Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-861: Rebase openshift/etcd 4.12 onto v3.5.5 #144

Merged

Commits on Apr 15, 2022

  1. Revert "trim the suffix dot from the srv.Target for etcd-client DNS l…

    …ookup"
    
    This reverts commit 4f51cc1.
    liggitt committed Apr 15, 2022
    Configuration menu
    Copy the full SHA
    7656477 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    081b4e2 View commit details
    Browse the repository at this point in the history

Commits on Apr 19, 2022

  1. Configuration menu
    Copy the full SHA
    b872757 View commit details
    Browse the repository at this point in the history

Commits on Apr 20, 2022

  1. Update conssitent_index when applying fails

    When clients have no permission to perform whatever operation, then
    the applying may fail. We should also move consistent_index forward
    in this case, otherwise the consitent_index may smaller than the
    snapshot index.
    ahrtr committed Apr 20, 2022
    Configuration menu
    Copy the full SHA
    5c68f2e View commit details
    Browse the repository at this point in the history

Commits on Apr 21, 2022

  1. Merge pull request etcd-io#13946 from ahrtr/move_cindex_on_apply_fail…

    …_353
    
    [3.5] Update consitent_index when applying fails
    serathius authored Apr 21, 2022
    Configuration menu
    Copy the full SHA
    c3c908e View commit details
    Browse the repository at this point in the history

Commits on Apr 24, 2022

  1. version: bump up to 3.5.4

    serathius committed Apr 24, 2022
    Configuration menu
    Copy the full SHA
    08407ff View commit details
    Browse the repository at this point in the history

Commits on Apr 28, 2022

  1. Update golang.org/x/crypto to latest

    Update crypto to address CVE-2022-27191.
    
    The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this
    change updates to latest.
    cmurphy committed Apr 28, 2022
    Configuration menu
    Copy the full SHA
    5c44c30 View commit details
    Browse the repository at this point in the history

Commits on May 5, 2022

  1. Merge pull request etcd-io#13996 from cmurphy/update-crypto-3.5

    Update golang.org/x/crypto to latest
    ptabor authored May 5, 2022
    Configuration menu
    Copy the full SHA
    8453b10 View commit details
    Browse the repository at this point in the history

Commits on May 6, 2022

  1. server/auth: enable tokenProvider if recoved store enables auth

    we found a lease leak issue:
    if a new member(by member add) is recovered by snapshot, and then
    become leader, the lease will never expire afterwards. leader will
    log the revoke failure caused by "invalid auth token", since the
    token provider is not functional, and drops all generated token
    from upper layer, which in this case, is the lease revoking
    routine.
    cfz committed May 6, 2022
    Configuration menu
    Copy the full SHA
    cceb25d View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13205 from cfz/cherry-pick-#13172

    [backport 3.5]: server/auth: enable tokenProvider if recoved store enables auth
    ptabor authored May 6, 2022
    Configuration menu
    Copy the full SHA
    b57881a View commit details
    Browse the repository at this point in the history

Commits on May 16, 2022

  1. Configuration menu
    Copy the full SHA
    c76a010 View commit details
    Browse the repository at this point in the history
  2. Make DRY_RUN explicit

    serathius committed May 16, 2022
    Configuration menu
    Copy the full SHA
    c4b0a56 View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14043 from serathius/test-release-3.5-v2

    [release-3.5] Test release scripts
    serathius authored May 16, 2022
    Configuration menu
    Copy the full SHA
    2e76dfb View commit details
    Browse the repository at this point in the history

Commits on May 18, 2022

  1. scripts: Avoid additional repo clone

    This PR removes additional clone when building artifacts.
    
    When releasing v3.5.4 this clone was main cause of issues and
    confusion about what release script is doing.
    
    release.sh script already clones repo in /tmp/ directory, so clonning
    before build is not needed. As precautions for bug in script leaving
    /tmp/ clone in bad state  I moved "Verify the latest commit has the
    version tag" and added "Verify the clean working tree" to be always run
    before build.
    serathius committed May 18, 2022
    Configuration menu
    Copy the full SHA
    c05b9b1 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    6aa934e View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14050 from serathius/avoid-clone-v3.5

    [release-3.5] scripts: Avoid additional repo clone
    serathius authored May 18, 2022
    Configuration menu
    Copy the full SHA
    73876b1 View commit details
    Browse the repository at this point in the history

Commits on Jun 4, 2022

  1. Backport two lease related bug fixes to 3.5

    The first bug fix is to resolve the race condition between goroutine
    and channel on the same leases to be revoked. It's a classic mistake
    in using Golang channel + goroutine. Please refer to
    https://go.dev/doc/effective_go#channels
    
    The second bug fix is to resolve the issue that etcd lessor may
    continue to schedule checkpoint after stepping down the leader role.
    ahrtr committed Jun 4, 2022
    Configuration menu
    Copy the full SHA
    acb1ee9 View commit details
    Browse the repository at this point in the history

Commits on Jun 6, 2022

  1. Merge pull request etcd-io#14087 from ahrtr/lease_revoke_race

    [3.5] Backport two lease related bug fixes to 3.5
    serathius authored Jun 6, 2022
    Configuration menu
    Copy the full SHA
    0be65da View commit details
    Browse the repository at this point in the history

Commits on Jun 17, 2022

  1. Add FileReader and FileBufReader utilities

    The FileReader interface is the wrapper of io.Reader. It provides
    the fs.FileInfo as well. The FileBufReader struct is the wrapper of
    bufio.Reader, it also provides fs.FileInfo.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    db0b67e View commit details
    Browse the repository at this point in the history
  2. restrict the max size of each WAL entry to the remaining size of the …

    …file
    
    Currently the max size of each WAL entry is hard coded as 10MB. If users
    set a value > 10MB for the flag --max-request-bytes, then etcd may run
    into a situation that it successfully processes a big request, but fails
    to decode it when replaying the WAL file on startup.
    
    On the other hand, we can't just remove the limitation, because if a
    WAL entry is somehow corrupted, and its recByte is a huge value, then
    etcd may run out of memory. So the solution is to restrict the max size
    of each WAL entry as a dynamic value, which is the remaining size of
    the WAL file.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    621cd7b View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14127 from ahrtr/threshold_3.5

    [3.5] Restrict the max size of each WAL entry to the remaining size of the WAL file
    ahrtr authored Jun 17, 2022
    Configuration menu
    Copy the full SHA
    4443e14 View commit details
    Browse the repository at this point in the history
  4. client/v3: do not overwrite authTokenBundle on dial

    Cherry pick the PR etcd-io#12992
    to 3.5, so please refer to the original PR for more detailed info.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    df632ab View commit details
    Browse the repository at this point in the history

Commits on Jun 20, 2022

  1. Merge pull request etcd-io#14132 from ahrtr/auth_bundle

    [3.5] client/v3: do not overwrite authTokenBundle on dial
    serathius authored Jun 20, 2022
    Configuration menu
    Copy the full SHA
    c9f7473 View commit details
    Browse the repository at this point in the history

Commits on Jul 3, 2022

  1. Client: fix check for WithPrefix op

    Make sure that WithPrefix correctly set the flag, and add test.
    Also, add test for WithFromKey.
    
    fixes etcd-io#14056
    
    Signed-off-by: Sahdev Zala <[email protected]>
    spzala committed Jul 3, 2022
    Configuration menu
    Copy the full SHA
    4df61af View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14187 from spzala/automated-cherry-pick-of…

    …-#14182-upstream-release-3.5
    
    Automated cherry pick of etcd-io#14182
    ahrtr authored Jul 3, 2022
    Configuration menu
    Copy the full SHA
    57c1d92 View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2022

  1. add the uint32Value data type

    The golang buildin package `flag` doesn't support `uint32` data
    type, so we need to support it via the `flag.Var`.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    40d1a43 View commit details
    Browse the repository at this point in the history
  2. Add flag --max-concurrent-streams to set the max concurrent stream …

    …each client can open at a time
    
    Also refer to etcd-io#14169 (comment)
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    437f377 View commit details
    Browse the repository at this point in the history
  3. add e2e test cases to cover the maxConcurrentStreams

    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    ff447b4 View commit details
    Browse the repository at this point in the history
  4. Merge pull request etcd-io#14219 from ahrtr/3.5_backport_maxstream

    [3.5] Support configuring `MaxConcurrentStreams` for http2
    ahrtr authored Jul 13, 2022
    Configuration menu
    Copy the full SHA
    fb71790 View commit details
    Browse the repository at this point in the history

Commits on Jul 14, 2022

  1. Improve error message for incorrect values of ETCD_CLIENT_DEBUG

    Signed-off-by: Jille Timmermans <[email protected]>
    Jille committed Jul 14, 2022
    Configuration menu
    Copy the full SHA
    cbedaf9 View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2022

  1. Merge pull request etcd-io#14222 from Jille/backport-14203

    [3.5] clientv3: Fix parsing of ETCD_CLIENT_DEBUG
    ahrtr authored Jul 15, 2022
    Configuration menu
    Copy the full SHA
    3237289 View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2022

  1. server/auth: protect rangePermCache with a RW lock

    Signed-off-by: Hitoshi Mitake <[email protected]>
    mitake committed Jul 19, 2022
    Configuration menu
    Copy the full SHA
    e15c005 View commit details
    Browse the repository at this point in the history

Commits on Jul 20, 2022

  1. Merge pull request etcd-io#14227 from mitake/perm-cache-lock-3.5

    server/auth: protect rangePermCache with a RW lock
    serathius authored Jul 20, 2022
    Configuration menu
    Copy the full SHA
    9d7e108 View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2022

  1. Change default sampling rate from 100% to 0%

    This changes the default parent-based trace sampling rate from
    100% to 0%. Due to the high QPS etcd can handle, having 100% trace
    sampling leads to very high resource usage. Defaulting to 0% means
    that only already-sampled traces will be sampled in etcd.
    
    Fixes etcd-io#14310
    
    Signed-off-by: Mike Dame <[email protected]>
    damemi committed Aug 5, 2022
    Configuration menu
    Copy the full SHA
    4c013c9 View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2022

  1. Merge pull request etcd-io#14318 from damemi/3.5-tracing-sample

    Change default sampling rate from 100% to 0%
    ahrtr authored Aug 6, 2022
    Configuration menu
    Copy the full SHA
    6145831 View commit details
    Browse the repository at this point in the history
  2. etcdserver: bump OpenTelemetry to 1.0.1

    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    2d7e490 View commit details
    Browse the repository at this point in the history
  3. move setupTracing into a separate file config_tracing.go

    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    5a86ae2 View commit details
    Browse the repository at this point in the history
  4. update all related dependencies

    Upgrade grpc to 1.41.0;
    Run ./script/fix.sh to fix all related issue.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    2751c61 View commit details
    Browse the repository at this point in the history
  5. Fix the failure in TestEndpointSwitchResolvesViolation

    Refer to etcd-io@a0bdfc4
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    8c5f110 View commit details
    Browse the repository at this point in the history
  6. Change default sampling rate from 100% to 0%

    Refer to etcd-io#14318
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    8fdca41 View commit details
    Browse the repository at this point in the history

Commits on Aug 8, 2022

  1. Merge pull request etcd-io#14312 from ahrtr/3.5_bump_otl

    [3.5] etcdserver: bump OpenTelemetry to 1.0.1 and gRPC to 1.41.0
    ahrtr authored Aug 8, 2022
    Configuration menu
    Copy the full SHA
    9e95685 View commit details
    Browse the repository at this point in the history

Commits on Aug 18, 2022

  1. clientv3: close streams after use in lessor keepAliveOnce method

    Streams are now closed after being used in the lessor `keepAliveOnce` method.
    This prevents the "failed to receive lease keepalive request from gRPC stream"
    message from being logged by the server after the context is cancelled by the
    client.
    
    Signed-off-by: Justin Kolberg <[email protected]>
    amdprophet committed Aug 18, 2022
    Configuration menu
    Copy the full SHA
    eab0b99 View commit details
    Browse the repository at this point in the history

Commits on Aug 19, 2022

  1. Merge pull request etcd-io#14361 from amdprophet/3.5-close-keepalive-…

    …stream
    
    [3.5] clientv3: close streams after use in lessor keepAliveOnce method
    ahrtr authored Aug 19, 2022
    Configuration menu
    Copy the full SHA
    6bab367 View commit details
    Browse the repository at this point in the history

Commits on Aug 20, 2022

  1. Refactor the keepAliveListener and keepAliveConn

    Only `net.TCPConn` supports `SetKeepAlive` and `SetKeepAlivePeriod`
    by default, so if you want to warp multiple layers of net.Listener,
    the `keepaliveListener` should be the one which is closest to the
    original `net.Listener` implementation, namely `TCPListener`.
    
    Also refer to etcd-io#14356
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Aug 20, 2022
    Configuration menu
    Copy the full SHA
    9ea5b1b View commit details
    Browse the repository at this point in the history

Commits on Aug 24, 2022

  1. Merge pull request etcd-io#14366 from ahrtr/keepalive_3.5_20220820

    [3.5] Refactor the keepAliveListener and keepAliveConn
    ahrtr authored Aug 24, 2022
    Configuration menu
    Copy the full SHA
    74aa38e View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2022

  1. Backport of pull/14354 to 3.5.5

    Signed-off-by: Vitalii Levitskii <[email protected]>
    biosvs committed Aug 29, 2022
    Configuration menu
    Copy the full SHA
    67e4c59 View commit details
    Browse the repository at this point in the history

Commits on Sep 1, 2022

  1. [backport 3.5] server: don't panic in readonly serializable txn

    Problem: We pass grpc context down to applier in readonly serializable txn.
    This context can be cancelled for example due to timeout.
    This will trigger panic inside applyTxn
    
    Solution: Only panic for transactions with write operations
    
    fixes etcd-io#14110
    main PR etcd-io#14149
    
    Signed-off-by: Bogdan Kanivets <[email protected]>
    Bogdan Kanivets committed Sep 1, 2022
    Configuration menu
    Copy the full SHA
    204d883 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14397 from biosvs/backport-grpc-proxy-endp…

    …oints-autosync
    
    Backport of pull/14354 to release-3.5
    serathius authored Sep 1, 2022
    Configuration menu
    Copy the full SHA
    fbb14f9 View commit details
    Browse the repository at this point in the history

Commits on Sep 5, 2022

  1. fix the potential data loss for clusters with only one member

    For a cluster with only one member, the raft always send identical
    unstable entries and committed entries to etcdserver, and etcd
    responds to the client once it finishes (actually partially) the
    applying workflow.
    
    When the client receives the response, it doesn't mean etcd has already
    successfully saved the data, including BoltDB and WAL, because:
       1. etcd commits the boltDB transaction periodically instead of on each request;
       2. etcd saves WAL entries in parallel with applying the committed entries.
    Accordingly, it may run into a situation of data loss when the etcd crashes
    immediately after responding to the client and before the boltDB and WAL
    successfully save the data to disk.
    Note that this issue can only happen for clusters with only one member.
    
    For clusters with multiple members, it isn't an issue, because etcd will
    not commit & apply the data before it being replicated to majority members.
    When the client receives the response, it means the data must have been applied.
    It further means the data must have been committed.
    Note: for clusters with multiple members, the raft will never send identical
    unstable entries and committed entries to etcdserver.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr authored and serathius committed Sep 5, 2022
    Configuration menu
    Copy the full SHA
    7eb696d View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14424 from serathius/one_member_data_loss_…

    …raft_3_5
    
    [release-3.5] fix the potential data loss for clusters with only one member
    ahrtr authored Sep 5, 2022
    Configuration menu
    Copy the full SHA
    747bf5c View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2022

  1. move consistent_index forward when executing alarmList operation

    Cherry pick etcd-io#14419 to 3.5.
    
    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Sep 6, 2022
    Configuration menu
    Copy the full SHA
    5c8aa08 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14429 from ahrtr/alarm_list_ci_3.5

    [3.5] Move consistent_index forward when executing alarmList operation
    ahrtr authored Sep 6, 2022
    Configuration menu
    Copy the full SHA
    204c031 View commit details
    Browse the repository at this point in the history

Commits on Sep 7, 2022

  1. server: Extract triggerCorruptAlarm to function

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    d32de2c View commit details
    Browse the repository at this point in the history
  2. server: Extract corruption detection to dedicated struct

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    35cbdf3 View commit details
    Browse the repository at this point in the history
  3. server: Cover corruptionMonitor with tests

    Get 100% coverage on InitialCheck and PeriodicCheck functions to avoid
    any mistakes.
    
    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    78a6f38 View commit details
    Browse the repository at this point in the history
  4. server: Test HashByRev values to make sure they don't change

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    336fef4 View commit details
    Browse the repository at this point in the history
  5. server: Extract unsafeHashByRev function

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    bc592c7 View commit details
    Browse the repository at this point in the history
  6. server: Move unsafeHashByRev to new hash.go file

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    3f26995 View commit details
    Browse the repository at this point in the history
  7. server: Extract kvHash struct

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    f5ed371 View commit details
    Browse the repository at this point in the history
  8. server: Refactor hasher

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    679e327 View commit details
    Browse the repository at this point in the history
  9. server: Return error from scheduleCompaction

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    22d3e4e View commit details
    Browse the repository at this point in the history
  10. server: Move reading KV index inside scheduleCompaction function

    Makes it easier to test hash match between scheduleCompaction and
    HashByRev.
    
    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    ea684db View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    f1a759a View commit details
    Browse the repository at this point in the history
  12. server: Calculate hash during compaction

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    21e5d5d View commit details
    Browse the repository at this point in the history
  13. server: Pass revision as int

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    2b8dd0d View commit details
    Browse the repository at this point in the history
  14. server: Move adjusting revision to hasher

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    991b429 View commit details
    Browse the repository at this point in the history
  15. server: Store real rv range in hasher

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    1ff5992 View commit details
    Browse the repository at this point in the history
  16. server: Return revision range that hash was calcualted for

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a3f609d View commit details
    Browse the repository at this point in the history
  17. server: Remove duplicated compaction revision

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    6311072 View commit details
    Browse the repository at this point in the history
  18. server: Extract hasher to separate interface

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    7358362 View commit details
    Browse the repository at this point in the history
  19. server: Cache compaction hash for HashByRev API

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    1200b10 View commit details
    Browse the repository at this point in the history
  20. tests: Add integration tests for compact hash

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    d3db3bc View commit details
    Browse the repository at this point in the history
  21. tests: Add tests for HashByRev HTTP API

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    00bc8da View commit details
    Browse the repository at this point in the history
  22. tests: Unify TestCompactionHash and extend it to also Delete keys and…

    … Defrag
    
    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    037a898 View commit details
    Browse the repository at this point in the history
  23. tests: Rename corruptHash to CorruptBBolt

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a8020a0 View commit details
    Browse the repository at this point in the history
  24. tests: Move CorruptBBolt to testutil

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    8d4ca10 View commit details
    Browse the repository at this point in the history
  25. server: Refactor compaction checker

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    4a75e3d View commit details
    Browse the repository at this point in the history
  26. tests: Cover periodic check in tests

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a56ec0b View commit details
    Browse the repository at this point in the history
  27. server: Implement compaction hash checking

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    21fb173 View commit details
    Browse the repository at this point in the history
  28. server: Make corrtuption check optional and period configurable

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    5660bf0 View commit details
    Browse the repository at this point in the history
  29. tests: Fix member id in CORRUPT alarm

    Signed-off-by: Marek Siarkowicz <[email protected]>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    2ddb9e0 View commit details
    Browse the repository at this point in the history
  30. Merge pull request etcd-io#14282 from serathius/fix-checks-v3.5

    Fix corruption checks v3.5
    serathius authored Sep 7, 2022
    Configuration menu
    Copy the full SHA
    ba52d5a View commit details
    Browse the repository at this point in the history
  31. server/etcdmain: add build support for Apple M1

    This has been additionally verified by running the tests locally as a
    basic smoke test. GitHub Actions doesn't provide MacOS M1 (arm64) yet,
    so there's no good way to automate testing.
    
    Ran `TMPDIR=/tmp make test` locally. The `TMPDIR` bit is needed so
    there's no really long path used that breaks Unix socket setup in one of
    the tests.
    
    Signed-off-by: Marek Siarkowicz <[email protected]>
    dbussink authored and serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    c79f96d View commit details
    Browse the repository at this point in the history
  32. server,test: refresh cache on each NewAuthStore

    - permissions were incorrectly loaded on restarts.
    - etcd-io#14355
    - Backport of etcd-io#14358
    
    Signed-off-by: vivekpatani <[email protected]>
    Vivek Patani authored and vivekpatani committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    7639d93 View commit details
    Browse the repository at this point in the history

Commits on Sep 8, 2022

  1. Merge pull request etcd-io#14409 from vivekpatani/release-3.5

    [release-3.5] server,test: refresh cache on each NewAuthStore
    mitake authored Sep 8, 2022
    Configuration menu
    Copy the full SHA
    bb3fae4 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14436 from serathius/arm64

    [release-3.5] server/etcdmain: add build support for Apple M1
    ahrtr authored Sep 8, 2022
    Configuration menu
    Copy the full SHA
    a5a33cb View commit details
    Browse the repository at this point in the history
  3. testing: fix TestOpenWithMaxIndex cleanup

    A WAL object was closed by defer, however the WAL was rewritten afterwards,
    so defer closed already closed WAL but not the new one. It caused a data
    race between writing file and cleaning up a temporary test directory,
    which led to a non-deterministic bug.
    
    Fixes etcd-io#14332
    
    Signed-off-by: Vladimir Sokolov <[email protected]>
    vsvastey authored and Vladimir Sokolov committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    eef5e22 View commit details
    Browse the repository at this point in the history
  4. Merge pull request etcd-io#14440 from vsvastey/usr/vsvastey/open-with…

    …-max-index-test-fix-3.5
    
    [release-3.5] testing: fix TestOpenWithMaxIndex cleanup
    ahrtr authored Sep 8, 2022
    Configuration menu
    Copy the full SHA
    16d72c0 View commit details
    Browse the repository at this point in the history
  5. etcdctl: fix move-leader for multiple endpoints

    Due to a duplicate call of clientConfigFromCmd, the move-leader command
    would fail with "conflicting environment variable is shadowed by corresponding command-line flag".
    Also in scenarios where no command-line flag was supplied.
    
    Signed-off-by: Thomas Jungblut <[email protected]>
    tjungblu committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    243b7a1 View commit details
    Browse the repository at this point in the history
  6. Merge pull request etcd-io#14434 from tjungblu/bz_1918413_3.5

    etcdctl: allow move-leader to connect to multiple endpoints
    ahrtr authored Sep 8, 2022
    Configuration menu
    Copy the full SHA
    646ba66 View commit details
    Browse the repository at this point in the history

Commits on Sep 13, 2022

  1. Merge pull request etcd-io#14178 from lavacat/release-3.5-txn-panic

    [3.5] server: don't panic in readonly serializable txn
    ahrtr authored Sep 13, 2022
    Configuration menu
    Copy the full SHA
    6c26693 View commit details
    Browse the repository at this point in the history
  2. fix the flaky test fix_TestV3AuthRestartMember_20220913 for 3.5

    Signed-off-by: Benjamin Wang <[email protected]>
    ahrtr committed Sep 13, 2022
    Configuration menu
    Copy the full SHA
    2f1171f View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14454 from ahrtr/fix_TestV3AuthRestartMemb…

    …er_20220913_3.5
    
    [release-3.5] fix the flaky test TestV3AuthRestartMember
    ahrtr authored Sep 13, 2022
    Configuration menu
    Copy the full SHA
    2ba1bab View commit details
    Browse the repository at this point in the history

Commits on Sep 15, 2022

  1. version: bump up to 3.5.5

    serathius committed Sep 15, 2022
    Configuration menu
    Copy the full SHA
    19002cf View commit details
    Browse the repository at this point in the history