Skip to content

config: bump to envoy-api 9be6aff.#1645

Merged
mattklein123 merged 2 commits intoenvoyproxy:masterfrom
htuch:response-version
Sep 14, 2017
Merged

config: bump to envoy-api 9be6aff.#1645
mattklein123 merged 2 commits intoenvoyproxy:masterfrom
htuch:response-version

Conversation

@htuch
Copy link
Copy Markdown
Member

@htuch htuch commented Sep 14, 2017

This brings in a bunch of ADS changes, route decorators and the response nonce.

This will also unblock #1632.

This brings in a bunch of ADS changes, route decorators and the response nonce.

This will also unblock envoyproxy#1632.
Comment thread bazel/repositories.bzl
@@ -112,13 +112,13 @@ def envoy_api_deps(skip_targets):
native.git_repository(
name = "envoy_api",
remote = REPO_LOCATIONS["envoy_api"],
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you fix this to new location/name? Right now it's working off GH redirect.

@mattklein123 mattklein123 merged commit dec1763 into envoyproxy:master Sep 14, 2017
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Description: This is in preparation for changing the remote execution
    service authentication configuration. We could theoretically do
    it without downtime, but since this isn't on the critical path yet,
    let's go the easier route.
Risk Level: Low
Testing: n/a
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Ulf Adams <ulf@engflow.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Description: This is in preparation for changing the remote execution
    service authentication configuration. We could theoretically do
    it without downtime, but since this isn't on the critical path yet,
    let's go the easier route.
Risk Level: Low
Testing: n/a
Docs Changes: n/a
Release Notes: n/a

Signed-off-by: Ulf Adams <ulf@engflow.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake pushed a commit that referenced this pull request Mar 3, 2026
**Description**

This fixes an issue in the benchmark where the context is cancelled
before the request processing has finished. This causes Go to consider
the connection as un-reusable, leading to 0% connection re-use. This
only impacts servers that return data across multiple TCP packets (which
is 100% legal thing to do), hence why it is not always showing up.

With this change:
```
name                     time/op
MCP/Baseline_NoProxy-32  44.5µs ± 3%
MCP/Agent_Gateway-32     84.4µs ± 1%
MCP/EAIGW_EAIGW_Default  21.3ms ± 0%
MCP/EAIGW_Config_100-32   257µs ± 0%
```

Before this change:
```
name                  time/op
MCP/Agent_Gateway-32   183µs ± 3%
```

Additionally, pulls in
modelcontextprotocol/go-sdk#709 which is also
required to fix this.

:heart:

Signed-off-by: John Howard <john.howard@solo.io>
Co-authored-by: Ignasi Barrera <ignasi@tetrate.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants