-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature request] Fault-in-standard-out option on TE header at 1xx and 204 #13868
Comments
CC @zuercher |
cc @alyssawilk to advise |
I think it's less about upgrading atomically and more about updating the value of that flag atomically. If atomic flag flips are problematic, I think it's plausible to break the runtime guards into upstream and downstream variants, and backport, given that Istio has done substantial work on stable releases. cc @PiotrSikora for that. I'll definitely keep such things in mind for future data plane guards. cc @snowp @mattklein123 as the other folks who tend to handle data plane changes |
subscribe |
Hi, any update on this? Will there be a feature to add those flags automatically through a configmap? |
I don't think anyone signed up to add a second flag. cc @zuercher |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged "help wanted" or "no stalebot" or other activity occurs. Thank you for your contributions. |
This issue has been automatically closed because it has not had activity in the last 37 days. If this issue is still valid, please ping a maintainer and ask them to label it as "help wanted" or "no stalebot". Thank you for your contributions. |
@lambdai I think we are still interested? |
Friendly bump on this, think we're still interested. From here it seems like the |
cc @alyssawilk wdyt? |
Yeah, I think we ought to split them up. |
I'll close the PR I just created (for #14650, because it referenced my PRs I thought it was just misnamed, fixed now). I'm on PTO starting tomorrow so I won't have time to look at this. |
@tbarrella Do you have the bandwidth for this? |
I should be able to do this. I'm assuming we don't want to break what happens when
vs.
vs.
The first option looks the most intuitive to me... @alyssawilk does that seem fine? |
I don't think we have precedent for this, so I'm game for anything which allows istio (and others) to roll out multi-level support. Keeping prior behavior with envoy.reloadable_features.strict_1xx_and_204_response_headers true is a nice to have, but I'm totally fine with say deleting that guard and replacing it with two new ones (for upstream / downstream) (permissive/strict), whatever makes sense. |
Thank you! I think I'll split it into two distinct guards so that the behavior is less confusing. |
#11458 and #10811 fixed the
transfer-encoding: chunked
behavior.Unfortunately the runtime-key is controlling both upstream and downstream.
Zero down time cannot be achieved unless the entire Envoy are upgraded atomically.
Is it possible to provide an option to tolerate non-standard upstream response and provide standard TE?
See the ideal state here.
istio/istio#28450 (comment)
The text was updated successfully, but these errors were encountered: