Raúl Gutiérrez Segalés

Results 9 issues of Raúl Gutiérrez Segalés

This is now merged on trunk and on the 3.5 branch of ZooKeeper: https://issues.apache.org/jira/browse/ZOOKEEPER-2163 (see https://github.com/apache/zookeeper/commit/48f0269f3539a1afddf39d66a1c25c37653390aa). It might be backported for the upcoming 3.4.7 release too, so it would be...

Enhancement

This is similar to what happened with Multi() request, we need to either pick the first one or convert something like: ``` SetWatchesRequest(/foo, /bar) ``` into ``` SetWatchesRequest(/foo) SetWatchesRequest(/bar) ```...

In the annotations docs it says that `aws-load-balancer-manage-backend-security-group-rules` defaults to true: https://github.com/kubernetes-sigs/aws-load-balancer-controller/blame/main/docs/guide/service/annotations.md#L52 ``` [service.beta.kubernetes.io/aws-load-balancer-manage-backend-security-group-rules](#manage-backend-sg-rules) | boolean | true ``` However in the security docs the writing implies that it needs...

kind/documentation
triage/needs-investigation

We currently support retrying after an upstream reset, but this could happen after the request has been seen -- partially or totally -- by the upstream: https://github.com/envoyproxy/envoy/blob/master/source/common/router/router.cc#L966 at which point,...

design proposal
stale
area/http

## what - add additional parameters `BaseBranch` and `Commit` ## why As of now, the /api/plan endpoint constructs a PullRequest that uses the provided Ref parameter as the base branch...

docs
api-endpoints
go
waiting-on-review

For HTTP chains, hosts are properly filtered out if their namespace and selector don't match: https://github.com/emissary-ingress/emissary/blob/master/python/ambassador/envoy/v3/v3listener.py#L790 However, for TCP chains all hosts are considered regardless: https://github.com/emissary-ingress/emissary/blob/master/python/ambassador/envoy/v3/v3listener.py#L184 Filtering would have to...

t:bug

When HTTP/2 is enabled for the upstream cluster, WebSocket connections won't work since they are disabled by default for HTTP/2 in Envoy: https://github.com/envoyproxy/envoy/pull/8156 This issue can arise when you have...

PR #4785 was a partial fix, as it might link a commit to the wrong pipeline when GitLab is slow to update the HeadPipeline. This patch ensures the latest commit...

go
provider/gitlab