Skip to content

Conversation

yxue
Copy link
Member

@yxue yxue commented Feb 19, 2020

fixes #21230

@yxue yxue requested a review from a team as a code owner February 19, 2020 03:41
@googlebot googlebot added the cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. label Feb 19, 2020
@istio-testing istio-testing added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Feb 19, 2020
@yxue
Copy link
Member Author

yxue commented Feb 19, 2020

/retest

@@ -1249,8 +1249,8 @@ func setUpstreamProtocol(node *model.Proxy, cluster *apiv2.Cluster, port *model.
}
}

if (util.IsProtocolSniffingEnabledForInboundPort(node, port) && direction == model.TrafficDirectionInbound) ||
(util.IsProtocolSniffingEnabledForOutboundPort(node, port) && direction == model.TrafficDirectionOutbound) {
if node.Type == model.SidecarProxy && ((util.IsProtocolSniffingEnabledForInboundPort(node, port) && direction == model.TrafficDirectionInbound) ||
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good, better add some comments

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you please explain in comments, why enabling it for gateways is a problem so that it is more clear on why we are adding only for sidecar?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for adding the comments, looks good

Copy link
Member

@howardjohn howardjohn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should add a test for h1, h2 through gateway probably

@istio-testing istio-testing merged commit f27a28e into istio:master Feb 19, 2020
sdake pushed a commit to sdake/istio that referenced this pull request Feb 21, 2020
* remove use_downstream_protocol for gateway

* comment

* writing
@howardjohn
Copy link
Member

/cherrypick release-1.5

@istio-testing
Copy link
Collaborator

@howardjohn: new pull request created: #21726

In response to this:

/cherrypick release-1.5

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@howardjohn
Copy link
Member

/cherrypick release-1.4

@istio-testing
Copy link
Collaborator

@howardjohn: new pull request created: #21727

In response to this:

/cherrypick release-1.4

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/networking cla: yes Set by the Google CLA bot to indicate the author of a PR has signed the Google CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Protocol Detection breaking H2 traffic to gateway
8 participants