Skip to content

auto-merge envoyproxy/envoy[release/v1.32] into envoyproxy/envoy-openssl[release/v1.32] #298

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 7 commits into
base: release/v1.32
Choose a base branch
from

Conversation

update-openssl-envoy[bot]
Copy link

Generated by envoy-sync-receive.sh

@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch from b8c5cb5 to 0a628f9 Compare March 6, 2025 01:34
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch from 0a628f9 to bc8408d Compare March 22, 2025 01:34
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 7 times, most recently from 7004f0b to 690d194 Compare March 29, 2025 01:34
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 8 times, most recently from c396131 to d4fa45c Compare April 6, 2025 01:34
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 7 times, most recently from 4094b80 to a097ed0 Compare April 13, 2025 01:53
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 4 times, most recently from 35e9542 to 17f65cc Compare April 17, 2025 01:35
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 7 times, most recently from 19d5e40 to 2a1f386 Compare June 9, 2025 01:36
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 2 times, most recently from 1e0c7d3 to 1f9ba69 Compare June 11, 2025 01:35
phlax and others added 4 commits June 11, 2025 17:18
Signed-off-by: Ryan Northey <[email protected]>
Commit Message:

Simple grep over the codebase suggests that we don't have any WASM
specific fuzz tests defined. And existing fuzz tests don't need a full
WASM runtime.

On top of that in general we don't really want to fuzz test our
dependencies (e.g., we would like the dependencies to have their own
infrastructure and be scrupulous when new dependencies are added).

Disabling WASM reduces the build time and resources required for
fuzz-coverage. One particular reason to try and optimize fuzz-coverage
is that I want to move it to static linking to work around a bug in
Clang/LLVM (see llvm/llvm-project#32849) and
static linking produces much large binaries and requires a larger linker
footprint, which currently hits the limits of the RBE backend used.

Additional Description:

Some relevant discussions can be found in
envoyproxy/envoy#39030 which prompted me to work
on this in the first place. And I will use
envoyproxy/envoy#39248 as a tracking bug for
the coverage changes.

Risk Level: low
Testing: running fuzz-coverage on local machine with the changes
included, I also confirmed that disabling wasm + moving fuzz-coverage to
EngFlow + removing explicit RBE pool attributes from fuzz targets make
it possible to successfully statically link fuzz tests
Docs Changes: n/a
Release Notes: n/a
Platform Specific Features: n/a

---------

Signed-off-by: Mikhail Krinkin <[email protected]>
Signed-off-by: Ryan Northey <[email protected]>
too large for RBE workers

Signed-off-by: Ryan Northey <[email protected]>
… of BoringCrypto FIPS via override_repository

Additional Description:
If one uses `build --override_repository=boringssl_fips=/usr/lib/boringssl-fips-static` to compile v1.32 envoy against BoringCrypto FIPS 2023042800 [#4953](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4953) or the BoringCrypto update stream, the build will fail on an error assertion.

Remove this `#error` assertion, as it is meant to be a reminder to the developers in the development tip, but shouldn't prevent users of stable branches to build envoy against newly certified BoringCrypto FIPS or the BoringCrypto FIPS update stream.

Note the project is compiled against c++20 standard, and thus `#warning` from c++23 is not available.

Note! This change does not upgrade BoringCrypto FIPS version, and it remains the same, but compile time incompatibility with newer BoringCrypto FIPS is resolved.

Risk Level: Low
Testing: Compiled with override_repository pointing at BoringCrypto FIPS 2023042800
Fixes: envoyproxy/envoy#39822
Signed-off-by: Dimitri John Ledkov <[email protected]>
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch from 1f9ba69 to c4d4b17 Compare June 12, 2025 01:35
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 7 times, most recently from 468acf8 to f2d582c Compare June 19, 2025 01:36
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch 6 times, most recently from 4662373 to d7ac3db Compare June 25, 2025 01:35
…ssl[release/v1.32]

* upstream/release/v1.32:
  ci/cache: Shift cache create action to do_ci.sh (#39845)
  Commit Message: Add support for building envoy against newer releases of BoringCrypto FIPS via override_repository
  coverage: Disable large tests
  Don't build WASM for fuzz-coverage tests (#39296)
  ci/coverage: Fix path
  repo: Dev v1.32.7

Signed-off-by: tedjpoole <[email protected]>
@update-openssl-envoy update-openssl-envoy bot force-pushed the auto-merge-release-v1-32 branch from d7ac3db to 74ee5f2 Compare June 26, 2025 01:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants