>>968920
Mundane problems and persistent bugs that are never fixed seem like more interesting territory:
http://steveloughran.blogspot.com/2016/07/gardening-commons.html
https://issues.apache.org/jira/browse/HADOOP-13287
>URLs break when Secret Key contains a slash, even if encoded.
>This whole thing was related to AWS-generated secrets. Those of us whose AWS secrets didn't have a "/" in this couldn't replicate the problem. Thus it was a configuration-space issue rather than something visible to all.
>There was a straightforward workaround, "generate new credentials", so it wasn't a blocker.
>That related issue, HADOOP-13287, is actually highlighting a regression caused by the fix for HADOOP-3733. In the process for allowing URLs to contain "/" symbols, we managed to break the ability to use "+" in them.
>The regression was caught because the HADOOP-3733 patch included some tests which played with the tester's real credentials. Fun problem: writing tests to do insecure things which don't leak secrets in logs and assert statements.
>HADOOP-13287 is not an example of "there are nearby problems" so much as "every bug fix moves the bug", something noted in Brook's "the mythical man month" in his coverage of IBM OS patches.
>And again, this is a c-space problem, it was caught because Chris had + in his secret.
>we had "/" in the secret is because the problem only arises if you put your AWS secrets in the URL itself, as s3a://AWSID:secret-aws-key@bucket
I think I'll try finding stuff like this soon to pad my resume and learn about some tools I've been using recently.