This is an automated email from the ASF dual-hosted git repository.
jackie pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/pinot.git
The following commit(s) were added to refs/heads/master by this push:
new 72921ad8223 Revert "Bump Netty from 4.1.132 to 4.2.11 with
compatibility fixes (#17980)" (#17991)
72921ad8223 is described below
commit 72921ad82239f8e19da3f370e5e7f51e2d1c865c
Author: Xiang Fu <[email protected]>
AuthorDate: Thu Mar 26 15:15:54 2026 -0700
Revert "Bump Netty from 4.1.132 to 4.2.11 with compatibility fixes
(#17980)" (#17991)
---
.../java/org/apache/pinot/common/config/TlsConfig.java | 15 +--------------
.../java/org/apache/pinot/common/utils/tls/TlsUtils.java | 3 ---
.../java/org/apache/pinot/core/transport/QueryServer.java | 10 ----------
pom.xml | 2 +-
4 files changed, 2 insertions(+), 28 deletions(-)
diff --git
a/pinot-common/src/main/java/org/apache/pinot/common/config/TlsConfig.java
b/pinot-common/src/main/java/org/apache/pinot/common/config/TlsConfig.java
index e425913ac36..e8588f28000 100644
--- a/pinot-common/src/main/java/org/apache/pinot/common/config/TlsConfig.java
+++ b/pinot-common/src/main/java/org/apache/pinot/common/config/TlsConfig.java
@@ -40,9 +40,6 @@ public class TlsConfig {
private String _sslProvider = SslProvider.JDK.toString();
// If true, the client will not verify the server's certificate
private boolean _insecure = false;
- // Endpoint identification algorithm for hostname verification (e.g.
"HTTPS").
- // Defaults to empty string (disabled) for backwards compatibility with
Netty 4.1.
- private String _endpointIdentificationAlgorithm = "";
// Allowed TLS protocols (optional, if not set uses default)
@Nullable
private String[] _allowedProtocols = null;
@@ -61,7 +58,6 @@ public class TlsConfig {
_trustStorePassword = tlsConfig._trustStorePassword;
_sslProvider = tlsConfig._sslProvider;
_insecure = tlsConfig._insecure;
- _endpointIdentificationAlgorithm =
tlsConfig._endpointIdentificationAlgorithm;
_allowedProtocols = tlsConfig._allowedProtocols != null
? Arrays.copyOf(tlsConfig._allowedProtocols,
tlsConfig._allowedProtocols.length)
: null;
@@ -143,14 +139,6 @@ public class TlsConfig {
_insecure = insecure;
}
- public String getEndpointIdentificationAlgorithm() {
- return _endpointIdentificationAlgorithm;
- }
-
- public void setEndpointIdentificationAlgorithm(String
endpointIdentificationAlgorithm) {
- _endpointIdentificationAlgorithm = endpointIdentificationAlgorithm;
- }
-
@Nullable
public String[] getAllowedProtocols() {
return _allowedProtocols != null ? Arrays.copyOf(_allowedProtocols,
_allowedProtocols.length) : null;
@@ -180,14 +168,13 @@ public class TlsConfig {
&& Objects.equals(_trustStorePath, tlsConfig._trustStorePath)
&& Objects.equals(_trustStorePassword, tlsConfig._trustStorePassword)
&& Objects.equals(_sslProvider, tlsConfig._sslProvider)
- && Objects.equals(_endpointIdentificationAlgorithm,
tlsConfig._endpointIdentificationAlgorithm)
&& Arrays.equals(_allowedProtocols, tlsConfig._allowedProtocols);
}
@Override
public int hashCode() {
int result = Objects.hash(_clientAuthEnabled, _keyStoreType,
_keyStorePath, _keyStorePassword, _trustStoreType,
- _trustStorePath, _trustStorePassword, _sslProvider, _insecure,
_endpointIdentificationAlgorithm);
+ _trustStorePath, _trustStorePassword, _sslProvider, _insecure);
result = 31 * result + Arrays.hashCode(_allowedProtocols);
return result;
}
diff --git
a/pinot-common/src/main/java/org/apache/pinot/common/utils/tls/TlsUtils.java
b/pinot-common/src/main/java/org/apache/pinot/common/utils/tls/TlsUtils.java
index 13f4ad6bffa..74cf0023dd1 100644
--- a/pinot-common/src/main/java/org/apache/pinot/common/utils/tls/TlsUtils.java
+++ b/pinot-common/src/main/java/org/apache/pinot/common/utils/tls/TlsUtils.java
@@ -343,9 +343,6 @@ public final class TlsUtils {
SslContextBuilder.forClient().sslProvider(SslProvider.valueOf(tlsConfig.getSslProvider()));
sslFactory.getKeyManagerFactory().ifPresent(sslContextBuilder::keyManager);
sslFactory.getTrustManagerFactory().ifPresent(sslContextBuilder::trustManager);
- // Netty 4.2 defaults endpointIdentificationAlgorithm to HTTPS (hostname
verification enabled).
- // Apply the value from TlsConfig, which defaults to empty (disabled) for
backwards compatibility.
-
sslContextBuilder.endpointIdentificationAlgorithm(tlsConfig.getEndpointIdentificationAlgorithm());
// Apply protocol restrictions if configured
String[] allowedProtocols = tlsConfig.getAllowedProtocols();
diff --git
a/pinot-core/src/main/java/org/apache/pinot/core/transport/QueryServer.java
b/pinot-core/src/main/java/org/apache/pinot/core/transport/QueryServer.java
index 201f36e700c..2f2ca7e2b7d 100644
--- a/pinot-core/src/main/java/org/apache/pinot/core/transport/QueryServer.java
+++ b/pinot-core/src/main/java/org/apache/pinot/core/transport/QueryServer.java
@@ -172,16 +172,6 @@ public class QueryServer {
} catch (Exception e) {
throw new RuntimeException(e);
} finally {
- // Explicitly close all client channels and wait for completion so that
remote peers detect
- // the shutdown promptly (Netty 4.2 no longer force-closes channels
during shutdownGracefully
- // with a zero timeout).
- for (SocketChannel ch : _allChannels.keySet()) {
- try {
- ch.close().sync();
- } catch (Exception e) {
- LOGGER.warn("Failed to close client channel: {}", ch, e);
- }
- }
_workerGroup.shutdownGracefully(0, 0, TimeUnit.SECONDS);
_bossGroup.shutdownGracefully(0, 0, TimeUnit.SECONDS);
}
diff --git a/pom.xml b/pom.xml
index 34af8b7a583..44f2e9529ee 100644
--- a/pom.xml
+++ b/pom.xml
@@ -174,7 +174,7 @@
<libthrift.verion>0.22.0</libthrift.verion>
<log4j.version>2.25.3</log4j.version>
<slf4j.version>2.0.17</slf4j.version>
- <netty.version>4.2.12.Final</netty.version>
+ <netty.version>4.1.132.Final</netty.version>
<reactivestreams.version>1.0.4</reactivestreams.version>
<jts.version>1.20.0</jts.version>
<h3.version>4.4.0</h3.version>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]