This feature would definitely need a gRFC, see this repo 
<https://github.com/grpc/proposal>. I would suggest clarifying your ideas 
for the design a bit further, then posting them there to get feedback from 
gRPC team and from security team

On Tuesday, April 3, 2018 at 4:01:54 AM UTC-7, mira....@gmail.com wrote:
>
> We are using (runtime) interchangeable implementation of tls (read we 
> update it during runtime)
> This means we have to do some reference counting on loaded tls 
> implementation, restart long-running connection to allow update and hack 
> grpc sources to allow us to do this.
> As upstream changes are always better option can anyone suggest a best way 
> to do this ? (so I can do pull request to upstream and it would be 
> acceptable by community)
> I would like this as an option in channel properties (currently we have 
> this hacked into ssl_config structure), but channel arguments are usually 
> not passed directly into tsi but parsed and passed.
>
> WDYT ? 
>

-- 
You received this message because you are subscribed to the Google Groups 
"grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to grpc-io+unsubscr...@googlegroups.com.
To post to this group, send email to grpc-io@googlegroups.com.
Visit this group at https://groups.google.com/group/grpc-io.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/grpc-io/9e1e46e9-521c-43fa-94f3-fa36c8949f50%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to