Skip to content

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4#845

Merged
mathetake merged 1 commit intomainfrom
dependabot/go_modules/helm.sh/helm/v3-3.18.4
Jul 8, 2025
Merged

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4#845
mathetake merged 1 commit intomainfrom
dependabot/go_modules/helm.sh/helm/v3-3.18.4

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Jul 8, 2025

Bumps helm.sh/helm/v3 from 3.17.3 to 3.18.4.

Release notes

Sourced from helm.sh/helm/v3's releases.

Helm v3.18.4 is a security release. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages

Installation and Upgrading

Download Helm v3.18.4. The common platform binaries are here:

The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with bash.

What's Next

  • 3.18.5 is the next patch release and will be on August 13, 2025
  • 3.19.0 is the next minor release and will be on September 11, 2025

Changelog

  • Disabling linter due to unknown issue f20a4ad1d5c953ca0fb3d3b30aa9aa796d472ef1 (Matt Farina)
  • build(deps): bump the k8s-io group with 7 updates 563b0947b995c48354319aa054830db61f793a08 (dependabot[bot])
  • Updating link handling 00de613324df4dd930e6d231d9aae7f9dee29c76 (Matt Farina)

Helm 3.18.3

Helm v3.18.3 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages

... (truncated)

Commits
  • d80839c Merge pull request #31037 from mattfarina/disable-goimports-2
  • f20a4ad Disabling linter due to unknown issue
  • c48c500 Merge commit from fork
  • 563b094 build(deps): bump the k8s-io group with 7 updates
  • 00de613 Updating link handling
  • 6838ebc build(deps): bump golang.org/x/crypto from 0.38.0 to 0.39.0
  • 5b9e2f6 fix: user username password for login
  • 2782412 Update pkg/registry/transport.go
  • e66cf6a Update pkg/registry/transport.go
  • 191f05c fix: add debug logging to oci transport
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.17.3 to 3.18.4.
- [Release notes](https://github.com/helm/helm/releases)
- [Commits](helm/helm@v3.17.3...v3.18.4)

---
updated-dependencies:
- dependency-name: helm.sh/helm/v3
  dependency-version: 3.18.4
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jul 8, 2025
@dependabot dependabot bot requested a review from a team as a code owner July 8, 2025 23:26
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jul 8, 2025
@mathetake mathetake merged commit 41a2923 into main Jul 8, 2025
38 of 39 checks passed
@mathetake mathetake deleted the dependabot/go_modules/helm.sh/helm/v3-3.18.4 branch July 8, 2025 23:45
yuzisun pushed a commit to yuzisun/ai-gateway that referenced this pull request Jul 9, 2025
alexagriffith pushed a commit to sukumargaonkar/ai-gateway that referenced this pull request Jul 9, 2025
**Description**

This commit removes the handwritten header matching code from the
extproc, and instead starts utilizing the hardened envoy native router.

Historically, we had only one giant extproc filter where we did all
logics including model name extraction, routing and then body
transformation & upstream authorization. Since envoyproxy#599, we split into two
external processor filters; one sits at the normal HTTP router and the
other is configured at the per-cluster upstream HTTP filter. In theory,
the one at HTTP router has only one job on request path: extracting
model name from the request body. However, due to the historical reason,
the handwritten router logic component remained, and that comes with not
only a maintenance cost (forcing a complex extproc & control plane
orchestration) but also a potential security vulnerability. In fact,
writing header matching logic can be an easy attack surface, so if it's
possible, we should avoid writing our own header matching (routing
logic) but should rely on the battle-tested hardened envoy native
router.

With this commit, now a regex matching is available as well as there's
no difference between HTTPRoute's matching and AIGatewayRoute's matching
implementation. This also opens up a possibility to support path
matching in our rule.

**Related Issues/PRs (if applicable)**

Ref envoyproxy#612
Ref envoyproxy#73

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: fix aigw parentRefs in fallback (envoyproxy#824)

**Description**

This PR fixed the AIGatewayRoute parentRefs in fallback guides.

Signed-off-by: bitliu <bitliu@tencent.com>

chore: make test-e2e logs visible (envoyproxy#825)

**Description**

This PR is to make  test-e2e logs visible in local.

Signed-off-by: bitliu <bitliu@tencent.com>

extproc: account for parallel tool calls (envoyproxy#813)

**Description**
Resolves envoyproxy#736

Assistant that calls multiple tools are expected to group tool result in
the same message. Adding logic for that!

---------

Signed-off-by: Aaron Choo <achoo30@bloomberg.net>
Signed-off-by: Dan Sun <dsun20@bloomberg.net>
Co-authored-by: Dan Sun <dsun20@bloomberg.net>

build(deps): bump google.golang.org/genai from 1.13.0 to 1.14.0 (envoyproxy#833)

extproc: return 404 instead of 500 for unknown path (envoyproxy#835)

**Description**

Previously, unknown path was responded as an internal error as opposed
to the fact that it's an 404 with the user input root cause. This fixes
the extproc code that way, now that users will be able to know what's
wrong with the operation instead of getting the cryptic 500 error.

**Related Issues/PRs (if applicable)**

Contributes to envoyproxy#810
Closes envoyproxy#724

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: add endpoint support (envoyproxy#787)

**Description**

This PR adds the endpoint support pages for EAGW.

**Related Issues/PRs (if applicable)**

Fixes: envoyproxy#705

**Special notes for reviewers (if applicable)**

@mathetake

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Erica Hughberg <erica.sundberg.90@gmail.com>

controller: return 404 instead of 500 for no matching (envoyproxy#837)

**Description**

Before envoyproxy#793, the case where no matching route found was handled in the
extproc and the 404 immediate response was returned from there, but
after that, it naturally results in the "unreachable" default route and
swallowed the indication of no matching and it made it impossible to
reason about the 500 error on that case. In other words, this fixes the
regression in envoyproxy#793 to return the proper 404 response.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

update

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit passing

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove header hotfix

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit working
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

 add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

test: adds real provider embeddings test & update doc (envoyproxy#841)

**Description**

This adds embeddings endpoint tests with the providers that support the
endpoint. This only added the providers for which we have credentials.
According to the testing situation we have right now, this also
clarifies in the "Supported Endpoints" page that which provider is
tested and which is not for each endpoint.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

cli: adds default route test (envoyproxy#842)

**Description**

This adds an additional test to aigw run command so that we can verify
that setting the default route is possible.

**Related Issues/PRs (if applicable)**

Closes envoyproxy#612

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4 (envoyproxy#845)

test: fixes TestStartConfigWatcher flake (envoyproxy#843)

controller: ensure eg rollout when deployed as daemonset (envoyproxy#831)

**Description**
This PR handles the rollout for envoy gateway during ai gateway extproc
upgrade when deployed as daemonset.

Related Issues/PRs (if applicable)
Related PR: envoyproxy#699

---------

Signed-off-by: Dan Sun <dsun20@bloomberg.net>

make test var

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>
alexagriffith added a commit to sukumargaonkar/ai-gateway that referenced this pull request Jul 9, 2025
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

lint no err

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add translation

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

update so tests work

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more tests

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove print

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

refactor: deprecate targetRefs in favor or parentRefs  (envoyproxy#821)

docs: add epp integration proposal (envoyproxy#771)

**Description**

This PR adds the proposal for supporting Integration with Endpoint
Picker(GIE)

Related to envoyproxy#423

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: update epp outdated logics (envoyproxy#822)

refactor: use Envoy native router (envoyproxy#793)

**Description**

This commit removes the handwritten header matching code from the
extproc, and instead starts utilizing the hardened envoy native router.

Historically, we had only one giant extproc filter where we did all
logics including model name extraction, routing and then body
transformation & upstream authorization. Since envoyproxy#599, we split into two
external processor filters; one sits at the normal HTTP router and the
other is configured at the per-cluster upstream HTTP filter. In theory,
the one at HTTP router has only one job on request path: extracting
model name from the request body. However, due to the historical reason,
the handwritten router logic component remained, and that comes with not
only a maintenance cost (forcing a complex extproc & control plane
orchestration) but also a potential security vulnerability. In fact,
writing header matching logic can be an easy attack surface, so if it's
possible, we should avoid writing our own header matching (routing
logic) but should rely on the battle-tested hardened envoy native
router.

With this commit, now a regex matching is available as well as there's
no difference between HTTPRoute's matching and AIGatewayRoute's matching
implementation. This also opens up a possibility to support path
matching in our rule.

**Related Issues/PRs (if applicable)**

Ref envoyproxy#612
Ref envoyproxy#73

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: fix aigw parentRefs in fallback (envoyproxy#824)

**Description**

This PR fixed the AIGatewayRoute parentRefs in fallback guides.

Signed-off-by: bitliu <bitliu@tencent.com>

chore: make test-e2e logs visible (envoyproxy#825)

**Description**

This PR is to make  test-e2e logs visible in local.

Signed-off-by: bitliu <bitliu@tencent.com>

extproc: account for parallel tool calls (envoyproxy#813)

**Description**
Resolves envoyproxy#736

Assistant that calls multiple tools are expected to group tool result in
the same message. Adding logic for that!

---------

Signed-off-by: Aaron Choo <achoo30@bloomberg.net>
Signed-off-by: Dan Sun <dsun20@bloomberg.net>
Co-authored-by: Dan Sun <dsun20@bloomberg.net>

build(deps): bump google.golang.org/genai from 1.13.0 to 1.14.0 (envoyproxy#833)

extproc: return 404 instead of 500 for unknown path (envoyproxy#835)

**Description**

Previously, unknown path was responded as an internal error as opposed
to the fact that it's an 404 with the user input root cause. This fixes
the extproc code that way, now that users will be able to know what's
wrong with the operation instead of getting the cryptic 500 error.

**Related Issues/PRs (if applicable)**

Contributes to envoyproxy#810
Closes envoyproxy#724

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: add endpoint support (envoyproxy#787)

**Description**

This PR adds the endpoint support pages for EAGW.

**Related Issues/PRs (if applicable)**

Fixes: envoyproxy#705

**Special notes for reviewers (if applicable)**

@mathetake

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Erica Hughberg <erica.sundberg.90@gmail.com>

controller: return 404 instead of 500 for no matching (envoyproxy#837)

**Description**

Before envoyproxy#793, the case where no matching route found was handled in the
extproc and the 404 immediate response was returned from there, but
after that, it naturally results in the "unreachable" default route and
swallowed the indication of no matching and it made it impossible to
reason about the 500 error on that case. In other words, this fixes the
regression in envoyproxy#793 to return the proper 404 response.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

update

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit passing

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove header hotfix

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit working
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

 add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

test: adds real provider embeddings test & update doc (envoyproxy#841)

**Description**

This adds embeddings endpoint tests with the providers that support the
endpoint. This only added the providers for which we have credentials.
According to the testing situation we have right now, this also
clarifies in the "Supported Endpoints" page that which provider is
tested and which is not for each endpoint.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

cli: adds default route test (envoyproxy#842)

**Description**

This adds an additional test to aigw run command so that we can verify
that setting the default route is possible.

**Related Issues/PRs (if applicable)**

Closes envoyproxy#612

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4 (envoyproxy#845)

test: fixes TestStartConfigWatcher flake (envoyproxy#843)

controller: ensure eg rollout when deployed as daemonset (envoyproxy#831)

**Description**
This PR handles the rollout for envoy gateway during ai gateway extproc
upgrade when deployed as daemonset.

Related Issues/PRs (if applicable)
Related PR: envoyproxy#699

---------

Signed-off-by: Dan Sun <dsun20@bloomberg.net>

make test var

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>
alexagriffith added a commit to sukumargaonkar/ai-gateway that referenced this pull request Jul 9, 2025
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

update paralleltoolcalls

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add back system helper

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

lint no err

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add translation

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

update so tests work

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more tests

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove print

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

refactor: deprecate targetRefs in favor or parentRefs  (envoyproxy#821)

docs: add epp integration proposal (envoyproxy#771)

**Description**

This PR adds the proposal for supporting Integration with Endpoint
Picker(GIE)

Related to envoyproxy#423

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: update epp outdated logics (envoyproxy#822)

refactor: use Envoy native router (envoyproxy#793)

**Description**

This commit removes the handwritten header matching code from the
extproc, and instead starts utilizing the hardened envoy native router.

Historically, we had only one giant extproc filter where we did all
logics including model name extraction, routing and then body
transformation & upstream authorization. Since envoyproxy#599, we split into two
external processor filters; one sits at the normal HTTP router and the
other is configured at the per-cluster upstream HTTP filter. In theory,
the one at HTTP router has only one job on request path: extracting
model name from the request body. However, due to the historical reason,
the handwritten router logic component remained, and that comes with not
only a maintenance cost (forcing a complex extproc & control plane
orchestration) but also a potential security vulnerability. In fact,
writing header matching logic can be an easy attack surface, so if it's
possible, we should avoid writing our own header matching (routing
logic) but should rely on the battle-tested hardened envoy native
router.

With this commit, now a regex matching is available as well as there's
no difference between HTTPRoute's matching and AIGatewayRoute's matching
implementation. This also opens up a possibility to support path
matching in our rule.

**Related Issues/PRs (if applicable)**

Ref envoyproxy#612
Ref envoyproxy#73

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: fix aigw parentRefs in fallback (envoyproxy#824)

**Description**

This PR fixed the AIGatewayRoute parentRefs in fallback guides.

Signed-off-by: bitliu <bitliu@tencent.com>

chore: make test-e2e logs visible (envoyproxy#825)

**Description**

This PR is to make  test-e2e logs visible in local.

Signed-off-by: bitliu <bitliu@tencent.com>

extproc: account for parallel tool calls (envoyproxy#813)

**Description**
Resolves envoyproxy#736

Assistant that calls multiple tools are expected to group tool result in
the same message. Adding logic for that!

---------

Signed-off-by: Aaron Choo <achoo30@bloomberg.net>
Signed-off-by: Dan Sun <dsun20@bloomberg.net>
Co-authored-by: Dan Sun <dsun20@bloomberg.net>

build(deps): bump google.golang.org/genai from 1.13.0 to 1.14.0 (envoyproxy#833)

extproc: return 404 instead of 500 for unknown path (envoyproxy#835)

**Description**

Previously, unknown path was responded as an internal error as opposed
to the fact that it's an 404 with the user input root cause. This fixes
the extproc code that way, now that users will be able to know what's
wrong with the operation instead of getting the cryptic 500 error.

**Related Issues/PRs (if applicable)**

Contributes to envoyproxy#810
Closes envoyproxy#724

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: add endpoint support (envoyproxy#787)

**Description**

This PR adds the endpoint support pages for EAGW.

**Related Issues/PRs (if applicable)**

Fixes: envoyproxy#705

**Special notes for reviewers (if applicable)**

@mathetake

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Erica Hughberg <erica.sundberg.90@gmail.com>

controller: return 404 instead of 500 for no matching (envoyproxy#837)

**Description**

Before envoyproxy#793, the case where no matching route found was handled in the
extproc and the 404 immediate response was returned from there, but
after that, it naturally results in the "unreachable" default route and
swallowed the indication of no matching and it made it impossible to
reason about the 500 error on that case. In other words, this fixes the
regression in envoyproxy#793 to return the proper 404 response.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

update

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit passing

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove header hotfix

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit working
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

 add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

test: adds real provider embeddings test & update doc (envoyproxy#841)

**Description**

This adds embeddings endpoint tests with the providers that support the
endpoint. This only added the providers for which we have credentials.
According to the testing situation we have right now, this also
clarifies in the "Supported Endpoints" page that which provider is
tested and which is not for each endpoint.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

cli: adds default route test (envoyproxy#842)

**Description**

This adds an additional test to aigw run command so that we can verify
that setting the default route is possible.

**Related Issues/PRs (if applicable)**

Closes envoyproxy#612

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4 (envoyproxy#845)

test: fixes TestStartConfigWatcher flake (envoyproxy#843)

controller: ensure eg rollout when deployed as daemonset (envoyproxy#831)

**Description**
This PR handles the rollout for envoy gateway during ai gateway extproc
upgrade when deployed as daemonset.

Related Issues/PRs (if applicable)
Related PR: envoyproxy#699

---------

Signed-off-by: Dan Sun <dsun20@bloomberg.net>

make test var

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>
alexagriffith added a commit to sukumargaonkar/ai-gateway that referenced this pull request Jul 9, 2025
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

update paralleltoolcalls

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add back system helper

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

lint no err

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add translation

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

update so tests work

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more tests

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove print

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

refactor: deprecate targetRefs in favor or parentRefs  (envoyproxy#821)

docs: add epp integration proposal (envoyproxy#771)

**Description**

This PR adds the proposal for supporting Integration with Endpoint
Picker(GIE)

Related to envoyproxy#423

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: update epp outdated logics (envoyproxy#822)

refactor: use Envoy native router (envoyproxy#793)

**Description**

This commit removes the handwritten header matching code from the
extproc, and instead starts utilizing the hardened envoy native router.

Historically, we had only one giant extproc filter where we did all
logics including model name extraction, routing and then body
transformation & upstream authorization. Since envoyproxy#599, we split into two
external processor filters; one sits at the normal HTTP router and the
other is configured at the per-cluster upstream HTTP filter. In theory,
the one at HTTP router has only one job on request path: extracting
model name from the request body. However, due to the historical reason,
the handwritten router logic component remained, and that comes with not
only a maintenance cost (forcing a complex extproc & control plane
orchestration) but also a potential security vulnerability. In fact,
writing header matching logic can be an easy attack surface, so if it's
possible, we should avoid writing our own header matching (routing
logic) but should rely on the battle-tested hardened envoy native
router.

With this commit, now a regex matching is available as well as there's
no difference between HTTPRoute's matching and AIGatewayRoute's matching
implementation. This also opens up a possibility to support path
matching in our rule.

**Related Issues/PRs (if applicable)**

Ref envoyproxy#612
Ref envoyproxy#73

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: fix aigw parentRefs in fallback (envoyproxy#824)

**Description**

This PR fixed the AIGatewayRoute parentRefs in fallback guides.

Signed-off-by: bitliu <bitliu@tencent.com>

chore: make test-e2e logs visible (envoyproxy#825)

**Description**

This PR is to make  test-e2e logs visible in local.

Signed-off-by: bitliu <bitliu@tencent.com>

extproc: account for parallel tool calls (envoyproxy#813)

**Description**
Resolves envoyproxy#736

Assistant that calls multiple tools are expected to group tool result in
the same message. Adding logic for that!

---------

Signed-off-by: Aaron Choo <achoo30@bloomberg.net>
Signed-off-by: Dan Sun <dsun20@bloomberg.net>
Co-authored-by: Dan Sun <dsun20@bloomberg.net>

build(deps): bump google.golang.org/genai from 1.13.0 to 1.14.0 (envoyproxy#833)

extproc: return 404 instead of 500 for unknown path (envoyproxy#835)

**Description**

Previously, unknown path was responded as an internal error as opposed
to the fact that it's an 404 with the user input root cause. This fixes
the extproc code that way, now that users will be able to know what's
wrong with the operation instead of getting the cryptic 500 error.

**Related Issues/PRs (if applicable)**

Contributes to envoyproxy#810
Closes envoyproxy#724

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

docs: add endpoint support (envoyproxy#787)

**Description**

This PR adds the endpoint support pages for EAGW.

**Related Issues/PRs (if applicable)**

Fixes: envoyproxy#705

**Special notes for reviewers (if applicable)**

@mathetake

---------

Signed-off-by: bitliu <bitliu@tencent.com>
Co-authored-by: Erica Hughberg <erica.sundberg.90@gmail.com>

controller: return 404 instead of 500 for no matching (envoyproxy#837)

**Description**

Before envoyproxy#793, the case where no matching route found was handled in the
extproc and the 404 immediate response was returned from there, but
after that, it naturally results in the "unreachable" default route and
swallowed the indication of no matching and it made it impossible to
reason about the 500 error on that case. In other words, this fixes the
regression in envoyproxy#793 to return the proper 404 response.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

update

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit passing

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

remove header hotfix

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

precommit working
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

 add more test coverage

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>

test: adds real provider embeddings test & update doc (envoyproxy#841)

**Description**

This adds embeddings endpoint tests with the providers that support the
endpoint. This only added the providers for which we have credentials.
According to the testing situation we have right now, this also
clarifies in the "Supported Endpoints" page that which provider is
tested and which is not for each endpoint.

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

cli: adds default route test (envoyproxy#842)

**Description**

This adds an additional test to aigw run command so that we can verify
that setting the default route is possible.

**Related Issues/PRs (if applicable)**

Closes envoyproxy#612

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>

build(deps): bump helm.sh/helm/v3 from 3.17.3 to 3.18.4 (envoyproxy#845)

test: fixes TestStartConfigWatcher flake (envoyproxy#843)

controller: ensure eg rollout when deployed as daemonset (envoyproxy#831)

**Description**
This PR handles the rollout for envoy gateway during ai gateway extproc
upgrade when deployed as daemonset.

Related Issues/PRs (if applicable)
Related PR: envoyproxy#699

---------

Signed-off-by: Dan Sun <dsun20@bloomberg.net>

make test var

Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>
alexagriffith pushed a commit to sukumargaonkar/ai-gateway that referenced this pull request Jul 11, 2025
Signed-off-by: Alexa Griffith <agriffith50@bloomberg.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant