-
Notifications
You must be signed in to change notification settings - Fork 304
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HPCC-30746 Add support for bare-metal DFS TLS #18005
HPCC-30746 Add support for bare-metal DFS TLS #18005
Conversation
https://track.hpccsystems.com/browse/HPCC-30746 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't see anything wrong/logic flaws, although I didn't follow it all. One question.
fs/dafsclient/rmtclient.cpp
Outdated
@@ -340,6 +340,31 @@ IDAFS_Exception *createDafsExceptionV(int code, const char *format, ...) | |||
return ret; | |||
} | |||
|
|||
unsigned getPreferredDafsClientPort(bool external) | |||
{ | |||
if (isContainerized()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this mean this is not called when K8s calls bare-metal? Will this trigger failures?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that was a late addition and a mistake, there is 1 context it is called in which is explicitly bare-metal only (which is why added, thinking it was the only place), but it is also refactored code that could be called in general/in containerized too in theory (possibly only via containerized when ~foreign has been enabled..)
I'll remove.
1) Fix some issues that prevented the DFS service from being useable in bare-metal. 2) Allow dafilesrv in standard (non-SSL) configuration, to also listen for SSL connections. So that existing bare-metal connections continue to use existing port, and DFS calls can use the TLS route. 3) Modify the dafilesrv secret hook mapping, so that it allows no secret, which means, still establish a secure connection (TLS), but without certificates. Signed-off-by: Jake Smith <jake.smith@lexisnexisrisk.com>
dba71ca
to
bf1b435
Compare
@ghalliday - removed the isContainerized() test form getPreferredDafsClientPort (squashed in). |
@@ -1067,7 +1067,7 @@ bool getBestFilePart(CActivityBase *activity, IPartDescriptor &partDesc, OwnedIF | |||
file.setown(createDaliServixFile(rfn)); | |||
} | |||
else | |||
file.setown(createIFile(locationName.str())); | |||
file.setown(createIFile(rfn)); // use rfn not locationName, to preserve port through hooking mechanisms |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good find.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved.
37d9f4b
into
hpcc-systems:candidate-9.4.x
So that existing bare-metal connections continue to use existing port, and DFS calls can use the TLS route.
Type of change:
Checklist:
Smoketest:
Testing: