Amit,

Il Sab 15 Mag 2021, 15:05 Amit Chavan <achav...@gmail.com> ha scritto:

> +1 for release of bookkeeper 4.14.
> All tests pass for herddb. PR here - Upgrade to BK 4.14
> <https://github.com/diennea/herddb/pull/750>
>

Thank you for casting your vote and testing HerdDB

But the right VOTE thread is
https://lists.apache.org/x/thread.html/r48224f8f1f4be0de244aaeff339213feac18ce6278382f12b929e432@%3Cdev.bookkeeper.apache.org%3E

Please post your message as answer to that message

Enrico




> On Mon, May 10, 2021 at 2:17 AM Andrey Yegorov <
> andrey.yego...@datastax.com>
> wrote:
>
> > I noticed that PRs are in so I built the RC0 while I had time.
> > Please vote on the corresponding thread.
> >
> > On Fri, May 7, 2021 at 3:15 PM Andrey Yegorov <
> andrey.yego...@datastax.com
> > >
> > wrote:
> >
> > > Matteo,
> > >
> > > https://github.com/apache/bookkeeper/pull/2649 also a good candidate
> for
> > > this release (fits the compaction improvements theme), also has changes
> > > requested
> > >
> > > On Fri, May 7, 2021 at 3:01 PM Andrey Yegorov <
> > andrey.yego...@datastax.com>
> > > wrote:
> > >
> > >> ok, I'll hold on on the release until these two are ready to merge
> > >>
> > >> Both PRs have changes requested by Enrico.
> > >> I'll postpone my attempt to build the release until Monday.
> > >>
> > >> If there are other PRs that *have* to be in 4.14 please move them back
> > to
> > >> the 4.14 milestone and update this thread.
> > >>
> > >>
> > >> On Fri, May 7, 2021 at 1:06 PM Matteo Merli <mme...@apache.org>
> wrote:
> > >>
> > >>> Andrey, there are several PRs that would be good to get into 4.14. We
> > >>> shouldn't just push everything out to 4.15.
> > >>>
> > >>> Just a couple of examples:
> > >>>  * https://github.com/apache/bookkeeper/pull/2710
> > >>>  * https://github.com/apache/bookkeeper/pull/2698
> > >>>
> > >>>
> > >>>
> > >>> --
> > >>> Matteo Merli
> > >>> <mme...@apache.org>
> > >>>
> > >>> On Fri, May 7, 2021 at 12:55 PM Andrey Yegorov
> > >>> <andrey.yego...@datastax.com> wrote:
> > >>> >
> > >>> > I created https://github.com/apache/bookkeeper/pull/2712 with docs
> > and
> > >>> > release notes update for the v 4.14.0
> > >>> > The most interesting part is the release notes:
> > >>> >
> > >>>
> >
> https://github.com/apache/bookkeeper/blob/e3c5994c05c970e6343fa9b43d1e63bac6142e60/site/docs/4.14.0/overview/releaseNotes.md
> > >>> >
> > >>> > Some PRs missed milestones and/or release labels, probably merged
> > >>> manually.
> > >>> > I tracked changelists from git history and updated the
> > >>> labels/milestones.
> > >>> >
> > >>> > I'll start working on the release.
> > >>> >
> > >>> > On Fri, May 7, 2021 at 8:52 AM Andrey Yegorov <
> > >>> andrey.yego...@datastax.com>
> > >>> > wrote:
> > >>> >
> > >>> > > I added https://github.com/apache/bookkeeper/issues/2711 for the
> > >>> TLS 1.3
> > >>> > > support
> > >>> > > Unless someone objects in the next 30min, I'll merge Lari's PR.
> > >>> > > After that I'll start working on the BK 4.14.0 release.
> > >>> > >
> > >>> > > On Thu, May 6, 2021 at 1:25 AM Lari Hotari <l...@hotari.net>
> > wrote:
> > >>> > >
> > >>> > >> I can confirm that the PR checks pass after excluding TLSv1.3
> from
> > >>> enabled
> > >>> > >> protocols:
> > >>> > >>
> > >>> > >>
> > >>>
> >
> https://github.com/apache/bookkeeper/pull/2696/commits/6003a374d5aec30d7059a21e473ac91417b5cdc3
> > >>> > >>
> > >>> > >> There should be tests for both TLSv1.2 and TLSv1.3 because of
> the
> > >>> > >> differences in TLS handshake described in
> > >>> > >>
> > >>> > >>
> > >>>
> >
> https://urldefense.proofpoint.com/v2/url?u=https-3A__stackoverflow.com_a_62465859&d=DwIFaQ&c=adz96Xi0w1RHqtPMowiL2g&r=0B1UvYMwy7dr9qtqFwQCfxUyrozUgZzbOshynTIaYUY&m=76JE79AuinlMNecD5DDFGgg-jXzCGZEh3PANpQOJUoE&s=iZz_eExfeElZI--ooxMmyMABWjailhDc7rKIAZNg59s&e=
> > >>> > >> .
> > >>> > >>
> > >>> > >> This also impacts some production code in Bookkeeper. The PR
> > already
> > >>> > >> includes a change to catch SSLException instead of
> > >>> SSLHandshakeException (
> > >>> > >>
> > >>> > >>
> > >>>
> >
> https://github.com/apache/bookkeeper/pull/2696/commits/fcbd707a633ed1b8cf8290cb5d70a3070e010196
> > >>> > >> ).
> > >>> > >> TLSv1.3 doesn't throw SSLHandshakeException for certificate
> issues
> > >>> because
> > >>> > >> of the differences in the protocols. This change should work for
> > >>> both
> > >>> > >> protocols, but we should have test coverage to ensure that.
> > >>> > >>
> > >>> > >> TLSv1.3 has been enabled by default since Netty 4.1.52.Final
> (when
> > >>> the JDK
> > >>> > >> contains TLSv1.3). TLSv1.3 support has been available in Java 8
> > >>> since
> > >>> > >> 8u262
> > >>> > >> .
> > >>> > >>
> > >>> > >> One of the remaining problems with TLSv1.3 support in BK is the
> > >>> state
> > >>> > >> machine and TLS counters in PerChannelBookieClient . It doesn't
> > >>> properly
> > >>> > >> model the way TLS 1.3 behaves. Currently there's a counter
> > >>> > >> FAILED_TLS_HANDSHAKE_COUNTER  which is expected to count also
> the
> > >>> > >> certificate issues (code:
> > >>> > >>
> > >>> > >>
> > >>>
> >
> https://github.com/apache/bookkeeper/blob/fcbd707a633ed1b8cf8290cb5d70a3070e010196/bookkeeper-server/src/main/java/org/apache/bookkeeper/proto/PerChannelBookieClient.java#L1535-L1543
> > >>> > >> ). Since TLSv1.3 doesn't detect certificate issues (mutual TLS)
> > >>> during
> > >>> > >> handshake, this counter doesn't count certificate issues.
> > >>> Certificate
> > >>> > >> issues will show up as successfully established connections.
> > >>> > >> The original issue for adding TLS counters was
> > >>> > >> https://github.com/apache/bookkeeper/issues/1103 and PR commit
> > was
> > >>> > >>
> > >>> > >>
> > >>>
> >
> https://github.com/apache/bookkeeper/commit/fa10b7dcd89c40222ba5f30bb60f785bd21669b2
> > >>> > >> .
> > >>> > >>
> > >>> > >> How do we revisit the TLS counter solution for TLSv1.3
> > >>> compatibility? Do
> > >>> > >> we
> > >>> > >> make changes to the code or do we simply skip the test on
> TLSv1.3
> > >>> which
> > >>> > >> ensures that a certificate issue is counted in
> > >>> > >> FAILED_TLS_HANDSHAKE_COUNTER
> > >>> > >> ? Skipping the test for TLSv1.3 would be one option. WDYT?
> > >>> > >>
> > >>> > >> -Lari
> > >>> > >>
> > >>> > >> On Wed, May 5, 2021 at 10:32 PM Andrey Yegorov <
> > >>> > >> andrey.yego...@datastax.com>
> > >>> > >> wrote:
> > >>> > >>
> > >>> > >> > Lari and I have looked at the Netty upgrade.
> > >>> > >> > There are some test breaks, and so far everything is related
> to
> > >>> behavior
> > >>> > >> > changes related to TLS 1.3, see
> > >>> > >>
> > >>>
> >
> https://urldefense.proofpoint.com/v2/url?u=https-3A__stackoverflow.com_a_62465859&d=DwIFaQ&c=adz96Xi0w1RHqtPMowiL2g&r=0B1UvYMwy7dr9qtqFwQCfxUyrozUgZzbOshynTIaYUY&m=76JE79AuinlMNecD5DDFGgg-jXzCGZEh3PANpQOJUoE&s=iZz_eExfeElZI--ooxMmyMABWjailhDc7rKIAZNg59s&e=
> > >>> > >> > We managed to fix some of the issues
> > >>> > >> > https://github.com/apache/bookkeeper/pull/2696 but "the
> client
> > >>> won't
> > >>> > >> know
> > >>> > >> > whether the server has accepted the certificate or not until
> it
> > >>> next
> > >>> > >> reads
> > >>> > >> > data from the server" complicates things.
> > >>> > >> >
> > >>> > >> > Currently we are considering simply setting "java
> > >>> > >> > -Djdk.tls.client.protocols=TLSv1.2" to unbreak the tests and
> > >>> handling
> > >>> > >> > tls1.3 as a separate work item.
> > >>> > >> >
> > >>> > >> > Lari is planning on spending a little bit more time on this
> > >>> tomorrow
> > >>> > >> (his
> > >>> > >> > tomorrow) to see if there is a better way to address this
> > >>> quickly; we'll
> > >>> > >> > hear more then.
> > >>> > >> >
> > >>> > >> >
> > >>> > >> > On Wed, May 5, 2021 at 9:23 AM Henry Saputra <
> > >>> henry.sapu...@gmail.com>
> > >>> > >> > wrote:
> > >>> > >> >
> > >>> > >> > > I am +1 for having next release as 4.14.0
> > >>> > >> > >
> > >>> > >> > > - Henry
> > >>> > >> > >
> > >>> > >> > > On Tue, May 4, 2021 at 2:51 PM Andrey Yegorov <
> > >>> > >> > andrey.yego...@datastax.com
> > >>> > >> > > >
> > >>> > >> > > wrote:
> > >>> > >> > >
> > >>> > >> > > > Overall +1 for 4.14.0 - the milestone is due May 16th
> > anyway.
> > >>> > >> > > > There is nothing that breaks compatibility with 4.13 so we
> > >>> can skip
> > >>> > >> > > 4.13.1.
> > >>> > >> > > >
> > >>> > >> > > > One thing I'd love to see in 4.14 is
> > >>> > >> > > > https://github.com/apache/bookkeeper/pull/2696 , to fix
> > >>> > >> > > > https://github.com/netty/netty/issues/10986
> > >>> > >> > > > It looks like there are issues with vertx
> > >>> > >> > > >
> > >>> > >>
> > >>>
> https://github.com/apache/bookkeeper/pull/2693#issuecomment-823774769
> > >>> > >> > > > I hope we can upgrade to latest vertx 3.9.7 and netty
> 4.1.60
> > >>> > >> > > >
> > >>> > >> > > > Also https://github.com/apache/bookkeeper/pull/2695
> > upgrades
> > >>> > >> libthrift
> > >>> > >> > > to
> > >>> > >> > > > address security issues.
> > >>> > >> > > >
> > >>> > >> > > > All these PRs are from Lari, I'll follow up with him.
> > >>> > >> > > >
> > >>> > >> > > > I can be a RM if there are no other volunteers.
> > >>> > >> > > >
> > >>> > >> > > >
> > >>> > >> > > > On Tue, May 4, 2021 at 1:57 PM Matteo Merli <
> > >>> mme...@apache.org>
> > >>> > >> wrote:
> > >>> > >> > > >
> > >>> > >> > > > > +1 We should do 4.14, carrying all the fixes that are
> > there
> > >>> in
> > >>> > >> master
> > >>> > >> > > as
> > >>> > >> > > > > well.
> > >>> > >> > > > >
> > >>> > >> > > > >
> > >>> > >> > > > > --
> > >>> > >> > > > > Matteo Merli
> > >>> > >> > > > > <mme...@apache.org>
> > >>> > >> > > > >
> > >>> > >> > > > > On Tue, May 4, 2021 at 11:57 AM Sijie Guo <
> > >>> guosi...@gmail.com>
> > >>> > >> > wrote:
> > >>> > >> > > > > >
> > >>> > >> > > > > > +1
> > >>> > >> > > > > >
> > >>> > >> > > > > > On Tue, May 4, 2021 at 2:22 AM Yunze Xu
> > >>> > >> > <y...@streamnative.io.invalid
> > >>> > >> > > >
> > >>> > >> > > > > > wrote:
> > >>> > >> > > > > >
> > >>> > >> > > > > > > Hello,
> > >>> > >> > > > > > > About 10 days ago I found a heap memory copy problem
> > in
> > >>> Apache
> > >>> > >> > > > Pulsar,
> > >>> > >> > > > > see
> > >>> > >> > > > > > > [1].
> > >>> > >> > > > > > > It’s a problem of BK side because when
> > >>> > >> > `LedgerHandle#asyncAddEntry`
> > >>> > >> > > > > > > accepts a `CompositeByteBuf` or a wrapper, it will
> > >>> finally
> > >>> > >> call
> > >>> > >> > > > > > > `ByteBuf#nioBuffer()`, which would make a heap copy
> > from
> > >>> > >> direct
> > >>> > >> > > > memory.
> > >>> > >> > > > > > > [2] fixed this problem and has been merged for a
> week.
> > >>> > >> > > > > > >
> > >>> > >> > > > > > > Since it has a significant impact on Pulsar, Pulsar
> > side
> > >>> > >> needs a
> > >>> > >> > > new
> > >>> > >> > > > BK
> > >>> > >> > > > > > > release with [2] merged to fix it. Is there any plan
> > to
> > >>> cut a
> > >>> > >> > > 4.13.1
> > >>> > >> > > > > > > release or 4.14.0 release so that we can upgrade the
> > >>> > >> dependency
> > >>> > >> > in
> > >>> > >> > > > > Pulsar?
> > >>> > >> > > > > > >
> > >>> > >> > > > > > > Thanks,
> > >>> > >> > > > > > > Yunze
> > >>> > >> > > > > > >
> > >>> > >> > > > > > > [1] https://github.com/apache/pulsar/pull/10330 <
> > >>> > >> > > > > > > https://github.com/apache/pulsar/pull/10330>
> > >>> > >> > > > > > >
> > >>> > >> > > > > > > [2] https://github.com/apache/bookkeeper/pull/2701
> <
> > >>> > >> > > > > > > https://github.com/apache/bookkeeper/pull/2701>
> > >>> > >> > > > > > >
> > >>> > >> > > > > > >
> > >>> > >> > > > >
> > >>> > >> > > >
> > >>> > >> > > >
> > >>> > >> > > > --
> > >>> > >> > > >
> > >>> > >> > > > --
> > >>> > >> > > > Andrey Yegorov
> > >>> > >> > > >
> > >>> > >> > >
> > >>> > >> >
> > >>> > >> >
> > >>> > >> > --
> > >>> > >> >
> > >>> > >> > --
> > >>> > >> > Andrey Yegorov
> > >>> > >> >
> > >>> > >>
> > >>> > >
> > >>> > >
> > >>> > > --
> > >>> > >
> > >>> > > --
> > >>> > > Andrey Yegorov
> > >>> > >
> > >>> >
> > >>> >
> > >>> > --
> > >>> >
> > >>> > --
> > >>> > Andrey Yegorov
> > >>>
> > >>
> > >>
> > >> --
> > >>
> > >> --
> > >> Andrey Yegorov
> > >>
> > >
> > >
> > > --
> > >
> > > --
> > > Andrey Yegorov
> > >
> >
> >
> > --
> >
> > --
> > Andrey Yegorov
> >
>

Reply via email to