7c63d65 | Wilson Wang | 24 May 2021, 22:15:23 UTC | Backport https://github.com/etcd-io/etcd/pull/12933 Changes: * server: set multiple concurrentReadTx instances share one txReadBuffer. Change-Id: If2bb758349bc7bd1810dfff44d884dba3c89622a | 15 September 2022, 09:57:10 UTC |
5c4f289 | Wilson Wang | 26 April 2021, 01:06:40 UTC | Backport https://github.com/etcd-io/etcd/pull/12896 Changes: * server: applier uses ReadTx instead of ConcurrentTx * update variable declaration location * server: add experimental flag for using shared buffer in transacton write Change-Id: I3fbabb3d0647addd50bf1d0ee26dcf9b3e141b94 | 15 September 2022, 09:57:02 UTC |
85b640c | Benjamin Wang | 15 September 2022, 00:46:22 UTC | Bump version to 3.4.21 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 15 September 2022, 00:46:22 UTC |
1a05326 | Marek Siarkowicz | 09 September 2022, 07:57:24 UTC | Merge pull request #14442 from ahrtr/fix_TestV3AuthRestartMember [release-3.4] Fix the flaky test TestV3AuthRestartMember | 09 September 2022, 07:57:24 UTC |
b8bea91 | Benjamin Wang | 09 September 2022, 01:37:25 UTC | fix the flaky test TestV3AuthRestartMember Signed-off-by: Benjamin Wang <wachao@vmware.com> | 09 September 2022, 01:37:25 UTC |
6730ed8 | Benjamin Wang | 09 September 2022, 01:34:32 UTC | Merge pull request #14410 from vivekpatani/release-3.4 [release-3.4] server,test: refresh cache on each NewAuthStore | 09 September 2022, 01:34:32 UTC |
a55a9f5 | Benjamin Wang | 09 September 2022, 01:26:40 UTC | Merge pull request #14441 from tjungblu/bz_1918413_3.4_upstream [release-3.4] etcdctl: fix move-leader for multiple endpoints | 09 September 2022, 01:26:40 UTC |
86bc0a2 | Thomas Jungblut | 08 September 2022, 11:00:20 UTC | etcdctl: fix move-leader for multiple endpoints Due to a duplicate call of clientConfigFromCmd, the move-leader command would fail with "conflicting environment variable is shadowed by corresponding command-line flag". Also in scenarios where no command-line flag was supplied. Signed-off-by: Thomas Jungblut <tjungblu@redhat.com> | 08 September 2022, 13:51:19 UTC |
dd743ee | Benjamin Wang | 08 September 2022, 09:00:20 UTC | Merge pull request #14439 from vsvastey/usr/vsvastey/open-with-max-index-test-fix-3.4 [release-3.4] testing: fix TestOpenWithMaxIndex cleanup | 08 September 2022, 09:00:20 UTC |
1ed5dfc | Vladimir Sokolov | 03 September 2022, 22:41:16 UTC | testing: fix TestOpenWithMaxIndex cleanup A WAL object was closed by defer, however the WAL was rewritten afterwards, so defer closed already closed WAL but not the new one. It caused a data race between writing file and cleaning up a temporary test directory, which led to a non-deterministic bug. Fixes #14332 Signed-off-by: Vladimir Sokolov <vsvastey@gmail.com> | 08 September 2022, 07:49:47 UTC |
b2b7b9d | Benjamin Wang | 05 September 2022, 19:29:45 UTC | Merge pull request #14423 from serathius/one_member_data_loss_raft_3_4 [release-3.4] fix the potential data loss for clusters with only one member | 05 September 2022, 19:29:45 UTC |
119e4dd | Benjamin Wang | 30 August 2022, 02:24:51 UTC | fix the potential data loss for clusters with only one member For a cluster with only one member, the raft always send identical unstable entries and committed entries to etcdserver, and etcd responds to the client once it finishes (actually partially) the applying workflow. When the client receives the response, it doesn't mean etcd has already successfully saved the data, including BoltDB and WAL, because: 1. etcd commits the boltDB transaction periodically instead of on each request; 2. etcd saves WAL entries in parallel with applying the committed entries. Accordingly, it may run into a situation of data loss when the etcd crashes immediately after responding to the client and before the boltDB and WAL successfully save the data to disk. Note that this issue can only happen for clusters with only one member. For clusters with multiple members, it isn't an issue, because etcd will not commit & apply the data before it being replicated to majority members. When the client receives the response, it means the data must have been applied. It further means the data must have been committed. Note: for clusters with multiple members, the raft will never send identical unstable entries and committed entries to etcdserver. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 05 September 2022, 12:15:47 UTC |
9d5ae56 | Benjamin Wang | 05 September 2022, 06:53:08 UTC | Merge pull request #14420 from vsvastey/usr/vsvastey/nil-logger etcdserver: nil-logger issue fix for version 3.4 | 05 September 2022, 06:53:08 UTC |
38342e8 | Vladimir Sokolov | 03 September 2022, 01:24:03 UTC | etcdserver: nil-logger issue fix for version 3.4 In v3.5 it is assumed that the logger should not be nil, however it is still a case in v3.4. The PR targeted to v3.5 was backported to 3.4 and that's why it's possible to get panic on nil logger in 3.4. This commit fixed this issue. Fixes #14402 Signed-off-by: Vladimir Sokolov <vsvastey@gmail.com> | 03 September 2022, 01:34:03 UTC |
c0ef7d5 | vivekpatani | 31 August 2022, 20:07:11 UTC | server,test: refresh cache on each NewAuthStore - permissions were incorrectly loaded on restarts. - #14355 - Backport of https://github.com/etcd-io/etcd/pull/14358 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> | 31 August 2022, 20:08:11 UTC |
1e26823 | Benjamin Wang | 05 August 2022, 21:27:01 UTC | Bump version to 3.4.20 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 05 August 2022, 21:27:01 UTC |
ee36615 | Sahdev Zala | 01 August 2022, 12:39:19 UTC | Merge pull request #14290 from ahrtr/3.4_no_prevkv_for_create [3.4] Do not get previous K/V for create event | 01 August 2022, 12:39:19 UTC |
095bbfc | Benjamin Wang | 01 August 2022, 07:11:49 UTC | lock down the version of shadow to v0.1.11 The latest vesion v0.1.12 was just released On Jul 27, 2022, and it is causing issue (see below) on the govet check, ``` govet_shadow' started at Sun Jul 31 23:23:27 PDT 2022 go get: upgraded golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2 => v0.0.0-20220722155237-a158d28d115b go get: upgraded golang.org/x/sys v0.0.0-20211019181941-9d821ace8654 => v0.0.0-20220722155257-8c9f86f7a55f go get: upgraded golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135 => v0.1.12 /root/go/pkg/mod/github.com/grpc-ecosystem/go-grpc-prometheus@v1.2.0/client_metrics.go:7:2: missing go.sum entry for module providing package golang.org/x/net/context (imported by go.etcd.io/etcd/etcdserver/etcdserverpb); to add: go get go.etcd.io/etcd/etcdserver/etcdserverpb /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/internal/transport/controlbuf.go:28:2: missing go.sum entry for module providing package golang.org/x/net/http2 (imported by go.etcd.io/etcd/embed); to add: go get go.etcd.io/etcd/embed /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/internal/transport/controlbuf.go:29:2: missing go.sum entry for module providing package golang.org/x/net/http2/hpack (imported by github.com/soheilhy/cmux); to add: go get github.com/soheilhy/cmux@v0.1.4 /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/server.go:36:2: missing go.sum entry for module providing package golang.org/x/net/trace (imported by go.etcd.io/etcd/embed); to add: go get go.etcd.io/etcd/embed ``` It isn't good to always to use the latest version. Instead, we should lock down the version, and v0.1.11 was confirmed to be working. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 01 August 2022, 07:11:49 UTC |
cc1b0e6 | Benjamin Wang | 01 August 2022, 05:11:46 UTC | do not get previous K/V for create event Signed-off-by: Benjamin Wang <wachao@vmware.com> | 01 August 2022, 05:11:46 UTC |
314dcbf | Benjamin Wang | 26 July 2022, 20:59:38 UTC | Merge pull request #14274 from lavacat/release-3.4-fix-TestRoundRobinBalancedResolvableFailoverFromServerFail [3.4] clientv3/balancer: fixed flaky TestRoundRobinBalancedResolvableFailoverFromServerFail | 26 July 2022, 20:59:38 UTC |
6f483a6 | Bogdan Kanivets | 25 July 2022, 16:17:58 UTC | clientv3/balancer: fixed flaky TestRoundRobinBalancedResolvableFailoverFromServerFail - ignore "transport is closing" error during connections warmup after stopping one peer. Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> | 26 July 2022, 15:06:59 UTC |
ce539a9 | Benjamin Wang | 26 July 2022, 15:01:34 UTC | Merge pull request #14279 from SimFG/mvcc-race [3.4] clientv3/mvcc: fixed DATA RACE | 26 July 2022, 15:01:34 UTC |
04e5e55 | SimFG | 26 July 2022, 13:38:23 UTC | [3.4] clientv3/mvcc: fixed DATA RACE between mvcc.(*store).setupMetricsReporter and mvcc.(*store).restore Signed-off-by: SimFG <1142838399@qq.com> | 26 July 2022, 13:38:23 UTC |
2c778ee | Benjamin Wang | 25 July 2022, 08:53:06 UTC | Merge pull request #14269 from ahrtr/3.4_resend_readindex [3.4] etcdserver: resend ReadIndex request on empty apply request | 25 July 2022, 08:53:06 UTC |
f53db9b | Benjamin Wang | 25 July 2022, 01:21:31 UTC | etcdserver: resend ReadIndex request on empty apply request Backport https://github.com/etcd-io/etcd/pull/12795 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 25 July 2022, 01:21:31 UTC |
e2b36f8 | Benjamin Wang | 22 July 2022, 08:56:17 UTC | Merge pull request #14253 from serathius/checkpoints-fix-3.4 [3.4] Checkpoints fix 3.4 | 22 July 2022, 08:56:17 UTC |
de2e8cc | Benjamin Wang | 22 July 2022, 08:46:32 UTC | Merge pull request #14258 from ahrtr/3.4_postphone_read_index [3.4] raft: postpone MsgReadIndex until first commit in the term | 22 July 2022, 08:46:32 UTC |
783e99c | Marek Siarkowicz | 21 July 2022, 16:28:40 UTC | Fix lease checkpointing tests by forcing a snapshot Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> | 22 July 2022, 08:28:44 UTC |
8f4735d | Marek Siarkowicz | 01 December 2021, 14:24:25 UTC | server: Require either cluster version v3.6 or --experimental-enable-lease-checkpoint-persist to persist lease remainingTTL To avoid inconsistant behavior during cluster upgrade we are feature gating persistance behind cluster version. This should ensure that all cluster members are upgraded to v3.6 before changing behavior. To allow backporting this fix to v3.5 we are also introducing flag --experimental-enable-lease-checkpoint-persist that will allow for smooth upgrade in v3.5 clusters with this feature enabled. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> | 22 July 2022, 08:28:29 UTC |
9c9148c | Benjamin Wang | 22 July 2022, 05:52:54 UTC | raft: postpone MsgReadIndex until first commit in the term Backport https://github.com/etcd-io/etcd/pull/12762 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 22 July 2022, 05:56:27 UTC |
f18d074 | Benjamin Wang | 22 July 2022, 01:27:00 UTC | Merge pull request #14254 from ramses/backport-13435 [3.4] Backport: non mutating requests pass through quotaKVServer when NOSPACE | 22 July 2022, 01:27:00 UTC |
aca5cd1 | Benjamin Wang | 22 July 2022, 01:14:23 UTC | Merge pull request #14246 from vivekpatani/release-3.4 [3.4] etcdserver,pkg: remove temp files in snap dir when etcdserver starting | 22 July 2022, 01:14:23 UTC |
