-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve upstream-vhost annotation to affect gRPC upstreams #7436
Comments
@apolovov: This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I think because
http://nginx.org/en/docs/http/ngx_http_grpc_module.html#grpc_set_header is
a different directive than proxy_set_header. Will check.
@***@***.*** ***@***.***> would you you want to discuss
this.
/kind feature
Thanks,
; Long
…On Thu, 5 Aug, 2021, 6:26 AM Kubernetes Prow Robot, < ***@***.***> wrote:
@apolovov <https://github.com/apolovov>: This issue is currently awaiting
triage.
If Ingress contributors determines this is a relevant issue, they will
accept it by applying the triage/accepted label and provide further
guidance.
The triage/accepted label can be added by org members by writing /triage
accepted in a comment.
Instructions for interacting with me using PR comments are available here
<https://git.k8s.io/community/contributors/guide/pull-requests.md>. If
you have questions or suggestions related to my behavior, please file an
issue against the kubernetes/test-infra
<https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:>
repository.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#7436 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABGZVWULYF2FAOCD765P2O3T3HOS5ANCNFSM5BSLT3UQ>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&utm_campaign=notification-email>
.
|
I would accept a PR for this without any problem :) Here is what to change: We have an if, verifying if the directive is {{ if not (eq $proxySetHeader "grpc_set_header") }} I don't know the implication of removing this if, and why it happens BUT the file is there :) |
@kd7lxl wdyt about this? |
#3706 (comment) describes why the current behavior was chosen. I'm not familiar with all the nuances of rfc7540, but I think the appropriate behavior for a reverse proxy with an upstream-vhost override would be to rewrite the |
So the behavior is right? |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There is nginx.ingress.kubernetes.io/upstream-vhost annotation. It works only if backend-protocol is HTTP or HTTPS. But if I use GRPC, this annotation does nothing.
The gRPC request also have vhost header (:authority) and I can set it with the snippet:
So why I can't do it with upstream-vhost annotation? It does almost the same thing (proxy_set_header instead of grpc_set_header in my example).
/kind feature
The text was updated successfully, but these errors were encountered: