sort by:
Revision Author Date Message Commit Date
a9e0a04 server: Extract resolveUrl helper function Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 30 March 2023, 13:11:59 UTC
245067b server: Separate client listener grouping from serving Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 30 March 2023, 13:11:59 UTC
63576a2 refactor: Use proper variable names for urls Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 30 March 2023, 13:11:58 UTC
fe37277 Merge pull request #15517 from fuweid/cp-15509-to-3.5 [3.5] server/embed: fix data race when start insecure grpc 20 March 2023, 13:45:59 UTC
9e97479 server/embed: fix data race when start insecure grpc There are two goroutines accessing the `gs` grpc server var. Before insecure `gs` server start, the `gs` can be changed to secure server and then the client will fail to connect to etcd with insecure request. It is data-race. We should use argument for reference in the new goroutine. fix: #15495 Signed-off-by: Wei Fu <fuweid89@gmail.com> (cherry picked from commit a9988e2625eede1af81d189b5f2ecf7d4af3edf1) Signed-off-by: Wei Fu <fuweid89@gmail.com> 20 March 2023, 12:41:49 UTC
15b3756 Merge pull request #15515 from serathius/fix-issue15271-3.5 [v3.5] Fix issue15271 20 March 2023, 12:08:31 UTC
92e56ab server: Test watch restore Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 20 March 2023, 11:04:43 UTC
dafdaae mvcc: update minRev when watcher stays synced Problem: during restore in watchableStore.Restore, synced watchers are moved to unsynced. minRev will be behind since it's not updated when watcher stays synced. Solution: update minRev fixes: https://github.com/etcd-io/etcd/issues/15271 Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 20 March 2023, 11:02:49 UTC
930a450 Merge pull request #15491 from serathius/test-cmux-3.5 Connection multiplexing regression tests for v3.5 18 March 2023, 12:23:36 UTC
86101d3 tests: Add v2 API to connection multiplexing test Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 17 March 2023, 09:51:36 UTC
eb614c3 tests: Add connection muiltiplexer testing Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 17 March 2023, 09:51:35 UTC
2eeb260 tests: Backport RunUtilCompletion Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 17 March 2023, 09:50:21 UTC
00e1e5d tests: Backport tls for etcdctl Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 17 March 2023, 09:50:19 UTC
46d6c1d tests: Extract e2e test utils Consider creating generic testutils for both e2e and integration tests. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 16 March 2023, 16:24:42 UTC
2f4d75f tests: Allow specifying http version in curl Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 16 March 2023, 16:24:42 UTC
4e9911e tests: Refactor newClient args Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 16 March 2023, 16:24:42 UTC
64bc55e tests: Refactor CURLPrefixArgs Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 16 March 2023, 16:24:42 UTC
11ca1d3 Merge pull request #15483 from jmhbnz/release-3.5-backport [3.5] Backport tls 1.3 support 15 March 2023, 22:06:45 UTC
358bcf3 Backport tls 1.3 support. Signed-off-by: James Blair <mail@jamesblair.net> 15 March 2023, 01:10:14 UTC
3a63da9 Merge pull request #15452 from serathius/watch-random-scheduler-3.5 [3.5] Use random scheduler Watch 14 March 2023, 09:25:26 UTC
55bfad9 server: Switch back to random scheduler to improve resilience to watch starvation Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 14 March 2023, 08:16:46 UTC
3f96014 test: Test etcd watch stream starvation under high read response load when sharing the same connection Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 14 March 2023, 08:16:46 UTC
9886141 tests: Allow configuring progress notify interval in e2e tests Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 14 March 2023, 08:16:46 UTC
6ddb23c Merge pull request #15454 from serathius/gomodtidy-3.5 Run go mod tidy 14 March 2023, 02:05:38 UTC
e44995e Run go mod tidy Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 13 March 2023, 15:56:11 UTC
b10adb6 Merge pull request #15428 from jmhbnz/release-3.5-backport [3.5] Backport update to latest go 1.19.7 release 08 March 2023, 11:07:11 UTC
f0aa228 Updated go to 1.19.7. Mitigates CVE-2023-24532. Signed-off-by: James Blair <mail@jamesblair.net> 08 March 2023, 09:33:13 UTC
c602942 Merge pull request #15337 from jmhbnz/release-3.5 [3.5] Backport bump to go 1.19.6 and golang.org/x/net to v0.7.0 03 March 2023, 10:08:36 UTC
1ea808b Backport go_srcs_in_module changes and fix goword failures. Signed-off-by: James Blair <mail@jamesblair.net> 24 February 2023, 09:01:41 UTC
183af50 Formatted source code for go 1.19.6. Signed-off-by: James Blair <mail@jamesblair.net> 20 February 2023, 08:33:59 UTC
1bd8353 Bump to go 1.19.6 Signed-off-by: James Blair <mail@jamesblair.net> 19 February 2023, 23:52:43 UTC
5996b5f Bump golang.org/x/net to v0.7.0 to address CVE GO-2023-1571. Signed-off-by: James Blair <mail@jamesblair.net> 19 February 2023, 23:51:17 UTC
d41d8ac test:enhance the test case TestV3WatchProgressOnMemberRestart Signed-off-by: Benjamin Wang <wachao@vmware.com> 10 February 2023, 13:03:43 UTC
e896cc7 clientv3: correct the nextRev on receving progress notification response Signed-off-by: Benjamin Wang <wachao@vmware.com> 10 February 2023, 08:47:49 UTC
346f1d3 Merge pull request #15240 from jmhbnz/release-3.5 [3.5] Backport adjusting time resolution to microseconds 09 February 2023, 12:45:30 UTC
bc5445c Merge pull request #15264 from ahrtr/3.5_walSync_failpoint_20230209 [3.5] etcdserver: add failpoints walBeforeSync and walAfterSync 09 February 2023, 08:10:05 UTC
452164a etcdserver: add failpoints walBeforeSync and walAfterSync Signed-off-by: Benjamin Wang <wachao@vmware.com> 08 February 2023, 23:03:04 UTC
1664b4f Merge pull request #15187 from Kidsan/fix/ipv6-comparisons-release-3.5 [3.5] Backport: netutil: consistently format ipv6 addresses 03 February 2023, 09:52:54 UTC
b9568db Fix regression in timestamp resolution Historic capnslog timestamps are in microsecond resolution. We need to match that when we migrate to the zap logger. Signed-off-by: James Blair <mail@jamesblair.net> 03 February 2023, 08:45:45 UTC
238da4b Merge pull request #15225 from pacoxu/update-cockroachdb/datadriven-etcd3.5 upgrade cockroachdb/datadriven to v1.0.2 to remove archived dependencies 31 January 2023, 07:51:28 UTC
2a0ecd4 upgrade cockroachdb/datadriven to v1.0.2 to remove archived dependencies Signed-off-by: Paco Xu <paco.xu@daocloud.io> 31 January 2023, 06:42:15 UTC
78e7390 bump github.com/stretchr/testify to v1.8.1 Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 January 2023, 23:12:46 UTC
747de58 bump bbolt to v1.3.7 for release-3.5 Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 January 2023, 23:12:46 UTC
41ed809 netutil: consistently format ipv6 addresses This formats ipv6 addresses to ensure they can be compared safely Signed-off-by: kidsan <8798449+Kidsan@users.noreply.github.com> 26 January 2023, 10:11:25 UTC
82004d0 docker: remove nsswitch.conf Signed-off-by: Iavael <905853+iavael@users.noreply.github.com> 24 January 2023, 18:46:11 UTC
215b53c version: bump up to 3.5.7 20 January 2023, 10:15:12 UTC
638c6f1 Merge pull request #15096 from ahrtr/3.5_promote_non_exist_id_20230113 [3.5] etcdserver: return membership.ErrIDNotFound when the memberID not found 17 January 2023, 09:23:03 UTC
53300ec etcdserver: return membership.ErrIDNotFound when the memberID not found Backport https://github.com/etcd-io/etcd/pull/15095. When promoting a learner, we need to wait until the leader's applied ID catches up to the commitId. Afterwards, check whether the learner ID exist or not, and return `membership.ErrIDNotFound` directly in the API if the member ID not found, to avoid the request being unnecessarily delivered to raft. Signed-off-by: Benjamin Wang <wachao@vmware.com> 16 January 2023, 22:24:27 UTC
816c2e2 Merge pull request #15069 from ahrtr/last_wal_rec_corrupt_3.5_20230108 [3.5] etcdserver: process the scenaro of the last WAL record being partially synced to disk 11 January 2023, 08:37:43 UTC
e1fc545 etcdserver: process the scenaro of the last WAL record being partially synced to disk We need to return io.ErrUnexpectedEOF in the error chain, so that etcdserver can repair it automatically. Backport https://github.com/etcd-io/etcd/pull/15068 Signed-off-by: Benjamin Wang <wachao@vmware.com> 07 January 2023, 21:30:01 UTC
9e3966f Merge pull request #15041 from ahrtr/update_nsswitch_3.5 [3.5] Update nsswitch.conf for 3.5 23 December 2022, 23:13:18 UTC
cff3045 update nsswitch.conf for 3.5 Signed-off-by: Benjamin Wang <wachao@vmware.com> 23 December 2022, 12:30:23 UTC
dd30268 Merge pull request #15037 from ahrtr/remove_busybox_3.5_20221223 3.5: remove the dependency on busybox 23 December 2022, 11:27:46 UTC
1293f5d 3.5: remove the dependency on busybox Signed-off-by: Benjamin Wang <wachao@vmware.com> 23 December 2022, 10:38:40 UTC
f12f162 Merge pull request #15018 from ahrtr/deps_3.5_20221219 [3.5] Security: address HIGH Vulnerabilities 19 December 2022, 09:41:52 UTC
cf379a7 Merge pull request #14920 from andy-js/andy-js/release-3.5 client/pkg/v3: fixes Solaris build of transport 19 December 2022, 08:24:56 UTC
4e03851 Merge pull request #15016 from ahrtr/use_distroless_3.5_20221219 [3.5] Security: use distroless base image to address critical Vulnerabilities 19 December 2022, 08:23:15 UTC
925c061 Remove dependency on gobin Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 08:16:55 UTC
413ec16 resolve build error: parameter may not start with quote character ' Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 05:28:25 UTC
bf1b902 remove .travis.yml Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 05:27:19 UTC
a612b92 format the source code and tidy the dependencies using go 1.17.13 Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 05:26:59 UTC
69ee8a8 bump go version to 1.17.13 Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 05:23:16 UTC
3337f35 deps: bump golang.org/x/net to v0.4.0 to address CVEs CVE-2021-44716 CVE-2022-27664 Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 December 2022, 01:28:07 UTC
b766840 security: use distroless base image to address critical Vulnerabilities Command: trivy image --severity CRITICAL gcr.io/etcd-development/etcd:v3.5.6 -f json -o 3.5.6_image_critical.json Signed-off-by: Benjamin Wang <wachao@vmware.com> 18 December 2022, 23:59:32 UTC
410a987 Merge pull request #15010 from 4everming/fix/Specify_branch_name_for_the_Trivy_Scan_in_release3.5 fix: specify the correct branch name of release-3.5 in workflow for… 17 December 2022, 08:13:36 UTC
d178292 cidc: specify the correct branch name of release-3.5 in workflow for trivy nightly scan To checkout the corresponding branch in cicd workflow. Specify the correct branch name in each branch. Signed-off-by: zsimon <zsimon@vmware.com> 17 December 2022, 07:30:26 UTC
3b7248b Merge pull request #15006 from ArkaSaha30/trivy-release-3-5 Add trivy nightly scan for `release-3.5` 16 December 2022, 05:59:33 UTC
4d3c840 Add trivy nightly scan for release-3.5 Signed-off-by: ArkaSaha30 <arkasaha30@gmail.com> 16 December 2022, 05:29:14 UTC
f1842b6 Merge pull request #14995 from ahrtr/revert_14322_20221215 clientv3: revert the client side change in 14547 15 December 2022, 00:39:35 UTC
1fdfb42 clientv3: revert the client side change in 14547 In order to fix https://github.com/etcd-io/etcd/issues/12385, PR https://github.com/etcd-io/etcd/pull/14322 introduced a change in which the client side may retry based on the error message returned from server side. This is not good, as it's too fragile and it's also changed the protocol between client and server. Please see the discussion in https://github.com/kubernetes/kubernetes/pull/114403 Note: The issue https://github.com/etcd-io/etcd/issues/12385 only happens when auth is enabled, and client side reuse the same client to watch. So we decided to rollback the change on 3.5, reasons: 1.K8s doesn't enable auth at all. It has no any impact on K8s. 2.It's very easy for client application to workaround the issue. The client just needs to create a new client each time before watching. Signed-off-by: Benjamin Wang <wachao@vmware.com> 14 December 2022, 18:12:49 UTC
96ca27a client/pkg/v3: fixes Solaris build of transport Add empty implementation for reuse port socket option since Solaris does not support SO_REUSEPORT. (cherry picked from commit af626ebfdeb46c1025f9a717959b241fecc44d0a) Conflicts: client/pkg/transport/sockopt_unix.go Signed-off-by: Andrew Stormont <andyjstormont@gmail.com> 13 December 2022, 00:12:15 UTC
127e9c0 Merge pull request #14899 from ahrtr/fix_readyonly_txn_panic_3.5_20221206 [3.5] etcdserver: fix nil pointer panic for readonly txn 06 December 2022, 20:28:30 UTC
c1a8997 etcdserver: fix nil pointer panic for readonly txn Backporting https://github.com/etcd-io/etcd/pull/14895 Signed-off-by: Benjamin Wang <wachao@vmware.com> 06 December 2022, 10:16:49 UTC
0b47579 Merge pull request #14884 from mehvaibh/release-3.5 [3.5] Backport: non mutating requests pass through quotaKVServer when NOSPACE 05 December 2022, 23:20:52 UTC
22f599a Fix go fmt error Signed-off-by: Vaibhav Mehta <mehvaibh@amazon.com> 05 December 2022, 21:04:09 UTC
378ad6b [3.5] Backport: non mutating requests pass through quotaKVServer when NOSPACE Signed-off-by: Vaibhav Mehta <mehvaibh@amazon.com> 05 December 2022, 21:04:09 UTC
5454ca6 Merge pull request #14852 from ahrtr/remove_memberid_alarm_3.5_20221125 [3.5] etcdserver: intentionally set the memberID as 0 in corruption alarm 25 November 2022, 10:14:19 UTC
ba122c9 etcdserver: intentionally set the memberID as 0 in corruption alarm Signed-off-by: Benjamin Wang <wachao@vmware.com> 25 November 2022, 08:23:37 UTC
cecbe35 version: bump up to 3.5.6 21 November 2022, 14:54:14 UTC
d0424a7 Merge pull request #14816 from serathius/trim-v3.5 [3.5] trim build path 21 November 2022, 14:46:06 UTC
1a9742c release: build with consistent paths This changes the builds to always add -trimpath which removes specific build time paths from the binary (like current directories etc). Improves build reproducability to make the final binary independent from the specific build path. Lastly, when stripping debug symbols, also add -w to strip DWARF symbols as well which aren't needed in that case either. Signed-off-by: Dirkjan Bussink <d.bussink@gmail.com> 21 November 2022, 14:19:51 UTC
7ccca08 Merge pull request #14799 from serathius/fix-client-fileutil-log [3.5] client/pkg/fileutil: add missing logger to {Create,Touch}DirAll 17 November 2022, 14:39:42 UTC
c919780 client/pkg/fileutil: add missing logger to {Create,Touch}DirAll Also populate it to every invocation. Signed-off-by: WangXiaoxiao <1141195807@qq.com> Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 17 November 2022, 13:08:30 UTC
b282163 Merge pull request #14790 from ahrtr/auth_3.5_20221117 [3.5] clientv3: do not refresh token when users use CommonName based authentication 17 November 2022, 09:16:42 UTC
4097c24 test: add test case to cover the CommonName based authentication Refer to https://github.com/etcd-io/etcd/issues/14764 Signed-off-by: Benjamin Wang <wachao@vmware.com> 17 November 2022, 01:10:49 UTC
9849fa7 test: add certificate with root CommonName Signed-off-by: Benjamin Wang <wachao@vmware.com> 16 November 2022, 21:56:43 UTC
69aace2 clientv3: do not refresh token when using TLS CommonName based authentication When users use the TLS CommonName based authentication, the authTokenBundle is always nil. But it's possible for the clients to get `rpctypes.ErrAuthOldRevision` response when the clients concurrently modify auth data (e.g, addUser, deleteUser etc.). In this case, there is no need to refresh the token; instead the clients just need to retry the operations (e.g. Put, Delete etc). Signed-off-by: Benjamin Wang <wachao@vmware.com> 16 November 2022, 21:54:52 UTC
5f387e6 Merge pull request #14733 from ahrtr/rev_inconsistency_3.5 [3.5] etcdserver: call the OnPreCommitUnsafe in unsafeCommit 14 November 2022, 09:54:22 UTC
563713e etcdserver: call the OnPreCommitUnsafe in unsafeCommit `unsafeCommit` is called by both `(*batchTxBuffered) commit` and `(*backend) defrag`. When users perform the defragmentation operation, etcd doesn't update the consistent index. If etcd crashes(e.g. panicking) in the process for whatever reason, then etcd replays the WAL entries starting from the latest snapshot, accordingly it may re-apply entries which might have already been applied, eventually the revision isn't consistent with other members. Refer to discussion in https://github.com/etcd-io/etcd/pull/14685 Signed-off-by: Benjamin Wang <wachao@vmware.com> 11 November 2022, 09:35:26 UTC
c2378be Merge pull request #13748 from kkkkun/add-warning-for-del add warning message when delete to release-3.5 05 November 2022, 08:51:01 UTC
6797856 add range flag for delete in etcdctl Signed-off-by: kkkkun <scuzk373x@gmail.com> 05 November 2022, 06:33:37 UTC
cc6a082 Merge pull request #14658 from ahrtr/double_barrier_3.5 [3.5] clientv3: fix the implementation of double barrier 02 November 2022, 14:16:11 UTC
2770720 Merge pull request #14676 from cenkalti/release-3.5 server: add more context to panic message 01 November 2022, 23:56:06 UTC
be4adc0 server: add more context to panic message Signed-off-by: Cenk Alti <cenkalti@gmail.com> 01 November 2022, 23:02:32 UTC
8902fe9 Merge pull request #14662 from falser101/release-3.5 [3.5] fix: close maintenance conn 31 October 2022, 09:49:19 UTC
45e31f6 fix:close conn Signed-off-by: jianfei.zhang <jianfei.zhang@daocloud.io> 31 October 2022, 08:00:58 UTC
8e26a1f clientv3: fix the design & implementation of double barrier Check the client count before creating the ephemeral key, do not create the key if there are already too many clients. Check the count after creating the key again, if the total kvs is bigger than the expected count, then check the rev of the current key, and take action accordingly based on its rev. If its rev is in the first ${count}, then it's valid client, otherwise, it should fail. Signed-off-by: Benjamin Wang <wachao@vmware.com> 31 October 2022, 00:33:27 UTC
0a0f0e3 Merge pull request #14656 from ahrtr/test_dynamical_add_member test: added e2e test case for issue 14571: etcd doesn't load auth info when recovering from a snapshot 30 October 2022, 08:54:47 UTC
bd7405a test: added e2e test case for issue 14571: etcd doesn't load auth info when recovering from a snapshot Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 October 2022, 06:49:13 UTC
17cb291 Merge pull request #14648 from mitake/test-authrecover-3.5 [3.5] server: refresh auth info when etcd recovers from a snapshot 29 October 2022, 05:43:42 UTC
back to top