Skip to content

[FIXED] Connz would "block" for TLS clients still in TLS handshake #604

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Nov 17, 2017

Conversation

kozlovic
Copy link
Member

@kozlovic kozlovic commented Nov 9, 2017

If server requires TLS and clients are connecting, and a Connz
request is made while clients are still in TLS Handshake, the
call to tls.Conn.ConnectionState() would block for the duration
of the handshake. This would cause the overall http request to
take too long.
We will now not try to gather TLSVersion and TLSCipher from a
client that is still in TLS handshake.

Resolves #600

If server requires TLS and clients are connecting, and a Connz
request is made while clients are still in TLS Handshake, the
call to tls.Conn.ConnectionState() would block for the duration
of the handshake. This would cause the overall http request to
take too long.
We will now not try to gather TLSVersion and TLSCipher from a
client that is still in TLS handshake.

Resolves #600
@derekcollison
Copy link
Member

LGTM

@coveralls
Copy link

Coverage Status

Coverage increased (+0.07%) to 91.981% when pulling 6fad293 on fix_connz_tls_handshake into 92c4481 on master.

@kozlovic kozlovic merged commit cde2aa6 into master Nov 17, 2017
@kozlovic kozlovic deleted the fix_connz_tls_handshake branch November 17, 2017 19:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants