You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@bookkeeper.apache.org by GitBox <gi...@apache.org> on 2022/06/07 04:38:43 UTC

[GitHub] [bookkeeper] michaeljmarshall opened a new pull request, #3320: [Client] Deduplicate error log for SSLException

michaeljmarshall opened a new pull request, #3320:
URL: https://github.com/apache/bookkeeper/pull/3320

   ### Motivation
   
   While testing #3310, I noticed that the `PerChannelBookieClient#exceptionCaught` logic contains redundant logs when the exception is an `SSLException`. This PR removes a redundant log from client.
   
   Based on reading through the rest of the method, this is a trivial change with no other side effects.
   
   ### Changes
   
   * Return early to prevent a redundant log
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] Shoothzj merged pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
Shoothzj merged PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1148206841

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] nicoloboschi commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
nicoloboschi commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1148303247

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1149487706

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1148220559

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1150032284

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1148228122

   Here is an example of the redundant log:
   ```
   2022-06-07T00:20:22,037 - ERROR - [bookkeeper-io-37-1:PerChannelBookieClient$4@1534] - TLS handshake failed with bookie: [id: 0x2c892ec5, L:/127.0.0.1:57321 - R:/127.0.0.1:57312]/127.0.0.1:57312, current state START_TLS : 
   javax.net.ssl.SSLHandshakeException: General OpenSslEngine problem
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.handshakeException(ReferenceCountedOpenSslEngine.java:1895) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.wrap(ReferenceCountedOpenSslEngine.java:822) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:522) ~[?:?]
   	at io.netty.handler.ssl.SslHandler.wrap(SslHandler.java:1040) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.wrapNonAppData(SslHandler.java:926) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1408) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decodeNonJdkCompatible(SslHandler.java:1246) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1286) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:510) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:449) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:279) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:722) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:658) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:584) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:496) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:995) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at java.lang.Thread.run(Thread.java:829) ~[?:?]
   Caused by: java.security.cert.CertificateException: No name matching localhost found
   	at sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:234) ~[?:?]
   	at sun.security.util.HostnameChecker.match(HostnameChecker.java:103) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) ~[?:?]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:234) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:773) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1484) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:94) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1459) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1548) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1394) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	... 21 more
   2022-06-07T00:20:22,043 - ERROR - [bookkeeper-io-37-2:PerChannelBookieClient@1315] - Unexpected exception caught by bookie client channel handler
   io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: General OpenSslEngine problem
   	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:480) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:279) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:722) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:658) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:584) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:496) ~[netty-transport-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:995) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) ~[netty-common-4.1.77.Final.jar:4.1.77.Final]
   	at java.lang.Thread.run(Thread.java:829) ~[?:?]
   Caused by: javax.net.ssl.SSLHandshakeException: General OpenSslEngine problem
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.handshakeException(ReferenceCountedOpenSslEngine.java:1895) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.wrap(ReferenceCountedOpenSslEngine.java:822) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:522) ~[?:?]
   	at io.netty.handler.ssl.SslHandler.wrap(SslHandler.java:1040) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.wrapNonAppData(SslHandler.java:926) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1408) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decodeNonJdkCompatible(SslHandler.java:1246) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1286) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:510) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:449) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	... 17 more
   Caused by: java.security.cert.CertificateException: No name matching localhost found
   	at sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:234) ~[?:?]
   	at sun.security.util.HostnameChecker.match(HostnameChecker.java:103) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283) ~[?:?]
   	at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) ~[?:?]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslClientContext$ExtendedTrustManagerVerifyCallback.verify(ReferenceCountedOpenSslClientContext.java:234) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslContext$AbstractCertificateVerifier.verify(ReferenceCountedOpenSslContext.java:773) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.internal.tcnative.CertificateVerifierTask.runTask(CertificateVerifierTask.java:36) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.internal.tcnative.SSLTask.run(SSLTask.java:48) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.internal.tcnative.SSLTask.run(SSLTask.java:42) ~[netty-tcnative-classes-2.0.52.Final.jar:2.0.52.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.runAndResetNeedTask(ReferenceCountedOpenSslEngine.java:1484) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine.access$700(ReferenceCountedOpenSslEngine.java:94) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.ReferenceCountedOpenSslEngine$TaskDecorator.run(ReferenceCountedOpenSslEngine.java:1459) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1548) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1394) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decodeNonJdkCompatible(SslHandler.java:1246) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1286) ~[netty-handler-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:510) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:449) ~[netty-codec-4.1.77.Final.jar:4.1.77.Final]
   	... 17 more
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1150032170

   I'm consistently seeing failures in the following classes:
   
   * `org.apache.bookkeeper.test.OpStatTest`
   * `org.apache.bookkeeper.test.ReadOnlyBookieTest`
   * `org.apache.bookkeeper.test.BookieZKExpireTest`
   
   Are these known to be flaky? Given that my PR should only affect TLS tests, and these tests don't cover TLS, I wouldn't expect my change to fail for these tests. I'll retry tests a couple more times, and if they continue to fail, I'll look closer at the tests.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [bookkeeper] michaeljmarshall commented on pull request #3320: [Client] Deduplicate error log for SSLException

Posted by GitBox <gi...@apache.org>.
michaeljmarshall commented on PR #3320:
URL: https://github.com/apache/bookkeeper/pull/3320#issuecomment-1148795800

   rerun failure checks


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@bookkeeper.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org