-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document how to roll out and handle breaking changes to the XFF header #3611
Comments
Ok, it has been about a month and we've done an intermediate release. Do we think it's worth rolling this forward, or shall we wait a bit longer to lower the odds of folks running up against this? Do we know if anyone does less than monthly releases who isn't picking up the actual release builds? |
I think it's probably fine to just do it, especially since we just crossed a version boundary. |
Ok, just to clearly document in one place. The original PR #3587 removed whitespace in XFF headers, changing them from the form X-Forwarded-For: 127.0.0.1, 127.0.0.2 Unfortunately, as documented in #3607, Envoy's getLastAddressFromXFF utility assumed there was whitespace, so did not properly parse the new terse form of headers. This resulted in Envoy not properly determining addresses, failing ip tagging, etc. The parsing issue was fixed with #3610, which landed Wed Jun 13 and made the Envoy 1.7.0 build. It's important to note that if running a multi-Envoy deployment and upgrading from binaries prior to #3610 to binaries after #3828, it is essential to upgrade the upstream Envoys (willing to parse terse XFF) before the downstream Envoys (sending terse XFF). |
lgtm, thanks! |
As mentioned on the bug and seconded by @rgs1 I'm going to err on the side of paranoia and wait for a full release. I've added a calendar reminder to pick this up come October so it doesn't linger forever :-P |
Risk Level: Medium Testing: updated unit tests Docs Changes: nope Release Notes: called out a warning in the release notes Fixes: #3611 Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
…oyproxy#4671) Risk Level: Medium Testing: updated unit tests Docs Changes: nope Release Notes: called out a warning in the release notes Fixes: envoyproxy#3611 Signed-off-by: Alyssa Wilk <alyssar@chromium.org> Signed-off-by: Aaltan Ahmad <aa@stripe.com>
This is a follow-up for #3607.
#3597 was reverted because it breaks
Utility::getLastAddressFromXFF()
. We should document that #3610 is a pre-requisite for safely unreverting #3597 and rolling it out.The text was updated successfully, but these errors were encountered: