[ 
https://issues.apache.org/jira/browse/ATLAS-3129?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16826456#comment-16826456
 ] 

ASF subversion and git services commented on ATLAS-3129:
--------------------------------------------------------

Commit 2666c80a4850b15fc831064f933bd39f9e30db12 in atlas's branch 
refs/heads/branch-2.0 from Nixon Rodrigues
[ https://gitbox.apache.org/repos/asf?p=atlas.git;h=2666c80 ]

ATLAS-3129 Fix SSL Truststore reloader leak from AtlasBaseClient

Change-Id: I5af8c26a41a7010de645ddaa6869c3ce15723f43
(cherry picked from commit 0a81c2505d91156742050f45634d9a72c0d7d7a2)


> Truststore reloader thread from AtlasBaseClient.
> ------------------------------------------------
>
>                 Key: ATLAS-3129
>                 URL: https://issues.apache.org/jira/browse/ATLAS-3129
>             Project: Atlas
>          Issue Type: Bug
>          Components:  atlas-core
>    Affects Versions: 1.1.0
>            Reporter: Rajkumar Singh
>            Assignee: Nixon Rodrigues
>            Priority: Major
>         Attachments: ATLAS-3129-2.patch
>
>
> AtlasBaseClient uses Hadoop's SSLFactory to create the 
> ReloadingX509TrustManager
> https://github.com/apache/atlas/blob/b919d3d0964efbe1eda40724545d5fa506100a02/client/common/src/main/java/org/apache/atlas/security/SecureClientUtils.java#L143
> currently, there is no way to stop/destroy method of the 
> ReloadingX509TrustManager, this creates  "Truststore reloader thread" leak in 
> hiveserver2 if the user is running any HOOK/UDF which uses the AtlasClient. 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to