Skip to content

osx: minor os-independent changes required for OS X#1374

Merged
mattklein123 merged 1 commit into
envoyproxy:masterfrom
turbinelabs:osx-5-minor-tweaks
Aug 2, 2017
Merged

osx: minor os-independent changes required for OS X#1374
mattklein123 merged 1 commit into
envoyproxy:masterfrom
turbinelabs:osx-5-minor-tweaks

Conversation

@zuercher
Copy link
Copy Markdown
Member

@zuercher zuercher commented Aug 2, 2017

Adds some missing header #includes.

The static cast for to is needed because uint64_t is unsigned long long in OS X. So the constant would have to be 100ULL (with an #ifdef) to keep the compiler happy.

The std::move calls in thread_local_impl.cc fix an apparent difference in strictness across compilers. (c.f. https://stackoverflow.com/questions/22018115/converting-stdunique-ptrderived-to-stdunique-ptrbase).

Fixes #1371

@mattklein123 mattklein123 merged commit 94eb662 into envoyproxy:master Aug 2, 2017
@zuercher zuercher deleted the osx-5-minor-tweaks branch August 10, 2017 16:06
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
Automatic merge from submit-queue.

Add peer validation to ALTS implementation.

**What this PR does / why we need it:**

- Added the peer validation to ALTS implementation.
- Manually tested with custom config and environment on GKE.

**Special notes for your reviewer:**
None

**Release note:**
None
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
…g proto. (envoyproxy#1383)

Automatic merge from submit-queue.

Change target_service_accounts to peer_service_accounts in ALTS config proto.

**What this PR does / why we need it**:
- Change the target_service_accounts to peer_service_accounts in config proto, address some other comments.
- Skip validation if peer_service_accounts is empty.
- Manually tested with custom config (both validation success and fail) and environment on GKE.

**Which issue this PR fixes**:
Per request in envoyproxy#1374 .

**Special notes for your reviewer**:
None.

**Release note**:
None
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Copy the Java interfaces defining the [Cronet API](https://chromium.googlesource.com/chromium/src/+/master/components/cronet/android/api/src/org/chromium/net).

Risk Level: Inexistant
Testing: N/A
Docs Changes: N/A
Release Notes: N/A
Signed-off-by: Charles Le Borgne <cleborgne@google.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Copy the Java interfaces defining the [Cronet API](https://chromium.googlesource.com/chromium/src/+/master/components/cronet/android/api/src/org/chromium/net).

Risk Level: Inexistant
Testing: N/A
Docs Changes: N/A
Release Notes: N/A
Signed-off-by: Charles Le Borgne <cleborgne@google.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake pushed a commit that referenced this pull request Mar 3, 2026
…#1361)

**Description**

This PR implements comprehensive cross-namespace access support between
AIServiceBackend and AIGatewayRoute resources, following Gateway API
patterns with ReferenceGrant validation.

**API Enhancements**
- Added namespace field to AIGatewayRouteRuleBackendRef allowing
cross-namespace backend references
- Updated CRDs to include proper validation for the namespace field
Enhanced documentation explaining ReferenceGrant requirements for
cross-namespace access
**ReferenceGrant Integration**
- ReferenceGrant Validator: New component that validates cross-namespace
references against ReferenceGrant resources
- ReferenceGrant Controller: Watches ReferenceGrant resources and
triggers reconciliation of affected AIGatewayRoutes when grants change
- Automatic validation: Cross-namespace references are automatically
validated at reconciliation time

**Controller Updates**
- Cross-namespace backend lookups: AIGatewayRoute controller now
supports referencing AIServiceBackend resources in different namespaces
- ReferenceGrant enforcement: Fails reconciliation with clear error
messages when valid ReferenceGrant is missing
- Event-driven reconciliation: ReferenceGrant changes trigger automatic
reconciliation of affected routes


**Comprehensive Testing**
- Unit tests: Full coverage for ReferenceGrant validation logic,
cross-namespace scenarios, and error cases
- Integration tests: Controller tests validating cross-namespace backend
references with and without ReferenceGrant
- E2E test updates: Modified existing cross-namespace test to validate
AIServiceBackend cross-namespace access with ReferenceGrant

AIGatewayRouteBackendRefChange: 
```
# AIGatewayRouteRuleBackendRef now supports:
backendRefs:
- name: my-backend
  namespace: other-namespace  # NEW: Cross-namespace reference
  weight: 1
```

Reference Grant Example: 
```
apiVersion: gateway.networking.k8s.io/v1beta1
kind: ReferenceGrant
metadata:
  name: allow-route-to-backend
  namespace: backend-ns
spec:
  from:
    - group: aigateway.envoyproxy.io
      kind: AIGatewayRoute
      namespace: route-ns
  to:
    - group: aigateway.envoyproxy.io
      kind: AIServiceBackend
```

**Related Issues/PRs (if applicable)**
close #1374

---------

Signed-off-by: siddharth1036 <siddharthshah1036@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

compile-error w/gcc 4.9.4

2 participants