Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 3.5 dd v3.5.14 dd.1 #2

Closed
wants to merge 196 commits into from

Conversation

nyodas
Copy link

@nyodas nyodas commented Jun 10, 2024

kkkkun and others added 30 commits June 13, 2023 16:45
To be up to date with the newest security fix.

Signed-off-by: 0scvr <[email protected]>
Part of etcd-io#16740

Signed-off-by: Allen Ray <[email protected]>
[3.5] Bump golang.org/x/net to v0.17.0
…ted using round robin

Introduction of round robin golang/net@120fc90
Added in v0.10.0 golang/net@v0.10.0...v0.11.0

Signed-off-by: Marek Siarkowicz <[email protected]>
[v3.5] Return to default write scheduler since golang.org/x/[email protected] started using round robin
…he connection-string format)

Signed-off-by: Chao Chen <[email protected]>
…gRPC-go-updates

[3.5] Bump grpc-go to1.47 (and fix the connection-string format)
…gRPC-update

[release-3.5]: upgrade gRPC-go to v1.52.0
Signed-off-by: caojiamingalan <[email protected]>
Signed-off-by: Marek Siarkowicz <[email protected]>
remove stack log when restore snapshot
…eady notification infinitely on startup"

Signed-off-by: Marek Siarkowicz <[email protected]>
The last step with gRPC update behavior changes auditing to resolve CVE etcd-io#16740 in 3.5

This PR backports etcd-io#14922, etcd-io#16338, etcd-io#16587, etcd-io#16630, etcd-io#16636 and etcd-io#16739 to release-3.5.

Signed-off-by: Chao Chen <[email protected]>
…ase-3.5

[release-3.5] etcdserver: add cluster id check for hashKVHandler
[3.5] Bump bbolt to 1.3.8 for release-3.5
To keep etcd projects up to date with the latest patch releases &
incorporate the latest security updates.

Signed-off-by: arjunmalhotra1 <[email protected]>
[3.5] etcd: upgrade go version from 1.20.10 to 1.20.11
Use a template to consolidate arm64 and amd64 test workflows. Enable
running armd64 tests on every push and pull request.

Signed-off-by: Ivan Valdes <[email protected]>
…telemetry.io/contrib/instrumentation/google.golang.org/grpc/[email protected]

Signed-off-by: sharath sivakumar <[email protected]>
…apis/api,google.golang.org/grpc to make it consistent

Signed-off-by: sharath sivakumar <[email protected]>
…every-push-and-pr-in-release-3.5

github workflow: run arm64 tests on every push
ExperimentalDistributedTracingSamplingRatePerMillion is the
number of samples to collect per million spans.
Defaults to 0.

Signed-off-by: James Blair <[email protected]>
fuweid and others added 24 commits April 24, 2024 12:28
[3.5] fix revision loss issue caused by compaction - 17780
…test

[3.5] add mix version test of adding last ver to current ver.
gRPC health server sets serving status to NOT_SERVING on defrag
Backport from 3.6 in etcd-io#16278

Co-authored-by: Chao Chen <[email protected]>
Signed-off-by: Thomas Jungblut <[email protected]>
Bumps distroless/static-debian11 from `046b92c` to `6d31326`.

---
updated-dependencies:
- dependency-name: distroless/static-debian11
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
…se-3.5/distroless/static-debian11-6d31326376a7834b106f281b04f67b5d015c31732f594930f2ea81365f99d60c

build(deps): bump distroless/static-debian11 from `046b92c` to `6d31326`
Backport from 3.6 in etcd-io#16836

Co-authored-by: Chao Chen <[email protected]>
Signed-off-by: Thomas Jungblut <[email protected]>
Signed-off-by: Thomas Jungblut <[email protected]>
Signed-off-by: Siyuan Zhang <[email protected]>
…test

[3.5] Backport cluster downgrade test.
…gserv

[3.5] gRPC health server sets serving status to NOT_SERVING on defrag
Accept a third argument for NewDefaultBackend for overrides to the
BackendConfig.
Add a new function, WithMmapSize, which modifies the backend config to
provide a custom InitiamMmapSize.

Backports commit: d69adf4 / PR: etcd-io#17277

Signed-off-by: Ivan Valdes <[email protected]>
When running the snapshot command, allow receiving an initial memory map
allocation for the database, avoiding future memory allocation issues.

Backports commit: be28833 / PR: etcd-io#17277

Co-authored-by: Fatih USTA <[email protected]>
Signed-off-by: Ivan Valdes <[email protected]>
…dutl-memory-allocation-issue

[3.5] backport etcdutl memory allocation issue
Signed-off-by: Lavish pal <[email protected]>
[3.5] dependency : update the go v1.21.10
This commit adds a script to sync the version present in .go-version
across all go.mod files as the toolchain directive. As part of that,
this commit also modifies go.mod files that did not have synced toolchain
directives.

Additionally, this also adds a script to verify all toolchain and go
directives against the version present in .go-version as follows:
(1) The go directive <= version in .go-version
(2) The toolchain directive == version in .go-version

This script runs as part of the `make verify` target, making it run
as a presbumit by default.

Signed-off-by: Madhav Jivrajani <[email protected]>
Additionally, provide ability to opt-out of the .go-version and use a
custom one via env vars: FORCE_HOST_GO and GO_VERSION.

Signed-off-by: Madhav Jivrajani <[email protected]>
…p-35

[release-3.5] Setup a way to consistently manage go versions across scripts and go.mods
Allow setting AllowedCN and AllowedHostname tls fields through config file for peer transport security.

Signed-off-by: Seena Fallah <[email protected]>
[3.5] config: support AllowedCN and AllowedHostname through config file
@nyodas nyodas force-pushed the release-3.5-dd-v3.5.14-dd.1 branch 3 times, most recently from 1a0f13c to b36f90d Compare June 10, 2024 21:55
@nyodas nyodas force-pushed the release-3.5-dd-v3.5.14-dd.1 branch from b36f90d to f5d56be Compare June 18, 2024 09:57
@nyodas nyodas force-pushed the release-3.5-dd-v3.5.14-dd.1 branch from c70b0e2 to bf51a53 Compare July 3, 2024 12:30
@nyodas nyodas closed this Jul 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.