Skip to content

Commit

Permalink
repo: Release 1.25.4
Browse files Browse the repository at this point in the history
Signed-off-by: Ryan Northey <ryan@synca.io>
  • Loading branch information
phlax committed Apr 5, 2023
1 parent 4a8cc2e commit 1366737
Show file tree
Hide file tree
Showing 10 changed files with 100 additions and 18 deletions.
2 changes: 1 addition & 1 deletion VERSION.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.25.4-dev
1.25.4
28 changes: 28 additions & 0 deletions changelogs/1.22.10.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
date: April 4, 2023

behavior_changes:
- area: http
change: |
validate upstream request header names and values. The new runtime flag ``envoy.reloadable_features.validate_upstream_headers`` can be used for revert this behavior.
bug_fixes:
- area: grpc
change: |
when Envoy was configured to use ext_authz, ext_proc, tap, ratelimit filters, and grpc access log service and an http header with non-UTF-8 data was received, Envoy would generate an invalid protobuf message and send it to the configured service. The receiving service would typically generate an error when decoding the protobuf message. For ext_authz that was configured with ``failure_mode_allow: true``, the request would have been allowed in this case. For the other services, this could have resulted in other unforseen errors such as a lack of visibility into requests (eg request not logged). Envoy will now by default sanitize the values sent in gRPC service calls to be valid UTF-8, replacing data that is not valid UTF-8 with a '!' character. This behavioral change can be temporarily reverted by setting runtime guard ``envoy.reloadable_features.service_sanitize_non_utf8_strings`` to false.
- area: http
change: |
fixed a bug where ``x-envoy-original-path`` was not being sanitized when sent from untrusted users. This behavioral change can be temporarily reverted by setting ``envoy.reloadable_features.sanitize_original_path`` to false.
- area: http
change: |
stop forwarding ``:method`` value which is not a valid token defined in https://www.rfc-editor.org/rfc/rfc9110#section-5.6.2.
Also, reject ``:method`` and ``:scheme`` headers with multiple values.
- area: http3
change: |
reject pseudo headers violating RFC 9114. Specifically, pseudo-header fields with more than one value for the ``:method`` (non-``CONNECT``),
``:scheme``, and ``:path``; or pseudo-header fields after regular header fields; or undefined pseudo-headers.
- area: lua
change: |
lua coroutine should not execute after local reply is sent.
- area: oauth
change: |
fixed a bug where the oauth2 filter would crash if it received a redirect URL without a state query param set.
33 changes: 33 additions & 0 deletions changelogs/1.23.7.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
date: April 4, 2023

behavior_changes:
- area: http
change: |
Validate upstream request header names and values. The new runtime flag ``envoy.reloadable_features.validate_upstream_headers`` can be used for revert this behavior.
bug_fixes:
- area: oauth2
change: |
fixed a bug where the oauth2 filter would crash if it received a redirect URL without a state query param set.
- area: lua
change: |
lua coroutine should not execute after local reply is sent.
- area: grpc
change: |
When Envoy was configured to use ext_authz, ext_proc, tap, ratelimit filters, and grpc access log service and an http header with non-UTF-8 data was received,
Envoy would generate an invalid protobuf message and send it to the configured service. The receiving service would typically generate an error when decoding
the protobuf message. For ext_authz that was configured with ``failure_mode_allow: true``, the request would have been allowed in this case. For the other services, this
could have resulted in other unforseen errors such as a lack of visibility into requests (eg request not logged). Envoy will now by default sanitize the values sent
in gRPC service calls to be valid UTF-8, replacing data that is not valid UTF-8 with a '!' character. This behavioral change can be temporarily reverted by
setting runtime guard ``envoy.reloadable_features.service_sanitize_non_utf8_strings`` to false.
- area: http
change: |
stop forwarding ``:method`` value which is not a valid token defined in https://www.rfc-editor.org/rfc/rfc9110#section-5.6.2.
Also, reject ``:method`` and ``:scheme`` headers with multiple values.
- area: http3
change: |
reject pseudo headers violating RFC 9114. Specifically, pseudo-header fields with more than one value for the ``:method`` (non-``CONNECT``),
``:scheme``, and ``:path``; or pseudo-header fields after regular header fields; or undefined pseudo-headers.
- area: http
change: |
fixed a bug where ``x-envoy-original-path`` was not being sanitized when sent from untrusted users. This behavioral change can be temporarily reverted by setting ``envoy.reloadable_features.sanitize_original_path`` to false.
33 changes: 33 additions & 0 deletions changelogs/1.24.5.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
date: April 5, 2023

behavior_changes:
- area: http
change: |
Validate upstream request header names and values. The new runtime flag ``envoy.reloadable_features.validate_upstream_headers`` can be used for revert this behavior.
bug_fixes:
- area: oauth2
change: |
fixed a bug where the oauth2 filter would crash if it received a redirect URL without a state query param set.
- area: lua
change: |
lua coroutine should not execute after local reply is sent.
- area: grpc
change: |
When Envoy was configured to use ext_authz, ext_proc, tap, ratelimit filters, and grpc access log service and an http header with non-UTF-8 data was received,
Envoy would generate an invalid protobuf message and send it to the configured service. The receiving service would typically generate an error when decoding
the protobuf message. For ext_authz that was configured with ``failure_mode_allow: true``, the request would have been allowed in this case. For the other services, this
could have resulted in other unforseen errors such as a lack of visibility into requests (eg request not logged). Envoy will now by default sanitize the values sent
in gRPC service calls to be valid UTF-8, replacing data that is not valid UTF-8 with a '!' character. This behavioral change can be temporarily reverted by
setting runtime guard ``envoy.reloadable_features.service_sanitize_non_utf8_strings`` to false.
- area: http
change: |
stop forwarding ``:method`` value which is not a valid token defined in https://www.rfc-editor.org/rfc/rfc9110#section-5.6.2.
Also, reject ``:method`` and ``:scheme`` headers with multiple values.
- area: http3
change: |
reject pseudo headers violating RFC 9114. Specifically, pseudo-header fields with more than one value for the ``:method`` (non-``CONNECT``),
``:scheme``, and ``:path``; or pseudo-header fields after regular header fields; or undefined pseudo-headers.
- area: http
change: |
fixed a bug where ``x-envoy-original-path`` was not being sanitized when sent from untrusted users. This behavioral change can be temporarily reverted by setting ``envoy.reloadable_features.sanitize_original_path`` to false.
14 changes: 1 addition & 13 deletions changelogs/current.yaml
Original file line number Diff line number Diff line change
@@ -1,16 +1,11 @@
date: Pending
date: April 5, 2023

behavior_changes:
# *Changes that are expected to cause an incompatibility if applicable; deployment changes are likely required*
- area: http
change: |
Validate upstream request header names and values. The new runtime flag ``envoy.reloadable_features.validate_upstream_headers`` can be used for revert this behavior.
minor_behavior_changes:
# *Changes that may cause incompatibilities for some users, but should not for most*

bug_fixes:
# *Changes expected to improve the state of the world and are unlikely to have negative effects*
- area: oauth2
change: |
fixed a bug where the oauth2 filter would crash if it received a redirect URL without a state query param set.
Expand All @@ -36,10 +31,3 @@ bug_fixes:
- area: http
change: |
fixed a bug where ``x-envoy-original-path`` was not being sanitized when sent from untrusted users. This behavioral change can be temporarily reverted by setting ``envoy.reloadable_features.sanitize_original_path`` to false.
removed_config_or_runtime:
# *Normally occurs at the end of the* :ref:`deprecation period <deprecated>`

new_features:

deprecated:
Binary file modified docs/inventories/v1.22/objects.inv
Binary file not shown.
Binary file modified docs/inventories/v1.23/objects.inv
Binary file not shown.
Binary file modified docs/inventories/v1.24/objects.inv
Binary file not shown.
Binary file modified docs/inventories/v1.25/objects.inv
Binary file not shown.
8 changes: 4 additions & 4 deletions docs/versions.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@
"1.19": 1.19.5
"1.20": 1.20.7
"1.21": 1.21.6
"1.22": 1.22.9
"1.23": 1.23.6
"1.24": 1.24.4
"1.25": 1.25.2
"1.22": 1.22.10
"1.23": 1.23.7
"1.24": 1.24.5
"1.25": 1.25.3

0 comments on commit 1366737

Please sign in to comment.