Skip to content

Conversation

@butonic
Copy link
Member

@butonic butonic commented Mar 17, 2023

I was digging into #5116 out of curiosity.

AFAICT just instanting tls.Config or even setting some params will break http2 support. I got http2 working (partially) by manually setting NextProtos: []string{"h2", "http/1.1"}, ... but things are a little more complicated as we also need to tell the go micro servers and clients to use a Transport with http2 support: micro.Transport(transport.NewHTTPTransport(transport.TLSConfig(sopts.TLSConfig)))

We are also manually adding a use_tls flag to the micro metadata, which the proxy evaluates to either send http or http2 requests ... IMO that should be handled by the micro registry ...

Furthermore, reva also needs some changes: cs3org/reva#3736

In any case this needs more digging

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
@update-docs
Copy link

update-docs bot commented Mar 17, 2023

Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes.

@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 3 Code Smells

7.0% 7.0% Coverage
38.4% 38.4% Duplication

@ownclouders
Copy link
Contributor

💥 Acceptance test localApiTests-apiArchiver-ocis failed. Further test are cancelled...

@butonic
Copy link
Member Author

butonic commented Jul 29, 2024

I am no longer working on this. Feel free to pick it up. I'll happily review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants