[grpc-io] Re: How to implement asynchronous rpc in grpc?

2018-11-19 Thread qplc
Thanks Carl. I'm trying to use async calls without streaming. On Monday, November 12, 2018 at 5:37:56 PM UTC+5:30, qplc wrote: > > Hi, > > I've implemented below service definition in my grpc server/client > application. > > service TestService { > rpc testRPCCall(stream Test) returns (stream

Re: [grpc-io] Re: python quick start "hello world" example fails

2018-11-19 Thread 'Srini Polavarapu' via grpc.io
Your connection issue is due to proxy configuration on your machine. As you can see gRPC is connecting to a proxy for localhost. http_connect_handshaker.cc:300] Connecting to server localhost:50051 via HTTP proxy ipv4:10.19.8.225:912 Try setting http_proxy= or try no_proxy=localhost. On

[grpc-io] gRFC L43: Node Message Type Information

2018-11-19 Thread 'Michael Lumish' via grpc.io
This is the discussion thread for gRFC L43: https://github.com/grpc/proposal/pull/116. This gRFC proposes a new standard for sharing/handling message type information for gRPC methods in the Node libraries. -- You received this message because you are subscribed to the Google Groups "grpc.io"

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
I don’t know the C++ gRPC api but would assume there is a method to configure and control the SSL transport layer. Almost have to be otherwise you need to duplicate the entire SSL api. > On Nov 19, 2018, at 2:55 PM, solomon lifshits wrote: > > You got totally right what I was asking about,

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread solomon lifshits
You got totally right what I was asking about, the question is whether there is any plan to make that support on grpc/c++ legit, rather than test only. On Monday, November 19, 2018 at 3:00:07 PM UTC-5, eagle wrote: > > Robert Engels > writes: > > > I’m not sure I follow. The client knows the

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
Here is how to do it with Go https://stackoverflow.com/questions/44295820/disable-common-name-validation-go-http-client > On Nov 19, 2018, at 2:00 PM, Russ Allbery wrote: > > Robert Engels writes: > >> I’m not sure I follow. The client knows the host it is expecting to >> contact and

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Russ Allbery
Robert Engels writes: > I’m not sure I follow. The client knows the host it is expecting to > contact and verified that the certificate sent matches that host. As I > said in a later email there is almost certainly a way to bypass the > check but not sure you can change the setting while going

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
I’m not sure I follow. The client knows the host it is expecting to contact and verified that the certificate sent matches that host. As I said in a later email there is almost certainly a way to bypass the check but not sure you can change the setting while going through gRPC layer. > On Nov

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Russ Allbery
Robert Engels writes: > The certificate has the domain in it. So, think of the reverse. Someone > highjacks the domain and uses a bogus certificate (valid but not for the > real company) If the two weren’t linked there would be no way to stop > this (as the certificate is still valid) > By

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
Also, when this happens in a browser there will be security warnings, but the user can still bypass it. With automated systems this is harder to do, there may be an option with the underlying SSL provider on the platform being used to perform a similar bypass (since the browser can bypass it

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
The certificate has the domain in it. So, think of the reverse. Someone highjacks the domain and uses a bogus certificate (valid but not for the real company) If the two weren’t linked there would be no way to stop this (as the certificate is still valid) By linking the certificate and the

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread solomon lifshits
Thank you for reply. The only thing I am trying to "bypass" is the DNS resolution, so could you please elaborate how DNS resolution contributes to SSL security? On Monday, November 19, 2018 at 2:06:31 PM UTC-5, Robert Engels wrote: > > I’m pretty sure what you are asking breaks the security of

Re: [grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread Robert Engels
I’m pretty sure what you are asking breaks the security of using SSL... the certificates are issued to a domain for that reason, otherwise any valid certificate would be acceptable to the caller. > On Nov 19, 2018, at 12:33 PM, solomon lifshits wrote: > > Since the function

[grpc-io] Any alternative to SetSslTargetNameOverride?

2018-11-19 Thread solomon lifshits
Since the function SetSslTargetNameOverride is marked as test only, I am asking whether there is any "legal" alternative to connect to a server with specific IP address, while using a host name for server name indication? Any possibility for forced resolution of a hostname? If a tls

[grpc-io] Re: Guidance on implementing support for authenticated and secure client connections

2018-11-19 Thread Benjamin Krämer
Yang Gao is right, those get intentionally dropped. You should not workaround that and send them over a unsecured medium if you are not absolutely sure this is no security risk: Like when this application never gets in contact with the internet and only runs inside of a company network. --

Re: [grpc-io] Re: Future of github.com/grpc-ecosystem/grpc-opentracing/go/otgrpc?

2018-11-19 Thread Tom Wilkie
Thanks for update on this! Can someone merge https://github.com/grpc-ecosystem/grpc-opentracing/pull/43 to prevent confusion? Thanks Tom On Mon, Nov 19, 2018 at 8:43 AM Benjamin Krämer wrote: > Hi Tom, > > https://github.com/grpc-ecosystem/grpc-opentracing is not maintained > anymore. So

[grpc-io] Retrieve Server Reply before client streams terminates.

2018-11-19 Thread mendola
I can read from documentation: "A client-streaming RPC is also similar to our simple example, except the client sends a stream of requests to the server instead of a single request. The server sends back a single response, typically but not necessarily after it has received all the client’s

[grpc-io] Re: Future of github.com/grpc-ecosystem/grpc-opentracing/go/otgrpc?

2018-11-19 Thread Benjamin Krämer
Hi Tom, https://github.com/grpc-ecosystem/grpc-opentracing is not maintained anymore. So please use https://opentracing.io/ as main source. This will forward you to https://github.com/opentracing-contrib/ (that you already found). There we maintain all of the OpenTracing related contributions,