-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
does not work HTTPS on gunicorn 19.3.0 and tornado 4.3 #1135
Comments
seems like tornado is now limiting the number of settings. |
sorry, I edited this comment because my previous comment was wrong. Your suggestion made perfect! Thank you so much! *** /home/hiro/.virtualenvs/CP275_asyncproxy/lib/python2.7/site-packages/gunicorn/workers/gtornado_.py 2015-10-28 10:54:14.405533346 +0900
--- /home/hiro/.virtualenvs/CP275_asyncproxy/lib/python2.7/site-packages/gunicorn/workers/gtornado.py 2015-10-28 10:34:09.014425348 +0900
***************
*** 3,8 ****
--- 3,9 ----
# This file is part of gunicorn released under the MIT license.
# See the NOTICE for more information.
+ import copy
import os
import sys
***************
*** 89,96 ****
server_class = _HTTPServer
if self.cfg.is_ssl:
server = server_class(app, io_loop=self.ioloop,
! ssl_options=self.cfg.ssl_options)
else:
server = server_class(app, io_loop=self.ioloop)
--- 90,100 ----
server_class = _HTTPServer
if self.cfg.is_ssl:
+ _ssl_opt = copy.deepcopy(self.cfg.ssl_options)
+ del _ssl_opt["do_handshake_on_connect"]
+ del _ssl_opt["suppress_ragged_eofs"]
server = server_class(app, io_loop=self.ioloop,
! ssl_options=_ssl_opt)
else:
server = server_class(app, io_loop=self.ioloop) |
Might Tornado want to add these options? |
Not saying that changes the solution here, now, but maybe we can notify them? |
Thank you for your comment. Exactly, tornado should possibly accept these ssl options and looks the change on tornado side would not be complex. I'll notify them. |
We can merge it, and then update it with conditionals when we know what tornado version to test for. |
+1
|
It seems tornado side does not want to allow do_handshake_on_connect option and allow_ragged_eofs.
I'm not sure which side should accept the change. |
We should merge the PR here. |
By the way, I agree with Ben's comment about |
@tilgovi isn't the PR merged? |
@berkerpeksag can we use an |
Unfortunately, no, we can't use it.
That looks like a good idea to me. I've opened #1140. |
I'm not sure this is a problem on gunicorn, but please ask a question here.
I'm working on an implementation simple tornado app and it works on gunicorn, also it listen HTTPS. It worked great with gunicorn 18.0 + tornado 3.0.
However, after doing I upgrade gunicorn to 19.3.0 for using
ca-certs
option (also upgrade tornado to 4..2.1), it does not work fine.If someone point out the cause of this is which one gunicorn or tornado, it would be great help to me.
here is a starting command line.
and stacktrace is following:
_SSL_CONTEXT_KEYWORDS
declared innetutil.py
is following:The text was updated successfully, but these errors were encountered: