Status Update
Comments
fa...@google.com <fa...@google.com> #2
Branch: androidx-main
commit b6c7c78f9e7476b468dafe9d5f7dec6794d47f09
Author: Shahd AbuDaghash <shahddaghash@google.com>
Date: Mon Nov 27 11:16:51 2023
Introduce DecayAnimation in AnchoredDraggable
Decay animation allows more realistic settling of a component. This is performed by now passing a `DecayAnimationSpec` parameter to AnchoredDraggable and using it when animating to the target. The new animation implementation will be added in a chain CL.
Bug: 288084801
Test: Tests will be added in a chain CL
Relnote: This change adds a `decayAnimationSpec` parameter to AnchoredDraggable allowing to use decay animation when settling to one of the anchors. The change also includes renaming the existing `animationSpec` to `snapAnimationSpec` to help understanding the use case of each spec.
Change-Id: I44ccd408d919328fd6504d31d8db59cf1d07de43
M compose/foundation/foundation/api/current.txt
M compose/foundation/foundation/api/restricted_current.txt
M compose/foundation/foundation/samples/src/main/java/androidx/compose/foundation/samples/AnchoredDraggableSample.kt
M compose/foundation/foundation/src/androidInstrumentedTest/kotlin/androidx/compose/foundation/anchoredDraggable/AnchoredDraggableGestureTest.kt
M compose/foundation/foundation/src/androidInstrumentedTest/kotlin/androidx/compose/foundation/anchoredDraggable/AnchoredDraggableStateTest.kt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/AnchoredDraggable.kt
as...@gmail.com <as...@gmail.com> #3
Branch: androidx-main
commit 365993d1a90c27704b71f6bee042a1749314a4b1
Author: Shahd AbuDaghash <shahddaghash@google.com>
Date: Tue Nov 28 10:49:56 2023
Add tests for Animation in AnchoredDraggable
Added tests to check for different settling behaviors.
Bug: 288084801
Test: Added tests to verify behavior.
Change-Id: I369b30c69f7c29f676ae0671fef25c38ff3c74cb
M compose/foundation/foundation/src/androidInstrumentedTest/kotlin/androidx/compose/foundation/anchoredDraggable/AnchoredDraggableStateTest.kt
ry...@launchbadge.com <ry...@launchbadge.com> #4
Branch: androidx-main
commit ff1a600df5f4d8ae21a75d8e3e0f24d6c5c2faee
Author: Shahd AbuDaghash <shahddaghash@google.com>
Date: Mon Nov 27 15:51:12 2023
Modify settle function to perform decay animation if possible
When settling, a check will be performed to see if natural decay animation can be used. If not so, a target animation will be used. The consumed velocity is returned to the settle function, which could be used to show an overscroll effect.
Bug: 288084801
Test: Tests will be added in a chain CL.
Relnote: This change introduces a new `animateToWithDecay` function that naturally decays if possible. It takes the target value and the initial velocity. The `animateTo` functions no longer takes a velocity, but passes the available velocity in `lastVelocity` to animation, as it is concerned with reaching the target. If users need to pass a certain velocity for animation, they can use `animateToWithDecay` function.
Change-Id: I465dbd826e3969b784d08c65425f4bbda3de8493
M compose/foundation/foundation/api/current.txt
M compose/foundation/foundation/api/restricted_current.txt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/AnchoredDraggable.kt
[Deleted User] <[Deleted User]> #5
Branch: androidx-main
commit 01142ddd5b14eb33e5145c4e72e6619a5c100fe4
Author: Shahd AbuDaghash <shahddaghash@google.com>
Date: Thu Dec 21 12:34:00 2023
Introduce Overscroll in AnchoredDraggable
Adding overscroll support to AnchoredDraggable by giving the ability to pass a customized overscrollEffect object to AnchoredDraggable.
Bug: 288084801
Relnote: An OverscrollEffect has been introduced to allow for custom overscroll effects in anchoredDraggable. To retrieve the consumed velocity after animation, the consumed velocity is returned from the settle function.
Test: Added tests to verify behavior
Change-Id: I100683fe7473b1e5ff317ab22245a2b0a25bd549
M compose/foundation/foundation/api/current.txt
M compose/foundation/foundation/api/restricted_current.txt
M compose/foundation/foundation/integration-tests/foundation-demos/src/main/java/androidx/compose/foundation/demos/AnchoredDraggableDemo.kt
M compose/foundation/foundation/samples/src/main/java/androidx/compose/foundation/samples/AnchoredDraggableSample.kt
A compose/foundation/foundation/src/androidInstrumentedTest/kotlin/androidx/compose/foundation/anchoredDraggable/AnchoredDraggableOverscrollTest.kt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/AnchoredDraggable.kt
[Deleted User] <[Deleted User]> #6
Branch: androidx-main
commit 0f071d797bccf7eff2a23e408928ca76640af782
Author: Shahd AbuDaghash <shahddaghash@google.com>
Date: Wed Nov 29 18:34:09 2023
Migrates AnchoredDraggable to Modifier.Node
Migrates AnchoredDraggable to Modifier.Node. This helps in adding Overscroll effect in AnchoredDraggable.
Bug: 288084801
Test: Added tests to verify behavior
Change-Id: I3f3338cd71763972c4b70f2e06c97e85285b0035
M compose/foundation/foundation/src/androidInstrumentedTest/kotlin/androidx/compose/foundation/anchoredDraggable/AnchoredDraggableGestureTest.kt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/AnchoredDraggable.kt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/Draggable.kt
M compose/foundation/foundation/src/commonMain/kotlin/androidx/compose/foundation/gestures/Draggable2D.kt
[Deleted User] <[Deleted User]> #7
This issue is marked as fixed, but there is still no replacement for ResistanceConfig
.
How should we properly migrate it?
na...@gmail.com <na...@gmail.com> #8
Can we document this / update the migration guide?
ym...@gmail.com <ym...@gmail.com> #9
gl...@googlemail.com <gl...@googlemail.com> #10
ry...@launchbadge.com <ry...@launchbadge.com> #11
if ($http_x_forwarded_proto = "http") {
return 301 https://$host$request_uri;
}
[Deleted User] <[Deleted User]> #12
[Deleted User] <[Deleted User]> #13
to...@gmail.com <to...@gmail.com> #14
could someone provide what the frontend -> lb -> backend setup looks like to support the listed work around?
ga...@gmail.com <ga...@gmail.com> #15
ga...@gmail.com <ga...@gmail.com> #16
# allow for healthcheck to occur
RewriteCond %{REQUEST_URI} !^/healthcheck.html
# redirect http to https
RewriteCond %{HTTP:X-Forwarded-Proto} !https [OR]
# redirect www to non www (if you want)
RewriteCond %{HTTP_HOST} ^www\.(.*)$ [NC]
RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L]
[Deleted User] <[Deleted User]> #17
da...@gmail.com <da...@gmail.com> #18
# allow the google healthcheck
RewriteCond %{HTTP_USER_AGENT} !(^GoogleHC) [OR]
RewriteCond %{REQUEST_URI} !^/healthcheck.html
# redirect to https
RewriteCond %{HTTP:X-Forwarded-Proto} !https
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]
[Deleted User] <[Deleted User]> #20
My domain
When I setup a load balancer (either TCP or http(s)), when I choose which ports to put on my front end, I can only pick one port at time, and then that front end gets its own IP address (autogenerated, can't edit it), so like this:
FrontEnd1: https
FrontEnd2: http:
Ok, so now what do I put in cloud DNS? Which IP do I assign to
I think I'm missing something really obvious -- this is so common.
[Deleted User] <[Deleted User]> #22
ml...@nocturnal.org <ml...@nocturnal.org> #23
fa...@google.com <fa...@google.com>
sw...@bainbridgehealth.com <sw...@bainbridgehealth.com> #24
Thanks and godspeed to whomever this was assigned to on 2017-04-24.
ar...@quadminds.com <ar...@quadminds.com> #25
ja...@marketdojo.com <ja...@marketdojo.com> #26
ib...@gmail.com <ib...@gmail.com> #27
Just in case the number of reports makes a difference - this would be exceedingly useful for us as well, in using the LB for SSL termination. Please consider adding this capability.
ch...@contentpass.de <ch...@contentpass.de> #28
It would be really great to get a status update on this issue.
ad...@gmail.com <ad...@gmail.com> #29
My backendservice is running https(nginx) as all the requests to port 80 are redirected to 443 but it just doesn't work with LB. Removing LB out of the picture everything works fine, directly accessing my server. However, I wanted to have LB to use the instance group autoscale. So, I may have to created a micro instance with ngnix to just do the LB there.. ouch.
na...@qinterra.com <na...@qinterra.com> #30
Especially with Google's recent push for a secure web, this would be exceedingly useful for SSL termination and HTTP->HTTPS redirection.
While you could theoretically do this app-side, it would further reduce the load on the servers and handle it "at the gate" so to speak.
As it is, this is a severe limitation of using the LB-as-a-service feature.
We brought this up to a Google rep and he had the following to say: "there is no firm plan/timeline for this feature being implemented. However, they (the LB team) will be revisiting prioritization of new features soon during Q3 planning."
If you find this important let your voice be heard!
XX...@vida.com <XX...@vida.com> #31
It is sad to see that it has been 1.5 years since this issue is filed. I have a django 1.11 based web site and I followed the GKE docs and deployed the django app on container engine cluster. I need a load balancer with SSL termination and I want to allow only HTTPS traffic so I need the HTTPS redirect. Static files are on GCS so I didn't deploy another web server, using gunicorn. I had mixed success setting the redirect in Django. Currently when I only set SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https'), on staging cluster somehow the redirect works so I assume the load balancer is handling that, but on production cluster which has the same configs, it does not work.
I followed the instructions at
le...@gipaa.nl <le...@gipaa.nl> #32
ma...@gmail.com <ma...@gmail.com> #33
gi...@gmail.com <gi...@gmail.com> #34
[Deleted User] <[Deleted User]> #35
if ($http_x_forwarded_proto = "http") {
return 301 https://$host$request_uri;
}
But I got weird thing, my https website showed default nginx test page in /usr/share/nginx/html
Even though, I setup listen 443 to document root /var/www/html in nginx.conf
Any help appreciated
Thanks
er...@qinterra.com <er...@qinterra.com> #36
Our team's perspective is that a redirect happening at the Load Balancer level is ideal. We would love to see the feature implemented, as it would save us a lot of effort in configuring redirects either at the web server or application layer.
Thanks,
- Eric Geiger
re...@renaudguerin.net <re...@renaudguerin.net> #37
My use case for selective redirection is the Let's Encrypt ACME protocol for issuing/renewing TLS certificates automatically. It does require http enabled on a subpath of the domain, to verify ownership before issuing a certificate for it.
ma...@gmail.com <ma...@gmail.com> #38
how we are using it. Works great.
On Fri, Jul 7, 2017 at 07:04 <buganizer-system@google.com> wrote:
dc...@gmail.com <dc...@gmail.com> #39
sk...@gmail.com <sk...@gmail.com> #40
[Deleted User] <[Deleted User]> #41
je...@klinedrive.com <je...@klinedrive.com> #42
ma...@mojro.com <ma...@mojro.com> #43
th...@gmail.com <th...@gmail.com> #44
jo...@gmail.com <jo...@gmail.com> #45
ad...@gmail.com <ad...@gmail.com> #46
it...@gmail.com <it...@gmail.com> #47
Aa...@gtempaccount.com <Aa...@gtempaccount.com> #48
je...@gmail.com <je...@gmail.com> #49
ri...@gmail.com <ri...@gmail.com> #50
sa...@gmail.com <sa...@gmail.com> #51
[Deleted User] <[Deleted User]> #52
[Deleted User] <[Deleted User]> #53
ta...@gmail.com <ta...@gmail.com> #54
ma...@gmail.com <ma...@gmail.com> #55
jo...@gmail.com <jo...@gmail.com> #56
[Deleted User] <[Deleted User]> #57
re...@gmail.com <re...@gmail.com> #58
thank you.
[Deleted User] <[Deleted User]> #59
so...@gmail.com <so...@gmail.com> #60
pz...@gmail.com <pz...@gmail.com> #61
Then the redirect should work correctly.
je...@gmail.com <je...@gmail.com> #62
lm...@computas.com <lm...@computas.com> #63
* Creating a single http backend
* Creating an http frontend and an https frontend attached to the same static IP
* A VirtualHost configuration along the lines of:
<VirtualHost *:80>
ServerName my.app.domain
<If "%{HTTP:X-Forwarded-Proto} -strcmatch 'http'">
Redirect /
</If>
ProxyRequest Off
ProxyPass / ...
ProxyPassReverse / ...
...
</VirtualHost>
[Deleted User] <[Deleted User]> #64
I am also facing same problem.
How to auto redirect http to https on apache tomcat and my ssl configured on top of load balancing.
can any one guide me.
thanks
srikanta
ga...@baatch.com <ga...@baatch.com> #65
We need this for a bucket backend, to redirect all http requests to https requests.
[Deleted User] <[Deleted User]> #66
[Deleted User] <[Deleted User]> #67
da...@gmail.com <da...@gmail.com> #68
ni...@gmail.com <ni...@gmail.com> #69
ro...@gmail.com <ro...@gmail.com> #70
[Deleted User] <[Deleted User]> #71
fi...@gmail.com <fi...@gmail.com> #72
[Deleted User] <[Deleted User]> #73
ts...@google.com <ts...@google.com> #74
ts...@google.com <ts...@google.com> #75
ga...@google.com <ga...@google.com> #76
Can I please get any update on this feature request? Since I have a customer at the moment who is asking for it and he's considering on changing to another provider just because of this.
I'd appreciate any type of update or news about it.
Thanks in advance.
se...@google.com <se...@google.com> #77
hv...@google.com <hv...@google.com> #78
jo...@google.com <jo...@google.com> #79
I had a customer ask about this today. Is there any update we can provide them?
Thanks,
Jose
cr...@google.com <cr...@google.com> #80
Thanks for any updates.
jc...@google.com <jc...@google.com> #81
ha...@google.com <ha...@google.com> #82
Kind regards,
ju...@google.com <ju...@google.com> #83
Thanks,
JW
he...@google.com <he...@google.com> #84
ad...@google.com <ad...@google.com> #85
st...@google.com <st...@google.com> #86
ja...@google.com <ja...@google.com> #87
we...@google.com <we...@google.com> #88
ey...@google.com <ey...@google.com> #89
Thanks
dp...@google.com <dp...@google.com> #90
jo...@google.com <jo...@google.com> #91
I have a customer who is interested in getting one of their projects whitelisted for the HTTP->HTTPS redirect alpha. Are we able to sign up customers today? If so, can you let me know the next step?
Thanks,
Jose
dp...@google.com <dp...@google.com> #92
Hi Jose, We discovered an edge case issue at the last minute that we needed to fix. Unfortunately that will push our Alpha date out a number of weeks. Please work with bseal@ to coordinate Alpha steps for your customer.
bs...@google.com <bs...@google.com> #93
We have an Alpha available for HTTP(S) Load Balancing URL Rewrites and Redirects. All Alpha terms apply. You need to be white-listed for the alpha. Please contact your Sales Representative or Account Team for more information.
We are proactively working on collecting feedback for the Alpha and will then open it up for public use without any white-listing.
Thank you
yt...@google.com <yt...@google.com> #94
bs...@google.com <bs...@google.com> #95
HTTP(S) Load Balancing Rewrites and Redirects support is now in General Availability.
Here are the related documentation links :
Thank you for your engagement. Please reach out if you have questions.
mi...@google.com <mi...@google.com> #96
I'm wondering if there's a way to codify the HTTP to HTTPS redirection for GKE Ingress?
ja...@google.com <ja...@google.com> #97
dp...@google.com <dp...@google.com>
jo...@google.com <jo...@google.com> #98
I'm wondering too if there's any way to do that redirection with GKE Ingress.
A customer of mine wants to use it via GKE Ingress and is having some issues.
Thanks!
bs...@google.com <bs...@google.com> #99
Hi - we are engaging with the GKE team on this integration. We will share more updates on the plan forward as soon as it is ready.
sh...@google.com <sh...@google.com> #100
ce...@google.com <ce...@google.com> #101
Hello Team!
Are there any news regarding this feature within GKE (Specifically ASM) ?
I've got a customer that's also looking forward to this feature implementation, I hope the issue hasn't become stale.
Best regards!
ce...@google.com <ce...@google.com> #102
Nevermind, I just found this thanks to Blaž, adding it here for further visibility:
GKE supports HTTP-to-HTTPS redirect using FrontendConfig:
This is mentioned in Feature comparison as well:
Description
I want all requests to http://* to go to https://*.
I originally opened a question on serverfault:
Please let me know if I'm just daft and there is a way to do this in the configuration of the load balancer.