Skip to content

Conversation

nrjpoddar
Copy link
Member

@nrjpoddar nrjpoddar commented Oct 3, 2019

@googlebot
Copy link

All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter.

We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only @googlebot I consent. in this pull request.

Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the cla label to yes (if enabled on your project).

ℹ️ Googlers: Go here for more info.

…ny recursively (envoyproxy#8231)

Use TextFormat::Print with SetExpandAny(true) instead of SerializeAsString to calculate hash with Any expanded.

Risk Level: Med
Testing: CI, regression test

Fixes envoyproxy#5744.

Signed-off-by: Lizan Zhou <lizan@tetrate.io>
(cherry picked from commit 647aea1)
@googlebot
Copy link

CLAs look good, thanks!

ℹ️ Googlers: Go here for more info.

@nrjpoddar
Copy link
Member Author

@howardjohn @rlenglet are there no CI integrations for this repo?

@mandarjog mandarjog requested review from kyessenov and removed request for howardjohn October 3, 2019 14:49
@mandarjog
Copy link

Is this a cherry pick?

@nrjpoddar
Copy link
Member Author

Yes cherry-pick of 647aea1 from envoyproxy/envoy to get stable serialization for Protobuf.Any

@nrjpoddar nrjpoddar changed the title proto: re-implement MessageUtil::hash function to consistently hash A… Cherrypick 647aea1 from envoyproxy/envoy Oct 3, 2019
@kyessenov
Copy link

Ping @JimmyCYJ -- this fixes SDS, too, I think.

@kyessenov
Copy link

This doesn't look like a clean cherry-pick. Did you amend the commit?

@nrjpoddar
Copy link
Member Author

This doesn't look like a clean cherry-pick. Did you amend the commit?

Yes, there was a conflict in header includes:

#include "envoy/config/grpc_credential/v2alpha/file_based_metadata.pb.h"

#include "common/common/base64.h"

Copy link

@rlenglet rlenglet left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please someone else review and approve.
I'm not rejecting the PR, I'm only blocking merging it until after 1.3.2 is released on October 8, to keep the release-1.3 history as-is.
I'll approve this PR afterwards to include into 1.3.3.

@nrjpoddar
Copy link
Member Author

Ping @JimmyCYJ -- this fixes SDS, too, I think.

@JimmyCYJ what SDS issue are we talking about here?

@kyessenov can I get a lgtm?

Copy link

@lambdai lambdai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

This one is a MUST-HAVE in 1.3.3

@nrjpoddar
Copy link
Member Author

@rlenglet can this merged now?

@rlenglet
Copy link

rlenglet commented Oct 8, 2019

No, 1.3.2 hasn't been released. I'll merge this after we do some cleanup post-1.3.2.

@rlenglet
Copy link

rlenglet commented Oct 9, 2019

@nrjpoddar Please add an item for this PR into the 1.3.3 release note draft.

howardjohn pushed a commit that referenced this pull request Mar 3, 2020
Given that we allow creating zero byte fragments, it'd be good to proactively drain them. For example if someone is doing timing instrumentation and wants to know when Network::Connection data is written to the kernel, it could be useful to have a zero byte sentinel.

Risk Level: Low (I don't think anyone is adding zero byte fragments yet)
Testing: new unit test
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: Jianfei Hu <jianfeih@google.com>
Co-authored-by: Lizan Zhou <lizan@tetrate.io>
istio-testing pushed a commit that referenced this pull request Mar 3, 2020
Given that we allow creating zero byte fragments, it'd be good to proactively drain them. For example if someone is doing timing instrumentation and wants to know when Network::Connection data is written to the kernel, it could be useful to have a zero byte sentinel.

Risk Level: Low (I don't think anyone is adding zero byte fragments yet)
Testing: new unit test
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>

Co-authored-by: Lizan Zhou <lizan@tetrate.io>
fpesce pushed a commit that referenced this pull request Jun 30, 2020
Given that we allow creating zero byte fragments, it'd be good to proactively drain them. For example if someone is doing timing instrumentation and wants to know when Network::Connection data is written to the kernel, it could be useful to have a zero byte sentinel.

Risk Level: Low (I don't think anyone is adding zero byte fragments yet)
Testing: new unit test
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
brian-avery pushed a commit that referenced this pull request Jun 30, 2020
Given that we allow creating zero byte fragments, it'd be good to proactively drain them. For example if someone is doing timing instrumentation and wants to know when Network::Connection data is written to the kernel, it could be useful to have a zero byte sentinel.

Risk Level: Low (I don't think anyone is adding zero byte fragments yet)
Testing: new unit test
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: Jianfei Hu <jianfeih@google.com>
Co-authored-by: Lizan Zhou <lizan@tetrate.io>
Miss-you pushed a commit to Miss-you/envoy that referenced this pull request Nov 17, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants