Hi everyone, Reading the thread I feel we are all more or less on the same page.
My personal line of thinking: 1) I really like Benedict’s idea of some kind of cheat sheet 2) I think some kind of PoC PR, when/if needed, sounds reasonable. Probably It can help in some cases the author to reconsider or even explain better some suggestions/decisions. In that sense, I think I agree with Maulin that probably Jira ticket after voted CEP is a good idea. I think that when we put PR in a Jira ticket (at least I as a creature of habit) we start thinking of more diligent reviews and might forget it is still unapproved CEP and get into details that doesn’t really matter at this point in time. But that might be only me. :-) Best regards, Ekaterina On Mon, 12 Jul 2021 at 15:47, Maulin Vasavada <maulin.vasav...@gmail.com> wrote: > Thank you Benjamin. Sounds good to me. > > I feel if we leave full control of creating SSL's context (including > ciphers, accepted protocols values etc) to the interface it would work. > There are some other requirements people run into like customizing X 509 > cert validations (SPIFFE > <https://github.com/spiffe/spiffe/blob/main/standards/X509-SVID.md>), > using > different SSL Providers (like Bouncy Castle, Boring SSL etc) altogether > which in my opinion can be better served with exploration of JSSE Providers > (java's security.provider configuration) instead of trying to customize > just the SSL Context. However, leaving full control with the SSL context > factory interface may mean supporting 'Map' as modelling the configuration > vs keeping 'CommonEncryptionOption' but that would again go into more > technical discussion so we can keep it separate. > > Thanks > Maulin > > On Mon, Jul 12, 2021 at 3:27 AM Benjamin Lerer <b.le...@gmail.com> wrote: > > > > > > > In the context of your latest answers on JIRA - your interface makes > > sense > > > to me, I just want to be sure that we will not forget to add anything > > which > > > would a respective implementator need in the future and could not use > > > because it is just not exposed. > > > > > > I do not believe that we can build the perfect interface. Sadely, it is > > impossible to know what future implementations will require. Outside of > > the obvious issues that we can think of right now, I believe that we > will > > just have to find some solutions at the time where the problems arise. > > > > The thread is right now going into technical areas that could be > discussed > > on the PR later on. It might be a sign that there are no high level > > concerns with the CEP and that we should simply trigger the vote. > > If nobody disagrees, I will start the vote tomorrow. > > > > > > > > Le sam. 10 juil. 2021 à 07:05, Mick Semb Wever <m...@apache.org> a écrit > : > > > > > Thanks for bringing this back to the ML Maulin. > > > Very much appreciated. > > > > > > On Sat, 10 Jul 2021 at 00:04, Maulin Vasavada < > maulin.vasav...@gmail.com > > > > > > wrote: > > > > > > > Thanks Stefan for the pointer for the 'examples' directory. Will > invest > > > > time in coming up with a reference custom implementation. > > > > > > > > For your other comments around common encryption options, I agree > with > > > you > > > > on a challenge in order to prevent secure information getting leaked > in > > > > logs. Let me create a separate branch and show how interface will > > change > > > > with keeping Common Encryption options + map instead of just the map. > > > > > > > > Thanks > > > > Maulin > > > > > > > > On Fri, Jul 9, 2021 at 2:59 PM Maulin Vasavada < > > > maulin.vasav...@gmail.com> > > > > wrote: > > > > > > > > > Stefan Miklosovic > > > > > <https://cwiki.apache.org/confluence/display/~stefan.miklosovic> > > > > > > > > > > Hi MAULIN VASAVADA > > > > > <https://cwiki.apache.org/confluence/display/~maulin.vasavada>, > few > > > more > > > > > observations. I see that you have commented again on JIRA and I am > > > > starting > > > > > to be confused where to comment in relation to recent thread we had > > > about > > > > > this so I am letting you know that I am ultimately using this > > > > communication > > > > > channel for discussion. > > > > > > > > > > In the context of your latest answers on JIRA - your interface > makes > > > > sense > > > > > to me, I just want to be sure that we will not forget to add > anything > > > > which > > > > > would a respective implementator need in the future and could not > use > > > > > because it is just not exposed. I am not completely sure how to > solve > > > > this > > > > > but I think that we just have to stick to our gut feeling that the > > > > solution > > > > > proposed will cover the most scenarios. > > > > > > > > > > If we do not feel safe, my idea was to show yet another > > implementation > > > > > where the possibility we would left a user behind is minimised. > > > > Otherwise, > > > > > without breaking older implementations used in future releases, we > > > could > > > > > only introduce methods which would have default implementations. > > > > > > > > > > I prefer to have a map instead of common encryption options. On the > > > other > > > > > hand, I can imagine that the custom implementation would try to > > bypass > > > > some > > > > > credentials into it (for example how to connect to a respective > > source > > > of > > > > > these keystores / truststores) and if we ever decided to have some > > kind > > > > of > > > > > a tooling around this, e.g. in nodetool, to get a status of "how > ssl > > is > > > > > configured", we might unintentionally leak security sensitive > > > information > > > > > (credentials) by displaying them in plaintext in such tooling. We > are > > > > using > > > > > JMX for this (I might expand on this if you are not familiar with > > that > > > > > mechanism of getting runtime info from Cassandra via JMX). Hence > what > > > we > > > > > might do is to actually not expose that map at all. We are not > > exposing > > > > > this kind of information yet in runtime and I do not think we > > actually > > > > have > > > > > a need for that I just find it important to say. > > > > > > > > > > I like the fact that configuration parameters for an implementation > > are > > > > > coupled with that factory configuration and it is just a basic map. > > > Since > > > > > implementations are getting their EncryptionOptions + map of > > customs, I > > > > > prefer this instead of putting there whole map of parameters > because > > > then > > > > > you are just again "parsing it" from map in respective > constructors. > > > > There > > > > > is nothing wrong with how this is done in your original PR, I would > > > say. > > > > > The very same pattern of "maps" may be found across the code base, > > e.g. > > > > > auditing and similar. > > > > > > > > > > On Fri, Jul 9, 2021 at 2:59 PM Maulin Vasavada < > > > > maulin.vasav...@gmail.com> > > > > > wrote: > > > > > > > > > >> Stefan Miklosovic > > > > >> <https://cwiki.apache.org/confluence/display/~stefan.miklosovic> > > > > >> > > > > >> I ve taken a look too. Added some comments to PR. > > > > >> > > > > >> It would be awesome if we see some 3rd party implementation of > this > > in > > > > >> action so we know it indeed works as intended. It is strange to > just > > > > code > > > > >> up an interface by default logic for which it works but there isnt > > any > > > > >> (public) example how to do yet another impl. > > > > >> > > > > >> there is a directory called "examples" in the root of the > > repository. > > > > >> > > > > >> > > > > >> > > > > >> > > > > >> On Fri, Jul 9, 2021 at 2:58 PM Maulin Vasavada < > > > > maulin.vasav...@gmail.com> > > > > >> wrote: > > > > >> > > > > >>> [image: maulin.vasavada]Maulin Vasavada > > > > >>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=maulin.vasavada > > > > > > > > added > > > > >>> a comment - Yesterday - edited > > > > >>> > > > > >>> On second thoughts Stefan Miklosovic > > > > >>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=stefan.miklosovic > > > > >, > > > > >>> I feel if we examine the interface properly and make sure of the > > > > contract > > > > >>> and dependencies - input arguments to the methods and > construction > > of > > > > the > > > > >>> implementation (for which I agree there is no good way given an > > > > interface) > > > > >>> object AND the return types/exceptions, it could be evaluated > > without > > > > >>> sample of a specific/custom implementation. The premise is very > > > simple > > > > - > > > > >>> Allow SSLContext (in this case JSSE's and Netty's) creation to be > > > > >>> pluggable. Once we do that the specific implementation should not > > > > matter. > > > > >>> However the Cassandra's current integration point with that > > pluggable > > > > >>> interface does matter and need to make sure we are not violating > > > > existing > > > > >>> behavior - example - Caching of the Netty's ssl contexts, > > invocation > > > of > > > > >>> context for Inbound/Outbound and Client/Native connections, > threads > > > > running > > > > >>> for enabling hot reloading periodically etc. I know its a long > > answer > > > > to > > > > >>> your question but I have done very similar work for Apache Kafka > ( > > > > >>> reference > > > > >>> < > > > > > > > > > > https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=128650952 > > > > >) > > > > >>> and feel confident that it will work for custom implementations > > (like > > > > ours > > > > >>> is running in production for about 2 years now, albeit private > > > > >>> implementation). I've consulted many security experts internally > > and > > > > >>> externally to validate that - making SSLContext > > > customizable/pluggable > > > > is > > > > >>> the best way to support various specific needs of bigger > > eco-systems. > > > > >>> > > > > >>> > > > > >>> > > > > >>> In fact based on my evaluation of the design - I do have two sub > > > > options > > > > >>> < > > > > > > > > > > https://cwiki.apache.org/confluence/display/CASSANDRA/CEP-9%3A+Make+SSLContext+creation+pluggable#CEP9:MakeSSLContextcreationpluggable-ImportantnoteaboutcommonSSLconfigurations > > > > > > > > that > > > > >>> I seek input from the community on - about consolidating all the > > > > encryption > > > > >>> options as a open ended Map argument coming to the interface's > > > > >>> implementation vs having a notion of CommonEncryptionOptions to > > keep > > > > some > > > > >>> of the existing implementation as-is. > > > > >>> > > > > >>> On Fri, Jul 9, 2021 at 2:58 PM Maulin Vasavada < > > > > >>> maulin.vasav...@gmail.com> wrote: > > > > >>> > > > > >>>> Hi Sumanth Pasupuleti > > > > >>>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=sumanth.pasupuleti > > > > > > > > > >>>> and Stefan Miklosovic > > > > >>>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=stefan.miklosovic > > > > > > > > thanks > > > > >>>> for comments. Sorry I missed them before since I was just > checking > > > > DISCUSS > > > > >>>> thread on the CEP > > > > >>>> > > > > >>>> > > > > >>>> > > > > >>>> Sumanth, I totally get what you are saying. However I feel the > > same > > > > way > > > > >>>> as you do that this is just SSLContext pluggability change and > > your > > > > >>>> suggestion should be a follow-up on the CEP-9 change. > > > > >>>> > > > > >>>> > > > > >>>> > > > > >>>> Stefan, your point is valid but I can only verify a custom > > > > >>>> implementation with our company's