e4deb09 | vivekpatani | 20 July 2022, 17:32:17 UTC | etcdserver,pkg: remove temp files in snap dir when etcdserver starting - Backporting: https://github.com/etcd-io/etcd/pull/12846 - Reference: https://github.com/etcd-io/etcd/issues/14232 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> | 21 July 2022, 22:50:27 UTC |
96f69de | Chao Chen | 22 October 2021, 23:36:37 UTC | Backport: non mutating requests pass through quotaKVServer when NOSPACE This is a backport of https://github.com/etcd-io/etcd/pull/13435 and is part of the work for 3.4.20 https://github.com/etcd-io/etcd/issues/14232. The original change had a second commit that modifies a changelog file. The 3.4 branch does not include any changelog file, so that part was not cherry-picked. Local Testing: - `make build` - `make test` Both succeed. Signed-off-by: Ramsés Morales <ramses@gmail.com> | 21 July 2022, 22:06:09 UTC |
8d83691 | Michał Jasionowski | 19 November 2021, 15:02:25 UTC | etcdserver,integration: Store remaining TTL on checkpoint To extend lease checkpointing mechanism to cases when the whole etcd cluster is restarted. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> | 21 July 2022, 15:35:21 UTC |
a30aba8 | Michał Jasionowski | 19 November 2021, 14:52:30 UTC | lease,integration: add checkpoint scheduling after leader change Current checkpointing mechanism is buggy. New checkpoints for any lease are scheduled only until the first leader change. Added fix for that and a test that will check it. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> | 21 July 2022, 15:35:15 UTC |
7ee7029 | Benjamin Wang | 21 July 2022, 09:43:15 UTC | Merge pull request #14251 from ahrtr/3.4_maxstream [3.4] Support configuring MaxConcurrentStreams for http2 | 21 July 2022, 09:43:15 UTC |
6071b1c | Benjamin Wang | 21 July 2022, 05:30:06 UTC | Support configuring MaxConcurrentStreams for http2 Backport https://github.com/etcd-io/etcd/pull/14219 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 21 July 2022, 06:25:29 UTC |
40ccb8b | Benjamin Wang | 20 July 2022, 19:32:02 UTC | Merge pull request #14240 from chaochn47/cherry-pick-12335 [3.4] etcdserver: add more detailed traces on linearized reading | 20 July 2022, 19:32:02 UTC |
864006b | Chao Chen | 20 July 2022, 19:06:54 UTC | print out applied index as uint64 Signed-off-by: Chao Chen <chaochn@amazon.com> | 20 July 2022, 19:07:51 UTC |
3f9fba9 | Pierre Zemb | 25 September 2020, 14:10:18 UTC | etcdserver: add more detailed traces on linearized reading To improve debuggability of `agreement among raft nodes before linearized reading`, we added some tracing inside `linearizableReadLoop`. This will allow us to know the timing of `s.r.ReadIndex` vs `s.applyWait.Wait(rs.Index)`. Signed-off-by: Chao Chen <chaochn@amazon.com> | 20 July 2022, 19:07:51 UTC |
fc76e90 | Benjamin Wang | 20 July 2022, 10:51:54 UTC | Merge pull request #14230 from mitake/perm-cache-lock-3.4 server/auth: protect rangePermCache with a RW lock | 20 July 2022, 10:51:54 UTC |
3ea12d3 | Benjamin Wang | 20 July 2022, 10:51:24 UTC | Merge pull request #14241 from vivekpatani/release-3.4 clientv3: fix isOptsWithFromKey/isOptsWithPrefix | 20 July 2022, 10:51:24 UTC |
6313502 | Benjamin Wang | 20 July 2022, 10:50:46 UTC | Merge pull request #14239 from chaochn47/backport-13676 backport 3.5: #13676 load all leases from backend | 20 July 2022, 10:50:46 UTC |
b0e1aae | Benjamin Wang | 20 July 2022, 04:49:31 UTC | Merge pull request #14236 from chrisayoub/release-3.4 [release-3.4] clientv3: filter learners members during autosync | 20 July 2022, 04:49:31 UTC |
36a76e8 | Chris Ayoub | 19 July 2022, 15:36:41 UTC | clientv3: filter learners members during autosync This change is to ensure that all members returned during the client's AutoSync are started and are not learners, which are not valid etcd members to make requests to. Signed-off-by: Chris Ayoub <cayoub@hubspot.com> | 20 July 2022, 04:04:03 UTC |
4fef7fc | vivekpatani | 19 July 2022, 22:57:21 UTC | clientv3: fix isOptsWithFromKey/isOptsWithPrefix - Addressing: https://github.com/etcd-io/etcd/issues/13332 - Backporting: https://github.com/etcd-io/etcd/pull/13334 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> | 20 July 2022, 00:20:56 UTC |
fd51434 | Chao Chen | 19 July 2022, 22:49:13 UTC | backport 3.5: #13676 load all leases from backend Signed-off-by: Chao Chen <chaochn@amazon.com> | 19 July 2022, 23:08:01 UTC |
d58a0c0 | Benjamin Wang | 19 July 2022, 08:39:00 UTC | Merge pull request #14177 from ahrtr/3.4_lease_renew_linearizable [3.4] Support linearizable renew lease for 3.4 | 19 July 2022, 08:39:00 UTC |
ecd91da | Hitoshi Mitake | 17 April 2022, 14:06:30 UTC | server/auth: protect rangePermCache with a RW lock Signed-off-by: Hitoshi Mitake <h.mitake@gmail.com> | 19 July 2022, 06:51:48 UTC |
07d2b1d | Benjamin Wang | 29 June 2022, 06:27:45 UTC | support linearizable renew lease for 3.4 Cherry pick https://github.com/etcd-io/etcd/pull/13932 to 3.4. When etcdserver receives a LeaseRenew request, it may be still in progress of processing the LeaseGrantRequest on exact the same leaseID. Accordingly it may return a TTL=0 to client due to the leaseID not found error. So the leader should wait for the appliedID to be available before processing client requests. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 19 July 2022, 05:34:55 UTC |
4636a5f | Benjamin Wang | 12 July 2022, 08:18:36 UTC | Bump version to 3.4.19 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 12 July 2022, 08:18:45 UTC |
06561ae | Benjamin Wang | 12 July 2022, 08:06:33 UTC | Merge pull request #14210 from ahrtr/fix_release_script [3.4] Fix pipeline failure for release test | 12 July 2022, 08:06:33 UTC |
be0ce4f | Benjamin Wang | 11 July 2022, 21:04:21 UTC | fix pipeline failure for release test Signed-off-by: Benjamin Wang <wachao@vmware.com> | 12 July 2022, 00:31:59 UTC |
d3dfc9b | Benjamin Wang | 11 July 2022, 22:14:35 UTC | Merge pull request #14204 from lavacat/release-3.4-balancer-tests clientv3/balance: fixed flaky balancer tests | 11 July 2022, 22:14:35 UTC |
185f203 | Bogdan Kanivets | 08 July 2022, 09:08:10 UTC | clientv3/balance: fixed flaky balancer tests - added verification step to indirectly verify that all peers are in balancer subconn list Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> | 11 July 2022, 21:43:58 UTC |
7de5327 | Benjamin Wang | 11 July 2022, 12:06:06 UTC | Merge pull request #14205 from ahrtr/3.4_release_script [3.4] Update release scripts for release-3.4 | 11 July 2022, 12:06:06 UTC |
6cc9416 | Benjamin Wang | 11 July 2022, 08:37:48 UTC | backport release test to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 11 July 2022, 11:47:08 UTC |
e6b3d97 | Benjamin Wang | 11 July 2022, 01:12:25 UTC | Update release scripts for release-3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> | 11 July 2022, 08:06:32 UTC |
852ac37 | Marek Siarkowicz | 08 July 2022, 08:23:21 UTC | Merge pull request #14200 from ahrtr/3.4_pipeline_race set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy | 08 July 2022, 08:23:21 UTC |
8c1c5fe | Benjamin Wang | 08 July 2022, 00:37:31 UTC | set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy Signed-off-by: Benjamin Wang <wachao@vmware.com> | 08 July 2022, 00:37:31 UTC |
0c6063f | Marek Siarkowicz | 05 July 2022, 12:32:09 UTC | Merge pull request #14192 from ahrtr/3.4_bump_yaml [3.4] Bump gopkg.in/yaml.v2 v2.2.2 -> v2.4.0 due to: CVE-2019-11254 | 05 July 2022, 12:32:09 UTC |
860dc14 | Benjamin Wang | 04 July 2022, 22:26:06 UTC | Bump gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254 Cherry pick https://github.com/etcd-io/etcd/pull/13616 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 04 July 2022, 22:26:06 UTC |
f0256ee | Marek Siarkowicz | 04 July 2022, 09:57:58 UTC | Merge pull request #14179 from lavacat/release-3.4-crypto [backport 3.4] Update golang.org/x/crypto to latest | 04 July 2022, 09:57:58 UTC |
576a798 | Bogdan Kanivets | 29 June 2022, 08:23:16 UTC | [backport 3.4] Update golang.org/x/crypto to latest Update crypto to address CVE-2022-27191. The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this change updates to latest. Backport of https://github.com/etcd-io/etcd/pull/13996 Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> | 01 July 2022, 06:08:13 UTC |
bae6178 | Benjamin Wang | 30 June 2022, 21:36:29 UTC | Merge pull request #14183 from ahrtr/3.4_pipeline_issues_20220630 [3.4] Fix pipeline failures in 3.4 | 30 June 2022, 21:36:29 UTC |
8160e9e | Benjamin Wang | 30 June 2022, 06:11:54 UTC | disable test cases on certificate-based authentication which isn't supported by gRPC proxy. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 30 June 2022, 06:11:54 UTC |
5b3f269 | Benjamin Wang | 30 June 2022, 05:21:48 UTC | replace all 3.4 certificates and keys with the files from 3.5 Fix the following error in integration pipeline, ``` === RUN TestTLSReloadCopy v3_grpc_test.go:1754: tls: failed to find any PEM data in key input v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key ``` Refer to https://github.com/etcd-io/etcd/runs/7123775361?check_suite_focus=true Signed-off-by: Benjamin Wang <wachao@vmware.com> | 30 June 2022, 05:21:48 UTC |
bb91130 | Benjamin Wang | 30 June 2022, 02:16:41 UTC | fix test failure in TestCtlV3WatchClientTLS Also refer to the following commit in 3.5, https://github.com/etcd-io/etcd/commit/093282f5eab8b5ba5613b48594aed8794a757c8a Signed-off-by: Benjamin Wang <wachao@vmware.com> | 30 June 2022, 02:19:03 UTC |
f169e5d | Benjamin Wang | 28 June 2022, 21:40:05 UTC | Merge pull request #14151 from ahrtr/3.4_skip_TestWatchRequestProgress_proxy [3.4] Skip WatchRequestProgress test in grpc-proxy mode. | 28 June 2022, 21:40:05 UTC |
6958ee8 | Benjamin Wang | 24 June 2022, 01:38:52 UTC | Skip WatchRequestProgress test in grpc-proxy mode. We shouldn't fail the grpc-server (completely) by a not implemented RPC. Failing whole server by remote request is anti-pattern and security risk. Refer to https://github.com/etcd-io/etcd/runs/7034342964?check_suite_focus=true#step:5:2284 ``` === RUN TestWatchRequestProgress/1-watcher panic: not implemented goroutine 83024 [running]: go.etcd.io/etcd/proxy/grpcproxy.(*watchProxyStream).recvLoop(0xc009232f00, 0x4a73e1, 0xc00e2406e0) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:265 +0xbf2 go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch.func1(0xc0038a3bc0, 0xc009232f00) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:125 +0x70 created by go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:123 +0x73b FAIL go.etcd.io/etcd/clientv3/integration 222.813s FAIL ``` Signed-off-by: Benjamin Wang <wachao@vmware.com> | 28 June 2022, 21:12:43 UTC |
f1c59dc | Marek Siarkowicz | 28 June 2022, 15:56:44 UTC | Merge pull request #14170 from ahrtr/3.4_proxy_fix_20220628 Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./client' | 28 June 2022, 15:56:44 UTC |
1c9fa07 | Benjamin Wang | 28 June 2022, 05:44:47 UTC | Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./clientv3/...' Cherry pick https://github.com/etcd-io/etcd/pull/12319 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 28 June 2022, 05:44:47 UTC |
4e88cce | Benjamin Wang | 27 June 2022, 20:35:17 UTC | Merge pull request #14168 from lavacat/release-3.4-TestGetToken [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth | 27 June 2022, 20:35:17 UTC |
2d99b34 | Bogdan Kanivets | 17 June 2022, 22:17:48 UTC | [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth backport from branch-3.5: https://github.com/etcd-io/etcd/pull/12200/ Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> | 27 June 2022, 18:31:16 UTC |
17fc680 | Marek Siarkowicz | 24 June 2022, 09:27:09 UTC | Merge pull request #14150 from ahrtr/lease_revoke_race_3.4 [3.4] Backport two lease related bug fixes to 3.4 | 24 June 2022, 09:27:09 UTC |
f036529 | Benjamin Wang | 24 June 2022, 01:09:40 UTC | Backport two lease related bug fixes to 3.4 The first bug fix is to resolve the race condition between goroutine and channel on the same leases to be revoked. It's a classic mistake in using Golang channel + goroutine. Please refer to https://go.dev/doc/effective_go#channels The second bug fix is to resolve the issue that etcd lessor may continue to schedule checkpoint after stepping down the leader role. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 24 June 2022, 01:09:40 UTC |
953376e | Benjamin Wang | 22 June 2022, 20:54:42 UTC | Merge pull request #14136 from ahrtr/3.4_pipeline_issues [3.4] Fix all the pipeline failues for release 3.4 | 22 June 2022, 20:54:42 UTC |
1abf085 | Benjamin Wang | 19 June 2022, 04:42:13 UTC | fix all the pipeline failues for release 3.4 Items resolved: 1. fix the vet error: possible misuse of reflect.SliceHeader; 2. fix the vet error: call to (*T).Fatal from a non-test goroutine; 3. bump package golang.org/x/crypto, net and sys; 4. bump boltdb from 1.3.3 to 1.3.6; 5. remove the vendor directory; 6. remove go 1.12.17 and 1.15.15, add go 1.16.15 into pipeline; 7. bump go version to 1.16 in go.mod; 8. fix the issue: compile: version go1.16.15 does not match go tool version go1.17.11, refer to https://github.com/actions/setup-go/issues/107; 9. fix data race on compactMainRev and watcherGauge; 10. fix test failure for TestLeasingTxnOwnerGet in cluster_proxy mode. Signed-off-by: Benjamin Wang <wachao@vmware.com> | 21 June 2022, 21:28:45 UTC |
c2c9e7d | Benjamin Wang | 30 May 2022, 21:52:21 UTC | Merge pull request #14075 from lavacat/release-3.4-go1.15.15-tests tests: fixing dependencies that brake tests in go.1.15.15 | 30 May 2022, 21:52:21 UTC |
ceed023 | Bogdan Kanivets | 26 May 2022, 17:59:02 UTC | tests: fixing dependencies that brake tests in go.1.15.15 - retry_interceptor_test causes: clientv3/naming/grpc.go:25:2: module google.golang.org/grpc@latest found (v1.46.0), but does not contain package google.golang.org/grpc/naming https://github.com/etcd-io/etcd/issues/12124 | 30 May 2022, 19:08:47 UTC |
5505d7a | Benjamin Wang | 06 May 2022, 22:59:33 UTC | Merge pull request #13206 from cfz/cherry-pick-#13172-r34 [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth | 06 May 2022, 22:59:33 UTC |
76147c9 | Piotr Tabor | 06 May 2022, 11:03:05 UTC | Merge pull request #13999 from mitake/backport-13308-to-3.4 Backport PR 13308 to release 3.4 | 06 May 2022, 11:03:05 UTC |
23e79db | cfz | 11 July 2021, 13:29:04 UTC | [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth this is a manual backport of #13172 | 06 May 2022, 04:26:55 UTC |
757a8e8 | Hitoshi Mitake | 28 August 2021, 14:47:14 UTC | *: implement a retry logic for auth old revision in the client | 29 April 2022, 14:46:24 UTC |
9bbdeb4 | Ashish Ranjan | 30 July 2021, 23:17:51 UTC | client/v3: refresh the token when ErrUserEmpty is received while retrying To fix a bug in the retry logic caused when the auth token is cleared after receiving `ErrInvalidAuthToken` from the server and the subsequent call to `getToken` also fails due to some reason (eg. context deadline exceeded). This leaves the client without a token and the retry will continue to fail with `ErrUserEmpty` unless the token is refreshed. | 29 April 2022, 14:43:36 UTC |
c50b726 | Marek Siarkowicz | 18 February 2022, 09:54:21 UTC | Merge pull request #13713 from lavacat/defrag-bopts-fix-3.4 mvcc/backend: restore original bolt db options after defrag | 18 February 2022, 09:54:21 UTC |
d30a4fb | Bogdan Kanivets | 17 February 2022, 23:33:05 UTC | mvcc/backend: restore original bolt db options after defrag Problem: Defrag was implemented before custom bolt options were added. Currently defrag doesn't restore backend options. For example BackendFreelistType will be unset after defrag. Solution: save bolt db options and use them in defrag. | 17 February 2022, 23:33:05 UTC |
a905430 | richkun | 30 January 2022, 20:24:22 UTC | embed: only log stream error with debug level (#13656) Co-authored-by: tangcong <tangcong506@gmail.com> | 30 January 2022, 20:24:22 UTC |
161bf7e | Sam Batschelet | 14 November 2021, 03:10:38 UTC | Merge pull request #13475 from chaochn47/backport-release-3.4 backport 3.4 from #13467 exclude the same alarm type activated by multiple peers | 14 November 2021, 03:10:38 UTC |
04d47a9 | Chao Chen | 12 November 2021, 22:17:14 UTC | backport from #13467 exclude the same alarm type activated by multiple peers | 12 November 2021, 22:17:14 UTC |
72d3e38 | Sam Batschelet | 15 October 2021, 13:47:08 UTC | version: 3.4.18 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> | 15 October 2021, 13:47:08 UTC |
eb9cee9 | Piotr Tabor | 07 October 2021, 17:08:31 UTC | Merge pull request #13397 from geetasg/release-3.4 storage/backend: Add a gauge to indicate if defrag is active (backport) | 07 October 2021, 17:08:31 UTC |
85abf6e | Geeta Gharpure | 06 October 2021, 18:01:07 UTC | storage/backend: Add a gauge to indicate if defrag is active (backport from 3.6) | 06 October 2021, 18:04:47 UTC |
1eac258 | Piotr Tabor | 04 October 2021, 06:40:32 UTC | Merge pull request #13385 from hexfusion/cp-13376-release-3.4 [release-3.4] Dockerfile: bump debian bullseye-20210927 | 04 October 2021, 06:40:32 UTC |
91da298 | Sam Batschelet | 30 September 2021, 12:19:37 UTC | Dockerfile: bump debian bullseye-20210927 fixes: CVE-2021-3711, CVE-2021-35942, CVE-2019-9893 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> | 04 October 2021, 04:32:23 UTC |
19e2e70 | Sam Batschelet | 04 October 2021, 02:30:27 UTC | version: 3.4.17 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> | 04 October 2021, 02:30:27 UTC |
8ea187e | Sam Batschelet | 04 October 2021, 01:48:32 UTC | Merge pull request #13378 from ysksuzuki/replace-jwt-go Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt | 04 October 2021, 01:48:32 UTC |
e63d058 | Yusuke Suzuki | 02 October 2021, 01:04:22 UTC | test: update go to 1.15.15 Update go to 1.15.15 which is the latest of 1.15 because linux-amd64-fmt fails with go 1.15.13. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> | 02 October 2021, 01:04:22 UTC |
1558ede | Yusuke Suzuki | 01 October 2021, 02:35:00 UTC | go.mod,go.sum: Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt github.com/dgrijalva/jwt-go has CVE https://github.com/advisories/GHSA-w73w-5m7g-f7qc and is already archived. etcd v3.4 should use a community maintained fork github.com/golang-jwt/jwt which provides the fixed version of the CVE. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> | 02 October 2021, 01:01:52 UTC |