Show Got "Bad Request This combination of host and port requires TLS" when access the link to CA WA ESP REST APIcalendar_today Updated On:ProductsESP Workload Automation Issue/IntroductionWe have started with ESP REST API STC with TLS configured. When access it thru web browser with HTTPS, we got error: CauseThere are two possible causes: EnvironmentRelease : 12.0 Component : CA ESP WORKLOAD AUTOMATION ResolutionSolutions: #2 Check if AT-TLS is set on MVS system; if yes, then the ESP REST API port should be excluded. Feedbackthumb_up Yes thumb_down No You are hereProblem Description:If you are trying to log into TIBCO JasperReports® Server via SSL and you believe you have configured the connector port in Tomcat correctly, but you are getting this error from any browser. Bad Request This combination of host and port requires TLS Solution:Check your URL. Most likely you have left out the s in https. For example, http://localhost:8443/jasperserver-pro/login.html Correct URL is: https://localhost:8443/jasperserver-pro/login.html
Describe
the bug
And the related application.properties
Sample
-1 I am using Cloud SQL as well so I need the
So I thought I should just enable SSL in my spring boot application and send redirects for every http request to https manually(not though app engine)(also tried removing handlers but that was another strange behaviour)(I think of removing the self-managed certs at all from app engine and also disabling google managed certs and then enable my https server but that also doesn't seem to be possible as i can't disable both at the same
time). I believe App Engine basically assumes that your application is accessible via HTTP, and App Engine adds a layer of security with SSL that you can customize. In any case, this seems more like a question about App Engine rather than Spring or this project in particular. @meltsufin So just for you I debugged it further and here I have enough evidence to say that this is a Where as the same log on an spring-gcp application gives this:Dif:
Similarity: Expected: You may just be observing differences between App Engine Java 11 and Java 8 in how they propagate HTTP scheme attribute to
See: https://cloud.google.com/appengine/docs/standard/java11/application-security If you read my issue you will see exactly these 5 lines already in my code.
Anyways, as you said I tested it again and you are right, the issue is with the propagation, in app engine java 11 runtime the scheme is always It looks like a bug to me. If anything, it's at least a documentation bug, since I don't see this difference mentioned anywhere in the App Engine Java 8 and 11 runtimes docs. Yeah
this seems to me too as I have messed a whole day to find/fix this small requisite with no success and spent more time testing alternatives. What made me think that its rather a I have filed a bug on the link you given to issuetacker. I guess you can finally close it now. @Guneetgstar This is a great example of a very valuable community contribution! Hopefully, others will find this thread when they encounter the same problem before it's fixed, and won't have to spend time on it like you did. Thanks again! What does requires TLS mean?Transport Layer Security (TLS) is a security protocol that encrypts email for privacy. TLS prevents unauthorized access of your email when it's in transit over internet connections.
Does HTTP support TLS?The only difference between the two protocols is that HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses, and to digitally sign those requests and responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has http:// in its URL, while a website that uses HTTPS has https://.
How does HTTP over TLS work?An SSL or TLS certificate works by storing your randomly generated keys (public and private) in your server. The public key is verified with the client and the private key used in the decryption process. HTTP is just a protocol, but when paired with TLS or transport layer security it becomes encrypted.
|