Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Communicate with peer by proxy #79

Closed
iceriverdog opened this issue Oct 15, 2020 · 9 comments
Closed

Communicate with peer by proxy #79

iceriverdog opened this issue Oct 15, 2020 · 9 comments
Labels

Comments

@iceriverdog
Copy link

iceriverdog commented Oct 15, 2020

HI sir,

How to Communicate with peer by proxy using your Tape? thank you!
Like this:

peers:
  peer0.adminorg.544330u:
    url: grpcs://181.71.124.24:30062
    grpcOptions:
      ssl-target-name-override: nginx.bc9seqlghk0u.baas
      grpc.primary_user_agent: /peer0-adminorg.bceqlghk0u
      grpc.keepalive_time_ms: 600000
    tlsCACerts:
      path: networks/cert/nginx.bc9qlghk0u.baas.pem
@SamYuan1990
Copy link
Member

SamYuan1990 commented Oct 15, 2020

in my point of view, may I know the benefits for this. may using for tdd or bdd format:

scenario: 
if we support connect with the peer by proxy:
when:  
then:

as I have a question as why proxy but not change /etc/hosts ?
as here grpcOptions for override the connection name?
ssl-target-name-override: nginx.bc9seqlghk0u.baas

or say there some network blocking as limitation and a proxy is as network gateway?
but sounds ... why not tape connect to the nginx proxy and proxy forwards your traffic?

CC: @guoger

@SamYuan1990
Copy link
Member

@iceriverdog , any updates?

@guoger
Copy link
Member

guoger commented Nov 10, 2020

close due to inactivity, feel free to reopen if this is still valid.

@guoger guoger closed this as completed Nov 10, 2020
@davidkhala davidkhala reopened this Mar 2, 2022
@davidkhala
Copy link
Member

I would like to vote for this issue, the point is not only to proxy scenario, but a generic feature that let tape to allow free format grpc connection parameters.

One key elements among then is ssl-target-name-override to allow mixtrue usage of localhost and pseudo FQDN

@SamYuan1990
Copy link
Member

I would like to vote for this issue, the point is not only to proxy scenario, but a generic feature that let tape to allow free format grpc connection parameters.

One key elements among then is ssl-target-name-override to allow mixtrue usage of localhost and pseudo FQDN

hi David,

could you please share a sample of mixtrue usage of localhost and pseudo FQDN?

@SamYuan1990
Copy link
Member

@iceriverdog /@davidkhala , please let us know if #243 resolve this issue?

@stale
Copy link

stale bot commented Apr 28, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Apr 28, 2022
@davidkhala
Copy link
Member

ssl-target-name-override

Not fully yet,
grpc has a long list of configurable params
Beside below ones, I wonder how to handle about others

    grpc.primary_user_agent: /peer0-adminorg.bceqlghk0u
    grpc.keepalive_time_ms: 600000

@stale stale bot removed the stale label Apr 29, 2022
@stale
Copy link

stale bot commented May 30, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label May 30, 2022
@stale stale bot closed this as completed Jun 10, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

No branches or pull requests

4 participants