Merge remote-tracking branch 'origin/main' into limit-gtt-size
This commit is contained in:
commit
a556f21ed2
|
@ -1199,6 +1199,8 @@ void usage() {
|
|||
printf("%-24s %s\n", " --flatbuffers", "Use flatbuffers");
|
||||
printf("%-24s %s\n", " --streaming", "Streaming mode: all (default), iterator, small, medium, large, serial");
|
||||
printf("%-24s %s\n", " --disable_ryw", "Disable snapshot read-your-writes");
|
||||
printf(
|
||||
"%-24s %s\n", " --disable_client_bypass", "Disable client-bypass forcing mako to use multi-version client");
|
||||
printf("%-24s %s\n", " --json_report=PATH", "Output stats to the specified json file (Default: mako.json)");
|
||||
printf("%-24s %s\n",
|
||||
" --bg_file_path=PATH",
|
||||
|
|
|
@ -1007,6 +1007,7 @@ void ServerKnobs::initialize(Randomize randomize, ClientKnobs* clientKnobs, IsSi
|
|||
// NOTE: Care must be taken when attempting to update below configurations for a up/running FDB cluster.
|
||||
init( REST_KMS_CONNECTOR_DISCOVER_KMS_URL_FILE, "");
|
||||
init( REST_KMS_CONNECTOR_GET_ENCRYPTION_KEYS_ENDPOINT, "");
|
||||
init( REST_KMS_CONNECTOR_GET_BLOB_METADATA_ENDPOINT, "");
|
||||
// Details to fetch validation token from a localhost file
|
||||
// acceptable format: "<token_name1>#<absolute_file_path1>,<token_name2>#<absolute_file_path2>,.."
|
||||
// NOTE: 'token-name" can NOT contain '#' character
|
||||
|
|
|
@ -56,6 +56,21 @@ struct BlobMetadataDetailsRef {
|
|||
base = StringRef(arena, from.base.get());
|
||||
}
|
||||
}
|
||||
|
||||
explicit BlobMetadataDetailsRef(Arena& ar,
|
||||
BlobMetadataDomainId domainId,
|
||||
BlobMetadataDomainNameRef domainName,
|
||||
Optional<StringRef> base,
|
||||
VectorRef<StringRef> partitions,
|
||||
int64_t refreshAt,
|
||||
int64_t expireAt)
|
||||
: domainId(domainId), domainName(ar, domainName), partitions(ar, partitions), refreshAt(refreshAt),
|
||||
expireAt(expireAt) {
|
||||
if (base.present()) {
|
||||
base = StringRef(ar, base.get());
|
||||
}
|
||||
}
|
||||
|
||||
explicit BlobMetadataDetailsRef(BlobMetadataDomainId domainId,
|
||||
BlobMetadataDomainNameRef domainName,
|
||||
Optional<StringRef> base,
|
||||
|
|
|
@ -981,6 +981,7 @@ public:
|
|||
bool REST_KMS_CONNECTOR_REFRESH_KMS_URLS;
|
||||
double REST_KMS_CONNECTOR_REFRESH_KMS_URLS_INTERVAL_SEC;
|
||||
std::string REST_KMS_CONNECTOR_GET_ENCRYPTION_KEYS_ENDPOINT;
|
||||
std::string REST_KMS_CONNECTOR_GET_BLOB_METADATA_ENDPOINT;
|
||||
|
||||
ServerKnobs(Randomize, ClientKnobs*, IsSimulated);
|
||||
void initialize(Randomize, ClientKnobs*, IsSimulated);
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -117,7 +117,7 @@ enum {
|
|||
OPT_METRICSPREFIX, OPT_LOGGROUP, OPT_LOCALITY, OPT_IO_TRUST_SECONDS, OPT_IO_TRUST_WARN_ONLY, OPT_FILESYSTEM, OPT_PROFILER_RSS_SIZE, OPT_KVFILE,
|
||||
OPT_TRACE_FORMAT, OPT_WHITELIST_BINPATH, OPT_BLOB_CREDENTIAL_FILE, OPT_CONFIG_PATH, OPT_USE_TEST_CONFIG_DB, OPT_NO_CONFIG_DB, OPT_FAULT_INJECTION, OPT_PROFILER, OPT_PRINT_SIMTIME,
|
||||
OPT_FLOW_PROCESS_NAME, OPT_FLOW_PROCESS_ENDPOINT, OPT_IP_TRUSTED_MASK, OPT_KMS_CONN_DISCOVERY_URL_FILE, OPT_KMS_CONNECTOR_TYPE, OPT_KMS_CONN_VALIDATION_TOKEN_DETAILS,
|
||||
OPT_KMS_CONN_GET_ENCRYPTION_KEYS_ENDPOINT, OPT_NEW_CLUSTER_KEY, OPT_AUTHZ_PUBLIC_KEY_FILE, OPT_USE_FUTURE_PROTOCOL_VERSION
|
||||
OPT_KMS_CONN_GET_ENCRYPTION_KEYS_ENDPOINT, OPT_KMS_CONN_GET_BLOB_METADATA_ENDPOINT, OPT_NEW_CLUSTER_KEY, OPT_AUTHZ_PUBLIC_KEY_FILE, OPT_USE_FUTURE_PROTOCOL_VERSION
|
||||
};
|
||||
|
||||
CSimpleOpt::SOption g_rgOptions[] = {
|
||||
|
@ -218,6 +218,7 @@ CSimpleOpt::SOption g_rgOptions[] = {
|
|||
{ OPT_KMS_CONNECTOR_TYPE, "--kms-connector-type", SO_REQ_SEP },
|
||||
{ OPT_KMS_CONN_VALIDATION_TOKEN_DETAILS, "--kms-conn-validation-token-details", SO_REQ_SEP },
|
||||
{ OPT_KMS_CONN_GET_ENCRYPTION_KEYS_ENDPOINT, "--kms-conn-get-encryption-keys-endpoint", SO_REQ_SEP },
|
||||
{ OPT_KMS_CONN_GET_BLOB_METADATA_ENDPOINT, "--kms-conn-get-blob-metadata-endpoint", SO_REQ_SEP },
|
||||
{ OPT_USE_FUTURE_PROTOCOL_VERSION, "--use-future-protocol-version", SO_REQ_SEP },
|
||||
TLS_OPTION_FLAGS,
|
||||
SO_END_OF_OPTIONS
|
||||
|
@ -1707,6 +1708,10 @@ private:
|
|||
knobs.emplace_back("rest_kms_connector_get_encryption_keys_endpoint", args.OptionArg());
|
||||
break;
|
||||
}
|
||||
case OPT_KMS_CONN_GET_BLOB_METADATA_ENDPOINT: {
|
||||
knobs.emplace_back("rest_kms_connector_get_blob_metadata_endpoint", args.OptionArg());
|
||||
break;
|
||||
}
|
||||
case OPT_NEW_CLUSTER_KEY: {
|
||||
newClusterKey = args.OptionArg();
|
||||
try {
|
||||
|
|
|
@ -186,6 +186,8 @@ struct KmsConnLookupDomainIdsReqInfoRef {
|
|||
EncryptCipherDomainNameRef domainName;
|
||||
|
||||
KmsConnLookupDomainIdsReqInfoRef() : domainId(INVALID_ENCRYPT_DOMAIN_ID) {}
|
||||
explicit KmsConnLookupDomainIdsReqInfoRef(Arena& arena, const KmsConnLookupDomainIdsReqInfoRef& from)
|
||||
: domainId(from.domainId), domainName(StringRef(arena, from.domainName)) {}
|
||||
explicit KmsConnLookupDomainIdsReqInfoRef(Arena& arena, const EncryptCipherDomainId dId, StringRef name)
|
||||
: domainId(dId), domainName(StringRef(arena, name)) {}
|
||||
explicit KmsConnLookupDomainIdsReqInfoRef(const EncryptCipherDomainId dId, StringRef name)
|
||||
|
|
Loading…
Reference in New Issue