mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
Bump kine for metrics/tls changes
Signed-off-by: Brad Davidson <brad.davidson@rancher.com>
This commit is contained in:
parent
ad1a40a96c
commit
b8add39b07
2
go.mod
2
go.mod
@ -90,7 +90,7 @@ require (
|
|||||||
github.com/gorilla/mux v1.8.0
|
github.com/gorilla/mux v1.8.0
|
||||||
github.com/gorilla/websocket v1.4.2
|
github.com/gorilla/websocket v1.4.2
|
||||||
github.com/k3s-io/helm-controller v0.11.3
|
github.com/k3s-io/helm-controller v0.11.3
|
||||||
github.com/k3s-io/kine v0.7.3
|
github.com/k3s-io/kine v0.8.0
|
||||||
github.com/klauspost/compress v1.12.2
|
github.com/klauspost/compress v1.12.2
|
||||||
github.com/kubernetes-sigs/cri-tools v0.0.0-00010101000000-000000000000
|
github.com/kubernetes-sigs/cri-tools v0.0.0-00010101000000-000000000000
|
||||||
github.com/lib/pq v1.10.2
|
github.com/lib/pq v1.10.2
|
||||||
|
4
go.sum
4
go.sum
@ -562,8 +562,8 @@ github.com/k3s-io/etcd/server/v3 v3.5.0-k3s1 h1:be2d2LS1w+OxyHE/PF6tmGVzF72+7L2F
|
|||||||
github.com/k3s-io/etcd/server/v3 v3.5.0-k3s1/go.mod h1:3Ah5ruV+M+7RZr0+Y/5mNLwC+eQlni+mQmOVdCRJoS4=
|
github.com/k3s-io/etcd/server/v3 v3.5.0-k3s1/go.mod h1:3Ah5ruV+M+7RZr0+Y/5mNLwC+eQlni+mQmOVdCRJoS4=
|
||||||
github.com/k3s-io/helm-controller v0.11.3 h1:DSPAOCGHxF5pmF4vzQP5AgPT3tiGRJRZu+08hwWtbGI=
|
github.com/k3s-io/helm-controller v0.11.3 h1:DSPAOCGHxF5pmF4vzQP5AgPT3tiGRJRZu+08hwWtbGI=
|
||||||
github.com/k3s-io/helm-controller v0.11.3/go.mod h1:z0ExsRRIkTO/QC//3/Esn5ItTD6AiQSluwzMaS7RI/4=
|
github.com/k3s-io/helm-controller v0.11.3/go.mod h1:z0ExsRRIkTO/QC//3/Esn5ItTD6AiQSluwzMaS7RI/4=
|
||||||
github.com/k3s-io/kine v0.7.3 h1:YHj4DQmTGuF4GyriKyFx5gH9ywchCadHhl3Llj5oyuw=
|
github.com/k3s-io/kine v0.8.0 h1:k6T9bI9DID7lIbktukXxg1QfeFoAQK4EIvAHoyPAe08=
|
||||||
github.com/k3s-io/kine v0.7.3/go.mod h1:tksdHCn3Vof8ZKHd+QJkLRi4LbyQglKBrokaBBrHIcY=
|
github.com/k3s-io/kine v0.8.0/go.mod h1:gaezUQ9c8iw8vxDV/DI8vc93h2rCpTvY37kMdYPMsyc=
|
||||||
github.com/k3s-io/kubernetes v1.22.1-k3s1 h1:evi+JkMnC0HDEJ8A7aLqPKZ+0cP/CK6udFquf7KVq1I=
|
github.com/k3s-io/kubernetes v1.22.1-k3s1 h1:evi+JkMnC0HDEJ8A7aLqPKZ+0cP/CK6udFquf7KVq1I=
|
||||||
github.com/k3s-io/kubernetes v1.22.1-k3s1/go.mod h1:IGQZrV02n2IBp52+/YwLVMurCEQPKXJ/k8hU3mqEOuA=
|
github.com/k3s-io/kubernetes v1.22.1-k3s1/go.mod h1:IGQZrV02n2IBp52+/YwLVMurCEQPKXJ/k8hU3mqEOuA=
|
||||||
github.com/k3s-io/kubernetes/staging/src/k8s.io/api v1.22.1-k3s1 h1:BlTOjlJwCV9ZNgTgyByLJXn7emlDAQC/duN14pUtWLk=
|
github.com/k3s-io/kubernetes/staging/src/k8s.io/api v1.22.1-k3s1 h1:BlTOjlJwCV9ZNgTgyByLJXn7emlDAQC/duN14pUtWLk=
|
||||||
|
@ -111,9 +111,9 @@ func run(app *cli.Context, cfg *cmds.Server, leaderControllers server.CustomCont
|
|||||||
serverConfig.ControlConfig.ExtraSchedulerAPIArgs = cfg.ExtraSchedulerArgs
|
serverConfig.ControlConfig.ExtraSchedulerAPIArgs = cfg.ExtraSchedulerArgs
|
||||||
serverConfig.ControlConfig.ClusterDomain = cfg.ClusterDomain
|
serverConfig.ControlConfig.ClusterDomain = cfg.ClusterDomain
|
||||||
serverConfig.ControlConfig.Datastore.Endpoint = cfg.DatastoreEndpoint
|
serverConfig.ControlConfig.Datastore.Endpoint = cfg.DatastoreEndpoint
|
||||||
serverConfig.ControlConfig.Datastore.CAFile = cfg.DatastoreCAFile
|
serverConfig.ControlConfig.Datastore.BackendTLSConfig.CAFile = cfg.DatastoreCAFile
|
||||||
serverConfig.ControlConfig.Datastore.CertFile = cfg.DatastoreCertFile
|
serverConfig.ControlConfig.Datastore.BackendTLSConfig.CertFile = cfg.DatastoreCertFile
|
||||||
serverConfig.ControlConfig.Datastore.KeyFile = cfg.DatastoreKeyFile
|
serverConfig.ControlConfig.Datastore.BackendTLSConfig.KeyFile = cfg.DatastoreKeyFile
|
||||||
serverConfig.ControlConfig.AdvertiseIP = cfg.AdvertiseIP
|
serverConfig.ControlConfig.AdvertiseIP = cfg.AdvertiseIP
|
||||||
serverConfig.ControlConfig.AdvertisePort = cfg.AdvertisePort
|
serverConfig.ControlConfig.AdvertisePort = cfg.AdvertisePort
|
||||||
serverConfig.ControlConfig.FlannelBackend = cfg.FlannelBackend
|
serverConfig.ControlConfig.FlannelBackend = cfg.FlannelBackend
|
||||||
|
@ -147,7 +147,7 @@ func (c *Cluster) startStorage(ctx context.Context) error {
|
|||||||
// based on what the kine wrapper tells us about the datastore. Single-node datastores like sqlite don't require
|
// based on what the kine wrapper tells us about the datastore. Single-node datastores like sqlite don't require
|
||||||
// leader election, while basically all others (etcd, external database, etc) do since they allow multiple servers.
|
// leader election, while basically all others (etcd, external database, etc) do since they allow multiple servers.
|
||||||
c.etcdConfig = etcdConfig
|
c.etcdConfig = etcdConfig
|
||||||
c.config.Datastore.Config = etcdConfig.TLSConfig
|
c.config.Datastore.BackendTLSConfig = etcdConfig.TLSConfig
|
||||||
c.config.Datastore.Endpoint = strings.Join(etcdConfig.Endpoints, ",")
|
c.config.Datastore.Endpoint = strings.Join(etcdConfig.Endpoints, ",")
|
||||||
c.config.NoLeaderElect = !etcdConfig.LeaderElect
|
c.config.NoLeaderElect = !etcdConfig.LeaderElect
|
||||||
return nil
|
return nil
|
||||||
|
@ -272,14 +272,14 @@ func setupStorageBackend(argsMap map[string]string, cfg *config.Control) {
|
|||||||
argsMap["etcd-servers"] = cfg.Datastore.Endpoint
|
argsMap["etcd-servers"] = cfg.Datastore.Endpoint
|
||||||
}
|
}
|
||||||
// storage backend tls configuration
|
// storage backend tls configuration
|
||||||
if len(cfg.Datastore.CAFile) > 0 {
|
if len(cfg.Datastore.BackendTLSConfig.CAFile) > 0 {
|
||||||
argsMap["etcd-cafile"] = cfg.Datastore.CAFile
|
argsMap["etcd-cafile"] = cfg.Datastore.BackendTLSConfig.CAFile
|
||||||
}
|
}
|
||||||
if len(cfg.Datastore.CertFile) > 0 {
|
if len(cfg.Datastore.BackendTLSConfig.CertFile) > 0 {
|
||||||
argsMap["etcd-certfile"] = cfg.Datastore.CertFile
|
argsMap["etcd-certfile"] = cfg.Datastore.BackendTLSConfig.CertFile
|
||||||
}
|
}
|
||||||
if len(cfg.Datastore.KeyFile) > 0 {
|
if len(cfg.Datastore.BackendTLSConfig.KeyFile) > 0 {
|
||||||
argsMap["etcd-keyfile"] = cfg.Datastore.KeyFile
|
argsMap["etcd-keyfile"] = cfg.Datastore.BackendTLSConfig.KeyFile
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -363,9 +363,9 @@ func (e *ETCD) Register(ctx context.Context, config *config.Control, handler htt
|
|||||||
}
|
}
|
||||||
e.address = address
|
e.address = address
|
||||||
e.config.Datastore.Endpoint = endpoint
|
e.config.Datastore.Endpoint = endpoint
|
||||||
e.config.Datastore.Config.CAFile = e.runtime.ETCDServerCA
|
e.config.Datastore.BackendTLSConfig.CAFile = e.runtime.ETCDServerCA
|
||||||
e.config.Datastore.Config.CertFile = e.runtime.ClientETCDCert
|
e.config.Datastore.BackendTLSConfig.CertFile = e.runtime.ClientETCDCert
|
||||||
e.config.Datastore.Config.KeyFile = e.runtime.ClientETCDKey
|
e.config.Datastore.BackendTLSConfig.KeyFile = e.runtime.ClientETCDKey
|
||||||
|
|
||||||
if err := e.setName(false); err != nil {
|
if err := e.setName(false); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
118
vendor/github.com/google/uuid/null.go
generated
vendored
Normal file
118
vendor/github.com/google/uuid/null.go
generated
vendored
Normal file
@ -0,0 +1,118 @@
|
|||||||
|
// Copyright 2021 Google Inc. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package uuid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"database/sql/driver"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
var jsonNull = []byte("null")
|
||||||
|
|
||||||
|
// NullUUID represents a UUID that may be null.
|
||||||
|
// NullUUID implements the SQL driver.Scanner interface so
|
||||||
|
// it can be used as a scan destination:
|
||||||
|
//
|
||||||
|
// var u uuid.NullUUID
|
||||||
|
// err := db.QueryRow("SELECT name FROM foo WHERE id=?", id).Scan(&u)
|
||||||
|
// ...
|
||||||
|
// if u.Valid {
|
||||||
|
// // use u.UUID
|
||||||
|
// } else {
|
||||||
|
// // NULL value
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
type NullUUID struct {
|
||||||
|
UUID UUID
|
||||||
|
Valid bool // Valid is true if UUID is not NULL
|
||||||
|
}
|
||||||
|
|
||||||
|
// Scan implements the SQL driver.Scanner interface.
|
||||||
|
func (nu *NullUUID) Scan(value interface{}) error {
|
||||||
|
if value == nil {
|
||||||
|
nu.UUID, nu.Valid = Nil, false
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
err := nu.UUID.Scan(value)
|
||||||
|
if err != nil {
|
||||||
|
nu.Valid = false
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
nu.Valid = true
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Value implements the driver Valuer interface.
|
||||||
|
func (nu NullUUID) Value() (driver.Value, error) {
|
||||||
|
if !nu.Valid {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
// Delegate to UUID Value function
|
||||||
|
return nu.UUID.Value()
|
||||||
|
}
|
||||||
|
|
||||||
|
// MarshalBinary implements encoding.BinaryMarshaler.
|
||||||
|
func (nu NullUUID) MarshalBinary() ([]byte, error) {
|
||||||
|
if nu.Valid {
|
||||||
|
return nu.UUID[:], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return []byte(nil), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalBinary implements encoding.BinaryUnmarshaler.
|
||||||
|
func (nu *NullUUID) UnmarshalBinary(data []byte) error {
|
||||||
|
if len(data) != 16 {
|
||||||
|
return fmt.Errorf("invalid UUID (got %d bytes)", len(data))
|
||||||
|
}
|
||||||
|
copy(nu.UUID[:], data)
|
||||||
|
nu.Valid = true
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MarshalText implements encoding.TextMarshaler.
|
||||||
|
func (nu NullUUID) MarshalText() ([]byte, error) {
|
||||||
|
if nu.Valid {
|
||||||
|
return nu.UUID.MarshalText()
|
||||||
|
}
|
||||||
|
|
||||||
|
return jsonNull, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalText implements encoding.TextUnmarshaler.
|
||||||
|
func (nu *NullUUID) UnmarshalText(data []byte) error {
|
||||||
|
id, err := ParseBytes(data)
|
||||||
|
if err != nil {
|
||||||
|
nu.Valid = false
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
nu.UUID = id
|
||||||
|
nu.Valid = true
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MarshalJSON implements json.Marshaler.
|
||||||
|
func (nu NullUUID) MarshalJSON() ([]byte, error) {
|
||||||
|
if nu.Valid {
|
||||||
|
return json.Marshal(nu.UUID)
|
||||||
|
}
|
||||||
|
|
||||||
|
return jsonNull, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UnmarshalJSON implements json.Unmarshaler.
|
||||||
|
func (nu *NullUUID) UnmarshalJSON(data []byte) error {
|
||||||
|
if bytes.Equal(data, jsonNull) {
|
||||||
|
*nu = NullUUID{}
|
||||||
|
return nil // valid null UUID
|
||||||
|
}
|
||||||
|
err := json.Unmarshal(data, &nu.UUID)
|
||||||
|
nu.Valid = err == nil
|
||||||
|
return err
|
||||||
|
}
|
18
vendor/github.com/k3s-io/kine/pkg/drivers/generic/generic.go
generated
vendored
18
vendor/github.com/k3s-io/kine/pkg/drivers/generic/generic.go
generated
vendored
@ -3,6 +3,7 @@ package generic
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"database/sql"
|
"database/sql"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strconv"
|
"strconv"
|
||||||
@ -12,6 +13,7 @@ import (
|
|||||||
|
|
||||||
"github.com/Rican7/retry/backoff"
|
"github.com/Rican7/retry/backoff"
|
||||||
"github.com/Rican7/retry/strategy"
|
"github.com/Rican7/retry/strategy"
|
||||||
|
"github.com/k3s-io/kine/pkg/server"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -19,6 +21,9 @@ const (
|
|||||||
defaultMaxIdleConns = 2 // copied from database/sql
|
defaultMaxIdleConns = 2 // copied from database/sql
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ server.Dialect = (*Generic)(nil)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
columns = "kv.id AS theid, kv.name, kv.created, kv.deleted, kv.create_revision, kv.prev_revision, kv.lease, kv.value, kv.old_value"
|
columns = "kv.id AS theid, kv.name, kv.created, kv.deleted, kv.create_revision, kv.prev_revision, kv.lease, kv.value, kv.old_value"
|
||||||
revSQL = `
|
revSQL = `
|
||||||
@ -92,6 +97,7 @@ type Generic struct {
|
|||||||
InsertSQL string
|
InsertSQL string
|
||||||
FillSQL string
|
FillSQL string
|
||||||
InsertLastInsertIDSQL string
|
InsertLastInsertIDSQL string
|
||||||
|
GetSizeSQL string
|
||||||
Retry ErrRetry
|
Retry ErrRetry
|
||||||
TranslateErr TranslateErr
|
TranslateErr TranslateErr
|
||||||
}
|
}
|
||||||
@ -393,3 +399,15 @@ func (d *Generic) Insert(ctx context.Context, key string, create, delete bool, c
|
|||||||
err = row.Scan(&id)
|
err = row.Scan(&id)
|
||||||
return id, err
|
return id, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (d *Generic) GetSize(ctx context.Context) (int64, error) {
|
||||||
|
if d.GetSizeSQL == "" {
|
||||||
|
return 0, errors.New("driver does not support size reporting")
|
||||||
|
}
|
||||||
|
var size int64
|
||||||
|
row := d.queryRow(ctx, d.GetSizeSQL)
|
||||||
|
if err := row.Scan(&size); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return size, nil
|
||||||
|
}
|
||||||
|
6
vendor/github.com/k3s-io/kine/pkg/drivers/generic/tx.go
generated
vendored
6
vendor/github.com/k3s-io/kine/pkg/drivers/generic/tx.go
generated
vendored
@ -4,15 +4,19 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"database/sql"
|
"database/sql"
|
||||||
|
|
||||||
|
"github.com/k3s-io/kine/pkg/server"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ server.Transaction = (*Tx)(nil)
|
||||||
|
|
||||||
type Tx struct {
|
type Tx struct {
|
||||||
x *sql.Tx
|
x *sql.Tx
|
||||||
d *Generic
|
d *Generic
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *Generic) BeginTx(ctx context.Context, opts *sql.TxOptions) (*Tx, error) {
|
func (d *Generic) BeginTx(ctx context.Context, opts *sql.TxOptions) (server.Transaction, error) {
|
||||||
logrus.Tracef("TX BEGIN")
|
logrus.Tracef("TX BEGIN")
|
||||||
x, err := d.DB.BeginTx(ctx, opts)
|
x, err := d.DB.BeginTx(ctx, opts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
4
vendor/github.com/k3s-io/kine/pkg/drivers/mysql/mysql.go
generated
vendored
4
vendor/github.com/k3s-io/kine/pkg/drivers/mysql/mysql.go
generated
vendored
@ -68,6 +68,10 @@ func New(ctx context.Context, dataSourceName string, tlsInfo tls.Config, connPoo
|
|||||||
}
|
}
|
||||||
|
|
||||||
dialect.LastInsertID = true
|
dialect.LastInsertID = true
|
||||||
|
dialect.GetSizeSQL = `
|
||||||
|
SELECT SUM(data_length + index_length)
|
||||||
|
FROM information_schema.TABLES
|
||||||
|
WHERE table_schema = DATABASE() AND table_name = 'kine'`
|
||||||
dialect.CompactSQL = `
|
dialect.CompactSQL = `
|
||||||
DELETE kv FROM kine AS kv
|
DELETE kv FROM kine AS kv
|
||||||
INNER JOIN (
|
INNER JOIN (
|
||||||
|
1
vendor/github.com/k3s-io/kine/pkg/drivers/pgsql/pgsql.go
generated
vendored
1
vendor/github.com/k3s-io/kine/pkg/drivers/pgsql/pgsql.go
generated
vendored
@ -58,6 +58,7 @@ func New(ctx context.Context, dataSourceName string, tlsInfo tls.Config, connPoo
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
dialect.GetSizeSQL = `SELECT pg_total_relation_size('kine')`
|
||||||
dialect.CompactSQL = `
|
dialect.CompactSQL = `
|
||||||
DELETE FROM kine AS kv
|
DELETE FROM kine AS kv
|
||||||
USING (
|
USING (
|
||||||
|
1
vendor/github.com/k3s-io/kine/pkg/drivers/sqlite/sqlite.go
generated
vendored
1
vendor/github.com/k3s-io/kine/pkg/drivers/sqlite/sqlite.go
generated
vendored
@ -61,6 +61,7 @@ func NewVariant(ctx context.Context, driverName, dataSourceName string, connPool
|
|||||||
}
|
}
|
||||||
|
|
||||||
dialect.LastInsertID = true
|
dialect.LastInsertID = true
|
||||||
|
dialect.GetSizeSQL = `SELECT SUM(pgsize) FROM dbstat`
|
||||||
dialect.CompactSQL = `
|
dialect.CompactSQL = `
|
||||||
DELETE FROM kine AS kv
|
DELETE FROM kine AS kv
|
||||||
WHERE
|
WHERE
|
||||||
|
140
vendor/github.com/k3s-io/kine/pkg/endpoint/endpoint.go
generated
vendored
140
vendor/github.com/k3s-io/kine/pkg/endpoint/endpoint.go
generated
vendored
@ -16,8 +16,10 @@ import (
|
|||||||
"github.com/k3s-io/kine/pkg/tls"
|
"github.com/k3s-io/kine/pkg/tls"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
|
"github.com/soheilhy/cmux"
|
||||||
"go.etcd.io/etcd/server/v3/embed"
|
"go.etcd.io/etcd/server/v3/embed"
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/credentials"
|
||||||
"google.golang.org/grpc/keepalive"
|
"google.golang.org/grpc/keepalive"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -35,8 +37,8 @@ type Config struct {
|
|||||||
Listener string
|
Listener string
|
||||||
Endpoint string
|
Endpoint string
|
||||||
ConnectionPoolConfig generic.ConnectionPoolConfig
|
ConnectionPoolConfig generic.ConnectionPoolConfig
|
||||||
|
ServerTLSConfig tls.Config
|
||||||
tls.Config
|
BackendTLSConfig tls.Config
|
||||||
}
|
}
|
||||||
|
|
||||||
type ETCDConfig struct {
|
type ETCDConfig struct {
|
||||||
@ -50,7 +52,7 @@ func Listen(ctx context.Context, config Config) (ETCDConfig, error) {
|
|||||||
if driver == ETCDBackend {
|
if driver == ETCDBackend {
|
||||||
return ETCDConfig{
|
return ETCDConfig{
|
||||||
Endpoints: strings.Split(config.Endpoint, ","),
|
Endpoints: strings.Split(config.Endpoint, ","),
|
||||||
TLSConfig: config.Config,
|
TLSConfig: config.BackendTLSConfig,
|
||||||
LeaderElect: true,
|
LeaderElect: true,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
@ -64,38 +66,108 @@ func Listen(ctx context.Context, config Config) (ETCDConfig, error) {
|
|||||||
return ETCDConfig{}, errors.Wrap(err, "starting kine backend")
|
return ETCDConfig{}, errors.Wrap(err, "starting kine backend")
|
||||||
}
|
}
|
||||||
|
|
||||||
listen := config.Listener
|
// set up GRPC server and register services
|
||||||
if listen == "" {
|
b := server.New(backend, endpointScheme(config))
|
||||||
listen = KineSocket
|
grpcServer, err := grpcServer(config)
|
||||||
|
if err != nil {
|
||||||
|
return ETCDConfig{}, errors.Wrap(err, "creating GRPC server")
|
||||||
}
|
}
|
||||||
|
|
||||||
b := server.New(backend)
|
|
||||||
grpcServer := grpcServer(config)
|
|
||||||
b.Register(grpcServer)
|
b.Register(grpcServer)
|
||||||
|
|
||||||
listener, err := createListener(listen)
|
// set up HTTP server with basic mux
|
||||||
|
httpServer := httpServer()
|
||||||
|
|
||||||
|
// Create raw listener and wrap in cmux for protocol switching
|
||||||
|
listener, err := createListener(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return ETCDConfig{}, err
|
return ETCDConfig{}, errors.Wrap(err, "creating listener")
|
||||||
|
}
|
||||||
|
m := cmux.New(listener)
|
||||||
|
|
||||||
|
if config.ServerTLSConfig.CertFile != "" && config.ServerTLSConfig.KeyFile != "" {
|
||||||
|
// If using TLS, wrap handler in GRPC/HTTP switching handler and serve TLS
|
||||||
|
httpServer.Handler = grpcHandlerFunc(grpcServer, httpServer.Handler)
|
||||||
|
anyl := m.Match(cmux.Any())
|
||||||
|
go func() {
|
||||||
|
if err := httpServer.ServeTLS(anyl, config.ServerTLSConfig.CertFile, config.ServerTLSConfig.KeyFile); err != nil {
|
||||||
|
logrus.Errorf("Kine TLS server shutdown: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
} else {
|
||||||
|
// If using plaintext, use cmux matching for GRPC/HTTP switching
|
||||||
|
grpcl := m.Match(cmux.HTTP2())
|
||||||
|
go func() {
|
||||||
|
if err := grpcServer.Serve(grpcl); err != nil {
|
||||||
|
logrus.Errorf("Kine GRPC server shutdown: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
httpl := m.Match(cmux.HTTP1())
|
||||||
|
go func() {
|
||||||
|
if err := httpServer.Serve(httpl); err != nil {
|
||||||
|
logrus.Errorf("Kine HTTP server shutdown: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
if err := grpcServer.Serve(listener); err != nil {
|
if err := m.Serve(); err != nil {
|
||||||
logrus.Errorf("Kine server shutdown: %v", err)
|
logrus.Errorf("Kine listener shutdown: %v", err)
|
||||||
}
|
|
||||||
<-ctx.Done()
|
|
||||||
grpcServer.Stop()
|
grpcServer.Stop()
|
||||||
listener.Close()
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
endpoint := endpointURL(config, listener)
|
||||||
|
logrus.Infof("Kine available at %s", endpoint)
|
||||||
|
|
||||||
return ETCDConfig{
|
return ETCDConfig{
|
||||||
LeaderElect: leaderelect,
|
LeaderElect: leaderelect,
|
||||||
Endpoints: []string{listen},
|
Endpoints: []string{endpoint},
|
||||||
TLSConfig: tls.Config{},
|
TLSConfig: tls.Config{},
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func createListener(listen string) (ret net.Listener, rerr error) {
|
// endpointURL returns a URI string suitable for use as a local etcd endpoint.
|
||||||
network, address := networkAndAddress(listen)
|
// For TCP sockets, it is assumed that the port can be reached via the loopback address.
|
||||||
|
func endpointURL(config Config, listener net.Listener) string {
|
||||||
|
scheme := endpointScheme(config)
|
||||||
|
address := listener.Addr().String()
|
||||||
|
if !strings.HasPrefix(scheme, "unix") {
|
||||||
|
_, port, err := net.SplitHostPort(address)
|
||||||
|
if err != nil {
|
||||||
|
logrus.Warnf("failed to get listener port: %v", err)
|
||||||
|
port = "2379"
|
||||||
|
}
|
||||||
|
address = "127.0.0.1:" + port
|
||||||
|
}
|
||||||
|
|
||||||
|
return scheme + "://" + address
|
||||||
|
}
|
||||||
|
|
||||||
|
// endpointScheme returns the URI scheme for the listener specified by the configuration.
|
||||||
|
func endpointScheme(config Config) string {
|
||||||
|
if config.Listener == "" {
|
||||||
|
config.Listener = KineSocket
|
||||||
|
}
|
||||||
|
|
||||||
|
network, _ := networkAndAddress(config.Listener)
|
||||||
|
if network != "unix" {
|
||||||
|
network = "http"
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.ServerTLSConfig.CertFile != "" && config.ServerTLSConfig.KeyFile != "" {
|
||||||
|
// yes, etcd supports the "unixs" scheme for TLS over unix sockets
|
||||||
|
network += "s"
|
||||||
|
}
|
||||||
|
|
||||||
|
return network
|
||||||
|
}
|
||||||
|
|
||||||
|
// createListener returns a listener bound to the requested protocol and address.
|
||||||
|
func createListener(config Config) (ret net.Listener, rerr error) {
|
||||||
|
if config.Listener == "" {
|
||||||
|
config.Listener = KineSocket
|
||||||
|
}
|
||||||
|
network, address := networkAndAddress(config.Listener)
|
||||||
|
|
||||||
if network == "unix" {
|
if network == "unix" {
|
||||||
if err := os.Remove(address); err != nil && !os.IsNotExist(err) {
|
if err := os.Remove(address); err != nil && !os.IsNotExist(err) {
|
||||||
@ -106,16 +178,20 @@ func createListener(listen string) (ret net.Listener, rerr error) {
|
|||||||
rerr = err
|
rerr = err
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
} else {
|
||||||
|
network = "tcp"
|
||||||
}
|
}
|
||||||
|
|
||||||
logrus.Infof("Kine listening on %s://%s", network, address)
|
|
||||||
return net.Listen(network, address)
|
return net.Listen(network, address)
|
||||||
}
|
}
|
||||||
|
|
||||||
func grpcServer(config Config) *grpc.Server {
|
// grpcServer returns either a preconfigured GRPC server, or builds a new GRPC
|
||||||
|
// server using upstream keepalive defaults plus the local Server TLS configuration.
|
||||||
|
func grpcServer(config Config) (*grpc.Server, error) {
|
||||||
if config.GRPCServer != nil {
|
if config.GRPCServer != nil {
|
||||||
return config.GRPCServer
|
return config.GRPCServer, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
gopts := []grpc.ServerOption{
|
gopts := []grpc.ServerOption{
|
||||||
grpc.KeepaliveEnforcementPolicy(keepalive.EnforcementPolicy{
|
grpc.KeepaliveEnforcementPolicy(keepalive.EnforcementPolicy{
|
||||||
MinTime: embed.DefaultGRPCKeepAliveMinTime,
|
MinTime: embed.DefaultGRPCKeepAliveMinTime,
|
||||||
@ -127,9 +203,20 @@ func grpcServer(config Config) *grpc.Server {
|
|||||||
}),
|
}),
|
||||||
}
|
}
|
||||||
|
|
||||||
return grpc.NewServer(gopts...)
|
if config.ServerTLSConfig.CertFile != "" && config.ServerTLSConfig.KeyFile != "" {
|
||||||
|
creds, err := credentials.NewServerTLSFromFile(config.ServerTLSConfig.CertFile, config.ServerTLSConfig.KeyFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
gopts = append(gopts, grpc.Creds(creds))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return grpc.NewServer(gopts...), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getKineStorageBackend parses the driver string, and returns a bool
|
||||||
|
// indicating whether the backend requires leader election, and a suitable
|
||||||
|
// backend datastore connection.
|
||||||
func getKineStorageBackend(ctx context.Context, driver, dsn string, cfg Config) (bool, server.Backend, error) {
|
func getKineStorageBackend(ctx context.Context, driver, dsn string, cfg Config) (bool, server.Backend, error) {
|
||||||
var (
|
var (
|
||||||
backend server.Backend
|
backend server.Backend
|
||||||
@ -143,9 +230,9 @@ func getKineStorageBackend(ctx context.Context, driver, dsn string, cfg Config)
|
|||||||
case DQLiteBackend:
|
case DQLiteBackend:
|
||||||
backend, err = dqlite.New(ctx, dsn, cfg.ConnectionPoolConfig)
|
backend, err = dqlite.New(ctx, dsn, cfg.ConnectionPoolConfig)
|
||||||
case PostgresBackend:
|
case PostgresBackend:
|
||||||
backend, err = pgsql.New(ctx, dsn, cfg.Config, cfg.ConnectionPoolConfig)
|
backend, err = pgsql.New(ctx, dsn, cfg.BackendTLSConfig, cfg.ConnectionPoolConfig)
|
||||||
case MySQLBackend:
|
case MySQLBackend:
|
||||||
backend, err = mysql.New(ctx, dsn, cfg.Config, cfg.ConnectionPoolConfig)
|
backend, err = mysql.New(ctx, dsn, cfg.BackendTLSConfig, cfg.ConnectionPoolConfig)
|
||||||
default:
|
default:
|
||||||
return false, nil, fmt.Errorf("storage backend is not defined")
|
return false, nil, fmt.Errorf("storage backend is not defined")
|
||||||
}
|
}
|
||||||
@ -153,6 +240,7 @@ func getKineStorageBackend(ctx context.Context, driver, dsn string, cfg Config)
|
|||||||
return leaderElect, backend, err
|
return leaderElect, backend, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ParseStorageEndpoint returns the driver name and endpoint string from a datastore endpoint URL.
|
||||||
func ParseStorageEndpoint(storageEndpoint string) (string, string) {
|
func ParseStorageEndpoint(storageEndpoint string) (string, string) {
|
||||||
network, address := networkAndAddress(storageEndpoint)
|
network, address := networkAndAddress(storageEndpoint)
|
||||||
switch network {
|
switch network {
|
||||||
@ -166,6 +254,8 @@ func ParseStorageEndpoint(storageEndpoint string) (string, string) {
|
|||||||
return network, address
|
return network, address
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// networkAndAddress crudely splits a URL string into network (scheme) and address,
|
||||||
|
// where the address includes everything after the scheme/authority separator.
|
||||||
func networkAndAddress(str string) (string, string) {
|
func networkAndAddress(str string) (string, string) {
|
||||||
parts := strings.SplitN(str, "://", 2)
|
parts := strings.SplitN(str, "://", 2)
|
||||||
if len(parts) > 1 {
|
if len(parts) > 1 {
|
||||||
|
66
vendor/github.com/k3s-io/kine/pkg/endpoint/http.go
generated
vendored
Normal file
66
vendor/github.com/k3s-io/kine/pkg/endpoint/http.go
generated
vendored
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
package endpoint
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
etcdVersion = []byte(`{"etcdserver":"3.5.0","etcdcluster":"3.5.0"}`)
|
||||||
|
versionPath = "/version"
|
||||||
|
)
|
||||||
|
|
||||||
|
// httpServer returns a HTTP server with the basic mux handler.
|
||||||
|
func httpServer() *http.Server {
|
||||||
|
// Set up root HTTP mux with basic response handlers
|
||||||
|
mux := http.NewServeMux()
|
||||||
|
handleBasic(mux)
|
||||||
|
|
||||||
|
return &http.Server{
|
||||||
|
Handler: mux,
|
||||||
|
ErrorLog: log.New(logrus.StandardLogger().Writer(), "kinehttp ", log.LstdFlags),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// handleBasic binds basic HTTP response handlers to a mux.
|
||||||
|
func handleBasic(mux *http.ServeMux) {
|
||||||
|
mux.HandleFunc(versionPath, serveVersion)
|
||||||
|
}
|
||||||
|
|
||||||
|
// serveVersion responds with a canned JSON version response.
|
||||||
|
func serveVersion(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if !allowMethod(w, r, http.MethodGet) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
w.Write(etcdVersion)
|
||||||
|
}
|
||||||
|
|
||||||
|
// allowMethod returns true if a method is allowed, or false (after sending a
|
||||||
|
// MethodNotAllowed error to the client) if it is not.
|
||||||
|
func allowMethod(w http.ResponseWriter, r *http.Request, m string) bool {
|
||||||
|
if m == r.Method {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
w.Header().Set("Allow", m)
|
||||||
|
http.Error(w, "Method Not Allowed", http.StatusMethodNotAllowed)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// grpcHandlerFunc takes a GRPC server and HTTP handler, and returns a handler
|
||||||
|
// function that will route GRPC requests to the GRPC server, and everything
|
||||||
|
// else to the HTTP handler. This is based on sample code provided in the GRPC
|
||||||
|
// ServeHTTP documentation for sharing a port between GRPC and HTTP handlers.
|
||||||
|
func grpcHandlerFunc(grpcServer *grpc.Server, httpHandler http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.ProtoMajor == 2 && strings.HasPrefix(r.Header.Get("Content-Type"), "application/grpc") {
|
||||||
|
grpcServer.ServeHTTP(w, r)
|
||||||
|
} else {
|
||||||
|
httpHandler.ServeHTTP(w, r)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
5
vendor/github.com/k3s-io/kine/pkg/logstructured/logstructured.go
generated
vendored
5
vendor/github.com/k3s-io/kine/pkg/logstructured/logstructured.go
generated
vendored
@ -17,6 +17,7 @@ type Log interface {
|
|||||||
Watch(ctx context.Context, prefix string) <-chan []*server.Event
|
Watch(ctx context.Context, prefix string) <-chan []*server.Event
|
||||||
Count(ctx context.Context, prefix string) (int64, int64, error)
|
Count(ctx context.Context, prefix string) (int64, int64, error)
|
||||||
Append(ctx context.Context, event *server.Event) (int64, error)
|
Append(ctx context.Context, event *server.Event) (int64, error)
|
||||||
|
DbSize(ctx context.Context) (int64, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
type LogStructured struct {
|
type LogStructured struct {
|
||||||
@ -367,3 +368,7 @@ func filter(events []*server.Event, rev int64) []*server.Event {
|
|||||||
|
|
||||||
return events
|
return events
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (l *LogStructured) DbSize(ctx context.Context) (int64, error) {
|
||||||
|
return l.log.DbSize(ctx)
|
||||||
|
}
|
||||||
|
26
vendor/github.com/k3s-io/kine/pkg/logstructured/sqllog/sql.go
generated
vendored
26
vendor/github.com/k3s-io/kine/pkg/logstructured/sqllog/sql.go
generated
vendored
@ -7,7 +7,6 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/k3s-io/kine/pkg/broadcaster"
|
"github.com/k3s-io/kine/pkg/broadcaster"
|
||||||
"github.com/k3s-io/kine/pkg/drivers/generic"
|
|
||||||
"github.com/k3s-io/kine/pkg/server"
|
"github.com/k3s-io/kine/pkg/server"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
@ -22,13 +21,13 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type SQLLog struct {
|
type SQLLog struct {
|
||||||
d Dialect
|
d server.Dialect
|
||||||
broadcaster broadcaster.Broadcaster
|
broadcaster broadcaster.Broadcaster
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
notify chan int64
|
notify chan int64
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(d Dialect) *SQLLog {
|
func New(d server.Dialect) *SQLLog {
|
||||||
l := &SQLLog{
|
l := &SQLLog{
|
||||||
d: d,
|
d: d,
|
||||||
notify: make(chan int64, 1024),
|
notify: make(chan int64, 1024),
|
||||||
@ -36,23 +35,6 @@ func New(d Dialect) *SQLLog {
|
|||||||
return l
|
return l
|
||||||
}
|
}
|
||||||
|
|
||||||
type Dialect interface {
|
|
||||||
ListCurrent(ctx context.Context, prefix string, limit int64, includeDeleted bool) (*sql.Rows, error)
|
|
||||||
List(ctx context.Context, prefix, startKey string, limit, revision int64, includeDeleted bool) (*sql.Rows, error)
|
|
||||||
Count(ctx context.Context, prefix string) (int64, int64, error)
|
|
||||||
CurrentRevision(ctx context.Context) (int64, error)
|
|
||||||
After(ctx context.Context, prefix string, rev, limit int64) (*sql.Rows, error)
|
|
||||||
Insert(ctx context.Context, key string, create, delete bool, createRevision, previousRevision int64, ttl int64, value, prevValue []byte) (int64, error)
|
|
||||||
GetRevision(ctx context.Context, revision int64) (*sql.Rows, error)
|
|
||||||
DeleteRevision(ctx context.Context, revision int64) error
|
|
||||||
GetCompactRevision(ctx context.Context) (int64, error)
|
|
||||||
SetCompactRevision(ctx context.Context, revision int64) error
|
|
||||||
Compact(ctx context.Context, revision int64) (int64, error)
|
|
||||||
Fill(ctx context.Context, revision int64) error
|
|
||||||
IsFill(key string) bool
|
|
||||||
BeginTx(ctx context.Context, opts *sql.TxOptions) (*generic.Tx, error)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *SQLLog) Start(ctx context.Context) error {
|
func (s *SQLLog) Start(ctx context.Context) error {
|
||||||
s.ctx = ctx
|
s.ctx = ctx
|
||||||
return s.compactStart(s.ctx)
|
return s.compactStart(s.ctx)
|
||||||
@ -568,3 +550,7 @@ func safeCompactRev(targetCompactRev int64, currentRev int64) int64 {
|
|||||||
}
|
}
|
||||||
return safeRev
|
return safeRev
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *SQLLog) DbSize(ctx context.Context) (int64, error) {
|
||||||
|
return s.d.GetSize(ctx)
|
||||||
|
}
|
||||||
|
64
vendor/github.com/k3s-io/kine/pkg/server/cluster.go
generated
vendored
Normal file
64
vendor/github.com/k3s-io/kine/pkg/server/cluster.go
generated
vendored
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
|
"google.golang.org/grpc/metadata"
|
||||||
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ etcdserverpb.ClusterServer = (*KVServerBridge)(nil)
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MemberAdd(context.Context, *etcdserverpb.MemberAddRequest) (*etcdserverpb.MemberAddResponse, error) {
|
||||||
|
return nil, fmt.Errorf("member add is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MemberRemove(context.Context, *etcdserverpb.MemberRemoveRequest) (*etcdserverpb.MemberRemoveResponse, error) {
|
||||||
|
return nil, fmt.Errorf("member remove is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MemberUpdate(context.Context, *etcdserverpb.MemberUpdateRequest) (*etcdserverpb.MemberUpdateResponse, error) {
|
||||||
|
return nil, fmt.Errorf("member update is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MemberList(ctx context.Context, r *etcdserverpb.MemberListRequest) (*etcdserverpb.MemberListResponse, error) {
|
||||||
|
listenURL := authorityURL(ctx, s.limited.scheme)
|
||||||
|
return &etcdserverpb.MemberListResponse{
|
||||||
|
Header: &etcdserverpb.ResponseHeader{},
|
||||||
|
Members: []*etcdserverpb.Member{
|
||||||
|
{
|
||||||
|
Name: "kine",
|
||||||
|
ClientURLs: []string{listenURL},
|
||||||
|
PeerURLs: []string{listenURL},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MemberPromote(context.Context, *etcdserverpb.MemberPromoteRequest) (*etcdserverpb.MemberPromoteResponse, error) {
|
||||||
|
return nil, fmt.Errorf("member promote is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
// authorityURL returns the URL of the authority (host) that the client connected to.
|
||||||
|
// If no scheme is included in the authority data, the provided scheme is used. If no
|
||||||
|
// authority data is provided, the default etcd endpoint is used.
|
||||||
|
func authorityURL(ctx context.Context, scheme string) string {
|
||||||
|
authority := "127.0.0.1:2379"
|
||||||
|
if md, ok := metadata.FromIncomingContext(ctx); ok {
|
||||||
|
authList := md.Get(":authority")
|
||||||
|
if len(authList) > 0 {
|
||||||
|
authority = authList[0]
|
||||||
|
// etcd v3.5 encodes the endpoint address list as "#initially=[ADDRESS1;ADDRESS2]"
|
||||||
|
if strings.HasPrefix(authority, "#initially=[") {
|
||||||
|
authority = strings.TrimPrefix(authority, "#initially=[")
|
||||||
|
authority = strings.TrimSuffix(authority, "]")
|
||||||
|
authority = strings.ReplaceAll(authority, ";", ",")
|
||||||
|
return authority
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return scheme + "://" + authority
|
||||||
|
}
|
7
vendor/github.com/k3s-io/kine/pkg/server/dbsize.go
generated
vendored
Normal file
7
vendor/github.com/k3s-io/kine/pkg/server/dbsize.go
generated
vendored
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import "context"
|
||||||
|
|
||||||
|
func (l *LimitedServer) dbSize(ctx context.Context) (int64, error) {
|
||||||
|
return l.backend.DbSize(ctx)
|
||||||
|
}
|
126
vendor/github.com/k3s-io/kine/pkg/server/kv.go
generated
vendored
Normal file
126
vendor/github.com/k3s-io/kine/pkg/server/kv.go
generated
vendored
Normal file
@ -0,0 +1,126 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
|
"go.etcd.io/etcd/api/v3/mvccpb"
|
||||||
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ etcdserverpb.KVServer = (*KVServerBridge)(nil)
|
||||||
|
|
||||||
|
func (k *KVServerBridge) Range(ctx context.Context, r *etcdserverpb.RangeRequest) (*etcdserverpb.RangeResponse, error) {
|
||||||
|
if r.KeysOnly {
|
||||||
|
return nil, unsupported("keysOnly")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.MaxCreateRevision != 0 {
|
||||||
|
return nil, unsupported("maxCreateRevision")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.SortOrder != 0 {
|
||||||
|
return nil, unsupported("sortOrder")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.SortTarget != 0 {
|
||||||
|
return nil, unsupported("sortTarget")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.Serializable {
|
||||||
|
return nil, unsupported("serializable")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.KeysOnly {
|
||||||
|
return nil, unsupported("keysOnly")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.MinModRevision != 0 {
|
||||||
|
return nil, unsupported("minModRevision")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.MinCreateRevision != 0 {
|
||||||
|
return nil, unsupported("minCreateRevision")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.MaxCreateRevision != 0 {
|
||||||
|
return nil, unsupported("maxCreateRevision")
|
||||||
|
}
|
||||||
|
|
||||||
|
if r.MaxModRevision != 0 {
|
||||||
|
return nil, unsupported("maxModRevision")
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := k.limited.Range(ctx, r)
|
||||||
|
if err != nil {
|
||||||
|
logrus.Errorf("error while range on %s %s: %v", r.Key, r.RangeEnd, err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rangeResponse := &etcdserverpb.RangeResponse{
|
||||||
|
More: resp.More,
|
||||||
|
Count: resp.Count,
|
||||||
|
Header: resp.Header,
|
||||||
|
Kvs: toKVs(resp.Kvs...),
|
||||||
|
}
|
||||||
|
|
||||||
|
return rangeResponse, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func toKVs(kvs ...*KeyValue) []*mvccpb.KeyValue {
|
||||||
|
if len(kvs) == 0 || kvs[0] == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ret := make([]*mvccpb.KeyValue, 0, len(kvs))
|
||||||
|
for _, kv := range kvs {
|
||||||
|
newKV := toKV(kv)
|
||||||
|
if newKV != nil {
|
||||||
|
ret = append(ret, newKV)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ret
|
||||||
|
}
|
||||||
|
|
||||||
|
func toKV(kv *KeyValue) *mvccpb.KeyValue {
|
||||||
|
if kv == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return &mvccpb.KeyValue{
|
||||||
|
Key: []byte(kv.Key),
|
||||||
|
Value: kv.Value,
|
||||||
|
Lease: kv.Lease,
|
||||||
|
CreateRevision: kv.CreateRevision,
|
||||||
|
ModRevision: kv.ModRevision,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (k *KVServerBridge) Put(ctx context.Context, r *etcdserverpb.PutRequest) (*etcdserverpb.PutResponse, error) {
|
||||||
|
return nil, fmt.Errorf("put is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (k *KVServerBridge) DeleteRange(ctx context.Context, r *etcdserverpb.DeleteRangeRequest) (*etcdserverpb.DeleteRangeResponse, error) {
|
||||||
|
return nil, fmt.Errorf("delete is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (k *KVServerBridge) Txn(ctx context.Context, r *etcdserverpb.TxnRequest) (*etcdserverpb.TxnResponse, error) {
|
||||||
|
res, err := k.limited.Txn(ctx, r)
|
||||||
|
if err != nil {
|
||||||
|
logrus.Errorf("error in txn: %v", err)
|
||||||
|
}
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (k *KVServerBridge) Compact(ctx context.Context, r *etcdserverpb.CompactionRequest) (*etcdserverpb.CompactionResponse, error) {
|
||||||
|
return &etcdserverpb.CompactionResponse{
|
||||||
|
Header: &etcdserverpb.ResponseHeader{
|
||||||
|
Revision: r.Revision,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func unsupported(field string) error {
|
||||||
|
return fmt.Errorf("%s is unsupported", field)
|
||||||
|
}
|
3
vendor/github.com/k3s-io/kine/pkg/server/lease.go
generated
vendored
3
vendor/github.com/k3s-io/kine/pkg/server/lease.go
generated
vendored
@ -7,6 +7,9 @@ import (
|
|||||||
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ etcdserverpb.LeaseServer = (*KVServerBridge)(nil)
|
||||||
|
|
||||||
func (s *KVServerBridge) LeaseGrant(ctx context.Context, req *etcdserverpb.LeaseGrantRequest) (*etcdserverpb.LeaseGrantResponse, error) {
|
func (s *KVServerBridge) LeaseGrant(ctx context.Context, req *etcdserverpb.LeaseGrantRequest) (*etcdserverpb.LeaseGrantResponse, error) {
|
||||||
return &etcdserverpb.LeaseGrantResponse{
|
return &etcdserverpb.LeaseGrantResponse{
|
||||||
Header: &etcdserverpb.ResponseHeader{},
|
Header: &etcdserverpb.ResponseHeader{},
|
||||||
|
1
vendor/github.com/k3s-io/kine/pkg/server/limited.go
generated
vendored
1
vendor/github.com/k3s-io/kine/pkg/server/limited.go
generated
vendored
@ -9,6 +9,7 @@ import (
|
|||||||
|
|
||||||
type LimitedServer struct {
|
type LimitedServer struct {
|
||||||
backend Backend
|
backend Backend
|
||||||
|
scheme string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *LimitedServer) Range(ctx context.Context, r *etcdserverpb.RangeRequest) (*RangeResponse, error) {
|
func (l *LimitedServer) Range(ctx context.Context, r *etcdserverpb.RangeRequest) (*RangeResponse, error) {
|
||||||
|
50
vendor/github.com/k3s-io/kine/pkg/server/maintenance.go
generated
vendored
Normal file
50
vendor/github.com/k3s-io/kine/pkg/server/maintenance.go
generated
vendored
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
|
)
|
||||||
|
|
||||||
|
// explicit interface check
|
||||||
|
var _ etcdserverpb.MaintenanceServer = (*KVServerBridge)(nil)
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Alarm(context.Context, *etcdserverpb.AlarmRequest) (*etcdserverpb.AlarmResponse, error) {
|
||||||
|
return nil, fmt.Errorf("alarm is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Status(ctx context.Context, r *etcdserverpb.StatusRequest) (*etcdserverpb.StatusResponse, error) {
|
||||||
|
size, err := s.limited.dbSize(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &etcdserverpb.StatusResponse{
|
||||||
|
Header: &etcdserverpb.ResponseHeader{},
|
||||||
|
DbSize: size,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Defragment(context.Context, *etcdserverpb.DefragmentRequest) (*etcdserverpb.DefragmentResponse, error) {
|
||||||
|
return nil, fmt.Errorf("defragment is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Hash(context.Context, *etcdserverpb.HashRequest) (*etcdserverpb.HashResponse, error) {
|
||||||
|
return nil, fmt.Errorf("hash is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) HashKV(context.Context, *etcdserverpb.HashKVRequest) (*etcdserverpb.HashKVResponse, error) {
|
||||||
|
return nil, fmt.Errorf("hash kv is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Snapshot(*etcdserverpb.SnapshotRequest, etcdserverpb.Maintenance_SnapshotServer) error {
|
||||||
|
return fmt.Errorf("snapshot is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) MoveLeader(context.Context, *etcdserverpb.MoveLeaderRequest) (*etcdserverpb.MoveLeaderResponse, error) {
|
||||||
|
return nil, fmt.Errorf("move leader is not supported")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *KVServerBridge) Downgrade(context.Context, *etcdserverpb.DowngradeRequest) (*etcdserverpb.DowngradeResponse, error) {
|
||||||
|
return nil, fmt.Errorf("downgrade is not supported")
|
||||||
|
}
|
128
vendor/github.com/k3s-io/kine/pkg/server/server.go
generated
vendored
128
vendor/github.com/k3s-io/kine/pkg/server/server.go
generated
vendored
@ -1,30 +1,21 @@
|
|||||||
package server
|
package server
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
"go.etcd.io/etcd/api/v3/etcdserverpb"
|
||||||
"go.etcd.io/etcd/api/v3/mvccpb"
|
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
"google.golang.org/grpc/health"
|
"google.golang.org/grpc/health"
|
||||||
healthpb "google.golang.org/grpc/health/grpc_health_v1"
|
healthpb "google.golang.org/grpc/health/grpc_health_v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
|
||||||
_ etcdserverpb.KVServer = (*KVServerBridge)(nil)
|
|
||||||
_ etcdserverpb.WatchServer = (*KVServerBridge)(nil)
|
|
||||||
)
|
|
||||||
|
|
||||||
type KVServerBridge struct {
|
type KVServerBridge struct {
|
||||||
limited *LimitedServer
|
limited *LimitedServer
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(backend Backend) *KVServerBridge {
|
func New(backend Backend, scheme string) *KVServerBridge {
|
||||||
return &KVServerBridge{
|
return &KVServerBridge{
|
||||||
limited: &LimitedServer{
|
limited: &LimitedServer{
|
||||||
backend: backend,
|
backend: backend,
|
||||||
|
scheme: scheme,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -33,121 +24,10 @@ func (k *KVServerBridge) Register(server *grpc.Server) {
|
|||||||
etcdserverpb.RegisterLeaseServer(server, k)
|
etcdserverpb.RegisterLeaseServer(server, k)
|
||||||
etcdserverpb.RegisterWatchServer(server, k)
|
etcdserverpb.RegisterWatchServer(server, k)
|
||||||
etcdserverpb.RegisterKVServer(server, k)
|
etcdserverpb.RegisterKVServer(server, k)
|
||||||
|
etcdserverpb.RegisterClusterServer(server, k)
|
||||||
|
etcdserverpb.RegisterMaintenanceServer(server, k)
|
||||||
|
|
||||||
hsrv := health.NewServer()
|
hsrv := health.NewServer()
|
||||||
hsrv.SetServingStatus("", healthpb.HealthCheckResponse_SERVING)
|
hsrv.SetServingStatus("", healthpb.HealthCheckResponse_SERVING)
|
||||||
healthpb.RegisterHealthServer(server, hsrv)
|
healthpb.RegisterHealthServer(server, hsrv)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (k *KVServerBridge) Range(ctx context.Context, r *etcdserverpb.RangeRequest) (*etcdserverpb.RangeResponse, error) {
|
|
||||||
if r.KeysOnly {
|
|
||||||
return nil, unsupported("keysOnly")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.MaxCreateRevision != 0 {
|
|
||||||
return nil, unsupported("maxCreateRevision")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.SortOrder != 0 {
|
|
||||||
return nil, unsupported("sortOrder")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.SortTarget != 0 {
|
|
||||||
return nil, unsupported("sortTarget")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.Serializable {
|
|
||||||
return nil, unsupported("serializable")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.KeysOnly {
|
|
||||||
return nil, unsupported("keysOnly")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.MinModRevision != 0 {
|
|
||||||
return nil, unsupported("minModRevision")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.MinCreateRevision != 0 {
|
|
||||||
return nil, unsupported("minCreateRevision")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.MaxCreateRevision != 0 {
|
|
||||||
return nil, unsupported("maxCreateRevision")
|
|
||||||
}
|
|
||||||
|
|
||||||
if r.MaxModRevision != 0 {
|
|
||||||
return nil, unsupported("maxModRevision")
|
|
||||||
}
|
|
||||||
|
|
||||||
resp, err := k.limited.Range(ctx, r)
|
|
||||||
if err != nil {
|
|
||||||
logrus.Errorf("error while range on %s %s: %v", r.Key, r.RangeEnd, err)
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
rangeResponse := &etcdserverpb.RangeResponse{
|
|
||||||
More: resp.More,
|
|
||||||
Count: resp.Count,
|
|
||||||
Header: resp.Header,
|
|
||||||
Kvs: toKVs(resp.Kvs...),
|
|
||||||
}
|
|
||||||
|
|
||||||
return rangeResponse, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func toKVs(kvs ...*KeyValue) []*mvccpb.KeyValue {
|
|
||||||
if len(kvs) == 0 || kvs[0] == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
ret := make([]*mvccpb.KeyValue, 0, len(kvs))
|
|
||||||
for _, kv := range kvs {
|
|
||||||
newKV := toKV(kv)
|
|
||||||
if newKV != nil {
|
|
||||||
ret = append(ret, newKV)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return ret
|
|
||||||
}
|
|
||||||
|
|
||||||
func toKV(kv *KeyValue) *mvccpb.KeyValue {
|
|
||||||
if kv == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
return &mvccpb.KeyValue{
|
|
||||||
Key: []byte(kv.Key),
|
|
||||||
Value: kv.Value,
|
|
||||||
Lease: kv.Lease,
|
|
||||||
CreateRevision: kv.CreateRevision,
|
|
||||||
ModRevision: kv.ModRevision,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (k *KVServerBridge) Put(ctx context.Context, r *etcdserverpb.PutRequest) (*etcdserverpb.PutResponse, error) {
|
|
||||||
return nil, fmt.Errorf("put is not supported")
|
|
||||||
}
|
|
||||||
|
|
||||||
func (k *KVServerBridge) DeleteRange(ctx context.Context, r *etcdserverpb.DeleteRangeRequest) (*etcdserverpb.DeleteRangeResponse, error) {
|
|
||||||
return nil, fmt.Errorf("delete is not supported")
|
|
||||||
}
|
|
||||||
|
|
||||||
func (k *KVServerBridge) Txn(ctx context.Context, r *etcdserverpb.TxnRequest) (*etcdserverpb.TxnResponse, error) {
|
|
||||||
res, err := k.limited.Txn(ctx, r)
|
|
||||||
if err != nil {
|
|
||||||
logrus.Errorf("error in txn: %v", err)
|
|
||||||
}
|
|
||||||
return res, err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (k *KVServerBridge) Compact(ctx context.Context, r *etcdserverpb.CompactionRequest) (*etcdserverpb.CompactionResponse, error) {
|
|
||||||
return &etcdserverpb.CompactionResponse{
|
|
||||||
Header: &etcdserverpb.ResponseHeader{
|
|
||||||
Revision: r.Revision,
|
|
||||||
},
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func unsupported(field string) error {
|
|
||||||
return fmt.Errorf("%s is unsupported", field)
|
|
||||||
}
|
|
||||||
|
33
vendor/github.com/k3s-io/kine/pkg/server/types.go
generated
vendored
33
vendor/github.com/k3s-io/kine/pkg/server/types.go
generated
vendored
@ -2,6 +2,7 @@ package server
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
"go.etcd.io/etcd/etcdserver/api/v3rpc/rpctypes"
|
"go.etcd.io/etcd/etcdserver/api/v3rpc/rpctypes"
|
||||||
)
|
)
|
||||||
@ -20,6 +21,38 @@ type Backend interface {
|
|||||||
Count(ctx context.Context, prefix string) (int64, int64, error)
|
Count(ctx context.Context, prefix string) (int64, int64, error)
|
||||||
Update(ctx context.Context, key string, value []byte, revision, lease int64) (int64, *KeyValue, bool, error)
|
Update(ctx context.Context, key string, value []byte, revision, lease int64) (int64, *KeyValue, bool, error)
|
||||||
Watch(ctx context.Context, key string, revision int64) <-chan []*Event
|
Watch(ctx context.Context, key string, revision int64) <-chan []*Event
|
||||||
|
DbSize(ctx context.Context) (int64, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type Dialect interface {
|
||||||
|
ListCurrent(ctx context.Context, prefix string, limit int64, includeDeleted bool) (*sql.Rows, error)
|
||||||
|
List(ctx context.Context, prefix, startKey string, limit, revision int64, includeDeleted bool) (*sql.Rows, error)
|
||||||
|
Count(ctx context.Context, prefix string) (int64, int64, error)
|
||||||
|
CurrentRevision(ctx context.Context) (int64, error)
|
||||||
|
After(ctx context.Context, prefix string, rev, limit int64) (*sql.Rows, error)
|
||||||
|
Insert(ctx context.Context, key string, create, delete bool, createRevision, previousRevision int64, ttl int64, value, prevValue []byte) (int64, error)
|
||||||
|
GetRevision(ctx context.Context, revision int64) (*sql.Rows, error)
|
||||||
|
DeleteRevision(ctx context.Context, revision int64) error
|
||||||
|
GetCompactRevision(ctx context.Context) (int64, error)
|
||||||
|
SetCompactRevision(ctx context.Context, revision int64) error
|
||||||
|
Compact(ctx context.Context, revision int64) (int64, error)
|
||||||
|
Fill(ctx context.Context, revision int64) error
|
||||||
|
IsFill(key string) bool
|
||||||
|
BeginTx(ctx context.Context, opts *sql.TxOptions) (Transaction, error)
|
||||||
|
GetSize(ctx context.Context) (int64, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
type Transaction interface {
|
||||||
|
Commit() error
|
||||||
|
MustCommit()
|
||||||
|
Rollback() error
|
||||||
|
MustRollback()
|
||||||
|
GetCompactRevision(ctx context.Context) (int64, error)
|
||||||
|
SetCompactRevision(ctx context.Context, revision int64) error
|
||||||
|
Compact(ctx context.Context, revision int64) (int64, error)
|
||||||
|
GetRevision(ctx context.Context, revision int64) (*sql.Rows, error)
|
||||||
|
DeleteRevision(ctx context.Context, revision int64) error
|
||||||
|
CurrentRevision(ctx context.Context) (int64, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
type KeyValue struct {
|
type KeyValue struct {
|
||||||
|
7
vendor/github.com/k3s-io/kine/pkg/server/watch.go
generated
vendored
7
vendor/github.com/k3s-io/kine/pkg/server/watch.go
generated
vendored
@ -10,9 +10,10 @@ import (
|
|||||||
"go.etcd.io/etcd/api/v3/mvccpb"
|
"go.etcd.io/etcd/api/v3/mvccpb"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var watchID int64
|
||||||
watchID int64
|
|
||||||
)
|
// explicit interface check
|
||||||
|
var _ etcdserverpb.WatchServer = (*KVServerBridge)(nil)
|
||||||
|
|
||||||
func (s *KVServerBridge) Watch(ws etcdserverpb.Watch_WatchServer) error {
|
func (s *KVServerBridge) Watch(ws etcdserverpb.Watch_WatchServer) error {
|
||||||
w := watcher{
|
w := watcher{
|
||||||
|
2
vendor/modules.txt
vendored
2
vendor/modules.txt
vendored
@ -712,7 +712,7 @@ github.com/k3s-io/helm-controller/pkg/apis/helm.cattle.io/v1
|
|||||||
github.com/k3s-io/helm-controller/pkg/generated/controllers/helm.cattle.io
|
github.com/k3s-io/helm-controller/pkg/generated/controllers/helm.cattle.io
|
||||||
github.com/k3s-io/helm-controller/pkg/generated/controllers/helm.cattle.io/v1
|
github.com/k3s-io/helm-controller/pkg/generated/controllers/helm.cattle.io/v1
|
||||||
github.com/k3s-io/helm-controller/pkg/helm
|
github.com/k3s-io/helm-controller/pkg/helm
|
||||||
# github.com/k3s-io/kine v0.7.3
|
# github.com/k3s-io/kine v0.8.0
|
||||||
## explicit
|
## explicit
|
||||||
github.com/k3s-io/kine/pkg/broadcaster
|
github.com/k3s-io/kine/pkg/broadcaster
|
||||||
github.com/k3s-io/kine/pkg/client
|
github.com/k3s-io/kine/pkg/client
|
||||||
|
Loading…
Reference in New Issue
Block a user