This is an automated email from the ASF dual-hosted git repository.

zhongxjian pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/dubbo-kubernetes.git


The following commit(s) were added to refs/heads/master by this push:
     new 9629ebf5 add license (#811)
9629ebf5 is described below

commit 9629ebf5982f9c741c5928e78f22d503c09331db
Author: Jian Zhong <[email protected]>
AuthorDate: Fri Nov 7 14:56:31 2025 +0800

    add license (#811)
    
    add license v2
    
    chore: go fmt
    
    fix typo
    
    fix typo
    
    change named
---
 pkg/adsc/adsc.go                                         |  6 ++----
 sail/cmd/sail-agent/app/wait.go                          |  2 --
 sail/pkg/bootstrap/certcontroller.go                     |  4 ++--
 sail/pkg/bootstrap/servicecontroller.go                  |  1 -
 sail/pkg/features/sail.go                                |  2 +-
 sail/pkg/features/tuning.go                              |  6 +++---
 sail/pkg/serviceregistry/kube/controller/multicluster.go |  4 ++--
 sail/pkg/xds/discovery.go                                |  2 +-
 test/grpc-proxyless/go.mod                               | 15 +++++++++++++++
 9 files changed, 26 insertions(+), 16 deletions(-)

diff --git a/pkg/adsc/adsc.go b/pkg/adsc/adsc.go
index bdc65caf..44206a41 100644
--- a/pkg/adsc/adsc.go
+++ b/pkg/adsc/adsc.go
@@ -95,8 +95,6 @@ type Config struct {
        BackoffPolicy backoff.BackOff
 }
 
-// ADSC implements a basic client for ADS, for use in stress tests and tools
-// or libraries that need to connect to Istio pilot or other ADS servers.
 type ADSC struct {
        // Stream is the GRPC connection stream, allowing direct GRPC send 
operations.
        // Set after Dial is called.
@@ -762,7 +760,7 @@ func (a *ADSC) handleLDS(ll []*listener.Listener) {
                        lt[l.Name] = l
                        config, _ := 
protomarshal.MessageToStructSlow(filter.GetTypedConfig())
                        c := config.Fields["cluster"].GetStringValue()
-                       klog.V(2).Infof("TCP: %s -> %s", l.Name, c)
+                       klog.V(2).InfoS("TCP: %s -> %s", l.Name, c)
                case wellknown.HTTPConnectionManager:
                        lh[l.Name] = l
 
@@ -774,7 +772,7 @@ func (a *ADSC) handleLDS(ll []*listener.Listener) {
                                routes = append(routes, fmt.Sprintf("%d", port))
                        }
                default:
-                       klog.Infof(protomarshal.ToJSONWithIndent(l, "  "))
+                       klog.Info(protomarshal.ToJSONWithIndent(l, "  "))
                }
        }
 
diff --git a/sail/cmd/sail-agent/app/wait.go b/sail/cmd/sail-agent/app/wait.go
index c8d46b9f..91d2e441 100644
--- a/sail/cmd/sail-agent/app/wait.go
+++ b/sail/cmd/sail-agent/app/wait.go
@@ -88,5 +88,3 @@ func init() {
        waitCmd.PersistentFlags().IntVar(&periodMillis, "periodMillis", 500, 
"number of milliseconds to wait between attempts")
        waitCmd.PersistentFlags().StringVar(&url, "url", 
"http://localhost:15020/healthz/ready";, "URL to use in requests")
 }
-
-
diff --git a/sail/pkg/bootstrap/certcontroller.go 
b/sail/pkg/bootstrap/certcontroller.go
index 0e61cf31..b6805a3c 100644
--- a/sail/pkg/bootstrap/certcontroller.go
+++ b/sail/pkg/bootstrap/certcontroller.go
@@ -132,9 +132,9 @@ func (s *Server) RotateDNSCertForK8sCA(stop <-chan struct{},
 func (s *Server) initDNSCertsK8SRA() error {
        var certChain, keyPEM, caBundle []byte
        var err error
-       pilotCertProviderName := features.SailCertProvider
+       sailCertProviderName := features.SailCertProvider
 
-       signerName := strings.TrimPrefix(pilotCertProviderName, 
constants.CertProviderKubernetesSignerPrefix)
+       signerName := strings.TrimPrefix(sailCertProviderName, 
constants.CertProviderKubernetesSignerPrefix)
        klog.Infof("Generating K8S-signed cert for %v using signer %v", 
s.dnsNames, signerName)
        certChain, keyPEM, _, err = chiron.GenKeyCertK8sCA(s.kubeClient.Kube(),
                strings.Join(s.dnsNames, ","), "", signerName, true, 
SelfSignedCACertTTL.Get())
diff --git a/sail/pkg/bootstrap/servicecontroller.go 
b/sail/pkg/bootstrap/servicecontroller.go
index 075e2920..b4963153 100644
--- a/sail/pkg/bootstrap/servicecontroller.go
+++ b/sail/pkg/bootstrap/servicecontroller.go
@@ -63,7 +63,6 @@ func (s *Server) initServiceControllers(args *SailArgs) error 
{
        return nil
 }
 
-// initKubeRegistry creates all the k8s service controllers under this pilot
 func (s *Server) initKubeRegistry(args *SailArgs) (err error) {
        args.RegistryOptions.KubeOptions.ClusterID = s.clusterID
        args.RegistryOptions.KubeOptions.Revision = args.Revision
diff --git a/sail/pkg/features/sail.go b/sail/pkg/features/sail.go
index e4e684d8..0dfa4d44 100644
--- a/sail/pkg/features/sail.go
+++ b/sail/pkg/features/sail.go
@@ -49,7 +49,7 @@ var (
                        "and will not distribute CRL data to namespaces for 
proxies to consume.",
        ).Get()
        SailCertProvider = env.Register("SAIL_CERT_PROVIDER", 
constants.CertProviderDubbod,
-               "The provider of Pilot DNS certificate. K8S RA will be used for 
k8s.io/NAME. 'dubbod' value will sign"+
+               "The provider of Sail DNS certificate. K8S RA will be used for 
k8s.io/NAME. 'dubbod' value will sign"+
                        " using Dubbo build in CA. Other values will not not 
generate TLS certs, but still "+
                        " distribute ./etc/certs/root-cert.pem. Only used if 
custom certificates are not mounted.").Get()
        DubbodServiceCustomHost = env.Register("DUBBOD_CUSTOM_HOST", "",
diff --git a/sail/pkg/features/tuning.go b/sail/pkg/features/tuning.go
index 6d9198f5..a08b9b55 100644
--- a/sail/pkg/features/tuning.go
+++ b/sail/pkg/features/tuning.go
@@ -30,7 +30,7 @@ var (
                "Sets the maximum number of concurrent grpc streams.",
        ).Get()
 
-       // MaxRecvMsgSize The max receive buffer size of gRPC received channel 
of Pilot in bytes.
+       // MaxRecvMsgSize The max receive buffer size of gRPC received channel 
of Sail in bytes.
        MaxRecvMsgSize = env.Register(
                "DUBBO_GPRC_MAXRECVMSGSIZE",
                4*1024*1024,
@@ -61,7 +61,7 @@ var (
                100*time.Millisecond,
                "The delay added to config/registry events for debouncing. This 
will delay the push by "+
                        "at least this interval. If no change is detected 
within this period, the push will happen, "+
-                       " otherwise we'll keep delaying until things settle, up 
to a max of PILOT_DEBOUNCE_MAX.",
+                       " otherwise we'll keep delaying until things settle, up 
to a max of SAIL_DEBOUNCE_MAX.",
        ).Get()
 
        DebounceMax = env.Register(
@@ -74,7 +74,7 @@ var (
        EnableEDSDebounce = env.Register(
                "SAIL_ENABLE_EDS_DEBOUNCE",
                true,
-               "If enabled, Sail will include EDS pushes in the push 
debouncing, configured by PILOT_DEBOUNCE_AFTER and PILOT_DEBOUNCE_MAX."+
+               "If enabled, Sail will include EDS pushes in the push 
debouncing, configured by SAIL_DEBOUNCE_AFTER and SAIL_DEBOUNCE_MAX."+
                        " EDS pushes may be delayed, but there will be fewer 
pushes. By default this is enabled",
        ).Get()
 
diff --git a/sail/pkg/serviceregistry/kube/controller/multicluster.go 
b/sail/pkg/serviceregistry/kube/controller/multicluster.go
index 8027c4d5..5bbf3b61 100644
--- a/sail/pkg/serviceregistry/kube/controller/multicluster.go
+++ b/sail/pkg/serviceregistry/kube/controller/multicluster.go
@@ -40,7 +40,7 @@ func (k *kubeController) Close() {
 }
 
 type Multicluster struct {
-       // serverID of this pilot instance used for leader election
+       // serverID of this sail instance used for leader election
        serverID string
 
        // options to use when creating kube controllers
@@ -148,7 +148,7 @@ func (m *Multicluster) initializeCluster(cluster 
*multicluster.Cluster, kubeCont
                                                nc := 
NewNamespaceController(client, m.caBundleWatcher)
                                                // Start informers again. This 
fixes the case where informers for namespace do not start,
                                                // as we create them only after 
acquiring the leader lock
-                                               // Note: stop here should be 
the overall pilot stop, NOT the leader election stop. We are
+                                               // Note: stop here should be 
the overall sail stop, NOT the leader election stop. We are
                                                // basically lazy loading the 
informer, if we stop it when we lose the lock we will never
                                                // recreate it again.
                                                client.RunAndWait(clusterStopCh)
diff --git a/sail/pkg/xds/discovery.go b/sail/pkg/xds/discovery.go
index a77cf866..f2048ab9 100644
--- a/sail/pkg/xds/discovery.go
+++ b/sail/pkg/xds/discovery.go
@@ -206,7 +206,7 @@ func (s *DiscoveryServer) ProxyUpdate(clusterID cluster.ID, 
ip string) {
                }
        }
 
-       // It is possible that the envoy has not connected to this pilot, maybe 
connected to another pilot
+       // It is possible that the envoy has not connected to this sail, maybe 
connected to another sail
        if connection == nil {
                return
        }
diff --git a/test/grpc-proxyless/go.mod b/test/grpc-proxyless/go.mod
index bef17d48..c1b91d8f 100644
--- a/test/grpc-proxyless/go.mod
+++ b/test/grpc-proxyless/go.mod
@@ -1,3 +1,18 @@
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+//     http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
 module github.com/apache/dubbo-kubernetes/test/grpc-proxyless
 
 go 1.24.0

Reply via email to