-
Notifications
You must be signed in to change notification settings - Fork 9.1k
HADOOP-17717. Update wildfly openssl to 1.1.3.Final. #3029
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: trunk
Are you sure you want to change the base?
Conversation
Change-Id: I51b03ef075de994d118efec0c0077e030e37f5b1
|
This is one of those JARs where we've had most problems on specific linux builds and in a distro setup rather than the module unit tests. What modules have you tested with this?
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm OK with this, I do need to some details on whatever testing you've done to make sure this goes through the code properly.
as an example, if the ssl channel mode is set to openssl for s3a, then all https connections MUST be through the native ssl libs, which wildfly will let us do.
fs.s3a.ssl.channel.mode = openssl
(Actually, I'm thinking we should add something to cloudstore to force the creation of connections through wildfly + openssl just so we can explicitly check that the wiring up is good.
|
@steveloughran, is there any update on this fix? We are also waiting for the fix of this vulnerability issue. |
I'd like the hadoop-azure and hadoop-aws integration tests we have had major problems with wildfly and s3 SSL in the past, including sometimes hanging during SSL handshake (triggered by some Linux Kernel security changes)...verifying all is healthy is critical here |
|
@steveloughran , if we don't set fs.s3a.ssl.channel.mode property to openssl, will it still go through this wildfly lib in any chance? |
|
the default tries wildfly and falls back to jvm on problems; openssl means openssl/wildfy only |
|
rebasing for 3.3.5 with testing, as there is a CVE related to the one we ship. this is lower risk than for the 2.2 upgrade |
|
rebased into #5310 and targeting 3.3.5 so as to tick off another CVE |
No description provided.