Closed alexbrand closed 9 months ago
I'm not one hundred percent sure, but I believe that the HTTPProxy routing insecure traffic to port 80 when passthrough: true
is set was there at a customer request - to allow basically the same function as the insecure redirect does when terminating TLS.
I agree that a HTTPProxy with passthrough: true
should have a tcpproxy
block, or should be invalid.
The Contour project currently lacks enough contributors to adequately respond to all Issues.
This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack
The Contour project currently lacks enough contributors to adequately respond to all Issues.
This bot triages Issues according to the following rules:
You can:
Please send feedback to the #contour channel in the Kubernetes Slack
What steps did you take and what happened:
TL;DR: HTTPS routing to an HTTPProxy with
routes
stops working whenvirtualhost.tls.passthrough: true
Created the following HTTPProxy resource:
Validated that the service is reachable
Flip the passthrough flag to
true
in the HTTPProxyThe service is no longer reachable over HTTPS:
The service is available without TLS, however:
What did you expect to happen:
Based on prior conversations with @stevesloka, it seems like this HTTPProxy should be deemed invalid as there are is
tcpproxy
block.With that said, it seems like there might be another issue where the TLS configuration is not being applied properly in this scenario.
Anything else you would like to add: [Miscellaneous information that will assist in solving the issue.]
Environment:
docker.io/projectcontour/contour:v1.6.1
kubectl version
):