GRPC Core
43.0.0
|
A1-http-connect-proxy-support.md proposed how gRPC supports TCP-level proxies via the HTTP CONNECT request, defined in RFC-2817.
This guide documents gRPC C-Core's default proxy mapper implementation.
Case 1 in the proposal documents a use-case where all outbound traffic from an environment must go through a proxy. Configurations for such environments are usually performed using environment variables such as http_proxy
. gRPC supports this by providing a default proxy mapper implementation that allows for overriding the server name (provided in the channel creation hostname) to resolve based on such configurations.
C-Core checks the following places to determine the HTTP proxy to use, stopping at the first one that is set:
GRPC_ARG_HTTP_PROXY
channel arggrpc_proxy
environment variablehttps_proxy
environment variablehttp_proxy
environment variableIf none of the above are set, then no HTTP proxy will be used.
The allowed format is an RFC3986 URI string where the scheme is expected to be "http" and the authority portion is used to determine the proxy to be used. For example, for an HTTP proxy setting of http://username:password@proxy.google.com:443
, username:password
would be used as user credentials for proxy authentication as per RFC7617 and proxy.google.com:443
would be the host:port HTTP proxy target. If the port part of the authority is omitted, a default port of 443 is used. Note that user credential can also be omitted if the proxy does not need authentication.
If an HTTP proxy is set, C-Core then checks the following places to exclude traffic destined to listed hosts from going through the proxy determined above, again stopping at the first one that is set:
no_grpc_proxy
environment variableno_proxy
environment variableIf none of the above are set, then the previously found HTTP proxy is used.
The format takes a comma-separated list of names, and if any of these names matches as a suffix of the server host (provided in the channel target), then the proxy will not be used for that target. For example, with a grpc_proxy
setting of proxy.google.com
and a no_grpc_proxy
setting of example.com, google.com
, channel targets such as dns:///foo.google.com:50051
and bar.example.com:1234
will not use the proxy, but baz.googleapis.com:443
would still use the configured proxy proxy.google.com
.
As of PR#31119, CIDR blocks are also supported in the list of names. For example, a no_proxy
setting of 10.10.0.0/24
would not use the proxy for channel targets that mention IP addresses as the host between the range 10.10.0.0
to 10.10.0.255
.
The lookup and subsequent usage of an HTTP proxy for a specific channel can also be disabled by setting the channel arg GRPC_ARG_ENABLE_HTTP_PROXY
to 0.
Case 2 in the proposal documents a partially protected environment, where access to certain addresses must go through a proxy. Name resolution of protected servers works normally, and the proxy allows the CONNECT request to use an IP address instead of a hostname.
Only requests for certain hosts must go through the proxy. Requests to other servers work without the proxy. Custom logic is used to determine which hosts the proxy will be used for.
To use the address proxy, both of the following parameters need to be specified:
GRPC_ARG_ADDRESS_HTTP_PROXY
channel argument or GRPC_ADDRESS_HTTP_PROXY
environment variable. Value of the channel argument is preferred if both values are specified.GRPC_ARG_ADDRESS_HTTP_PROXY_ENABLED_ADDRESSES
channel argument or GRPC_ADDRESS_HTTP_PROXY_ENABLED_ADDRESSES
environment variable. Value of the channel argument is preferred if both values are specified.