Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Send buffers in chunks <2GB #5134

Closed
wants to merge 7 commits into from
Closed

Conversation

jakirkham
Copy link
Member

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL.

  • Closes #xxxx
  • Tests added / passed
  • Passes black distributed / flake8 distributed / isort distributed

Works around the same OpenSSL issue seen for reading except this does so
for writing. As individual frames may not be this large, this may be
less of an issue. Still this is a good preventative measure to protect
users.
All chunks will be of non-trivial size. If they are trivial, the loop
would have already ended.
@mrocklin
Copy link
Member

I suspect that this could be handled by the current max shard size functionality. We recently did this for websockets in other to keep the frame size below 8MB.

@mrocklin
Copy link
Member

Relevant PR: #5070 (I was on my phone last message)

@jakirkham
Copy link
Member Author

Would suggest merging so that both sides of the OpenSSL issue are fixed. Especially in the upcoming release ( dask/community#173 ).

If someone wants to come along and improve on this work, that would be great, but cannot personally promise to do that (particularly not in the near future).

mrocklin added a commit to mrocklin/distributed that referenced this pull request Jul 29, 2021
Supercedes dask#5134

Copying over the summary of that PR

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( dask#4538 ), except unlike PR ( dask#5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
@mrocklin
Copy link
Member

I'm thinking of the following: #5141

@jakirkham
Copy link
Member Author

Great, feel free to close this then :)

@jrbourbeau
Copy link
Member

Closing in favor of #5141

@jrbourbeau jrbourbeau closed this Jul 29, 2021
jrbourbeau pushed a commit that referenced this pull request Jul 29, 2021
Supercedes #5134

Copying over the summary of that PR

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants