swh:1:snp:d2871480d5f4e06baf16689eecc7e047c1f18981

sort by:
Revision Author Date Message Commit Date
4636a5f Bump version to 3.4.19 Signed-off-by: Benjamin Wang <wachao@vmware.com> 12 July 2022, 08:18:45 UTC
06561ae Merge pull request #14210 from ahrtr/fix_release_script [3.4] Fix pipeline failure for release test 12 July 2022, 08:06:33 UTC
be0ce4f fix pipeline failure for release test Signed-off-by: Benjamin Wang <wachao@vmware.com> 12 July 2022, 00:31:59 UTC
d3dfc9b Merge pull request #14204 from lavacat/release-3.4-balancer-tests clientv3/balance: fixed flaky balancer tests 11 July 2022, 22:14:35 UTC
185f203 clientv3/balance: fixed flaky balancer tests - added verification step to indirectly verify that all peers are in balancer subconn list Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 11 July 2022, 21:43:58 UTC
7de5327 Merge pull request #14205 from ahrtr/3.4_release_script [3.4] Update release scripts for release-3.4 11 July 2022, 12:06:06 UTC
6cc9416 backport release test to 3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 11 July 2022, 11:47:08 UTC
e6b3d97 Update release scripts for release-3.4 Signed-off-by: Benjamin Wang <wachao@vmware.com> 11 July 2022, 08:06:32 UTC
852ac37 Merge pull request #14200 from ahrtr/3.4_pipeline_race set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy 08 July 2022, 08:23:21 UTC
8c1c5fe set RACE as true for linux-amd64-unit and linux-amd64-grpcproxy Signed-off-by: Benjamin Wang <wachao@vmware.com> 08 July 2022, 00:37:31 UTC
0c6063f Merge pull request #14192 from ahrtr/3.4_bump_yaml [3.4] Bump gopkg.in/yaml.v2 v2.2.2 -> v2.4.0 due to: CVE-2019-11254 05 July 2022, 12:32:09 UTC
860dc14 Bump gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254 Cherry pick https://github.com/etcd-io/etcd/pull/13616 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> 04 July 2022, 22:26:06 UTC
f0256ee Merge pull request #14179 from lavacat/release-3.4-crypto [backport 3.4] Update golang.org/x/crypto to latest 04 July 2022, 09:57:58 UTC
576a798 [backport 3.4] Update golang.org/x/crypto to latest Update crypto to address CVE-2022-27191. The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this change updates to latest. Backport of https://github.com/etcd-io/etcd/pull/13996 Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 01 July 2022, 06:08:13 UTC
bae6178 Merge pull request #14183 from ahrtr/3.4_pipeline_issues_20220630 [3.4] Fix pipeline failures in 3.4 30 June 2022, 21:36:29 UTC
8160e9e disable test cases on certificate-based authentication which isn't supported by gRPC proxy. Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 06:11:54 UTC
5b3f269 replace all 3.4 certificates and keys with the files from 3.5 Fix the following error in integration pipeline, ``` === RUN TestTLSReloadCopy v3_grpc_test.go:1754: tls: failed to find any PEM data in key input v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key v3_grpc_test.go:1754: tls: private key does not match public key ``` Refer to https://github.com/etcd-io/etcd/runs/7123775361?check_suite_focus=true Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 05:21:48 UTC
bb91130 fix test failure in TestCtlV3WatchClientTLS Also refer to the following commit in 3.5, https://github.com/etcd-io/etcd/commit/093282f5eab8b5ba5613b48594aed8794a757c8a Signed-off-by: Benjamin Wang <wachao@vmware.com> 30 June 2022, 02:19:03 UTC
f169e5d Merge pull request #14151 from ahrtr/3.4_skip_TestWatchRequestProgress_proxy [3.4] Skip WatchRequestProgress test in grpc-proxy mode. 28 June 2022, 21:40:05 UTC
6958ee8 Skip WatchRequestProgress test in grpc-proxy mode. We shouldn't fail the grpc-server (completely) by a not implemented RPC. Failing whole server by remote request is anti-pattern and security risk. Refer to https://github.com/etcd-io/etcd/runs/7034342964?check_suite_focus=true#step:5:2284 ``` === RUN TestWatchRequestProgress/1-watcher panic: not implemented goroutine 83024 [running]: go.etcd.io/etcd/proxy/grpcproxy.(*watchProxyStream).recvLoop(0xc009232f00, 0x4a73e1, 0xc00e2406e0) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:265 +0xbf2 go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch.func1(0xc0038a3bc0, 0xc009232f00) /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:125 +0x70 created by go.etcd.io/etcd/proxy/grpcproxy.(*watchProxy).Watch /home/runner/work/etcd/etcd/proxy/grpcproxy/watch.go:123 +0x73b FAIL go.etcd.io/etcd/clientv3/integration 222.813s FAIL ``` Signed-off-by: Benjamin Wang <wachao@vmware.com> 28 June 2022, 21:12:43 UTC
f1c59dc Merge pull request #14170 from ahrtr/3.4_proxy_fix_20220628 Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./client' 28 June 2022, 15:56:44 UTC
1c9fa07 Fix deadlock in 'go test -tags cluster_proxy -v ./integration/... ./clientv3/...' Cherry pick https://github.com/etcd-io/etcd/pull/12319 to 3.4. Signed-off-by: Benjamin Wang <wachao@vmware.com> 28 June 2022, 05:44:47 UTC
4e88cce Merge pull request #14168 from lavacat/release-3.4-TestGetToken [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth 27 June 2022, 20:35:17 UTC
2d99b34 [backport 3.4] clientv3/integration: Reduce flakines of TestGetTokenWithoutAuth backport from branch-3.5: https://github.com/etcd-io/etcd/pull/12200/ Signed-off-by: Bogdan Kanivets <bkanivets@apple.com> 27 June 2022, 18:31:16 UTC
17fc680 Merge pull request #14150 from ahrtr/lease_revoke_race_3.4 [3.4] Backport two lease related bug fixes to 3.4 24 June 2022, 09:27:09 UTC
f036529 Backport two lease related bug fixes to 3.4 The first bug fix is to resolve the race condition between goroutine and channel on the same leases to be revoked. It's a classic mistake in using Golang channel + goroutine. Please refer to https://go.dev/doc/effective_go#channels The second bug fix is to resolve the issue that etcd lessor may continue to schedule checkpoint after stepping down the leader role. Signed-off-by: Benjamin Wang <wachao@vmware.com> 24 June 2022, 01:09:40 UTC
953376e Merge pull request #14136 from ahrtr/3.4_pipeline_issues [3.4] Fix all the pipeline failues for release 3.4 22 June 2022, 20:54:42 UTC
1abf085 fix all the pipeline failues for release 3.4 Items resolved: 1. fix the vet error: possible misuse of reflect.SliceHeader; 2. fix the vet error: call to (*T).Fatal from a non-test goroutine; 3. bump package golang.org/x/crypto, net and sys; 4. bump boltdb from 1.3.3 to 1.3.6; 5. remove the vendor directory; 6. remove go 1.12.17 and 1.15.15, add go 1.16.15 into pipeline; 7. bump go version to 1.16 in go.mod; 8. fix the issue: compile: version go1.16.15 does not match go tool version go1.17.11, refer to https://github.com/actions/setup-go/issues/107; 9. fix data race on compactMainRev and watcherGauge; 10. fix test failure for TestLeasingTxnOwnerGet in cluster_proxy mode. Signed-off-by: Benjamin Wang <wachao@vmware.com> 21 June 2022, 21:28:45 UTC
c2c9e7d Merge pull request #14075 from lavacat/release-3.4-go1.15.15-tests tests: fixing dependencies that brake tests in go.1.15.15 30 May 2022, 21:52:21 UTC
ceed023 tests: fixing dependencies that brake tests in go.1.15.15 - retry_interceptor_test causes: clientv3/naming/grpc.go:25:2: module google.golang.org/grpc@latest found (v1.46.0), but does not contain package google.golang.org/grpc/naming https://github.com/etcd-io/etcd/issues/12124 30 May 2022, 19:08:47 UTC
5505d7a Merge pull request #13206 from cfz/cherry-pick-#13172-r34 [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth 06 May 2022, 22:59:33 UTC
76147c9 Merge pull request #13999 from mitake/backport-13308-to-3.4 Backport PR 13308 to release 3.4 06 May 2022, 11:03:05 UTC
23e79db [backport 3.4]: server/auth: enable tokenProvider if recoved store enables auth this is a manual backport of #13172 06 May 2022, 04:26:55 UTC
757a8e8 *: implement a retry logic for auth old revision in the client 29 April 2022, 14:46:24 UTC
9bbdeb4 client/v3: refresh the token when ErrUserEmpty is received while retrying To fix a bug in the retry logic caused when the auth token is cleared after receiving `ErrInvalidAuthToken` from the server and the subsequent call to `getToken` also fails due to some reason (eg. context deadline exceeded). This leaves the client without a token and the retry will continue to fail with `ErrUserEmpty` unless the token is refreshed. 29 April 2022, 14:43:36 UTC
c50b726 Merge pull request #13713 from lavacat/defrag-bopts-fix-3.4 mvcc/backend: restore original bolt db options after defrag 18 February 2022, 09:54:21 UTC
d30a4fb mvcc/backend: restore original bolt db options after defrag Problem: Defrag was implemented before custom bolt options were added. Currently defrag doesn't restore backend options. For example BackendFreelistType will be unset after defrag. Solution: save bolt db options and use them in defrag. 17 February 2022, 23:33:05 UTC
a905430 embed: only log stream error with debug level (#13656) Co-authored-by: tangcong <tangcong506@gmail.com> 30 January 2022, 20:24:22 UTC
161bf7e Merge pull request #13475 from chaochn47/backport-release-3.4 backport 3.4 from #13467 exclude the same alarm type activated by multiple peers 14 November 2021, 03:10:38 UTC
04d47a9 backport from #13467 exclude the same alarm type activated by multiple peers 12 November 2021, 22:17:14 UTC
72d3e38 version: 3.4.18 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 15 October 2021, 13:47:08 UTC
eb9cee9 Merge pull request #13397 from geetasg/release-3.4 storage/backend: Add a gauge to indicate if defrag is active (backport) 07 October 2021, 17:08:31 UTC
85abf6e storage/backend: Add a gauge to indicate if defrag is active (backport from 3.6) 06 October 2021, 18:04:47 UTC
1eac258 Merge pull request #13385 from hexfusion/cp-13376-release-3.4 [release-3.4] Dockerfile: bump debian bullseye-20210927 04 October 2021, 06:40:32 UTC
91da298 Dockerfile: bump debian bullseye-20210927 fixes: CVE-2021-3711, CVE-2021-35942, CVE-2019-9893 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 04 October 2021, 04:32:23 UTC
19e2e70 version: 3.4.17 Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 04 October 2021, 02:30:27 UTC
8ea187e Merge pull request #13378 from ysksuzuki/replace-jwt-go Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt 04 October 2021, 01:48:32 UTC
e63d058 test: update go to 1.15.15 Update go to 1.15.15 which is the latest of 1.15 because linux-amd64-fmt fails with go 1.15.13. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> 02 October 2021, 01:04:22 UTC
1558ede go.mod,go.sum: Replace github.com/dgrijalva/jwt-go with github.com/golang-jwt/jwt github.com/dgrijalva/jwt-go has CVE https://github.com/advisories/GHSA-w73w-5m7g-f7qc and is already archived. etcd v3.4 should use a community maintained fork github.com/golang-jwt/jwt which provides the fixed version of the CVE. Signed-off-by: Yusuke Suzuki <yusuke-suzuki@cybozu.co.jp> 02 October 2021, 01:01:52 UTC
41061e5 Merge pull request #13139 from hexfusion/bp-12727 [release-3.4]: ClientV3: Ordering: Fix TestEndpointSwitchResolvesViolation test 24 June 2021, 14:38:10 UTC
501d8f0 [release-3.4]: ClientV3: Ordering: Fix TestEndpointSwitchResolvesViolation test Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 24 June 2021, 01:26:55 UTC
38669a0 Merge pull request #13137 from hexfusion/track-modules vendor: track vendor/modules.txt 23 June 2021, 18:52:10 UTC
7489911 Merge pull request #13135 from serathius/actions-3.4 Migrate PR testing from travis to GitHub actions 23 June 2021, 18:03:37 UTC
15b7954 vendor: track vendor/modules.txt Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 23 June 2021, 17:56:39 UTC
6cc1345 Migrate PR testing from travis to GitHub actions 23 June 2021, 16:25:29 UTC
589a699 Merge pull request #13101 from mrueg/backport-12864 [backport 3.4] fix check datascale command for https endpoints 14 June 2021, 12:19:22 UTC
4bacd21 fix check datascale command for https endpoints 11 June 2021, 09:58:20 UTC
0ecc337 Merge pull request #13100 from tangcong/automated-cherry-pick-of-#13077-origin-release-3.4 [backport 3.4] embed: unlimit the recv msg size of grpc-gateway 11 June 2021, 01:29:34 UTC
628fa18 embed: unlimit the recv msg size of grpc-gateway Ensure the client which access etcd via grpc-gateway won't be limited by the MaxCallRecvMsgSize. Here we choose the same default value of etcdcli as grpc-gateway's MaxCallRecvMsgSize. Fix https://github.com/etcd-io/etcd/issues/12576 11 June 2021, 00:07:28 UTC
d19fbe5 version: 3.4.16 Signed-off-by: Gyuho Lee <leegyuho@amazon.com> 12 May 2021, 01:52:43 UTC
6bbc858 Merge pull request #12917 from chaochn47/2021-05-03-backport-#12880 Backport-3.4 exclude alarms from health check conditionally 06 May 2021, 08:21:09 UTC
dbde4f2 Backport-3.4 exclude alarms from health check conditionally 04 May 2021, 17:37:12 UTC
15715dc Merge pull request #12902 from MakDon/release-3.4 [Backport-3.4] etcdserver/mvcc: update trace.Step condition 28 April 2021, 18:05:35 UTC
963d3b9 etcdserver/mvcc: update trace.Step condition backport PR #12894 to release-3.4 28 April 2021, 03:35:49 UTC
ba82904 Merge pull request #12888 from chaochn47/2021-04-22-cherry-pick-12871 Backport-3.4 etcdserver/util.go: reduce memory when logging range requests 22 April 2021, 22:45:20 UTC
c4eb81a Backport-3.4 etcdserver/util.go: reduce memory when logging range requests 22 April 2021, 22:07:44 UTC
ceafa1b Merge pull request #12882 from lilic/bump-go-12 .travis,Makefile,functional: Bump go 1.12 version to v1.12.17 20 April 2021, 21:33:23 UTC
5890bc8 .travis,Makefile,functional: Bump go 1.12 version to v1.12.17 This version was already used to build the release v3.4.15. 20 April 2021, 12:00:44 UTC
c274aa5 Merge pull request #12849 from lilic/test-go-1-15 [release-3.4]: .travis.yml: Test with go v1.15.11 19 April 2021, 16:17:05 UTC
276ee96 integration: Fix 'go test --tags cluster_proxy --timeout=30m -v ./integration/...' grpc proxy opens additional 2 watching channels. The metric is shared between etcd-server & grpc_proxy, so all assertions on number of open watch channels need to take in consideration the additional "2" channels. 19 April 2021, 14:41:28 UTC
8d1b833 pkg/tlsutil: Adjust cipher suites for go 1.12 Cherry-pick of 60e44286fa3c0c0 from master branch does not work due to missing `tls.CipherSuites()` function. We work around by using go build tags for both the building and tests. 19 April 2021, 09:49:13 UTC
c3f447a Fix pkg/tlsutil (test) to not fail on 386. In fact this commit rewrites the functionality to use upstream list of ciphers instead of checking whether the lists are in sync using ast analysis. 19 April 2021, 09:49:13 UTC
85e037d bill-of-materials.json: Update golang.org/x/sys 19 April 2021, 09:49:13 UTC
a1691be .travis,test: Turn race off in Travis for go version 1.15 Currently with race it fails, we can enable this at a later point. 19 April 2021, 09:49:13 UTC
df35086 integration : fix TestTLSClientCipherSuitesMismatch in go1.13 In go1.13, the TLS13 is enablled by default, and as per go1.13 release notes : TLS 1.3 cipher suites are not configurable. All supported cipher suites are safe, and if PreferServerCipherSuites is set in Config the preference order is based on the available hardware. Fixing the test case for go1.13 by limiting the TLS version to TLS12 19 April 2021, 09:18:14 UTC
eeefd61 vendor: Run go mod vendor 19 April 2021, 09:18:14 UTC
4276c33 go.mod,go.sum: Bump github.com/creack/pty that includes patch This patch is needed due to go 1.15 erroring on: "Setctty set but Ctty not valid in child". 19 April 2021, 09:18:13 UTC
cfc08e5 go.mod,go.sum: Comply with go v1.15 19 April 2021, 09:18:13 UTC
0b7e418 etcdserver,wal: Convert int to string using rune() 19 April 2021, 09:18:13 UTC
35bd924 integration,raft,tests: Comply with go v1.15 gofmt 19 April 2021, 09:18:13 UTC
62596fa .travis.yml: Test with go v1.15.11 Currently in CI the tests are only run with go v1.12, this adds also go v1.15.11. Excludes certain variants for v1.15. 19 April 2021, 09:18:13 UTC
b7e5f5b Merge pull request #12839 from lilic/fix-go-version [release-3.4]: Pin go version in go.mod to 1.12 07 April 2021, 15:52:05 UTC
91bed2e pkpkg/testutil/leak.go: Allowlist created by testing.runTests.func1 07 April 2021, 15:20:52 UTC
b19eb0f vendor: Run go mod vendor 07 April 2021, 13:25:32 UTC
8557cb2 go.sum, go.mod: Run go mod tidy with go 1.12 07 April 2021, 13:25:08 UTC
ef415e3 go.mod: Pin go to 1.12 version As go 1.12.2 is what is tested in CI as well as recommended to be built with 1.12.2 we should also pin to this in the go directive version. 07 April 2021, 13:21:42 UTC
82eae92 Merge pull request #12803 from cwedgwood/metrics-3.4 etcdserver: fix incorrect metrics generated when clients cancel watches 01 April 2021, 12:17:37 UTC
656dc63 etcdserver: fix incorrect metrics generated when clients cancel watches Manual cherry-pick of 9571325fe85173a60c89d6ac6ce3491c7b1ec7a4 for release-3.4. 01 April 2021, 05:59:29 UTC
30799c9 Merge pull request #12815 from dbavatar/release-3.4-peervalidation etcdserver: Fix PeerURL validation 30 March 2021, 10:54:32 UTC
16fe9a8 Merge pull request #12816 from cwedgwood/3.4-relax-gate-timeout integration: relax leader timeout from 3s to 4s 30 March 2021, 10:53:27 UTC
c499d9b integration: relax leader timeout from 3s to 4s The integration jobs fail with timeouts slightly over 3s, increase this marginally so false failures are less prevalent. 29 March 2021, 17:17:44 UTC
2702f9e Merge pull request #12751 from cwedgwood/nofsyncdowrite When using --unsafe-no-fsync still write out the data 07 March 2021, 10:52:33 UTC
94634fc etcdserver: when using --unsafe-no-fsync write data There are situations where we don't wish to fsync but we do want to write the data. Typically this occurs in clusters where fsync latency (often the result of firmware) transiently spikes. For Kubernetes clusters this causes (many) elections which have knock-on effects such that the API server will transiently fail causing other components fail in turn. By writing the data (buffered and asynchronously flushed, so in most situations the write is fast) and avoiding the fsync we no longer trigger this situation and opportunistically write out the data. Anecdotally: Because the fsync is missing there is the argument that certain types of failure events will cause data corruption or loss, in testing this wasn't seen. If this was to occur the expectation is the member can be readded to a cluster or worst-case restored from a robust persisted snapshot. The etcd members are deployed across isolated racks with different power feeds. An instantaneous failure of all of them simultaneously is unlikely. Testing was usually of the form: * create (Kubernetes) etcd write-churn by creating replicasets of some 1000s of pods * break/fail the leader Failure testing included: * hard node power-off events * disk removal * orderly reboots/shutdown In all cases when the node recovered it was able to rejoin the cluster and synchronize. 05 March 2021, 18:09:52 UTC
afd6d8a Merge pull request #12740 from hexfusion/cp-12448--release-3.4 Manual cherry pick of #12448 on release 3.4 03 March 2021, 18:37:20 UTC
9aeabe4 server: Added config parameter experimental-warning-apply-duration Signed-off-by: Sam Batschelet <sbatsche@redhat.com> 03 March 2021, 17:14:30 UTC
aa71268 version: 3.4.15 Signed-off-by: Gyuho Lee <leegyuho@amazon.com> 26 February 2021, 22:08:24 UTC
3be9460 Merge pull request #12679 from chaochn47/backport_3.4_#12677 [Backport-3.4] etcdserver/api/etcdhttp: log successful etcd server side health check in debug level 09 February 2021, 23:01:19 UTC
f27ef4d [Backport-3.4] etcdserver/api/etcdhttp: log successful etcd server side health check in debug level ref. #12677 ref. https://github.com/etcd-io/etcd/commit/0b9cfa86772fa1ca9f4fc0a402ac6c73ffb599a0 09 February 2021, 05:44:44 UTC
a1c5f59 Merge pull request #12402 from vitalif/release-3.4 etcdserver: Fix 64 KB websocket notification message limit 03 February 2021, 08:19:21 UTC
a40f14d etcdserver: Fix 64 KB websocket notification message limit This fixes etcd being unable to send any message longer than 64 KB as a notification over the websocket. This was because the older version of grpc-websocket-proxy was used and WithMaxRespBodyBufferSize option wasn't set. 29 January 2021, 21:37:02 UTC
back to top