Skip to content

Conversation

@moonchen
Copy link
Contributor

@moonchen moonchen commented Jul 13, 2022

  1. Add a file change monitoring API to iocore.
  2. Use it to add config change monitoring to s3_auth. This can be used to rotate s3_auth secrets.

(Previously I made PR #8905 against 9.2.x by mistake. It should have been against master branch. This PR is rebased on top of master. It also incorporates an autest change suggested by @bneradt.)

@moonchen moonchen requested review from bneradt and duke8253 July 13, 2022 17:23
@bneradt bneradt added this to the 10.0.0 milestone Jul 13, 2022
bneradt
bneradt previously approved these changes Jul 13, 2022
Copy link
Contributor

@bneradt bneradt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Thanks @moonchen .

@bneradt
Copy link
Contributor

bneradt commented Jul 13, 2022

Looks like the gold file doesn't quite match curl's output:
https://ci.trafficserver.apache.org/job/Github_Builds/job/autest/1219/console

Probably good to replace lines that aren't strictly relevant to the test output with ``.

In case it's helpful, issues like this make me lean toward using Proxy Verifier in AuTests. It has a purpose built field verification mechanism rather than the generic gold comparison.

@moonchen
Copy link
Contributor Author

My text editor trimmed trailing whitespace from the gold file. It looks like the other gold file to match ATS log output also failed. I'm investigating.

bneradt pushed a commit to bneradt/trafficserver that referenced this pull request Jul 13, 2022
This reverts commit e93063e.

PR apache#8905 was accidentally filed against 9.2.x instead of master.
@moonchen filed a new PR for master via apache#8960, so the work will continue
with that PR. Since this patch is not intended for 9.2.x, this PR
reverts the commit.
@moonchen
Copy link
Contributor Author

Autest failure should be fixed with latest push. Thanks @bneradt

Comment on lines 557 to 562
TS_EVENT_FILE_CREATED = 60300,
TS_EVENT_FILE_UPDATED = 60301,
TS_EVENT_FILE_DELETED = 60302,
TS_EVENT_FILE_IGNORED = 60303,

TS_EVENT_MGMT_UPDATE = 60300
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just checking: is it intentional that TS_EVENT_FILE_CREATED and TS_EVENT_MGMT_UPDATE have the same enum value?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Definitely not. Thanks for catching that. I've moved file events so they no longer conflict.

@moonchen moonchen marked this pull request as draft July 14, 2022 16:37
Copy link
Contributor

@zwoop zwoop left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couple of things to do before we can merge:

  1. This needs to be discussed on the mailing list, as is the normal process for adding new plugin APIs. A short description of the new APIs, with the prototypes etc., and a justification.
  2. These new APIs only work on Linux, which I feel reasonably strongly is not acceptable. I don't think we have any other APIs that are Linux only. So, we'll need to add kqueue support to this as well please :).

@zwoop
Copy link
Contributor

zwoop commented Jul 14, 2022

Also, removing 9.2.x from this, we'll add this new API and plugin changes for 10.0.x.

10.0 has a change where ATS logs are sent to traffic.log by default.
Move file monitoring events so they're not conflicting with MGMT.
@moonchen moonchen marked this pull request as ready for review September 6, 2022 16:30
@moonchen
Copy link
Contributor Author

moonchen commented Sep 6, 2022

Couple of things to do before we can merge:

  1. This needs to be discussed on the mailing list, as is the normal process for adding new plugin APIs. A short description of the new APIs, with the prototypes etc., and a justification.
  2. These new APIs only work on Linux, which I feel reasonably strongly is not acceptable. I don't think we have any other APIs that are Linux only. So, we'll need to add kqueue support to this as well please :).
  1. API description sent to mailing list.
  2. kqueue implementation now added.

@moonchen moonchen marked this pull request as draft September 12, 2022 20:27
-Reader and writer need to agree on a method
-flock isn't supported by C++ standard library file I/O methods
@github-actions
Copy link

This pull request has been automatically marked as stale because it has not had recent activity. Marking it stale to flag it for further consideration by the community.

@github-actions github-actions bot added the Stale label Dec 13, 2022
@github-actions github-actions bot closed this Dec 21, 2022
@zwoop zwoop removed this from the 10.0.0 milestone Jan 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants