You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2021/10/25 20:57:00 UTC

[jira] [Commented] (NIFI-8792) Refactor ListenRELP using Netty

    [ https://issues.apache.org/jira/browse/NIFI-8792?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17433989#comment-17433989 ] 

ASF subversion and git services commented on NIFI-8792:
-------------------------------------------------------

Commit 309ab8f4ab1dafdd2386ba9f2d17376bc75b691e in nifi's branch refs/heads/main from Nathan Gough
[ https://gitbox.apache.org/repos/asf?p=nifi.git;h=309ab8f ]

NIFI-8792 - Modified ListenRELP to use Netty

- Refactored RELP encoders and decoders

This closes #5398

Signed-off-by: David Handermann <ex...@apache.org>


> Refactor ListenRELP using Netty
> -------------------------------
>
>                 Key: NIFI-8792
>                 URL: https://issues.apache.org/jira/browse/NIFI-8792
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Extensions
>    Affects Versions: 1.15.0
>            Reporter: David Handermann
>            Assignee: Nathan Gough
>            Priority: Minor
>              Labels: TLS, security
>             Fix For: 1.15.0
>
>          Time Spent: 3h 20m
>  Remaining Estimate: 0h
>
> The {{ListenRELP}} processor currently depends on {{SocketChannelDispatcher}}, which uses the custom {{SSLSocketChannel}} when enabled for TLS. The addition of Netty-based alternatives in {{nifi-event-transport}} removes the need for custom {{SSLEngine}} interaction and also streamlines the implementation of custom socket protocols. Refactoring {{ListenRELP}} to use Netty should also include updating associated unit tests to improve reliability.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)