[ https://issues.apache.org/jira/browse/ATLAS-3129?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16826456#comment-16826456 ]
ASF subversion and git services commented on ATLAS-3129: -------------------------------------------------------- Commit 2666c80a4850b15fc831064f933bd39f9e30db12 in atlas's branch refs/heads/branch-2.0 from Nixon Rodrigues [ https://gitbox.apache.org/repos/asf?p=atlas.git;h=2666c80 ] ATLAS-3129 Fix SSL Truststore reloader leak from AtlasBaseClient Change-Id: I5af8c26a41a7010de645ddaa6869c3ce15723f43 (cherry picked from commit 0a81c2505d91156742050f45634d9a72c0d7d7a2) > Truststore reloader thread from AtlasBaseClient. > ------------------------------------------------ > > Key: ATLAS-3129 > URL: https://issues.apache.org/jira/browse/ATLAS-3129 > Project: Atlas > Issue Type: Bug > Components: atlas-core > Affects Versions: 1.1.0 > Reporter: Rajkumar Singh > Assignee: Nixon Rodrigues > Priority: Major > Attachments: ATLAS-3129-2.patch > > > AtlasBaseClient uses Hadoop's SSLFactory to create the > ReloadingX509TrustManager > https://github.com/apache/atlas/blob/b919d3d0964efbe1eda40724545d5fa506100a02/client/common/src/main/java/org/apache/atlas/security/SecureClientUtils.java#L143 > currently, there is no way to stop/destroy method of the > ReloadingX509TrustManager, this creates "Truststore reloader thread" leak in > hiveserver2 if the user is running any HOOK/UDF which uses the AtlasClient. -- This message was sent by Atlassian JIRA (v7.6.3#76005)