-
Notifications
You must be signed in to change notification settings - Fork 248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix key order compliance #298
Conversation
4286268
to
4070872
Compare
Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]>
7c7eb06
to
2367648
Compare
* Sort list results by name, not revision. List continuation (start key) functionality requires that keys be returned in ascending order. * Only count keys remaining after the start key, not the total number of keys in the prefix. * Return current revision in header along with error when unable to range on key. * Don't ignore start key when listing with revision=0 Signed-off-by: Brad Davidson <[email protected]>
2367648
to
91f512e
Compare
Bump k3s to v1.29.4+k3s1, and add basic sig-api-machinery e2e against sqlite and nats Signed-off-by: Brad Davidson <[email protected]>
91f512e
to
33f7751
Compare
hey @bruth are you able to take a look at the CI failures here, when running the Kubernetes sig-api-machinery e2e tests against a cluster using kine+nats-embedded? It appears to be failing on some pretty basic stuff:
|
Signed-off-by: Brad Davidson <[email protected]>
@brandond Hey, sorry for the late response. I was traveling last week. I will take a look at it this week. |
Changes: