-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HCD-63: Upgrade Netty to 4.1.117 and BoringSSL to 2.0.69 #1544
base: main
Are you sure you want to change the base?
Conversation
Checklist before you submit for review
|
acbda4f
to
b683351
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lgtm
Approved. Perf tests reports show nothing out of the ordinary. The test failures Butler complains about are from previous SHA runs. The last remaining one fails in the same manner as al older run. I would be good to complete the checklist imo. |
The primary motivation for this change is a bug that manifests in loading the cipher list for inter-node connections, which is slightly wider than the configured list. This bug appears to be a consequence of how OpenSSL handles cipher loading. Changing it doesn't seem feasible. Netty introduced changes to mitigate this misbehavior: - netty/netty#13810 - netty/netty#13840 To take advantage of these fixes, we need to upgrade Netty to at least version 4.1.108. Upgrading Netty also necessitates bumping BoringSSL.
b683351
to
cc3553c
Compare
After giving it a bit more thought I think it doesn't make much sense to upgrade to non-latest. I am going to bump it to |
|
❌ Build ds-cassandra-pr-gate/PR-1544 rejected by Butler1 new test failure(s) in 6 builds Found 1 new test failures
Found 15 known test failures |
Update: I am rerunning fallout tests after bumping to 4.1.117. |
The primary motivation for this change is a bug that manifests in loading
the cipher list for inter-node connections, which is slightly wider than the
configured list. This bug appears to be a consequence of how OpenSSL handles
cipher loading. Changing it doesn't seem feasible.
Netty introduced changes to mitigate this misbehavior:
To take advantage of these fixes, we need to upgrade Netty to at least
version 4.1.108. Upgrading Netty also necessitates bumping BoringSSL.
I have found some old CC tests in fallout that I decided to reuse to ensure the performance stays unchanged:
I have used the fallout perf tool to compare the results with
![image](https://private-user-images.githubusercontent.com/93650032/410976902-e5ae1cde-30c5-468c-a953-fcaea4810757.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.tOtRr5eXTZfziEDY18RbcFTEm7Eg_mLNBpWr9KJJ0RI)
main
and they seem pretty comparable to me. Example chart:I am unsure whether there are other tests that exercise CC which could be reused.