Merge branch 'release-1.0' into 'collab-gcp-identity'#7305
Merge branch 'release-1.0' into 'collab-gcp-identity'#7305istio-testing merged 70 commits intoistio:collab-gcp-identityfrom
Conversation
* Setup initial liveness probe for Mixer * Prefer /version to /metrics
* Updating Kiali to v0.5.0 * Adding quotaspecs and quotaspecbindings in clusterole * Upgrading Kiali Versrion on Requirements File
Signed-off-by: Kuat Yessenov <kuat@google.com>
…ecurity (istio#7094) When controlPlaneSecurityEnabled the spiffe configured by sidecar injector assumes that the pilot discoveryAddress is a hostname.namespace formatted string. This change makes the istio-remote helm chart setup a selectorless service and endpoint from the pilotAddress when the remotePilotCreateSvcEndpoint arg is true and sets the MeshConfig discoveryAddress to be the hostname for istio-pilot.
* Make version, timestamp available in service for k8s * More error and metrics cleanup * Address Shriram's comments * Format * Fix verbose log, format, init * More work - the push is async, and things are trickier than they look * Rename mixer job, so upgrade works * Add back iperf3 without sidecar * Format * Switch to *env, no copy by value * Cleanup, resolve conflicts * Also convert node to pointer, and add explicit param * Polish, cleanups * Revert changes moved to other PRs * Logging too much * Polish, less log * Extra safety, sometimes a stale message is stuck until config change * fmt and lint errors * Addres review comments * Add the ttls test * Revert the review fix - it breaks tests (some send old style). Will update post 1.1
* TCP routing cleanups: part 1 Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * missing sort Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * sort destination cidrs * proxy sha update * undo istio proxy sha * fixups * compile fixes * nil check Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * nits Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * Update proxy sha based on Piotrs changes * undo Piotrs changes
This is needed to better support e2e testing of conflicts.
* add latest tag to values.yaml * switch latest in istioctl
Signed-off-by: Kuat Yessenov <kuat@google.com>
* Adding unit test for TCP over TCP conflicts. * addressing comments. * addressing comments. * addressing comments.
* Assorted small fixes * spaces
* remove static route generation Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * more validation for gateways Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * validation fixes Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com> * fix test Signed-off-by: Shriram Rajagopalan <shriramr@vmware.com>
This change makes the zipkin arguement in the sidecar config map to be conditional based on zipkin being used in remote clusters.
Codecov Report
@@ Coverage Diff @@
## collab-gcp-identity #7305 +/- ##
====================================================
+ Coverage 72% 72% +1%
====================================================
Files 358 356 -2
Lines 30644 30468 -176
====================================================
- Hits 21943 21839 -104
+ Misses 7762 7710 -52
+ Partials 939 919 -20
Continue to review full report at Codecov.
|
|
So there's good news and bad news. 👍 The good news is that everyone that needs to sign a CLA (the pull request submitter and all commit authors) have done so. Everything is all good there. 😕 The bad news is that it appears that one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that here in the pull request. Note to project maintainer: This is a terminal state, meaning the |
|
/cc @wattli |
|
A Googler has manually verified that the CLAs look good. (Googler, please make sure the reason for overriding the CLA status is clearly documented in these comments.) |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: quanjielin, wattli The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
No description provided.