author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
350,429 | 26.04.2020 16:11:35 | -32,400 | 3c9f79476e17f6af602421cc057a0a85c8d059b1 | Fix tiny typo in error message | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/volumes.rs",
"new_path": "crates/kubelet/src/volumes.rs",
"diff": "@@ -126,7 +126,7 @@ async fn configure(\npopulate_from_secret(\n&s.secret_name\n.as_ref()\n- .ok_or_else(|| anyhow::anyhow!(\"no configmap name was given\"))?,\n+ .ok_or_else... | Rust | Apache License 2.0 | krustlet/krustlet | Fix tiny typo in error message |
350,405 | 06.05.2020 11:26:59 | -43,200 | b190a9a618aaa9e684dd9ae793f64f9b0f44a89c | Don't watch files under ./target in VS Code | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".vscode/settings.json",
"diff": "+{\n+ \"files.watcherExclude\": {\n+ \"**/.git/objects/**\": true,\n+ \"**/.git/subtree-cache/**\": true,\n+ \"**/node_modules/**\": true,\n+ \"**/.hg/store/**\": true,\n+ \"**/target/**\": true\n+ }\n+}\n"
}
] | Rust | Apache License 2.0 | krustlet/krustlet | Don't watch files under ./target in VS Code |
350,422 | 06.05.2020 13:20:20 | 25,200 | b3045e7926b9ca83cd26f4526a183d8c227beb6a | Instructions for running krustlet with microk8s | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/README.md",
"new_path": "docs/howto/README.md",
"diff": "@@ -9,6 +9,7 @@ However, these guides will help you quickly accomplish common tasks.\n- [Running Krustlet on Kubernetes-in-Docker (KinD)](krustlet-on-kind.md)\n- [Running Krustlet on Minikube]... | Rust | Apache License 2.0 | krustlet/krustlet | Instructions for running krustlet with microk8s (#233) |
350,405 | 07.05.2020 10:18:49 | -43,200 | 487148252542ef205fd21c20cc73bfe6a8f5a4f6 | Refactor WASI integration test to named functions | [
{
"change_type": "MODIFY",
"old_path": "tests/integration_tests.rs",
"new_path": "tests/integration_tests.rs",
"diff": "@@ -131,14 +131,7 @@ async fn test_wascc_provider() -> Result<(), Box<dyn std::error::Error>> {\nOk(())\n}\n-#[tokio::test]\n-async fn test_wasi_provider() -> Result<(), Box<dyn st... | Rust | Apache License 2.0 | krustlet/krustlet | Refactor WASI integration test to named functions |
350,426 | 09.05.2020 00:40:56 | 0 | bdff4bdbaafbb70d09d45019999b52eca85df899 | Make stream_logs available to providers. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/lib.rs",
"new_path": "crates/kubelet/src/lib.rs",
"diff": "@@ -62,7 +62,7 @@ pub mod volumes;\npub use self::kubelet::Kubelet;\npub use handle::{LogHandleFactory, PodHandle, RuntimeHandle};\n-pub use logs::{LogSendError, LogSender};\n+pub us... | Rust | Apache License 2.0 | krustlet/krustlet | Make stream_logs available to providers. |
350,422 | 11.05.2020 14:08:08 | 25,200 | 75de071f516cd263438453efb8497286cf236220 | Krustlet on Google Kubernetes Engine
Implements | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/howto/krustlet-on-gke.md",
"diff": "+# Running Krustlet on Google Kubernetes Engine (GKE)\n+\n+These steps are for running a Krustlet node in a GKE cluster.\n+\n+## Prerequisites\n+\n+You will require a GKE cluster. See the [how-to guide fo... | Rust | Apache License 2.0 | krustlet/krustlet | Krustlet on Google Kubernetes Engine (#242)
Implements #236 |
350,426 | 12.05.2020 08:21:44 | 18,000 | 2beeba03302bd65717cacb6def82f2164683b02b | Make provider hook async. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/node.rs",
"new_path": "crates/kubelet/src/node.rs",
"diff": "@@ -111,7 +111,7 @@ pub async fn create_node<P: 'static + Provider + Sync + Send>(\nbuilder.set_port(config.server_config.port as i32);\n- provider.node(&mut builder);\n+ provider.... | Rust | Apache License 2.0 | krustlet/krustlet | Make provider hook async. |
350,426 | 12.05.2020 09:18:28 | 18,000 | 107ffe6bcfd34cc20f52ac2f3754dd39bba073a4 | Make node hook failable. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/node.rs",
"new_path": "crates/kubelet/src/node.rs",
"diff": "@@ -111,7 +111,11 @@ pub async fn create_node<P: 'static + Provider + Sync + Send>(\nbuilder.set_port(config.server_config.port as i32);\n- provider.node(&mut builder).await;\n+ ma... | Rust | Apache License 2.0 | krustlet/krustlet | Make node hook failable. |
350,422 | 12.05.2020 09:22:42 | 25,200 | 1a028b0e02ddb1f907941409239079921f3b1379 | Corrected `kubectl` command | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/krustlet-on-microk8s.md",
"new_path": "docs/howto/krustlet-on-microk8s.md",
"diff": "@@ -120,7 +120,7 @@ by the context (`krustlet`) that we created in that step. Unfortunately, it's no\nreference a specific context, so we must change the context be... | Rust | Apache License 2.0 | krustlet/krustlet | Corrected `kubectl` command |
350,426 | 12.05.2020 11:42:58 | 18,000 | b8c8f9bf4b99f01b381aa8c44e4a56e62fb9be85 | Introduce signal handler. | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -1748,6 +1748,7 @@ dependencies = [\n\"rpassword\",\n\"serde\",\n\"serde_json\",\n+ \"signal-hook\",\n\"structopt\",\n\"thiserror\",\n\"tokio\",\n@@ -2874,6 +2875,16 @@ dependencies = [\n\"opaque-debug\",\n]\n... | Rust | Apache License 2.0 | krustlet/krustlet | Introduce signal handler. |
350,405 | 13.05.2020 10:09:27 | -43,200 | 8cb802f1dc25692cc264d6c0f84b6934eacec7db | Ensure WASI cleanup runs even if tests fail | [
{
"change_type": "MODIFY",
"old_path": "tests/integration_tests.rs",
"new_path": "tests/integration_tests.rs",
"diff": "@@ -319,20 +319,39 @@ async fn set_up_wasi_test_environment(\nOk(())\n}\n-async fn clean_up_wasi_test_resources(\n- client: kube::Client,\n- pods: &Api<Pod>,\n-) -> Result<(), Box<... | Rust | Apache License 2.0 | krustlet/krustlet | Ensure WASI cleanup runs even if tests fail |
350,405 | 14.05.2020 09:22:06 | -43,200 | 7cbc5fa5772d9ce020db2c3f310384972e990a5e | Use anyhow::Result to reduce verbosity | [
{
"change_type": "MODIFY",
"old_path": "tests/integration_tests.rs",
"new_path": "tests/integration_tests.rs",
"diff": "@@ -174,10 +174,7 @@ async fn verify_wasi_node(node: Node) -> () {\n);\n}\n-async fn create_wasi_pod(\n- client: kube::Client,\n- pods: &Api<Pod>,\n-) -> Result<(), Box<dyn std::er... | Rust | Apache License 2.0 | krustlet/krustlet | Use anyhow::Result to reduce verbosity |
350,426 | 14.05.2020 02:59:00 | 0 | 178a6935a2d1ad15806035e5c7510bbb810c05ed | Implement graceful shutdown. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/kubelet.rs",
"new_path": "crates/kubelet/src/kubelet.rs",
"diff": "///! This library contains code for running a kubelet. Use this to create a new\n///! Kubelet with a specific handler (called a `Provider`)\nuse crate::config::Config;\n-use ... | Rust | Apache License 2.0 | krustlet/krustlet | Implement graceful shutdown. |
350,426 | 16.05.2020 15:32:04 | 0 | 46aaa44b8530c27b6ded381293677d2dc716fc03 | Filter daemonset and mirror pods. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/node.rs",
"new_path": "crates/kubelet/src/node.rs",
"diff": "use crate::config::Config;\nuse crate::pod::Pod;\nuse crate::provider::Provider;\n+use crate::status::{ContainerStatus, Status};\nuse chrono::prelude::*;\nuse futures::{StreamExt, ... | Rust | Apache License 2.0 | krustlet/krustlet | Filter daemonset and mirror pods. |
350,426 | 05.05.2020 18:43:49 | 18,000 | c95c35b4ea89c1bfc5aac7d085dc92f25e12093d | Improve parsing and error handling for kubelet API. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/server.rs",
"new_path": "crates/kubelet/src/server.rs",
"diff": "@@ -79,11 +79,8 @@ async fn handle_request<T>(req: Request<Body>, provider: Arc<T>) -> anyhow::Resu\nwhere\nT: Provider + Send + Sync + 'static,\n{\n- let path: Vec<&str> = req... | Rust | Apache License 2.0 | krustlet/krustlet | Improve parsing and error handling for kubelet API. |
350,426 | 05.05.2020 18:58:28 | 18,000 | 5d06758b3ee227bd72b65fc2524b8a222246431f | Fix path ordering and formatting. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/server.rs",
"new_path": "crates/kubelet/src/server.rs",
"diff": "@@ -79,7 +79,7 @@ async fn handle_request<T>(req: Request<Body>, provider: Arc<T>) -> anyhow::Resu\nwhere\nT: Provider + Send + Sync + 'static,\n{\n- let mut path: Vec<&str> = ... | Rust | Apache License 2.0 | krustlet/krustlet | Fix path ordering and formatting. |
350,426 | 07.05.2020 12:15:30 | 18,000 | 30f893e28adf9f06edeb42740d0c3e1466266c46 | Fix tail query param. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/logs.rs",
"new_path": "crates/kubelet/src/logs.rs",
"diff": "@@ -40,13 +40,13 @@ impl std::error::Error for LogSendError {\n#[serde(rename_all = \"camelCase\")]\n/// Client options for fetching logs.\npub struct LogOptions {\n- tail: Option<... | Rust | Apache License 2.0 | krustlet/krustlet | Fix tail query param. |
350,426 | 07.05.2020 12:43:32 | 18,000 | 3c8db271f1d6541d5f33e0263e65b9ef433fa2ff | Respond to comments. Fix e2e test. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -58,6 +58,6 @@ jobs:\nrun: |\njust bootstrap-ssl\njust build\n- ./target/debug/krustlet-wascc --node-name krustlet-wascc --port 3000 --pfx-path ./config/certificate.pfx &\n- .... | Rust | Apache License 2.0 | krustlet/krustlet | Respond to comments. Fix e2e test. |
350,426 | 20.05.2020 16:06:00 | 18,000 | dd3fb424b028c7ec3b0ec2fd468e5848fd82b14a | Prevent scheduling pods after shutdown has started. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/config.rs",
"new_path": "crates/kubelet/src/config.rs",
"diff": "@@ -7,7 +7,6 @@ use std::net::IpAddr;\nuse std::net::ToSocketAddrs;\nuse std::path::PathBuf;\n-use rpassword;\n#[cfg(feature = \"cli\")]\nuse structopt::StructOpt;\n"
},
{
... | Rust | Apache License 2.0 | krustlet/krustlet | Prevent scheduling pods after shutdown has started. |
350,437 | 21.05.2020 17:48:23 | 25,200 | 8fd2cb5eb3be65c926eb2cd409ba12d90076daf7 | Update setup-kind GitHub Action
Update configurator GitHub Action | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -24,7 +24,7 @@ jobs:\n}\nsteps:\n- uses: actions/checkout@v2\n- - uses: engineerd/configurator@v0.0.1\n+ - uses: engineerd/configurator@v0.0.2\nwith:\nname: ${{ matrix.config.... | Rust | Apache License 2.0 | krustlet/krustlet | Update setup-kind GitHub Action
Update configurator GitHub Action
Signed-off-by: Radu M <root@radu.sh> |
350,415 | 30.05.2020 10:53:17 | 14,400 | 8c51ba13bd573e2e15535475b095d7eec6a3f171 | implemented tls bootstrapping | [
{
"change_type": "MODIFY",
"old_path": ".gitignore",
"new_path": ".gitignore",
"diff": "@@ -3,3 +3,4 @@ target/\n/config\n_dist/\nnode_modules/\n+.DS_Store\n\\ No newline at end of file\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": ".vscode/launch.json",
"diff": "+{... | Rust | Apache License 2.0 | krustlet/krustlet | implemented tls bootstrapping |
350,405 | 08.06.2020 15:06:28 | -43,200 | a9b57cf029cd0727e1bed846b41dcbc9142e224d | Pass container arguments to WASI module | [
{
"change_type": "MODIFY",
"old_path": "crates/wasi-provider/src/lib.rs",
"new_path": "crates/wasi-provider/src/lib.rs",
"diff": "@@ -110,6 +110,7 @@ impl<S: ModuleStore + Send + Sync> Provider for WasiProvider<S> {\ninfo!(\"Starting containers for pod {:?}\", pod_name);\nfor container in pod.contai... | Rust | Apache License 2.0 | krustlet/krustlet | Pass container arguments to WASI module |
350,434 | 10.06.2020 09:26:29 | 25,200 | 1d8bec44272a51cad442d864c6a6501d9b253436 | fix(hack/bootstrap): set expiration to 1 hour in the future
Fix the direction of time | [
{
"change_type": "MODIFY",
"old_path": "hack/bootstrap.sh",
"new_path": "hack/bootstrap.sh",
"diff": "@@ -9,7 +9,7 @@ token_secret=\"$(</dev/random tr -dc a-z0-9 | head -c \"${1:-16}\";echo;)\"\n# support gnu and BSD date command\nexpiration=$(date -u \"+%Y-%m-%dT%H:%M:%SZ\" --date \"1 hour\" 2>/dev... | Rust | Apache License 2.0 | krustlet/krustlet | fix(hack/bootstrap): set expiration to 1 hour in the future
Fix the direction of time |
350,426 | 23.06.2020 14:17:59 | 18,000 | c2e9f014dc810bc7e6b4d4a5e8a0e3badd967d31 | Fix typo and Bootstraping clarification | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/bootstrapping.md",
"new_path": "docs/howto/bootstrapping.md",
"diff": "@@ -131,6 +131,8 @@ Once you have the bootstrap config in place, you can run Krustlet:\n$ KUBECONFIG=~/.krustlet/config/kubeconfig krustlet-wasi --port 3000 --bootstrap-file /pat... | Rust | Apache License 2.0 | krustlet/krustlet | Fix typo and Bootstraping clarification |
350,425 | 13.05.2020 21:48:32 | 25,200 | a23a447dbbbeb9c93280a960aeac8158b92cad1a | Use `token` for image registry auth.
According to the [Docker registry documentation](https://docs.docker.com/registry/spec/auth/token/#requesting-a-token),
`token` is the preferred field and `access_token` is used for OAuth 2
compatibility.
This commit changes the expected auth response to be `token` with an alias of
`access_token` to support both. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -326,12 +326,13 @@ impl ClientProtocol {\n/// A token granted during the OAuth2-like workflow for OCI registries.\n#[derive(serde::Deserialize, Default)]\n... | Rust | Apache License 2.0 | krustlet/krustlet | Use `token` for image registry auth.
According to the [Docker registry documentation](https://docs.docker.com/registry/spec/auth/token/#requesting-a-token),
`token` is the preferred field and `access_token` is used for OAuth 2
compatibility.
This commit changes the expected auth response to be `token` with an alias of
`access_token` to support both. |
350,425 | 24.06.2020 19:24:18 | 25,200 | 88971305da417c051dd000e5118c6ff3e68c69d1 | Support authenticating with multiple OCI registries.
This commit simply maps registries to authentication tokens so that multiple
OCI registries can be used. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -13,6 +13,7 @@ use futures_util::stream::StreamExt;\nuse hyperx::header::Header;\nuse log::debug;\nuse reqwest::header::HeaderMap;\n+use std::collections::... | Rust | Apache License 2.0 | krustlet/krustlet | Support authenticating with multiple OCI registries.
This commit simply maps registries to authentication tokens so that multiple
OCI registries can be used. |
350,434 | 01.07.2020 16:11:48 | 25,200 | 7b64200f5dd43cf06b623c08113432343e459685 | docs(demos): correct install instructions for nkeys | [
{
"change_type": "MODIFY",
"old_path": "demos/wascc/fileserver/README.md",
"new_path": "demos/wascc/fileserver/README.md",
"diff": "@@ -33,11 +33,11 @@ To set up your development environment, you'll need the following tools:\nInstructions for [installing\n`cargo`](https://doc.rust-lang.org/cargo/get... | Rust | Apache License 2.0 | krustlet/krustlet | docs(demos): correct install instructions for nkeys (#309) |
350,405 | 07.07.2020 12:31:19 | -43,200 | f9c877160d6ca7b20eb2a6f5591843536e20028c | waSCC can't honour container args | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "#![deny(missing_docs)]\nuse async_trait::async_trait;\n-use k8s_openapi::api::core::v1::{ContainerStatus as KubeContainerStatus, Pod as KubePod};\n+use k8s_openapi::api... | Rust | Apache License 2.0 | krustlet/krustlet | waSCC can't honour container args (#308) |
350,405 | 07.07.2020 12:31:52 | -43,200 | 72d82c3fafafde3bbf2a06e391de0d17f0c51001 | The wasmerciser | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "demos/wasi/wasmerciser/Cargo.lock",
"diff": "+# This file is automatically @generated by Cargo.\n+# It is not intended for manual editing.\n+[[package]]\n+name = \"anyhow\"\n+version = \"1.0.31\"\n+source = \"registry+https://github.com/rust-lan... | Rust | Apache License 2.0 | krustlet/krustlet | The wasmerciser (#303) |
350,426 | 03.07.2020 11:23:47 | 18,000 | 45744b0cd67e58b0aa4da7b8159cce0893adb716 | Basic KubeContainer wrapper | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/container/mod.rs",
"new_path": "crates/kubelet/src/container/mod.rs",
"diff": "//! `container` is a collection of utilities surrounding the Kubernetes container API.\n+\n+use k8s_openapi::api::core::v1::Container as KubeContainer;\n+use oci_... | Rust | Apache License 2.0 | krustlet/krustlet | Basic KubeContainer wrapper |
350,426 | 03.07.2020 12:13:12 | 18,000 | f605e55f54c66d04b83dd716e151eb0a74da8f45 | Full Container accessor coverage and fix tests. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/container/mod.rs",
"new_path": "crates/kubelet/src/container/mod.rs",
"diff": "@@ -11,7 +11,7 @@ pub use handle::Handle;\npub use status::Status;\n/// Specifies how the store should check for module updates\n-#[derive(PartialEq, Debug)]\n+#[... | Rust | Apache License 2.0 | krustlet/krustlet | Full Container accessor coverage and fix tests. |
350,426 | 09.07.2020 06:32:25 | 18,000 | adb7f3ac15bd684e890853cf6f1d8d64856f91ee | API Suggestions. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/container/mod.rs",
"new_path": "crates/kubelet/src/container/mod.rs",
"diff": "@@ -28,7 +28,7 @@ pub enum PullPolicy {\nimpl PullPolicy {\n/// Get image pull policy of container applying defaults if None from:\n/// https://kubernetes.io/docs... | Rust | Apache License 2.0 | krustlet/krustlet | API Suggestions. |
350,426 | 09.07.2020 07:13:45 | 18,000 | 0bfa64d7fef19f4a7c38105daf959489556af256 | Rebase Master and Fix Tests. | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "#![deny(missing_docs)]\nuse async_trait::async_trait;\n-use k8s_openapi::api::core::v1::{\n- Container as KubeContainer, ContainerStatus as KubeContainerStatus, Pod as ... | Rust | Apache License 2.0 | krustlet/krustlet | Rebase Master and Fix Tests. |
350,405 | 10.07.2020 10:30:29 | -43,200 | 3910ce3a9162153da6f7fae0e1133dfb693b85fd | Fix kubelet exit on module failure | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -290,13 +290,19 @@ dependencies = [\n[[package]]\nname = \"addr2line\"\n-version = \"0.12.1\"\n+version = \"0.13.0\"\nsource = \"registry+https://github.com/rust-lang/crates.io-index\"\n-checksum = \"a49806b9d... | Rust | Apache License 2.0 | krustlet/krustlet | Fix kubelet exit on module failure (#319) |
350,416 | 12.07.2020 00:43:58 | 25,200 | 1c1efafd2b42ed1cac78538cfc43e30753ef8d6c | Update microk8s howto docs | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/krustlet-on-microk8s.md",
"new_path": "docs/howto/krustlet-on-microk8s.md",
"diff": "@@ -9,6 +9,20 @@ MicroK8s and the Krustlet, on a single machine. `kubectl` is required but is ins\nas `microk8s.kubectl`. The following instructions use `microk8s.k... | Rust | Apache License 2.0 | krustlet/krustlet | Update microk8s howto docs |
350,416 | 13.07.2020 17:17:11 | 25,200 | f0720180fd6e81c8773e6691cde8e75e3c26aa06 | Addressed incorrect usage of markdown.
Addressed incorrect grammar. | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/krustlet-on-microk8s.md",
"new_path": "docs/howto/krustlet-on-microk8s.md",
"diff": "@@ -10,17 +10,24 @@ as `microk8s.kubectl`. The following instructions use `microk8s.kubectl` for sim\nYou may use a standlone `kubectl` if you prefer.\nIn order for... | Rust | Apache License 2.0 | krustlet/krustlet | Addressed incorrect usage of markdown.
Addressed incorrect grammar. |
350,443 | 30.06.2020 21:28:39 | 25,200 | b38566069ac7e591bc46af7a875cdfe1412b6c56 | code clean up and use Result types to return errors | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -44,6 +44,8 @@ use kubelet::provider::ProviderError;\nuse kubelet::store::Store;\nuse kubelet::volume::Ref;\nuse log::{debug, error, info, trace};\n+use std::error::... | Rust | Apache License 2.0 | krustlet/krustlet | code clean up and use Result types to return errors |
350,443 | 09.07.2020 16:21:02 | 25,200 | a008a1a6b2787ed5c7a832795efe9d4ae417c315 | fixed e2e test and removed the port allocation when a pod is deleted | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -132,7 +132,7 @@ pub struct WasccProvider<S> {\nlog_path: PathBuf,\nkubeconfig: kube::Config,\nhost: Arc<Mutex<WasccHost>>,\n- port_set: Arc<Mutex<HashSet<i32>>>,\n+... | Rust | Apache License 2.0 | krustlet/krustlet | fixed e2e test and removed the port allocation when a pod is deleted |
350,443 | 14.07.2020 11:56:26 | 25,200 | 6ee9c3899ddff2edcfb1a514efba73916a538d95 | added some changes suggested by code reviews | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -60,6 +60,7 @@ use std::collections::{HashMap, HashSet};\nuse std::ops::Deref;\nuse std::path::{Path, PathBuf};\nuse std::sync::{Arc, Mutex};\n+use tokio::sync::Mute... | Rust | Apache License 2.0 | krustlet/krustlet | added some changes suggested by code reviews |
350,443 | 14.07.2020 12:32:01 | 25,200 | 55c0d1d3d4082807d31b23e309c07b9f6238dea4 | removed env from yamls | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -562,7 +562,6 @@ async fn find_available_port(\nlet generated_port: i32 = rand::thread_rng().gen_range(30000, 32768);\nport.replace(generated_port);\nempty_port.inse... | Rust | Apache License 2.0 | krustlet/krustlet | removed env from yamls |
350,443 | 14.07.2020 14:01:40 | 25,200 | a1944a0726fac01858767b56cbe443f7698d4641 | rebase wascc-provider | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -226,7 +226,7 @@ impl<S: Store + Send + Sync> Provider for WasccProvider<S> {\nlet volumes = Ref::volumes_from_pod(&self.volume_path, &pod, &client).await?;\nfor con... | Rust | Apache License 2.0 | krustlet/krustlet | rebase wascc-provider |
350,405 | 16.07.2020 17:49:16 | -43,200 | 80cdd5518b732426f9d273864fcbc31fdb827493 | Option to load modules from local filesystem | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/config.rs",
"new_path": "crates/kubelet/src/config.rs",
"diff": "@@ -53,6 +53,9 @@ pub struct Config {\npub max_pods: u16,\n/// The location of the tls bootstrapping file\npub bootstrap_file: PathBuf,\n+ /// Whether to allow modules to be lo... | Rust | Apache License 2.0 | krustlet/krustlet | Option to load modules from local filesystem (#316) |
350,405 | 17.07.2020 11:01:45 | -43,200 | feb3101edd9711df5964554641f075e8951e6af6 | Fix reporting of init container statuses | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/container/handle.rs",
"new_path": "crates/kubelet/src/container/handle.rs",
"diff": "@@ -3,7 +3,7 @@ use std::io::SeekFrom;\nuse tokio::io::{AsyncRead, AsyncSeek, AsyncSeekExt};\nuse tokio::sync::watch::Receiver;\n-use crate::container::Stat... | Rust | Apache License 2.0 | krustlet/krustlet | Fix reporting of init container statuses (#325) |
350,405 | 24.07.2020 09:09:34 | -43,200 | 1e74ecde502885791d0acaa8580eb61ebbb2c909 | Modularise WASI integration tests | [
{
"change_type": "MODIFY",
"old_path": "Cargo.toml",
"new_path": "Cargo.toml",
"diff": "@@ -40,7 +40,7 @@ rustls-tls = [\"kube/rustls-tls\", \"kubelet/rustls-tls\", \"wasi-provider/rustls-tls\n[dependencies]\nanyhow = \"1.0\"\n-tokio = { version = \"0.2\", features = [\"macros\", \"rt-threaded\"] }\... | Rust | Apache License 2.0 | krustlet/krustlet | Modularise WASI integration tests (#330) |
350,405 | 28.07.2020 14:01:22 | -43,200 | 724745bce426642a110308c0dc6f3d9a1a11c4f1 | Document tolerations and node affinities for WASM | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/README.md",
"new_path": "docs/howto/README.md",
"diff": "@@ -14,3 +14,5 @@ However, these guides will help you quickly accomplish common tasks.\n- [Running Kubernetes on Amazon Elastic Kubernetes Service (EKS)](kubernetes-on-eks.md)\n- [Running Kube... | Rust | Apache License 2.0 | krustlet/krustlet | Document tolerations and node affinities for WASM (#332) |
350,405 | 30.07.2020 12:04:15 | -43,200 | 3fc343ba7bb04a5d1feb324dca657531a66de5e9 | UI to notify user if they need to approve a bootstrap CSR | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/bootstrapping/mod.rs",
"new_path": "crates/kubelet/src/bootstrapping/mod.rs",
"diff": "@@ -23,10 +23,11 @@ const APPROVED_TYPE: &str = \"Approved\";\npub async fn bootstrap<K: AsRef<Path>>(\nconfig: &KubeletConfig,\nbootstrap_file: K,\n+ not... | Rust | Apache License 2.0 | krustlet/krustlet | UI to notify user if they need to approve a bootstrap CSR (#336) |
350,426 | 31.07.2020 10:15:22 | 18,000 | dc7c60b1eadc9b761f014ba17abbadebafcd0831 | State module | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -358,6 +358,17 @@ dependencies = [\n\"pin-project-lite\",\n]\n+[[package]]\n+name = \"async-recursion\"\n+version = \"0.3.1\"\n+source = \"registry+https://github.com/rust-lang/crates.io-index\"\n+checksum = \... | Rust | Apache License 2.0 | krustlet/krustlet | State module |
350,426 | 01.08.2020 09:17:43 | 18,000 | 047ceef0acc360e9147d1bb25b9302eec5e86356 | Fix warnings and call state machine from pod queue. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/config.rs",
"new_path": "crates/kubelet/src/config.rs",
"diff": "//! or in environment variables, but falling back to the specified configuration file\n//! (requires you to turn on the \"cli\" feature)\n-use std::iter::FromIterator;\nuse std... | Rust | Apache License 2.0 | krustlet/krustlet | Fix warnings and call state machine from pod queue. |
350,426 | 01.08.2020 09:58:54 | 18,000 | 9300387a8d3df605093c43f5fdb6d193a56acb60 | Cargo fmt and fix doctests. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/kubelet.rs",
"new_path": "crates/kubelet/src/kubelet.rs",
"diff": "@@ -9,11 +9,7 @@ use crate::webserver::start as start_webserver;\nuse futures::future::FutureExt;\nuse futures::{StreamExt, TryStreamExt};\nuse k8s_openapi::api::core::v1::Po... | Rust | Apache License 2.0 | krustlet/krustlet | Cargo fmt and fix doctests. |
350,426 | 01.08.2020 13:13:42 | 18,000 | af6ad8832dee21a5da019e883a30422f8e51e399 | Macro, default state machine graph and trait | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/state.rs",
"new_path": "crates/kubelet/src/state.rs",
"diff": "//! Used to define a state machine of Pod states.\n+use log::info;\n+\n+pub mod default;\n+#[macro_use]\n+pub mod macros;\nuse crate::pod::Pod;\nuse k8s_openapi::api::core::v1::P... | Rust | Apache License 2.0 | krustlet/krustlet | Macro, default state machine graph and trait |
350,447 | 10.08.2020 16:25:50 | 14,400 | 9ecba542076a7515e3d9380886fa8bbe4e64de2a | feat(oci-distribution): support digest references | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -185,7 +185,7 @@ impl Client {\nself.auth(image, None).await?;\n}\n- let url = image.to_v2_manifest_url(self.config.protocol.as_str());\n+ let url = self.t... | Rust | Apache License 2.0 | krustlet/krustlet | feat(oci-distribution): support digest references |
350,447 | 10.08.2020 20:08:24 | 14,400 | 5144d268068bd515c28621e5b5819bb0b7575f95 | chore(oci-distribution): bump version | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -2039,7 +2039,7 @@ dependencies = [\n[[package]]\nname = \"oci-distribution\"\n-version = \"0.3.0\"\n+version = \"0.4.0\"\ndependencies = [\n\"anyhow\",\n\"futures-util\",\n"
},
{
"change_type": "MODIF... | Rust | Apache License 2.0 | krustlet/krustlet | chore(oci-distribution): bump version |
350,405 | 11.08.2020 14:11:17 | -43,200 | 67fa2c949bc0bb1bd872ce50d882b2acbb80108e | OCI version function was showing as dead code | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -17,8 +17,6 @@ use std::collections::HashMap;\nuse tokio::io::{AsyncWrite, AsyncWriteExt};\nuse www_authenticate::{Challenge, ChallengeFields, RawChallenge... | Rust | Apache License 2.0 | krustlet/krustlet | OCI version function was showing as dead code |
350,447 | 12.08.2020 21:13:19 | 14,400 | 60e35142e5500a109bdfca2c391ff0d439a413ed | test(client): use table driven tests
Adds coverage for image references missing tag/digest, as well
as references with both tag and digest. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -429,20 +429,28 @@ mod test {\nuse super::*;\nuse std::convert::TryFrom;\n- const HELLO_IMAGE_TAGGED: &str = \"webassembly.azurecr.io/hello-wasm:v1\";\n- c... | Rust | Apache License 2.0 | krustlet/krustlet | test(client): use table driven tests
Adds coverage for image references missing tag/digest, as well
as references with both tag and digest. |
350,447 | 12.08.2020 21:50:02 | 14,400 | 2adcd7837b474a7af398edd48e5acf2cd143751a | test(client): disable latest ref in e2e tests | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -434,7 +434,10 @@ mod test {\nconst HELLO_IMAGE_DIGEST: &str = \"webassembly.azurecr.io/hello-wasm@sha256:51d9b231d5129e3ffc267c9d455c49d789bf3167b611a07ab... | Rust | Apache License 2.0 | krustlet/krustlet | test(client): disable latest ref in e2e tests |
350,405 | 14.08.2020 09:57:07 | -43,200 | 85195ced0404a4818af79115f9b54c6666e941e5 | Self-contained integration tester | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -1630,10 +1630,12 @@ dependencies = [\n\"dirs\",\n\"env_logger\",\n\"futures\",\n+ \"hostname\",\n\"k8s-openapi\",\n\"kube\",\n\"kubelet\",\n\"oci-distribution\",\n+ \"regex\",\n\"reqwest\",\n\"serde\",\n\"ser... | Rust | Apache License 2.0 | krustlet/krustlet | Self-contained integration tester (#343) |
350,447 | 13.08.2020 18:48:58 | 14,400 | f3ffb70c815cfb9504a3d41ce6253806f23f485a | test(reference): break test cases into separate functions | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "@@ -115,61 +115,82 @@ impl Into<String> for Reference {\n}\n#[cfg(test)]\n-mod tests {\n+mod test {\nuse super::*;\n- #[test]\n- fn correctly_parses_str... | Rust | Apache License 2.0 | krustlet/krustlet | test(reference): break test cases into separate functions |
350,447 | 13.08.2020 22:45:38 | 14,400 | 6bf96423c1ed382cbb4f7081089c0a3ea2433d9e | refactor(reference): separate tag_start and repo_end parsing | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "@@ -69,25 +69,28 @@ impl TryFrom<String> for Reference {\nstring\n)\n})?;\n+ let first_colon = string[repo_start + 1..].find(':').map(|i| repo_start + i... | Rust | Apache License 2.0 | krustlet/krustlet | refactor(reference): separate tag_start and repo_end parsing |
350,405 | 19.08.2020 10:19:38 | -43,200 | f77107880d4d1ec6f62fbbe41ccc657ce92b64c9 | Mount individual items from configmaps or secrets | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/volume/mod.rs",
"new_path": "crates/kubelet/src/volume/mod.rs",
"diff": "@@ -5,7 +5,7 @@ use std::ops::Deref;\nuse std::path::PathBuf;\nuse k8s_openapi::api::core::v1::Volume as KubeVolume;\n-use k8s_openapi::api::core::v1::{ConfigMap, Secre... | Rust | Apache License 2.0 | krustlet/krustlet | Mount individual items from configmaps or secrets (#354) |
350,405 | 19.08.2020 12:22:27 | -43,200 | 32a93ba86a208d16fa9d295afa5b9d4ea923fa79 | Fix wording of decision whether to mount a config item | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/volume/mod.rs",
"new_path": "crates/kubelet/src/volume/mod.rs",
"diff": "@@ -157,12 +157,12 @@ async fn populate_from_secret(\nlet secret = secret_client.get(name).await?;\nlet data = secret.data.unwrap_or_default();\nlet data = data.iter().... | Rust | Apache License 2.0 | krustlet/krustlet | Fix wording of decision whether to mount a config item (#357) |
350,447 | 10.08.2020 20:51:12 | 14,400 | 33ea5f6af7a5674c8c4237d8c468fb4a24b9f3b8 | feat(oci-distribution): implement FromStr for Reference | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "use std::convert::{Into, TryFrom};\n+use std::str::FromStr;\n/// An OCI image reference\n///\n@@ -111,6 +112,14 @@ impl TryFrom<&str> for Reference {\n}... | Rust | Apache License 2.0 | krustlet/krustlet | feat(oci-distribution): implement FromStr for Reference |
350,447 | 10.08.2020 20:53:40 | 14,400 | 1a724ff32a33b6c3ff887f6fb8704c05369f4986 | doc(oci-distribution): add parsing example and fix formatting | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "@@ -3,9 +3,25 @@ use std::str::FromStr;\n/// An OCI image reference\n///\n-/// currently, the library only accepts modules tagged in the following struc... | Rust | Apache License 2.0 | krustlet/krustlet | doc(oci-distribution): add parsing example and fix formatting |
350,426 | 22.08.2020 09:30:49 | 18,000 | 5299992bbff348a9775b27f9655c8c66baa15942 | State Machine Attempt 2 | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/kubelet.rs",
"new_path": "crates/kubelet/src/kubelet.rs",
"diff": "@@ -33,11 +33,11 @@ pub struct Kubelet<P> {\nconfig: Box<Config>,\n}\n-impl<T: 'static + Provider + Sync + Send> Kubelet<T> {\n+impl<P: 'static + Provider + Sync + Send> Kube... | Rust | Apache License 2.0 | krustlet/krustlet | State Machine Attempt 2 |
350,426 | 22.08.2020 09:31:03 | 18,000 | cfcd2d185f824536d1a5b42b4826e832ea633e7e | Wascc Provider Implementation | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "#![deny(missing_docs)]\nuse async_trait::async_trait;\n-use k8s_openapi::api::core::v1::{ContainerStatus as KubeContainerStatus, Pod as KubePod};\n-use kube::{api::{Del... | Rust | Apache License 2.0 | krustlet/krustlet | Wascc Provider Implementation |
350,426 | 22.08.2020 13:13:41 | 18,000 | a6ee131a90d6089b00864e5a89ecf78c596358f1 | Clean up some files. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/container/handle.rs",
"new_path": "crates/kubelet/src/container/handle.rs",
"diff": "use std::io::SeekFrom;\nuse tokio::io::{AsyncRead, AsyncSeek, AsyncSeekExt};\n-use tokio::sync::watch::Receiver;\n-use crate::container::{ContainerMap, Stat... | Rust | Apache License 2.0 | krustlet/krustlet | Clean up some files. |
350,405 | 23.08.2020 12:01:06 | -43,200 | 1b72d0c226c22bc9663231e4a2dee9e7d4608af8 | Clippy is just very very disappointed in me | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/volume/mod.rs",
"new_path": "crates/kubelet/src/volume/mod.rs",
"diff": "@@ -218,13 +218,13 @@ fn pod_dir_name(pod: &Pod) -> String {\nformat!(\"{}-{}\", pod.name(), pod.namespace())\n}\n-fn mount_setting_for(key: &String, items_to_mount: &O... | Rust | Apache License 2.0 | krustlet/krustlet | Clippy is just very very disappointed in me (#361) |
350,405 | 23.08.2020 12:01:40 | -43,200 | 4a0874b079a35641e104de6728beddcd7d061e03 | Suppress deprecation warnings from Informer (for now) | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/bootstrapping/mod.rs",
"new_path": "crates/kubelet/src/bootstrapping/mod.rs",
"diff": "+#![allow(deprecated)] // TODO: remove when Informer has been replaced by kube_run::watcher\n+\nuse std::{convert::TryFrom, env, path::Path, str};\nuse fu... | Rust | Apache License 2.0 | krustlet/krustlet | Suppress deprecation warnings from Informer (for now) (#360) |
350,405 | 24.08.2020 08:05:26 | -43,200 | 749a0977c38e68da3cdc544ec8c8cfb564242336 | Insecure registries | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/config.rs",
"new_path": "crates/kubelet/src/config.rs",
"diff": "@@ -56,6 +56,9 @@ pub struct Config {\n/// Whether to allow modules to be loaded directly from local\n/// filesystem paths, as well as from registries\npub allow_local_modules:... | Rust | Apache License 2.0 | krustlet/krustlet | Insecure registries (#359) |
350,426 | 24.08.2020 08:46:26 | 18,000 | d48e63929dd5f127f495f2de56e28be8f7401ca9 | Clean up pod queue | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/pod/queue.rs",
"new_path": "crates/kubelet/src/pod/queue.rs",
"diff": "@@ -4,8 +4,7 @@ use std::sync::Arc;\nuse k8s_openapi::api::core::v1::Pod as KubePod;\nuse kube::api::{Meta, WatchEvent};\nuse kube::Client as KubeClient;\n-use log::{debu... | Rust | Apache License 2.0 | krustlet/krustlet | Clean up pod queue |
350,426 | 29.08.2020 09:02:33 | 18,000 | 257448cede01a5a66b343f675dcc83b932a78dac | Clean up some states | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/lib.rs",
"new_path": "crates/wascc-provider/src/lib.rs",
"diff": "@@ -124,9 +124,13 @@ impl StopHandler for ActorHandle {\n/// from Kubernetes.\n#[derive(Clone)]\npub struct WasccProvider {\n+ shared: SharedPodState\n+}\n+\n+#[derive(... | Rust | Apache License 2.0 | krustlet/krustlet | Clean up some states |
350,426 | 02.09.2020 20:20:33 | 18,000 | aada5f8f51b428d26ca31d5de2a9c56f50114c3d | Mark pod terminated on node shutdown. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/node/mod.rs",
"new_path": "crates/kubelet/src/node/mod.rs",
"diff": "//! `node` contains wrappers around the Kubernetes node API, containing ways to create and update\n//! nodes operating within the cluster.\nuse crate::config::Config;\n-use... | Rust | Apache License 2.0 | krustlet/krustlet | Mark pod terminated on node shutdown. |
350,426 | 02.09.2020 20:42:11 | 18,000 | 40a375ccc99fa3d87c60c4de55afa10517b50eed | Remove PodChange enum | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/pod/mod.rs",
"new_path": "crates/kubelet/src/pod/mod.rs",
"diff": "@@ -3,7 +3,6 @@ mod handle;\nmod queue;\nmod status;\npub use handle::{key_from_pod, pod_key, Handle};\n-pub use queue::PodChange;\npub(crate) use queue::Queue;\npub use stat... | Rust | Apache License 2.0 | krustlet/krustlet | Remove PodChange enum |
350,426 | 02.09.2020 21:05:14 | 18,000 | 34d1b3462949c1bff1429cf046aa7667c3b6443e | Reduce logging verbosity and handle pod force delete | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/pod/queue.rs",
"new_path": "crates/kubelet/src/pod/queue.rs",
"diff": "@@ -4,7 +4,7 @@ use std::sync::Arc;\nuse k8s_openapi::api::core::v1::Pod as KubePod;\nuse kube::api::{Meta, WatchEvent};\nuse kube::Client as KubeClient;\n-use log::{debu... | Rust | Apache License 2.0 | krustlet/krustlet | Reduce logging verbosity and handle pod force delete |
350,426 | 02.09.2020 21:12:58 | 18,000 | c2022b98a67e7e15a610bd2000af66534ab444f3 | Make AsyncDrop drop on complete. | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/pod/queue.rs",
"new_path": "crates/kubelet/src/pod/queue.rs",
"diff": "@@ -104,7 +104,6 @@ impl<P: 'static + Provider + Sync + Send> Queue<P> {\n}\n}\npod_state.async_drop().await;\n- drop(pod_state);\nlet pod_client: kube::Api<KubePod> =\nk... | Rust | Apache License 2.0 | krustlet/krustlet | Make AsyncDrop drop on complete. |
350,405 | 10.09.2020 09:34:48 | -43,200 | c4adaa49da41ce82209ac84f93abe6f86157bc94 | Image pull secrets CI test | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -76,6 +76,8 @@ jobs:\nKRUSTLET_NODE_IP: \"172.17.0.1\"\n# The default location for the cert is not accessible on build hosts, so do it in the current dir\nCONFIG_DIR: \"./conf... | Rust | Apache License 2.0 | krustlet/krustlet | Image pull secrets CI test (#380) |
350,405 | 10.09.2020 09:36:06 | -43,200 | 18c7118a39ac94c515f870f8529a91116628771d | Warn if a kubelet crashes during integration testing | [
{
"change_type": "MODIFY",
"old_path": "tests/oneclick/src/main.rs",
"new_path": "tests/oneclick/src/main.rs",
"diff": "@@ -398,6 +398,11 @@ impl OwnedChildProcess {\n)),\n}\n}\n+\n+ fn exited(&mut self) -> anyhow::Result<bool> {\n+ let exit_status = self.child.try_wait()?;\n+ Ok(exit_status.is_some... | Rust | Apache License 2.0 | krustlet/krustlet | Warn if a kubelet crashes during integration testing (#382) |
350,405 | 10.09.2020 09:36:59 | -43,200 | 716e70a603b854b02310f5e0401816f9c4fed90a | The podsmiter | [
{
"change_type": "MODIFY",
"old_path": "Cargo.toml",
"new_path": "Cargo.toml",
"diff": "@@ -42,7 +42,9 @@ rustls-tls = [\"kube/rustls-tls\", \"kubelet/rustls-tls\", \"wascc-provider/rustls-tl\nanyhow = \"1.0\"\ntokio = { version = \"0.2\", features = [\"macros\", \"rt-threaded\", \"time\"] }\nkube =... | Rust | Apache License 2.0 | krustlet/krustlet | The podsmiter (#371) |
350,405 | 11.09.2020 16:50:00 | -43,200 | 66edbeb1134a3d71ed720c7716dba87d5f269f4e | Run secrets tests only when secrets are available | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -76,8 +76,6 @@ jobs:\nKRUSTLET_NODE_IP: \"172.17.0.1\"\n# The default location for the cert is not accessible on build hosts, so do it in the current dir\nCONFIG_DIR: \"./conf... | Rust | Apache License 2.0 | krustlet/krustlet | Run secrets tests only when secrets are available (#383) |
350,405 | 22.09.2020 11:49:57 | -43,200 | 5dd4610939d974fecbc2414519c72da0afb3b720 | WASCC pods should transition to error state instead of kerploding | [
{
"change_type": "MODIFY",
"old_path": "crates/wascc-provider/src/states/starting.rs",
"new_path": "crates/wascc-provider/src/states/starting.rs",
"diff": "@@ -16,6 +16,7 @@ use crate::PodState;\nuse crate::VolumeBinding;\nuse crate::{wascc_run, ActorHandle, LogHandleFactory, WasccProvider};\n+use s... | Rust | Apache License 2.0 | krustlet/krustlet | WASCC pods should transition to error state instead of kerploding (#389) |
350,405 | 29.09.2020 13:02:55 | -46,800 | c4e55aa3a2c4f9dc08ab6c3da8629434c7012724 | Remove accidentally committed log files | [
{
"change_type": "DELETE",
"old_path": "krustlet-wascc-e2e.stderr.txt",
"new_path": null,
"diff": "-[2020-09-23T20:10:21Z INFO wascc_host::bus::inproc] Initialized Message Bus (internal)\n-[2020-09-23T20:10:21Z INFO wascc_host] Host ID is NABATKGUA76KCMPPVETB2XCWU5JNSIVUGIOML35V65UGCLZWCUF2CYYD (v0.... | Rust | Apache License 2.0 | krustlet/krustlet | Remove accidentally committed log files (#411) |
350,426 | 08.10.2020 09:41:12 | 18,000 | b59b5df67ba74e9f1b8faffd64030271d3897c91 | Remove Type Length Patch
Rust `1.47.0` appears to have fixed this issue. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "@@ -196,7 +196,7 @@ impl TryFrom<String> for Reference {\n_ => return Err(ParseError::DigestUnsupported),\n}\n}\n- return Ok(reference);\n+ Ok(reference... | Rust | Apache License 2.0 | krustlet/krustlet | Remove Type Length Patch
Rust `1.47.0` appears to have fixed this issue. |
350,405 | 11.11.2020 11:29:02 | -46,800 | 0ceaf0803eb30774f333499728d5c1c74dde7712 | References were formatted incorrectly on Windows | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/reference.rs",
"new_path": "crates/oci-distribution/src/reference.rs",
"diff": "use std::convert::{Into, TryFrom};\nuse std::error::Error;\nuse std::fmt;\n-use std::path::PathBuf;\nuse std::str::FromStr;\nuse crate::regexp;\n@@ -90,... | Rust | Apache License 2.0 | krustlet/krustlet | References were formatted incorrectly on Windows (#451) |
350,426 | 21.12.2020 22:22:36 | 25,200 | fad7754fcb314d67ecee9044e9fd8c802a09df6c | Add markdownlint to ci process. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -9,6 +9,25 @@ on:\npaths-ignore:\n- \"docs/**\"\njobs:\n+ lint_docs:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v2\n+ - uses: engineerd/setup-kind@v0.4.0\... | Rust | Apache License 2.0 | krustlet/krustlet | Add markdownlint to ci process. |
350,426 | 21.12.2020 22:26:04 | 25,200 | 08fde3a5f811c7e955aac77194617dee3de3eae8 | Dont setup Kind for markdown linting. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -13,9 +13,6 @@ jobs:\nruns-on: ubuntu-latest\nsteps:\n- uses: actions/checkout@v2\n- - uses: engineerd/setup-kind@v0.4.0\n- with:\n- version: \"v0.9.0\"\n- uses: engineerd/con... | Rust | Apache License 2.0 | krustlet/krustlet | Dont setup Kind for markdown linting. |
350,426 | 21.12.2020 22:28:44 | 25,200 | af6f1e6d30eca46c3590bf9b816d5ec1c3d22cd5 | Bump configurator version | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.yml",
"new_path": ".github/workflows/build.yml",
"diff": "@@ -13,7 +13,7 @@ jobs:\nruns-on: ubuntu-latest\nsteps:\n- uses: actions/checkout@v2\n- - uses: engineerd/configurator@v0.0.1\n+ - uses: engineerd/configurator@v0.0.5\nwith:\nnam... | Rust | Apache License 2.0 | krustlet/krustlet | Bump configurator version |
350,427 | 13.01.2021 13:45:14 | 18,000 | 21dba7b6847aeba2938976b653cad1e198223117 | adding gke to the docs to make it easy | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/README.md",
"new_path": "docs/howto/README.md",
"diff": "@@ -8,6 +8,7 @@ quickly accomplish common tasks.\n- [Running Krustlet on Azure](krustlet-on-azure.md)\n- [Running Krustlet on Amazon Elastic Kubernetes Service\n(EKS)](krustlet-on-eks.md)\n+- ... | Rust | Apache License 2.0 | krustlet/krustlet | adding gke to the docs to make it easy |
350,427 | 13.01.2021 13:59:22 | 18,000 | 69ad615c62571fa5b37267ba849a63827b746701 | typo because I'm an idiot | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/README.md",
"new_path": "docs/howto/README.md",
"diff": "@@ -8,7 +8,7 @@ quickly accomplish common tasks.\n- [Running Krustlet on Azure](krustlet-on-azure.md)\n- [Running Krustlet on Amazon Elastic Kubernetes Service\n(EKS)](krustlet-on-eks.md)\n-- ... | Rust | Apache License 2.0 | krustlet/krustlet | typo because I'm an idiot |
350,422 | 20.01.2021 12:35:39 | 28,800 | 1a3aafdbdb60c0be046e774d4b41e7368902a748 | Added clarity|explanation | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/krustlet-on-microk8s.md",
"new_path": "docs/howto/krustlet-on-microk8s.md",
"diff": "@@ -42,6 +42,8 @@ that you generated through another process, you can proceed to the next step.\nHowever, the credentials Krustlet uses must be part of the `system:... | Rust | Apache License 2.0 | krustlet/krustlet | Added clarity|explanation |
350,422 | 26.01.2021 11:30:43 | 28,800 | df704a4065481f063ae55fb3fa7488c5e39ece87 | DigitalOcean documentation | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/howto/krustlet-on-do.md",
"diff": "+# Running Krustlet on Managed Kubernetes on DigitalOcean\n+\n+These steps are for running a Krustlet node on a DigitalOcean Droplet in a\n+Managed Kubernetes DigitalOcean cluster.\n+\n+## Prerequisites\n+... | Rust | Apache License 2.0 | krustlet/krustlet | DigitalOcean documentation |
350,426 | 27.01.2021 20:34:54 | 21,600 | 5f815e7165609572ef4fee648b29fd3bd6125fde | Fix UI and doc tests | [
{
"change_type": "MODIFY",
"old_path": "Cargo.lock",
"new_path": "Cargo.lock",
"diff": "@@ -2031,7 +2031,7 @@ dependencies = [\nname = \"krator-derive\"\nversion = \"0.1.0\"\ndependencies = [\n- \"kubelet\",\n+ \"krator\",\n\"quote 1.0.7\",\n\"syn 1.0.42\",\n]\n"
},
{
"change_type": "MODIFY"... | Rust | Apache License 2.0 | krustlet/krustlet | Fix UI and doc tests |
350,408 | 04.02.2021 07:14:48 | -3,600 | a8b2ccf17d595f5208d232d112002c09dda476c5 | added information on the image pull secret | [
{
"change_type": "MODIFY",
"old_path": "docs/intro/tutorial03.md",
"new_path": "docs/intro/tutorial03.md",
"diff": "@@ -25,6 +25,8 @@ spec:\ncontainers:\n- name: krustlet-tutorial\nimage: mycontainerregistry007.azurecr.io/krustlet-tutorial:v1.0.0\n+ imagePullSecrets:\n+ - name: <acr-secret>\ntolerat... | Rust | Apache License 2.0 | krustlet/krustlet | added information on the image pull secret |
350,408 | 05.02.2021 07:00:02 | -3,600 | 9dd2d0ddad4faabcfc4d853e44ff15bb502312ff | Fixed typo and wrapping long lines | [
{
"change_type": "MODIFY",
"old_path": "docs/intro/tutorial02.md",
"new_path": "docs/intro/tutorial02.md",
"diff": "@@ -133,13 +133,20 @@ $ wasm-to-oci push demo.wasm mycontainerregistry007.azurecr.io/krustlet-tutorial\n## Create a container registry pull secret\n-Unless your container registry is e... | Rust | Apache License 2.0 | krustlet/krustlet | Fixed typo and wrapping long lines |
350,432 | 28.02.2021 14:54:50 | -3,600 | e3e567d277ed65bd1fd511288499490421682a3e | Output CRD in moose example
* Output CRD in moose example
It's handy to have this in the example program as it might not
be apparent, that the CRD can be auto-generated if you are not familiar
with the kube library yet.
* Remove unused dependency: | [
{
"change_type": "MODIFY",
"old_path": "crates/krator/Cargo.toml",
"new_path": "crates/krator/Cargo.toml",
"diff": "@@ -49,7 +49,9 @@ warp = { version = \"0.2\", optional = true, features = [\"tls\"] }\njson-patch = { version = \"0.2\", optional = true }\n[dev-dependencies]\n-kube-derive = \"0.42\"\... | Rust | Apache License 2.0 | krustlet/krustlet | Output CRD in moose example (#522)
* Output CRD in moose example
It's handy to have this in the example program as it might not
be apparent, that the CRD can be auto-generated if you are not familiar
with the kube library yet.
* Remove unused dependency: |
350,440 | 22.03.2021 16:22:32 | -3,600 | 1b1273a7cd0b511790682ce01a7e68ba6389ac20 | Pod conditions added to the StatusBuilder in kubelet | [
{
"change_type": "MODIFY",
"old_path": "crates/kubelet/src/pod/status.rs",
"new_path": "crates/kubelet/src/pod/status.rs",
"diff": "@@ -4,6 +4,7 @@ use super::Pod;\nuse crate::container::make_initial_container_status;\nuse k8s_openapi::api::core::v1::ContainerStatus as KubeContainerStatus;\nuse k8s_... | Rust | Apache License 2.0 | krustlet/krustlet | Pod conditions added to the StatusBuilder in kubelet |
350,450 | 24.03.2021 20:54:44 | -28,800 | 090e2efb1db897afcc75ee15ee26692a6c78a057 | fix(bootstrap): Handle busybox date | [
{
"change_type": "MODIFY",
"old_path": "docs/howto/assets/bootstrap.sh",
"new_path": "docs/howto/assets/bootstrap.sh",
"diff": "@@ -6,9 +6,10 @@ export LC_ALL=C\ntoken_id=\"$(</dev/urandom tr -dc a-z0-9 | head -c \"${1:-6}\";echo;)\"\ntoken_secret=\"$(< /dev/urandom tr -dc a-z0-9 | head -c \"${1:-16... | Rust | Apache License 2.0 | krustlet/krustlet | fix(bootstrap): Handle busybox date |
350,432 | 18.05.2021 01:10:21 | -7,200 | 3885934819d6499fc9bd5d96e10600da167f5b1a | Fix clippy warnings
closes | [
{
"change_type": "MODIFY",
"old_path": "crates/krator-derive/src/admission.rs",
"new_path": "crates/krator-derive/src/admission.rs",
"diff": "@@ -25,7 +25,7 @@ where\n{\nlet input: proc_macro2::TokenStream = input.into();\nlet token_stream = match syn::parse2(input)\n- .and_then(|input| <T as Custom... | Rust | Apache License 2.0 | krustlet/krustlet | Fix clippy warnings (#604)
closes #599 |
350,410 | 12.05.2021 14:39:28 | -7,200 | 991132d319d9ca8fc7d990ed0706c59534a4eede | oci-distribution: add IMAGE_DOCKER_LAYER_GZIP_MEDIA_TYPE
Needed to be able to download Docker images. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/manifest.rs",
"new_path": "crates/oci-distribution/src/manifest.rs",
"diff": "@@ -15,6 +15,9 @@ pub const IMAGE_DOCKER_CONFIG_MEDIA_TYPE: &str = \"application/vnd.docker.contain\npub const IMAGE_LAYER_MEDIA_TYPE: &str = \"applicatio... | Rust | Apache License 2.0 | krustlet/krustlet | oci-distribution: add IMAGE_DOCKER_LAYER_GZIP_MEDIA_TYPE
Needed to be able to download Docker images. |
350,430 | 18.05.2021 13:44:31 | 21,600 | 5111aaab7bef7c2e61e78a12bb860851e2255478 | Expose pull_manifest publically on Registry Client. | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -184,7 +184,7 @@ impl Client {\nself.auth(image, auth, &RegistryOperation::Pull).await?;\n}\n- let (manifest, digest) = self.pull_manifest(image).await?;\n... | Rust | Apache License 2.0 | krustlet/krustlet | Expose pull_manifest publically on Registry Client. |
350,430 | 18.05.2021 15:44:09 | 21,600 | 0b533e0e454cc0bcc5e4b15cfca1ccea524d213d | Add pull_manifest_and_config | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/client.rs",
"new_path": "crates/oci-distribution/src/client.rs",
"diff": "@@ -437,6 +437,8 @@ impl Client {\nlet digest = digest_header_value(&res)?;\nlet text = res.text().await?;\n+ println!(\"Manifest Response: {}\", text);\n+\ns... | Rust | Apache License 2.0 | krustlet/krustlet | Add pull_manifest_and_config |
350,430 | 22.05.2021 22:42:27 | 21,600 | fa10ea1a927f85cc86c557711b719a43d4742e3d | Expose ParseError | [
{
"change_type": "MODIFY",
"old_path": "crates/oci-distribution/src/lib.rs",
"new_path": "crates/oci-distribution/src/lib.rs",
"diff": "@@ -11,7 +11,7 @@ pub mod secrets;\n#[doc(inline)]\npub use client::Client;\n#[doc(inline)]\n-pub use reference::Reference;\n+pub use reference::{ParseError, Refere... | Rust | Apache License 2.0 | krustlet/krustlet | Expose ParseError |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.