Remove sequential route blocks from traffic splitting#445
Merged
mattklein123 merged 1 commit intoenvoyproxy:masterfrom Feb 8, 2017
Merged
Remove sequential route blocks from traffic splitting#445mattklein123 merged 1 commit intoenvoyproxy:masterfrom
mattklein123 merged 1 commit intoenvoyproxy:masterfrom
Conversation
mattklein123
approved these changes
Feb 8, 2017
jpsim
pushed a commit
that referenced
this pull request
Nov 28, 2022
Description: this is a follow up to #498. This PR introduces `envoy_engine_callbacks`. They are similar in nature to envoy_http_callbacks. The difference being that they are not exposed all the way to consumer level in the library as it is not needed right now. However, one can see how by adding a type erased context pointer, and following the platform patterns for http callbacks we could thread this all the way up if need be. The immediate need for these callbacks is to detach the engine's native thread from the JVM on Android. Risk Level: med -- adds complexity to engine management. Testing: local testing on devices (Lyft and example app on iOS and Android). In conjunction with #498 this PR Fixes #492 #445 Signed-off-by: Jose Nino <jnino@lyft.com> Signed-off-by: JP Simard <jp@jpsim.com>
jpsim
pushed a commit
that referenced
this pull request
Nov 29, 2022
Description: this is a follow up to #498. This PR introduces `envoy_engine_callbacks`. They are similar in nature to envoy_http_callbacks. The difference being that they are not exposed all the way to consumer level in the library as it is not needed right now. However, one can see how by adding a type erased context pointer, and following the platform patterns for http callbacks we could thread this all the way up if need be. The immediate need for these callbacks is to detach the engine's native thread from the JVM on Android. Risk Level: med -- adds complexity to engine management. Testing: local testing on devices (Lyft and example app on iOS and Android). In conjunction with #498 this PR Fixes #492 #445 Signed-off-by: Jose Nino <jnino@lyft.com> Signed-off-by: JP Simard <jp@jpsim.com>
mathetake
pushed a commit
that referenced
this pull request
Mar 3, 2026
**Commit Message** - Implement Azure OpenAI integration including a) backend auth handler b) Azure token rotator. - Replace oauth package with `token_provider` to simplify AWS and Azure token request logic. - Fix existing test case i.e. in backendsecurity_test.go when oidc is nil for other provider. - Centralize some of string literals in `constants.go` **Related Issues/PRs (if applicable)** Related Issue: #347 Related PR: #424 --------- Signed-off-by: Xiaolin Lin <xlin158@bloomberg.net> Signed-off-by: Dan Sun <dsun20@bloomberg.net> Co-authored-by: Dan Sun <dsun20@bloomberg.net>
mathetake
pushed a commit
that referenced
this pull request
Mar 3, 2026
**Commit Message** Add proxy URL option for Azure authentication. **Related Issues/PRs (if applicable)** Related PR: #445 --------- Signed-off-by: Xiaolin Lin <xlin158@bloomberg.net>
mathetake
pushed a commit
that referenced
this pull request
Mar 3, 2026
**Commit Message** Fix APISchema to support response_format. **Related Issues/PRs (if applicable)** Related PR: #445 --------- Signed-off-by: Xiaolin Lin <xlin158@bloomberg.net>
mathetake
pushed a commit
that referenced
this pull request
Mar 3, 2026
**Commit Message** Updating support for accessing azure via OIDC in addition to the already implemented access via access secret. Token retrieved from OIDC will be exchanged for an azure access token which will be store the same way as getting token via client secret/id and tenant id. Key changes - renamed azure_token_provider -> azure_secret_token_provider (since it's client secret specific) - generalized new azure_token_provider to have TokenProviders provider federated tokens - Azure tries to create token provider from oidc if available else client secret **Related Issues/PRs (if applicable)** #445 Tested on own cluster and verified that secret access token was generated + same credentials appeared on extproc filter config file + able to query azure --------- Signed-off-by: Aaron Choo <achoo30@bloomberg.net> Co-authored-by: Dan Sun <dsun20@bloomberg.net>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
The current docs describe how to achieve traffic splitting in two ways: weighted_clusters and using sequential route blocks (duplicate entries, except for runtime values). The latter has proven to be very confusing. This PR removes documentation associated with the latter.