[GitHub] kafka pull request: KAFKA-3166; Disable SSL client authentication ...

2016-01-29 Thread asfgit
Github user asfgit closed the pull request at:

https://github.com/apache/kafka/pull/827


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] kafka pull request: KAFKA-3166; Disable SSL client authentication ...

2016-01-29 Thread ijuma
Github user ijuma closed the pull request at:

https://github.com/apache/kafka/pull/830


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] kafka pull request: KAFKA-3166; Disable SSL client authentication ...

2016-01-29 Thread ijuma
GitHub user ijuma opened a pull request:

https://github.com/apache/kafka/pull/830

KAFKA-3166; Disable SSL client authentication for SASL_SSL security 
protocol (backport)

Backport of https://github.com/apache/kafka/pull/827 to 0.9.0 that only 
includes the essential code changes (excluded the test changes due to 
conflicts).

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/ijuma/kafka 
kafka-3166-backport-disable-ssl-auth-sasl-ssl

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/kafka/pull/830.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #830


commit b5513d6a1bb86c99aef81af40f63f24b005004ff
Author: Ismael Juma 
Date:   2016-01-28T19:51:14Z

SSL client authentication should be disabled for SASL_SSL security protocol




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] kafka pull request: KAFKA-3166; Disable SSL client authentication ...

2016-01-28 Thread ijuma
GitHub user ijuma opened a pull request:

https://github.com/apache/kafka/pull/827

KAFKA-3166; Disable SSL client authentication for SASL_SSL security protocol

Also:

* Fixed a bug in `createSslConfig` where we were always generating a
keystore even if `useClientCert` was false and `mode` was `Mode.CLIENT``.
* Pass `numRecords` to `consumerRecords` and other clean-ups (formatting 
and scaladoc).


You can merge this pull request into a Git repository by running:

$ git pull https://github.com/ijuma/kafka 
kafka-3166-disable-ssl-auth-sasl-ssl

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/kafka/pull/827.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #827


commit a73db892c96e333bd1942655014bd34662522c39
Author: Ismael Juma 
Date:   2016-01-28T19:51:14Z

SSL client authentication should be disabled for SASL_SSL security protocol

Also fixed a bug in `createSslConfig` where we were always generating a
keystore even if `useClientCert` was false and `mode` was `Mode.CLIENT``.

commit 82652211f7de1191df9f955809cf35671e0b38c8
Author: Ismael Juma 
Date:   2016-01-28T19:56:46Z

Pass `numRecords` to `consumerRecords` and clean-ups.




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---