Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also .

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also .
base repository: envoyproxy/envoy
base: v1.16.0
Choose a base ref
head repository: envoyproxy/envoy
compare: v1.16.1
Choose a head ref
  • 10 commits
  • 94 files changed
  • 8 contributors

Commits on Oct 21, 2020

  1. docs: kick-off 1.16.1-dev (#13664)

    Signed-off-by: Lizan Zhou <lizan@tetrate.io>
    lizan committed Oct 21, 2020
  2. 1.16: CI fixes backport (#13665)

    Backport following commits to 1.16:
    748b2ab (mac ci: try ignoring update failure (#13658), 2020-10-20)
    f95f539 (ci: various improvements (#13660), 2020-10-20)
    6481a27 (ci: stop building alpine-debug images in favor of ubuntu-based debug image (#13598), 2020-10-15)
    73d78f8 (ci: use multiple stage (#13557), 2020-10-15)
    b7a4756 (ci: use azp for api and go-control-plane sync (#13550), 2020-10-14)
    876a6bb (ci use azp to sync filter example (#13501), 2020-10-12)
    a0f31ee (ci: use azp to generate docs (#13481), 2020-10-12)
    7e5d854 (ci: bring BAZEL_BUILD_OPTIONS back for format and docs (#13480), 2020-10-11)
    7af2b2b (ci: use same flaky test process script on macOS (#13485), 2020-10-10)
    
    Signed-off-by: Lizan Zhou <lizan@tetrate.io>
    Co-authored-by: asraa <asraa@google.com>
    lizan and asraa committed Oct 21, 2020

Commits on Nov 5, 2020

  1. backport: Prevent SEGFAULT when disabling listener (#13515) (#13882)

    * Prevent SEGFAULT when disabling listener (#13515)
    
    This prevents the stop_listening overload action from causing
    segmentation faults that can occur if the action is enabled after the
    listener has already shut down.
    
    Signed-off-by: Alex Konradi <akonradi@google.com>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    cpakulski committed Nov 5, 2020

Commits on Nov 11, 2020

  1. backport to rel-1.16: proxy_proto - fixing hashing bug #13768 (#13966)

    Fix a bug where the transport socket options for the first downstream got reused for subsequent upstream connections.
    
    Risk Level: low
    Testing: new integration test
    Docs Changes: n/a
    Release Notes:
    Platform Specific Features:
    Fixes #13659
    
    Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    cpakulski committed Nov 11, 2020

Commits on Nov 16, 2020

  1. backport to 1.16: connection: Remember transport socket read resumpti…

    …on requests and replay them when re-enabling read. (#13772) (#14017)
    
    Fixes SslSocket read resumption after readDisable when processing the SSL record that contains the last bytes of the HTTP message
    
    Risk Level: low
    Testing: new unit and integration tests
    Docs Changes: n/a
    Release Notes: added
    Platform Specific Features: n/a
    Fixes #12304
    
    Signed-off-by: Antonio Vicente <avd@google.com>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    cpakulski committed Nov 16, 2020

Commits on Nov 19, 2020

  1. disable exact memory checks until we can sort out what changed in tcm…

    …alloc (#13447) (#14082)
    
    Signed-off-by: Joshua Marantz <jmarantz@google.com>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    
    Co-authored-by: Joshua Marantz <jmarantz@google.com>
    cpakulski and jmarantz committed Nov 19, 2020

Commits on Nov 20, 2020

  1. test: avoid use after free in oauth_integration_test (#14103) (#14127)

    The client request stream can be deleted under the call stack of Envoy::IntegrationCodecClient::startRequest if the proxy replies quickly enough. Attempts to send an end stream on that request result in use-after-free on the client stream in cases where the client processed the full reply inside startRequest.
    
    Fixes #12960
    
    Signed-off-by: Antonio Vicente <avd@google.com>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    
    Co-authored-by: antonio <avd@google.com>
    cpakulski and antoniovicente committed Nov 20, 2020
  2. backport to 1.16: examples to use v3 configs (#14125)

    Backport of PR #13529 and #13503
    
    Signed-off-by: Ryan Northey <ryan@synca.io>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    
    Co-authored-by: phlax <phlax@users.noreply.github.com>
    cpakulski and phlax committed Nov 20, 2020

Commits on Nov 21, 2020

  1. backport to 1.16: udp: properly handle truncated/dropped datagrams (#…

    …14130)
    
    Signed-off-by: Matt Klein <mklein@lyft.com>
    Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
    Co-authored-by: Matt Klein <mklein@lyft.com>
    Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
    cpakulski and Matt Klein committed Nov 21, 2020
  2. backport to 1.16: proxy protocol: set downstreamRemoteAddress on Stre…

    …amInfo (#14132)
    
    This fixes a regression which resulted in the downstreamRemoteAddress
    on the StreamInfo for a connection not having the address supplied by
    the proxy protocol filter, but instead having the address of the
    directly connected peer.
    
    This issue does not affect HTTP filters.
    
    Signed-off-by: Greg Greenway <ggreenway@apple.com>
    ggreenway committed Nov 21, 2020