etcd/api/etcdserverpb
Joel Smith 19f7c6ef3e *: Update gogo/protobuf to v1.3.2, rerun ./scripts/genproto.sh
While it appears that etcd is not vulnerable to CVE-2021-3121,
it is a good idea to update to the new generator so that new
vulnerable code isn't generated in any future APIs. Also, this
lays the issue to rest of whether there is any issue with
etcd and CVE-2021-3121.
2021-03-23 11:48:06 -06:00
..
gw *: Execution of ./scripts/genproto.sh after versions change 2020-10-14 18:46:38 +02:00
etcdserver.pb.go *: Update gogo/protobuf to v1.3.2, rerun ./scripts/genproto.sh 2021-03-23 11:48:06 -06:00
etcdserver.proto
raft_internal_stringer_test.go *: Update references to code moved to the api/ dir. 2020-10-06 11:56:16 +02:00
raft_internal_stringer.go
raft_internal.pb.go *: Update gogo/protobuf to v1.3.2, rerun ./scripts/genproto.sh 2021-03-23 11:48:06 -06:00
raft_internal.proto *: Update references to code moved to the api/ dir. 2020-10-06 11:56:16 +02:00
rpc.pb.go *: Update gogo/protobuf to v1.3.2, rerun ./scripts/genproto.sh 2021-03-23 11:48:06 -06:00
rpc.proto Raft: Expand raft documentation, in particular point on godocs. 2021-01-15 12:34:02 +01:00