Skip to content

syncfrom master.#93

Merged
wangfakang merged 11 commits intowangfakang:masterfrom
envoyproxy:main
Jun 2, 2021
Merged

syncfrom master.#93
wangfakang merged 11 commits intowangfakang:masterfrom
envoyproxy:main

Conversation

@wangfakang
Copy link
Copy Markdown
Owner

Commit Message:
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

goaway and others added 11 commits May 28, 2021 17:02
Signed-off-by: Mike Schore <mike.schore@gmail.com>
Signed-off-by: Ryan Northey <ryan@synca.io>
WebAssembly Micro Runtime (WAMR) is a standalone WebAssembly (WASM) runtime with a small footprint. It includes a few parts as below:

The "iwasm" VM core, supporting WebAssembly interpreter, ahead of time compilation (AoT) and Just-in-Time compilation (JIT)

The application framework and the supporting API's for the WASM applications

The dynamic management of the WASM applications

Risk Level: Medium
Testing: Runtime unit testing, integration testing and manual testing

Signed-off-by: Le Yao <le.yao@intel.com>
Signed-off-by: Long Dai <long0dai@foxmail.com>
…hod (#16673)

Commit Message: http: refactory Http::Utility::resolveMostSpecificPerFilterConfig method
Additional Description:
The Http::Utility::resolveMostSpecificPerFilterConfig and RouteEntry::mostSpecificPerFilterConfigTyped are doing
the same thing. RouteEntry::mostSpecificPerFilterConfigTyped is more efficient, and Http::Utility::resolveMostSpecificPerFilterConfig can take care some of sanity checks. So converge them. Refactory Http::Utility::resolveMostSpecificPerFilterConfig to use
RouteEntry::mostSpecificPerFilterConfigTyped. And using Http::Utility::resolveMostSpecificPerFilterConfig for the filters consistently.
Risk Level: low
Testing: unittest
Docs Changes: n/a
Release Notes: n/a
Fixes #14894

Signed-off-by: He Jie Xu <hejie.xu@intel.com>
…16517)

Risk level: Low
Testing: Unit tests modified.

Signed-off-by: Harvey Tuch <htuch@google.com>
* build(deps): bump importlib-metadata in /tools/code_format

Bumps [importlib-metadata](https://github.com/python/importlib_metadata) from 4.2.0 to 4.4.0.
- [Release notes](https://github.com/python/importlib_metadata/releases)
- [Changelog](https://github.com/python/importlib_metadata/blob/main/CHANGES.rst)
- [Commits](python/importlib_metadata@v4.2.0...v4.4.0)

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Ryan Northey <ryan@synca.io>

* build(deps): bump certifi from 2020.12.5 to 2021.5.30 in /docs

Bumps [certifi](https://github.com/certifi/python-certifi) from 2020.12.5 to 2021.5.30.
- [Release notes](https://github.com/certifi/python-certifi/releases)
- [Commits](certifi/python-certifi@2020.12.05...2021.05.30)

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Ryan Northey <ryan@synca.io>

* build(deps): bump certifi in /tools/dependency

Bumps [certifi](https://github.com/certifi/python-certifi) from 2020.12.5 to 2021.5.30.
- [Release notes](https://github.com/certifi/python-certifi/releases)
- [Commits](certifi/python-certifi@2020.12.05...2021.05.30)

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Ryan Northey <ryan@synca.io>

* build(deps): bump certifi in /tools/deprecate_version

Bumps [certifi](https://github.com/certifi/python-certifi) from 2020.12.5 to 2021.5.30.
- [Release notes](https://github.com/certifi/python-certifi/releases)
- [Commits](certifi/python-certifi@2020.12.05...2021.05.30)

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Ryan Northey <ryan@synca.io>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
In TLS 1.3, tickets come after the handshake. Therefore the session from
the handshake is not a resumable object that can be installed in a
different connection as with previous versions. For compatibility,
BoringSSL creates dummy SSL_SESSION objects but they will never resume
if used.

However, BoringSSL currently erroneously/confusingly returns true from
SSL_SESSION_is_resumable on these dummy sessions. We're going to change
that, but Envoy tests currently depend on it. This change addresses
that.

Additionally, the return value of this function was never used and thus
a little more cleanup is possible.

Signed-off-by: Adam Langley <agl@google.com>
Add mocks of the various AlternateProtocolsCache classes.

Risk Level: Low
Testing: Test-only code
Docs Changes: N/A
Release Notes: N/A
Platform Specific Features: N/A

Signed-off-by: Ryan Hamilton <rch@google.com>
Commit Message: Add http proxy proto support.
Additional Description: The main addition here is setting the proxy protocol filter state information so that the upstream proxy proto transport socket can use that info to properly generate the header.
Risk Level: medium?
Testing: functional, integration
Docs Changes: Added details to IP Transparency page for using proxy proto with HTTP
Release Notes: Added note for http proxy proto support
Fixes #15463
Signed-off-by: Weston Carlson <wez470@gmail.com>
Risk Level: Low
Testing: n/a
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Long Dai <long0dai@foxmail.com>
@wangfakang wangfakang merged commit 4c88aad into wangfakang:master Jun 2, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

9 participants