Ivan Valdes
e6d95c8457
dependency: bump google.golang.org/protobuf to v1.33.0
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-03-07 16:03:12 -08:00
Benjamin Wang
d76d8479ee
Bump bbolt to 1.3.9 for 3.5
...
Signed-off-by: Benjamin Wang <benjamin.ahrtr@gmail.com>
2024-02-24 15:38:49 +00:00
vivekpatani
f1d1029cc2
dependency: bump github.com/sirupsen/logrus to v1.9.3
...
Signed-off-by: vivekpatani <9080894+vivekpatani@users.noreply.github.com>
2024-02-23 16:24:13 -08:00
Chao Chen
a1aaa51cf1
add uds test cases into e2e TestAuthority
...
Signed-off-by: Chao Chen <chaochn@amazon.com>
2024-02-19 13:26:15 +00:00
Ivan Valdes
4a90575ab2
Backport ignore old leader's leases revoking request
...
Backported PR #16822 , commits f7e488dc9262685d6624755e0d3bb0a655863248,
67f17166bf2ba337dafb8e0ea8eea5f74a990767,
and f7ff898fd6c2d6dbb54278343073aa4fa5f46a03
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-17 22:16:53 -08:00
Ivan Valdes
c486b58947
tests/e2e: backport e2e cluster setup
...
Finish backporting the remaining functions from the original backport
from PR #17075 .
Backported commit 65add8cec44b32682e59d2596a592038bac90dcd
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-17 22:16:29 -08:00
Ivan Valdes
1115eb1590
tests/e2e: implement EtcdProcess GoFailClientTimeout
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-13 15:21:07 -08:00
Benjamin Wang
ae7d49333a
Merge pull request #17396 from ivanvc/3.5-use-wait-leader-in-corrupt-test
...
[3.5] tests/e2e: use WaitLeader in corrupt test
2024-02-09 10:34:56 +00:00
Marek Siarkowicz
b2aa3a13e8
Merge pull request #17381 from ivanvc/3.5-backport-wait-leader
...
[3.5] backport e2e WaitLeader
2024-02-08 15:44:54 +01:00
Ivan Valdes
07c4dcb90c
tests/e2e: use WaitLeader in corrupt test
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-07 17:00:09 -08:00
Ivan Valdes
8b2493256d
tests/e2e: implement EtcdProcessCluster WaitLeader
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-06 14:29:51 -08:00
Ivan Valdes
c37d33c571
tests/e2e: implement EtcdProcess Etcdctl
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-06 14:29:40 -08:00
Ivan Valdes
26bae5efbd
tests/e2e: move etcdctl to framework/e2e
...
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-02-05 15:13:42 -08:00
Allen Ray
3d64877dc2
[3.5] Update to go1.21
...
Signed-off-by: Allen Ray <alray@redhat.com>
2024-02-02 14:25:53 -05:00
Marek Siarkowicz
e7b3bb6cca
version: bump up to 3.5.12
2024-01-31 11:32:22 +01:00
Marek Siarkowicz
8599d48f80
Bump golang.org/x/crypto to v0.17+ to address CVE-2023-48795
...
This is the minimal set of package updates I get after running:
./scripts/update_dep.sh golang.org/x/crypto v0.17.0
make
Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
2024-01-30 12:02:49 +01:00
Siyuan Zhang
f219ab445e
add tests to test tx delete consistency.
...
Signed-off-by: Siyuan Zhang <sizhang@google.com>
2024-01-11 13:29:54 -08:00
Benjamin Wang
880004c55c
Merge pull request #17123 from ZhouJianMS/member-place-3.5
...
[3.5] member replace e2e test
2024-01-11 08:34:02 +00:00
Amit Rastogi
b075426e54
Backport testutils.ExecuteUntil to 3.5 branch
...
Signed-off-by: Amit Rastogi <amitrastogi2206@gmail.com>
2024-01-01 16:48:59 +05:30
ZhouJianMS
bd587c08bb
member replace e2e test
...
Signed-off-by: ZhouJianMS <zhoujian@microsoft.com>
2023-12-29 09:46:58 +08:00
Siyuan Zhang
b8d5e79fc1
[3.5] backport health check e2e tests.
...
Signed-off-by: Siyuan Zhang <sizhang@google.com>
2023-12-07 09:51:39 -08:00
Marek Siarkowicz
fa0eb078fa
Merge pull request #17075 from siyuanfoundation/3.5-e2e-fw
...
[3.5] tests: Backport Extract e2e cluster setup to separate package
2023-12-07 13:03:36 +01:00
Marek Siarkowicz
3b252db4f6
version: bump up to 3.5.11
2023-12-07 11:29:12 +01:00
Marek Siarkowicz
795dcedd1d
tests: Extract e2e cluster setup to separate package
...
Signed-off-by: Siyuan Zhang <sizhang@google.com>
2023-12-06 09:13:36 -08:00
James Blair
f952197890
Backport embed: Add tracing integration test.
...
Signed-off-by: James Blair <mail@jamesblair.net>
2023-11-26 10:30:49 +13:00
sharath sivakumar
f26074ae56
CVE-2023-47108: Backport go.opentelemetry.io/otel@v1.20.0 and go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc@v0.46.0
...
Signed-off-by: sharath sivakumar <sharath.sivakumar@mollie.com>
2023-11-15 14:09:07 +01:00
Marek Siarkowicz
0223ca52b8
version: bump up to 3.5.10
2023-10-27 12:33:25 +02:00
Benjamin Wang
88beb6ca47
bump bbolt to 1.3.8 for etcd 3.5
...
Signed-off-by: Benjamin Wang <wachao@vmware.com>
2023-10-26 16:32:07 +01:00
Benjamin Wang
3521aaad9a
Merge pull request #16790 from chaochn47/3.5-grpc-update
...
[3.5] Upgrade gRPC-go to 1.58.3
2023-10-19 10:21:36 +01:00
Marek Siarkowicz
31b7c58fd5
Merge pull request #16637 from serathius/check-cluster-id-release-3.5
...
[release-3.5] etcdserver: add cluster id check for hashKVHandler
2023-10-17 20:58:21 +02:00
Chao Chen
1aa4aa8a96
3.5: upgrade gRPC-go to 1.58.3
...
The last step with gRPC update behavior changes auditing to resolve CVE #16740 in 3.5
This PR backports #14922 , #16338 , #16587 , #16630 , #16636 and #16739 to release-3.5.
Signed-off-by: Chao Chen <chaochn@amazon.com>
2023-10-17 11:07:08 -07:00
Marek Siarkowicz
5b8150a6cf
Backport corrupt check test fix "etcd server shouldn't wait for the ready notification infinitely on startup"
...
Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
2023-10-17 14:37:14 +02:00
caojiamingalan
04cfb4c660
etcdserver: add cluster id check for hashKVHandler
...
Signed-off-by: caojiamingalan <alan.c.19971111@gmail.com>
Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
2023-10-17 13:27:47 +02:00
Chao Chen
6f4fa5a27a
[release-3.5]: upgrade gRPC-go to v1.52.0
...
backport https://github.com/etcd-io/etcd/pull/14834 and https://github.com/etcd-io/etcd/pull/16324
Signed-off-by: Chao Chen <chaochn@amazon.com>
2023-10-16 21:43:00 -07:00
Chao Chen
db16069588
backport #14125 to release-3.5: Update to grpc-1.47 (and fix the connection-string format)
...
Signed-off-by: Chao Chen <chaochn@amazon.com>
2023-10-12 09:46:49 -07:00
Marek Siarkowicz
404eeaa74e
Return to default write scheduler since golang.org/x/net@v0.11.0 started using round robin
...
Introduction of round robin 120fc906b3
Added in v0.10.0 https://github.com/golang/net/compare/v0.10.0...v0.11.0
Signed-off-by: Marek Siarkowicz <siarkowicz@google.com>
2023-10-12 15:19:17 +02:00
Allen Ray
24ee8e491f
bump golang.org/x/net to 0.17.0
...
Part of https://github.com/etcd-io/etcd/issues/16740
Signed-off-by: Allen Ray <alray@redhat.com>
2023-10-11 10:43:51 -04:00
James Blair
bfb3494c06
Remove obsolete http 1.0 version.
...
From TestConnectionMultiplexing to ensure the test will run successfully in Debian 12.
Signed-off-by: James Blair <mail@jamesblair.net>
2023-09-10 21:02:38 +12:00
James Blair
baa580a0b6
Backport redirect metrics data into file to reduce output.
...
Signed-off-by: James Blair <mail@jamesblair.net>
2023-09-07 20:42:03 +12:00
Wei Fu
68e09defdf
test: add v3 curl test to cover maintenance hash/hashkv REST API
...
Signed-off-by: Benjamin Wang <wachao@vmware.com>
Signed-off-by: Wei Fu <fuweid89@gmail.com>
2023-08-28 21:00:46 +08:00
James Blair
b9e5d9666a
tests: Backport deflake for TestWatchDelay
...
Signed-off-by: James Blair <mail@jamesblair.net>
2023-08-19 21:41:56 +12:00
James Blair
9c7c8c6b3f
Backport update to golang 1.20 minor release.
...
Signed-off-by: James Blair <mail@jamesblair.net>
2023-08-11 21:16:01 +12:00
caojiamingalan
6ac9d94d67
etcdserver: backport check scheduledCompactKeyName and finishedCompactKeyName before writing hash to release-3.5.
...
Fix #15919 .
Check ScheduledCompactKeyName and FinishedCompactKeyName
before writing hash to hashstore.
If they do not match, then it means this compaction has once been interrupted and its hash value is invalid. In such cases, we won't write the hash values to the hashstore, and avoids the incorrect corruption alarm.
Signed-off-by: caojiamingalan <alan.c.19971111@gmail.com>
2023-07-14 19:22:38 -05:00
Lan Liang
960cd26bef
Backport #13577
...
Disable auth gracefully without impacting existing watchers.
Signed-off-by: Lan Liang <gcslyp@gmail.com>
2023-07-14 12:50:21 +08:00
zhangwenkang
6be3ad36be
clientv3: remove v3.WithFirstKey() in Barrier.Wait()
...
fix the unexpected blocking when using Barrier.Wait(), e.g.
NewBarrier(client, "a").Wait() will block if key "a" is not existed but "a0" is existed, but it should return immediately.
Signed-off-by: zhangwenkang <zwenkang@vmware.com>
2023-07-06 16:18:52 +08:00
Thomas Jungblut
4425ef572e
Adding optional revision bump and mark compacted to snapshot restore
...
Signed-off-by: Allen Ray <alray@redhat.com>
Signed-off-by: Thomas Jungblut <tjungblu@redhat.com>
2023-07-03 12:57:12 +02:00
kkkkun
dca13c6d47
replace gobin with go install
...
Signed-off-by: kkkkun <scuzk373x@gmail.com>
2023-06-09 14:17:37 +08:00
Hubert Zhang
98117389d2
Fix test of clientv3/naming
...
Signed-off-by: Hubert Zhang <hubert.zyk@gmail.com>
2023-05-24 06:58:39 +00:00
Ramil Mirhasanov
2158f21ad5
clientv3/naming/endpoints: fix endpoints prefix bug
...
fixes bug with multiple endpoints with same prefix
Signed-off-by: Ramil Mirhasanov <ramil600@yahoo.com>
2023-05-23 12:00:21 +00:00
yellowzf
ecfed91e50
grpcproxy: fix memberlist results not update when proxy node down
...
If start grpc proxy with --resolver-prefix, memberlist will return all alive proxy nodes, when one grpc proxy node is down, it is expected to not return the down node, but it is still return
Signed-off-by: yellowzf <zzhf3311@163.com>
2023-05-16 11:35:31 +08:00