Skip to content

Conversation

dschaller
Copy link
Member

Signed-off-by: Derek Schaller dschaller@lyft.com

For an explanation of how to fill out the fields, please see the relevant section
in PULL_REQUESTS.md

Description: add a CSRF sandbox to the examples.
Risk Level: Low
Testing: Manually built and tested sandbox
Docs Changes: Included
Release Notes: Included

Derek Schaller added 3 commits May 3, 2019 15:19
Signed-off-by: Derek Schaller <dschaller@lyft.com>
Signed-off-by: Derek Schaller <dschaller@lyft.com>
Signed-off-by: Derek Schaller <dschaller@lyft.com>
mattklein123
mattklein123 previously approved these changes May 6, 2019
Copy link
Member

@mattklein123 mattklein123 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice, thank you! Yay for more examples!

@moderation any interest in giving this a quick glance?

Copy link
Contributor

@moderation moderation left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I couldn't get the sandbox to work as documented. I think some changes are required to the documentation and possibly re: localhost vs 127.0.0.1.

@mattklein123 mattklein123 dismissed their stale review May 6, 2019 19:36

changes needed

Signed-off-by: Derek Schaller <dschaller@lyft.com>
Signed-off-by: Derek Schaller <dschaller@lyft.com>
@dschaller
Copy link
Member Author

@moderation I overhauled things a bit. Let me know what you think.

Signed-off-by: Derek Schaller <dschaller@lyft.com>
Signed-off-by: Derek Schaller <dschaller@lyft.com>
Copy link
Contributor

@moderation moderation left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Considering we removed the requirement for Docker Machine in the sandboxes I'd rather not add it back for the CSRF sandbox. Using vanilla Docker and Docker Compose with different ports will have the same effect with a lot less software and virtualization.

Signed-off-by: Derek Schaller <dschaller@lyft.com>
@dschaller
Copy link
Member Author

@moderation updated to remove docker-machine references and bind the services to different ports

@dschaller
Copy link
Member Author

@moderation mind taking another pass?

@moderation
Copy link
Contributor

LGTM. I went through and followed the steps and confirmed that the containers come up, the tests work as expected and the stats output looks good.

Thanks.

@mattklein123
Copy link
Member

Thank you @moderation and @dschaller!

@mattklein123 mattklein123 merged commit 244f1d4 into envoyproxy:master May 21, 2019
@dschaller dschaller deleted the csrf-sandbox branch May 21, 2019 20:37
mpuncel added a commit to mpuncel/envoy that referenced this pull request May 22, 2019
* master: (65 commits)
  proto: Add PATCH method to RequestMethod enum (envoyproxy#6737)
  exe: drop unused deps on zlib compressor code (envoyproxy#7022)
  coverage: fix some misc coverage (envoyproxy#7033)
  Enable proto schema for router_check_tool (envoyproxy#6992)
  stats: rework stat sink flushing to centralize counter latching (envoyproxy#6996)
  [test] convert lds api test config stubs to v2 (envoyproxy#7021)
  router: scoped rds (2c): implement scoped rds API (envoyproxy#6932)
  build: Add option for size-optimized binary (envoyproxy#6960)
  test: adding an integration test framework for file-based LDS (envoyproxy#6933)
  doc: update obsolete ref to api/XDS_PROTOCOL.md (envoyproxy#7002)
  dispatcher: faster runOnAllThreads (envoyproxy#7011)
  example: add csrf sandbox (envoyproxy#6805)
  fix syntax of gcov exclusion zone. (envoyproxy#7023)
  /runtime_modify: add support for query params in body (envoyproxy#6977)
  stats: Create stats for http codes with the symbol table. (envoyproxy#6733)
  health check: fix more fallout from inline deletion change (envoyproxy#6988)
  Max heap fix (envoyproxy#7016)
  Add support to unregister from lifecycle notifications (envoyproxy#6984)
  build spdy_core_alt_svc_wire_format (envoyproxy#7010)
  ext_authz: Make sure initiateCall only called once (envoyproxy#6949)
  ...

Signed-off-by: Michael Puncel <mpuncel@squareup.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants