-
Notifications
You must be signed in to change notification settings - Fork 4.7k
Etcd v3.1.0-alpha.0 with embedding and gRPC support #10976
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
65d7764
to
0c64ae8
Compare
[test] |
173aba1
to
fc95ba7
Compare
[test] |
Flaked on rollout history on deployments. We appear to be unable to schedule more pods - the service endpoints test, this test, and the deploy iteratively test all rely on having enough room to schedule. We need to add debugging to it. |
fc95ba7
to
742bfb3
Compare
@liggitt if you can review the etcd master server startup change. |
[test] |
[test]
|
2 similar comments
[test] |
[test] |
@liggitt review On Mon, Sep 26, 2016 at 4:02 PM, OpenShift Bot [email protected]
|
if someone starts an existing data store with this, it'll be impossible for them to roll back to an older version of origin, right? if so, worth noting in the release notes |
@@ -23,10 +23,6 @@ fi | |||
|
|||
# setup a private GOPATH so the build can succeed | |||
export GOPATH="${PWD}/gopath" | |||
rm -f "${GOPATH}/src/github.com/coreos/etcd" | |||
mkdir -p "${GOPATH}/src/github.com/coreos" | |||
ln -s "${PWD}" "${GOPATH}/src/github.com/coreos/etcd" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what was the original reason for this, and why is it no longer needed?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
etcd ./build does this now - they didn't used to control their gopath, now they do
@@ -26,7 +26,8 @@ os::test::junit::declare_suite_start "cmd/basicresources/versionreporting" | |||
os::build::get_version_vars | |||
os_git_regex="$( escape_regex "${OS_GIT_VERSION%%-*}" )" | |||
kube_git_regex="$( escape_regex "${KUBE_GIT_VERSION%%-*}" )" | |||
etcd_git_regex="$( escape_regex "${ETCD_GIT_VERSION%%-*}" )" | |||
etcd_version="$(echo "${ETCD_GIT_VERSION}" | sed -E "s/\-.*//g" | sed -E "s/v//")" | |||
etcd_git_regex="$( escape_regex "${etcd_version%%-*}" )" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
raises eyebrow
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
etcd doesn't follow our regex rules
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
follow our version style rules
|
||
select { | ||
case <-e.Server.ReadyNotify(): | ||
glog.Infof("Started etcd at %s", etcdServerConfig.Address) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this seems wrong... if we reach this log line, we'll immediately fatal below?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It waits on the error channel.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah
|
||
// addressToURLs turns a host:port comma delimited list into an array valid | ||
// URL strings with the appropriate prefix for the TLS mode. | ||
func addressToURLs(addr string, isTLS bool) []string { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we're passing in bind addresses here... is https://0.0.0.0:4001
going to be valid?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, same as before. The logic for calculating addresses simply moved deeper.
} | ||
osutil.HandleInterrupts() | ||
s.Start() | ||
osutil.RegisterInterruptHandler(s.Stop) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
were the interrupt handlers important?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, added them back.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Although now it's survivable.
742bfb3
to
8b70560
Compare
Impossible if they start older than 2.3.7 I believe. On Tue, Sep 27, 2016 at 10:35 AM, OpenShift Bot [email protected]
|
|
||
select { | ||
case <-e.Server.ReadyNotify(): | ||
glog.Infof("Started etcd at %s", etcdServerConfig.Address) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ah
cfg.ClientTLSInfo.CAFile = etcdServerConfig.ServingInfo.ClientCA | ||
cfg.ClientTLSInfo.CertFile = etcdServerConfig.ServingInfo.ServerCert.CertFile | ||
cfg.ClientTLSInfo.KeyFile = etcdServerConfig.ServingInfo.ServerCert.KeyFile | ||
cfg.ClientTLSInfo.ClientCertAuth = len(cfg.ClientTLSInfo.CertFile) > 0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this should trigger off the ClientCA being specified, not the cert file
cfg.PeerTLSInfo.CAFile = etcdServerConfig.PeerServingInfo.ClientCA | ||
cfg.PeerTLSInfo.CertFile = etcdServerConfig.PeerServingInfo.ServerCert.CertFile | ||
cfg.PeerTLSInfo.KeyFile = etcdServerConfig.PeerServingInfo.ServerCert.KeyFile | ||
cfg.PeerTLSInfo.ClientCertAuth = len(cfg.PeerTLSInfo.CertFile) > 0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same here, len(ClientCA) > 0
[test] idle.sh flake
|
LGTM after squash of review commit |
2532c19
to
604ff86
Compare
[merge] |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/9381/) (Image: devenv-rhel7_5092) |
Evaluated for origin merge up to 604ff86 |
[test] #11024 On Tue, Sep 27, 2016 at 4:48 PM, OpenShift Bot [email protected]
|
Evaluated for origin test up to 604ff86 |
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pr_origin/9381/) |
No description provided.