Skip to content

Conversation

@stlaz
Copy link
Collaborator

@stlaz stlaz commented Nov 13, 2024

This adds an internal conn check between the proxy-endpoints and main-proxy listener.

Fixes #320

@stlaz stlaz added the sig-auth-acceptance issues created during review for sig-auth-acceptance label Nov 13, 2024
@stlaz stlaz self-assigned this Nov 14, 2024
// on a different port (--proxy-endpoints-port)
proxyEndpointsMux := http.NewServeMux()
proxyEndpointsMux.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) { _, _ = w.Write([]byte("ok")) })
proxyEndpointsMux.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the previous /healthz was completely fine. When the proxy go routine would finish, it would also cancel the health endpoint.

What you added might be worth to be used as liveness or whatever you call it. But the question is, if this makes sense or if this is just testing go std lib. Maybe we could ask @enj, if this makes sense.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am unsure of exactly what this trying to do, but I do think that you need something better than just "always return ok." For example, I would at a minimum expect a check that asserts that the upstream is working. I don't know if checking this specific listener is the correct approach though. From the YAML below I think this is acting as a readiness check and not a health check?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was trying to set up a few checks that make sure that the other listener is capable of responding to requests.

I am not sure we want to add an upstream healthz check here - the proxy info port is supposed to serve information about the proxy itself. The healthz of upstream should probably be checked directly at upstream (or should be accessed via a permissive proxied path).

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The previous health check is fine. This would be more like a readiness check?

At the beginning I had the opinion that @enj had, that we would need to "somehow check upstream", but your arguments are also right: this is the concern of upstream itself.
Now, I have no strong opinions. I see the reason behind a connection check and I am still not sure if adds enough usefulness.

Copy link

@enj enj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First pass.


// we need the tls.Dialer otherwise the server would log EOF for TLS handshakes
// since the connection would be cut before that was ever attempted
dialer := tls.Dialer{NetDialer: &net.Dialer{}, Config: &tls.Config{InsecureSkipVerify: true}}
Copy link

@enj enj Dec 20, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we do this without the InsecureSkipVerify?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a loopback check, the serving cert's not likely to contain information for that endpoint. The check is more or less an HTTPS ping.
Maybe we could use SNI if we think we need to verify the certs, too.

// on a different port (--proxy-endpoints-port)
proxyEndpointsMux := http.NewServeMux()
proxyEndpointsMux.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) { _, _ = w.Write([]byte("ok")) })
proxyEndpointsMux.HandleFunc("/healthz", func(w http.ResponseWriter, r *http.Request) {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am unsure of exactly what this trying to do, but I do think that you need something better than just "always return ok." For example, I would at a minimum expect a check that asserts that the upstream is working. I don't know if checking this specific listener is the correct approach though. From the YAML below I think this is acting as a readiness check and not a health check?

}
}

func testHealthz(client kubernetes.Interface) kubetest.TestSuite {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A test for the failure case would make it more clear what this is checking.

@ibihim
Copy link
Collaborator

ibihim commented Apr 3, 2025

#244

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

sig-auth-acceptance issues created during review for sig-auth-acceptance

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants