-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linter: Add PR check to encourage including issue or epic refs in the PR/commit messages #77376
Closed
Labels
C-enhancement
Solution expected to add code/behavior + preserve backward-compat (pg compat issues are exception)
T-dev-inf
Comments
jlinder
added
C-enhancement
Solution expected to add code/behavior + preserve backward-compat (pg compat issues are exception)
T-dev-inf
labels
Mar 4, 2022
craig bot
pushed a commit
that referenced
this issue
Apr 4, 2023
99368: workload/schemachanger: basic declarative schema changer support r=fqazi a=fqazi Previously, the randomized testing only supported, the non-declarative schema changer. This patch adds support for basic single statement transactions for testing the declarative schema changer Note: This entablement is only focused on very minimal stability testing. Not implemented errors are always ignore for now. Fixes: #77376 Release note: None 100313: bazel: update toolchains to support remote execution r=rail a=rickystewart We need to add some extra files to `compiler_files` and `linker_files` and update some compiler flags to make sure remote execution works. Epic: none Release note: None 100596: testserver: fix version gate for tenant capabilities r=rafiss a=rafiss This was revealed by mixed version testing, and it can flake sometimes. Epic: None Release note: None Co-authored-by: Faizan Qazi <faizan@cockroachlabs.com> Co-authored-by: Ricky Stewart <rickybstewart@gmail.com> Co-authored-by: Rafi Shamim <rafi@cockroachlabs.com>
msirek
pushed a commit
to msirek/cockroach
that referenced
this issue
Oct 7, 2023
Previously, the combining of constraint spans when one constraint is a suffix of the other could take a long time and cause the `statement_timeout` session setting to not be honored when each constraint has hundreds or thousands of spans. The issue is that `constraint.Combine` has double nested loops to consider every combination one span from one constraint with one span of the other constraint, and if the system is under memory pressue, the large number of memory allocations made to perform these combinations and generate new spans may stall attempting to make those allocations. The fix is to maintain a counter in `constraint.Combine` and call the query cancel check function every 16 iterations. The cancel check function itself will check for query timeout every 1024 iterations, so effectively every 16K iterations `constraint.Combine` will perform cancel checking and abort the query if the timeout has been reached. Epic: none Fixes: cockroachdb#77376 Release note (bug fix): This patch fixes an issue where the optimizer fails to honor the `statement_timeout` session setting when generating constrained index scans for queries with large IN lists or `= ANY` predicates on multiple index key columns. The problem may be more noticeable when the system is under memory pressure.
cockroach-dev-inf
pushed a commit
that referenced
this issue
May 15, 2024
In [1], the default of `UseSpotVM` was reinterpreted to mean the framework decides whether or not to create a spot VM. This may impede local (performance) testing when a potential preemption is unwelcome; i.e., may result in loss of work. This change reverts the original default of "no SpotVMs". It now interprets `--use-spot [true]` to mean that the framework decides whether or not to create a spot VM, whereas `--use-spot false` (default) unconditionally disables the use of spot VMs. Furthermore, to allow unconditional creation of spot VMs, the flag `--use-spot-always` is added. Finally, when running in CI, we pass `--use-spot true`, at this time, to allow the framework to conditionally create spot VMs, i.e., based on current heuristics. [1] #116778 Epic: none Fixes: #77376 Release note: None
srosenberg
added a commit
to srosenberg/cockroach
that referenced
this issue
May 21, 2024
In [1], the default of `UseSpotVM` was reinterpreted to mean the framework decides whether or not to create a spot VM. This may impede local (performance) testing when a potential preemption is unwelcome; i.e., may result in loss of work. This change reverts the original default of "no SpotVMs". It now interprets `--use-spot auto` to mean that the framework decides whether or not to create a spot VM, whereas `--use-spot never` (default) unconditionally disables the use of spot VMs. Furthermore, to allow unconditional creation of spot VMs, pass `--use-spot always`. Finally, when running in CI, we pass `--use-spot auto`, at this time, to allow the framework to conditionally create spot VMs, i.e., based on current heuristics. [1] cockroachdb#116778 Epic: none Fixes: cockroachdb#77376 Release note: None
craig bot
pushed a commit
that referenced
this issue
May 22, 2024
124258: roachtest: --use-spot now properly defaults to "no SpotVMs" r=DarrylWong,herkolategan,nameisbhaskar a=srosenberg In [1], the default of `UseSpotVM` was reinterpreted to mean the framework decides whether or not to create a spot VM. This may impede local (performance) testing when a potential preemption is unwelcome; i.e., may result in loss of work. This change reverts the original default of "no SpotVMs". It now interprets `--use-spot auto` to mean that the framework decides whether or not to create a spot VM, whereas `--use-spot never` (default) unconditionally disables the use of spot VMs. Furthermore, to allow unconditional creation of spot VMs, pass `--use-spot always`. Finally, when running in CI, we pass `--use-spot auto`, at this time, to allow the framework to conditionally create spot VMs, i.e., based on current heuristics. [1] #116778 Epic: none Fixes: #77376 Release note: None Co-authored-by: Stan Rosenberg <stan.rosenberg@gmail.com>
cockroach-dev-inf
pushed a commit
that referenced
this issue
May 24, 2024
In [1], the default of `UseSpotVM` was reinterpreted to mean the framework decides whether or not to create a spot VM. This may impede local (performance) testing when a potential preemption is unwelcome; i.e., may result in loss of work. This change reverts the original default of "no SpotVMs". It now interprets `--use-spot auto` to mean that the framework decides whether or not to create a spot VM, whereas `--use-spot never` (default) unconditionally disables the use of spot VMs. Furthermore, to allow unconditional creation of spot VMs, pass `--use-spot always`. Finally, when running in CI, we pass `--use-spot auto`, at this time, to allow the framework to conditionally create spot VMs, i.e., based on current heuristics. [1] #116778 Epic: none Fixes: #77376 Release note: None
angles-n-daemons
added a commit
to angles-n-daemons/cockroach
that referenced
this issue
Sep 4, 2024
Fixes: cockroachdb#77376 Release note (ops change): --- security: add ttl metrics for certificate expiration Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate.
angles-n-daemons
added a commit
to angles-n-daemons/cockroach
that referenced
this issue
Sep 6, 2024
Fixes: cockroachdb#77376 Release note (ops change): --- security: add ttl metrics for certificate expiration Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate.
angles-n-daemons
added a commit
to angles-n-daemons/cockroach
that referenced
this issue
Sep 10, 2024
Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate. Epic: CRDB-40209 Fixes: cockroachdb#77376 Release note (ops change): new metrics which expose the ttl for various certificates
angles-n-daemons
added a commit
to angles-n-daemons/cockroach
that referenced
this issue
Sep 12, 2024
Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate. Epic: CRDB-40209 Fixes: cockroachdb#77376 Release note (ops change): new metrics which expose the ttl for various certificates
angles-n-daemons
added a commit
to angles-n-daemons/cockroach
that referenced
this issue
Sep 12, 2024
Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate. Epic: CRDB-40209 Fixes: cockroachdb#77376 Release note (ops change): new metrics which expose the ttl for various certificates
craig bot
pushed a commit
that referenced
this issue
Sep 13, 2024
130110: ops: add ttl metrics for certificate expiration r=angles-n-daemons a=angles-n-daemons ops: add ttl metrics for certificate expiration Currently, cockroach only exposes point in time certificate expiration metrics. If the certificate is to expire 1 day from now, we expose a gauge `security.certificate.expiration.<cert-type>` which is the unix timestamp when it will expire. This PR also exposes a ttl metric `security.certificate.ttl.<cert-type>` so that consumers of this information can run operations based on their distance to certificate expiration without additional transformations. Additionally, this PR refactors how the expiration gauges are set, so that reads of the gauge directly reference the value of the certificate. Epic: CRDB-40209 Fixes: #77376 Release note (ops change): new metrics which expose the ttl for various certificates 130699: replica_rac2: remove a todo and add another one r=pav-kv a=sumeerbhola The first todo related to Processor.OnDescChangedLocked is obsolete, since we enqueue for ready processing. But ready procesing is not unconditional, hence the new todo. Epic: CRDB-37515 Release note: None Co-authored-by: angles-n-daemons <brian.dillmann@cockroachlabs.com> Co-authored-by: sumeerbhola <sumeer@cockroachlabs.com>
vidit-bhat
added a commit
to vidit-bhat/cockroach
that referenced
this issue
Oct 30, 2024
This PR adds the yaml configurations for the scale test PCR and Restore clusters Fixes: cockroachdb#77376 Release note: None
vidit-bhat
added a commit
to vidit-bhat/cockroach
that referenced
this issue
Oct 30, 2024
This PR adds the yaml configurations for the scale test PCR and Restore clusters Fixes: cockroachdb#77376 Release note: None
craig bot
pushed a commit
that referenced
this issue
Oct 30, 2024
133796: drtprod: add create and destroy yamls for pcr and restore clusters r=nameisbhaskar a=vidit-bhat This PR adds the yaml configurations for the scale test PCR and Restore clusters Fixes: #77376 Release note: None 133850: sql/catalog: fix panic inside sequence expression parsing r=fqazi a=fqazi Previously, if the correct overloads were not found for sequence builtins it was possible for the server to panic. This could happen when rewriting a CREATE TABLE expression with an invalid sequence builtin call. To address this, this patch updates the sequence logic to return the error instead of panicking on it. Fixes: #133399 Release note (bug fix): Address a panic inside CREATE TABLE AS if sequence builtin expressions had invalid function overloads. Co-authored-by: Vidit Bhat <vidit.bhat@cockroachlabs.com> Co-authored-by: Faizan Qazi <faizan@cockroachlabs.com>
miraradeva
added a commit
to miraradeva/cockroach
that referenced
this issue
Nov 14, 2024
In rare cases (e.g. cockroachdb#77376), two transactions can get repeatedly deadlocked while trying to write to same key(s): one aborts the other, but before it can proceed, the other transaction has restarted and acquired a lock on the key again. This can result in the max transaction retries being exceeded without either transaction succeeding. This commit adds a backoff to the transaction retry loop in `db.Txn`, which will hopefully help one transaction slow down and let the other one commit. Fixes: cockroachdb#77376 Release note: None
miraradeva
added a commit
to miraradeva/cockroach
that referenced
this issue
Nov 14, 2024
In rare cases (e.g. cockroachdb#77376), two transactions can get repeatedly deadlocked while trying to write to same key(s): one aborts the other, but before it can proceed, the other transaction has restarted and acquired a lock on the key again. This can result in the max transaction retries being exceeded without either transaction succeeding. This commit adds a backoff to the transaction retry loop in `db.Txn`, which will hopefully help one transaction slow down and let the other one commit. Fixes: cockroachdb#77376 Release note: None
miraradeva
added a commit
to miraradeva/cockroach
that referenced
this issue
Nov 14, 2024
In rare cases (e.g. cockroachdb#77376), two transactions can get repeatedly deadlocked while trying to write to same key(s): one aborts the other, but before it can proceed, the other transaction has restarted and acquired a lock on the key again. This can result in the max transaction retries being exceeded without either transaction succeeding. This commit adds a backoff to the transaction retry loop in `db.Txn`, which will hopefully help one transaction slow down and let the other one commit. Fixes: cockroachdb#77376 Release note: None
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
C-enhancement
Solution expected to add code/behavior + preserve backward-compat (pg compat issues are exception)
T-dev-inf
Describe the solution you'd like
This new linter should be a program run by a GitHub action on every PR for these events: create, edit, reopen, synchronize.
What it will do:
For all PRs containing commits with Release note texts, other than bug fixes, Engineers can help establish the link to Jira epics in various ways:
Given Engineering’s practice to link GitHub issues to epics, referencing such an issue—as opposed to the epic it links to—is preferred in cases where both a Jira epic and GitHub issue exist. This makes information in the issue easily accessible to human readers while offering an epic link that is available via the issue to automation scripts.
The “Epic: None” option accounts for the fact that a significant amount of product changes occur spontaneously (serendipitously) as a by-product of investigations on main roadmap items. When this happens, Engineers take the initiative to make user-facing changes without prior processing by a PM, and thus without prior existence of a GH or Jira issue. We do not wish to reduce the ability of Engineers to innovate and improve our product in this way.
This solution will be encouraged, but not required, by a new optional blathers check on PRs. It will fail and give feedback on how to adjust the PR for the following cases:
Describe alternatives you've considered
This linter can't run in TeamCity because it needs to run on PR edit and reopen events. We considered using Blathers but decided to keep this in the cockroach repo.
Jira issue: CRDB-13558
Epic DEVINF-261
The text was updated successfully, but these errors were encountered: