You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2021/10/25 20:57:00 UTC
[jira] [Commented] (NIFI-8792) Refactor ListenRELP using Netty
[ https://issues.apache.org/jira/browse/NIFI-8792?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17433989#comment-17433989 ]
ASF subversion and git services commented on NIFI-8792:
-------------------------------------------------------
Commit 309ab8f4ab1dafdd2386ba9f2d17376bc75b691e in nifi's branch refs/heads/main from Nathan Gough
[ https://gitbox.apache.org/repos/asf?p=nifi.git;h=309ab8f ]
NIFI-8792 - Modified ListenRELP to use Netty
- Refactored RELP encoders and decoders
This closes #5398
Signed-off-by: David Handermann <ex...@apache.org>
> Refactor ListenRELP using Netty
> -------------------------------
>
> Key: NIFI-8792
> URL: https://issues.apache.org/jira/browse/NIFI-8792
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Extensions
> Affects Versions: 1.15.0
> Reporter: David Handermann
> Assignee: Nathan Gough
> Priority: Minor
> Labels: TLS, security
> Fix For: 1.15.0
>
> Time Spent: 3h 20m
> Remaining Estimate: 0h
>
> The {{ListenRELP}} processor currently depends on {{SocketChannelDispatcher}}, which uses the custom {{SSLSocketChannel}} when enabled for TLS. The addition of Netty-based alternatives in {{nifi-event-transport}} removes the need for custom {{SSLEngine}} interaction and also streamlines the implementation of custom socket protocols. Refactoring {{ListenRELP}} to use Netty should also include updating associated unit tests to improve reliability.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)