Skip to content

coverage: some safeguards to avoid clang silent failure.#1004

Merged
htuch merged 1 commit intoenvoyproxy:masterfrom
htuch:gcc-only-coverage
May 22, 2017
Merged

coverage: some safeguards to avoid clang silent failure.#1004
htuch merged 1 commit intoenvoyproxy:masterfrom
htuch:gcc-only-coverage

Conversation

@htuch
Copy link
Copy Markdown
Member

@htuch htuch commented May 21, 2017

clang isn't compatible with gcov (see #858). We plan to switch to lcov in the future (see #1000).
For now, just make sure we fail visibly and document.

clang isn't compatible with gcov (see envoyproxy#858). We plan to switch to lcov in the future (see envoyproxy#1000).
For now, just make sure we fail visibly and document.
@htuch
Copy link
Copy Markdown
Member Author

htuch commented May 21, 2017

@rlazarus @hennna

Copy link
Copy Markdown
Contributor

@rlazarus rlazarus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for digging into this!

@hennna
Copy link
Copy Markdown
Contributor

hennna commented May 22, 2017

+1 that this solves my coverage failure problem

@htuch
Copy link
Copy Markdown
Member Author

htuch commented May 22, 2017

@junr03 Can I get approval for this? Thanks.

@htuch htuch merged commit 6cf5f85 into envoyproxy:master May 22, 2017
@htuch htuch deleted the gcc-only-coverage branch May 22, 2017 17:10
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Signed-off-by: Michael Rebello <me@michaelrebello.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Signed-off-by: Michael Rebello <me@michaelrebello.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake added a commit that referenced this pull request Mar 3, 2026
**Description**

Previously, there's a bit of race condition where the gateway pod
mutation hook can be called before the secret config is created by the
Gateway controller. That resulted in blocking the Envoy pods from
starting up. This resolves the issue by doing lazy mutation until the
secret is created.


**Related Issues/PRs (if applicable)**

Closes #742

---------

Signed-off-by: Takeshi Yoneda <t.y.mathetake@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants