-
Notifications
You must be signed in to change notification settings - Fork 916
Handle TLS 1.3 bad cert errors in proxy handler #2182
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
e088330
to
07322d2
Compare
"by the service (e.g. because there was a handshake error[use -Djavax" | ||
+ ".net.debug=ssl to enable SSL logs], the request " |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any way we can detect that it was a handshake error so that they don't have to enable SSL logs? I wouldn't want every customer having to enable SSL logs to see if it was a handshake error just a plain-ol'-closed-channel.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, unfortunately, this kind of errors are bubbled up as ClosedChannelException
with no details at all. When I was troubleshooting the failing test, it took me while to figure out it was related to handshake.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wish we could link to docs that help customers debug these errors. Maybe something we can talk to @Carey-AWS about. In the meantime, it's really hard to read this with the parens-in-parens for the "use -D...". Can we exclude that? The other potential causes we list don't say how to diagnose them.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1. Yeah, a guide on how to troubleshoot closed channel exception would be super helpful!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for calling this out, @millems. I've added it to the backlog.
...ent/src/main/java/software/amazon/awssdk/http/nio/netty/internal/ProxyTunnelInitHandler.java
Outdated
Show resolved
Hide resolved
658a3df
to
babd601
Compare
babd601
to
d102e8a
Compare
SonarCloud Quality Gate failed. |
For S3, the client context params are duplicated on on its ServiceConfiguration. For these duplicates, just keep them in the ServiceConfiguration.
Description
Fixed the issue where BAD_CERTIFICATE issue manifested as acquire connection timeout error when using TLS1.3 and proxy.
Motivation and Context
Requests w/ proxy
Requests w/o proxy
Testing
Added unit tests.
Screenshots (if appropriate)
Types of changes
Checklist
mvn install
succeedsLicense