Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

internal/xdscache: include global rate limits for secure vhosts #3410

Merged
merged 3 commits into from
Feb 26, 2021

Conversation

skriss
Copy link
Member

@skriss skriss commented Feb 25, 2021

Fixes a bug where global rate limit policies were being ignored
when defined at the virtual host level on secure vhosts.

Fixes #3409.

Signed-off-by: Steve Kriss krisss@vmware.com

@skriss
Copy link
Member Author

skriss commented Feb 25, 2021

I did a quick manual test on this and it seems to fix the issue but I'll do more thorough testing and add an integration test tomorrow.

@codecov
Copy link

codecov bot commented Feb 25, 2021

Codecov Report

Merging #3410 (3d3a449) into main (46cff7c) will increase coverage by 0.06%.
The diff coverage is 100.00%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #3410      +/-   ##
==========================================
+ Coverage   75.39%   75.45%   +0.06%     
==========================================
  Files          98       98              
  Lines        6588     6592       +4     
==========================================
+ Hits         4967     4974       +7     
+ Misses       1513     1510       -3     
  Partials      108      108              
Impacted Files Coverage Δ
internal/xdscache/v3/route.go 84.78% <100.00%> (+0.45%) ⬆️
internal/k8s/log.go 69.56% <0.00%> (+6.52%) ⬆️

@skriss skriss force-pushed the fix-3409 branch 2 times, most recently from 8aeae97 to 64a1937 Compare February 25, 2021 04:02
@skriss skriss marked this pull request as ready for review February 25, 2021 16:49
@skriss skriss requested a review from a team as a code owner February 25, 2021 16:49
@skriss skriss requested review from sunjayBhatia, youngnick and stevesloka and removed request for a team February 25, 2021 16:49
@skriss
Copy link
Member Author

skriss commented Feb 25, 2021

400+ lines of tests for 6 lines of code :/

Fixes a bug where global rate limit policies were being ignored
when defined at the virtual host level on secure vhosts.

Fixes projectcontour#3409.

Signed-off-by: Steve Kriss <krisss@vmware.com>
Signed-off-by: Steve Kriss <krisss@vmware.com>
Signed-off-by: Steve Kriss <krisss@vmware.com>
@skriss skriss merged commit a9a12d9 into projectcontour:main Feb 26, 2021
@skriss skriss deleted the fix-3409 branch February 26, 2021 16:48
skriss added a commit to skriss/contour that referenced this pull request Mar 1, 2021
…ectcontour#3410)

Fixes a bug where global rate limit policies were being ignored
when defined at the virtual host level on secure vhosts.

Fixes projectcontour#3409.

Signed-off-by: Steve Kriss <krisss@vmware.com>
skriss added a commit that referenced this pull request Mar 1, 2021
* internal/xdscache: include global rate limits for secure vhosts (#3410)

Fixes a bug where global rate limit policies were being ignored
when defined at the virtual host level on secure vhosts.

Fixes #3409.

Signed-off-by: Steve Kriss <krisss@vmware.com>

* cmd/contour: pass pointers to StatusAddressUpdater (#3412)

Fixes an issue where non-pointers were being passed to
the StatusAddressUpdater when the load balancer address
changed, which was resulting in HTTPProxies/Ingresses
not immediately getting updated with the new address.

Fixes #3411.

Signed-off-by: Steve Kriss <krisss@vmware.com>

* examples: update Envoy to 1.17.1 (#3417)

Signed-off-by: Steve Kriss <krisss@vmware.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

global rate limiting policy ignored when defined for a TLS virtual host at the vhost level
3 participants