fix aggressive expiration detection (#11446)

for some flaky networks this may be too fast of a value
choose a defensive value, and let this be addressed
properly in a new refactor of dsync with renewal logic.

Also enable faster fallback delay to cater for misconfigured
IPv6 servers

refer
 - https://golang.org/pkg/net/#Dialer
 - https://tools.ietf.org/html/rfc6555
This commit is contained in:
Harshavardhana
2021-02-04 16:56:40 -08:00
committed by GitHub
parent 3fc4d6f620
commit da55a05587
5 changed files with 14 additions and 5 deletions

View File

@@ -302,7 +302,7 @@ func lockMaintenance(ctx context.Context, interval time.Duration) error {
for _, c := range lockers {
go func(lrip lockRequesterInfo, c dsync.NetLocker) {
defer wg.Done()
ctx, cancel := context.WithTimeout(GlobalContext, 3*time.Second)
ctx, cancel := context.WithTimeout(GlobalContext, 5*time.Second)
// Call back to all participating servers, verify
// if each of those servers think lock is still