bump new API config.Version to V1_0_0_0 to fix SASL handshake #22
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This commit in samsara (IBM/sarama@765bfa3) which first appears in samsara v1.41.0 bumps the default version to
SASLHandshakeV1
inNet.SASL.NewConfig()
.This leads to a failure of "Error while performing SASL handshake " when using SASL auth. The failure happens immediately after the socket connection is established and prior to any handshake occurring. This is the code path that leads to the failure:
authenticateViaSASLv1()
now whereas it would have calledauthenticateViaSASLv0()
before the upstream commitif !b.conf.Version.IsAtLeast(rb.requiredVersion())
to check that the configuredconfig.Version
is at least enough to allow the SASLv1 handshake messageSaslHandshakeRequest
requires a minimum version of1_0_0_0
for a Version 1 handshake message.0_10_0_0
prior to the upstream commitThe default
config.Version
inmain.go
is currentlyV0_9_0_0
which is too low for the SASL handshake (even before the upstream commit). Theconfig.Version
used whenenable-new-api
is specified is currentlyV0_10_2_0
which is also too low for the SASL handshake given the new upstream commit.I was able to successfully auth using SASL/PLAIN over TLS using
enable-new-api
and this diff.