quic: fixing hostname consistency#20436
Conversation
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
|
@RyanTheOptimist opened this as draft to check CI and I'm working on merge conflicts, but if you can take a look at the test changes and lmk if you want them split into their own Pr, that'd be great. |
|
(not that they're super major, but I tend to not like mixing functional changes and large test changes, and the test changes are borderline large) |
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
RyanTheOptimist
left a comment
There was a problem hiding this comment.
I think I'd be inclined to split the test changes out into their own PR. As you say, they are quite big. But I could live with them here in this PR.
|
|
||
| Quic::QuicStatNames& quic_stat_names_; | ||
| Stats::Scope& scope_; | ||
| // The origin for this pool. |
There was a problem hiding this comment.
It might be nice to mention how this host's hostname might differ from the origin's hostname, and the semantics involved.
Upcoming #20436 fixes QUIC to use auto_sni when it's configured. The Envoy integration tests use auto_sni by default, but this causes problems for HTTP/3 which validates that the sni hostname (currently "host" for most test) matches the certificate (*.lyft.com for most tests). Changing the tests independently of the fix PR per request. Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
|
@ggreenway ping? |
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
ggreenway
left a comment
There was a problem hiding this comment.
LGTM, but CI is failing
/wait
Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Upcoming envoyproxy#20436 fixes QUIC to use auto_sni when it's configured. The Envoy integration tests use auto_sni by default, but this causes problems for HTTP/3 which validates that the sni hostname (currently "host" for most test) matches the certificate (*.lyft.com for most tests). Changing the tests independently of the fix PR per request. Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Fixing hostname issues for upstream HTTP/3. Consistently using correct SNI (configured or auto) as server ID and alt-svc origin everywhere. This also unfortunately required tweaking a LOT of integration tests, as it meant the hostname for SNI was pulled from host headers (as we auto-sni by default in integrationt tests) and HTTP/3 validates that hostname against the certs (test certs are for "foo.lyft.com" but default host for request headers was "host") Risk Level: Low (uptream HTTP/3) Testing: fixed a lot of integration tests. Docs Changes: n/a Release Notes: n/a Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Fixing hostname issues for upstream HTTP/3.
Consistently using correct SNI (configured or auto) as server ID and alt-svc origin everywhere.
This also unfortunately required tweaking a LOT of integration tests, as it meant the hostname for SNI was pulled from host headers (as we auto-sni by default in integrationt tests) and HTTP/3 validates that hostname against the certs (test certs are for "foo.lyft.com" but default host for request headers was "host")
Risk Level: Low (uptream HTTP/3)
Testing: fixed a lot of integration tests.
Docs Changes: n/a
Release Notes: n/a