-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't respect HTTP_PROXY env in k8 forwarder #11257
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@smallinsky This definitely needs test coverage, I can imagine this can easily regress again.
Added UT regression. |
8da79e9
to
5f6f8b6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All good on my side. But I personally would have preferred to see this part of the kube h2 integration tests. You know to be less reliant on mocks or testing edge cases, but more along the lines of testing different setups clients might have as weird as they can get.
PR #11257 disabled support of `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environement flags for Kubernetes Access. The desired behavior was expected to be respected only by the Kubernetes Proxy and Kubernetes Legacy Proxy when dialing over reverse tunnel but ended up applied to all outbound connections from Kube Access flow. This PR enables support for proxy env's when dialing directly to the Kubernetes Cluster - `kubernetes_service` and `legacy_proxy` when the cluster is local. Fixes #30550 Signed-off-by: Tiago Silva <[email protected]>
* Respect `[HTTP(S)|NO]_PROXY` envs when dialing directly to Kube PR #11257 disabled support of `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environement flags for Kubernetes Access. The desired behavior was expected to be respected only by the Kubernetes Proxy and Kubernetes Legacy Proxy when dialing over reverse tunnel but ended up applied to all outbound connections from Kube Access flow. This PR enables support for proxy env's when dialing directly to the Kubernetes Cluster - `kubernetes_service` and `legacy_proxy` when the cluster is local. Fixes #30550 Signed-off-by: Tiago Silva <[email protected]> * fix func name * fix comment --------- Signed-off-by: Tiago Silva <[email protected]>
* Respect `[HTTP(S)|NO]_PROXY` envs when dialing directly to Kube PR #11257 disabled support of `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environement flags for Kubernetes Access. The desired behavior was expected to be respected only by the Kubernetes Proxy and Kubernetes Legacy Proxy when dialing over reverse tunnel but ended up applied to all outbound connections from Kube Access flow. This PR enables support for proxy env's when dialing directly to the Kubernetes Cluster - `kubernetes_service` and `legacy_proxy` when the cluster is local. Fixes #30550 Signed-off-by: Tiago Silva <[email protected]> * fix func name * fix comment --------- Signed-off-by: Tiago Silva <[email protected]>
…) (#30615) * Respect `[HTTP(S)|NO]_PROXY` envs when dialing directly to Kube PR #11257 disabled support of `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environement flags for Kubernetes Access. The desired behavior was expected to be respected only by the Kubernetes Proxy and Kubernetes Legacy Proxy when dialing over reverse tunnel but ended up applied to all outbound connections from Kube Access flow. This PR enables support for proxy env's when dialing directly to the Kubernetes Cluster - `kubernetes_service` and `legacy_proxy` when the cluster is local. Fixes #30550 * fix func name * fix comment --------- Signed-off-by: Tiago Silva <[email protected]>
What
Kube proxy service should not respect HTTP_PROXY env variable and dial kube agent directly.
How
Replace
apimachinery
transport with standardx/net/http2
package where HTTP_PROXY envs are not respected.