-
Notifications
You must be signed in to change notification settings - Fork 304
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HPCC-30882 Add support for legacy (non-TLS) DFS access #18050
HPCC-30882 Add support for legacy (non-TLS) DFS access #18050
Conversation
@ghalliday - please review (2nd commit). NB: it is based on-top of #18049, which should be merged 1st, then this rebased. |
2ada51a
to
66e421a
Compare
@ghalliday - workflow runs rerunning because commit message mentioned wrong JIRA (now corrected) |
@jakesmith please can you rebase. |
66e421a
to
b016d3f
Compare
@ghalliday - rebased. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. One question on logging.
dali/base/dautils.cpp
Outdated
throw makeStringExceptionV(0, "%s DFS service request made, but no %s directio service available", typeText, typeText); | ||
} | ||
StringBuffer epStr; | ||
DBGLOG("Remap secure=%s to: %s", boolToStr(secure), dafileSrvNodeCopy->endpoint().getEndpointHostText(epStr).str()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jakesmith will this generate excessive tracing?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removed/squashed
via non-TLS ~remote and/or non-TLS ~foreign. Allow the system to be configured with a separate non-TLS DFS service and accompanying non-TLS directio. This will allow a legacy bare-metal system, that dosn't support secrets, to inter-operate with a suitably configured k8s hpcc system via a dedicated DFS+directio service. Signed-off-by: Jake Smith <[email protected]>
b016d3f
to
843d736
Compare
via non-TLS ~remote and/or non-TLS ~foreign.
Allow the system to be configured with a separate non-TLS
DFS service and accompanying non-TLS directio.
This will allow a legacy bare-metal system, that dosn't support
secrets, to inter-operate with a suitably configured k8s hpcc
system via a dedicated DFS+directio service.
Signed-off-by: Jake Smith [email protected]
Type of change:
Checklist:
Smoketest:
Testing: