Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[WIP/TESTING] backport: v1.17 - ci docker save(#17080) #17158

Closed
wants to merge 28 commits into from

Conversation

phlax
Copy link
Member

@phlax phlax commented Jun 25, 2021

Commit Message: backport: v1.17 - ci docker save #17080
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

Shikugawa and others added 28 commits February 5, 2021 14:56
* docs: kickoff 1.17.1

Signed-off-by: Shikugawa <[email protected]>

* add version history

Signed-off-by: Shikugawa <[email protected]>

* add versionversion

Signed-off-by: Shikugawa <[email protected]>

* master -> main

Signed-off-by: Shikugawa <[email protected]>

* fix

Signed-off-by: Shikugawa <[email protected]>

* fix

Signed-off-by: Shikugawa <[email protected]>

* fix kafka server source

Signed-off-by: Shikugawa <[email protected]>

* deps: Add more SHAs to configs and kafka requirements.txt (envoyproxy#14887)

Signed-off-by: Dhi Aurrahman <[email protected]>
Signed-off-by: Shikugawa <[email protected]>

* conflict

Signed-off-by: yanavlasov <[email protected]>

* examples: test/fix websocket ci flake (envoyproxy#14941)

switch to 127.0.0.1 from localhost in ws example tests as this seeems to make ci <> websocat flakey

Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Shikugawa <[email protected]>

Co-authored-by: Dhi Aurrahman <[email protected]>
Co-authored-by: yanavlasov <[email protected]>
Co-authored-by: phlax <[email protected]>
Backport of envoyproxy#14676

Signed-off-by: Asra Ali <[email protected]>
Signed-off-by: Piotr Sikora <[email protected]>

Co-authored-by: asraa <[email protected]>
While there, refresh supported cipher suites and add more warnings.

Backport of envoyproxy#14703

Signed-off-by: Piotr Sikora <[email protected]>
…g timer fire (envoyproxy#14799) (envoyproxy#15006)

Fix a potential use-after-free error in ScaledRangeTimerManagerImpl by adding a processing_timers_ flag to the timer queues that is set during onQueueTimerFired processing. This flag is checked when a timer is removed to ensure that the timer's queue isn't deleted while it is in a callback triggered by onQueueTimerFired.

Signed-off-by: Craig Radcliffe <[email protected]>
Signed-off-by: Shikugawa <[email protected]>
Signed-off-by: Shikugawa <[email protected]>
Co-authored-by: Matt Klein <[email protected]>
outlier_detector: accept large base_ejection_time when max_ejection_time not specified (envoyproxy#14962)

Changed logic in config verification when max_ejection_time is not specified
and base_ejection_time is larger than max_ejection_time's default.

Signed-off-by: Christoph Pakulski <[email protected]>
…yproxy#15273)

envoyproxy#10854 inadvertently changed the behavior of connect timeouts. This reinstates prior behavior.

Risk Level: Low (reinstating prior behavior)
Testing: added regression test
Docs Changes: n/a
Release Notes: inline

Signed-off-by: Shikugawa <[email protected]>
Co-authored-by: alyssawilk <[email protected]>
…nvoyproxy#15197)

* Dispatcher: keeps a stack of tracked objects. (envoyproxy#14573)

Dispatcher will now keep a stack of tracked objects; on crash it'll "unwind" and have those objects dump their state. Moreover, it'll invoke fatal actions with the tracked objects. This allows us to dump more information during crash.

See related PR: envoyproxy#14509

Will follow up with another PR dumping information at the codec/parser level.

Signed-off-by: Kevin Baichoo <[email protected]>
Signed-off-by: Christoph Pakulski <[email protected]>

* cluster: destroy on main thread (envoyproxy#14954)

Signed-off-by: Yuchen Dai <[email protected]>
Signed-off-by: Christoph Pakulski <[email protected]>

* Updated release notes.

Signed-off-by: Christoph Pakulski <[email protected]>

Co-authored-by: Kevin Baichoo <[email protected]>
Co-authored-by: Yuchen Dai <[email protected]>
Commit Message: ci: Fix macosx install flake

Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Shikugawa <[email protected]>
…voyproxy#15224) (envoyproxy#15395)

Previously, getHeaderMapValuei() would incorrectly return BadArgument
when called in the access log phase after an early client disconnect,
because the code assumed that a HeaderMap can point to a nullptr only
when called from a callback in which given map is not available.

Fixes proxy-wasm/proxy-wasm-rust-sdk#82.

Signed-off-by: Piotr Sikora <[email protected]>
Signed-off-by: Shikugawa <[email protected]>

Co-authored-by: Piotr Sikora <[email protected]>
…roxy#15397)

Signed-off-by: Ryan Northey [email protected]
Signed-off-by: Shikugawa [email protected]

For an explanation of how to fill out the fields, please see the relevant section
in PULL_REQUESTS.md

Commit Message:
Additional Description:
Risk Level:
Testing:
Docs Changes:
Release Notes:
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue]
[Optional Deprecated:]
[Optional API Considerations:]

Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Shikugawa <[email protected]>

Co-authored-by: phlax <[email protected]>
Commit Message: Fixing a crash when the decoder receives an empty metadata map.

Additional Description:
Upon receiving an empty metadata map and trying to decode it an assertion is triggered in debug mode, and a seg-fault occurs in release mode.
The proposed fix ignores the empty metadata maps and updates a stats if one is received.

Risk Level: Medium for Envoy's running with Metadata support.
Testing: Added integration tests.
Docs Changes: Added a codec stats counter description.
Release Notes: Added bug fix description.
Platform Specific Features: N/A.
Fixes a fuzz bug: 25303

Signed-off-by: Adi Suissa-Peleg <[email protected]>
Signed-off-by: Tony Allen <[email protected]>
Fix for CVE-2021-28683 (crash when peer sends an SSL Alert with an unknown code)

Signed-off-by: Greg Greenway <[email protected]>
Co-authored-by: Christoph Pakulski <[email protected]>
Signed-off-by: Tony Allen <[email protected]>
Fixes CVE-2021-28682, a remotely exploitable integer overflow.

Signed-off-by: Asra Ali <[email protected]>
Co-authored-by: Tony Allen <[email protected]>
Co-authored-by: Christoph Pakulski <[email protected]>
Signed-off-by: Tony Allen <[email protected]>
Signed-off-by: Tony Allen <[email protected]>
Fixes: CVE-2021-29492

Signed-off-by: Yan Avlasov <[email protected]>
Signed-off-by: Yan Avlasov <[email protected]>
…oxy#16369) (envoyproxy#16663)

Commit Message: apple dns - fix interface issue with localhost lookup
Additional Description: deleting ENVOY_BUG statement, as localhost dns resolution renders a valid non-zero interface index.
Risk Level: low
Testing: fixed previously existing test that did not have a run block.

Signed-off-by: Jose Nino <[email protected]>
Signed-off-by: Dmitri Dolguikh <[email protected]>

Co-authored-by: Jose Ulises Nino Rivera <[email protected]>
@repokitteh-read-only repokitteh-read-only bot added the deps Approval required for changes to Envoy's external dependencies label Jun 25, 2021
@repokitteh-read-only
Copy link

CC @envoyproxy/api-shepherds: Your approval is needed for changes made to (api/envoy[\w/]*/(v1alpha\d?|v1|v2alpha\d?|v2))|(api/envoy/type/(matcher/)?\w+.proto).
CC @envoyproxy/api-shepherds: Your approval is needed for changes made to api/envoy/.
envoyproxy/api-shepherds assignee is @adisuissa
CC @envoyproxy/api-watchers: FYI only for changes made to api/envoy/.
CC @envoyproxy/dependency-shepherds: Your approval is needed for changes made to (bazel/.*repos.*\.bzl)|(bazel/dependency_imports\.bzl)|(api/bazel/.*\.bzl)|(.*/requirements\.txt)|(.*\.patch).

🐱

Caused by: #17158 was opened by phlax.

see: more, trace.

@phlax
Copy link
Member Author

phlax commented Jun 25, 2021

apologies - wrong target branch - closing

@phlax phlax closed this Jun 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
api deps Approval required for changes to Envoy's external dependencies v2-freeze
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants