Skip to content

Send buffers in chunks <2GB#5134

Closed
jakirkham wants to merge 7 commits intodask:mainfrom
jakirkham:send_lt_2gb_bufs
Closed

Send buffers in chunks <2GB#5134
jakirkham wants to merge 7 commits intodask:mainfrom
jakirkham:send_lt_2gb_bufs

Conversation

@jakirkham
Copy link
Member

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL.

  • Closes #xxxx
  • Tests added / passed
  • Passes black distributed / flake8 distributed / isort distributed

Works around the same OpenSSL issue seen for reading except this does so
for writing. As individual frames may not be this large, this may be
less of an issue. Still this is a good preventative measure to protect
users.
All chunks will be of non-trivial size. If they are trivial, the loop
would have already ended.
@mrocklin
Copy link
Member

I suspect that this could be handled by the current max shard size functionality. We recently did this for websockets in other to keep the frame size below 8MB.

@mrocklin
Copy link
Member

Relevant PR: #5070 (I was on my phone last message)

@jakirkham
Copy link
Member Author

Would suggest merging so that both sides of the OpenSSL issue are fixed. Especially in the upcoming release ( dask/community#173 ).

If someone wants to come along and improve on this work, that would be great, but cannot personally promise to do that (particularly not in the near future).

mrocklin added a commit to mrocklin/distributed that referenced this pull request Jul 29, 2021
Supercedes dask#5134

Copying over the summary of that PR

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( dask#4538 ), except unlike PR ( dask#5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
@mrocklin
Copy link
Member

I'm thinking of the following: #5141

@jakirkham
Copy link
Member Author

Great, feel free to close this then :)

@jrbourbeau
Copy link
Member

Closing in favor of #5141

@jrbourbeau jrbourbeau closed this Jul 29, 2021
jrbourbeau pushed a commit that referenced this pull request Jul 29, 2021
Supercedes #5134

Copying over the summary of that PR

Works around the OpenSSL 1.0.2 bug demonstrated in issue ( #4538 ), except unlike PR ( #5115 ) which did this for reading, this does the same thing for writing. The error may be less likely to show up in the write path (as frames may simply be smaller than this limit). Still it seems like a good idea to protect against OverflowErrors from OpenSSL
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants