Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support path exposed with non-HTTP2 protocol #7510

Merged
merged 1 commit into from
Apr 2, 2020

Conversation

alindeman
Copy link
Contributor

If a proxied service is a gRPC or HTTP2 service, but a path is exposed using the HTTP1 or TCP protocol, Envoy should not be configured with http2ProtocolOptions for the cluster backing the path.

A situation where this comes up is a gRPC service whose healthcheck or metrics route (e.g. for Prometheus) is an HTTP1 service running on a different port. Previously, if these were exposed either using Expose: { Checks: true } or Expose: { Paths: ... }, Envoy would still be configured to communicate with the path over HTTP2, which would not work properly.

@hashicorp-cla
Copy link

hashicorp-cla commented Mar 26, 2020

CLA assistant check)
All committers have signed the CLA.

If a proxied service is a gRPC or HTTP2 service, but a path is exposed
using the HTTP1 or TCP protocol, Envoy should not be configured with
`http2ProtocolOptions` for the cluster backing the path.

A situation where this comes up is a gRPC service whose healthcheck or
metrics route (e.g. for Prometheus) is an HTTP1 service running on
a different port. Previously, if these were exposed either using
`Expose: { Checks: true }` or `Expose: { Paths: ... }`, Envoy would
still be configured to communicate with the path over HTTP2, which would
not work properly.
@alindeman alindeman force-pushed the expose-non-http2-path branch from dd3affc to 8d1075f Compare March 26, 2020 01:30
@hanshasselberg
Copy link
Member

Hello @alindeman, thanks for contributing! I will be looking at your PRs shortly.

@hanshasselberg hanshasselberg self-assigned this Mar 31, 2020
Copy link
Member

@hanshasselberg hanshasselberg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@hanshasselberg hanshasselberg merged commit c1cb18c into hashicorp:master Apr 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants