Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-947: Rebase openshift/etcd 4.11 onto 3.5.5 #154

Closed
wants to merge 1,203 commits into from
This pull request is big! We’re only showing the most recent 250 commits.

Commits on Jul 28, 2021

  1. UPSTREAM: <carry>: Remove explicit authStore->ConsistencyIndex update…

    …s, as they are taken care by hook.
    
    missing after 3.5.0 merge
    ptabor authored and hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    eb2814a View commit details
    Browse the repository at this point in the history
  2. UPSTREAM: <carry>: Represent bucket as object instead of []byte name.

    missing after merge of v3.5.0 tag
    
    Thanks to this change:
      - all the maps bucket -> buffer are indexed by int's instead of
    string. No need to do: byte[] -> string -> hash conversion on each
    access.
      - buckets are strongly typed in backend/mvcc API.
    ptabor authored and hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    f1f3e6b View commit details
    Browse the repository at this point in the history
  3. UPSTREAM: <carry>: etcdserver: don't attempt to grant nil permission …

    …to a role
    
    Missing after v3.5.0 tag merge
    
    Prevent etcd from crashing when given a bad grant payload, e.g.:
    
    $ curl -d '{"name": "foo"}' http://localhost:2379/v3/auth/role/add
    {"header":{"cluster_id":"14841639068965178418", ...
    $ curl -d '{"name": "foo"}' http://localhost:2379/v3/auth/role/grant
    curl: (52) Empty reply from server
    
    Signed-off-by: Gyuho Lee <leegyuho@amazon.com>
    dlowe authored and hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    01d81ff View commit details
    Browse the repository at this point in the history
  4. UPSTREAM: <carry>: cleanup dangling diff after 3.5 merge

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    9722ae9 View commit details
    Browse the repository at this point in the history
  5. DOWNSTREAM: <carry>: version: openshift-v4.0

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    1d432f8 View commit details
    Browse the repository at this point in the history
  6. DOWNSTREAM: <carry>: Dockerfile: add etcdctl

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    76014a7 View commit details
    Browse the repository at this point in the history
  7. DOWNSTREAM: <carry>: Dockerfile.*: Fix "etcd is distributed" -> "etcd…

    … is a distributed"
    
    Correcting a typo from 2f10964 (version: openshift-v4.0, 2018-11-29).
    wking authored and hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    ea8ff30 View commit details
    Browse the repository at this point in the history
  8. DOWNSTREAM: <carry> Dockerfile: resolve issue where binary was not pr…

    …operly copied from build.
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    1cbb393 View commit details
    Browse the repository at this point in the history
  9. DOWNSTREAM: <carry>: OWNERS: add

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    317c6c7 View commit details
    Browse the repository at this point in the history
  10. DOWNSTREAM: <carry> Dockerfile: set coreos org as canonical for relea…

    …se-3.3
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    d59b577 View commit details
    Browse the repository at this point in the history
  11. DOWNSTREAM: <carry>: Dockerfile: use build instead of make build

    make build performs a sanity test on the binary image which causes problems for unsupport arch. Because we run full CI tests against the image this check is not nessisary and will allow images to be build regardless of arch.
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    9f3e71f View commit details
    Browse the repository at this point in the history
  12. DOWNSTREAM: <carry>: Dockerfile: bump golang 1.12

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    69897d1 View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    5e06516 View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    7851b15 View commit details
    Browse the repository at this point in the history
  15. Configuration menu
    Copy the full SHA
    9a6483f View commit details
    Browse the repository at this point in the history
  16. Configuration menu
    Copy the full SHA
    9fc568e View commit details
    Browse the repository at this point in the history
  17. Configuration menu
    Copy the full SHA
    3cb509f View commit details
    Browse the repository at this point in the history
  18. DOWNSTREAM: <carry>: If we weren't able to get client or get target m…

    …ember but memberDir exists, go ahead and start.
    retroflexer authored and hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    c6d2af6 View commit details
    Browse the repository at this point in the history
  19. Configuration menu
    Copy the full SHA
    dc333e5 View commit details
    Browse the repository at this point in the history
  20. DOWNSTREAM: <carry>: *: migrate openshift assets to new etcd org

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    6d78a3d View commit details
    Browse the repository at this point in the history
  21. Configuration menu
    Copy the full SHA
    75d596b View commit details
    Browse the repository at this point in the history
  22. DOWNSTREAM: <carry>: discover-etcd-initial-cluster: improve error han…

    …dling when we dont scale member
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    bbce548 View commit details
    Browse the repository at this point in the history
  23. Configuration menu
    Copy the full SHA
    87b0828 View commit details
    Browse the repository at this point in the history
  24. Configuration menu
    Copy the full SHA
    947072e View commit details
    Browse the repository at this point in the history
  25. DOWNSTREAM: <carry>: OWNERS: add component

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    aeeab6d View commit details
    Browse the repository at this point in the history
  26. Configuration menu
    Copy the full SHA
    39a87ae View commit details
    Browse the repository at this point in the history
  27. DOWNSTREAM: <carry>: openshift-tools: fix on off flow and add unit tests

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    5042ee5 View commit details
    Browse the repository at this point in the history
  28. DOWNSTREAM: <carry>: discover-etcd-initial-cluster: retry if member i…

    …s not part of member list and dataDir exists
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    b1b1ca0 View commit details
    Browse the repository at this point in the history
  29. Configuration menu
    Copy the full SHA
    1c88280 View commit details
    Browse the repository at this point in the history
  30. Configuration menu
    Copy the full SHA
    6c62e00 View commit details
    Browse the repository at this point in the history
  31. DOWNSTREAM: <carry>: build v3/discover-etcd-initial-cluster

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 28, 2021
    Configuration menu
    Copy the full SHA
    33b3996 View commit details
    Browse the repository at this point in the history

Commits on Jul 29, 2021

  1. UPSTREAM: <drop>: pkg, clientv3, etcdmain: let grpcproxy rise an erro…

    …r when its cert has non empty CN
    
    CARRY:
    
    This patch is required to allow metrics cert to auth with CN in cert.
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 29, 2021
    Configuration menu
    Copy the full SHA
    d465f2a View commit details
    Browse the repository at this point in the history
  2. UPSTREAM: <drop>: *: make MemberList linearizable

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Jul 29, 2021
    Configuration menu
    Copy the full SHA
    45d62a2 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    dfd2fea View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    627d91c View commit details
    Browse the repository at this point in the history

Commits on Aug 1, 2021

  1. DOWNSTREAM: <carry>: discover-etcd-initial-cluster: replace integrati…

    …on tests with unit
    
    etcd 3.5 will not allow integration tests to run outside of test/integration. This change breaks out the logic into a more testable path allowing coverage and not requiring breaking out discover-etcd-initial-cluster into a seperate module yet.
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Aug 1, 2021
    Configuration menu
    Copy the full SHA
    b37890a View commit details
    Browse the repository at this point in the history

Commits on Aug 2, 2021

  1. Merge pull request etcd-io#91 from hexfusion/etcd-rebase-v3.5.0

    ETCD-202: bump etcd v3.5.0
    openshift-ci[bot] committed Aug 2, 2021
    Configuration menu
    Copy the full SHA
    a2075eb View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2021

  1. Configuration menu
    Copy the full SHA
    4495b2a View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2021

  1. Merge pull request etcd-io#13257 from tangcong/automated-cherry-pick-…

    …of-#13145-etcd-io#13237-origin-release-3.5
    
    [backport 3.5]: Automated cherry pick of etcd-io#13145 etcd-io#13237
    hexfusion committed Aug 6, 2021
    Configuration menu
    Copy the full SHA
    2fe94b1 View commit details
    Browse the repository at this point in the history

Commits on Aug 7, 2021

  1. Merge pull request etcd-io#92 from openshift-bot/art-consistency-open…

    …shift-4.9-ose-etcd
    
    ETCD-203: Updating ose-etcd images to be consistent with ART
    openshift-ci[bot] committed Aug 7, 2021
    Configuration menu
    Copy the full SHA
    1cf1af9 View commit details
    Browse the repository at this point in the history

Commits on Aug 11, 2021

  1. DOWNSTREAM: <carry>: Dockerfile: set GO_BUILD_FLAGS readonly

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Aug 11, 2021
    Configuration menu
    Copy the full SHA
    347b463 View commit details
    Browse the repository at this point in the history
  2. UPSTREAM: <carry>: scripts/test_lib.sh: skip go get if readonly

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Aug 11, 2021
    Configuration menu
    Copy the full SHA
    bc92c91 View commit details
    Browse the repository at this point in the history
  3. DOWNSTREAM: <carry>: rename unused Dockerfile.openshift to Dockerfile…

    ….art and update for cachito
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Aug 11, 2021
    Configuration menu
    Copy the full SHA
    a488d20 View commit details
    Browse the repository at this point in the history
  4. Merge pull request etcd-io#93 from hexfusion/fix_build

    Bug 1992673: Fix build
    hexfusion committed Aug 11, 2021
    Configuration menu
    Copy the full SHA
    fddc496 View commit details
    Browse the repository at this point in the history

Commits on Aug 18, 2021

  1. UPSTREAM: <carry>: etcdctl/ctlv3/ctl.go: Remove check command

    This is often used by both support and end users, which causes
    etcd to get load sometimes in live production env.
    lilic committed Aug 18, 2021
    Configuration menu
    Copy the full SHA
    12558f4 View commit details
    Browse the repository at this point in the history

Commits on Aug 24, 2021

  1. Merge pull request etcd-io#94 from lilic/remove-perf-cli

    Bug 1994986: (CARRY) etcdctl/ctlv3/ctl.go: Remove check perf command
    openshift-merge-robot committed Aug 24, 2021
    Configuration menu
    Copy the full SHA
    5c1feaf View commit details
    Browse the repository at this point in the history

Commits on Sep 15, 2021

  1. Configuration menu
    Copy the full SHA
    921f78d View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13349 from serathius/tip-3.5

    Stop using tip golang version in CI
    hexfusion committed Sep 15, 2021
    Configuration menu
    Copy the full SHA
    d7eeda0 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    e68c7ab View commit details
    Browse the repository at this point in the history

Commits on Sep 16, 2021

  1. Configuration menu
    Copy the full SHA
    9a60aea View commit details
    Browse the repository at this point in the history

Commits on Sep 25, 2021

  1. Merge pull request etcd-io#13348 from serathius/sync

    Fix for v3.5 Ensure that cluster members stored in v2store and backend are in sync
    ptabor committed Sep 25, 2021
    Configuration menu
    Copy the full SHA
    4312298 View commit details
    Browse the repository at this point in the history

Commits on Sep 30, 2021

  1. Merge pull request etcd-io#95 from openshift-bot/art-consistency-open…

    …shift-4.10-ose-etcd
    
    Updating ose-etcd images to be consistent with ART
    openshift-merge-robot committed Sep 30, 2021
    Configuration menu
    Copy the full SHA
    aa069e9 View commit details
    Browse the repository at this point in the history
  2. Decouple prefixArgs from os.Env dependency

    prefixArgs uses os.Setenv in e2e tests instead envMap.
    This creates overwrites in some test cases and have an impact
    on test quality and isolation between tests.
    This PR uses ctlcontext envMap in each tests with high priority
    and merges os environment variables with low priority.
    ardaguclu authored and serathius committed Sep 30, 2021
    Configuration menu
    Copy the full SHA
    6e2fe84 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    c1f48d8 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    994bd08 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f324894 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    0bac49b View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    7272a95 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    6e04e8a View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    58d2b12 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    7f25a50 View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    79f9a45 View commit details
    Browse the repository at this point in the history
  12. Merge pull request etcd-io#13375 from serathius/authority-3.5

    Cherry pick "Fix http2 authority header in single endpoint scenario" to release-3.5
    ptabor committed Sep 30, 2021
    Configuration menu
    Copy the full SHA
    edb3b5a View commit details
    Browse the repository at this point in the history

Commits on Oct 1, 2021

  1. Dockerfile: bump debian bullseye-20210927

    fixes: CVE-2021-3711, CVE-2021-35942, CVE-2019-9893
    
    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Oct 1, 2021
    Configuration menu
    Copy the full SHA
    bad9a52 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13380 from hexfusion/cp-13376

    [release-3.5] Dockerfile: bump debian bullseye-20210927
    hexfusion committed Oct 1, 2021
    Configuration menu
    Copy the full SHA
    ec56229 View commit details
    Browse the repository at this point in the history

Commits on Oct 3, 2021

  1. version: 3.5.1

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Oct 3, 2021
    Configuration menu
    Copy the full SHA
    d42e858 View commit details
    Browse the repository at this point in the history

Commits on Oct 6, 2021

  1. storage/backend: Add a gauge to indicate if defrag is active (backpor…

    …t from 3.6)
    Geeta Gharpure committed Oct 6, 2021
    Configuration menu
    Copy the full SHA
    446f7d6 View commit details
    Browse the repository at this point in the history

Commits on Oct 7, 2021

  1. Merge pull request etcd-io#13395 from geetasg/release-3.5

    storage/backend: Add a gauge to indicate if defrag is active (backport)
    ptabor committed Oct 7, 2021
    Configuration menu
    Copy the full SHA
    e8732fb View commit details
    Browse the repository at this point in the history

Commits on Oct 8, 2021

  1. UPSTREAM: <carry>: storage/backend: Add a gauge to indicate if defrag…

    … is active
    Geeta Gharpure authored and hexfusion committed Oct 8, 2021
    Configuration menu
    Copy the full SHA
    f6bdbad View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2021

  1. Merge pull request etcd-io#97 from hexfusion/cp-defrag-inflight

    UPSTREAM: <carry>: storage/backend: Add a gauge to indicate if defrag is active
    openshift-merge-robot committed Oct 12, 2021
    Configuration menu
    Copy the full SHA
    177f8e7 View commit details
    Browse the repository at this point in the history

Commits on Oct 15, 2021

  1. UPSTREAM: <carry>: server: Fix for v3.5 Ensure that cluster members s…

    …tored in v2store and backend are in sync
    
    (cherry picked from commit e68c7ab)
    serathius authored and hasbro17 committed Oct 15, 2021
    Configuration menu
    Copy the full SHA
    274e75a View commit details
    Browse the repository at this point in the history

Commits on Oct 20, 2021

  1. Merge pull request etcd-io#98 from hasbro17/openshift/release-4.10/v2…

    …-store-member-sync
    
    Bug 2003775: UPSTREAM: <carry>: server: Fix for v3.5 Ensure that cluster members stored in v2store and backend are in sync
    openshift-merge-robot committed Oct 20, 2021
    Configuration menu
    Copy the full SHA
    383d146 View commit details
    Browse the repository at this point in the history

Commits on Nov 12, 2021

  1. Configuration menu
    Copy the full SHA
    7d44a7c View commit details
    Browse the repository at this point in the history

Commits on Nov 14, 2021

  1. Merge pull request etcd-io#13476 from chaochn47/backport-release-3.5

    cherry-pick to 3.5 from etcd-io#13467 exclude the same alarm type activated by multiple peers
    hexfusion committed Nov 14, 2021
    Configuration menu
    Copy the full SHA
    77d760b View commit details
    Browse the repository at this point in the history
  2. client/v3: refresh the token when ErrUserEmpty is received while retr…

    …ying
    
    To fix a bug in the retry logic caused when the auth token is cleared after receiving `ErrInvalidAuthToken` from the server and the subsequent call to `getToken` also fails due to some reason (eg. context deadline exceeded).
    This leaves the client without a token and the retry will continue to fail with `ErrUserEmpty` unless the token is refreshed.
    r-ashish authored and mitake committed Nov 14, 2021
    Configuration menu
    Copy the full SHA
    79bbc8f View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    dec6f72 View commit details
    Browse the repository at this point in the history

Commits on Nov 15, 2021

  1. DOWNSTREAM: <carry>: OWNERS: clean up

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Nov 15, 2021
    Configuration menu
    Copy the full SHA
    b721abc View commit details
    Browse the repository at this point in the history
  2. UPSTREAM: <carry>: add --experimental-max-learner flag

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Nov 15, 2021
    Configuration menu
    Copy the full SHA
    9084475 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    0c6d6bd View commit details
    Browse the repository at this point in the history

Commits on Nov 16, 2021

  1. Merge pull request etcd-io#102 from hexfusion/cp-13377-openshift-4.10

    UPSTREAM: <carry>: add --experimental-max-learner flag
    openshift-merge-robot committed Nov 16, 2021
    Configuration menu
    Copy the full SHA
    b47bd62 View commit details
    Browse the repository at this point in the history

Commits on Nov 21, 2021

  1. Merge pull request etcd-io#13477 from mitake/backport-13308-to-3.5

    Backport PR 13308 to release-3.5
    hexfusion committed Nov 21, 2021
    Configuration menu
    Copy the full SHA
    eac7f98 View commit details
    Browse the repository at this point in the history

Commits on Nov 24, 2021

  1. Configuration menu
    Copy the full SHA
    8c81598 View commit details
    Browse the repository at this point in the history

Commits on Dec 2, 2021

  1. lease,integration: add checkpoint scheduling after leader change

    Current checkpointing mechanism is buggy. New checkpoints for any lease
    are scheduled only until the first leader change. Added fix for that
    and a test that will check it.
    michaljasionowski authored and serathius committed Dec 2, 2021
    Configuration menu
    Copy the full SHA
    21634a9 View commit details
    Browse the repository at this point in the history
  2. etcdserver,integration: Store remaining TTL on checkpoint

    To extend lease checkpointing mechanism to cases when the whole etcd
    cluster is restarted.
    michaljasionowski authored and serathius committed Dec 2, 2021
    Configuration menu
    Copy the full SHA
    eddfb42 View commit details
    Browse the repository at this point in the history
  3. server: Require either cluster version v3.6 or --experimental-enable-…

    …lease-checkpoint-persist to persist lease remainingTTL
    
    To avoid inconsistant behavior during cluster upgrade we are feature
    gating persistance behind cluster version. This should ensure that
    all cluster members are upgraded to v3.6 before changing behavior.
    
    To allow backporting this fix to v3.5 we are also introducing flag
    --experimental-enable-lease-checkpoint-persist that will allow for
    smooth upgrade in v3.5 clusters with this feature enabled.
    serathius committed Dec 2, 2021
    Configuration menu
    Copy the full SHA
    d00e89d View commit details
    Browse the repository at this point in the history

Commits on Dec 3, 2021

  1. Merge pull request etcd-io#13515 from serathius/checkpoints-fix-3.5

    Backport Lease Checkpoints fix to release-3.5
    ptabor committed Dec 3, 2021
    Configuration menu
    Copy the full SHA
    e84c611 View commit details
    Browse the repository at this point in the history

Commits on Dec 6, 2021

  1. Merge pull request etcd-io#13501 from ahrtr/reset_ci_after_reload_db_3.5

    [3.5] Set the backend again after recovering v3 backend from snapshot
    ptabor committed Dec 6, 2021
    Configuration menu
    Copy the full SHA
    73080a7 View commit details
    Browse the repository at this point in the history

Commits on Dec 16, 2021

  1. fix runlock bug

    leoyang.yl authored and michaljasionowski committed Dec 16, 2021
    Configuration menu
    Copy the full SHA
    55c16df View commit details
    Browse the repository at this point in the history

Commits on Dec 17, 2021

  1. DOWNSTREAM: <carry>: OWNERS: bump

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion committed Dec 17, 2021
    Configuration menu
    Copy the full SHA
    be3535b View commit details
    Browse the repository at this point in the history

Commits on Dec 18, 2021

  1. Configuration menu
    Copy the full SHA
    7bbf25a View commit details
    Browse the repository at this point in the history

Commits on Dec 21, 2021

  1. Merge pull request etcd-io#13541 from michaljasionowski/backport-runl…

    …ock-fix
    
    Backport watchablestore runlock bug fix to release-3.5
    ptabor committed Dec 21, 2021
    Configuration menu
    Copy the full SHA
    7291ed3 View commit details
    Browse the repository at this point in the history

Commits on Jan 17, 2022

  1. Configuration menu
    Copy the full SHA
    74f33d6 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13616 from ptabor/20220117-update-yaml

    Update dep: gopkg.in/yaml.v2 v2.2.8 -> v2.4.0 due to: CVE-2019-11254 [release 3.5]
    ptabor committed Jan 17, 2022
    Configuration menu
    Copy the full SHA
    a624446 View commit details
    Browse the repository at this point in the history

Commits on Feb 1, 2022

  1. version: bump up to 3.5.2

    serathius committed Feb 1, 2022
    Configuration menu
    Copy the full SHA
    99018a7 View commit details
    Browse the repository at this point in the history

Commits on Feb 7, 2022

  1. etcdserver: upgrade the golang.org/x/crypto dependency

    To rectify the vulnerability found in a version of golang.org/x/crypto
    (https://avd.aquasec.com/nvd/cve-2020-29652), upgrade the dependency to
    its latest version.
    Alternatively, version v0.0.0-20201216223049-8b5274cf687f could be used,
    where the fixed was introduced, but the latest is preferable.
    maxsokolovsky committed Feb 7, 2022
    Configuration menu
    Copy the full SHA
    f4708ae View commit details
    Browse the repository at this point in the history

Commits on Feb 15, 2022

  1. server/storage/backend: restore original bolt db options after defrag

    Problem: Defrag was implemented before custom bolt options were added.
    Currently defrag doesn't restore backend options.
    For example BackendFreelistType will be unset after defrag.
    
    Solution: save bolt db options and use them in defrag.
    Bogdan Kanivets committed Feb 15, 2022
    Configuration menu
    Copy the full SHA
    631fa6f View commit details
    Browse the repository at this point in the history

Commits on Feb 17, 2022

  1. Configuration menu
    Copy the full SHA
    7db1051 View commit details
    Browse the repository at this point in the history

Commits on Feb 18, 2022

  1. Configuration menu
    Copy the full SHA
    4f51cc1 View commit details
    Browse the repository at this point in the history

Commits on Feb 20, 2022

  1. Merge pull request etcd-io#13714 from ahrtr/3.5_correct_dns_etcd_client

    [3.5] Trim the suffix dot from the srv.Target for etcd-client DNS lookup
    serathius committed Feb 20, 2022
    Configuration menu
    Copy the full SHA
    31c8e3c View commit details
    Browse the repository at this point in the history

Commits on Feb 21, 2022

  1. Merge pull request etcd-io#13706 from ahrtr/3.5-serializable_health_c…

    …heck
    
    [3.5] enhance health check endpoint to support serializable request
    serathius committed Feb 21, 2022
    Configuration menu
    Copy the full SHA
    fa191c6 View commit details
    Browse the repository at this point in the history

Commits on Feb 22, 2022

  1. Configuration menu
    Copy the full SHA
    7345d42 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    f634b44 View commit details
    Browse the repository at this point in the history

Commits on Feb 24, 2022

  1. *: fix IsOptsWithFromKey

    porting back from 3.5 from main
    PR etcd-io#13334
    leoyang.yl authored and Vivek Patani committed Feb 24, 2022
    Configuration menu
    Copy the full SHA
    7cec92a View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13736 from vivekpatani/release-3.5

    *: fix IsOptsWithFromKey
    ptabor committed Feb 24, 2022
    Configuration menu
    Copy the full SHA
    1eb8b6a View commit details
    Browse the repository at this point in the history

Commits on Feb 25, 2022

  1. Merge pull request etcd-io#13727 from ahrtr/3.5_print_raft_term_in_de…

    …cimal
    
    [3.5] Always print raft term in decimal when displaying member list in json
    ptabor committed Feb 25, 2022
    Configuration menu
    Copy the full SHA
    3c2ef71 View commit details
    Browse the repository at this point in the history

Commits on Mar 8, 2022

  1. Merge pull request etcd-io#13701 from lavacat/defrag-bopts-fix-3.5

    server/storage/backend: restore original bolt db options after defrag
    serathius committed Mar 8, 2022
    Configuration menu
    Copy the full SHA
    541635e View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13726 from chaochn47/backport_13676_to_3_5

    backport 3.5: etcd-io#13676 load all leases from backend
    serathius committed Mar 8, 2022
    Configuration menu
    Copy the full SHA
    39baf36 View commit details
    Browse the repository at this point in the history

Commits on Mar 13, 2022

  1. Fix offline defrag

    kkkkun committed Mar 13, 2022
    Configuration menu
    Copy the full SHA
    58374b8 View commit details
    Browse the repository at this point in the history

Commits on Mar 17, 2022

  1. Merge pull request etcd-io#13792 from kkkkun/fix-offline-defrag

    Fix offline defrag in etcdctl
    serathius committed Mar 17, 2022
    Configuration menu
    Copy the full SHA
    d516134 View commit details
    Browse the repository at this point in the history

Commits on Mar 21, 2022

  1. Update to go 1.16.15

    mrueg committed Mar 21, 2022
    Configuration menu
    Copy the full SHA
    1801ef8 View commit details
    Browse the repository at this point in the history
  2. Build locally if docker-test container image does not exist

    This should make it easier to bump the golang version
    mrueg committed Mar 21, 2022
    Configuration menu
    Copy the full SHA
    c51c8d2 View commit details
    Browse the repository at this point in the history

Commits on Mar 23, 2022

  1. Merge pull request etcd-io#13832 from mrueg/rel-3.5-go-1.16.15

    [release-3.5] Update go to 1.16.15
    serathius committed Mar 23, 2022
    Configuration menu
    Copy the full SHA
    fed325a View commit details
    Browse the repository at this point in the history

Commits on Mar 30, 2022

  1. Merge tag 'v3.5.2' into contiguous-to-3.5.2

    v3.5.2
    deads2k committed Mar 30, 2022
    Configuration menu
    Copy the full SHA
    54ea664 View commit details
    Browse the repository at this point in the history

Commits on Mar 31, 2022

  1. Makefile: Fix wrong target

    Signed-off-by: Manuel Rüger <manuel@rueg.eu>
    mrueg committed Mar 31, 2022
    Configuration menu
    Copy the full SHA
    462aefd View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13858 from mrueg/release-3.5-fix-make

    [Release-3.5] Makefile: Fix wrong target
    ptabor committed Mar 31, 2022
    Configuration menu
    Copy the full SHA
    12ceac6 View commit details
    Browse the repository at this point in the history

Commits on Apr 1, 2022

  1. Configuration menu
    Copy the full SHA
    25556a0 View commit details
    Browse the repository at this point in the history
  2. server: Use default logging configuration instead of zap production one

    This fixes problem where logs json changes format of timestamp.
    serathius committed Apr 1, 2022
    Configuration menu
    Copy the full SHA
    a060b42 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    aab1592 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2022

  1. Merge pull request etcd-io#13866 from serathius/logs-v3.5

    [release-3.5] Fix inconsistent log format
    serathius committed Apr 4, 2022
    Configuration menu
    Copy the full SHA
    8b9ce3e View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2022

  1. Configuration menu
    Copy the full SHA
    3b8c651 View commit details
    Browse the repository at this point in the history

Commits on Apr 6, 2022

  1. Configuration menu
    Copy the full SHA
    83538f3 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13887 from serathius/verify-v3.5

    [release-v3.5] server: Add verification of whether lock was called within out outsid…
    ptabor committed Apr 6, 2022
    Configuration menu
    Copy the full SHA
    5f19688 View commit details
    Browse the repository at this point in the history

Commits on Apr 7, 2022

  1. Merge pull request etcd-io#13895 from mrueg/rel3.5-client_golang

    [release-3.5] go.mod: Upgrade to prometheus/client_golang v1.11.1
    serathius committed Apr 7, 2022
    Configuration menu
    Copy the full SHA
    238b18c View commit details
    Browse the repository at this point in the history
  2. server: Save consistency index and term to backend even when they dec…

    …rease
    
    Reason to store CI and term in backend was to make db fully independent
    snapshot, it was never meant to interfere with apply logic. Skip of CI
    was introduced for v2->v3 migration where we wanted to prevent it from
    decreasing when replaying wal in
    etcd-io#5391. By mistake it was added to
    apply flow during refactor in
    etcd-io#12855 (comment).
    
    Consistency index and term should only be negotiated and used by raft to make
    decisions. Their values should only driven by raft state machine and
    backend should only be responsible for storing them.
    serathius committed Apr 7, 2022
    Configuration menu
    Copy the full SHA
    780ec33 View commit details
    Browse the repository at this point in the history

Commits on Apr 8, 2022

  1. Merge pull request etcd-io#13904 from serathius/term-v3.5

    [release-3.5] server: Save consistency index and term to backend even when they decrease
    serathius committed Apr 8, 2022
    Configuration menu
    Copy the full SHA
    3ace622 View commit details
    Browse the repository at this point in the history
  2. fix the data inconsistency issue by adding a txPostLockHook into the …

    …backend
    
    Previously the SetConsistentIndex() is called during the apply workflow,
    but it's outside the db transaction. If a commit happens between SetConsistentIndex
    and the following apply workflow, and etcd crashes for whatever reason right
    after the commit, then etcd commits an incomplete transaction to db.
    Eventually etcd runs into the data inconsistency issue.
    
    In this commit, we move the SetConsistentIndex into a txPostLockHook, so
    it will be executed inside the transaction lock.
    ahrtr committed Apr 8, 2022
    Configuration menu
    Copy the full SHA
    66c7aab View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#13908 from ahrtr/data_corruption_3.5

    [3.5] Fix the data inconsistency issue by adding a txPostLockHook into the backend
    serathius committed Apr 8, 2022
    Configuration menu
    Copy the full SHA
    bf22ef3 View commit details
    Browse the repository at this point in the history

Commits on Apr 9, 2022

  1. Merge pull request etcd-io#13669 from maxsokolovsky/upgrade-server-de…

    …pendency-golang.org/x/crypto
    
    etcdserver: upgrade the golang.org/x/crypto dependency
    serathius committed Apr 9, 2022
    Configuration menu
    Copy the full SHA
    383eceb View commit details
    Browse the repository at this point in the history

Commits on Apr 10, 2022

  1. clientv3: filter learners members during autosync

    This change is to ensure that all members returned during the client's
    AutoSync are started and are not learners, which are not valid
    etcd members to make requests to.
    chrisayoub committed Apr 10, 2022
    Configuration menu
    Copy the full SHA
    232fb98 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13917 from chrisayoub/release-3.5

    [release-3.5] clientv3: filter learners members during autosync
    serathius committed Apr 10, 2022
    Configuration menu
    Copy the full SHA
    b9cbff1 View commit details
    Browse the repository at this point in the history

Commits on Apr 12, 2022

  1. support linearizable renew lease

    When etcdserver receives a LeaseRenew request, it may be still in
    progress of processing the LeaseGrantRequest on exact the same
    leaseID. Accordingly it may return a TTL=0 to client due to the
    leaseID not found error. So the leader should wait for the appliedID
    to be available before processing client requests.
    ahrtr committed Apr 12, 2022
    Configuration menu
    Copy the full SHA
    bc5307d View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    4002aa5 View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#13932 from ahrtr/lease_renew_linearizable_3.5

    [3.5] Support linearizable renew lease
    serathius committed Apr 12, 2022
    Configuration menu
    Copy the full SHA
    719082e View commit details
    Browse the repository at this point in the history
  4. Dockerfile-release.*: Update base image snapshot

    Signed-off-by: Manuel Rüger <manuel@rueg.eu>
    mrueg committed Apr 12, 2022
    Configuration menu
    Copy the full SHA
    6095cf8 View commit details
    Browse the repository at this point in the history
  5. Merge pull request etcd-io#13933 from ahrtr/fix_snapshot_recover_cind…

    …ex_3.5
    
    [3.5]Set backend to cindex before recovering the lessor in applySnapshot
    serathius committed Apr 12, 2022
    Configuration menu
    Copy the full SHA
    003a310 View commit details
    Browse the repository at this point in the history
  6. Merge pull request etcd-io#13862 from mrueg/update-baseimage

    [release-3.5] Dockerfile*: Switch baseimage to k8s hosted one
    serathius committed Apr 12, 2022
    Configuration menu
    Copy the full SHA
    cd750e4 View commit details
    Browse the repository at this point in the history

Commits on Apr 13, 2022

  1. cv3/mirror: Fetch the most recent prefix revision

    When a user sets up a Mirror with a restricted user that doesn't have
    access to the `foo` path, we will fail to get the most recent revision
    due to permissions issues.
    
    With this change, when a prefix is provided we will get the initial
    revision from the prefix rather than /foo. This allows restricted users
    to setup sync.
    endocrimes committed Apr 13, 2022
    Configuration menu
    Copy the full SHA
    5d44f22 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    50978d5 View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#13938 from endocrimes/dani/backport

    [backport]  PR 13923 to release-3.5
    serathius committed Apr 13, 2022
    Configuration menu
    Copy the full SHA
    842cb4b View commit details
    Browse the repository at this point in the history
  4. version: bump up to 3.5.3

    serathius committed Apr 13, 2022
    Configuration menu
    Copy the full SHA
    0452fee View commit details
    Browse the repository at this point in the history

Commits on Apr 14, 2022

  1. Merge tag 'v3.5.3' into 3.5.3-with-history

    v3.5.3
    deads2k committed Apr 14, 2022
    Configuration menu
    Copy the full SHA
    a079852 View commit details
    Browse the repository at this point in the history
  2. UPSTREAM: <carry>: add --experimental-max-learner flag

    Signed-off-by: Sam Batschelet <sbatsche@redhat.com>
    hexfusion authored and deads2k committed Apr 14, 2022
    Configuration menu
    Copy the full SHA
    c35caf7 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    9ce6559 View commit details
    Browse the repository at this point in the history

Commits on Apr 15, 2022

  1. Revert "trim the suffix dot from the srv.Target for etcd-client DNS l…

    …ookup"
    
    This reverts commit 4f51cc1.
    liggitt committed Apr 15, 2022
    Configuration menu
    Copy the full SHA
    7656477 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    081b4e2 View commit details
    Browse the repository at this point in the history

Commits on Apr 19, 2022

  1. Configuration menu
    Copy the full SHA
    b872757 View commit details
    Browse the repository at this point in the history

Commits on Apr 20, 2022

  1. Update conssitent_index when applying fails

    When clients have no permission to perform whatever operation, then
    the applying may fail. We should also move consistent_index forward
    in this case, otherwise the consitent_index may smaller than the
    snapshot index.
    ahrtr committed Apr 20, 2022
    Configuration menu
    Copy the full SHA
    5c68f2e View commit details
    Browse the repository at this point in the history

Commits on Apr 21, 2022

  1. Merge pull request etcd-io#13946 from ahrtr/move_cindex_on_apply_fail…

    …_353
    
    [3.5] Update consitent_index when applying fails
    serathius committed Apr 21, 2022
    Configuration menu
    Copy the full SHA
    c3c908e View commit details
    Browse the repository at this point in the history
  2. Revert "UPSTREAM: <drop>: *: make MemberList linearizable"

    This reverts commit 6eceab4.
    deads2k committed Apr 21, 2022
    Configuration menu
    Copy the full SHA
    f18ee95 View commit details
    Browse the repository at this point in the history
  3. UPSTREAM: <carry>: expose a non-linearized MemberList to allow etcd m…

    …embers to start without quorum for recovery scenarios
    deads2k committed Apr 21, 2022
    Configuration menu
    Copy the full SHA
    26d7d84 View commit details
    Browse the repository at this point in the history

Commits on Apr 22, 2022

  1. Merge pull request etcd-io#120 from deads2k/remove-list-patch

    Remove MemberList patch
    openshift-merge-robot committed Apr 22, 2022
    Configuration menu
    Copy the full SHA
    2ea8a99 View commit details
    Browse the repository at this point in the history

Commits on Apr 24, 2022

  1. version: bump up to 3.5.4

    serathius committed Apr 24, 2022
    Configuration menu
    Copy the full SHA
    08407ff View commit details
    Browse the repository at this point in the history

Commits on Apr 28, 2022

  1. Update golang.org/x/crypto to latest

    Update crypto to address CVE-2022-27191.
    
    The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this
    change updates to latest.
    cmurphy committed Apr 28, 2022
    Configuration menu
    Copy the full SHA
    5c44c30 View commit details
    Browse the repository at this point in the history

Commits on May 5, 2022

  1. Merge pull request etcd-io#13996 from cmurphy/update-crypto-3.5

    Update golang.org/x/crypto to latest
    ptabor committed May 5, 2022
    Configuration menu
    Copy the full SHA
    8453b10 View commit details
    Browse the repository at this point in the history

Commits on May 6, 2022

  1. server/auth: enable tokenProvider if recoved store enables auth

    we found a lease leak issue:
    if a new member(by member add) is recovered by snapshot, and then
    become leader, the lease will never expire afterwards. leader will
    log the revoke failure caused by "invalid auth token", since the
    token provider is not functional, and drops all generated token
    from upper layer, which in this case, is the lease revoking
    routine.
    cfz committed May 6, 2022
    Configuration menu
    Copy the full SHA
    cceb25d View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#13205 from cfz/cherry-pick-#13172

    [backport 3.5]: server/auth: enable tokenProvider if recoved store enables auth
    ptabor committed May 6, 2022
    Configuration menu
    Copy the full SHA
    b57881a View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    d0a0b3f View commit details
    Browse the repository at this point in the history

Commits on May 12, 2022

  1. Update OWNERS

    Co-authored-by: Haseeb Tariq <hasbro17@gmail.com>
    dusk125 and hasbro17 committed May 12, 2022
    Configuration menu
    Copy the full SHA
    7f43640 View commit details
    Browse the repository at this point in the history

Commits on May 13, 2022

  1. Merge pull request etcd-io#121 from dusk125/openshift-4.11

    Add new members to reviewers/approvers
    sdodson committed May 13, 2022
    Configuration menu
    Copy the full SHA
    48e90f1 View commit details
    Browse the repository at this point in the history

Commits on May 16, 2022

  1. Configuration menu
    Copy the full SHA
    c76a010 View commit details
    Browse the repository at this point in the history
  2. Make DRY_RUN explicit

    serathius committed May 16, 2022
    Configuration menu
    Copy the full SHA
    c4b0a56 View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14043 from serathius/test-release-3.5-v2

    [release-3.5] Test release scripts
    serathius committed May 16, 2022
    Configuration menu
    Copy the full SHA
    2e76dfb View commit details
    Browse the repository at this point in the history

Commits on May 18, 2022

  1. scripts: Avoid additional repo clone

    This PR removes additional clone when building artifacts.
    
    When releasing v3.5.4 this clone was main cause of issues and
    confusion about what release script is doing.
    
    release.sh script already clones repo in /tmp/ directory, so clonning
    before build is not needed. As precautions for bug in script leaving
    /tmp/ clone in bad state  I moved "Verify the latest commit has the
    version tag" and added "Verify the clean working tree" to be always run
    before build.
    serathius committed May 18, 2022
    Configuration menu
    Copy the full SHA
    c05b9b1 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    6aa934e View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14050 from serathius/avoid-clone-v3.5

    [release-3.5] scripts: Avoid additional repo clone
    serathius committed May 18, 2022
    Configuration menu
    Copy the full SHA
    73876b1 View commit details
    Browse the repository at this point in the history

Commits on May 25, 2022

  1. UPSTREAM: <carry>: increases cluster discovery time from 10s to 180s

    it gives more time to the etcd operator to add a new member.
    the etcd operator expects the etcd container to be in a running state.
    too tight timeout will cause the container to restart and decreasing operator chances
    p0lyn0mial committed May 25, 2022
    Configuration menu
    Copy the full SHA
    a66d3c3 View commit details
    Browse the repository at this point in the history

Commits on May 26, 2022

  1. Merge pull request etcd-io#129 from p0lyn0mial/openshift-4.11-increas…

    …e-disco-2
    
    Bug 2085997: increases cluster discovery time from 10s to 180s
    openshift-merge-robot committed May 26, 2022
    Configuration menu
    Copy the full SHA
    18dadc9 View commit details
    Browse the repository at this point in the history
  2. Revert "UPSTREAM: <carry>: increases cluster discovery time from 10s …

    …to 180s"
    
    This reverts commit a66d3c3.
    p0lyn0mial committed May 26, 2022
    Configuration menu
    Copy the full SHA
    529734d View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#130 from p0lyn0mial/revert-increase-disco

    Revert "UPSTREAM: <carry>: increases cluster discovery time from 10s to 180s"
    deads2k committed May 26, 2022
    Configuration menu
    Copy the full SHA
    c3403ce View commit details
    Browse the repository at this point in the history

Commits on May 27, 2022

  1. UPSTREAM: <carry>: increases cluster discovery time from 10s to 180s

    it gives more time to the etcd operator to add a new member.
    the etcd operator expects the etcd container to be in a running state.
    too tight timeout will cause the container to restart and decreasing operator chances
    p0lyn0mial committed May 27, 2022
    Configuration menu
    Copy the full SHA
    ad92cba View commit details
    Browse the repository at this point in the history

Commits on May 30, 2022

  1. Merge pull request etcd-io#131 from p0lyn0mial/openshift-4.11-increas…

    …e-disco-3
    
    Bug 2085997: increases cluster discovery time from 10s to 135s
    openshift-merge-robot committed May 30, 2022
    Configuration menu
    Copy the full SHA
    80cc14e View commit details
    Browse the repository at this point in the history

Commits on Jun 4, 2022

  1. Backport two lease related bug fixes to 3.5

    The first bug fix is to resolve the race condition between goroutine
    and channel on the same leases to be revoked. It's a classic mistake
    in using Golang channel + goroutine. Please refer to
    https://go.dev/doc/effective_go#channels
    
    The second bug fix is to resolve the issue that etcd lessor may
    continue to schedule checkpoint after stepping down the leader role.
    ahrtr committed Jun 4, 2022
    Configuration menu
    Copy the full SHA
    acb1ee9 View commit details
    Browse the repository at this point in the history

Commits on Jun 6, 2022

  1. Merge pull request etcd-io#14087 from ahrtr/lease_revoke_race

    [3.5] Backport two lease related bug fixes to 3.5
    serathius committed Jun 6, 2022
    Configuration menu
    Copy the full SHA
    0be65da View commit details
    Browse the repository at this point in the history

Commits on Jun 17, 2022

  1. Add FileReader and FileBufReader utilities

    The FileReader interface is the wrapper of io.Reader. It provides
    the fs.FileInfo as well. The FileBufReader struct is the wrapper of
    bufio.Reader, it also provides fs.FileInfo.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    db0b67e View commit details
    Browse the repository at this point in the history
  2. restrict the max size of each WAL entry to the remaining size of the …

    …file
    
    Currently the max size of each WAL entry is hard coded as 10MB. If users
    set a value > 10MB for the flag --max-request-bytes, then etcd may run
    into a situation that it successfully processes a big request, but fails
    to decode it when replaying the WAL file on startup.
    
    On the other hand, we can't just remove the limitation, because if a
    WAL entry is somehow corrupted, and its recByte is a huge value, then
    etcd may run out of memory. So the solution is to restrict the max size
    of each WAL entry as a dynamic value, which is the remaining size of
    the WAL file.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    621cd7b View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14127 from ahrtr/threshold_3.5

    [3.5] Restrict the max size of each WAL entry to the remaining size of the WAL file
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    4443e14 View commit details
    Browse the repository at this point in the history
  4. client/v3: do not overwrite authTokenBundle on dial

    Cherry pick the PR etcd-io#12992
    to 3.5, so please refer to the original PR for more detailed info.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jun 17, 2022
    Configuration menu
    Copy the full SHA
    df632ab View commit details
    Browse the repository at this point in the history

Commits on Jun 20, 2022

  1. Merge pull request etcd-io#14132 from ahrtr/auth_bundle

    [3.5] client/v3: do not overwrite authTokenBundle on dial
    serathius committed Jun 20, 2022
    Configuration menu
    Copy the full SHA
    c9f7473 View commit details
    Browse the repository at this point in the history

Commits on Jul 3, 2022

  1. Client: fix check for WithPrefix op

    Make sure that WithPrefix correctly set the flag, and add test.
    Also, add test for WithFromKey.
    
    fixes etcd-io#14056
    
    Signed-off-by: Sahdev Zala <spzala@us.ibm.com>
    spzala committed Jul 3, 2022
    Configuration menu
    Copy the full SHA
    4df61af View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14187 from spzala/automated-cherry-pick-of…

    …-#14182-upstream-release-3.5
    
    Automated cherry pick of etcd-io#14182
    ahrtr committed Jul 3, 2022
    Configuration menu
    Copy the full SHA
    57c1d92 View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2022

  1. add the uint32Value data type

    The golang buildin package `flag` doesn't support `uint32` data
    type, so we need to support it via the `flag.Var`.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    40d1a43 View commit details
    Browse the repository at this point in the history
  2. Add flag --max-concurrent-streams to set the max concurrent stream …

    …each client can open at a time
    
    Also refer to etcd-io#14169 (comment)
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    437f377 View commit details
    Browse the repository at this point in the history
  3. add e2e test cases to cover the maxConcurrentStreams

    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    ff447b4 View commit details
    Browse the repository at this point in the history
  4. Merge pull request etcd-io#14219 from ahrtr/3.5_backport_maxstream

    [3.5] Support configuring `MaxConcurrentStreams` for http2
    ahrtr committed Jul 13, 2022
    Configuration menu
    Copy the full SHA
    fb71790 View commit details
    Browse the repository at this point in the history

Commits on Jul 14, 2022

  1. Improve error message for incorrect values of ETCD_CLIENT_DEBUG

    Signed-off-by: Jille Timmermans <jille@quis.cx>
    Jille committed Jul 14, 2022
    Configuration menu
    Copy the full SHA
    cbedaf9 View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2022

  1. Merge pull request etcd-io#14222 from Jille/backport-14203

    [3.5] clientv3: Fix parsing of ETCD_CLIENT_DEBUG
    ahrtr committed Jul 15, 2022
    Configuration menu
    Copy the full SHA
    3237289 View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2022

  1. server/auth: protect rangePermCache with a RW lock

    Signed-off-by: Hitoshi Mitake <h.mitake@gmail.com>
    mitake committed Jul 19, 2022
    Configuration menu
    Copy the full SHA
    e15c005 View commit details
    Browse the repository at this point in the history

Commits on Jul 20, 2022

  1. Merge pull request etcd-io#14227 from mitake/perm-cache-lock-3.5

    server/auth: protect rangePermCache with a RW lock
    serathius committed Jul 20, 2022
    Configuration menu
    Copy the full SHA
    9d7e108 View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2022

  1. Change default sampling rate from 100% to 0%

    This changes the default parent-based trace sampling rate from
    100% to 0%. Due to the high QPS etcd can handle, having 100% trace
    sampling leads to very high resource usage. Defaulting to 0% means
    that only already-sampled traces will be sampled in etcd.
    
    Fixes etcd-io#14310
    
    Signed-off-by: Mike Dame <mikedame@google.com>
    damemi committed Aug 5, 2022
    Configuration menu
    Copy the full SHA
    4c013c9 View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2022

  1. Merge pull request etcd-io#14318 from damemi/3.5-tracing-sample

    Change default sampling rate from 100% to 0%
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    6145831 View commit details
    Browse the repository at this point in the history
  2. etcdserver: bump OpenTelemetry to 1.0.1

    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    2d7e490 View commit details
    Browse the repository at this point in the history
  3. move setupTracing into a separate file config_tracing.go

    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    5a86ae2 View commit details
    Browse the repository at this point in the history
  4. update all related dependencies

    Upgrade grpc to 1.41.0;
    Run ./script/fix.sh to fix all related issue.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    2751c61 View commit details
    Browse the repository at this point in the history
  5. Fix the failure in TestEndpointSwitchResolvesViolation

    Refer to etcd-io@a0bdfc4
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    8c5f110 View commit details
    Browse the repository at this point in the history
  6. Change default sampling rate from 100% to 0%

    Refer to etcd-io#14318
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 6, 2022
    Configuration menu
    Copy the full SHA
    8fdca41 View commit details
    Browse the repository at this point in the history

Commits on Aug 8, 2022

  1. Merge pull request etcd-io#14312 from ahrtr/3.5_bump_otl

    [3.5] etcdserver: bump OpenTelemetry to 1.0.1 and gRPC to 1.41.0
    ahrtr committed Aug 8, 2022
    Configuration menu
    Copy the full SHA
    9e95685 View commit details
    Browse the repository at this point in the history

Commits on Aug 18, 2022

  1. clientv3: close streams after use in lessor keepAliveOnce method

    Streams are now closed after being used in the lessor `keepAliveOnce` method.
    This prevents the "failed to receive lease keepalive request from gRPC stream"
    message from being logged by the server after the context is cancelled by the
    client.
    
    Signed-off-by: Justin Kolberg <amd.prophet@gmail.com>
    amdprophet committed Aug 18, 2022
    Configuration menu
    Copy the full SHA
    eab0b99 View commit details
    Browse the repository at this point in the history

Commits on Aug 19, 2022

  1. Merge pull request etcd-io#14361 from amdprophet/3.5-close-keepalive-…

    …stream
    
    [3.5] clientv3: close streams after use in lessor keepAliveOnce method
    ahrtr committed Aug 19, 2022
    Configuration menu
    Copy the full SHA
    6bab367 View commit details
    Browse the repository at this point in the history

Commits on Aug 20, 2022

  1. Refactor the keepAliveListener and keepAliveConn

    Only `net.TCPConn` supports `SetKeepAlive` and `SetKeepAlivePeriod`
    by default, so if you want to warp multiple layers of net.Listener,
    the `keepaliveListener` should be the one which is closest to the
    original `net.Listener` implementation, namely `TCPListener`.
    
    Also refer to etcd-io#14356
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Aug 20, 2022
    Configuration menu
    Copy the full SHA
    9ea5b1b View commit details
    Browse the repository at this point in the history

Commits on Aug 24, 2022

  1. Merge pull request etcd-io#14366 from ahrtr/keepalive_3.5_20220820

    [3.5] Refactor the keepAliveListener and keepAliveConn
    ahrtr committed Aug 24, 2022
    Configuration menu
    Copy the full SHA
    74aa38e View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2022

  1. Backport of pull/14354 to 3.5.5

    Signed-off-by: Vitalii Levitskii <vitalii@uber.com>
    biosvs committed Aug 29, 2022
    Configuration menu
    Copy the full SHA
    67e4c59 View commit details
    Browse the repository at this point in the history

Commits on Sep 1, 2022

  1. [backport 3.5] server: don't panic in readonly serializable txn

    Problem: We pass grpc context down to applier in readonly serializable txn.
    This context can be cancelled for example due to timeout.
    This will trigger panic inside applyTxn
    
    Solution: Only panic for transactions with write operations
    
    fixes etcd-io#14110
    main PR etcd-io#14149
    
    Signed-off-by: Bogdan Kanivets <bkanivets@apple.com>
    Bogdan Kanivets committed Sep 1, 2022
    Configuration menu
    Copy the full SHA
    204d883 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14397 from biosvs/backport-grpc-proxy-endp…

    …oints-autosync
    
    Backport of pull/14354 to release-3.5
    serathius committed Sep 1, 2022
    Configuration menu
    Copy the full SHA
    fbb14f9 View commit details
    Browse the repository at this point in the history

Commits on Sep 5, 2022

  1. fix the potential data loss for clusters with only one member

    For a cluster with only one member, the raft always send identical
    unstable entries and committed entries to etcdserver, and etcd
    responds to the client once it finishes (actually partially) the
    applying workflow.
    
    When the client receives the response, it doesn't mean etcd has already
    successfully saved the data, including BoltDB and WAL, because:
       1. etcd commits the boltDB transaction periodically instead of on each request;
       2. etcd saves WAL entries in parallel with applying the committed entries.
    Accordingly, it may run into a situation of data loss when the etcd crashes
    immediately after responding to the client and before the boltDB and WAL
    successfully save the data to disk.
    Note that this issue can only happen for clusters with only one member.
    
    For clusters with multiple members, it isn't an issue, because etcd will
    not commit & apply the data before it being replicated to majority members.
    When the client receives the response, it means the data must have been applied.
    It further means the data must have been committed.
    Note: for clusters with multiple members, the raft will never send identical
    unstable entries and committed entries to etcdserver.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr authored and serathius committed Sep 5, 2022
    Configuration menu
    Copy the full SHA
    7eb696d View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14424 from serathius/one_member_data_loss_…

    …raft_3_5
    
    [release-3.5] fix the potential data loss for clusters with only one member
    ahrtr committed Sep 5, 2022
    Configuration menu
    Copy the full SHA
    747bf5c View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2022

  1. move consistent_index forward when executing alarmList operation

    Cherry pick etcd-io#14419 to 3.5.
    
    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Sep 6, 2022
    Configuration menu
    Copy the full SHA
    5c8aa08 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14429 from ahrtr/alarm_list_ci_3.5

    [3.5] Move consistent_index forward when executing alarmList operation
    ahrtr committed Sep 6, 2022
    Configuration menu
    Copy the full SHA
    204c031 View commit details
    Browse the repository at this point in the history

Commits on Sep 7, 2022

  1. server: Extract triggerCorruptAlarm to function

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    d32de2c View commit details
    Browse the repository at this point in the history
  2. server: Extract corruption detection to dedicated struct

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    35cbdf3 View commit details
    Browse the repository at this point in the history
  3. server: Cover corruptionMonitor with tests

    Get 100% coverage on InitialCheck and PeriodicCheck functions to avoid
    any mistakes.
    
    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    78a6f38 View commit details
    Browse the repository at this point in the history
  4. server: Test HashByRev values to make sure they don't change

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    336fef4 View commit details
    Browse the repository at this point in the history
  5. server: Extract unsafeHashByRev function

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    bc592c7 View commit details
    Browse the repository at this point in the history
  6. server: Move unsafeHashByRev to new hash.go file

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    3f26995 View commit details
    Browse the repository at this point in the history
  7. server: Extract kvHash struct

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    f5ed371 View commit details
    Browse the repository at this point in the history
  8. server: Refactor hasher

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    679e327 View commit details
    Browse the repository at this point in the history
  9. server: Return error from scheduleCompaction

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    22d3e4e View commit details
    Browse the repository at this point in the history
  10. server: Move reading KV index inside scheduleCompaction function

    Makes it easier to test hash match between scheduleCompaction and
    HashByRev.
    
    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    ea684db View commit details
    Browse the repository at this point in the history
  11. server: Fix range in mock not returning same number of keys and values

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    f1a759a View commit details
    Browse the repository at this point in the history
  12. server: Calculate hash during compaction

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    21e5d5d View commit details
    Browse the repository at this point in the history
  13. server: Pass revision as int

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    2b8dd0d View commit details
    Browse the repository at this point in the history
  14. server: Move adjusting revision to hasher

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    991b429 View commit details
    Browse the repository at this point in the history
  15. server: Store real rv range in hasher

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    1ff5992 View commit details
    Browse the repository at this point in the history
  16. server: Return revision range that hash was calcualted for

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a3f609d View commit details
    Browse the repository at this point in the history
  17. server: Remove duplicated compaction revision

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    6311072 View commit details
    Browse the repository at this point in the history
  18. server: Extract hasher to separate interface

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    7358362 View commit details
    Browse the repository at this point in the history
  19. server: Cache compaction hash for HashByRev API

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    1200b10 View commit details
    Browse the repository at this point in the history
  20. tests: Add integration tests for compact hash

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    d3db3bc View commit details
    Browse the repository at this point in the history
  21. tests: Add tests for HashByRev HTTP API

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    00bc8da View commit details
    Browse the repository at this point in the history
  22. tests: Unify TestCompactionHash and extend it to also Delete keys and…

    … Defrag
    
    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    037a898 View commit details
    Browse the repository at this point in the history
  23. tests: Rename corruptHash to CorruptBBolt

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a8020a0 View commit details
    Browse the repository at this point in the history
  24. tests: Move CorruptBBolt to testutil

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    8d4ca10 View commit details
    Browse the repository at this point in the history
  25. server: Refactor compaction checker

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    4a75e3d View commit details
    Browse the repository at this point in the history
  26. tests: Cover periodic check in tests

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    a56ec0b View commit details
    Browse the repository at this point in the history
  27. server: Implement compaction hash checking

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    21fb173 View commit details
    Browse the repository at this point in the history
  28. server: Make corrtuption check optional and period configurable

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    5660bf0 View commit details
    Browse the repository at this point in the history
  29. tests: Fix member id in CORRUPT alarm

    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    2ddb9e0 View commit details
    Browse the repository at this point in the history
  30. Merge pull request etcd-io#14282 from serathius/fix-checks-v3.5

    Fix corruption checks v3.5
    serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    ba52d5a View commit details
    Browse the repository at this point in the history
  31. server/etcdmain: add build support for Apple M1

    This has been additionally verified by running the tests locally as a
    basic smoke test. GitHub Actions doesn't provide MacOS M1 (arm64) yet,
    so there's no good way to automate testing.
    
    Ran `TMPDIR=/tmp make test` locally. The `TMPDIR` bit is needed so
    there's no really long path used that breaks Unix socket setup in one of
    the tests.
    
    Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
    dbussink authored and serathius committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    c79f96d View commit details
    Browse the repository at this point in the history
  32. server,test: refresh cache on each NewAuthStore

    - permissions were incorrectly loaded on restarts.
    - etcd-io#14355
    - Backport of etcd-io#14358
    
    Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com>
    Vivek Patani authored and vivekpatani committed Sep 7, 2022
    Configuration menu
    Copy the full SHA
    7639d93 View commit details
    Browse the repository at this point in the history

Commits on Sep 8, 2022

  1. Merge pull request etcd-io#14409 from vivekpatani/release-3.5

    [release-3.5] server,test: refresh cache on each NewAuthStore
    mitake committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    bb3fae4 View commit details
    Browse the repository at this point in the history
  2. Merge pull request etcd-io#14436 from serathius/arm64

    [release-3.5] server/etcdmain: add build support for Apple M1
    ahrtr committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    a5a33cb View commit details
    Browse the repository at this point in the history
  3. testing: fix TestOpenWithMaxIndex cleanup

    A WAL object was closed by defer, however the WAL was rewritten afterwards,
    so defer closed already closed WAL but not the new one. It caused a data
    race between writing file and cleaning up a temporary test directory,
    which led to a non-deterministic bug.
    
    Fixes etcd-io#14332
    
    Signed-off-by: Vladimir Sokolov <vsvastey@gmail.com>
    vsvastey authored and Vladimir Sokolov committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    eef5e22 View commit details
    Browse the repository at this point in the history
  4. Merge pull request etcd-io#14440 from vsvastey/usr/vsvastey/open-with…

    …-max-index-test-fix-3.5
    
    [release-3.5] testing: fix TestOpenWithMaxIndex cleanup
    ahrtr committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    16d72c0 View commit details
    Browse the repository at this point in the history
  5. etcdctl: fix move-leader for multiple endpoints

    Due to a duplicate call of clientConfigFromCmd, the move-leader command
    would fail with "conflicting environment variable is shadowed by corresponding command-line flag".
    Also in scenarios where no command-line flag was supplied.
    
    Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
    tjungblu committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    243b7a1 View commit details
    Browse the repository at this point in the history
  6. Merge pull request etcd-io#14434 from tjungblu/bz_1918413_3.5

    etcdctl: allow move-leader to connect to multiple endpoints
    ahrtr committed Sep 8, 2022
    Configuration menu
    Copy the full SHA
    646ba66 View commit details
    Browse the repository at this point in the history

Commits on Sep 13, 2022

  1. Merge pull request etcd-io#14178 from lavacat/release-3.5-txn-panic

    [3.5] server: don't panic in readonly serializable txn
    ahrtr committed Sep 13, 2022
    Configuration menu
    Copy the full SHA
    6c26693 View commit details
    Browse the repository at this point in the history
  2. fix the flaky test fix_TestV3AuthRestartMember_20220913 for 3.5

    Signed-off-by: Benjamin Wang <wachao@vmware.com>
    ahrtr committed Sep 13, 2022
    Configuration menu
    Copy the full SHA
    2f1171f View commit details
    Browse the repository at this point in the history
  3. Merge pull request etcd-io#14454 from ahrtr/fix_TestV3AuthRestartMemb…

    …er_20220913_3.5
    
    [release-3.5] fix the flaky test TestV3AuthRestartMember
    ahrtr committed Sep 13, 2022
    Configuration menu
    Copy the full SHA
    2ba1bab View commit details
    Browse the repository at this point in the history

Commits on Sep 15, 2022

  1. version: bump up to 3.5.5

    serathius committed Sep 15, 2022
    Configuration menu
    Copy the full SHA
    19002cf View commit details
    Browse the repository at this point in the history

Commits on Oct 10, 2022

  1. Configuration menu
    Copy the full SHA
    e3e16a7 View commit details
    Browse the repository at this point in the history