-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[#6050] http: add edge_accept_request_id field #1
Commits on May 29, 2019
-
ci: add make_unique rule to check_format (envoyproxy#7054)
* ci: add make_unique rule to check_format Signed-off-by: Yuchen Dai <silentdai@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for e25bb86 - Browse repository at this point
Copy the full SHA e25bb86View commit details -
filters: http original src filter (envoyproxy#6790)
Add an http filter to extract the original source on a per-http-request basis Signed-off-by: Kyle Larose <kyle@agilicus.com>
Configuration menu - View commit details
-
Copy full SHA for 712a72a - Browse repository at this point
Copy the full SHA 712a72aView commit details -
cleanup: followup cleanup for envoyproxy#7037 (envoyproxy#7097)
Signed-off-by: Elisha Ziskind <eziskind@google.com>
Configuration menu - View commit details
-
Copy full SHA for 9f1177d - Browse repository at this point
Copy the full SHA 9f1177dView commit details -
remove use of std::tuple in gzip_filter_test to avoid compilation err…
…or in libstdc+++ (envoyproxy#7099) With libstdc++ the the std::tuple constructor picked by a {x,y,z} parameter is "explicit tuple(TP_&&...) ", which causes a compilation error, remove the usage of std::tuple to make the test code more compatible w/ libstdc++. Risk Level: LOW Testing: Unit test. Signed-off-by: Xin Zhuang <stevenzzz@google.com>
Configuration menu - View commit details
-
Copy full SHA for c0797dc - Browse repository at this point
Copy the full SHA c0797dcView commit details -
upstream: allow a cluster to provide its own load balancer (envoyprox…
…y#7081) Certain clusters have cluster specific load balancers. This change allows a cluster to explicitly provide one, both allowing extension clusters to easily provide a dedicated load balancer, as well as allowing for future cleanup of the original DST LB configuration. This change is needed for Redis Cluster as well as envoyproxy#1606. Risk Level: Low Testing: New UTs and integration tests. Signed-off-by: Matt Klein <mklein@lyft.com>
Configuration menu - View commit details
-
Copy full SHA for fcf8a59 - Browse repository at this point
Copy the full SHA fcf8a59View commit details -
upstream: Bring v1 original_dst validation to v2 config (envoyproxy#7074
) Bring back the v1 original_dst that is available in cds_json.cc (translateCluster, original_dst clusters must have no hosts configured) to v2. Bonus: convert most of the v1 json config to v2, will remove the last two when we do translateCluster sweeping, cc @derekargueta. Risk Level: Low Testing: Unit tests Signed-off-by: Dhi Aurrahman <dio@tetrate.io>
Configuration menu - View commit details
-
Copy full SHA for 3b1ac12 - Browse repository at this point
Copy the full SHA 3b1ac12View commit details
Commits on May 30, 2019
-
Fix bug where removes don't update CDS/LDS local version. (envoyproxy…
…#7102) Signed-off-by: Michael Puncel <mpuncel@squareup.com>
Configuration menu - View commit details
-
Copy full SHA for cbcb072 - Browse repository at this point
Copy the full SHA cbcb072View commit details -
runtime: flexible layering configuration. (envoyproxy#7032)
To support TDS and to provide operator flexibility in how it relates to existing runtime layering, this PR introduces support for explicit control over layering. This eliminates the distinguished role of subdirectory and override_subdirectory, for example, in favor of arbitrary disk overlay layers. This PR deprecates the existing runtime configuration in favor of the new layered variant. As a bonus, the PR fixes some of the runtime stats and related docs. Risk level: Low Testing: various unit tests (including server_test) additions. Part of envoyproxy#6708. Signed-off-by: Harvey Tuch <htuch@google.com>
Configuration menu - View commit details
-
Copy full SHA for 4dafba6 - Browse repository at this point
Copy the full SHA 4dafba6View commit details -
fuzz: remove invalid characters in header parser (envoyproxy#7101)
Filter through headers to add and remove in the header parser fuzzer. Risk level: Low Testing: Added corpus entry with null characters in headers to add. Signed-off-by: Asra Ali <asraa@google.com>
Configuration menu - View commit details
-
Copy full SHA for 491c3cc - Browse repository at this point
Copy the full SHA 491c3ccView commit details -
http2: fixing a (known) potential stall in the filter chain for H2 (e…
…nvoyproxy#7093) Fixing a bug where if pausing with StopIterationNoBuffer, continuing with fin-only payload wouldn't result in the filter chain continuing. Risk Level: High (tweak to the HCM) Testing: new integration test Docs Changes: n/a Release Notes: n/a Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Configuration menu - View commit details
-
Copy full SHA for 1065ee4 - Browse repository at this point
Copy the full SHA 1065ee4View commit details -
Udp filter chain (envoyproxy#6912)
Signed-off-by: Sumukh Shivaprakash <sumukhs@microsoft.com>
Configuration menu - View commit details
-
Copy full SHA for a363fb2 - Browse repository at this point
Copy the full SHA a363fb2View commit details -
http: Change sendLocalReply to send percent-encoded GrpcMessage (envo…
…yproxy#6913) This patch changed sendLocalReply to send GrpcMessage in percent-encoded instead of plain string. Signed-off-by: Dhi Aurrahman <dio@tetrate.io>
Configuration menu - View commit details
-
Copy full SHA for f326331 - Browse repository at this point
Copy the full SHA f326331View commit details -
tds: bootstrap and API configuration protos. (envoyproxy#7105)
This PR provides the TDS API config. The implementation and docs will be added in a followup, the idea is to unblock some projects that depend on the details here. Risk level: Low Testing: @envoy_api build Part of envoyproxy#6708 Signed-off-by: Harvey Tuch <htuch@google.com>
Configuration menu - View commit details
-
Copy full SHA for ad2cacc - Browse repository at this point
Copy the full SHA ad2caccView commit details -
Move metric snapshot (envoyproxy#7112)
Risk Level: LOW Testing: code move only. Signed-off-by: Xin Zhuang <stevenzzz@google.com>
Configuration menu - View commit details
-
Copy full SHA for 3db9fc2 - Browse repository at this point
Copy the full SHA 3db9fc2View commit details -
Add API to codeowners (envoyproxy#7114)
Enforce Harvey to review any API changes. Signed-off-by: Chris Aniszczyk <caniszczyk@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 74efa8a - Browse repository at this point
Copy the full SHA 74efa8aView commit details -
quiche: implement QuicMemSlice (envoyproxy#6400)
Signed-off-by: Dan Zhang <danzh@google.com>
Configuration menu - View commit details
-
Copy full SHA for 0c48eff - Browse repository at this point
Copy the full SHA 0c48effView commit details
Commits on May 31, 2019
-
util: add Inline storage helper-class and use it in a few places. (en…
…voyproxy#7063) * Add InlineStorage mixin supplying the allocation overrides needed to make it easier to create variable-size structures. Signed-off-by: Joshua Marantz <jmarantz@google.com>
Configuration menu - View commit details
-
Copy full SHA for a5e7b44 - Browse repository at this point
Copy the full SHA a5e7b44View commit details -
lua: prevent LuaJIT from panicking. (envoyproxy#6994)
Migration from the build recipes to foreign_cc rules resulted in dependencies being built with different compiler flags. Among other things, those compiler flags were added: -ffunction-sections -fdata-sections use of which leads to LuaJIT panicking: PANIC: unprotected error in call to Lua API and Envoy subsequently crashing. Broken in envoyproxy#6168. Fixes istio/istio#13722. Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Configuration menu - View commit details
-
Copy full SHA for 0e12efc - Browse repository at this point
Copy the full SHA 0e12efcView commit details -
router_check_tool: fix ASSERT in path_rewrite test (envoyproxy#7106)
Description: When multiple test validations are mentioned in the `validation` section, eg: ``` "validate": { "host_rewrite": "api.lyft.com", "virtual_host_name": "api", "path_rewrite": "/pre/test", "cluster_name": "www2" } ``` `finalizeRequestHeaders` is called multiple times causing ASSERT failures. None of the existing tests covered this scenario. Now few tests have been added to simulate the error. Before the fix the failure looked like this ``` [2019-05-29 19:47:48.210][1405009][critical][assert] [source/common/router/config_impl.cc:557] assert failure: case_sensitive_ ? absl::StartsWith(path, matched_path) : absl::StartsWithIgnoreCase(path, matched_path). ``` Risk Level: Low Testing: - Added breaking tests and fixed them using the fix. - Tested the tool against lyft's routes Signed-off-by: Jyoti Mahapatra <jmahapatra@lyft.com>
Configuration menu - View commit details
-
Copy full SHA for c22655c - Browse repository at this point
Copy the full SHA c22655cView commit details -
config: logging LDS file on config failure (envoyproxy#7113)
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Configuration menu - View commit details
-
Copy full SHA for ceb21c8 - Browse repository at this point
Copy the full SHA ceb21c8View commit details -
owners: switch API to @envoyproxy/api-shepherds. (envoyproxy#7121)
Followup to envoyproxy#7114. Signed-off-by: Harvey Tuch <htuch@google.com>
Configuration menu - View commit details
-
Copy full SHA for b9a1b6e - Browse repository at this point
Copy the full SHA b9a1b6eView commit details -
access log / route headers: Expose more downstream TLS information (e…
…nvoyproxy#7019) Signed-off-by: Mike Grass <mgrass@salesforce.com>
Configuration menu - View commit details
-
Copy full SHA for a42273b - Browse repository at this point
Copy the full SHA a42273bView commit details -
stats: specify hot-restart mode when creating gauges (envoyproxy#7083)
Signed-off-by: Joshua Marantz <jmarantz@google.com>
Configuration menu - View commit details
-
Copy full SHA for cd8d342 - Browse repository at this point
Copy the full SHA cd8d342View commit details -
filter chain match: support source CIDRs and ports (envoyproxy#7064)
This PR also fully deprecates the tcp_proxy v1 configuration. This will be deleted following the standard deprecation cycle. All new uses should use filter chain matching. Fixes envoyproxy#4457 Signed-off-by: Matt Klein <mklein@lyft.com>
Configuration menu - View commit details
-
Copy full SHA for 866d043 - Browse repository at this point
Copy the full SHA 866d043View commit details -
add more delta service definitions, update proto_descriptors (envoypr…
…oxy#7110) Delta services other than DeltaClusters were missing. Also added those services to proto_descriptors.cc. Also added some other things that proto_descriptors.cc was missing. envoyproxy#4991 Risk Level: low Signed-off-by: Fred Douglas <fredlas@google.com>
Configuration menu - View commit details
-
Copy full SHA for 40d8b7f - Browse repository at this point
Copy the full SHA 40d8b7fView commit details -
Update Bazel dependencies on GRPC and protoc_gen_validate (envoyproxy…
…#7115) They include fixes for future Bazel changes. In particular, the repository can now build with --incompatible_depset_is_not_iterable, which will be included in Bazel 0.27. Description: Risk Level: low Testing: bazel build --nobuild ... --incompatible_depset_is_not_iterable envoyproxy#6995 Signed-off-by: Laurent Le Brun <laurentlb@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 0739cd6 - Browse repository at this point
Copy the full SHA 0739cd6View commit details -
bazel: cc_wrapper.py fixes due to bazel flag defaults changing (envoy…
…proxy#7098) I copied @oquenchil's changes from envoyproxy#6968 (comment) and fixed the python formatting errors. This let us link our exe w/ the new flag default (--incompatible_do_not_split_linking_cmdline) and with the old value. When Envoy upgrades to bazel 0.27 we should remove the old functions in this file. Risk Level: Low Testing: Ran bazel test --incompatible_do_not_split_linking_cmdline //test/exe/... and bazel test //test/exe/... Docs Changes: N/A Release Notes: N/A Fixes envoyproxy#6968 Signed-off-by: Frank Fort <ffort@google.com>
Configuration menu - View commit details
-
Copy full SHA for 08fe25e - Browse repository at this point
Copy the full SHA 08fe25eView commit details -
cleanup: fix typo and remove extra dup words. (envoyproxy#7125)
Remove duplicated words in sentences and fix some typos caught by linter. Risk Level: LOW Testing: doc only changes. Docs Changes: N/A Signed-off-by: Xin Zhuang <stevenzzz@google.com>
Configuration menu - View commit details
-
Copy full SHA for 4b2b946 - Browse repository at this point
Copy the full SHA 4b2b946View commit details -
timer: fix oss-fuzz issue envoyproxy#11852 (envoyproxy#6982)
Fix a time conversion signed int overflow (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11852). Risk Level: low Testing: fuzz Signed-off-by: Ismo Puustinen <ismo.puustinen@intel.com>
Configuration menu - View commit details
-
Copy full SHA for be6a483 - Browse repository at this point
Copy the full SHA be6a483View commit details -
config: dependency injection of message validation. (envoyproxy#7072)
This is the plumbing to support envoyproxy#6651 and envoyproxy#6818, where we remove the global control over message validation type and put it under the control of a new injectable interface. It's pretty horrible IMHO that there is this much churn; the closest major context object that we could associate with is Api. The main from the new dependency is that we can: 1. Inject different validators, e.g. one for static config when ingesting bootstrap resources, another for xDS. 2. Validation state, so that we can reach back to the server stats for the purpose of tracking unknown fields. This PR introduces a visitor pattern for the validator and starts to do the threading needed for dependency injection here. It's possible that we could extend this visitor for deprecated fields in the future to provide finer grained control over these alongside unknown, if there is a use case. No new behavior should be added in this PR. Risk level: Low. Testing: bazel test //test/... Signed-off-by: Harvey Tuch <htuch@google.com>
Configuration menu - View commit details
-
Copy full SHA for 8d1ad35 - Browse repository at this point
Copy the full SHA 8d1ad35View commit details
Commits on Jun 3, 2019
-
test: braces around gRPC slices (envoyproxy#7139)
Fixes a local -Wmissing-braces warning Risk Level: n/a (test only) Testing: n/a Docs Changes: n/a Release Notes: n/a Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Configuration menu - View commit details
-
Copy full SHA for a1a558a - Browse repository at this point
Copy the full SHA a1a558aView commit details -
stats: Fully-qualify stats macros (envoyproxy#7141)
Fully-qualify the expanded portions of stats macros for use in external callsites. Risk Level: Low. Signed-off-by: James Buckland <jbuckland@google.com>
Configuration menu - View commit details
-
Copy full SHA for de96526 - Browse repository at this point
Copy the full SHA de96526View commit details -
Fix typo in test_common/utility.h (envoyproxy#7142)
Fixes a typo from envoyproxy#7072. Risk Level: Low Signed-off-by: James Buckland <jbuckland@google.com>
Configuration menu - View commit details
-
Copy full SHA for 79bdfaf - Browse repository at this point
Copy the full SHA 79bdfafView commit details -
ci: only run quic_platform_test and epoll_server_test on linux. (envo…
…yproxy#6920) Description: //test/extensions/quic_listeners/quiche/platform:quic_platform_test and @com_googlesource_quiche//:epoll_server_test depends on (linux specific) epoll APIs, which causes compilation errors on non-linux platforms, e.g. envoyproxy#6896. This PR makes them no-op on non-linux platforms. Risk Level: none, test only. Testing: bazel test --test_output=all test/extensions/quic_listeners/quiche/platform:all @com_googlesource_quiche//:all Docs Changes: none Release Notes: none Fixes envoyproxy#6896 Signed-off-by: Bin Wu <wub@google.com>
Configuration menu - View commit details
-
Copy full SHA for 847ef05 - Browse repository at this point
Copy the full SHA 847ef05View commit details -
ci: update build image (envoyproxy#6866)
Description: Upgrade Bazel to 0.26 along with build fixes. Risk Level: Low Testing: CI Docs Changes: N/A Release Notes: N/A Signed-off-by: Lizan Zhou <lizan@tetrate.io>
Configuration menu - View commit details
-
Copy full SHA for f1cf265 - Browse repository at this point
Copy the full SHA f1cf265View commit details -
stats: Remove the stat-merger regexes and clean up docs. (envoyproxy#…
…7127) * Remove the regex used for determining the merge-mode for gauges; they are all specified when creating gauges now. Also cleans up some method docs. Signed-off-by: Joshua Marantz <jmarantz@google.com>
Configuration menu - View commit details
-
Copy full SHA for fbe1d8a - Browse repository at this point
Copy the full SHA fbe1d8aView commit details -
Fix server lifecycle notifier when callback list is empty (envoyproxy…
…#7103) Signed-off-by: Elisha Ziskind <eziskind@google.com>
Configuration menu - View commit details
-
Copy full SHA for cd9e7ae - Browse repository at this point
Copy the full SHA cd9e7aeView commit details -
config: move SubscriptionCallbacks to ctor, pointers become refs (env…
…oyproxy#7122) The Subscription interface was receiving its callbacks in start(). No usage actually needed the ability to defer providing callbacks until after construction. Furthermore, some Subscription implementations want to hold onto the callbacks, and had to use a pointer rather than a reference. Risk Level: low Signed-off-by: Fred Douglas <fredlas@google.com>
Configuration menu - View commit details
-
Copy full SHA for 82ccd55 - Browse repository at this point
Copy the full SHA 82ccd55View commit details -
config: fix EDS for empty update (envoyproxy#7143)
Risk Level: low Testing: added to unit test Signed-off-by: Fred Douglas <fredlas@google.com>
Configuration menu - View commit details
-
Copy full SHA for bf1d29d - Browse repository at this point
Copy the full SHA bf1d29dView commit details
Commits on Jun 4, 2019
-
[docs] minor fixes to clang-format docs (envoyproxy#7150)
Signed-off-by: Derek Argueta <dereka@pinterest.com>
Configuration menu - View commit details
-
Copy full SHA for 699e510 - Browse repository at this point
Copy the full SHA 699e510View commit details -
upstream: Use valid enum value in subset lb docs (envoyproxy#7153)
Signed-off-by: Kateryna Nezdolii <nezdolik@spotify.com>
Configuration menu - View commit details
-
Copy full SHA for 34dbd85 - Browse repository at this point
Copy the full SHA 34dbd85View commit details -
router: scoped rds (2d): integrate SRDS API into HttpConnectionManager (
envoyproxy#7068) Integrate the Scoped Route Discovery Service (SRDS) API into the HttpConnectionManager. NOTES: - This is the last PR in the chain originating from parent envoyproxy#5839. - The scoped routing logic which can be configured through this API has not yet been implemented; it will be done in follow up PRs. Risk Level: Low (API is not yet fully implemented and should not be enabled) Testing: Integration tests added. Signed-off-by: Andres Guedez <aguedez@google.com>
Configuration menu - View commit details
-
Copy full SHA for 1fdaf8e - Browse repository at this point
Copy the full SHA 1fdaf8eView commit details -
fuzz: fix unitialized ptr to downstreamSslConnectionInfo in TestStrea…
…mInfo and add mock (envoyproxy#7155) Initializes downstreamSslConnectionInfo pointer in TestStreamInfo and adds a mock object for it in fuzzers. Fixes crash in: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15066 Risk Level: Low Testing: Add a corpus entry with downstream info. Signed-off-by: Asra Ali <asraa@google.com>
Configuration menu - View commit details
-
Copy full SHA for 9bdf990 - Browse repository at this point
Copy the full SHA 9bdf990View commit details -
config: centralize gRPC and REST method strings in SubscriptionFactory (
envoyproxy#7092) Previously, constant strings like "envoy.api.v2.EndpointDiscoveryService.FetchEndpoints" were all over eds.cc, rds_impl.cc, etc, being fed into SubscriptionFactory. Now, they are all centralized in SubscriptionFactory, the only place that actually uses them. envoyproxy#4991 Risk Level: low Signed-off-by: Fred Douglas <fredlas@google.com>
Configuration menu - View commit details
-
Copy full SHA for 8286635 - Browse repository at this point
Copy the full SHA 8286635View commit details -
router: implement append_cluster, append_upstream_host, and do_not_fo…
…rward (envoyproxy#6893) Implement three new router behaviors, append_cluster, append_upstream_host and do_not_forward. These are enabled via the new StreamDebugInfo class, although no API is provided to set them. Risk Level: low/medium (changes to router) Testing: added unit tests for behaviors separately and combined. Docs Changes: n/a Release Notes: n/a (I think...) Fixes: envoyproxy#6453 Signed-off-by: Dan Rosen <mergeconflict@google.com>
Configuration menu - View commit details
-
Copy full SHA for be9d2f8 - Browse repository at this point
Copy the full SHA be9d2f8View commit details -
[test] remove translateTcpRateLimitFilter (envoyproxy#7137)
Signed-off-by: Derek Argueta <dereka@pinterest.com>
Configuration menu - View commit details
-
Copy full SHA for 30c44cc - Browse repository at this point
Copy the full SHA 30c44ccView commit details -
Update dependency on rules_foreign_cc (envoyproxy#7168)
With this update, Envoy is compatible with the upcoming Bazel 0.27. Signed-off-by: Laurent Le Brun <laurentlb@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for e0c9284 - Browse repository at this point
Copy the full SHA e0c9284View commit details
Commits on Jun 5, 2019
-
tls: update BoringSSL to e534d74f (3770). (envoyproxy#7169)
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Configuration menu - View commit details
-
Copy full SHA for c167c65 - Browse repository at this point
Copy the full SHA c167c65View commit details -
feature edge_accept_request_id flag enablement
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for d793ec5 - Browse repository at this point
Copy the full SHA d793ec5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3c3fc3d - Browse repository at this point
Copy the full SHA 3c3fc3dView commit details -
Configuration menu - View commit details
-
Copy full SHA for f0b83f0 - Browse repository at this point
Copy the full SHA f0b83f0View commit details -
added sanitization check for AcceptEdgeRequestId
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for 8b87c4b - Browse repository at this point
Copy the full SHA 8b87c4bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 23235cd - Browse repository at this point
Copy the full SHA 23235cdView commit details -
Configuration menu - View commit details
-
Copy full SHA for cb7ed16 - Browse repository at this point
Copy the full SHA cb7ed16View commit details -
Configuration menu - View commit details
-
Copy full SHA for fcd8791 - Browse repository at this point
Copy the full SHA fcd8791View commit details -
Configuration menu - View commit details
-
Copy full SHA for db369b6 - Browse repository at this point
Copy the full SHA db369b6View commit details -
implemented @jmarantz code review feedback for source/common/http/con…
…n_manager_utility.cc Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for 443a891 - Browse repository at this point
Copy the full SHA 443a891View commit details -
Configuration menu - View commit details
-
Copy full SHA for ba5d821 - Browse repository at this point
Copy the full SHA ba5d821View commit details -
revisteted @jmarantz code review changes for const
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for 58b7520 - Browse repository at this point
Copy the full SHA 58b7520View commit details -
implemented code review changes of @derekargueta
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for a6c629a - Browse repository at this point
Copy the full SHA a6c629aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 01e7226 - Browse repository at this point
Copy the full SHA 01e7226View commit details -
Configuration menu - View commit details
-
Copy full SHA for b6f5898 - Browse repository at this point
Copy the full SHA b6f5898View commit details -
Configuration menu - View commit details
-
Copy full SHA for 385e50e - Browse repository at this point
Copy the full SHA 385e50eView commit details -
implemented code review changes proposed by @mattklein123
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for e1588f6 - Browse repository at this point
Copy the full SHA e1588f6View commit details -
Configuration menu - View commit details
-
Copy full SHA for d1717d7 - Browse repository at this point
Copy the full SHA d1717d7View commit details -
issue with bool and mutable_bool fix
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for 7769e5a - Browse repository at this point
Copy the full SHA 7769e5aView commit details -
Configuration menu - View commit details
-
Copy full SHA for d584c7d - Browse repository at this point
Copy the full SHA d584c7dView commit details
Commits on Jun 7, 2019
-
implemented naming change requested by @htuch
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for 7904db5 - Browse repository at this point
Copy the full SHA 7904db5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 805de12 - Browse repository at this point
Copy the full SHA 805de12View commit details
Commits on Jun 12, 2019
-
implemented code review changes requested by @htuch
Signed-off-by: trifan <trifan@adobe.com>
Configuration menu - View commit details
-
Copy full SHA for b1f51a0 - Browse repository at this point
Copy the full SHA b1f51a0View commit details