Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release/v1.2] cherry pick for v1.2.5 #5029

Open
wants to merge 10 commits into
base: release/v1.2
Choose a base branch
from

Conversation

zhaohuabing
Copy link
Member

Release Notes: Yes

zhaohuabing and others added 5 commits January 10, 2025 04:59
* fix: nil pointer error

Signed-off-by: Huabing Zhao <[email protected]>
(cherry picked from commit 10a31f1)
Signed-off-by: Huabing Zhao <[email protected]>
* fix: store one copy of HTTPRoute Extension Filters

Signed-off-by: Guy Daich <[email protected]>

* fix code review comments

Signed-off-by: Guy Daich <[email protected]>

* check if httproutefilter crd exists

Signed-off-by: Guy Daich <[email protected]>

---------

Signed-off-by: Guy Daich <[email protected]>
(cherry picked from commit 2a5ecaf)
Signed-off-by: Huabing Zhao <[email protected]>
…xy#5018)

enable ipv4 compat mode for dual stack cluster support

Signed-off-by: Will Tekulve <[email protected]>
(cherry picked from commit e028254)
Signed-off-by: Huabing Zhao <[email protected]>
…yproxy#5019)

* explicitly set ip family and family policy

Signed-off-by: Will Tekulve <[email protected]>

* add TestService cases

Signed-off-by: Will Tekulve <[email protected]>
(cherry picked from commit 4d5d3f0)
Signed-off-by: Huabing Zhao <[email protected]>
…y#5026)

* Check before setting Cookie TTL in Session Persistence

Fixes a null ptr exception when the cookie ttl is nil but was being
accessed without checking if its valid or not

Signed-off-by: Arko Dasgupta <[email protected]>

* simplify logic

Signed-off-by: Arko Dasgupta <[email protected]>
(cherry picked from commit dff0531)
Signed-off-by: Huabing Zhao <[email protected]>
@zhaohuabing zhaohuabing requested a review from a team as a code owner January 10, 2025 05:02
@zhaohuabing zhaohuabing marked this pull request as draft January 10, 2025 05:02
* fix: dont shift listener ports for Standalone mode

Fixes: envoyproxy#4981

Signed-off-by: Arko Dasgupta <[email protected]>

* test

Signed-off-by: Arko Dasgupta <[email protected]>

* fix lint

Signed-off-by: Arko Dasgupta <[email protected]>

---------

Signed-off-by: Arko Dasgupta <[email protected]>
(cherry picked from commit 84f2ad2)
Signed-off-by: Huabing Zhao <[email protected]>
@zhaohuabing zhaohuabing marked this pull request as ready for review January 10, 2025 06:19
Copy link

codecov bot commented Jan 10, 2025

Codecov Report

Attention: Patch coverage is 63.27684% with 65 lines in your changes missing coverage. Please review.

Project coverage is 65.83%. Comparing base (7854b27) to head (7ff6ee9).

Files with missing lines Patch % Lines
internal/ir/xds.go 0.00% 37 Missing ⚠️
internal/gatewayapi/securitypolicy.go 74.54% 10 Missing and 4 partials ⚠️
internal/gatewayapi/runner/runner.go 0.00% 9 Missing ⚠️
internal/provider/kubernetes/routes.go 78.57% 2 Missing and 1 partial ⚠️
internal/provider/kubernetes/filters.go 60.00% 1 Missing and 1 partial ⚠️
Additional details and impacted files
@@               Coverage Diff                @@
##           release/v1.2    #5029      +/-   ##
================================================
+ Coverage         65.79%   65.83%   +0.04%     
================================================
  Files               211      211              
  Lines             31983    32068      +85     
================================================
+ Hits              21043    21113      +70     
- Misses             9687     9704      +17     
+ Partials           1253     1251       -2     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@arkodg
Copy link
Contributor

arkodg commented Jan 10, 2025

Dean-Coakley and others added 4 commits January 13, 2025 01:29
…ec (envoyproxy#4938)

* Fix shutdown-manager not respecting security context of container spec

Signed-off-by: Dean Coakley <[email protected]>

* Update securityContext testdata

Signed-off-by: Dean Coakley <[email protected]>

* Lint with gci

Signed-off-by: Dean Coakley <[email protected]>

---------

Signed-off-by: Dean Coakley <[email protected]>
(cherry picked from commit 43621b4)
Signed-off-by: Huabing Zhao <[email protected]>
…ell-known endpoint. (envoyproxy#4857)

* add e2e test for OIDC provider with TLS

Signed-off-by: Huabing Zhao <[email protected]>

* delete file

Signed-off-by: Huabing Zhao <[email protected]>

* fix lint

Signed-off-by: Huabing Zhao <[email protected]>

* use TLS config from BTLPolicy to fetch auth endpoint

Signed-off-by: Huabing Zhao <[email protected]>

* refactor

Signed-off-by: Huabing Zhao <[email protected]>

* update release note

Signed-off-by: Huabing Zhao <[email protected]>

* update release note

Signed-off-by: Huabing Zhao <[email protected]>

* fix test

Signed-off-by: Huabing Zhao <[email protected]>

* fix test

Signed-off-by: Huabing Zhao <[email protected]>

* fix test

Signed-off-by: Huabing Zhao <[email protected]>

* fix test

Signed-off-by: Huabing Zhao <[email protected]>

* fix test

Signed-off-by: Huabing Zhao <[email protected]>

* fix lint

Signed-off-by: Huabing Zhao <[email protected]>

---------

Signed-off-by: Huabing Zhao <[email protected]>
Signed-off-by: Huabing (Robin) Zhao <[email protected]>
(cherry picked from commit 3a39c35)
Signed-off-by: Huabing Zhao <[email protected]>
…oyproxy#4803)

* fix: allow hostname to use subdomain with single label/character

Signed-off-by: Taufik Mulyana <[email protected]>
(cherry picked from commit fcdbafa)
Signed-off-by: Huabing Zhao <[email protected]>
Signed-off-by: Huabing Zhao <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants