Skip to content

Commit

Permalink
Upgrade zookeeper (#302)
Browse files Browse the repository at this point in the history
* Upgrade zookeeper

* Fix links

* Release date

* Update pom.xml

Co-authored-by: Christoph Pirkl <[email protected]>

* Update doc/changes/changes_2.7.11.md

Co-authored-by: Christoph Pirkl <[email protected]>

* Update doc/changes/changes_2.7.11.md

Co-authored-by: Christoph Pirkl <[email protected]>

---------

Co-authored-by: Christoph Pirkl <[email protected]>
  • Loading branch information
Shmuma and kaklakariada authored Mar 22, 2024
1 parent 95bd05c commit ada164c
Show file tree
Hide file tree
Showing 5 changed files with 35 additions and 15 deletions.
1 change: 1 addition & 0 deletions doc/changes/changelog.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

19 changes: 19 additions & 0 deletions doc/changes/changes_2.7.11.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Cloud Storage Extension 2.7.11, released 2024-03-22

Code name: upgrade zookeeper to fix CVE-2024-23944

## Summary

Zookeeper dependency was upgraded to address CVE-2024-23944.

## Security

* #300: Fixed CVE-2024-23944 in `org.apache.zookeeper:zookeeper:jar:3.9.1:compile`

## Dependency Updates

### Cloud Storage Extension

#### Compile Dependency Updates

* Updated `org.apache.zookeeper:zookeeper:3.9.1` to `3.9.2`
20 changes: 10 additions & 10 deletions doc/user_guide/user_guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ downloaded jar file is the same as the checksum provided in the releases.
To check the SHA256 result of the local jar, run the command:

```sh
sha256sum exasol-cloud-storage-extension-2.7.10.jar
sha256sum exasol-cloud-storage-extension-2.7.11.jar
```

### Building From Source
Expand Down Expand Up @@ -180,7 +180,7 @@ mvn clean package -DskipTests=true
```

The assembled jar file should be located at
`target/exasol-cloud-storage-extension-2.7.10.jar`.
`target/exasol-cloud-storage-extension-2.7.11.jar`.

### Create an Exasol Bucket

Expand All @@ -202,7 +202,7 @@ for the HTTP protocol.
Upload the jar file using curl command:

```sh
curl -X PUT -T exasol-cloud-storage-extension-2.7.10.jar \
curl -X PUT -T exasol-cloud-storage-extension-2.7.11.jar \
http://w:<WRITE_PASSWORD>@exasol.datanode.domain.com:2580/<BUCKET>/
```

Expand Down Expand Up @@ -234,7 +234,7 @@ OPEN SCHEMA CLOUD_STORAGE_EXTENSION;

CREATE OR REPLACE JAVA SET SCRIPT IMPORT_PATH(...) EMITS (...) AS
%scriptclass com.exasol.cloudetl.scriptclasses.FilesImportQueryGenerator;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/

CREATE OR REPLACE JAVA SCALAR SCRIPT IMPORT_METADATA(...) EMITS (
Expand All @@ -244,12 +244,12 @@ CREATE OR REPLACE JAVA SCALAR SCRIPT IMPORT_METADATA(...) EMITS (
end_index DECIMAL(36, 0)
) AS
%scriptclass com.exasol.cloudetl.scriptclasses.FilesMetadataReader;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/

CREATE OR REPLACE JAVA SET SCRIPT IMPORT_FILES(...) EMITS (...) AS
%scriptclass com.exasol.cloudetl.scriptclasses.FilesDataImporter;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/
```

Expand All @@ -268,12 +268,12 @@ OPEN SCHEMA CLOUD_STORAGE_EXTENSION;

CREATE OR REPLACE JAVA SET SCRIPT EXPORT_PATH(...) EMITS (...) AS
%scriptclass com.exasol.cloudetl.scriptclasses.TableExportQueryGenerator;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/

CREATE OR REPLACE JAVA SET SCRIPT EXPORT_TABLE(...) EMITS (ROWS_AFFECTED INT) AS
%scriptclass com.exasol.cloudetl.scriptclasses.TableDataExporter;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/
```

Expand Down Expand Up @@ -407,13 +407,13 @@ CREATE OR REPLACE JAVA SCALAR SCRIPT IMPORT_METADATA(...) EMITS (
) AS
%jvmoption -DHTTPS_PROXY=http://username:password@10.10.1.10:1180
%scriptclass com.exasol.cloudetl.scriptclasses.FilesMetadataReader;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/

CREATE OR REPLACE JAVA SET SCRIPT IMPORT_FILES(...) EMITS (...) AS
%jvmoption -DHTTPS_PROXY=http://username:password@10.10.1.10:1180
%scriptclass com.exasol.cloudetl.scriptclasses.FilesDataImporter;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.10.jar;
%jar /buckets/bfsdefault/<BUCKET>/exasol-cloud-storage-extension-2.7.11.jar;
/
```

Expand Down
2 changes: 1 addition & 1 deletion pk_generated_parent.pom

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 4 additions & 4 deletions pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -3,14 +3,14 @@
<modelVersion>4.0.0</modelVersion>
<groupId>com.exasol</groupId>
<artifactId>cloud-storage-extension</artifactId>
<version>2.7.10</version>
<version>2.7.11</version>
<name>Cloud Storage Extension</name>
<description>Exasol Cloud Storage Import And Export Extension</description>
<url>https://github.com/exasol/cloud-storage-extension/</url>
<parent>
<artifactId>cloud-storage-extension-generated-parent</artifactId>
<groupId>com.exasol</groupId>
<version>2.7.10</version>
<version>2.7.11</version>
<relativePath>pk_generated_parent.pom</relativePath>
</parent>
<properties>
Expand Down Expand Up @@ -175,10 +175,10 @@
<version>${hadoop.version}</version>
</dependency>
<dependency>
<!-- override version 3.6.3 to fix vulnerability CVE-2023-42503 -->
<!-- override version 3.6.3 to fix vulnerability CVE-2023-42503 and CVE-2024-23944 -->
<groupId>org.apache.zookeeper</groupId>
<artifactId>zookeeper</artifactId>
<version>3.9.1</version>
<version>3.9.2</version>
</dependency>
<dependency>
<!-- Upgrade transitive dependency of org.apache.zookeeper:zookeeper to fix CVE-2023-6378 -->
Expand Down

0 comments on commit ada164c

Please sign in to comment.