-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
*: make "initial-corrupt-check", "corrupt-check-time" stable #10934
Conversation
Signed-off-by: Gyuho Lee <[email protected]>
…able Signed-off-by: Gyuho Lee <[email protected]>
Signed-off-by: Gyuho Lee <[email protected]>
Signed-off-by: Gyuho Lee <[email protected]>
Signed-off-by: Gyuho Lee <[email protected]>
lgtm |
lgtm Thanks for enabling for the functional tester as well. |
Signed-off-by: Gyuho Lee <[email protected]>
Codecov Report
@@ Coverage Diff @@
## master #10934 +/- ##
==========================================
+ Coverage 63.34% 64.17% +0.83%
==========================================
Files 400 400
Lines 37689 37690 +1
==========================================
+ Hits 23873 24189 +316
+ Misses 12217 11884 -333
- Partials 1599 1617 +18
Continue to review full report at Codecov.
|
Does this feature work if TLS is enabled among peers [1]? If not, we probably want to fix it before promoting the flag? [1] Line 311 in 388d15f
|
@jingyih Good point. We need fix that. |
I am looking at how to fix it. Fundamentally, the server does not have the cert files of the client side, which means we cannot create a clientv3 on server side and reach out to another server. Instead, we need to get peer hash from the peer http [1]? @gyuho, could you comment? [1] https://github.com/etcd-io/etcd/blob/master/etcdserver/api/etcdhttp/peer.go |
@gyuho Never mind. I think I misunderstood some concepts. |
At some point, maybe as a future task, we should clean up the peer communication infrastructure. It should be possible to introduce a new request type without having to sort out TLS each time.. |
As @jpbetz mentioned, there's no easy way to configure client cert from a remote peer, when peer-to-peer is TLS-enabled. Please let me know if anyone has a better idea. Let's move this to etcd v4. |
@jpbetz @spzala