-
-
Notifications
You must be signed in to change notification settings - Fork 719
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Send buffers in chunks <2GB #5134
Conversation
f9cae33
to
b698031
Compare
Works around the same OpenSSL issue seen for reading except this does so for writing. As individual frames may not be this large, this may be less of an issue. Still this is a good preventative measure to protect users.
b698031
to
63b0c79
Compare
All chunks will be of non-trivial size. If they are trivial, the loop would have already ended.
2c8939b
to
445a38b
Compare
I suspect that this could be handled by the current max shard size functionality. We recently did this for websockets in other to keep the frame size below 8MB. |
Relevant PR: #5070 (I was on my phone last message) |
Would suggest merging so that both sides of the OpenSSL issue are fixed. Especially in the upcoming release ( dask/community#173 ). If someone wants to come along and improve on this work, that would be great, but cannot personally promise to do that (particularly not in the near future). |
Supercedes dask#5134 Copying over the summary of that PR Works around the OpenSSL 1.0.2 bug demonstrated in issue ( dask#4538 ), except unlike PR ( dask#5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
I'm thinking of the following: #5141 |
Great, feel free to close this then :) |
Closing in favor of #5141 |
Supercedes #5134 Copying over the summary of that PR Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against
OverflowError
s from OpenSSL.black distributed
/flake8 distributed
/isort distributed