-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support dumping of crypto keys to an nss formated key log file #1043
Comments
As mentioned in a previous PR, it requires to add a new option in RuntimeOptions struct. This allows to skip it from the archive's generation and to not generate unexpected cloud (or from archive) executions. The option should be a
|
Hey @codebien ! I would like to take this up, is that possible? |
Hey @chtnnh, sure! Let us know if you have any questions. |
Awesome, thank you! Let me go through the code and your comment earlier and ask you whatever questions I come up with!! |
Hey @codebien, so I figured out where I need to add the CLI options (Options and RuntimeOptions) What I'm confused about is where I need to add the functionality to dump the crypto keys and read the environment variable in case the flag is not provided. Sorry if this is naïve :/ |
Hi @chtnnh,
This feature requires a set of the Lines 195 to 203 in a66aa58
Here is an example of how to consolidate a runtime option from an env var: Lines 127 to 131 in a66aa58
|
NSS key log files are more or less the only correct way that I have found to debug real HTTPS traffic. Given that HTTP2 is requiring TLS for all browsers (atm) I would guess practically 100% of the traffic generated by k6 is HTTPS one.
Golang does support it since 1.8, a thing that I just now realised as I have previously looked at the original issue.
This will require a some way of specifying a file to dump to ... I propose that we add a cli flag and env variable and name it as Firefox this, but with k6 in front -
K6_SSLKEYLOGFILE
.Arguably this is more involved than the
http-debug
but also has the benefits of using wireshark to debug web traffic which IMO is the more powerful option, and I would guess a familiar one for people who have needed it.This also ... automatically negates any shortcomings of the golang stdlib on reporting what it actually sends (#774 #986 #1042) and just looks at the actual data send through the wire.
The text was updated successfully, but these errors were encountered: