Skip to content

Commit

Permalink
Merge master to release-1.1 (envoyproxy#2038)
Browse files Browse the repository at this point in the history
* Improve performance by removing MD5 for check cache keys (envoyproxy#2002)

* Improve performance by removing MD5 for check cache keys

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* not to allocate memory from stack

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* Make debug string readable

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* alts: remove ALTS (envoyproxy#2003)

Signed-off-by: Lizan Zhou <lizan@tetrate.io>

* Use std::hash for check cache. (envoyproxy#2009)

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* Remove tests to compare signature values (envoyproxy#2015)

Signed-off-by: Wayne Zhang <qiwzhang@google.com>

* update sample envoy config to latest version (envoyproxy#2016)

* Add a new TCP cluster rewrite filter (envoyproxy#2017)

* Add a new TCP cluster rewrite filter

This commit adds a new TCP cluster rewrite filter which allows users to
rewrite TCP cluster names obtained via TLS SNI by matching via regex
configuration.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Make TCP cluster rewrite stackable on SNI filter

This commit updates the TCP Cluster Rewrite filter to be stackable on
the SNI Cluster filter.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Update TCP Cluster Rewrite filter name (envoyproxy#2019)

This commit updates the TCP Cluster Rewrite filter name to
envoy.filters.network.tcp_cluster_rewrite.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Enable TCP Cluster Rewrite filter registration (envoyproxy#2021)

This commit enables the static registration of the TCP Cluster Rewrite
filter by updating the build configuration.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* Update Envoy SHA to 4ef8562 (envoyproxy#2023)

Envoy /server_info API was inconsistent intermittently causing errors on
a Proxy update on Istio. This update will bring in the API fix to Istio.

Signed-off-by: Venil Noronha <veniln@vmware.com>

* add proxy postsubmit periodic (envoyproxy#2025)

* Update Envoy SHA to c41fa71 (envoyproxy#2029)

* Update Envoy SHA

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>

* Fix format.

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>

* bazel: Allow to distdir all dependencies (envoyproxy#2034)

To use --distdir option of Bazel (which allows to use previously
fetched tarballs instead of downloading dependencies during
build), all dependencies should use http instead of git and need
to have sha256 sums specified.

Signed-off-by: Michal Rostecki <mrostecki@suse.de>

* bazel: Remove BoringSSL repository (envoyproxy#2035)

Pull request envoyproxy#2002 removed signature calculation which was using
BoringSSL as a dependency. BoringSSL is not needed anymore.

Signed-off-by: Michal Rostecki <mrostecki@suse.de>

* Update Envoy SHA to fcc68f1 (envoyproxy#2037)

* Update Envoy SHA to fcc68f1

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>

* Update SHA256

Signed-off-by: JimmyCYJ <jimmychen.0102@gmail.com>
  • Loading branch information
JimmyCYJ authored and istio-testing committed Nov 14, 2018
1 parent 4d8eb98 commit 9b91ac6
Show file tree
Hide file tree
Showing 9 changed files with 98 additions and 46 deletions.
1 change: 1 addition & 0 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ test_tsan:

check:
@script/check-license-headers
@script/check-repositories
@script/check-style

artifacts: build
Expand Down
16 changes: 11 additions & 5 deletions WORKSPACE
Original file line number Diff line number Diff line change
Expand Up @@ -30,12 +30,14 @@ bind(
)

# When updating envoy sha manually please update the sha in istio.deps file also
ENVOY_SHA = "74de08a0d4d31bd466639d25d681df5d290bb770"
ENVOY_SHA = "fcc68f1165d0343891d3ce14c2952019fe403743"
ENVOY_SHA256 = "44b38c68be6f80deffb26c91151d3bf7e97575d286d5316770473dc1dc2198de"

http_archive(
name = "envoy",
strip_prefix = "envoy-" + ENVOY_SHA,
url = "https://github.com/envoyproxy/envoy/archive/" + ENVOY_SHA + ".zip",
sha256 = ENVOY_SHA256,
)

load("@envoy//bazel:repositories.bzl", "envoy_dependencies")
Expand All @@ -51,9 +53,13 @@ load("@io_bazel_rules_go//go:def.bzl", "go_rules_dependencies", "go_register_too
go_rules_dependencies()
go_register_toolchains()

load("@bazel_tools//tools/build_defs/repo:git.bzl", "git_repository")
git_repository(
# Nov 28, 2017 (bazel 0.8.0 support)
RULES_PROTOBUF_SHA = "563b674a2ce6650d459732932ea2bc98c9c9a9bf"
RULES_PROTOBUF_SHA256 = "338e0d65cd709c6a6f9b5702466e641d536479be8b564d1e12a5d1de22a5cff6"

http_archive(
name = "org_pubref_rules_protobuf",
commit = "563b674a2ce6650d459732932ea2bc98c9c9a9bf", # Nov 28, 2017 (bazel 0.8.0 support)
remote = "https://github.com/pubref/rules_protobuf",
strip_prefix = "rules_protobuf-" + RULES_PROTOBUF_SHA,
url = "https://github.com/pubref/rules_protobuf/archive/" + RULES_PROTOBUF_SHA + ".tar.gz",
sha256 = RULES_PROTOBUF_SHA256,
)
11 changes: 7 additions & 4 deletions cc_gogo_protobuf.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,10 @@
#
################################################################################
#
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

load("@bazel_tools//tools/build_defs/repo:git.bzl", "new_git_repository")
GOGO_PROTO_SHA = "100ba4e885062801d56799d78530b73b178a78f3"
GOGO_PROTO_SHA256 = "b04eb8eddd2d15d8b12d111d4ef7816fca6e5c5d495adf45fb8478278aa80f79"

def cc_gogoproto_repositories(bind=True):
BUILD = """
Expand Down Expand Up @@ -56,10 +58,11 @@ cc_proto_library(
],
)
"""
new_git_repository(
http_archive(
name = "gogoproto_git",
commit = "100ba4e885062801d56799d78530b73b178a78f3",
remote = "https://github.com/gogo/protobuf",
strip_prefix = "protobuf-" + GOGO_PROTO_SHA,
url = "https://github.com/gogo/protobuf/archive/" + GOGO_PROTO_SHA + ".tar.gz",
sha256 = GOGO_PROTO_SHA256,
build_file_content = BUILD,
)

Expand Down
12 changes: 8 additions & 4 deletions googleapis.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,11 @@
#
################################################################################
#
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

load("@bazel_tools//tools/build_defs/repo:git.bzl", "new_git_repository")
# Oct 21, 2016 (only release pre-dates sha)
GOOGLEAPIS_SHA = "13ac2436c5e3d568bd0e938f6ed58b77a48aba15"
GOOGLEAPIS_SHA256 = "f48956fb8c55617ed052c20884465f06b9a57b807164431185be397ea46993ca"

def googleapis_repositories(bind=True):
GOOGLEAPIS_BUILD_FILE = """
Expand All @@ -37,11 +40,12 @@ cc_proto_library(
)
"""
new_git_repository(
http_archive(
name = "com_github_googleapis_googleapis",
build_file_content = GOOGLEAPIS_BUILD_FILE,
commit = "13ac2436c5e3d568bd0e938f6ed58b77a48aba15", # Oct 21, 2016 (only release pre-dates sha)
remote = "https://github.com/googleapis/googleapis.git",
strip_prefix = "googleapis-" + GOOGLEAPIS_SHA,
url = "https://github.com/googleapis/googleapis/archive/" + GOOGLEAPIS_SHA + ".tar.gz",
sha256 = GOOGLEAPIS_SHA256,
)

if bind:
Expand Down
2 changes: 1 addition & 1 deletion istio.deps
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,6 @@
"name": "ENVOY_SHA",
"repoName": "envoyproxy/envoy",
"file": "WORKSPACE",
"lastStableSHA": "74de08a0d4d31bd466639d25d681df5d290bb770"
"lastStableSHA": "fcc68f1165d0343891d3ce14c2952019fe403743"
}
]
13 changes: 9 additions & 4 deletions protobuf.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -14,14 +14,19 @@
#
################################################################################
#
load("@bazel_tools//tools/build_defs/repo:git.bzl", "git_repository")
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

# Match SHA used by Envoy
PROTOBUF_SHA = "fa252ec2a54acb24ddc87d48fed1ecfd458445fd"
PROTOBUF_SHA256 = "3d610ac90f8fa16e12490088605c248b85fdaf23114ce4b3605cdf81f7823604"

def protobuf_repositories(load_repo=True, bind=True):
if load_repo:
git_repository(
http_archive(
name = "com_google_protobuf",
commit = "fa252ec2a54acb24ddc87d48fed1ecfd458445fd", # Match SHA used by Envoy
remote = "https://github.com/google/protobuf.git",
strip_prefix = "protobuf-" + PROTOBUF_SHA,
url = "https://github.com/google/protobuf/archive/" + PROTOBUF_SHA + ".tar.gz",
sha256 = PROTOBUF_SHA256,
)

if bind:
Expand Down
36 changes: 12 additions & 24 deletions repositories.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -14,25 +14,10 @@
#
################################################################################
#
load("@bazel_tools//tools/build_defs/repo:git.bzl", "git_repository")
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

def boringssl_repositories(bind=True):
git_repository(
name = "boringssl",
commit = "12c35d69008ae6b8486e435447445240509f7662", # 2016-10-24
remote = "https://boringssl.googlesource.com/boringssl",
)

if bind:
native.bind(
name = "boringssl_crypto",
actual = "@boringssl//:crypto",
)

native.bind(
name = "libssl",
actual = "@boringssl//:ssl",
)
GOOGLETEST = "d225acc90bc3a8c420a9bcd1f033033c1ccd7fe0"
GOOGLETEST_SHA256 = "01508c8f47c99509130f128924f07f3a60be05d039cff571bb11d60bb11a3581"

def googletest_repositories(bind=True):
BUILD = """
Expand Down Expand Up @@ -90,11 +75,12 @@ cc_library(
visibility = ["//visibility:public"],
)
"""
native.new_git_repository(
http_archive(
name = "googletest_git",
build_file_content = BUILD,
commit = "d225acc90bc3a8c420a9bcd1f033033c1ccd7fe0",
remote = "https://github.com/google/googletest.git",
strip_prefix = "googletest-" + GOOGLETEST,
url = "https://github.com/google/googletest/archive/" + GOOGLETEST + ".tar.gz",
sha256 = GOOGLETEST_SHA256,
)

if bind:
Expand All @@ -114,6 +100,7 @@ cc_library(
)

ISTIO_API = "6b9e3a501e6ef254958bf82f7b74c37d64a57a15"
ISTIO_API_SHA256 = "ce43fcc51bd7c653d39b810e50df68e32ed95991919c1d1f2f56b331d79e674e"

def mixerapi_repositories(bind=True):
BUILD = """
Expand Down Expand Up @@ -212,11 +199,12 @@ filegroup(
)
"""
native.new_git_repository(
http_archive(
name = "mixerapi_git",
build_file_content = BUILD,
commit = ISTIO_API,
remote = "https://github.com/istio/api.git",
strip_prefix = "api-" + ISTIO_API,
url = "https://github.com/istio/api/archive/" + ISTIO_API + ".tar.gz",
sha256 = ISTIO_API_SHA256,
)
if bind:
native.bind(
Expand Down
40 changes: 40 additions & 0 deletions script/check-repositories
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
#!/bin/bash
#
# Copyright 2018 Istio Authors. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

set -eu

# Check whether any git repositories are defined.
# Git repository definition contains `commit` and `remote` fields.
if grep -nr "commit =\|remote =" --include=WORKSPACE --include=*.bzl .; then
echo "Using git repositories is not allowed."
echo "To ensure that all dependencies can be stored offline in distdir, only HTTP repositories are allowed."
exit 1
fi

# Check whether number of defined `url =` and `sha256 =` kwargs in repository
# definitions is equal.
urls_count=$(grep -nr "url =" --include=WORKSPACE --include=*.bzl | wc -l)
sha256sums_count=$(grep -nr "sha256 =" --include=WORKSPACE --include=*.bzl | wc -l)

if [[ $urls_count != $sha256sums_count ]]; then
echo "Found more defined repository URLs than SHA256 sums, which means that there are some repositories without sums."
echo "Dependencies without SHA256 sums cannot be stored in distdir."
echo "Please ensure that every repository has a SHA256 sum."
echo "Repositories are defined in the WORKSPACE file."
exit 1
fi
13 changes: 9 additions & 4 deletions x_tools_imports.bzl
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,11 @@
#
################################################################################
#
load("@bazel_tools//tools/build_defs/repo:git.bzl", "new_git_repository")
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

# Jun 23, 2017 (no releases)
TOOLS_SHA = "e6cb469339aef5b7be0c89de730d5f3cc8e47e50"
TOOLS_SHA256 = "fe9489eabcb598e13137d0641525ff3813d8af151e1418e6940e611850d90136"

def go_x_tools_imports_repositories():
BUILD_FILE = """
Expand Down Expand Up @@ -46,9 +50,10 @@ go_binary(
# simple build rule that will build the binary for usage (and avoid
# the need to project a more complicated BUILD file over the entire
# tools repo.)
new_git_repository(
http_archive(
name = "org_golang_x_tools_imports",
build_file_content = BUILD_FILE,
commit = "e6cb469339aef5b7be0c89de730d5f3cc8e47e50", # Jun 23, 2017 (no releases)
remote = "https://github.com/golang/tools.git",
strip_prefix = "tools-" + TOOLS_SHA,
url = "https://github.com/golang/tools/archives/" + TOOLS_SHA + ".tar.gz",
sha256 = TOOLS_SHA256,
)

0 comments on commit 9b91ac6

Please sign in to comment.