-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Envoy not serving ALPN, http2 over https to web browsers #168
Comments
Thanks for reporting this issue. The https listeners are being configured with
I thought that this would enable http/2 over tls, but I wasn't correct. Let me look into this, it shouldn't take much to fix. https://www.envoyproxy.io/docs/envoy/latest/api-v2/sds.proto#commontlscontext |
Thanks for the fix, this looks like http/2 is being served properly
I think I might do a 0.3.1 in a week or so, and i've made a note to backport this to the release-0.3 branch. |
Working here as well with the current master build |
Nice. I remember using httpstat to check h2 status a while back and being
confused that it wasn't showing h2. However at the time TLS support was
super new and getting all the pieces together to serve h2 over https was a
bit of an ask so I forgot to verify.
Thanks for your fix. Always welcome.
…On 19 January 2018 at 12:26, Cody Maloney ***@***.***> wrote:
Working here as well with the current master build
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub
<#168 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AAAcA2BuHdHyAaE490hzlu_zRePyHgwpks5tL-9TgaJpZM4RjyEA>
.
|
Envoy supports http2, and browsers request it via ALPN, but currently envoy as configured via contour doesn't offer any protocols via alpn so clients fall back to http/1.1 (sample below using curl).
Based on the envoy docs (https://www.envoyproxy.io/docs/envoy/latest/api-v2/sds.proto#commontlscontext) alpn_protocols should be set to
h2,http/1.1
. I'd probably say do it on all tls contexts by default, although probably would be most sane to also make a annotation to overrideThe text was updated successfully, but these errors were encountered: