You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Several peer discovery plugins use HTTP to communicate with their services and there is currently no clear explanation in the docs as to how to configure client TLS options (certificate, private key, verification depth, SNI target and so on) for HTTPS, which leads to questions such as rabbitmq/rabbitmq-peer-discovery-consul#14.
As the issue states, it comes down to Erlang HTTP client (httpc) configuration which supports all the same options as other TLS clients (and servers) in Erlang.
This is done for etcd (which no longer is HTTP1.1-based) but we have found out that some code changes may be necessary to make this easy for other mechanisms.
Several peer discovery plugins use HTTP to communicate with their services and there is currently no clear explanation in the docs as to how to configure client TLS options (certificate, private key, verification depth, SNI target and so on) for HTTPS, which leads to questions such as rabbitmq/rabbitmq-peer-discovery-consul#14.
Even before https://github.com/rabbitmq/rabbitmq-peer-discovery-common/issues/6 is addressed a doc example can be provided since it is possible to configure
httpc
via theadvanced.config
file.The text was updated successfully, but these errors were encountered: