-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redis error: Pool initialized with SSL but connection requested plain socket #41548
Comments
/cc @Ladicek (redis), @cescoffier (redis), @machi1990 (redis) |
Anything configured under quarkus.tls? |
Thanks for the quick response. We haven't anything configured under quarkus.tls. I tried also with
although I think it's the default value |
Sorry, I just saw we have
Could it be a problem? |
In fact, after removing that configuration, it works again. Is this something expected? |
Not expected, sounds like a bug, but @cescoffier can provide more details |
It seems to me that before 6e1489c I can open a PR if you agree @cescoffier ? |
Ok, it's a bug. We need to be a bit more specific. First TLS for redis is not enabled by default. Only if the host is rediss://. Trust-all should not enable tls, if the scheme is not rediss://. |
Thanks for the quick response |
Previously, if `quarkus.tls.trust-all` was set, the Redis client would automatically use TLS. This commit ensures that TLS is only enabled when the host scheme is rediss://, aligning the behavior with expected usage patterns. Fix quarkusio#41548
Previously, if `quarkus.tls.trust-all` was set, the Redis client would automatically use TLS. This commit ensures that TLS is only enabled when the host scheme is rediss://, aligning the behavior with expected usage patterns. Fix quarkusio#41548 (cherry picked from commit 0fdf12c)
Previously, if `quarkus.tls.trust-all` was set, the Redis client would automatically use TLS. This commit ensures that TLS is only enabled when the host scheme is rediss://, aligning the behavior with expected usage patterns. Fix quarkusio#41548
Previously, if `quarkus.tls.trust-all` was set, the Redis client would automatically use TLS. This commit ensures that TLS is only enabled when the host scheme is rediss://, aligning the behavior with expected usage patterns. Fix quarkusio#41548
Describe the bug
Hello quarkus team!
We have an application configured for accessing a local Redis. The configuration is simple:
It works well when using Quarkus 3.11.3. However, it has started to fail after updating to the newer 3.12.0. Now we have this error:
Looking at the release notes, I see "Implementation of the internal TLS Registry". Could it be related? Indeed something has changed in this version.
Thanks in advance!
Expected behavior
No response
Actual behavior
No response
How to Reproduce?
No response
Output of
uname -a
orver
No response
Output of
java -version
No response
Quarkus version or git rev
No response
Build tool (ie. output of
mvnw --version
orgradlew --version
)No response
Additional information
No response
The text was updated successfully, but these errors were encountered: