No it’s not critical. It’s a small thing related to certificate parsing (
https://github.com/netty/netty/issues/13796). We need it for our usage of
https://github.com/apache/hbase/pull/5644. This wouldn't need to block
things, but I think the timing is good, and it also would be nice to ship
the TLS features without any known issues. If there were a more urgent
need, we could definitely go without.

On Thu, Jan 25, 2024 at 8:11 PM 张铎(Duo Zhang) <palomino...@gmail.com> wrote:

> Sounds good.
>
> And I think in this way we could also expect the rpc connection
> registry related issues to be fixed before tagging 2.6.0RC0.
>
> BTW, what is the TLS fix in netty? Is it critical?
>
> Thanks.
>
> Bryan Beaudreault <bbeaudrea...@apache.org> 于2024年1月25日周四 22:08写道:
> >
> > We are almost ready. In my spare time I am still doing some testing on a
> > larger cluster. My initial tests uncovered some minor issues, which have
> > been fixed. If there are no other issues, we can move forward.
> >
> > For now I would like to wait for netty release 4.1.107.Final, which
> Normal
> > tells me should be in the next 2-3 weeks. The reason is that there is a
> fix
> > for TLS, and 2.6.0 is our first release with TLS.
> >
> > So my checklist at this point is:
> > 1. Continue testing on a larger cluster
> > 2. Resolve fixVersions discrepancies (there are only a few)
> > 3. Update hbase-thirdparty to 4.1.107.Final and create a release of that.
> > 4. Update hbase to use that new release of hbase-thirdparty
> > 5. Create 2.6.0RC0
> >
> > Let me know if anyone has issues with this timeline. We don't absolutely
> > _have_ to wait for netty, but it would be nice.
>

Reply via email to