-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implements missing HTTPS proxy functionality #978
Conversation
/cc @adrianosela |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this @seans3 🚀
IIUIC the same certificate is used for both the proxy and the backend, don't we need to handle the case when both are different? what happens if the proxy requires a different certificate than the backend? EDIT I see, the TLSConfig can be used for that, also @seans3 sent me this https://github.com/adrianosela/https-proxy/tree/main?tab=readme-ov-file#https-proxy |
The client is responsible for configuring the root CA certificates. The client TLS config contains a cert pool, which can contain multiple root CA certificates. So for TLS to the proxy and the upstream, the TLS config root CA cert pool must contain CA's which have signed both the proxy and the upstream. |
This PR also closes #950 |
2ab73bd
to
0b0f26a
Compare
d066f96
to
efcac3b
Compare
Thanks for the PR @seans3 , this looks good to me! |
@AlexVulaj Thanks for the prompt review. Would it be appropriate to cut the next |
probably want to merge the follow-up #982 to deflake the unit test before cutting a tag |
What type of PR is this? (check all applicable)
Description
Related Tickets & Documents
Added/updated tests?
Run verifications and test