Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge release-1.1 to master #2032

Merged
merged 21 commits into from
Nov 8, 2018
Merged

Merge release-1.1 to master #2032

merged 21 commits into from
Nov 8, 2018

Conversation

rshriram
Copy link
Member

@rshriram rshriram commented Nov 8, 2018

No description provided.

rshriram and others added 21 commits October 30, 2018 13:58
Signed-off-by: Shriram Rajagopalan <[email protected]>
* Improve performance by removing MD5 for check cache keys

Signed-off-by: Wayne Zhang <[email protected]>

* not to allocate memory from stack

Signed-off-by: Wayne Zhang <[email protected]>

* Make debug string readable

Signed-off-by: Wayne Zhang <[email protected]>
Signed-off-by: Shriram Rajagopalan <[email protected]>
Signed-off-by: Shriram Rajagopalan <[email protected]>
Signed-off-by: Shriram Rajagopalan <[email protected]>
Signed-off-by: Shriram Rajagopalan <[email protected]>
Signed-off-by: Shriram Rajagopalan <[email protected]>
Send dynamic metadata as part of report calls
)

* use string map instead of opaque struct for dynamic metadata

Signed-off-by: Shriram Rajagopalan <[email protected]>

* format

Signed-off-by: Shriram Rajagopalan <[email protected]>

* double format

Signed-off-by: Shriram Rajagopalan <[email protected]>

* skip empty maps

Signed-off-by: Shriram Rajagopalan <[email protected]>
This commit adds a new TCP cluster rewrite filter which allows users to
rewrite TCP cluster names obtained via TLS SNI by matching via regex
configuration.

Signed-off-by: Venil Noronha <[email protected]>
This commit updates the TCP Cluster Rewrite filter name to
envoy.filters.network.tcp_cluster_rewrite.

Signed-off-by: Venil Noronha <[email protected]>
This commit enables the static registration of the TCP Cluster Rewrite
filter by updating the build configuration.

Signed-off-by: Venil Noronha <[email protected]>
Envoy /server_info API was inconsistent intermittently causing errors on
a Proxy update on Istio. This update will bring in the API fix to Istio.

Signed-off-by: Venil Noronha <[email protected]>
This commit updates the Envoy SHA to 74de08a
to bring in the new TCP RBAC filter to Istio.

Signed-off-by: Venil Noronha <[email protected]>
* Improve performance by removing MD5 for check cache keys (istio#2002)

* Improve performance by removing MD5 for check cache keys

Signed-off-by: Wayne Zhang <[email protected]>

* not to allocate memory from stack

Signed-off-by: Wayne Zhang <[email protected]>

* Make debug string readable

Signed-off-by: Wayne Zhang <[email protected]>

* alts: remove ALTS (istio#2003)

Signed-off-by: Lizan Zhou <[email protected]>

* Use std::hash for check cache. (istio#2009)

Signed-off-by: Wayne Zhang <[email protected]>

* Remove tests to compare signature values (istio#2015)

Signed-off-by: Wayne Zhang <[email protected]>

* update sample envoy config to latest version (istio#2016)

* Add a new TCP cluster rewrite filter (istio#2017)

* Add a new TCP cluster rewrite filter

This commit adds a new TCP cluster rewrite filter which allows users to
rewrite TCP cluster names obtained via TLS SNI by matching via regex
configuration.

Signed-off-by: Venil Noronha <[email protected]>

* Make TCP cluster rewrite stackable on SNI filter

This commit updates the TCP Cluster Rewrite filter to be stackable on
the SNI Cluster filter.

Signed-off-by: Venil Noronha <[email protected]>

* Update TCP Cluster Rewrite filter name (istio#2019)

This commit updates the TCP Cluster Rewrite filter name to
envoy.filters.network.tcp_cluster_rewrite.

Signed-off-by: Venil Noronha <[email protected]>

* Enable TCP Cluster Rewrite filter registration (istio#2021)

This commit enables the static registration of the TCP Cluster Rewrite
filter by updating the build configuration.

Signed-off-by: Venil Noronha <[email protected]>

* Update Envoy SHA to 4ef8562 (istio#2023)

Envoy /server_info API was inconsistent intermittently causing errors on
a Proxy update on Istio. This update will bring in the API fix to Istio.

Signed-off-by: Venil Noronha <[email protected]>

* add proxy postsubmit periodic (istio#2025)
@googlebot
Copy link
Collaborator

So there's good news and bad news.

👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there.

😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request.

Note to project maintainer: This is a terminal state, meaning the cla/google commit status will not change from this state. It's up to you to confirm consent of all the commit author(s), set the cla label to yes (if enabled on your project), and then merge this pull request when appropriate.

@googlebot googlebot added the cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. label Nov 8, 2018
Copy link
Member

@venilnoronha venilnoronha left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rshriram, venilnoronha

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@rshriram rshriram merged commit 4cfa354 into istio:master Nov 8, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants