You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "ChrisSamo632 (via GitHub)" <gi...@apache.org> on 2023/06/19 17:30:05 UTC

[GitHub] [nifi] ChrisSamo632 commented on a diff in pull request #7398: NIFI-11686 update elasticsearch client version to fix CVE

ChrisSamo632 commented on code in PR #7398:
URL: https://github.com/apache/nifi/pull/7398#discussion_r1234305758


##########
nifi-nar-bundles/nifi-elasticsearch-bundle/pom.xml:
##########
@@ -39,7 +39,7 @@ language governing permissions and limitations under the License. -->
          Note: the low-level elasticsearch-rest-client remains licensed with Apache 2.0
          (https://www.elastic.co/guide/en/elasticsearch/client/java-rest/current/_license.html) even after the move
          of the main Elasticsearch product and elasticsearch-rest-high-level-client to Elastic 2.0/SSPL 1.0 in v7.11.0+ -->
-        <elasticsearch.client.version>7.13.4</elasticsearch.client.version>
+        <elasticsearch.client.version>7.17.10</elasticsearch.client.version>

Review Comment:
   The problem with upgrading this version is documented in the comment above within the `pom.xml` - this is likely to break connectivity to any non-Elastic based services that use the Elasticsearch API (e.g. AWS OpenSearch)
   
   What CVE are you attempting to address and does it impact these Elasticsearch low-level REST API or (more likely) the Elasticsearch server at this version, which **is not** used by NiFi?



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@nifi.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org