-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-861: Rebase openshift/etcd 4.12 onto v3.5.5 #144
OCPBUGS-861: Rebase openshift/etcd 4.12 onto v3.5.5 #144
Commits on Apr 15, 2022
-
Revert "trim the suffix dot from the srv.Target for etcd-client DNS l…
…ookup" This reverts commit 4f51cc1.
Configuration menu - View commit details
-
Copy full SHA for 7656477 - Browse repository at this point
Copy the full SHA 7656477View commit details -
Configuration menu - View commit details
-
Copy full SHA for 081b4e2 - Browse repository at this point
Copy the full SHA 081b4e2View commit details
Commits on Apr 19, 2022
-
Configuration menu - View commit details
-
Copy full SHA for b872757 - Browse repository at this point
Copy the full SHA b872757View commit details
Commits on Apr 20, 2022
-
Update conssitent_index when applying fails
When clients have no permission to perform whatever operation, then the applying may fail. We should also move consistent_index forward in this case, otherwise the consitent_index may smaller than the snapshot index.
Configuration menu - View commit details
-
Copy full SHA for 5c68f2e - Browse repository at this point
Copy the full SHA 5c68f2eView commit details
Commits on Apr 21, 2022
-
Merge pull request etcd-io#13946 from ahrtr/move_cindex_on_apply_fail…
…_353 [3.5] Update consitent_index when applying fails
Configuration menu - View commit details
-
Copy full SHA for c3c908e - Browse repository at this point
Copy the full SHA c3c908eView commit details
Commits on Apr 24, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 08407ff - Browse repository at this point
Copy the full SHA 08407ffView commit details
Commits on Apr 28, 2022
-
Update golang.org/x/crypto to latest
Update crypto to address CVE-2022-27191. The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this change updates to latest.
Configuration menu - View commit details
-
Copy full SHA for 5c44c30 - Browse repository at this point
Copy the full SHA 5c44c30View commit details
Commits on May 5, 2022
-
Merge pull request etcd-io#13996 from cmurphy/update-crypto-3.5
Update golang.org/x/crypto to latest
Configuration menu - View commit details
-
Copy full SHA for 8453b10 - Browse repository at this point
Copy the full SHA 8453b10View commit details
Commits on May 6, 2022
-
server/auth: enable tokenProvider if recoved store enables auth
we found a lease leak issue: if a new member(by member add) is recovered by snapshot, and then become leader, the lease will never expire afterwards. leader will log the revoke failure caused by "invalid auth token", since the token provider is not functional, and drops all generated token from upper layer, which in this case, is the lease revoking routine.
Configuration menu - View commit details
-
Copy full SHA for cceb25d - Browse repository at this point
Copy the full SHA cceb25dView commit details -
Merge pull request etcd-io#13205 from cfz/cherry-pick-#13172
[backport 3.5]: server/auth: enable tokenProvider if recoved store enables auth
Configuration menu - View commit details
-
Copy full SHA for b57881a - Browse repository at this point
Copy the full SHA b57881aView commit details
Commits on May 16, 2022
-
Configuration menu - View commit details
-
Copy full SHA for c76a010 - Browse repository at this point
Copy the full SHA c76a010View commit details -
Configuration menu - View commit details
-
Copy full SHA for c4b0a56 - Browse repository at this point
Copy the full SHA c4b0a56View commit details -
Merge pull request etcd-io#14043 from serathius/test-release-3.5-v2
[release-3.5] Test release scripts
Configuration menu - View commit details
-
Copy full SHA for 2e76dfb - Browse repository at this point
Copy the full SHA 2e76dfbView commit details
Commits on May 18, 2022
-
scripts: Avoid additional repo clone
This PR removes additional clone when building artifacts. When releasing v3.5.4 this clone was main cause of issues and confusion about what release script is doing. release.sh script already clones repo in /tmp/ directory, so clonning before build is not needed. As precautions for bug in script leaving /tmp/ clone in bad state I moved "Verify the latest commit has the version tag" and added "Verify the clean working tree" to be always run before build.
Configuration menu - View commit details
-
Copy full SHA for c05b9b1 - Browse repository at this point
Copy the full SHA c05b9b1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6aa934e - Browse repository at this point
Copy the full SHA 6aa934eView commit details -
Merge pull request etcd-io#14050 from serathius/avoid-clone-v3.5
[release-3.5] scripts: Avoid additional repo clone
Configuration menu - View commit details
-
Copy full SHA for 73876b1 - Browse repository at this point
Copy the full SHA 73876b1View commit details
Commits on Jun 4, 2022
-
Backport two lease related bug fixes to 3.5
The first bug fix is to resolve the race condition between goroutine and channel on the same leases to be revoked. It's a classic mistake in using Golang channel + goroutine. Please refer to https://go.dev/doc/effective_go#channels The second bug fix is to resolve the issue that etcd lessor may continue to schedule checkpoint after stepping down the leader role.
Configuration menu - View commit details
-
Copy full SHA for acb1ee9 - Browse repository at this point
Copy the full SHA acb1ee9View commit details
Commits on Jun 6, 2022
-
Merge pull request etcd-io#14087 from ahrtr/lease_revoke_race
[3.5] Backport two lease related bug fixes to 3.5
Configuration menu - View commit details
-
Copy full SHA for 0be65da - Browse repository at this point
Copy the full SHA 0be65daView commit details
Commits on Jun 17, 2022
-
Add FileReader and FileBufReader utilities
The FileReader interface is the wrapper of io.Reader. It provides the fs.FileInfo as well. The FileBufReader struct is the wrapper of bufio.Reader, it also provides fs.FileInfo. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for db0b67e - Browse repository at this point
Copy the full SHA db0b67eView commit details -
restrict the max size of each WAL entry to the remaining size of the …
…file Currently the max size of each WAL entry is hard coded as 10MB. If users set a value > 10MB for the flag --max-request-bytes, then etcd may run into a situation that it successfully processes a big request, but fails to decode it when replaying the WAL file on startup. On the other hand, we can't just remove the limitation, because if a WAL entry is somehow corrupted, and its recByte is a huge value, then etcd may run out of memory. So the solution is to restrict the max size of each WAL entry as a dynamic value, which is the remaining size of the WAL file. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 621cd7b - Browse repository at this point
Copy the full SHA 621cd7bView commit details -
Merge pull request etcd-io#14127 from ahrtr/threshold_3.5
[3.5] Restrict the max size of each WAL entry to the remaining size of the WAL file
Configuration menu - View commit details
-
Copy full SHA for 4443e14 - Browse repository at this point
Copy the full SHA 4443e14View commit details -
client/v3: do not overwrite authTokenBundle on dial
Cherry pick the PR etcd-io#12992 to 3.5, so please refer to the original PR for more detailed info. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for df632ab - Browse repository at this point
Copy the full SHA df632abView commit details
Commits on Jun 20, 2022
-
Merge pull request etcd-io#14132 from ahrtr/auth_bundle
[3.5] client/v3: do not overwrite authTokenBundle on dial
Configuration menu - View commit details
-
Copy full SHA for c9f7473 - Browse repository at this point
Copy the full SHA c9f7473View commit details
Commits on Jul 3, 2022
-
Client: fix check for WithPrefix op
Make sure that WithPrefix correctly set the flag, and add test. Also, add test for WithFromKey. fixes etcd-io#14056 Signed-off-by: Sahdev Zala <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4df61af - Browse repository at this point
Copy the full SHA 4df61afView commit details -
Merge pull request etcd-io#14187 from spzala/automated-cherry-pick-of…
…-#14182-upstream-release-3.5 Automated cherry pick of etcd-io#14182
Configuration menu - View commit details
-
Copy full SHA for 57c1d92 - Browse repository at this point
Copy the full SHA 57c1d92View commit details
Commits on Jul 13, 2022
-
The golang buildin package `flag` doesn't support `uint32` data type, so we need to support it via the `flag.Var`. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 40d1a43 - Browse repository at this point
Copy the full SHA 40d1a43View commit details -
Add flag
--max-concurrent-streams
to set the max concurrent stream ……each client can open at a time Also refer to etcd-io#14169 (comment) Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 437f377 - Browse repository at this point
Copy the full SHA 437f377View commit details -
add e2e test cases to cover the maxConcurrentStreams
Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ff447b4 - Browse repository at this point
Copy the full SHA ff447b4View commit details -
Merge pull request etcd-io#14219 from ahrtr/3.5_backport_maxstream
[3.5] Support configuring `MaxConcurrentStreams` for http2
Configuration menu - View commit details
-
Copy full SHA for fb71790 - Browse repository at this point
Copy the full SHA fb71790View commit details
Commits on Jul 14, 2022
-
Improve error message for incorrect values of ETCD_CLIENT_DEBUG
Signed-off-by: Jille Timmermans <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cbedaf9 - Browse repository at this point
Copy the full SHA cbedaf9View commit details
Commits on Jul 15, 2022
-
Merge pull request etcd-io#14222 from Jille/backport-14203
[3.5] clientv3: Fix parsing of ETCD_CLIENT_DEBUG
Configuration menu - View commit details
-
Copy full SHA for 3237289 - Browse repository at this point
Copy the full SHA 3237289View commit details
Commits on Jul 19, 2022
-
server/auth: protect rangePermCache with a RW lock
Signed-off-by: Hitoshi Mitake <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e15c005 - Browse repository at this point
Copy the full SHA e15c005View commit details
Commits on Jul 20, 2022
-
Merge pull request etcd-io#14227 from mitake/perm-cache-lock-3.5
server/auth: protect rangePermCache with a RW lock
Configuration menu - View commit details
-
Copy full SHA for 9d7e108 - Browse repository at this point
Copy the full SHA 9d7e108View commit details
Commits on Aug 5, 2022
-
Change default sampling rate from 100% to 0%
This changes the default parent-based trace sampling rate from 100% to 0%. Due to the high QPS etcd can handle, having 100% trace sampling leads to very high resource usage. Defaulting to 0% means that only already-sampled traces will be sampled in etcd. Fixes etcd-io#14310 Signed-off-by: Mike Dame <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4c013c9 - Browse repository at this point
Copy the full SHA 4c013c9View commit details
Commits on Aug 6, 2022
-
Merge pull request etcd-io#14318 from damemi/3.5-tracing-sample
Change default sampling rate from 100% to 0%
Configuration menu - View commit details
-
Copy full SHA for 6145831 - Browse repository at this point
Copy the full SHA 6145831View commit details -
etcdserver: bump OpenTelemetry to 1.0.1
Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2d7e490 - Browse repository at this point
Copy the full SHA 2d7e490View commit details -
move setupTracing into a separate file config_tracing.go
Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5a86ae2 - Browse repository at this point
Copy the full SHA 5a86ae2View commit details -
update all related dependencies
Upgrade grpc to 1.41.0; Run ./script/fix.sh to fix all related issue. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2751c61 - Browse repository at this point
Copy the full SHA 2751c61View commit details -
Fix the failure in TestEndpointSwitchResolvesViolation
Refer to etcd-io@a0bdfc4 Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8c5f110 - Browse repository at this point
Copy the full SHA 8c5f110View commit details -
Change default sampling rate from 100% to 0%
Refer to etcd-io#14318 Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8fdca41 - Browse repository at this point
Copy the full SHA 8fdca41View commit details
Commits on Aug 8, 2022
-
Merge pull request etcd-io#14312 from ahrtr/3.5_bump_otl
[3.5] etcdserver: bump OpenTelemetry to 1.0.1 and gRPC to 1.41.0
Configuration menu - View commit details
-
Copy full SHA for 9e95685 - Browse repository at this point
Copy the full SHA 9e95685View commit details
Commits on Aug 18, 2022
-
clientv3: close streams after use in lessor keepAliveOnce method
Streams are now closed after being used in the lessor `keepAliveOnce` method. This prevents the "failed to receive lease keepalive request from gRPC stream" message from being logged by the server after the context is cancelled by the client. Signed-off-by: Justin Kolberg <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for eab0b99 - Browse repository at this point
Copy the full SHA eab0b99View commit details
Commits on Aug 19, 2022
-
Merge pull request etcd-io#14361 from amdprophet/3.5-close-keepalive-…
…stream [3.5] clientv3: close streams after use in lessor keepAliveOnce method
Configuration menu - View commit details
-
Copy full SHA for 6bab367 - Browse repository at this point
Copy the full SHA 6bab367View commit details
Commits on Aug 20, 2022
-
Refactor the keepAliveListener and keepAliveConn
Only `net.TCPConn` supports `SetKeepAlive` and `SetKeepAlivePeriod` by default, so if you want to warp multiple layers of net.Listener, the `keepaliveListener` should be the one which is closest to the original `net.Listener` implementation, namely `TCPListener`. Also refer to etcd-io#14356 Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9ea5b1b - Browse repository at this point
Copy the full SHA 9ea5b1bView commit details
Commits on Aug 24, 2022
-
Merge pull request etcd-io#14366 from ahrtr/keepalive_3.5_20220820
[3.5] Refactor the keepAliveListener and keepAliveConn
Configuration menu - View commit details
-
Copy full SHA for 74aa38e - Browse repository at this point
Copy the full SHA 74aa38eView commit details
Commits on Aug 29, 2022
-
Backport of pull/14354 to 3.5.5
Signed-off-by: Vitalii Levitskii <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 67e4c59 - Browse repository at this point
Copy the full SHA 67e4c59View commit details
Commits on Sep 1, 2022
-
[backport 3.5] server: don't panic in readonly serializable txn
Problem: We pass grpc context down to applier in readonly serializable txn. This context can be cancelled for example due to timeout. This will trigger panic inside applyTxn Solution: Only panic for transactions with write operations fixes etcd-io#14110 main PR etcd-io#14149 Signed-off-by: Bogdan Kanivets <[email protected]>
Bogdan Kanivets committedSep 1, 2022 Configuration menu - View commit details
-
Copy full SHA for 204d883 - Browse repository at this point
Copy the full SHA 204d883View commit details -
Merge pull request etcd-io#14397 from biosvs/backport-grpc-proxy-endp…
…oints-autosync Backport of pull/14354 to release-3.5
Configuration menu - View commit details
-
Copy full SHA for fbb14f9 - Browse repository at this point
Copy the full SHA fbb14f9View commit details
Commits on Sep 5, 2022
-
fix the potential data loss for clusters with only one member
For a cluster with only one member, the raft always send identical unstable entries and committed entries to etcdserver, and etcd responds to the client once it finishes (actually partially) the applying workflow. When the client receives the response, it doesn't mean etcd has already successfully saved the data, including BoltDB and WAL, because: 1. etcd commits the boltDB transaction periodically instead of on each request; 2. etcd saves WAL entries in parallel with applying the committed entries. Accordingly, it may run into a situation of data loss when the etcd crashes immediately after responding to the client and before the boltDB and WAL successfully save the data to disk. Note that this issue can only happen for clusters with only one member. For clusters with multiple members, it isn't an issue, because etcd will not commit & apply the data before it being replicated to majority members. When the client receives the response, it means the data must have been applied. It further means the data must have been committed. Note: for clusters with multiple members, the raft will never send identical unstable entries and committed entries to etcdserver. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7eb696d - Browse repository at this point
Copy the full SHA 7eb696dView commit details -
Merge pull request etcd-io#14424 from serathius/one_member_data_loss_…
…raft_3_5 [release-3.5] fix the potential data loss for clusters with only one member
Configuration menu - View commit details
-
Copy full SHA for 747bf5c - Browse repository at this point
Copy the full SHA 747bf5cView commit details
Commits on Sep 6, 2022
-
move consistent_index forward when executing alarmList operation
Cherry pick etcd-io#14419 to 3.5. Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5c8aa08 - Browse repository at this point
Copy the full SHA 5c8aa08View commit details -
Merge pull request etcd-io#14429 from ahrtr/alarm_list_ci_3.5
[3.5] Move consistent_index forward when executing alarmList operation
Configuration menu - View commit details
-
Copy full SHA for 204c031 - Browse repository at this point
Copy the full SHA 204c031View commit details
Commits on Sep 7, 2022
-
server: Extract triggerCorruptAlarm to function
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d32de2c - Browse repository at this point
Copy the full SHA d32de2cView commit details -
server: Extract corruption detection to dedicated struct
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 35cbdf3 - Browse repository at this point
Copy the full SHA 35cbdf3View commit details -
server: Cover corruptionMonitor with tests
Get 100% coverage on InitialCheck and PeriodicCheck functions to avoid any mistakes. Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 78a6f38 - Browse repository at this point
Copy the full SHA 78a6f38View commit details -
server: Test HashByRev values to make sure they don't change
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 336fef4 - Browse repository at this point
Copy the full SHA 336fef4View commit details -
server: Extract unsafeHashByRev function
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bc592c7 - Browse repository at this point
Copy the full SHA bc592c7View commit details -
server: Move unsafeHashByRev to new hash.go file
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3f26995 - Browse repository at this point
Copy the full SHA 3f26995View commit details -
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f5ed371 - Browse repository at this point
Copy the full SHA f5ed371View commit details -
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 679e327 - Browse repository at this point
Copy the full SHA 679e327View commit details -
server: Return error from scheduleCompaction
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 22d3e4e - Browse repository at this point
Copy the full SHA 22d3e4eView commit details -
server: Move reading KV index inside scheduleCompaction function
Makes it easier to test hash match between scheduleCompaction and HashByRev. Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ea684db - Browse repository at this point
Copy the full SHA ea684dbView commit details -
server: Fix range in mock not returning same number of keys and values
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f1a759a - Browse repository at this point
Copy the full SHA f1a759aView commit details -
server: Calculate hash during compaction
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 21e5d5d - Browse repository at this point
Copy the full SHA 21e5d5dView commit details -
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2b8dd0d - Browse repository at this point
Copy the full SHA 2b8dd0dView commit details -
server: Move adjusting revision to hasher
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 991b429 - Browse repository at this point
Copy the full SHA 991b429View commit details -
server: Store real rv range in hasher
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1ff5992 - Browse repository at this point
Copy the full SHA 1ff5992View commit details -
server: Return revision range that hash was calcualted for
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a3f609d - Browse repository at this point
Copy the full SHA a3f609dView commit details -
server: Remove duplicated compaction revision
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6311072 - Browse repository at this point
Copy the full SHA 6311072View commit details -
server: Extract hasher to separate interface
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7358362 - Browse repository at this point
Copy the full SHA 7358362View commit details -
server: Cache compaction hash for HashByRev API
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1200b10 - Browse repository at this point
Copy the full SHA 1200b10View commit details -
tests: Add integration tests for compact hash
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d3db3bc - Browse repository at this point
Copy the full SHA d3db3bcView commit details -
tests: Add tests for HashByRev HTTP API
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 00bc8da - Browse repository at this point
Copy the full SHA 00bc8daView commit details -
tests: Unify TestCompactionHash and extend it to also Delete keys and…
… Defrag Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 037a898 - Browse repository at this point
Copy the full SHA 037a898View commit details -
tests: Rename corruptHash to CorruptBBolt
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a8020a0 - Browse repository at this point
Copy the full SHA a8020a0View commit details -
tests: Move CorruptBBolt to testutil
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8d4ca10 - Browse repository at this point
Copy the full SHA 8d4ca10View commit details -
server: Refactor compaction checker
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4a75e3d - Browse repository at this point
Copy the full SHA 4a75e3dView commit details -
tests: Cover periodic check in tests
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a56ec0b - Browse repository at this point
Copy the full SHA a56ec0bView commit details -
server: Implement compaction hash checking
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 21fb173 - Browse repository at this point
Copy the full SHA 21fb173View commit details -
server: Make corrtuption check optional and period configurable
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5660bf0 - Browse repository at this point
Copy the full SHA 5660bf0View commit details -
tests: Fix member id in CORRUPT alarm
Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2ddb9e0 - Browse repository at this point
Copy the full SHA 2ddb9e0View commit details -
Merge pull request etcd-io#14282 from serathius/fix-checks-v3.5
Fix corruption checks v3.5
Configuration menu - View commit details
-
Copy full SHA for ba52d5a - Browse repository at this point
Copy the full SHA ba52d5aView commit details -
server/etcdmain: add build support for Apple M1
This has been additionally verified by running the tests locally as a basic smoke test. GitHub Actions doesn't provide MacOS M1 (arm64) yet, so there's no good way to automate testing. Ran `TMPDIR=/tmp make test` locally. The `TMPDIR` bit is needed so there's no really long path used that breaks Unix socket setup in one of the tests. Signed-off-by: Marek Siarkowicz <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c79f96d - Browse repository at this point
Copy the full SHA c79f96dView commit details -
server,test: refresh cache on each NewAuthStore
- permissions were incorrectly loaded on restarts. - etcd-io#14355 - Backport of etcd-io#14358 Signed-off-by: vivekpatani <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7639d93 - Browse repository at this point
Copy the full SHA 7639d93View commit details
Commits on Sep 8, 2022
-
Merge pull request etcd-io#14409 from vivekpatani/release-3.5
[release-3.5] server,test: refresh cache on each NewAuthStore
Configuration menu - View commit details
-
Copy full SHA for bb3fae4 - Browse repository at this point
Copy the full SHA bb3fae4View commit details -
Merge pull request etcd-io#14436 from serathius/arm64
[release-3.5] server/etcdmain: add build support for Apple M1
Configuration menu - View commit details
-
Copy full SHA for a5a33cb - Browse repository at this point
Copy the full SHA a5a33cbView commit details -
testing: fix TestOpenWithMaxIndex cleanup
A WAL object was closed by defer, however the WAL was rewritten afterwards, so defer closed already closed WAL but not the new one. It caused a data race between writing file and cleaning up a temporary test directory, which led to a non-deterministic bug. Fixes etcd-io#14332 Signed-off-by: Vladimir Sokolov <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for eef5e22 - Browse repository at this point
Copy the full SHA eef5e22View commit details -
Merge pull request etcd-io#14440 from vsvastey/usr/vsvastey/open-with…
…-max-index-test-fix-3.5 [release-3.5] testing: fix TestOpenWithMaxIndex cleanup
Configuration menu - View commit details
-
Copy full SHA for 16d72c0 - Browse repository at this point
Copy the full SHA 16d72c0View commit details -
etcdctl: fix move-leader for multiple endpoints
Due to a duplicate call of clientConfigFromCmd, the move-leader command would fail with "conflicting environment variable is shadowed by corresponding command-line flag". Also in scenarios where no command-line flag was supplied. Signed-off-by: Thomas Jungblut <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 243b7a1 - Browse repository at this point
Copy the full SHA 243b7a1View commit details -
Merge pull request etcd-io#14434 from tjungblu/bz_1918413_3.5
etcdctl: allow move-leader to connect to multiple endpoints
Configuration menu - View commit details
-
Copy full SHA for 646ba66 - Browse repository at this point
Copy the full SHA 646ba66View commit details
Commits on Sep 13, 2022
-
Merge pull request etcd-io#14178 from lavacat/release-3.5-txn-panic
[3.5] server: don't panic in readonly serializable txn
Configuration menu - View commit details
-
Copy full SHA for 6c26693 - Browse repository at this point
Copy the full SHA 6c26693View commit details -
fix the flaky test fix_TestV3AuthRestartMember_20220913 for 3.5
Signed-off-by: Benjamin Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2f1171f - Browse repository at this point
Copy the full SHA 2f1171fView commit details -
Merge pull request etcd-io#14454 from ahrtr/fix_TestV3AuthRestartMemb…
…er_20220913_3.5 [release-3.5] fix the flaky test TestV3AuthRestartMember
Configuration menu - View commit details
-
Copy full SHA for 2ba1bab - Browse repository at this point
Copy the full SHA 2ba1babView commit details
Commits on Sep 15, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 19002cf - Browse repository at this point
Copy the full SHA 19002cfView commit details