If you want to capitalize on all of the capabilities of the undertow web server (which is likely user expectation) then really it needs to be the one providing http instead of splicing in a different web server, which has a completely different feature set, and mechanism of configuration. However, it would be possible to do so.yes, that’s what i was referring to. if HTTP/2 becomes the default, then we are one step closer to utilise gRPC in Swarm. But there are still many related issues that need to be solved. I.e. it would require server transport based on undertow. Currently gRPC only provides netty [1]. And we would need to discuss how this then integrates with the HTTP upgrade, etc.But I don’t want to hijack this thread. When the time comes I get back to this in a separate thread.On 02 Jun 2016, at 13:54, Stuart Douglas <stuart.w.douglas@gmail.com> wrote:Ah, sorry, I miss read your original email.You can do HTTP/2 at the moment, it is just a bit of a pain to set up.StuartOn Thu, Jun 2, 2016 at 9:44 PM, Heiko Braun <hbraun@redhat.com> wrote:gRPC requires http/2On 02 Jun 2016, at 12:05, Stuart Douglas <stuart.w.douglas@gmail.com> wrote:I am not sure how gRPC comes into it?StuartOn Thu, Jun 2, 2016 at 6:26 PM, Heiko Braun <hbraun@redhat.com> wrote:+1This would be a great step forward.On a related note: I was looking into gRPC [1] for Swarm the other day,and it seems this would be pre-requisite.Regards, HeikoOn 02 Jun 2016, at 01:22, Stuart Douglas <stuart.w.douglas@gmail.com> wrote:_______________________________________________Yes I am aware that this is a massive hack, however I think it is preferable to the current boot classpath hack, which has a lot of a drawbacks. If this ever stops working at some point due to internal JDK changes the boot classpath hack would still be usable, however I don't think this is particularly likely, as the part of the JDK that this modifies seems unlikely to change.- I have dealt with the ALPN issue in Undertow using a reflection based hack. I have created some code that parses and modifies the SSL Server/Client hello messages to add/read APLN information, and I then use reflection to update the HandshakeHash maintained by the engine so the engines internal hash state used to generate the Finished frames matches the data that was actually sent over the wire.I am proposing that we do the following to address these issues:- You need to find the correct version of the Jetty ALPN jar and add it to your boot class path. This is essentially a hack that modifies the JDK SSL classes to allow them to support ALPN. A new version is needed for every JDK8 release, so if you ever update the JVM HTTP/2 will stop working (JDK9 has support for ALPN so this is not nessesary).- You need to set up a HTTPS connector, including generating keys etc. For new users this is not as straightforward as it could be.At the moment there are two main barriers to getting HTTP/2 two work:Hi All,I would like to propose that we add support for HTTP/2 out of the box in Wildfly 10.1.
- Add support for lazily generated self signed certificates, and include this in the default config. This would mean that we would have a working HTTPS connector in the default config, although the first request would be a bit slow as it would need to generate a new self signed certificate for localhost. This allows for SSL out of the box, without any impact on startup time or any need for an installer to generate the certificate.I think this would be a great usability feature, allowing developers to get started with HTTPS and HTTP/2 straight away.Thoughts?Stuart
wildfly-dev mailing list
wildfly-dev@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/wildfly-dev_______________________________________________
wildfly-dev mailing list
wildfly-dev@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/wildfly-dev