Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge release-1.1 into master #13207

Merged
merged 26 commits into from
Apr 11, 2019
Merged

Merge release-1.1 into master #13207

merged 26 commits into from
Apr 11, 2019

Conversation

howardjohn
Copy link
Member

Needs to be manually merged so changes are not squashed

lei-tang and others added 26 commits March 29, 2019 14:20
* respect the lb weight setting from users

* add ut

* fix golint

* add locality lb setting test

* fix lint

* update test case

* update test case

* lint
…o#12724)

* auto bind to TCP services for egress ports in Sidecar

Signed-off-by: Shriram Rajagopalan <rshriram@gmail.com>

* fix test

Signed-off-by: Shriram Rajagopalan <rshriram@gmail.com>
* check match direction

* Cleanup http route generation

* undo pickMatching change

* golangbot comments

* address review comments

* fix validation bug

* gofmt

* check for intersection duplicates
* Add wildcard route fallthrough

Currently, ALLOW_ANY doesn't actually allow any external traffic if there is an http service already present on a port. This change adds a wildcard PassthroughCluster as the final route, allowing external traffic even if there is already a service on the port.

Additionally, in REGISTRY_ONLY mode, we will return a 404 error if there
is already an http service. This is misleading, as it can be conflated
with a 404 error returned from the actual service. When in REGISTRY_ONLY
mode, we instead return a 502 error to indicate the request is blocked.

* add unit tests

* Remove node-level flag

* Fix tests
…ver adapter (istio#12850) (istio#12936)

* Change Ip Address to readable format in accesslog from stdio adapter

* Add a check to validate it's an IP Address before calling ip.string function

* Fix formatting error

* Fix test

* Correct stringify function in instanceUtil.go too for IP address

* Fix based on review

* Fix based on review

* Fix based on review
* do ipv4 lookups for pilot and zipkin

Signed-off-by: Shriram Rajagopalan <rshriram@gmail.com>

* update goldens

Signed-off-by: Shriram Rajagopalan <rshriram@gmail.com>
* Cherry pick from master: Configuration:  no longer hardcode mesh certs (istio#12189)

* Configuration: Pilot-Agent: no longer hardcode certs to watch. Pilot-Discovery: no longer hardcode Envoy listener cert paths.

* Address demands of golangcibot overlord

* Change usages of github.com/stretchr/testify/require to github.com/stretchr/testify/assert

* Address code style violation

* Revert temporary api changes. Set cert paths in envoy node metadata and use them when setting up listeners

* Use envoy node metadata cert paths (if available) when constructing clusters

* Rename constants to make golint happy

* Fix imports

* Ignore ordering in test

* Pass around proxy instead of proxy.Metadata

(cherry picked from commit 7c34274)

* goimports file
* Add support for datadog tracing.

Signed-off-by: Caleb Gilmour <caleb.gilmour@datadoghq.com>

* Use $(HOST_IP) instead of special-casing empty address value

Signed-off-by: Caleb Gilmour <caleb.gilmour@datadoghq.com>
* Add x alias to experimental istioctl command

I'm super lazy and experimental is far too much effort to type

Signed-off-by: Liam White <liam@tetrate.io>

* Add exp as an additional alias

Signed-off-by: Liam White <liam@tetrate.io>
* Add jitter in CSR request

* Add log

* Fix comments

* Fix test

* Fix test

* Fix comment
* Fix updateClusterInc for overlapping ports

It is possible that a service will have multiple ports, with the same
port number. The typical example here is kube-dns, which uses port 53
for UDP and TCP. When we do an incremental push, we would select the
first port to match the port number, which would sometimes causes us to
ignore the correct port. This fix searches through all matching ports.

* Ensure port number matches as well

* Add unit tests

* remove dead code
Also fixes bug where non-kube envs could override to something that parsed incorrectly

Signed-off-by: Liam White <liam@tetrate.io>
…12815)

* cherry pick subset of istio#12689

Signed-off-by: Kuat Yessenov <kuat@google.com>

* add support for compiled in adapters

Signed-off-by: Kuat Yessenov <kuat@google.com>

* patch log line

Signed-off-by: Kuat Yessenov <kuat@google.com>
* Reduce Pilot resource requests for demo

* Add limits as well
@howardjohn howardjohn added the do-not-merge/hold Block automatic merging of a PR. label Apr 10, 2019
@istio-testing
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: howardjohn
To fully approve this pull request, please assign additional approvers.
We suggest the following additional approver: geeknoid

If they are not already assigned, you can assign the PR to them by writing /assign @geeknoid in a comment when ready.

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@googlebot
Copy link
Collaborator

So there's good news and bad news.

👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there.

😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request.

Note to project maintainer: This is a terminal state, meaning the cla/google commit status will not change from this state. It's up to you to confirm consent of all the commit author(s), set the cla label to yes (if enabled on your project), and then merge this pull request when appropriate.

ℹ️ Googlers: Go here for more info.

@googlebot googlebot added the cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. label Apr 10, 2019
@codecov
Copy link

codecov bot commented Apr 10, 2019

Codecov Report

Merging #13207 into master will increase coverage by 1%.
The diff coverage is 81%.

Impacted file tree graph

@@            Coverage Diff            @@
##           master   #13207     +/-   ##
=========================================
+ Coverage      72%      72%     +1%     
=========================================
  Files         659      607     -52     
  Lines       56634    53994   -2640     
=========================================
- Hits        40211    38448   -1763     
+ Misses      14134    13401    -733     
+ Partials     2289     2145    -144
Impacted Files Coverage Δ
istioctl/cmd/istioctl/main.go 68% <ø> (-1%) ⬇️
security/pkg/nodeagent/cache/secretcache.go 78% <100%> (+2%) ⬆️
pilot/pkg/networking/core/v1alpha3/cluster.go 85% <100%> (+1%) ⬆️
pilot/pkg/model/context.go 77% <100%> (+1%) ⬆️
...ilot/pkg/networking/plugin/authn/authentication.go 91% <100%> (+1%) ⬆️
pilot/pkg/networking/core/v1alpha3/listener.go 86% <100%> (+1%) ⬆️
istioctl/pkg/writer/envoy/configdump/cluster.go 80% <100%> (ø) ⬆️
pilot/pkg/model/service.go 92% <100%> (+2%) ⬆️
mixer/adapter/stdio/stdio.go 100% <100%> (ø) ⬆️
pkg/features/pilot/pilot.go 100% <100%> (ø) ⬆️
... and 374 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 4ae096d...254577c. Read the comment docs.

1 similar comment
@codecov
Copy link

codecov bot commented Apr 10, 2019

Codecov Report

Merging #13207 into master will increase coverage by 1%.
The diff coverage is 81%.

Impacted file tree graph

@@            Coverage Diff            @@
##           master   #13207     +/-   ##
=========================================
+ Coverage      72%      72%     +1%     
=========================================
  Files         659      607     -52     
  Lines       56634    53994   -2640     
=========================================
- Hits        40211    38448   -1763     
+ Misses      14134    13401    -733     
+ Partials     2289     2145    -144
Impacted Files Coverage Δ
istioctl/cmd/istioctl/main.go 68% <ø> (-1%) ⬇️
security/pkg/nodeagent/cache/secretcache.go 78% <100%> (+2%) ⬆️
pilot/pkg/networking/core/v1alpha3/cluster.go 85% <100%> (+1%) ⬆️
pilot/pkg/model/context.go 77% <100%> (+1%) ⬆️
...ilot/pkg/networking/plugin/authn/authentication.go 91% <100%> (+1%) ⬆️
pilot/pkg/networking/core/v1alpha3/listener.go 86% <100%> (+1%) ⬆️
istioctl/pkg/writer/envoy/configdump/cluster.go 80% <100%> (ø) ⬆️
pilot/pkg/model/service.go 92% <100%> (+2%) ⬆️
mixer/adapter/stdio/stdio.go 100% <100%> (ø) ⬆️
pkg/features/pilot/pilot.go 100% <100%> (ø) ⬆️
... and 374 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 4ae096d...254577c. Read the comment docs.

@istio-testing
Copy link
Collaborator

@howardjohn: The following tests failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/istio-pilot-multicluster-e2e.sh 254577c link /test istio-pilot-multicluster-e2e
prow/istio-integ-k8s-tests.sh 254577c link /test istio-integ-k8s-tests

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@howardjohn howardjohn added cla: human-approved and removed cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. labels Apr 10, 2019
@googlebot
Copy link
Collaborator

A Googler has manually verified that the CLAs look good.

(Googler, please make sure the reason for overriding the CLA status is clearly documented in these comments.)

ℹ️ Googlers: Go here for more info.

@howardjohn
Copy link
Member Author

All failures are known failures

@rshriram rshriram merged commit f523998 into istio:master Apr 11, 2019
@howardjohn howardjohn deleted the master-merge branch April 11, 2019 15:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/hold Block automatic merging of a PR.
Projects
None yet
Development

Successfully merging this pull request may close these issues.