swh:1:snp:272e298efac7922bc58929ef447c6a9add2959f8

sort by:
Revision Author Date Message Commit Date
85b640c Bump version to 3.4.21 Signed-off-by: Benjamin Wang <wachao@vmware.com> 15 September 2022, 00:46:22 UTC
1a05326 Merge pull request #14442 from ahrtr/fix_TestV3AuthRestartMember [release-3.4] Fix the flaky test TestV3AuthRestartMember 09 September 2022, 07:57:24 UTC
b8bea91 fix the flaky test TestV3AuthRestartMember Signed-off-by: Benjamin Wang <wachao@vmware.com> 09 September 2022, 01:37:25 UTC
6730ed8 Merge pull request #14410 from vivekpatani/release-3.4 [release-3.4] server,test: refresh cache on each NewAuthStore 09 September 2022, 01:34:32 UTC
a55a9f5 Merge pull request #14441 from tjungblu/bz_1918413_3.4_upstream [release-3.4] etcdctl: fix move-leader for multiple endpoints 09 September 2022, 01:26:40 UTC
86bc0a2 etcdctl: fix move-leader for multiple endpoints Due to a duplicate call of clientConfigFromCmd, the move-leader command would fail with "conflicting environment variable is shadowed by corresponding command-line flag". Also in scenarios where no command-line flag was supplied. Signed-off-by: Thomas Jungblut <tjungblu@redhat.com> 08 September 2022, 13:51:19 UTC
dd743ee Merge pull request #14439 from vsvastey/usr/vsvastey/open-with-max-index-test-fix-3.4 [release-3.4] testing: fix TestOpenWithMaxIndex cleanup 08 September 2022, 09:00:20 UTC
1ed5dfc testing: fix TestOpenWithMaxIndex cleanup A WAL object was closed by defer, however the WAL was rewritten afterwards, so defer closed already closed WAL but not the new one. It caused a data race between writing file and cleaning up a temporary test directory, which led to a non-deterministic bug. Fixes #14332 Signed-off-by: Vladimir Sokolov <vsvastey@gmail.com> 08 September 2022, 07:49:47 UTC
b2b7b9d Merge pull request #14423 from serathius/one_member_data_loss_raft_3_4 [release-3.4] fix the potential data loss for clusters with only one member 05 September 2022, 19:29:45 UTC
119e4dd fix the potential data loss for clusters with only one member For a cluster with only one member, the raft always send identical unstable entries and committed entries to etcdserver, and etcd responds to the client once it finishes (actually partially) the applying workflow. When the client receives the response, it doesn't mean etcd has already successfully saved the data, including BoltDB and WAL, because: 1. etcd commits the boltDB transaction periodically instead of on each request; 2. etcd saves WAL entries in parallel with applying the committed entries. Accordingly, it may run into a situation of data loss when the etcd crashes immediately after responding to the client and before the boltDB and WAL successfully save the data to disk. Note that this issue can only happen for clusters with only one member. For clusters with multiple members, it isn't an issue, because etcd will not commit & apply the data before it being replicated to majority members. When the client receives the response, it means the data must have been applied. It further means the data must have been committed. Note: for clusters with multiple members, the raft will never send identical unstable entries and committed entries to etcdserver. Signed-off-by: Benjamin Wang <wachao@vmware.com> 05 September 2022, 12:15:47 UTC
9d5ae56 Merge pull request #14420 from vsvastey/usr/vsvastey/nil-logger etcdserver: nil-logger issue fix for version 3.4 05 September 2022, 06:53:08 UTC
38342e8 etcdserver: nil-logger issue fix for version 3.4 In v3.5 it is assumed that the logger should not be nil, however it is still a case in v3.4. The PR targeted to v3.5 was backported to 3.4 and that's why it's possible to get panic on nil logger in 3.4. This commit fixed this issue. Fixes #14402 Signed-off-by: Vladimir Sokolov <vsvastey@gmail.com> 03 September 2022, 01:34:03 UTC
c0ef7d5 server,test: refresh cache on each NewAuthStore - permissions were incorrectly loaded on restarts. - #14355 - Backport of https://github.com/etcd-io/etcd/pull/14358 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> 31 August 2022, 20:08:11 UTC
1e26823 Bump version to 3.4.20 Signed-off-by: Benjamin Wang <wachao@vmware.com> 05 August 2022, 21:27:01 UTC
ee36615 Merge pull request #14290 from ahrtr/3.4_no_prevkv_for_create [3.4] Do not get previous K/V for create event 01 August 2022, 12:39:19 UTC
095bbfc lock down the version of shadow to v0.1.11 The latest vesion v0.1.12 was just released On Jul 27, 2022, and it is causing issue (see below) on the govet check, ``` govet_shadow' started at Sun Jul 31 23:23:27 PDT 2022 go get: upgraded golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2 => v0.0.0-20220722155237-a158d28d115b go get: upgraded golang.org/x/sys v0.0.0-20211019181941-9d821ace8654 => v0.0.0-20220722155257-8c9f86f7a55f go get: upgraded golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135 => v0.1.12 /root/go/pkg/mod/github.com/grpc-ecosystem/go-grpc-prometheus@v1.2.0/client_metrics.go:7:2: missing go.sum entry for module providing package golang.org/x/net/context (imported by go.etcd.io/etcd/etcdserver/etcdserverpb); to add: go get go.etcd.io/etcd/etcdserver/etcdserverpb /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/internal/transport/controlbuf.go:28:2: missing go.sum entry for module providing package golang.org/x/net/http2 (imported by go.etcd.io/etcd/embed); to add: go get go.etcd.io/etcd/embed /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/internal/transport/controlbuf.go:29:2: missing go.sum entry for module providing package golang.org/x/net/http2/hpack (imported by github.com/soheilhy/cmux); to add: go get github.com/soheilhy/cmux@v0.1.4 /root/go/pkg/mod/google.golang.org/grpc@v1.26.0/server.go:36:2: missing go.sum entry for module providing package golang.org/x/net/trace (imported by go.etcd.io/etcd/embed); to add: go get go.etcd.io/etcd/embed ``` It isn't good to always to use the latest version. Instead, we should lock down the version, and v0.1.11 was confirmed to be working. Signed-off-by: Benjamin Wang <wachao@vmware.com> 01 August 2022, 07:11:49 UTC
cc1b0e6 do not get previous K/V for create event Signed-off-by: Benjamin Wang <wachao@vmware.com> 01 August 2022, 05:11:46 UTC
314dcbf Merge pull request #14274 from lavacat/release-3.4-fix-TestRoundRobinBalancedResolvableFailoverFromServerFail [3.4] clientv3/balancer: fixed flaky TestRoundRobinBalancedResolvableFailoverFromServerFail 26 July 2022, 20:59:38 UTC
6f483a6 clientv3/balancer: fixed flaky TestRoundRobinBalancedResolvableFailoverFromServerFail - ignore "transport is closing" error during connections warmup after stopping one peer. Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 26 July 2022, 15:06:59 UTC
ce539a9 Merge pull request #14279 from SimFG/mvcc-race [3.4] clientv3/mvcc: fixed DATA RACE 26 July 2022, 15:01:34 UTC
04e5e55 [3.4] clientv3/mvcc: fixed DATA RACE between mvcc.(*store).setupMetricsReporter and mvcc.(*store).restore Signed-off-by: SimFG <1142838399@qq.com> 26 July 2022, 13:38:23 UTC
2c778ee Merge pull request #14269 from ahrtr/3.4_resend_readindex [3.4] etcdserver: resend ReadIndex request on empty apply request 25 July 2022, 08:53:06 UTC
f53db9b etcdserver: resend ReadIndex request on empty apply request Backport https://github.com/etcd-io/etcd/pull/12795 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 25 July 2022, 01:21:31 UTC
e2b36f8 Merge pull request #14253 from serathius/checkpoints-fix-3.4 [3.4] Checkpoints fix 3.4 22 July 2022, 08:56:17 UTC
de2e8cc Merge pull request #14258 from ahrtr/3.4_postphone_read_index [3.4] raft: postpone MsgReadIndex until first commit in the term 22 July 2022, 08:46:32 UTC
783e99c Fix lease checkpointing tests by forcing a snapshot Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 22 July 2022, 08:28:44 UTC
8f4735d server: Require either cluster version v3.6 or --experimental-enable-lease-checkpoint-persist to persist lease remainingTTL To avoid inconsistant behavior during cluster upgrade we are feature gating persistance behind cluster version. This should ensure that all cluster members are upgraded to v3.6 before changing behavior. To allow backporting this fix to v3.5 we are also introducing flag --experimental-enable-lease-checkpoint-persist that will allow for smooth upgrade in v3.5 clusters with this feature enabled. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 22 July 2022, 08:28:29 UTC
9c9148c raft: postpone MsgReadIndex until first commit in the term Backport https://github.com/etcd-io/etcd/pull/12762 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 22 July 2022, 05:56:27 UTC
f18d074 Merge pull request #14254 from ramses/backport-13435 [3.4] Backport: non mutating requests pass through quotaKVServer when NOSPACE 22 July 2022, 01:27:00 UTC
aca5cd1 Merge pull request #14246 from vivekpatani/release-3.4 [3.4] etcdserver,pkg: remove temp files in snap dir when etcdserver starting 22 July 2022, 01:14:23 UTC
e4deb09 etcdserver,pkg: remove temp files in snap dir when etcdserver starting - Backporting: https://github.com/etcd-io/etcd/pull/12846 - Reference: https://github.com/etcd-io/etcd/issues/14232 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> 21 July 2022, 22:50:27 UTC
96f69de Backport: non mutating requests pass through quotaKVServer when NOSPACE This is a backport of https://github.com/etcd-io/etcd/pull/13435 and is part of the work for 3.4.20 https://github.com/etcd-io/etcd/issues/14232. The original change had a second commit that modifies a changelog file. The 3.4 branch does not include any changelog file, so that part was not cherry-picked. Local Testing: - `make build` - `make test` Both succeed. Signed-off-by: Ramsés Morales <ramses@gmail.com> 21 July 2022, 22:06:09 UTC
8d83691 etcdserver,integration: Store remaining TTL on checkpoint To extend lease checkpointing mechanism to cases when the whole etcd cluster is restarted. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 21 July 2022, 15:35:21 UTC
a30aba8 lease,integration: add checkpoint scheduling after leader change Current checkpointing mechanism is buggy. New checkpoints for any lease are scheduled only until the first leader change. Added fix for that and a test that will check it. Signed-off-by: Marek Siarkowicz <siarkowicz@google.com> 21 July 2022, 15:35:15 UTC
7ee7029 Merge pull request #14251 from ahrtr/3.4_maxstream [3.4] Support configuring MaxConcurrentStreams for http2 21 July 2022, 09:43:15 UTC
6071b1c Support configuring MaxConcurrentStreams for http2 Backport https://github.com/etcd-io/etcd/pull/14219 to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 21 July 2022, 06:25:29 UTC
40ccb8b Merge pull request #14240 from chaochn47/cherry-pick-12335 [3.4] etcdserver: add more detailed traces on linearized reading 20 July 2022, 19:32:02 UTC
864006b print out applied index as uint64 Signed-off-by: Chao Chen <chaochn@amazon.com> 20 July 2022, 19:07:51 UTC
3f9fba9 etcdserver: add more detailed traces on linearized reading To improve debuggability of `agreement among raft nodes before linearized reading`, we added some tracing inside `linearizableReadLoop`. This will allow us to know the timing of `s.r.ReadIndex` vs `s.applyWait.Wait(rs.Index)`. Signed-off-by: Chao Chen <chaochn@amazon.com> 20 July 2022, 19:07:51 UTC
fc76e90 Merge pull request #14230 from mitake/perm-cache-lock-3.4 server/auth: protect rangePermCache with a RW lock 20 July 2022, 10:51:54 UTC
3ea12d3 Merge pull request #14241 from vivekpatani/release-3.4 clientv3: fix isOptsWithFromKey/isOptsWithPrefix 20 July 2022, 10:51:24 UTC
6313502 Merge pull request #14239 from chaochn47/backport-13676 backport 3.5: #13676 load all leases from backend 20 July 2022, 10:50:46 UTC
b0e1aae Merge pull request #14236 from chrisayoub/release-3.4 [release-3.4] clientv3: filter learners members during autosync 20 July 2022, 04:49:31 UTC
36a76e8 clientv3: filter learners members during autosync This change is to ensure that all members returned during the client's AutoSync are started and are not learners, which are not valid etcd members to make requests to. Signed-off-by: Chris Ayoub <cayoub@hubspot.com> 20 July 2022, 04:04:03 UTC
4fef7fc clientv3: fix isOptsWithFromKey/isOptsWithPrefix - Addressing: https://github.com/etcd-io/etcd/issues/13332 - Backporting: https://github.com/etcd-io/etcd/pull/13334 Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com> 20 July 2022, 00:20:56 UTC
fd51434 backport 3.5: #13676 load all leases from backend Signed-off-by: Chao Chen <chaochn@amazon.com> 19 July 2022, 23:08:01 UTC
d58a0c0 Merge pull request #14177 from ahrtr/3.4_lease_renew_linearizable [3.4] Support linearizable renew lease for 3.4 19 July 2022, 08:39:00 UTC
ecd91da server/auth: protect rangePermCache with a RW lock Signed-off-by: Hitoshi Mitake <h.mitake@gmail.com> 19 July 2022, 06:51:48 UTC
07d2b1d support linearizable renew lease for 3.4 Cherry pick https://github.com/etcd-io/etcd/pull/13932 to 3.4. When etcdserver receives a LeaseRenew request, it may be still in progress of processing the LeaseGrantRequest on exact the same leaseID. Accordingly it may return a TTL=0 to client due to the leaseID not found error. So the leader should wait for the appliedID to be available before processing client requests. Signed-off-by: Benjamin Wang <wachao@vmware.com> 19 July 2022, 05:34:55 UTC
4636a5f Bump version to 3.4.19 Signed-off-by: Benjamin Wang <wachao@vmware.com> 12 July 2022, 08:18:45 UTC
06561ae Merge pull request #14210 from ahrtr/fix_release_script [3.4] Fix pipeline failure for release test 12 July 2022, 08:06:33 UTC
be0ce4f fix pipeline failure for release test Signed-off-by: Benjamin Wang <wachao@vmware.com> 12 July 2022, 00:31:59 UTC
d3dfc9b Merge pull request #14204 from lavacat/release-3.4-balancer-tests clientv3/balance: fixed flaky balancer tests 11 July 2022, 22:14:35 UTC
185f203 clientv3/balance: fixed flaky balancer tests - added verification step to indirectly verify that all peers are in balancer subconn list Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 11 July 2022, 21:43:58 UTC
7de5327 Merge pull request #14205 from ahrtr/3.4_release_script [3.4] Update release scripts for release-3.4 11 July 2022, 12:06:06 UTC
6cc9416 backport release test to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 11 July 2022, 11:47:08 UTC
e6b3d97 Update release scripts for release-3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 11 July 2022, 08:06:32 UTC
852ac37 Merge pull request #14200 from ahrtr/3.4_pipeline_race set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy 08 July 2022, 08:23:21 UTC
8c1c5fe set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy Signed-off-by: Benjamin Wang <wachao@vmware.com> 08 July 2022, 00:37:31 UTC
0c6063f Merge pull request #14192 from ahrtr/3.4_bump_yaml [3.4] Bump gopkg.in/yaml.v2 v2.2.2 -> v2.4.0 due to: CVE-2019-11254 05 July 2022, 12:32:09 UTC
860dc14 Bump gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254 Cherry pick https://github.com/etcd-io/etcd/pull/13616 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> 04 July 2022, 22:26:06 UTC
f0256ee Merge pull request #14179 from lavacat/release-3.4-crypto [backport 3.4] Update golang.org/x/crypto to latest 04 July 2022, 09:57:58 UTC
576a798 [backport 3.4] Update golang.org/x/crypto to latest Update crypto to address CVE-2022-27191. The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this change updates to latest. Backport of https://github.com/etcd-io/etcd/pull/13996 Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 01 July 2022, 06:08:13 UTC
bae6178 Merge pull request #14183 from ahrtr/3.4_pipeline_issues_20220630 [3.4] Fix pipeline failures in 3.4 30 June 2022, 21:36:29 UTC
8160e9e disable test cases on certificate-based authentication which isn't supported by gRPC proxy. Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 06:11:54 UTC
5b3f269 replace all 3.4 certificates and keys with the files from 3.5 Fix the following error in integration pipeline, ``` === RUN TestTLSReloadCopy v3_grpc_test.go:1754: tls: failed to find any PEM data in key input v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key ``` Refer to https://github.com/etcd-io/etcd/runs/7123775361?check_suite_focus=true Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 05:21:48 UTC
bb91130 fix test failure in TestCtlV3WatchClientTLS Also refer to the following commit in 3.5, https://github.com/etcd-io/etcd/commit/093282f5eab8b5ba5613b48594aed8794a757c8a Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 02:19:03 UTC
f169e5d Merge pull request #14151 from ahrtr/3.4_skip_TestWatchRequestProgress_proxy [3.4] Skip WatchRequestProgress test in grpc-proxy mode. 28 June 2022, 21:40:05 UTC
6958ee8 Skip WatchRequestProgress test in grpc-proxy mode. We shouldn't fail the grpc-server (completely) by a not implemented RPC. Failing whole server by remote request is anti-pattern and security risk. Refer to https://github.com/etcd-io/etcd/runs/7034342964?check_suite_focus=true#step:5:2284 ``` === RUN TestWatchRequestProgress/1-watcher panic: not implemented goroutine 83024 [running]: go.etcd.io/etcd/proxy/grpcproxy.(*watchProxyStream).recvLoop(0xc009232f00, 0x4a73e1, 0xc00e2406e0) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:265 +0xbf2 go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch.func1(0xc0038a3bc0, 0xc009232f00) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:125 +0x70 created by go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:123 +0x73b FAIL go.etcd.io/etcd/clientv3/integration 222.813s FAIL ``` Signed-off-by: Benjamin Wang <wachao@vmware.com> 28 June 2022, 21:12:43 UTC
f1c59dc Merge pull request #14170 from ahrtr/3.4_proxy_fix_20220628 Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./client' 28 June 2022, 15:56:44 UTC
1c9fa07 Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./clientv3/...' Cherry pick https://github.com/etcd-io/etcd/pull/12319 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> 28 June 2022, 05:44:47 UTC
4e88cce Merge pull request #14168 from lavacat/release-3.4-TestGetToken [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth 27 June 2022, 20:35:17 UTC
2d99b34 [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth backport from branch-3.5: https://github.com/etcd-io/etcd/pull/12200/ Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 27 June 2022, 18:31:16 UTC
17fc680 Merge pull request #14150 from ahrtr/lease_revoke_race_3.4 [3.4] Backport two lease related bug fixes to 3.4 24 June 2022, 09:27:09 UTC
f036529 Backport two lease related bug fixes to 3.4 The first bug fix is to resolve the race condition between goroutine and channel on the same leases to be revoked. It's a classic mistake in using Golang channel + goroutine. Please refer to https://go.dev/doc/effective_go#channels The second bug fix is to resolve the issue that etcd lessor may continue to schedule checkpoint after stepping down the leader role. Signed-off-by: Benjamin Wang <wachao@vmware.com> 24 June 2022, 01:09:40 UTC
953376e Merge pull request #14136 from ahrtr/3.4_pipeline_issues [3.4] Fix all the pipeline failues for release 3.4 22 June 2022, 20:54:42 UTC
1abf085 fix all the pipeline failues for release 3.4 Items resolved: 1. fix the vet error: possible misuse of reflect.SliceHeader; 2. fix the vet error: call to (*T).Fatal from a non-test goroutine; 3. bump package golang.org/x/crypto, net and sys; 4. bump boltdb from 1.3.3 to 1.3.6; 5. remove the vendor directory; 6. remove go 1.12.17 and 1.15.15, add go 1.16.15 into pipeline; 7. bump go version to 1.16 in go.mod; 8. fix the issue: compile: version go1.16.15 does not match go tool version go1.17.11, refer to https://github.com/actions/setup-go/issues/107; 9. fix data race on compactMainRev and watcherGauge; 10. fix test failure for TestLeasingTxnOwnerGet in cluster_proxy mode. Signed-off-by: Benjamin Wang <wachao@vmware.com> 21 June 2022, 21:28:45 UTC
c2c9e7d Merge pull request #14075 from lavacat/release-3.4-go1.15.15-tests tests: fixing dependencies that brake tests in go.1.15.15 30 May 2022, 21:52:21 UTC
ceed023 tests: fixing dependencies that brake tests in go.1.15.15 - retry_interceptor_test causes: clientv3/naming/grpc.go:25:2: module google.golang.org/grpc@latest found (v1.46.0), but does not contain package google.golang.org/grpc/naming https://github.com/etcd-io/etcd/issues/12124 30 May 2022, 19:08:47 UTC
5505d7a Merge pull request #13206 from cfz/cherry-pick-#13172-r34 [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth 06 May 2022, 22:59:33 UTC
76147c9 Merge pull request #13999 from mitake/backport-13308-to-3.4 Backport PR 13308 to release 3.4 06 May 2022, 11:03:05 UTC
23e79db [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth this is a manual backport of #13172 06 May 2022, 04:26:55 UTC
757a8e8 *: implement a retry logic for auth old revision in the client 29 April 2022, 14:46:24 UTC
9bbdeb4 client/v3: refresh the token when ErrUserEmpty is received while retrying To fix a bug in the retry logic caused when the auth token is cleared after receiving `ErrInvalidAuthToken` from the server and the subsequent call to `getToken` also fails due to some reason (eg. context deadline exceeded). This leaves the client without a token and the retry will continue to fail with `ErrUserEmpty` unless the token is refreshed. 29 April 2022, 14:43:36 UTC
c50b726 Merge pull request #13713 from lavacat/defrag-bopts-fix-3.4 mvcc/backend: restore original bolt db options after defrag 18 February 2022, 09:54:21 UTC
d30a4fb mvcc/backend: restore original bolt db options after defrag Problem: Defrag was implemented before custom bolt options were added. Currently defrag doesn't restore backend options. For example BackendFreelistType will be unset after defrag. Solution: save bolt db options and use them in defrag. 17 February 2022, 23:33:05 UTC
a905430 embed: only log stream error with debug level (#13656) Co-authored-by: tangcong <tangcong506@gmail.com> 30 January 2022, 20:24:22 UTC
161bf7e Merge pull request #13475 from chaochn47/backport-release-3.4 backport 3.4 from #13467 exclude the same alarm type activated by multiple peers 14 November 2021, 03:10:38 UTC
04d47a9 backport from #13467 exclude the same alarm type activated by multiple peers 12 November 2021, 22:17:14 UTC
72d3e38 version: 3.4.18 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 15 October 2021, 13:47:08 UTC
eb9cee9 Merge pull request #13397 from geetasg/release-3.4 storage/backend: Add a gauge to indicate if defrag is active (backport) 07 October 2021, 17:08:31 UTC
85abf6e storage/backend: Add a gauge to indicate if defrag is active (backport from 3.6) 06 October 2021, 18:04:47 UTC
1eac258 Merge pull request #13385 from hexfusion/cp-13376-release-3.4 [release-3.4] Dockerfile: bump debian bullseye-20210927 04 October 2021, 06:40:32 UTC
91da298 Dockerfile: bump debian bullseye-20210927 fixes: CVE-2021-3711, CVE-2021-35942, CVE-2019-9893 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 04 October 2021, 04:32:23 UTC
19e2e70 version: 3.4.17 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 04 October 2021, 02:30:27 UTC
8ea187e Merge pull request #13378 from ysksuzuki/replace-jwt-go Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt 04 October 2021, 01:48:32 UTC
e63d058 test: update go to 1.15.15 Update go to 1.15.15 which is the latest of 1.15 because linux-amd64-fmt fails with go 1.15.13. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> 02 October 2021, 01:04:22 UTC
1558ede go.mod,go.sum: Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt github.com/dgrijalva/jwt-go has CVE https://github.com/advisories/GHSA-w73w-5m7g-f7qc and is already archived. etcd v3.4 should use a community maintained fork github.com/golang-jwt/jwt which provides the fixed version of the CVE. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> 02 October 2021, 01:01:52 UTC
41061e5 Merge pull request #13139 from hexfusion/bp-12727 [release-3.4]: ClientV3: Ordering: Fix TestEndpointSwitchResolvesViolation test 24 June 2021, 14:38:10 UTC
501d8f0 [release-3.4]: ClientV3: Ordering: Fix TestEndpointSwitchResolvesViolation test Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 24 June 2021, 01:26:55 UTC
back to top