-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[meta]: authority
issues
#4717
Comments
To override authority in etcd client we used |
The The ClientConn's |
If I understood correctly, For etcd v3.5 I plan to depend on this behavior to implement fix for authority header. Please let me know if there is better alternative. |
As part of #4817, we are adding support for The Where/how do you use this |
We use custom resolver https://github.com/etcd-io/etcd/blob/3df272774672366beb02c5447782805ab5fec957/client/v3/internal/resolver/resolver.go#L30 We use it to do a live update of endpoints used by client. I wasn't the one to implement it so I'm not sure if this is best way to implement it, though. |
And how do you use the |
Authority is generated by the original target generated here https://github.com/etcd-io/etcd/blob/3df272774672366beb02c5447782805ab5fec957/client/v3/client.go#L302 In etcd v3.5.0 target uses pattern I have proposed a fix etcd-io/etcd@c929a91#diff-2bbaa3c83234888775aabf7697076e8035451045c479938e03ebb5c929132679L300-L310 that uses |
Please take a look at #4817 if you are interested. The changes will hopefully affect you positively. |
grpc/grpc-go#4717 https://github.com/grpc/grpc-go/releases/tag/v1.42.0 grpc/grpc-go#4817 从 1.42.0 之后,grpc-go 使用 url.Parse 来解析 dial target ,即 "scheme://xxx/xxx" , 之前的 secheme 含有非法字符下划线会导致解析失败。
This is a meta-issue to track all the things that we need to fix (or add new functionality) with respect to how
:authority
is used in gRPC-Go.Determining
:authority
from the target URI must be the responsibility of the name resolver. See: HTTP2 authority header is not set to resolver.Address.ServerName (?) #4516:authority
pseudo-header, andserverName
for TLS handshake by default.authority
set.Add a call option to override the
:authority
header on a per-RPC basis. client: Add CallOption for setting authority; allow even without WithInsecure #3444AuthInfo
implementations, to validate this override.AuthInfo
for the subChannel does not implement this interfaceAuthInfo
failsContinue to support the per-address serverName override in the addresses returned by the name resolver.
serverName
to be used and can direct traffic to balancers/hosts controlled by them. This is addressed by the use of theWithAuthority
dial option.:authority
header sent in theHEADERS
frame and theserverName
used for the TLS handshake.Make the
WithAuthority
dial option work for secure credentials as well.insecure
credentials.:authority
header and theserverName
.Deprecate the
OverrideServerName()
method oncredentials.TransportCredentials
interface.#RouteLookupService
The text was updated successfully, but these errors were encountered: