-
-
Notifications
You must be signed in to change notification settings - Fork 598
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Calling a non-TLS service running behing TLS enabled load balancer/proxy, says http2 frame too large #839
Comments
Hello @swagftw Actually, we can support such option, we support UPD. I am now making relevant things, so will try to address this as some starting point for #831 |
Hey @FZambia I saw that issue before raising this question here. I also thought that it was related, having a sense of common configuration related to TLS in this case makes much sense, but it has to be per transport, as you have suggested in the issue as well. I am using http proxy for this, so, I have two listeners in my server now, which I want to avoid. I will wait till we have this merged. I would love to work on this, but I am quite caught in my own work. |
I understand that the error makes sense, as my service (Let's name it A) will try to respond with http/1.1 when the centrifugo expects http/2 response and thus says frame too large.
But I also call this service A from another service B, which is able to communicate with service A, because my gRPC client configuration explicitly says
insecureSkipVerify: true
inside TLS configuration while initiating the gRPC client.I was going through the Centrifuge code and saw that the gRPC client makes the following the request when certs are not provided explicitly in configuration. Reference
function reference:
centrifugo/internal/proxy/grpc.go
Line 51 in cc80214
exact line reference:
centrifugo/internal/proxy/grpc.go
Line 66 in cc80214
The reason I asked for this question and not created an issue
Is there any reason (that I am unaware of) due to which the client does not support any configuration to allow the TLS config with
insecureFlag=true
?So the client configuration will look like below
The text was updated successfully, but these errors were encountered: