-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tsh proxy ssh
does not respect HTTP_PROXY
#17567
Comments
Potentially useful: #10209 Things to review
|
Customer reported issue running v9.3.18. Customer specifically complained about issue when using the generated |
tbot
does not respect HTTP_PROXY
tsh proxy ssh
does not respect HTTP_PROXY
func dialSSHProxy(ctx context.Context, tc *libclient.TeleportClient, sp sshProxyParams) (net.Conn, error) {
remoteProxyAddr := net.JoinHostPort(sp.proxyHost, sp.proxyPort)
if !sp.tlsRouting {
conn, err := (&net.Dialer{}).DialContext(ctx, "tcp", remoteProxyAddr)
if err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
}
pool, err := tc.LocalAgent().ClientCertPool(sp.clusterName)
if err != nil {
return nil, trace.Wrap(err)
}
tlsConfig := &tls.Config{
RootCAs: pool,
NextProtos: []string{string(alpncommon.ProtocolProxySSH)},
InsecureSkipVerify: tc.InsecureSkipVerify,
ServerName: sp.proxyHost,
}
conn, err := (&tls.Dialer{Config: tlsConfig}).DialContext(ctx, "tcp", remoteProxyAddr)
if err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
} Both dialers here need to use a HTTP Proxy dialer if one has been configured in the environment. As Machine ID |
Customer has reported that
tbot
does not respectHTTP_PROXY
when making connections.The text was updated successfully, but these errors were encountered: