Skip to content

Commit 849a3dd

Browse files
SamBarkerrobobario
andcommitted
Apply gammer fixes from code review
Co-authored-by: Robert Young <[email protected]> Signed-off-by: Sam Barker <[email protected]> Signed-off-by: Sam Barker <[email protected]>
1 parent c0f527a commit 849a3dd

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

_posts/2024-12-17-release-0_9_0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ The Kroxylicious project is very pleased to announce the [0.9.0](https://github.
1111

1212
We generally expect Kroxylicious to be both forwards and backwards compatible across Kafka version just like the Apache Kafka client and broker. While we tested with pre-release versions Kafka 3.9 we discovered after it was released that we had missed a case in the protocol version negotiation. When the API Versions request version was updated we were unable to decode the response. In the 0.9.0 release we adopt the same behaviour as the Kafka broker and respond with API version 0 if we do not support the protocol version requested by the client - we have also expanded our test coverage to get earlier warnings of similar issues in the future.
1313

14-
This release also marks the introduction of our new connection handling sate machine at the core of the proxy. We have evolved state machine at the core of the proxy to separate out the state carried at various stages of the connection life cycle and provide stronger rules around transitions between states. This is still a work in progress as its implications are rather wide-ranging however with think it gives us a stronger core to base everything else around. This does for the moment limit our ability to offer authentication offload support, we do intend to restore this eventually (please do get in touch if this use case is important to you).
14+
This release also marks the introduction of our new connection handling state machine at the core of the proxy. We have evolved the state machine at the core of the proxy to separate out the state carried at various stages of the connection life cycle and provide stronger rules around transitions between states. This is still a work in progress as its implications are rather wide-ranging however we think it gives us a stronger core to base everything else around. This does, for the moment, limit our ability to offer authentication offload support, we do intend to restore this eventually (please do get in touch if this use case is important to you).
1515

1616
There are many quality of life improvements in this release (in no particular order)
1717

1818
- Ensure we now respond with errors instead of closing the connection when there are problems encrypting records
1919
- We've made it easier for Filter authors to generate error responses of their own.
2020
- We realised forwarding partial requests from the record validation filter in the face of validation failures was a bad idea so it now rejects the whole batch.
2121
- We can now use EC2 instance metadata to authenticate against the AWS KMS.
22-
- We now support the validation on M_TLS certificates on the downstream (or client side) of the proxy.
22+
- We now support mutual TLS authentication on the downstream (or client side) of the proxy.
2323
- Key Management Systems (KMS) now have more life cycle calls backs to better manage shared resources.
24-
- We now default to LogJ [Async logging](https://logging.apache.org/log4j/2.x/manual/async.html) - this is mostly a performance optimisation, but we think it should address some issues we have observed with logging in kubernetes environments.
24+
- We now default to Log4J [Async logging](https://logging.apache.org/log4j/2.x/manual/async.html) - this is mostly a performance optimisation, but we think it should address some issues we have observed with logging in kubernetes environments.
2525

2626
We are very pleased to say we have first time contributions from
2727
- [Calum Murray](https://github.com/Cali0707)

0 commit comments

Comments
 (0)