sort by:
Revision Author Date Message Commit Date
9d7e108 Merge pull request #14227 from mitake/perm-cache-lock-3.5 server/auth: protect rangePermCache with a RW lock 20 July 2022, 08:36:00 UTC
e15c005 server/auth: protect rangePermCache with a RW lock Signed-off-by: Hitoshi Mitake <h.mitake@gmail.com> 19 July 2022, 06:56:12 UTC
3237289 Merge pull request #14222 from Jille/backport-14203 [3.5] clientv3: Fix parsing of ETCD_CLIENT_DEBUG 15 July 2022, 00:27:07 UTC
cbedaf9 Improve error message for incorrect values of ETCD_CLIENT_DEBUG Signed-off-by: Jille Timmermans <jille@quis.cx> 14 July 2022, 07:43:54 UTC
fb71790 Merge pull request #14219 from ahrtr/3.5_backport_maxstream [3.5] Support configuring `MaxConcurrentStreams` for http2 13 July 2022, 08:57:48 UTC
ff447b4 add e2e test cases to cover the maxConcurrentStreams Signed-off-by: Benjamin Wang <wachao@vmware.com> 13 July 2022, 06:43:44 UTC
437f377 Add flag `--max-concurrent-streams` to set the max concurrent stream each client can open at a time Also refer to https://github.com/etcd-io/etcd/pull/14169#discussion_r917154243 Signed-off-by: Benjamin Wang <wachao@vmware.com> 13 July 2022, 06:18:15 UTC
40d1a43 add the uint32Value data type The golang buildin package `flag` doesn't support `uint32` data type, so we need to support it via the `flag.Var`. Signed-off-by: Benjamin Wang <wachao@vmware.com> 13 July 2022, 05:57:22 UTC
57c1d92 Merge pull request #14187 from spzala/automated-cherry-pick-of-#14182-upstream-release-3.5 Automated cherry pick of #14182 03 July 2022, 11:02:10 UTC
4df61af Client: fix check for WithPrefix op Make sure that WithPrefix correctly set the flag, and add test. Also, add test for WithFromKey. fixes #14056 Signed-off-by: Sahdev Zala <spzala@us.ibm.com> 03 July 2022, 03:33:26 UTC
c9f7473 Merge pull request #14132 from ahrtr/auth_bundle [3.5] client/v3: do not overwrite authTokenBundle on dial 20 June 2022, 08:46:39 UTC
df632ab client/v3: do not overwrite authTokenBundle on dial Cherry pick the PR https://github.com/etcd-io/etcd/pull/12992 to 3.5, so please refer to the original PR for more detailed info. Signed-off-by: Benjamin Wang <wachao@vmware.com> 17 June 2022, 22:59:55 UTC
4443e14 Merge pull request #14127 from ahrtr/threshold_3.5 [3.5] Restrict the max size of each WAL entry to the remaining size of the WAL file 17 June 2022, 07:03:35 UTC
621cd7b restrict the max size of each WAL entry to the remaining size of the file Currently the max size of each WAL entry is hard coded as 10MB. If users set a value > 10MB for the flag --max-request-bytes, then etcd may run into a situation that it successfully processes a big request, but fails to decode it when replaying the WAL file on startup. On the other hand, we can't just remove the limitation, because if a WAL entry is somehow corrupted, and its recByte is a huge value, then etcd may run out of memory. So the solution is to restrict the max size of each WAL entry as a dynamic value, which is the remaining size of the WAL file. Signed-off-by: Benjamin Wang <wachao@vmware.com> 17 June 2022, 01:01:29 UTC
db0b67e Add FileReader and FileBufReader utilities The FileReader interface is the wrapper of io.Reader. It provides the fs.FileInfo as well. The FileBufReader struct is the wrapper of bufio.Reader, it also provides fs.FileInfo. Signed-off-by: Benjamin Wang <wachao@vmware.com> 17 June 2022, 01:00:43 UTC
0be65da Merge pull request #14087 from ahrtr/lease_revoke_race [3.5] Backport two lease related bug fixes to 3.5 06 June 2022, 14:58:04 UTC
acb1ee9 Backport two lease related bug fixes to 3.5 The first bug fix is to resolve the race condition between goroutine and channel on the same leases to be revoked. It's a classic mistake in using Golang channel + goroutine. Please refer to https://go.dev/doc/effective_go#channels The second bug fix is to resolve the issue that etcd lessor may continue to schedule checkpoint after stepping down the leader role. 04 June 2022, 06:01:08 UTC
73876b1 Merge pull request #14050 from serathius/avoid-clone-v3.5 [release-3.5] scripts: Avoid additional repo clone 18 May 2022, 11:48:51 UTC
6aa934e scripts: Detect staged files before building release 18 May 2022, 11:11:10 UTC
c05b9b1 scripts: Avoid additional repo clone This PR removes additional clone when building artifacts. When releasing v3.5.4 this clone was main cause of issues and confusion about what release script is doing. release.sh script already clones repo in /tmp/ directory, so clonning before build is not needed. As precautions for bug in script leaving /tmp/ clone in bad state I moved "Verify the latest commit has the version tag" and added "Verify the clean working tree" to be always run before build. 18 May 2022, 08:19:35 UTC
2e76dfb Merge pull request #14043 from serathius/test-release-3.5-v2 [release-3.5] Test release scripts 16 May 2022, 12:03:01 UTC
c4b0a56 Make DRY_RUN explicit 16 May 2022, 11:10:05 UTC
c76a010 scripts: Add tests for release scripts 16 May 2022, 11:09:46 UTC
b57881a Merge pull request #13205 from cfz/cherry-pick-#13172 [backport 3.5]: server/auth: enable tokenProvider if recoved store enables auth 06 May 2022, 11:05:50 UTC
cceb25d server/auth: enable tokenProvider if recoved store enables auth we found a lease leak issue: if a new member(by member add) is recovered by snapshot, and then become leader, the lease will never expire afterwards. leader will log the revoke failure caused by "invalid auth token", since the token provider is not functional, and drops all generated token from upper layer, which in this case, is the lease revoking routine. 06 May 2022, 04:24:28 UTC
8453b10 Merge pull request #13996 from cmurphy/update-crypto-3.5 Update golang.org/x/crypto to latest 05 May 2022, 08:35:47 UTC
5c44c30 Update golang.org/x/crypto to latest Update crypto to address CVE-2022-27191. The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this change updates to latest. 28 April 2022, 16:27:02 UTC
08407ff version: bump up to 3.5.4 24 April 2022, 10:44:36 UTC
c3c908e Merge pull request #13946 from ahrtr/move_cindex_on_apply_fail_353 [3.5] Update consitent_index when applying fails 21 April 2022, 14:21:24 UTC
5c68f2e Update conssitent_index when applying fails When clients have no permission to perform whatever operation, then the applying may fail. We should also move consistent_index forward in this case, otherwise the consitent_index may smaller than the snapshot index. 20 April 2022, 14:17:49 UTC
b872757 Merge pull request #13950 from liggitt/revert-srv-dot-3.5 Revert #13714 19 April 2022, 10:23:02 UTC
081b4e2 Add unit test for canonical SRV records 15 April 2022, 19:33:31 UTC
7656477 Revert "trim the suffix dot from the srv.Target for etcd-client DNS lookup" This reverts commit 4f51cc1d9a6d31ae5622fe50c90f03962a7ee3a4. 15 April 2022, 19:33:16 UTC
0452fee version: bump up to 3.5.3 13 April 2022, 15:17:51 UTC
842cb4b Merge pull request #13938 from endocrimes/dani/backport [backport] PR 13923 to release-3.5 13 April 2022, 13:15:59 UTC
50978d5 clientv3: disable mirror auth test with proxy 13 April 2022, 12:41:24 UTC
5d44f22 cv3/mirror: Fetch the most recent prefix revision When a user sets up a Mirror with a restricted user that doesn't have access to the `foo` path, we will fail to get the most recent revision due to permissions issues. With this change, when a prefix is provided we will get the initial revision from the prefix rather than /foo. This allows restricted users to setup sync. 13 April 2022, 12:39:06 UTC
cd750e4 Merge pull request #13862 from mrueg/update-baseimage [release-3.5] Dockerfile*: Switch baseimage to k8s hosted one 12 April 2022, 09:55:46 UTC
003a310 Merge pull request #13933 from ahrtr/fix_snapshot_recover_cindex_3.5 [3.5]Set backend to cindex before recovering the lessor in applySnapshot 12 April 2022, 08:46:55 UTC
6095cf8 Dockerfile-release.*: Update base image snapshot Signed-off-by: Manuel Rüger <manuel@rueg.eu> 12 April 2022, 08:39:55 UTC
719082e Merge pull request #13932 from ahrtr/lease_renew_linearizable_3.5 [3.5] Support linearizable renew lease 12 April 2022, 08:03:20 UTC
4002aa5 set backend to cindex before recovering the lessor in applySnapshot 12 April 2022, 07:56:14 UTC
bc5307d support linearizable renew lease When etcdserver receives a LeaseRenew request, it may be still in progress of processing the LeaseGrantRequest on exact the same leaseID. Accordingly it may return a TTL=0 to client due to the leaseID not found error. So the leader should wait for the appliedID to be available before processing client requests. 12 April 2022, 06:12:45 UTC
b9cbff1 Merge pull request #13917 from chrisayoub/release-3.5 [release-3.5] clientv3: filter learners members during autosync 10 April 2022, 13:43:28 UTC
232fb98 clientv3: filter learners members during autosync This change is to ensure that all members returned during the client's AutoSync are started and are not learners, which are not valid etcd members to make requests to. 10 April 2022, 01:25:42 UTC
383eceb Merge pull request #13669 from maxsokolovsky/upgrade-server-dependency-golang.org/x/crypto etcdserver: upgrade the golang.org/x/crypto dependency 09 April 2022, 07:44:05 UTC
bf22ef3 Merge pull request #13908 from ahrtr/data_corruption_3.5 [3.5] Fix the data inconsistency issue by adding a txPostLockHook into the backend 08 April 2022, 17:30:17 UTC
66c7aab fix the data inconsistency issue by adding a txPostLockHook into the backend Previously the SetConsistentIndex() is called during the apply workflow, but it's outside the db transaction. If a commit happens between SetConsistentIndex and the following apply workflow, and etcd crashes for whatever reason right after the commit, then etcd commits an incomplete transaction to db. Eventually etcd runs into the data inconsistency issue. In this commit, we move the SetConsistentIndex into a txPostLockHook, so it will be executed inside the transaction lock. 08 April 2022, 12:37:34 UTC
3ace622 Merge pull request #13904 from serathius/term-v3.5 [release-3.5] server: Save consistency index and term to backend even when they decrease 08 April 2022, 12:03:32 UTC
780ec33 server: Save consistency index and term to backend even when they decrease Reason to store CI and term in backend was to make db fully independent snapshot, it was never meant to interfere with apply logic. Skip of CI was introduced for v2->v3 migration where we wanted to prevent it from decreasing when replaying wal in https://github.com/etcd-io/etcd/pull/5391. By mistake it was added to apply flow during refactor in https://github.com/etcd-io/etcd/pull/12855#commitcomment-70713670. Consistency index and term should only be negotiated and used by raft to make decisions. Their values should only driven by raft state machine and backend should only be responsible for storing them. 07 April 2022, 19:22:18 UTC
238b18c Merge pull request #13895 from mrueg/rel3.5-client_golang [release-3.5] go.mod: Upgrade to prometheus/client_golang v1.11.1 07 April 2022, 07:38:43 UTC
5f19688 Merge pull request #13887 from serathius/verify-v3.5 [release-v3.5] server: Add verification of whether lock was called within out outsid… 06 April 2022, 12:32:03 UTC
83538f3 server: Add verification of whether lock was called within out outside of apply 06 April 2022, 09:22:51 UTC
3b8c651 go.mod: Upgrade to prometheus/client_golang v1.11.1 05 April 2022, 22:35:48 UTC
8b9ce3e Merge pull request #13866 from serathius/logs-v3.5 [release-3.5] Fix inconsistent log format 04 April 2022, 11:04:16 UTC
a060b42 server: Use default logging configuration instead of zap production one This fixes problem where logs json changes format of timestamp. 01 April 2022, 10:23:44 UTC
25556a0 tests: Keeps log in expect to allow their analysis 01 April 2022, 10:23:14 UTC
12ceac6 Merge pull request #13858 from mrueg/release-3.5-fix-make [Release-3.5] Makefile: Fix wrong target 31 March 2022, 09:07:38 UTC
462aefd Makefile: Fix wrong target Signed-off-by: Manuel Rüger <manuel@rueg.eu> 31 March 2022, 08:01:15 UTC
fed325a Merge pull request #13832 from mrueg/rel-3.5-go-1.16.15 [release-3.5] Update go to 1.16.15 23 March 2022, 10:30:20 UTC
c51c8d2 Build locally if docker-test container image does not exist This should make it easier to bump the golang version 21 March 2022, 23:03:57 UTC
1801ef8 Update to go 1.16.15 21 March 2022, 23:00:22 UTC
d516134 Merge pull request #13792 from kkkkun/fix-offline-defrag Fix offline defrag in etcdctl 17 March 2022, 10:22:13 UTC
58374b8 Fix offline defrag 13 March 2022, 13:17:59 UTC
39baf36 Merge pull request #13726 from chaochn47/backport_13676_to_3_5 backport 3.5: #13676 load all leases from backend 08 March 2022, 09:40:28 UTC
541635e Merge pull request #13701 from lavacat/defrag-bopts-fix-3.5 server/storage/backend: restore original bolt db options after defrag 08 March 2022, 09:38:31 UTC
3c2ef71 Merge pull request #13727 from ahrtr/3.5_print_raft_term_in_decimal [3.5] Always print raft term in decimal when displaying member list in json 25 February 2022, 07:59:52 UTC
1eb8b6a Merge pull request #13736 from vivekpatani/release-3.5 *: fix IsOptsWithFromKey 24 February 2022, 21:50:27 UTC
7cec92a *: fix IsOptsWithFromKey porting back from 3.5 from main PR #13334 24 February 2022, 00:42:00 UTC
f634b44 backport 3.5: #13676 load all leases from backend 22 February 2022, 18:21:04 UTC
7345d42 always print raft_term in decimal when displaying member list in json 22 February 2022, 09:09:21 UTC
fa191c6 Merge pull request #13706 from ahrtr/3.5-serializable_health_check [3.5] enhance health check endpoint to support serializable request 21 February 2022, 20:59:58 UTC
31c8e3c Merge pull request #13714 from ahrtr/3.5_correct_dns_etcd_client [3.5] Trim the suffix dot from the srv.Target for etcd-client DNS lookup 20 February 2022, 12:34:09 UTC
4f51cc1 trim the suffix dot from the srv.Target for etcd-client DNS lookup 18 February 2022, 21:55:19 UTC
7db1051 enhance health check endpoint to support serializable request 17 February 2022, 07:03:22 UTC
631fa6f server/storage/backend: restore original bolt db options after defrag Problem: Defrag was implemented before custom bolt options were added. Currently defrag doesn't restore backend options. For example BackendFreelistType will be unset after defrag. Solution: save bolt db options and use them in defrag. 15 February 2022, 18:56:07 UTC
f4708ae etcdserver: upgrade the golang.org/x/crypto dependency To rectify the vulnerability found in a version of golang.org/x/crypto (https://avd.aquasec.com/nvd/cve-2020-29652), upgrade the dependency to its latest version. Alternatively, version v0.0.0-20201216223049-8b5274cf687f could be used, where the fixed was introduced, but the latest is preferable. 07 February 2022, 15:11:46 UTC
99018a7 version: bump up to 3.5.2 01 February 2022, 11:28:34 UTC
a624446 Merge pull request #13616 from ptabor/20220117-update-yaml Update dep: gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254 [release 3.5] 17 January 2022, 19:07:16 UTC
74f33d6 Update dep: require gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254. 17 January 2022, 16:10:50 UTC
7291ed3 Merge pull request #13541 from michaljasionowski/backport-runlock-fix Backport watchablestore runlock bug fix to release-3.5 21 December 2021, 10:03:31 UTC
55c16df fix runlock bug 16 December 2021, 15:58:41 UTC
73080a7 Merge pull request #13501 from ahrtr/reset_ci_after_reload_db_3.5 [3.5] Set the backend again after recovering v3 backend from snapshot 06 December 2021, 12:22:22 UTC
e84c611 Merge pull request #13515 from serathius/checkpoints-fix-3.5 Backport Lease Checkpoints fix to release-3.5 03 December 2021, 11:21:02 UTC
d00e89d server: Require either cluster version v3.6 or --experimental-enable-lease-checkpoint-persist to persist lease remainingTTL To avoid inconsistant behavior during cluster upgrade we are feature gating persistance behind cluster version. This should ensure that all cluster members are upgraded to v3.6 before changing behavior. To allow backporting this fix to v3.5 we are also introducing flag --experimental-enable-lease-checkpoint-persist that will allow for smooth upgrade in v3.5 clusters with this feature enabled. 02 December 2021, 15:54:10 UTC
eddfb42 etcdserver,integration: Store remaining TTL on checkpoint To extend lease checkpointing mechanism to cases when the whole etcd cluster is restarted. 02 December 2021, 15:42:20 UTC
21634a9 lease,integration: add checkpoint scheduling after leader change Current checkpointing mechanism is buggy. New checkpoints for any lease are scheduled only until the first leader change. Added fix for that and a test that will check it. 02 December 2021, 15:40:14 UTC
8c81598 set the backend again after recovering v3 backend from snapshot 24 November 2021, 21:45:20 UTC
eac7f98 Merge pull request #13477 from mitake/backport-13308-to-3.5 Backport PR 13308 to release-3.5 21 November 2021, 19:45:15 UTC
dec6f72 *: implement a retry logic for auth old revision in the client 14 November 2021, 15:09:16 UTC
79bbc8f client/v3: refresh the token when ErrUserEmpty is received while retrying To fix a bug in the retry logic caused when the auth token is cleared after receiving `ErrInvalidAuthToken` from the server and the subsequent call to `getToken` also fails due to some reason (eg. context deadline exceeded). This leaves the client without a token and the retry will continue to fail with `ErrUserEmpty` unless the token is refreshed. 14 November 2021, 15:09:09 UTC
77d760b Merge pull request #13476 from chaochn47/backport-release-3.5 cherry-pick to 3.5 from #13467 exclude the same alarm type activated by multiple peers 14 November 2021, 03:10:19 UTC
7d44a7c server/etcdserver/api/etcdhttp: exclude the same alarm type activated by multiple peers 12 November 2021, 22:21:14 UTC
e8732fb Merge pull request #13395 from geetasg/release-3.5 storage/backend: Add a gauge to indicate if defrag is active (backport) 07 October 2021, 16:16:21 UTC
446f7d6 storage/backend: Add a gauge to indicate if defrag is active (backport from 3.6) 06 October 2021, 18:01:31 UTC
d42e858 version: 3.5.1 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 03 October 2021, 15:47:37 UTC
ec56229 Merge pull request #13380 from hexfusion/cp-13376 [release-3.5] Dockerfile: bump debian bullseye-20210927 01 October 2021, 17:23:50 UTC
bad9a52 Dockerfile: bump debian bullseye-20210927 fixes: CVE-2021-3711, CVE-2021-35942, CVE-2019-9893 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 01 October 2021, 16:48:57 UTC
edb3b5a Merge pull request #13375 from serathius/authority-3.5 Cherry pick "Fix http2 authority header in single endpoint scenario" to release-3.5 30 September 2021, 11:56:33 UTC
79f9a45 client: Use first endpoint as http2 authority header 30 September 2021, 10:15:33 UTC
back to top