Skip to content

Conversation

dongjoon-hyun
Copy link
Member

What changes were proposed in this pull request?

This PR aims to fix DataFrame to use SparkSession's transportSecurity.

Why are the changes needed?

To support TLS correctly. This issue was reported during v0.1.0 RC1 vote.

Does this PR introduce any user-facing change?

Yes, but it's a bug fix which the previous behavior is not proper.

How was this patch tested?

Pass the CIs.

Was this patch authored or co-authored using generative AI tooling?

No.

transport: .http2NIOPosix(
target: .dns(host: spark.client.host, port: spark.client.port),
transportSecurity: .plaintext
transportSecurity: spark.client.transportSecurity
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The fix looks good. How does it test? Manually?

@dongjoon-hyun
Copy link
Member Author

dongjoon-hyun commented May 9, 2025

Actually, the setup is not easy. I believe the only way is to test against the commercial vendor's TLS-enabled Spark Connect Server. I tried to launch and use Databricks Community Edition, but I couldn't find a way to get Spark Connect endpoint there.

@dongjoon-hyun
Copy link
Member Author

BTW, thank you, @viirya !

@dongjoon-hyun
Copy link
Member Author

Merge to main~

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants