-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP/TESTING] backport: v1.17 - ci docker save(#17080) #17158
Conversation
* docs: kickoff 1.17.1 Signed-off-by: Shikugawa <[email protected]> * add version history Signed-off-by: Shikugawa <[email protected]> * add versionversion Signed-off-by: Shikugawa <[email protected]> * master -> main Signed-off-by: Shikugawa <[email protected]> * fix Signed-off-by: Shikugawa <[email protected]> * fix Signed-off-by: Shikugawa <[email protected]> * fix kafka server source Signed-off-by: Shikugawa <[email protected]> * deps: Add more SHAs to configs and kafka requirements.txt (envoyproxy#14887) Signed-off-by: Dhi Aurrahman <[email protected]> Signed-off-by: Shikugawa <[email protected]> * conflict Signed-off-by: yanavlasov <[email protected]> * examples: test/fix websocket ci flake (envoyproxy#14941) switch to 127.0.0.1 from localhost in ws example tests as this seeems to make ci <> websocat flakey Signed-off-by: Ryan Northey <[email protected]> Signed-off-by: Shikugawa <[email protected]> Co-authored-by: Dhi Aurrahman <[email protected]> Co-authored-by: yanavlasov <[email protected]> Co-authored-by: phlax <[email protected]>
Signed-off-by: Lizan Zhou <[email protected]>
Backport of envoyproxy#14676 Signed-off-by: Asra Ali <[email protected]> Signed-off-by: Piotr Sikora <[email protected]> Co-authored-by: asraa <[email protected]>
While there, refresh supported cipher suites and add more warnings. Backport of envoyproxy#14703 Signed-off-by: Piotr Sikora <[email protected]>
…g timer fire (envoyproxy#14799) (envoyproxy#15006) Fix a potential use-after-free error in ScaledRangeTimerManagerImpl by adding a processing_timers_ flag to the timer queues that is set during onQueueTimerFired processing. This flag is checked when a timer is removed to ensure that the timer's queue isn't deleted while it is in a callback triggered by onQueueTimerFired. Signed-off-by: Craig Radcliffe <[email protected]> Signed-off-by: Shikugawa <[email protected]>
…envoyproxy#15016) (envoyproxy#15078) Fixes proxy-wasm/proxy-wasm-cpp-host#125. Signed-off-by: Piotr Sikora <[email protected]>
…15199) Signed-off-by: Asra Ali <[email protected]>
Signed-off-by: Shikugawa <[email protected]>
Signed-off-by: Shikugawa <[email protected]> Co-authored-by: Matt Klein <[email protected]>
outlier_detector: accept large base_ejection_time when max_ejection_time not specified (envoyproxy#14962) Changed logic in config verification when max_ejection_time is not specified and base_ejection_time is larger than max_ejection_time's default. Signed-off-by: Christoph Pakulski <[email protected]>
…yproxy#15273) envoyproxy#10854 inadvertently changed the behavior of connect timeouts. This reinstates prior behavior. Risk Level: Low (reinstating prior behavior) Testing: added regression test Docs Changes: n/a Release Notes: inline Signed-off-by: Shikugawa <[email protected]> Co-authored-by: alyssawilk <[email protected]>
…nvoyproxy#15197) * Dispatcher: keeps a stack of tracked objects. (envoyproxy#14573) Dispatcher will now keep a stack of tracked objects; on crash it'll "unwind" and have those objects dump their state. Moreover, it'll invoke fatal actions with the tracked objects. This allows us to dump more information during crash. See related PR: envoyproxy#14509 Will follow up with another PR dumping information at the codec/parser level. Signed-off-by: Kevin Baichoo <[email protected]> Signed-off-by: Christoph Pakulski <[email protected]> * cluster: destroy on main thread (envoyproxy#14954) Signed-off-by: Yuchen Dai <[email protected]> Signed-off-by: Christoph Pakulski <[email protected]> * Updated release notes. Signed-off-by: Christoph Pakulski <[email protected]> Co-authored-by: Kevin Baichoo <[email protected]> Co-authored-by: Yuchen Dai <[email protected]>
Commit Message: ci: Fix macosx install flake Signed-off-by: Ryan Northey <[email protected]> Signed-off-by: Shikugawa <[email protected]>
…voyproxy#15224) (envoyproxy#15395) Previously, getHeaderMapValuei() would incorrectly return BadArgument when called in the access log phase after an early client disconnect, because the code assumed that a HeaderMap can point to a nullptr only when called from a callback in which given map is not available. Fixes proxy-wasm/proxy-wasm-rust-sdk#82. Signed-off-by: Piotr Sikora <[email protected]> Signed-off-by: Shikugawa <[email protected]> Co-authored-by: Piotr Sikora <[email protected]>
…roxy#15397) Signed-off-by: Ryan Northey [email protected] Signed-off-by: Shikugawa [email protected] For an explanation of how to fill out the fields, please see the relevant section in PULL_REQUESTS.md Commit Message: Additional Description: Risk Level: Testing: Docs Changes: Release Notes: Platform Specific Features: [Optional Runtime guard:] [Optional Fixes #Issue] [Optional Deprecated:] [Optional API Considerations:] Signed-off-by: Ryan Northey <[email protected]> Signed-off-by: Shikugawa <[email protected]> Co-authored-by: phlax <[email protected]>
…nvoyproxy#15396) Fixes envoyproxy#14878, proxy-wasm/proxy-wasm-cpp-sdk#81. Signed-off-by: Piotr Sikora <[email protected]> Signed-off-by: Shikugawa <[email protected]> Co-authored-by: Piotr Sikora <[email protected]>
Signed-off-by: Piotr Sikora <[email protected]>
Commit Message: Fixing a crash when the decoder receives an empty metadata map. Additional Description: Upon receiving an empty metadata map and trying to decode it an assertion is triggered in debug mode, and a seg-fault occurs in release mode. The proposed fix ignores the empty metadata maps and updates a stats if one is received. Risk Level: Medium for Envoy's running with Metadata support. Testing: Added integration tests. Docs Changes: Added a codec stats counter description. Release Notes: Added bug fix description. Platform Specific Features: N/A. Fixes a fuzz bug: 25303 Signed-off-by: Adi Suissa-Peleg <[email protected]> Signed-off-by: Tony Allen <[email protected]>
Fix for CVE-2021-28683 (crash when peer sends an SSL Alert with an unknown code) Signed-off-by: Greg Greenway <[email protected]> Co-authored-by: Christoph Pakulski <[email protected]> Signed-off-by: Tony Allen <[email protected]>
Fixes CVE-2021-28682, a remotely exploitable integer overflow. Signed-off-by: Asra Ali <[email protected]> Co-authored-by: Tony Allen <[email protected]> Co-authored-by: Christoph Pakulski <[email protected]> Signed-off-by: Tony Allen <[email protected]>
Signed-off-by: Tony Allen <[email protected]>
Signed-off-by: Yan Avlasov <[email protected]>
…mptyMetadata test (envoyproxy#16343) Signed-off-by: Yan Avlasov <[email protected]>
Fixes: CVE-2021-29492 Signed-off-by: Yan Avlasov <[email protected]>
Signed-off-by: Yan Avlasov <[email protected]>
…oxy#16369) (envoyproxy#16663) Commit Message: apple dns - fix interface issue with localhost lookup Additional Description: deleting ENVOY_BUG statement, as localhost dns resolution renders a valid non-zero interface index. Risk Level: low Testing: fixed previously existing test that did not have a run block. Signed-off-by: Jose Nino <[email protected]> Signed-off-by: Dmitri Dolguikh <[email protected]> Co-authored-by: Jose Ulises Nino Rivera <[email protected]>
Signed-off-by: Yan Avlasov <[email protected]>
Signed-off-by: Ryan Northey <[email protected]>
CC @envoyproxy/api-shepherds: Your approval is needed for changes made to |
apologies - wrong target branch - closing |
Commit Message: backport: v1.17 - ci docker save #17080
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]