internal requirements. However > > it > > > > may be > > > > >>>> worth to provide a sample integration with HashiCorp Vault for > > > > example to > > > > >>>> fetch keys/certs and have a PoC. Not sure where that sample can > be > > > > hosted > > > > >>>> though. > > > > >>>> > > > > >>>> Based on the latest discussion around improving CEP process, we > > may > > > > >>>> need to copy paste this discussion to DISCUSS thread also. Can > you > > > > please > > > > >>>> post/copy your comments and I'd copy mine there? > > > > >>>> > > > > >>>> On Fri, Jul 9, 2021 at 2:58 PM Maulin Vasavada < > > > > >>>> maulin.vasav...@gmail.com> wrote: > > > > >>>> > > > > >>>>> [image: stefan.miklosovic]Stefan Miklosovic > > > > >>>>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=stefan.miklosovic > > > > > > > > added > > > > >>>>> a comment - 01/Jul/21 19:20 > > > > >>>>> > > > > >>>>> I ve taken a look too. Added some comments to PR. > > > > >>>>> > > > > >>>>> It would be awesome if we see some 3rd party implementation of > > this > > > > in > > > > >>>>> action so we know it indeed works as intended. It is strange to > > > just > > > > code > > > > >>>>> up an interface by default logic for which it works but there > > isnt > > > > any > > > > >>>>> (public) example how to do yet another impl. > > > > >>>>> > > > > >>>>> On Fri, Jul 9, 2021 at 2:57 PM Maulin Vasavada < > > > > >>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>> > > > > >>>>>> Sumanth Pasupuleti > > > > >>>>>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=sumanth.pasupuleti > > > > > > > > added > > > > >>>>>> a comment - 07/Jun/21 15:13 > > > > >>>>>> > > > > >>>>>> > > > > >>>>>> Maulin Vasavada > > > > >>>>>> < > > > > > > > > > > https://issues.apache.org/jira/secure/ViewProfile.jspa?name=maulin.vasavada > > > > > > > > left > > > > >>>>>> a couple of review comments, but lgtm overall. > > > > >>>>>> > > > > >>>>>> One of the things I was hoping we can also achieve is to be > able > > > to > > > > >>>>>> provide mechanics to transparently transition from using one > > > > SSLFactory > > > > >>>>>> implementation to another, and using those mechanics, one > could > > do > > > > the > > > > >>>>>> following on their cluster for moving from say Implementation1 > > to > > > > >>>>>> Implementation2 > > > > >>>>>> Stage #1: Current state of being only Implementation1 aware. > Use > > > > >>>>>> keystore and trustmanager of implementation1 > > > > >>>>>> Stage #2: Start trusting both implementation1 and > > implementation2. > > > > >>>>>> Use keystore of implementation1, but use trustmanager of both > > > > >>>>>> implementation1 and implementation2 (using > > > > MultiTrustManagerFactory) (and > > > > >>>>>> perform a rolling restart of the cluster) > > > > >>>>>> Stage #3: Start using implementation2 for keystore, and > perform > > a > > > > >>>>>> rolling restart of the cluster > > > > >>>>>> Stage #4: At this point, all nodes of the cluster are using > > > > >>>>>> implementation2 for keystore, but trust both implementation1 > and > > > > >>>>>> implementation2, and we can now remove implementation1 from > > > > trustmanagers, > > > > >>>>>> and do a rolling restart. > > > > >>>>>> > > > > >>>>>> Since this ticket is about making SSLContext pluggable, I > > believe > > > > >>>>>> this is out of scope; cut a separate ticket CASSANDRA-16719 > > > > >>>>>> <https://issues.apache.org/jira/browse/CASSANDRA-16719> to > > track > > > > >>>>>> that work (I did an internal 3.0 patch for this transition > work, > > > > and I can > > > > >>>>>> try porting it to 4.x once this ticket is committed) > > > > >>>>>> > > > > >>>>>> On Fri, Jul 9, 2021 at 2:56 PM Maulin Vasavada < > > > > >>>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>>> > > > > >>>>>>> Hi all > > > > >>>>>>> > > > > >>>>>>> I wanted to consolidate a couple of comments that started in > > > > >>>>>>> JIRA/Wiki here to keep it in one place. I'll post different > > posts > > > > as > > > > >>>>>>> replies for each comment. > > > > >>>>>>> > > > > >>>>>>> Thanks > > > > >>>>>>> Maulin > > > > >>>>>>> > > > > >>>>>>> On Tue, Jun 29, 2021 at 1:07 PM Maulin Vasavada < > > > > >>>>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>>>> > > > > >>>>>>>> ^^^ bumping up ^^^ this thread since people might have more > > time > > > > >>>>>>>> reviewing post 4.0 work. Specifically for this > > > > >>>>>>>> < > > > > > > > > > > https://cwiki.apache.org/confluence/display/CASSANDRA/CEP-9%3A+Make+SSLContext+creation+pluggable#CEP9:MakeSSLContextcreationpluggable-ImportantnoteaboutcommonSSLconfigurations > > > > > > > > > >>>>>>>> section in the CEP, I have coded for one option (here > > > > >>>>>>>> < > > > > > > > > > > https://github.com/maulin-vasavada/cassandra/commit/256ad30ecedbc50d66d8a039f8ca9e47074737ce > > > > >) > > > > >>>>>>>> and now will do for another option very soon. > > > > >>>>>>>> > > > > >>>>>>>> On Wed, Jun 2, 2021 at 5:11 PM Maulin Vasavada < > > > > >>>>>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>>>>> > > > > >>>>>>>>> Thank you Dinesh and everybody. Will keep calm and wait for > > the > > > > >>>>>>>>> feedback. Meanwhile I am experimenting with various > > > > implementation options > > > > >>>>>>>>> for what I put as "will seek community's input > > > > >>>>>>>>> < > > > > > > > > > > https://cwiki.apache.org/confluence/display/CASSANDRA/CEP-9%3A+Make+SSLContext+creation+pluggable#CEP9:MakeSSLContextcreationpluggable-ImportantnoteaboutcommonSSLconfigurations > > > > >" > > > > >>>>>>>>> on the CEP document and learning little bit more about the > > > > CircleCI. > > > > >>>>>>>>> > > > > >>>>>>>>> On Wed, Jun 2, 2021 at 4:08 PM Dinesh Joshi > > > > >>>>>>>>> <djos...@icloud.com.invalid> wrote: > > > > >>>>>>>>> > > > > >>>>>>>>>> Hi Maulin, > > > > >>>>>>>>>> > > > > >>>>>>>>>> Thank you for the CEP & Patch. I’ve been following along > > > albeit > > > > >>>>>>>>>> silently. Will take a look. It’s just that we’re currently > > > busy > > > > so bear > > > > >>>>>>>>>> with us. > > > > >>>>>>>>>> > > > > >>>>>>>>>> Thanks, > > > > >>>>>>>>>> > > > > >>>>>>>>>> Dinesh > > > > >>>>>>>>>> > > > > >>>>>>>>>> > On Jun 2, 2021, at 3:28 PM, Maulin Vasavada < > > > > >>>>>>>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>>>>>>> > > > > > >>>>>>>>>> > Hi all > > > > >>>>>>>>>> > > > > > >>>>>>>>>> > ^^^ bump ^^^ I've raised the PR and am waiting for the > > > review. > > > > >>>>>>>>>> Once I see > > > > >>>>>>>>>> > that the suggested changes are directionally right I'll > > > start > > > > a > > > > >>>>>>>>>> VOTE thread > > > > >>>>>>>>>> > on the CEP (unless I am recommended to follow another > > > > process). > > > > >>>>>>>>>> > > > > > >>>>>>>>>> > Thanks > > > > >>>>>>>>>> > Maulin > > > > >>>>>>>>>> > > > > > >>>>>>>>>> >> On Thu, May 27, 2021 at 1:29 PM Maulin Vasavada < > > > > >>>>>>>>>> maulin.vasav...@gmail.com> > > > > >>>>>>>>>> >> wrote: > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> HI all > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> I've raised the PR with the changes. Specifically I > would > > > > >>>>>>>>>> appreciate the > > > > >>>>>>>>>> >> community's input on this section of the CEP > > > > >>>>>>>>>> >> < > > > > >>>>>>>>>> > > > > > > > > > > https://cwiki.apache.org/confluence/display/CASSANDRA/CEP-9%3A+Make+SSLContext+creation+pluggable#CEP9:MakeSSLContextcreationpluggable-ImportantnoteaboutcommonSSLconfigurations > > > > >>>>>>>>>> > > > > > >>>>>>>>>> >> . > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> Once we get some consensus on the PR (except minor code > > > > >>>>>>>>>> improvement > > > > >>>>>>>>>> >> suggestions) I'll start a VOTE thread for the CEP. > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> I thank all the reviewers of the CEP and the PR in > > advance > > > > and > > > > >>>>>>>>>> am > > > > >>>>>>>>>> >> completely excited to contribute to Apache Cassandra. > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> Thanks > > > > >>>>>>>>>> >> Maulin > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >> On Thu, May 27, 2021 at 11:04 AM Maulin Vasavada < > > > > >>>>>>>>>> >> maulin.vasav...@gmail.com> wrote: > > > > >>>>>>>>>> >> > > > > >>>>>>>>>> >>> Sounds good Brandon. I'll raise the PR in a couple of > > > hours > > > > >>>>>>>>>> from now. > > > > >>>>>>>>>> >>> Thanks. > > > > >>>>>>>>>> >>> > > > > >>>>>>>>>> >>> On Thu, May 27, 2021 at 10:14 AM Brandon Williams < > > > > >>>>>>>>>> dri...@gmail.com> > > > > >>>>>>>>>> >>> wrote: > > > > >>>>>>>>>> >>> > > > > >>>>>>>>>> >>>> You can raise a PR in any state, but review will be a > > > > >>>>>>>>>> different > > > > >>>>>>>>>> >>>> matter. I would go ahead and raise it and the > testing > > > can > > > > >>>>>>>>>> be sorted > > > > >>>>>>>>>> >>>> out from there. > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> >>>> On Thu, May 27, 2021 at 12:12 PM Maulin Vasavada > > > > >>>>>>>>>> >>>> <maulin.vasav...@gmail.com> wrote: > > > > >>>>>>>>>> >>>>> > > > > >>>>>>>>>> >>>>> Hi all > > > > >>>>>>>>>> >>>>> > > > > >>>>>>>>>> >>>>> I think I am close to raising a PR now but my > CircleCI > > > job > > > > >>>>>>>>>> >>>>> < > > > > >>>>>>>>>> > > > > https://app.circleci.com/pipelines/github/maulin-vasavada/cassandra > > > > >>>>>>>>>> > > > > > >>>>>>>>>> >>>>> doesn't make progress beyond key tasks success like > > unit > > > > >>>>>>>>>> tests, dtests, > > > > >>>>>>>>>> >>>>> cqlshlibtests. Any recommendation on if we need to > see > > > the > > > > >>>>>>>>>> whole > > > > >>>>>>>>>> >>>> CircleCI > > > > >>>>>>>>>> >>>>> job green before raising the PR? > > > > >>>>>>>>>> >>>>> > > > > >>>>>>>>>> >>>>> Thanks > > > > >>>>>>>>>> >>>>> Maulin > > > > >>>>>>>>>> >>>>> > > > > >>>>>>>>>> >>>>> On Fri, May 21, 2021 at 8:54 PM Maulin Vasavada < > > > > >>>>>>>>>> >>>> maulin.vasav...@gmail.com> > > > > >>>>>>>>>> >>>>> wrote: > > > > >>>>>>>>>> >>>>> > > > > >>>>>>>>>> >>>>>> I am almost done with all changes except the code > > > snippet > > > > >>>>>>>>>> in the > > > > >>>>>>>>>> >>>>>> EncryptioOptions.java which determines 'enabled' > and > > > > >>>>>>>>>> 'optional' > > > > >>>>>>>>>> >>>> encryption > > > > >>>>>>>>>> >>>>>> flags. Will raise the PR soon once I see my > CircleCI > > > > >>>>>>>>>> getting green. > > > > >>>>>>>>>> >>>>>> > > > > >>>>>>>>>> >>>>>> On Fri, May 21, 2021 at 9:24 AM Maulin Vasavada < > > > > >>>>>>>>>> >>>> maulin.vasav...@gmail.com> > > > > >>>>>>>>>> >>>>>> wrote: > > > > >>>>>>>>>> >>>>>> > > > > >>>>>>>>>> >>>>>>> FYI - I am working on PR. I made some changes and > > > trying > > > > >>>>>>>>>> to run > > > > >>>>>>>>>> >>>> tests. > > > > >>>>>>>>>> >>>>>>> > > > > >>>>>>>>>> >>>>>>> On Tue, May 18, 2021 at 10:14 PM Maulin Vasavada < > > > > >>>>>>>>>> >>>>>>> maulin.vasav...@gmail.com> wrote: > > > > >>>>>>>>>> >>>>>>> > > > > >>>>>>>>>> >>>>>>>> Thanks Nate for reviewing the CEP. Yes for change > > #3 > > > in > > > > >>>>>>>>>> the CEP, I > > > > >>>>>>>>>> >>>> mean > > > > >>>>>>>>>> >>>>>>>> to have only single Default Impl and that would > be > > a > > > > >>>>>>>>>> final class, > > > > >>>>>>>>>> >>>> not > > > > >>>>>>>>>> >>>>>>>> overridable. It will be basically an internal > > > > >>>>>>>>>> implementation. I've > > > > >>>>>>>>>> >>>> updated > > > > >>>>>>>>>> >>>>>>>> the CEP to reflect this. > > > > >>>>>>>>>> >>>>>>>> > > > > >>>>>>>>>> >>>>>>>> On Tue, May 18, 2021 at 7:21 PM Nate McCall < > > > > >>>>>>>>>> zznat...@gmail.com> > > > > >>>>>>>>>> >>>> wrote: > > > > >>>>>>>>>> >>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> Hi Maulin, > > > > >>>>>>>>>> >>>>>>>>> Thanks for putting this together! > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> Took a quick glance, and I can't think of a > > > compelling > > > > >>>>>>>>>> reason on > > > > >>>>>>>>>> >>>> why > > > > >>>>>>>>>> >>>>>>>>> SSLContext should be final and your point about > > > > >>>>>>>>>> >>>> organization/compliance > > > > >>>>>>>>>> >>>>>>>>> issues requiring different implementations is a > > good > > > > >>>>>>>>>> one. > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> Per #3 on your proposed changes, I'm keen to > only > > > > >>>>>>>>>> support a single > > > > >>>>>>>>>> >>>>>>>>> default > > > > >>>>>>>>>> >>>>>>>>> impl in-tree. I don't think we should be in the > > > > >>>>>>>>>> business of > > > > >>>>>>>>>> >>>> picking > > > > >>>>>>>>>> >>>>>>>>> implementation to support. It looks like this is > > > your > > > > >>>>>>>>>> intention > > > > >>>>>>>>>> >>>> as well? > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> Thanks again, > > > > >>>>>>>>>> >>>>>>>>> -Nate > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> On Wed, May 19, 2021 at 12:05 PM Maulin > Vasavada < > > > > >>>>>>>>>> >>>>>>>>> maulin.vasav...@gmail.com> > > > > >>>>>>>>>> >>>>>>>>> wrote: > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> Hi all > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> Starting a discussion thread for the CIP-9 - > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> > > > > > > > > > > https://cwiki.apache.org/confluence/display/CASSANDRA/CEP-9%3A+Make+SSLContext+creation+pluggable > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> However, while writing the CIP two areas that > > came > > > up > > > > >>>>>>>>>> in my mind > > > > >>>>>>>>>> >>>>>>>>> where I > > > > >>>>>>>>>> >>>>>>>>>> need to seek guidance apart from the other > > > discussion > > > > >>>>>>>>>> that we > > > > >>>>>>>>>> >>>> would > > > > >>>>>>>>>> >>>>>>>>> have > > > > >>>>>>>>>> >>>>>>>>>> here, > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> 1. Whether to consider > > > > >>>>>>>>>> >>>> SSLFactory#tlsInstanceProtocolSubstitution() > > > > >>>>>>>>>> >>>>>>>>>> < > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> > > > > > > > > > > https://github.com/apache/cassandra/blob/cassandra-4.0/src/java/org/apache/cassandra/security/SSLFactory.java#L169 > > > > >>>>>>>>>> >>>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> for pluggability (noted this on the CIP as > well) > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> 2. For Test Plan, apart from Integration Test > and > > > > >>>>>>>>>> local system > > > > >>>>>>>>>> >>>> test > > > > >>>>>>>>>> >>>>>>>>> what > > > > >>>>>>>>>> >>>>>>>>>> would be recommended? > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>>> Thanks > > > > >>>>>>>>>> >>>>>>>>>> Maulin > > > > >>>>>>>>>> >>>>>>>>>> > > > > >>>>>>>>>> >>>>>>>>> > > > > >>>>>>>>>> >>>>>>>> > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> > > > > --------------------------------------------------------------------- > > > > >>>>>>>>>> >>>> To unsubscribe, e-mail: > > > > dev-unsubscr...@cassandra.apache.org > > > > >>>>>>>>>> >>>> For additional commands, e-mail: > > > > >>>>>>>>>> dev-h...@cassandra.apache.org > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> >>>> > > > > >>>>>>>>>> > > > > >>>>>>>>>> > > > > >>>>>>>>>> > > > > --------------------------------------------------------------------- > > > > >>>>>>>>>> To unsubscribe, e-mail: > > dev-unsubscr...@cassandra.apache.org > > > > >>>>>>>>>> For additional commands, e-mail: > > > dev-h...@cassandra.apache.org > > > > >>>>>>>>>> > > > > >>>>>>>>>> > > > > > > > > > >