diff --git a/.github/actions/deploy/backend/action.yml b/.github/actions/deploy/backend/action.yml index 8847c780..8b798e8a 100644 --- a/.github/actions/deploy/backend/action.yml +++ b/.github/actions/deploy/backend/action.yml @@ -32,44 +32,8 @@ runs: - name: Deploy to my EC2 instance uses: easingthemes/ssh-deploy@v5.1.0 -# env: -# SSH_PRIVATE_KEY: ${{ inputs.aws_ec2_private_key }} -# SOURCE: "./app" -# REMOTE_HOST: "ec2-34-213-48-149.us-west-2.compute.amazonaws.com" -# REMOTE_USER: "ec2-user" -# TARGET: "/" with: REMOTE_HOST: 'ec2-52-56-62-119.eu-west-2.compute.amazonaws.com' REMOTE_USER: 'ec2-user' SSH_PRIVATE_KEY: ${{ inputs.aws_ec2_private_key }} SOURCE: 'go/bin/' - -# - name: Deploy to S3 -# working-directory: ./go -# shell: bash -# env: -# AWS_ACCESS_KEY_ID: ${{ inputs.aws_access_key_id }} -# AWS_SECRET_ACCESS_KEY: ${{ inputs.aws_secret_access_key }} -# AWS_REGION: ${{ inputs.aws_region }} -# AWS_BUCKET_NAME: ${{ inputs.aws_bucket_name }} -# run: | -# # Sync the build folder to the S3 bucket -# aws s3 cp ./bin.zip s3://getstronger-binaries - -# - name: Deploy to EC2 -# shell: bash -# env: -# EC2_HOST: "ip-172-31-36-227.eu-west-2.compute.internal" -# run: | -# chmod 600 ~/.ssh/id_rsa -# scp -o StrictHostKeyChecking=no -i ~/.ssh/id_rsa ./app ec2-user@$EC2_HOST:~/app -# ssh -o StrictHostKeyChecking=no -i ~/.ssh/id_rsa ec2-user@$EC2_HOST << EOF -# pkill app || true -# nohup ./app & -# EOF -# -# # Set up SSH for the EC2 connection -# - name: Add SSH Key -# uses: webfactory/ssh-agent@v0.5.3 -# with: -# ssh-private-key: ${{ inputs.AWS_EC2_PRIVATE_KEY }} \ No newline at end of file diff --git a/go/rpc/module.go b/go/rpc/module.go index a8a7e953..a0dbbeb5 100644 --- a/go/rpc/module.go +++ b/go/rpc/module.go @@ -87,9 +87,12 @@ func registerHandlers(lc fx.Lifecycle, handlers []Handler, options []connect.Han lc.Append(fx.Hook{ OnStart: func(_ context.Context) error { go func() { - if err := http.ListenAndServeTLS(":1234", certFile, keyFile, h2c.NewHandler(mux, &http2.Server{})); err != nil { + if err := http.ListenAndServe(":1234", h2c.NewHandler(mux, &http2.Server{})); err != nil { panic(err) } + //if err := http.ListenAndServeTLS(":1234", certFile, keyFile, h2c.NewHandler(mux, &http2.Server{})); err != nil { + // panic(err) + //} }() return nil },