Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[#6050] http: add edge_accept_request_id field #1

Merged
merged 70 commits into from
Mar 23, 2020

Commits on May 29, 2019

  1. ci: add make_unique rule to check_format (envoyproxy#7054)

    * ci: add make_unique rule to check_format
    
    Signed-off-by: Yuchen Dai <silentdai@gmail.com>
    lambdai authored and jmarantz committed May 29, 2019
    Configuration menu
    Copy the full SHA
    e25bb86 View commit details
    Browse the repository at this point in the history
  2. filters: http original src filter (envoyproxy#6790)

    Add an http filter to extract the original source on a per-http-request basis
    
    Signed-off-by: Kyle Larose <kyle@agilicus.com>
    klarose authored and snowp committed May 29, 2019
    Configuration menu
    Copy the full SHA
    712a72a View commit details
    Browse the repository at this point in the history
  3. cleanup: followup cleanup for envoyproxy#7037 (envoyproxy#7097)

    Signed-off-by: Elisha Ziskind <eziskind@google.com>
    eziskind authored and mattklein123 committed May 29, 2019
    Configuration menu
    Copy the full SHA
    9f1177d View commit details
    Browse the repository at this point in the history
  4. remove use of std::tuple in gzip_filter_test to avoid compilation err…

    …or in libstdc+++ (envoyproxy#7099)
    
    With libstdc++ the the std::tuple constructor picked by a {x,y,z} parameter is "explicit tuple(TP_&&...) ", which causes a compilation error, remove the usage of std::tuple to make the test code more compatible w/ libstdc++.
    
    Risk Level: LOW
    Testing: Unit test.
    
    Signed-off-by: Xin Zhuang <stevenzzz@google.com>
    stevenzzzz authored and htuch committed May 29, 2019
    Configuration menu
    Copy the full SHA
    c0797dc View commit details
    Browse the repository at this point in the history
  5. upstream: allow a cluster to provide its own load balancer (envoyprox…

    …y#7081)
    
    Certain clusters have cluster specific load balancers. This change
    allows a cluster to explicitly provide one, both allowing extension
    clusters to easily provide a dedicated load balancer, as well as
    allowing for future cleanup of the original DST LB configuration.
    
    This change is needed for Redis Cluster as well as
    envoyproxy#1606.
    
    Risk Level: Low
    Testing: New UTs and integration tests.
    
    Signed-off-by: Matt Klein <mklein@lyft.com>
    mattklein123 authored and htuch committed May 29, 2019
    Configuration menu
    Copy the full SHA
    fcf8a59 View commit details
    Browse the repository at this point in the history
  6. upstream: Bring v1 original_dst validation to v2 config (envoyproxy#7074

    )
    
    Bring back the v1 original_dst that is available in cds_json.cc (translateCluster, original_dst clusters must have no hosts configured) to v2.
    
    Bonus: convert most of the v1 json config to v2, will remove the last two when we do translateCluster sweeping, cc @derekargueta.
    
    Risk Level: Low
    Testing: Unit tests
    
    Signed-off-by: Dhi Aurrahman <dio@tetrate.io>
    dio authored and htuch committed May 29, 2019
    Configuration menu
    Copy the full SHA
    3b1ac12 View commit details
    Browse the repository at this point in the history

Commits on May 30, 2019

  1. Fix bug where removes don't update CDS/LDS local version. (envoyproxy…

    …#7102)
    
    Signed-off-by: Michael Puncel <mpuncel@squareup.com>
    mpuncel authored and mattklein123 committed May 30, 2019
    Configuration menu
    Copy the full SHA
    cbcb072 View commit details
    Browse the repository at this point in the history
  2. runtime: flexible layering configuration. (envoyproxy#7032)

    To support TDS and to provide operator flexibility in how it relates to
    existing runtime layering, this PR introduces support for explicit
    control over layering. This eliminates the distinguished role of
    subdirectory and override_subdirectory, for example, in favor of
    arbitrary disk overlay layers.
    
    This PR deprecates the existing runtime configuration in favor of the
    new layered variant.
    
    As a bonus, the PR fixes some of the runtime stats and related docs.
    
    Risk level: Low
    Testing: various unit tests (including server_test) additions.
    
    Part of envoyproxy#6708.
    
    Signed-off-by: Harvey Tuch <htuch@google.com>
    htuch committed May 30, 2019
    Configuration menu
    Copy the full SHA
    4dafba6 View commit details
    Browse the repository at this point in the history
  3. fuzz: remove invalid characters in header parser (envoyproxy#7101)

    Filter through headers to add and remove in the header parser fuzzer.
    
    Risk level: Low
    Testing: Added corpus entry with null characters in headers to add.
    
    Signed-off-by: Asra Ali <asraa@google.com>
    asraa authored and htuch committed May 30, 2019
    Configuration menu
    Copy the full SHA
    491c3cc View commit details
    Browse the repository at this point in the history
  4. http2: fixing a (known) potential stall in the filter chain for H2 (e…

    …nvoyproxy#7093)
    
    Fixing a bug where if pausing with StopIterationNoBuffer, continuing with fin-only payload wouldn't result in the filter chain continuing.
    
    Risk Level: High (tweak to the HCM)
    Testing: new integration test
    Docs Changes: n/a
    Release Notes: n/a
    
    Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
    alyssawilk committed May 30, 2019
    Configuration menu
    Copy the full SHA
    1065ee4 View commit details
    Browse the repository at this point in the history
  5. Udp filter chain (envoyproxy#6912)

    Signed-off-by: Sumukh Shivaprakash <sumukhs@microsoft.com>
    sumukhs authored and mattklein123 committed May 30, 2019
    Configuration menu
    Copy the full SHA
    a363fb2 View commit details
    Browse the repository at this point in the history
  6. http: Change sendLocalReply to send percent-encoded GrpcMessage (envo…

    …yproxy#6913)
    
    This patch changed sendLocalReply to send GrpcMessage in percent-encoded
    instead of plain string.
    
    Signed-off-by: Dhi Aurrahman <dio@tetrate.io>
    dio authored and mattklein123 committed May 30, 2019
    Configuration menu
    Copy the full SHA
    f326331 View commit details
    Browse the repository at this point in the history
  7. tds: bootstrap and API configuration protos. (envoyproxy#7105)

    This PR provides the TDS API config. The implementation and docs will be
    added in a followup, the idea is to unblock some projects that depend on
    the details here.
    
    Risk level: Low
    Testing: @envoy_api build
    
    Part of envoyproxy#6708
    
    Signed-off-by: Harvey Tuch <htuch@google.com>
    htuch committed May 30, 2019
    Configuration menu
    Copy the full SHA
    ad2cacc View commit details
    Browse the repository at this point in the history
  8. Move metric snapshot (envoyproxy#7112)

    Risk Level: LOW
    Testing: code move only.
    
    Signed-off-by: Xin Zhuang <stevenzzz@google.com>
    stevenzzzz authored and htuch committed May 30, 2019
    Configuration menu
    Copy the full SHA
    3db9fc2 View commit details
    Browse the repository at this point in the history
  9. Add API to codeowners (envoyproxy#7114)

    Enforce Harvey to review any API changes.
    
    Signed-off-by: Chris Aniszczyk <caniszczyk@gmail.com>
    caniszczyk authored and htuch committed May 30, 2019
    Configuration menu
    Copy the full SHA
    74efa8a View commit details
    Browse the repository at this point in the history
  10. quiche: implement QuicMemSlice (envoyproxy#6400)

    Signed-off-by: Dan Zhang <danzh@google.com>
    danzh2010 authored and mattklein123 committed May 30, 2019
    Configuration menu
    Copy the full SHA
    0c48eff View commit details
    Browse the repository at this point in the history

Commits on May 31, 2019

  1. util: add Inline storage helper-class and use it in a few places. (en…

    …voyproxy#7063)
    
    * Add InlineStorage mixin supplying the allocation overrides needed to make it easier to create variable-size structures.
    
    Signed-off-by: Joshua Marantz <jmarantz@google.com>
    jmarantz committed May 31, 2019
    Configuration menu
    Copy the full SHA
    a5e7b44 View commit details
    Browse the repository at this point in the history
  2. lua: prevent LuaJIT from panicking. (envoyproxy#6994)

    Migration from the build recipes to foreign_cc rules resulted
    in dependencies being built with different compiler flags.
    
    Among other things, those compiler flags were added:
    
        -ffunction-sections -fdata-sections
    
    use of which leads to LuaJIT panicking:
    
        PANIC: unprotected error in call to Lua API
    
    and Envoy subsequently crashing.
    
    Broken in envoyproxy#6168.
    
    Fixes istio/istio#13722.
    
    Signed-off-by: Piotr Sikora <piotrsikora@google.com>
    PiotrSikora authored and lizan committed May 31, 2019
    Configuration menu
    Copy the full SHA
    0e12efc View commit details
    Browse the repository at this point in the history
  3. router_check_tool: fix ASSERT in path_rewrite test (envoyproxy#7106)

    Description: When multiple test validations are mentioned in the `validation` section, 
    eg: 
    ```
    "validate": {
            "host_rewrite": "api.lyft.com",
            "virtual_host_name": "api",
            "path_rewrite": "/pre/test",
            "cluster_name": "www2"
          }
    ```
    `finalizeRequestHeaders` is called multiple times causing ASSERT failures. None of the existing tests covered this scenario. Now few tests have been added to simulate the error.
    
    Before the fix the failure looked like this
    ```
    [2019-05-29 19:47:48.210][1405009][critical][assert] [source/common/router/config_impl.cc:557] assert failure: case_sensitive_ ? absl::StartsWith(path, matched_path) : absl::StartsWithIgnoreCase(path, matched_path).
    ```
    
    Risk Level: Low
    Testing: 
     - Added breaking tests and fixed them using the fix.
     - Tested the tool against lyft's routes
    
    Signed-off-by: Jyoti Mahapatra <jmahapatra@lyft.com>
    jyotima authored and lizan committed May 31, 2019
    Configuration menu
    Copy the full SHA
    c22655c View commit details
    Browse the repository at this point in the history
  4. config: logging LDS file on config failure (envoyproxy#7113)

    Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
    alyssawilk authored and mattklein123 committed May 31, 2019
    Configuration menu
    Copy the full SHA
    ceb21c8 View commit details
    Browse the repository at this point in the history
  5. owners: switch API to @envoyproxy/api-shepherds. (envoyproxy#7121)

    Followup to envoyproxy#7114.
    
    Signed-off-by: Harvey Tuch <htuch@google.com>
    htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    b9a1b6e View commit details
    Browse the repository at this point in the history
  6. access log / route headers: Expose more downstream TLS information (e…

    …nvoyproxy#7019)
    
    Signed-off-by: Mike Grass <mgrass@salesforce.com>
    mikegrass authored and mattklein123 committed May 31, 2019
    Configuration menu
    Copy the full SHA
    a42273b View commit details
    Browse the repository at this point in the history
  7. stats: specify hot-restart mode when creating gauges (envoyproxy#7083)

    Signed-off-by: Joshua Marantz <jmarantz@google.com>
    jmarantz authored and mattklein123 committed May 31, 2019
    Configuration menu
    Copy the full SHA
    cd8d342 View commit details
    Browse the repository at this point in the history
  8. filter chain match: support source CIDRs and ports (envoyproxy#7064)

    This PR also fully deprecates the tcp_proxy v1 configuration.
    This will be deleted following the standard deprecation cycle.
    All new uses should use filter chain matching.
    
    Fixes envoyproxy#4457
    
    Signed-off-by: Matt Klein <mklein@lyft.com>
    mattklein123 committed May 31, 2019
    Configuration menu
    Copy the full SHA
    866d043 View commit details
    Browse the repository at this point in the history
  9. add more delta service definitions, update proto_descriptors (envoypr…

    …oxy#7110)
    
    Delta services other than DeltaClusters were missing. Also added those services to proto_descriptors.cc. Also added some other things that proto_descriptors.cc was missing. envoyproxy#4991
    
    Risk Level: low
    
    Signed-off-by: Fred Douglas <fredlas@google.com>
    fredlas authored and htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    40d8b7f View commit details
    Browse the repository at this point in the history
  10. Update Bazel dependencies on GRPC and protoc_gen_validate (envoyproxy…

    …#7115)
    
    They include fixes for future Bazel changes. In particular, the
    repository can now build with --incompatible_depset_is_not_iterable,
    which will be included in Bazel 0.27.
    
    Description:
    Risk Level: low
    Testing: bazel build --nobuild ... --incompatible_depset_is_not_iterable
    
    envoyproxy#6995
    
    Signed-off-by: Laurent Le Brun <laurentlb@gmail.com>
    laurentlb authored and htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    0739cd6 View commit details
    Browse the repository at this point in the history
  11. bazel: cc_wrapper.py fixes due to bazel flag defaults changing (envoy…

    …proxy#7098)
    
    I copied @oquenchil's changes from envoyproxy#6968 (comment) and fixed the python formatting errors. This let us link our exe w/ the new flag default (--incompatible_do_not_split_linking_cmdline) and with the old value. When Envoy upgrades to bazel 0.27 we should remove the old functions in this file.
    
    Risk Level: Low
    Testing: Ran bazel test --incompatible_do_not_split_linking_cmdline //test/exe/... and bazel test //test/exe/...
    Docs Changes: N/A
    Release Notes: N/A
    
    Fixes envoyproxy#6968
    
    Signed-off-by: Frank Fort <ffort@google.com>
    fcfort authored and htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    08fe25e View commit details
    Browse the repository at this point in the history
  12. cleanup: fix typo and remove extra dup words. (envoyproxy#7125)

    Remove duplicated words in sentences and fix some typos caught by linter.
    
    Risk Level: LOW
    Testing: doc only changes.
    Docs Changes: N/A
    
    Signed-off-by: Xin Zhuang <stevenzzz@google.com>
    stevenzzzz authored and htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    4b2b946 View commit details
    Browse the repository at this point in the history
  13. timer: fix oss-fuzz issue envoyproxy#11852 (envoyproxy#6982)

    Fix a time conversion signed int overflow (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11852).
    
    Risk Level: low
    Testing: fuzz
    
    Signed-off-by: Ismo Puustinen <ismo.puustinen@intel.com>
    ipuustin authored and htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    be6a483 View commit details
    Browse the repository at this point in the history
  14. config: dependency injection of message validation. (envoyproxy#7072)

    This is the plumbing to support envoyproxy#6651 and envoyproxy#6818, where we remove the global control over message
    validation type and put it under the control of a new injectable interface. It's pretty horrible
    IMHO that there is this much churn; the closest major context object that we could associate with is
    Api.
    
    The main from the new dependency is that we can:
    
    1. Inject different validators, e.g. one for static config when ingesting bootstrap resources, another for xDS.
    2. Validation state, so that we can reach back to the server stats for the purpose of tracking unknown fields.
    This PR introduces a visitor pattern for the validator and starts to do the threading needed for dependency injection here.
    
    It's possible that we could extend this visitor for deprecated fields in the future to provide finer grained control over these alongside unknown, if there is a use case.
    
    No new behavior should be added in this PR.
    
    Risk level: Low.
    Testing: bazel test //test/...
    
    Signed-off-by: Harvey Tuch <htuch@google.com>
    htuch committed May 31, 2019
    Configuration menu
    Copy the full SHA
    8d1ad35 View commit details
    Browse the repository at this point in the history

Commits on Jun 3, 2019

  1. test: braces around gRPC slices (envoyproxy#7139)

    Fixes a local -Wmissing-braces warning
    
    Risk Level: n/a (test only)
    Testing: n/a
    Docs Changes: n/a
    Release Notes: n/a
    
    Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
    alyssawilk committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    a1a558a View commit details
    Browse the repository at this point in the history
  2. stats: Fully-qualify stats macros (envoyproxy#7141)

    Fully-qualify the expanded portions of stats macros for use in external callsites.
    
    Risk Level: Low.
    
    Signed-off-by: James Buckland <jbuckland@google.com>
    ambuc authored and htuch committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    de96526 View commit details
    Browse the repository at this point in the history
  3. Fix typo in test_common/utility.h (envoyproxy#7142)

    Fixes a typo from envoyproxy#7072.
    
    Risk Level: Low
    
    Signed-off-by: James Buckland <jbuckland@google.com>
    ambuc authored and htuch committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    79bdfaf View commit details
    Browse the repository at this point in the history
  4. ci: only run quic_platform_test and epoll_server_test on linux. (envo…

    …yproxy#6920)
    
    Description:
    
    //test/extensions/quic_listeners/quiche/platform:quic_platform_test and @com_googlesource_quiche//:epoll_server_test depends on (linux specific) epoll APIs, which causes compilation errors on non-linux platforms, e.g. envoyproxy#6896.
    
    This PR makes them no-op on non-linux platforms.
    
    Risk Level: none, test only.
    Testing:
    
    bazel test --test_output=all test/extensions/quic_listeners/quiche/platform:all @com_googlesource_quiche//:all
    
    Docs Changes: none
    Release Notes: none
    Fixes envoyproxy#6896
    
    Signed-off-by: Bin Wu <wub@google.com>
    wu-bin authored and lizan committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    847ef05 View commit details
    Browse the repository at this point in the history
  5. ci: update build image (envoyproxy#6866)

    Description:
    Upgrade Bazel to 0.26 along with build fixes.
    
    Risk Level: Low
    Testing: CI
    Docs Changes: N/A
    Release Notes: N/A
    
    Signed-off-by: Lizan Zhou <lizan@tetrate.io>
    lizan committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    f1cf265 View commit details
    Browse the repository at this point in the history
  6. stats: Remove the stat-merger regexes and clean up docs. (envoyproxy#…

    …7127)
    
    * Remove the regex used for determining the merge-mode for gauges; they are all specified when creating gauges now. Also cleans up some method docs.
    
    Signed-off-by: Joshua Marantz <jmarantz@google.com>
    jmarantz committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    fbe1d8a View commit details
    Browse the repository at this point in the history
  7. Fix server lifecycle notifier when callback list is empty (envoyproxy…

    …#7103)
    
    Signed-off-by: Elisha Ziskind <eziskind@google.com>
    eziskind authored and mattklein123 committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    cd9e7ae View commit details
    Browse the repository at this point in the history
  8. config: move SubscriptionCallbacks to ctor, pointers become refs (env…

    …oyproxy#7122)
    
    The Subscription interface was receiving its callbacks in start(). No usage actually needed the ability to defer providing callbacks until after construction. Furthermore, some Subscription implementations want to hold onto the callbacks, and had to use a pointer rather than a reference.
    
    Risk Level: low
    
    Signed-off-by: Fred Douglas <fredlas@google.com>
    fredlas authored and htuch committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    82ccd55 View commit details
    Browse the repository at this point in the history
  9. config: fix EDS for empty update (envoyproxy#7143)

    Risk Level: low
    Testing: added to unit test
    
    Signed-off-by: Fred Douglas <fredlas@google.com>
    fredlas authored and htuch committed Jun 3, 2019
    Configuration menu
    Copy the full SHA
    bf1d29d View commit details
    Browse the repository at this point in the history

Commits on Jun 4, 2019

  1. [docs] minor fixes to clang-format docs (envoyproxy#7150)

    Signed-off-by: Derek Argueta <dereka@pinterest.com>
    derekargueta authored and mattklein123 committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    699e510 View commit details
    Browse the repository at this point in the history
  2. upstream: Use valid enum value in subset lb docs (envoyproxy#7153)

    Signed-off-by: Kateryna Nezdolii <nezdolik@spotify.com>
    Kateryna Nezdolii authored and mattklein123 committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    34dbd85 View commit details
    Browse the repository at this point in the history
  3. router: scoped rds (2d): integrate SRDS API into HttpConnectionManager (

    envoyproxy#7068)
    
    Integrate the Scoped Route Discovery Service (SRDS) API into the HttpConnectionManager.
    
    NOTES:
    
    - This is the last PR in the chain originating from parent envoyproxy#5839.
    - The scoped routing logic which can be configured through this API has not yet been implemented; it will be done in follow up PRs.
    
    Risk Level: Low (API is not yet fully implemented and should not be enabled)
    Testing: Integration tests added.
    
    Signed-off-by: Andres Guedez <aguedez@google.com>
    AndresGuedez authored and htuch committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    1fdaf8e View commit details
    Browse the repository at this point in the history
  4. fuzz: fix unitialized ptr to downstreamSslConnectionInfo in TestStrea…

    …mInfo and add mock (envoyproxy#7155)
    
    Initializes downstreamSslConnectionInfo pointer in TestStreamInfo and adds a mock object for it in fuzzers.
    Fixes crash in:
    https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15066
    
    Risk Level: Low
    Testing: Add a corpus entry with downstream info.
    
    Signed-off-by: Asra Ali <asraa@google.com>
    asraa authored and lizan committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    9bdf990 View commit details
    Browse the repository at this point in the history
  5. config: centralize gRPC and REST method strings in SubscriptionFactory (

    envoyproxy#7092)
    
    Previously, constant strings like "envoy.api.v2.EndpointDiscoveryService.FetchEndpoints" were all over eds.cc, rds_impl.cc, etc, being fed into SubscriptionFactory. Now, they are all centralized in SubscriptionFactory, the only place that actually uses them. envoyproxy#4991
    
    Risk Level: low
    
    Signed-off-by: Fred Douglas <fredlas@google.com>
    fredlas authored and htuch committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    8286635 View commit details
    Browse the repository at this point in the history
  6. router: implement append_cluster, append_upstream_host, and do_not_fo…

    …rward (envoyproxy#6893)
    
     Implement three new router behaviors, append_cluster, append_upstream_host and do_not_forward. These are enabled via the new StreamDebugInfo class, although no API is provided to set them.
    Risk Level: low/medium (changes to router)
    
    Testing: added unit tests for behaviors separately and combined.
    Docs Changes: n/a
    Release Notes: n/a (I think...)
    
    Fixes: envoyproxy#6453
    
    Signed-off-by: Dan Rosen <mergeconflict@google.com>
    mergeconflict authored and htuch committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    be9d2f8 View commit details
    Browse the repository at this point in the history
  7. [test] remove translateTcpRateLimitFilter (envoyproxy#7137)

    Signed-off-by: Derek Argueta <dereka@pinterest.com>
    derekargueta authored and mattklein123 committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    30c44cc View commit details
    Browse the repository at this point in the history
  8. Update dependency on rules_foreign_cc (envoyproxy#7168)

    With this update, Envoy is compatible with the upcoming Bazel 0.27.
    
    Signed-off-by: Laurent Le Brun <laurentlb@gmail.com>
    laurentlb authored and mattklein123 committed Jun 4, 2019
    Configuration menu
    Copy the full SHA
    e0c9284 View commit details
    Browse the repository at this point in the history

Commits on Jun 5, 2019

  1. tls: update BoringSSL to e534d74f (3770). (envoyproxy#7169)

    Signed-off-by: Piotr Sikora <piotrsikora@google.com>
    PiotrSikora authored and lizan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    c167c65 View commit details
    Browse the repository at this point in the history
  2. feature edge_accept_request_id flag enablement

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    d793ec5 View commit details
    Browse the repository at this point in the history
  3. autoformat

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    3c3fc3d View commit details
    Browse the repository at this point in the history
  4. fixed missing comma

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    f0b83f0 View commit details
    Browse the repository at this point in the history
  5. added sanitization check for AcceptEdgeRequestId

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    8b87c4b View commit details
    Browse the repository at this point in the history
  6. added tests

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    23235cd View commit details
    Browse the repository at this point in the history
  7. format style

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    cb7ed16 View commit details
    Browse the repository at this point in the history
  8. updated release notes

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    fcd8791 View commit details
    Browse the repository at this point in the history
  9. removed unnecessary logs

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    db369b6 View commit details
    Browse the repository at this point in the history
  10. implemented @jmarantz code review feedback for source/common/http/con…

    …n_manager_utility.cc
    
    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    443a891 View commit details
    Browse the repository at this point in the history
  11. fixed formatting

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    ba5d821 View commit details
    Browse the repository at this point in the history
  12. revisteted @jmarantz code review changes for const

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    58b7520 View commit details
    Browse the repository at this point in the history
  13. implemented code review changes of @derekargueta

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    a6c629a View commit details
    Browse the repository at this point in the history
  14. updated tests

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    01e7226 View commit details
    Browse the repository at this point in the history
  15. format tests

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    b6f5898 View commit details
    Browse the repository at this point in the history
  16. added more tests

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    385e50e View commit details
    Browse the repository at this point in the history
  17. implemented code review changes proposed by @mattklein123

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    e1588f6 View commit details
    Browse the repository at this point in the history
  18. Configuration menu
    Copy the full SHA
    d1717d7 View commit details
    Browse the repository at this point in the history
  19. issue with bool and mutable_bool fix

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    7769e5a View commit details
    Browse the repository at this point in the history
  20. fix format

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    d584c7d View commit details
    Browse the repository at this point in the history

Commits on Jun 7, 2019

  1. implemented naming change requested by @htuch

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 7, 2019
    Configuration menu
    Copy the full SHA
    7904db5 View commit details
    Browse the repository at this point in the history
  2. format code

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 7, 2019
    Configuration menu
    Copy the full SHA
    805de12 View commit details
    Browse the repository at this point in the history

Commits on Jun 12, 2019

  1. implemented code review changes requested by @htuch

    Signed-off-by: trifan <trifan@adobe.com>
    atrifan committed Jun 12, 2019
    Configuration menu
    Copy the full SHA
    b1f51a0 View commit details
    Browse the repository at this point in the history