Brad Fitzpatrick 4c52546033 all: update golang.org/x/crypto to v0.0.0-20200622213623-75b288015ac9 4 years ago
..
.gitignore d19327ad09 http2/h2demo: enable HTTP ACME challenges, move from CoreOS to Kubernetes 6 years ago
Dockerfile c00fd9afed http2/h2demo: deploy with Go 1.13 5 years ago
Makefile a4d6f7fead http2/h2demo: stop using gitlock, use Go modules 5 years ago
README 72f9393749 http2/h2demo: update README 5 years ago
deployment-prod.yaml d19327ad09 http2/h2demo: enable HTTP ACME challenges, move from CoreOS to Kubernetes 6 years ago
go.mod 4c52546033 all: update golang.org/x/crypto to v0.0.0-20200622213623-75b288015ac9 4 years ago
go.sum 4c52546033 all: update golang.org/x/crypto to v0.0.0-20200622213623-75b288015ac9 4 years ago
h2demo.go 118fecf932 http2/h2demo: update gopher image URL 4 years ago
rootCA.key 17e723d022 http2: move github.com/bradfitz/http2 down into a new http2 directory 9 years ago
rootCA.pem 17e723d022 http2: move github.com/bradfitz/http2 down into a new http2 directory 9 years ago
rootCA.srl 17e723d022 http2: move github.com/bradfitz/http2 down into a new http2 directory 9 years ago
server.crt 17e723d022 http2: move github.com/bradfitz/http2 down into a new http2 directory 9 years ago
server.key 17e723d022 http2: move github.com/bradfitz/http2 down into a new http2 directory 9 years ago
service.yaml 07e8617a6d http2/h2demo: set externalTrafficPolicy to preserve client IPs 6 years ago
tmpl.go a8b05e9114 http2/h2demo: remove h2demo build constraint 5 years ago

README

This is a demo webserver that shows off Go's HTTP/2 support.

It runs at https://http2.golang.org/ so people can hit our
implementation with their HTTP/2 clients, etc. We intentionally do not
run it behind any other HTTP implementation so clients (including
people demonstrating attacks, etc) can hit our server directly. It
just runs behind a TCP load balancer.

When running locally, you'll need to click through TLS cert warnings.
The dev cert was initially made like:

Make CA:
$ openssl genrsa -out rootCA.key 2048
$ openssl req -x509 -new -nodes -key rootCA.key -days 1024 -out rootCA.pem

Make cert:
$ openssl genrsa -out server.key 2048
$ openssl req -new -key server.key -out server.csr
$ openssl x509 -req -in server.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out server.crt -days 500