff3dc266491b02ad056d28038ec5d708b2a438a3a8f8794fb1121d8274e2
# via -r requirements.in
urllib3==1.26.6 \
--hash=sha256:39fb8672126159acb139a7718dd10806104dec1e2f0f6c88aab05d17df10c8d4 \
Expand Down
1 change: 1 addition & 0 deletions CODEOWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
/api/ @envoyproxy/api-shepherds
# access loggers
/*/extensions/access_loggers/common @auni53 @zuercher
/*/extensions/access_loggers/filters/cel @dio @douglas-reid
/*/extensions/access_loggers/open_telemetry @itamarkam @yanavlasov
/*/extensions/access_loggers/stream @mattklein123 @davinci26
# compression extensions
Expand Down
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -197,7 +197,7 @@ Runtime features are set true by default by inclusion in
There are four suggested options for testing new runtime features:

1. Create a per-test Runtime::LoaderSingleton as done in [DeprecatedFieldsTest.IndividualFieldDisallowedWithRuntimeOverride](https://github.com/envoyproxy/envoy/blob/main/test/common/protobuf/utility_test.cc)
2. Create a [parameterized test](https://github.com/google/googletest/blob/master/googletest/docs/advanced.md#how-to-write-value-parameterized-tests)
2. Create a [parameterized test](https://github.com/google/googletest/blob/master/docs/advanced.md#how-to-write-value-parameterized-tests)
where the set up of the test sets the new runtime value explicitly to
GetParam() as outlined in (1).
3. Set up integration tests with custom runtime defaults as documented in the
Expand Down
1 change: 1 addition & 0 deletions api/BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -112,6 +112,7 @@ proto_library(
"//envoy/data/dns/v3:pkg",
"//envoy/data/tap/v3:pkg",
"//envoy/extensions/access_loggers/file/v3:pkg",
"//envoy/extensions/access_loggers/filters/cel/v3:pkg",
"//envoy/extensions/access_loggers/grpc/v3:pkg",
"//envoy/extensions/access_loggers/open_telemetry/v3:pkg",
"//envoy/extensions/access_loggers/stream/v3:pkg",
Expand Down
1 change: 1 addition & 0 deletions api/envoy/config/accesslog/v3/accesslog.proto
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,7 @@ message AccessLogFilter {
GrpcStatusFilter grpc_status_filter = 10;

// Extension filter.
// [#extension-category: envoy.access_loggers.extension_filters]
ExtensionFilter extension_filter = 11;

// Metadata Filter
Expand Down
6 changes: 5 additions & 1 deletion api/envoy/config/bootstrap/v3/bootstrap.proto
Original file line number Diff line number Diff line change
Expand Up @@ -329,7 +329,7 @@ message Bootstrap {

// Administration interface :ref:`operations documentation
// <operations_admin_interface>`.
// [#next-free-field: 6]
// [#next-free-field: 7]
message Admin {
option (udpa.annotations.versioning).previous_message_type = "envoy.config.bootstrap.v2.Admin";

Expand All @@ -355,6 +355,10 @@ message Admin {
// Additional socket options that may not be present in Envoy source code or
// precompiled binaries.
repeated core.v3.SocketOption socket_options = 4;

// Indicates whether :ref:`global_downstream_max_connections <config_overload_manager_limiting_connections>`
// should apply to the admin interface or not.
bool ignore_global_conn_limit = 6;
}

// Cluster manager :ref:`architecture overview <arch_overview_cluster_manager>`.
Expand Down
2 changes: 2 additions & 0 deletions api/envoy/config/cluster/v3/circuit_breaker.proto
Original file line number Diff line number Diff line change
Expand Up @@ -59,10 +59,12 @@ message CircuitBreakers {

// The maximum number of pending requests that Envoy will allow to the
// upstream cluster. If not specified, the default is 1024.
// This limit is applied as a connection limit for non-HTTP traffic.
google.protobuf.UInt32Value max_pending_requests = 3;

// The maximum number of parallel requests that Envoy will make to the
// upstream cluster. If not specified, the default is 1024.
// This limit does not apply to non-HTTP traffic.
google.protobuf.UInt32Value max_requests = 4;

// The maximum number of parallel retries that Envoy will allow to the
Expand Down
6 changes: 5 additions & 1 deletion api/envoy/config/listener/v3/listener.proto
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ message ListenerCollection {
repeated xds.core.v3.CollectionEntry entries = 1;
}

// [#next-free-field: 31]
// [#next-free-field: 32]
message Listener {
option (udpa.annotations.versioning).previous_message_type = "envoy.api.v2.Listener";

Expand Down Expand Up @@ -318,4 +318,8 @@ message Listener {
// Enable MPTCP (multi-path TCP) on this listener. Clients will be allowed to establish
// MPTCP connections. Non-MPTCP clients will fall back to regular TCP.
bool enable_mptcp = 30;

// Whether the listener should limit connections based upon the value of
// :ref:`global_downstream_max_connections <config_overload_manager_limiting_connections>`.
bool ignore_global_conn_limit = 31;
}
32 changes: 27 additions & 5 deletions api/envoy/config/route/v3/route_components.proto
Original file line number Diff line number Diff line change
Expand Up @@ -617,7 +617,7 @@ message CorsPolicy {
core.v3.RuntimeFractionalPercent shadow_enabled = 10;
}

// [#next-free-field: 38]
// [#next-free-field: 39]
message RouteAction {
option (udpa.annotations.versioning).previous_message_type = "envoy.api.v2.route.RouteAction";

Expand Down Expand Up @@ -981,20 +981,29 @@ message RouteAction {

oneof host_rewrite_specifier {
// Indicates that during forwarding, the host header will be swapped with
// this value.
// this value. Using this option will append the
// :ref:`config_http_conn_man_headers_x-forwarded-host` header if
// :ref:`append_x_forwarded_host <envoy_v3_api_field_config.route.v3.RouteAction.append_x_forwarded_host>`
// is set.
string host_rewrite_literal = 6
[(validate.rules).string = {well_known_regex: HTTP_HEADER_VALUE strict: false}];

// Indicates that during forwarding, the host header will be swapped with
// the hostname of the upstream host chosen by the cluster manager. This
// option is applicable only when the destination cluster for a route is of
// type *strict_dns* or *logical_dns*. Setting this to true with other cluster
// types has no effect.
// type *strict_dns* or *logical_dns*. Setting this to true with other cluster types
// has no effect. Using this option will append the
// :ref:`config_http_conn_man_headers_x-forwarded-host` header if
// :ref:`append_x_forwarded_host <envoy_v3_api_field_config.route.v3.RouteAction.append_x_forwarded_host>`
// is set.
google.protobuf.BoolValue auto_host_rewrite = 7;

// Indicates that during forwarding, the host header will be swapped with the content of given
// downstream or :ref:`custom <config_http_conn_man_headers_custom_request_headers>` header.
// If header value is empty, host header is left intact.
// If header value is empty, host header is left intact. Using this option will append the
// :ref:`config_http_conn_man_headers_x-forwarded-host` header if
// :ref:`append_x_forwarded_host <envoy_v3_api_field_config.route.v3.RouteAction.append_x_forwarded_host>`
// is set.
//
// .. attention::
//
Expand All @@ -1010,6 +1019,10 @@ message RouteAction {
// Indicates that during forwarding, the host header will be swapped with
// the result of the regex substitution executed on path value with query and fragment removed.
// This is useful for transitioning variable content between path segment and subdomain.
// Using this option will append the
// :ref:`config_http_conn_man_headers_x-forwarded-host` header if
// :ref:`append_x_forwarded_host <envoy_v3_api_field_config.route.v3.RouteAction.append_x_forwarded_host>`
// is set.
//
// For example with the following config:
//
Expand All @@ -1025,6 +1038,15 @@ message RouteAction {
type.matcher.v3.RegexMatchAndSubstitute host_rewrite_path_regex = 35;
}

// If set, then a host rewrite action (one of
// :ref:`host_rewrite_literal <envoy_v3_api_field_config.route.v3.RouteAction.host_rewrite_literal>`,
// :ref:`auto_host_rewrite <envoy_v3_api_field_config.route.v3.RouteAction.auto_host_rewrite>`,
// :ref:`host_rewrite_header <envoy_v3_api_field_config.route.v3.RouteAction.host_rewrite_header>`, or
// :ref:`host_rewrite_path_regex <envoy_v3_api_field_config.route.v3.RouteAction.host_rewrite_path_regex>`)
// causes the original value of the host header, if any, to be appended to the
// :ref:`config_http_conn_man_headers_x-forwarded-host` HTTP header.
bool append_x_forwarded_host = 38;

// Specifies the upstream timeout for the route. If not specified, the default is 15s. This
// spans between the point at which the entire downstream request (i.e. end-of-stream) has been
// processed and when the upstream response has been completely processed. A value of 0 will
Expand Down
9 changes: 9 additions & 0 deletions api/envoy/extensions/access_loggers/filters/cel/v3/BUILD
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# DO NOT EDIT. This file is generated by tools/proto_format/proto_sync.py.

load("@envoy_api//bazel:api_build_system.bzl", "api_proto_package")

licenses(["notice"]) # Apache 2

api_proto_package(
deps = ["@com_github_cncf_udpa//udpa/annotations:pkg"],
)
26 changes: 26 additions & 0 deletions api/envoy/extensions/access_loggers/filters/cel/v3/cel.proto
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
syntax = "proto3";

package envoy.extensions.access_loggers.filters.cel.v3;

import "udpa/annotations/status.proto";

option java_package = "io.envoyproxy.envoy.extensions.access_loggers.filters.cel.v3";
option java_outer_classname = "CelProto";
option java_multiple_files = true;
option (udpa.annotations.file_status).package_version_status = ACTIVE;

// [#protodoc-title: ExpressionFilter]
// [#extension: envoy.access_loggers.extension_filters.cel]

// ExpressionFilter is an access logging filter that evaluates configured
// symbolic Common Expression Language expressions to inform the decision
// to generate an access log.
message ExpressionFilter {
// Expression that, when evaluated, will be used to filter access logs.
// Expressions are based on the set of Envoy :ref:`attributes <arch_overview_attributes>`.
// The provided expression must evaluate to true for logging (expression errors are considered false).
// Examples:
// - `response.code >= 400`
// - `(connection.mtls && request.headers['x-log-mtls'] == 'true') || request.url_path.contains('v1beta3')`
string expression = 1;
}
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ option (udpa.annotations.file_status).package_version_status = ACTIVE;
// [#extension: envoy.filters.udp_listener.udp_proxy]

// Configuration for the UDP proxy filter.
// [#next-free-field: 7]
// [#next-free-field: 8]
message UdpProxyConfig {
option (udpa.annotations.versioning).previous_message_type =
"envoy.config.filter.udp.udp_proxy.v2alpha.UdpProxyConfig";
Expand Down Expand Up @@ -82,4 +82,9 @@ message UdpProxyConfig {
// :ref:`prefer_gro <envoy_v3_api_field_config.core.v3.UdpSocketConfig.prefer_gro>` is true for upstream
// sockets as the assumption is datagrams will be received from a single source.
config.core.v3.UdpSocketConfig upstream_socket_config = 6;

// Perform per packet load balancing (upstream host selection) on each received data chunk.
// The default if not specified is false, that means each data chunk is forwarded
// to upstream host selected on first chunk receival for that "session" (identified by source IP/port and local IP/port).
bool use_per_packet_load_balancing = 7;
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,7 @@ option (udpa.annotations.file_status).package_version_status = ACTIVE;
// See the :ref:`header casing <config_http_conn_man_header_casing>` configuration guide for more
// information.
message PreserveCaseFormatterConfig {
// Allows forwarding reason phrase text.
// This is off by default, and a standard reason phrase is used for a corresponding HTTP response code.
bool forward_reason_phrase = 1;
}
41 changes: 35 additions & 6 deletions api/envoy/extensions/transport_sockets/tls/v3/common.proto
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import "envoy/type/matcher/v3/string.proto";
import "google/protobuf/any.proto";
import "google/protobuf/wrappers.proto";

import "envoy/annotations/deprecation.proto";
import "udpa/annotations/migrate.proto";
import "udpa/annotations/sensitive.proto";
import "udpa/annotations/status.proto";
Expand Down Expand Up @@ -268,7 +269,26 @@ message CertificateProviderPluginInstance {
string certificate_name = 2;
}

// [#next-free-field: 15]
// Matcher for subject alternative names, to match both type and value of the SAN.
message SubjectAltNameMatcher {
// Indicates the choice of GeneralName as defined in section 4.2.1.5 of RFC 5280 to match
// against.
enum SanType {
SAN_TYPE_UNSPECIFIED = 0;
EMAIL = 1;
DNS = 2;
URI = 3;
IP_ADDRESS = 4;
}

// Specification of type of SAN. Note that the default enum value is an invalid choice.
SanType san_type = 1 [(validate.rules).enum = {defined_only: true not_in: 0}];

// Matcher for SAN value.
type.matcher.v3.StringMatcher matcher = 2 [(validate.rules).message = {required: true}];
}

// [#next-free-field: 16]
message CertificateValidationContext {
option (udpa.annotations.versioning).previous_message_type =
"envoy.api.v2.auth.CertificateValidationContext";
Expand Down Expand Up @@ -298,8 +318,8 @@ message CertificateValidationContext {
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.verify_certificate_spki>`,
// :ref:`verify_certificate_hash
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.verify_certificate_hash>`, or
// :ref:`match_subject_alt_names
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.match_subject_alt_names>`) is also
// :ref:`match_typed_subject_alt_names
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.match_typed_subject_alt_names>`) is also
// specified.
//
// It can optionally contain certificate revocation lists, in which case Envoy will verify
Expand Down Expand Up @@ -406,6 +426,8 @@ message CertificateValidationContext {

// An optional list of Subject Alternative name matchers. If specified, Envoy will verify that the
// Subject Alternative Name of the presented certificate matches one of the specified matchers.
// The matching uses "any" semantics, that is to say, the SAN is verified if at least one matcher is
// matched.
//
// When a certificate has wildcard DNS SAN entries, to match a specific client, it should be
// configured with exact match type in the :ref:`string matcher <envoy_v3_api_msg_type.matcher.v3.StringMatcher>`.
Expand All @@ -414,15 +436,22 @@ message CertificateValidationContext {
//
// .. code-block:: yaml
//
// match_subject_alt_names:
// exact: "api.example.com"
// match_typed_subject_alt_names:
// - san_type: DNS
// matcher:
// exact: "api.example.com"
//
// .. attention::
//
// Subject Alternative Names are easily spoofable and verifying only them is insecure,
// therefore this option must be used together with :ref:`trusted_ca
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.trusted_ca>`.
repeated type.matcher.v3.StringMatcher match_subject_alt_names = 9;
repeated SubjectAltNameMatcher match_typed_subject_alt_names = 15;

// This field is deprecated in favor of ref:`match_typed_subject_alt_names
// <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.match_typed_subject_alt_names>`
repeated type.matcher.v3.StringMatcher match_subject_alt_names = 9
[deprecated = true, (envoy.annotations.deprecated_at_minor_version) = "3.0"];

// [#not-implemented-hide:] Must present signed certificate time-stamp.
google.protobuf.BoolValue require_signed_certificate_timestamp = 6;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ option (udpa.annotations.file_status).package_version_status = ACTIVE;
// Note that SPIFFE validator inherits and uses the following options from :ref:`CertificateValidationContext <envoy_v3_api_msg_extensions.transport_sockets.tls.v3.CertificateValidationContext>`.
//
// - :ref:`allow_expired_certificate <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.allow_expired_certificate>` to allow expired certificates.
// - :ref:`match_subject_alt_names <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.match_subject_alt_names>` to match **URI** SAN of certificates. Unlike the default validator, SPIFFE validator only matches **URI** SAN (which equals to SVID in SPIFFE terminology) and ignore other SAN types.
// - :ref:`match_typed_subject_alt_names <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.match_typed_subject_alt_names>` to match **URI** SAN of certificates. Unlike the default validator, SPIFFE validator only matches **URI** SAN (which equals to SVID in SPIFFE terminology) and ignore other SAN types.
//
message SPIFFECertValidatorConfig {
message TrustDomain {
Expand Down
1 change: 1 addition & 0 deletions api/versioning/BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,7 @@ proto_library(
"//envoy/data/dns/v3:pkg",
"//envoy/data/tap/v3:pkg",
"//envoy/extensions/access_loggers/file/v3:pkg",
"//envoy/extensions/access_loggers/filters/cel/v3:pkg",
"//envoy/extensions/access_loggers/grpc/v3:pkg",
"//envoy/extensions/access_loggers/open_telemetry/v3:pkg",
"//envoy/extensions/access_loggers/stream/v3:pkg",
Expand Down
25 changes: 25 additions & 0 deletions bazel/external/quiche.BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,7 @@ envoy_cc_library(
"quiche/http2/adapter/http2_session.h",
"quiche/http2/adapter/http2_util.h",
"quiche/http2/adapter/http2_visitor_interface.h",
"quiche/http2/adapter/nghttp2.h",
"quiche/http2/adapter/nghttp2_adapter.h",
"quiche/http2/adapter/nghttp2_callbacks.h",
"quiche/http2/adapter/nghttp2_data_provider.h",
Expand All @@ -146,6 +147,8 @@ envoy_cc_library(
":spdy_core_header_block_lib",
":spdy_core_http2_deframer_lib",
":spdy_core_protocol_lib",
":spdy_header_byte_listener_interface_lib",
":spdy_no_op_headers_handler_lib",
],
)

Expand Down Expand Up @@ -864,6 +867,26 @@ envoy_cc_library(
],
)

envoy_cc_library(
name = "spdy_no_op_headers_handler_lib",
hdrs = ["quiche/spdy/core/no_op_headers_handler.h"],
repository = "@envoy",
visibility = ["//visibility:public"],
deps = [
":quiche_common_platform",
],
)

envoy_cc_library(
name = "spdy_header_byte_listener_interface_lib",
hdrs = ["quiche/spdy/core/header_byte_listener_interface.h"],
repository = "@envoy",
visibility = ["//visibility:public"],
deps = [
":quiche_common_platform",
],
)

envoy_cc_library(
name = "spdy_core_alt_svc_wire_format_lib",
srcs = ["quiche/spdy/core/spdy_alt_svc_wire_format.cc"],
Expand Down Expand Up @@ -1980,6 +2003,7 @@ envoy_cc_library(
"quiche/quic/core/crypto/curve25519_key_exchange.cc",
"quiche/quic/core/crypto/key_exchange.cc",
"quiche/quic/core/crypto/p256_key_exchange.cc",
"quiche/quic/core/crypto/quic_client_session_cache.cc",
"quiche/quic/core/crypto/quic_compressed_certs_cache.cc",
"quiche/quic/core/crypto/quic_crypto_client_config.cc",
"quiche/quic/core/crypto/quic_crypto_server_config.cc",
Expand All @@ -2000,6 +2024,7 @@ envoy_cc_library(
"quiche/quic/core/crypto/key_exchange.h",
"quiche/quic/core/crypto/p256_key_exchange.h",
"quiche/quic/core/crypto/proof_verifier.h",
"quiche/quic/core/crypto/quic_client_session_cache.h",
"quiche/quic/core/crypto/quic_compressed_certs_cache.h",
"quiche/quic/core/crypto/quic_crypto_client_config.h",
"quiche/quic/core/crypto/quic_crypto_server_config.h",
Expand Down
Loading