-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cli: debug decode-key to support base64 #78158
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remind me how this works, what's an example of a non-MVCC key? I thought we used an MVCC timestamp of zero for such keys, and could treat them as MVCC keys that way. I'm sure that's not right given this PR but apparently I am in need of a refresher.
b713489
to
7e85fbc
Compare
You are correct about mvcc having 0 timestamp for non mvcc keys. I was getting an error before, but it looks like it was because of some corrupted key itself. I just retested that and it indeed just adds ,0 suffix when I give it range keys. |
b01986a
to
51d5c94
Compare
Previously decode-key supported hex encoded keys. When using json serialization of descriptors and recovery plans you need to decode keys that are base64 encoded. This patch adds flag to select key encoding format. The default mode stays the same so any existing tooling will work as expected. Release note: None
51d5c94
to
87610fe
Compare
bors r=tbg,erikgrinaker |
Build succeeded: |
Previously decode-key supported hex encoded keys. When using json serialization of descriptors and recovery plans you need to decode keys that are base64 encoded.
This patch adds flag to select key encoding format.
The default mode stays the same so any existing tooling willwork as expected.
Release note: None