-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgraded ElasticSearch to get rid of CVEs. #13747
Conversation
/pulsarbot run-failure-checks |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Had to update maven compiler plugin config, otherwise it was NPE-ing instead of showing actual errors.
Please revert these changes from this PR, if possible.
There's #13126 about the maven NPE issue. In the past there has been a need to temporarily set forceJavacCompilerUse
to find out the compiler error, but it has been possible to remove the option after fixing the compilation issue. Is that also the case here?
At least it seems that setting the maven compiler plugin version isn't necessary since the parent pom sets it.
maven-compiler-plugin version is set via
Lines 26 to 30 in e5d828a
<parent> | |
<groupId>org.apache</groupId> | |
<artifactId>apache</artifactId> | |
<version>23</version> | |
</parent> |
If there's no way around it, then add a comment why forceJavacCompilerUse
has been added, such as.
<!-- workaround https://issues.apache.org/jira/browse/MCOMPILER-346 -->
<forceJavacCompilerUse>true</forceJavacCompilerUse>
@lhotari I removed forceJavacCompilerUse and everything builds/pushed the change. |
I believe that the downside is reduced performance. In addition, the problem might happen in any module and therefore it doesn't make sense to change the setting for just a few modules if it were to be enabled globally. The way to make developers' life easier is to raise awareness of this issue. I added a simpler workaround to #13126, it's by passing |
btw. Regarding the NPEs with maven-compiler-plugin, version 3.9.0 was released recently with fixes to some NPE issues. https://lists.apache.org/thread/8bm3powmfy46z25k9jgrbkf1kxf5j6yk . I'll create a PR to upgrade to 3.9.0 . PR is #13789. |
Had to update maven compiler plugin config, otherwise it was NPE-ing instead of showing actual errors. CVEs are: CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147
…c images (and elastic.co no longer releases OSS images)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good work @dlg99 ! LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
great
* Upgraded ElasticSearch to get rid of CVEs. CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147 * Elastic search client version >= 7.11 no longer works with OSS Elastic images (and elastic.co no longer releases OSS images) * Fixed tests for Elasticsearch * pom cleanup (cherry picked from commit 1af8d3f)
This reverts commit 1af8d3f.
This reverts commit 1af8d3f.
* Upgraded ElasticSearch to get rid of CVEs. CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147 * Elastic search client version >= 7.11 no longer works with OSS Elastic images (and elastic.co no longer releases OSS images) * Fixed tests for Elasticsearch * pom cleanup
…nSearch one) (#13867) * Upgraded ElasticSearch to get rid of CVEs. (#13747) * Upgraded ElasticSearch to get rid of CVEs. CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147 * Elastic search client version >= 7.11 no longer works with OSS Elastic images (and elastic.co no longer releases OSS images) * Fixed tests for Elasticsearch * pom cleanup * Switched to OpenSearch client for Elastic (Apache 2 licensed)
This reverts commit 421424e.
…nSearch one) (apache#13867) * Upgraded ElasticSearch to get rid of CVEs. (apache#13747) * Upgraded ElasticSearch to get rid of CVEs. CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147 * Elastic search client version >= 7.11 no longer works with OSS Elastic images (and elastic.co no longer releases OSS images) * Fixed tests for Elasticsearch * pom cleanup * Switched to OpenSearch client for Elastic (Apache 2 licensed) (cherry picked from commit bef3071)
…nSearch one) (apache#13867) * Upgraded ElasticSearch to get rid of CVEs. (apache#13747) * Upgraded ElasticSearch to get rid of CVEs. CVE-2020-7020 CVE-2020-7021 CVE-2021-22132 CVE-2021-22134 CVE-2021-22144 CVE-2021-22147 * Elastic search client version >= 7.11 no longer works with OSS Elastic images (and elastic.co no longer releases OSS images) * Fixed tests for Elasticsearch * pom cleanup * Switched to OpenSearch client for Elastic (Apache 2 licensed) (cherry picked from commit bef3071) (cherry picked from commit 6deb24c)
CVEs are:
CVE-2020-7020
CVE-2020-7021
CVE-2021-22132
CVE-2021-22134
CVE-2021-22144
CVE-2021-22147
Motivation
mvn clean install verify -Powasp-dependency-check -DskipTests
found various CVEsModifications
Upgraded ElasticSearch to get rid of CVEs.
Had to update maven compiler plugin config, otherwise it was NPE-ing instead of showing actual errors.
Verifying this change
This change is a trivial rework / code cleanup without any test coverage.
Does this pull request potentially affect one of the following parts:
If
yes
was chosen, please highlight the changesDocumentation
Check the box below or label this PR directly (if you have committer privilege).
Need to update docs?
doc-required
(If you need help on updating docs, create a doc issue)
no-need-doc
(Please explain why)
doc
(If this PR contains doc changes)