-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove support for Envoy 1.15 #11118
Changes from 1 commit
7e20a5e
03e44da
4f1a8d4
60170df
e41830a
93ef3fb
db397d6
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -310,12 +310,6 @@ func (s *Server) processDelta(stream ADSDeltaStream, reqCh <-chan *envoy_discove | |
} | ||
if sent { | ||
sentType[op.TypeUrl] = struct{}{} | ||
if generator.ProxyFeatures.IncrementalXDSUpdatesMustBeSerial { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yay! |
||
// For more justification for this hacky fix, check the | ||
// comments associated with | ||
// generator.ProxyFeatures.IncrementalXDSUpdatesMustBeSerial | ||
break | ||
} | ||
} | ||
} | ||
} | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -11,10 +11,10 @@ import ( | |
var ( | ||
// minSupportedVersion is the oldest mainline version we support. This should always be | ||
// the zero'th point release of the last element of proxysupport.EnvoyVersions. | ||
minSupportedVersion = version.Must(version.NewVersion("1.15.0")) | ||
minSupportedVersion = version.Must(version.NewVersion("1.16.0")) | ||
|
||
minVersionAllowingEmptyGatewayClustersWithIncrementalXDS = version.Must(version.NewVersion("1.16.0")) | ||
minVersionAllowingMultipleIncrementalXDSChanges = version.Must(version.NewVersion("1.16.0")) | ||
// add min version constraints for associated feature flags when necessary, for example: | ||
// minVersionAllowingEmptyGatewayClustersWithIncrementalXDS = version.Must(version.NewVersion("1.16.0")) | ||
|
||
specificUnsupportedVersions = []unsupportedVersion{} | ||
) | ||
|
@@ -27,24 +27,15 @@ type unsupportedVersion struct { | |
|
||
type supportedProxyFeatures struct { | ||
// add version dependent feature flags here | ||
|
||
// GatewaysNeedStubClusterWhenEmptyWithIncrementalXDS is needed to paper | ||
// over some weird envoy behavior. | ||
// | ||
// For some reason Envoy versions prior to 1.16.0 when sent an empty CDS | ||
// list via the incremental xDS protocol will correctly ack the message and | ||
// just never request LDS resources. | ||
GatewaysNeedStubClusterWhenEmptyWithIncrementalXDS bool | ||
|
||
// IncrementalXDSUpdatesMustBeSerial is needed to avoid an envoy crash. | ||
// For example, we previously had flags for Envoy < 1.16 called: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I like this. Prior to these 2 flags existing the struct was empty for a bit. Prior to that it had completely different features available. When I went to add these two flags I had to look at my own file history to see how to re-add a feature flag. |
||
// | ||
// Versions of Envoy prior to 1.16.0 could crash if multiple in-flight | ||
// changes to resources were happening during incremental xDS. To prevent | ||
// that we force serial updates on those older versions. | ||
// GatewaysNeedStubClusterWhenEmptyWithIncrementalXDS | ||
// IncrementalXDSUpdatesMustBeSerial | ||
// | ||
// issue: https://github.com/envoyproxy/envoy/issues/11877 | ||
// PR: https://github.com/envoyproxy/envoy/pull/12069 | ||
IncrementalXDSUpdatesMustBeSerial bool | ||
// Which then manifested in the code for checks with this struct populated. | ||
// By dropping support for 1.15, we no longer have any special flags here | ||
// but leaving this flagging functionality for future one-offs. | ||
} | ||
|
||
func determineSupportedProxyFeatures(node *envoy_core_v3.Node) (supportedProxyFeatures, error) { | ||
|
@@ -82,13 +73,12 @@ func determineSupportedProxyFeaturesFromVersion(version *version.Version) (suppo | |
|
||
sf := supportedProxyFeatures{} | ||
|
||
if version.LessThan(minVersionAllowingEmptyGatewayClustersWithIncrementalXDS) { | ||
sf.GatewaysNeedStubClusterWhenEmptyWithIncrementalXDS = true | ||
} | ||
|
||
if version.LessThan(minVersionAllowingMultipleIncrementalXDSChanges) { | ||
sf.IncrementalXDSUpdatesMustBeSerial = true | ||
} | ||
// add version contraints to poipulate feature flags here when necessary, for example: | ||
eculver marked this conversation as resolved.
Show resolved
Hide resolved
|
||
/* | ||
if version.LessThan(minVersionAllowingEmptyGatewayClustersWithIncrementalXDS) { | ||
sf.GatewaysNeedStubClusterWhenEmptyWithIncrementalXDS = true | ||
} | ||
*/ | ||
|
||
return sf, nil | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yay!