Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

set host header on self outbound requests #2298

Merged
merged 1 commit into from
Mar 12, 2024

Conversation

karthik2804
Copy link
Contributor

Set the host header so that more than one level of self requests work. Not entirely sure if this is the correct approach but fixes the test app I had calling a -> b -> c

fixes #2296

crates/outbound-http/src/host_impl.rs Outdated Show resolved Hide resolved
crates/outbound-http/src/host_impl.rs Outdated Show resolved Hide resolved
@@ -490,6 +490,9 @@ impl OutboundWasiHttpHandler for HttpRuntimeData {
.parse()
// origin together with the path and query must be a valid URI
.unwrap();
let host = format!("{}:{}", uri.host().unwrap(), uri.port().unwrap());
let headers = request.request.headers_mut();
headers.insert(HOST, HeaderValue::from_str(&host)?);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same question about potentially overwriting an existing host header.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are only overwriting on self-requests.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I understand that but what if some mad, bad person sends a self request and explicitly sets the host header on it. (I cannot imagine why they would ever do this... I just wonder if we should respect it if they do.)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will check if it is a case of overwriting always or only if the user explicitly sets it. In that case, we can check for its existence before setting it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By default, the host seems to be

host = Some(
    ":443",
)

Do we want to do something like

if let Some(":443") = headers.get("host") {
    headers.insert(HOST, HeaderValue::from_str(&host)?);
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Egad! That host looks extremely weird, though I guess it's what we should expect given what we saw in the issue. It makes me think it's already getting set somewhere - and that makes me wonder if we can tweak wherever it's currently getting set rather than overwriting it later in the pipeline. It reminded me of the issue @dicej found (fermyon/spin-rust-sdk#8 (comment)) so there may be some subtle difference between main and RTM anyway...

Anyway, "user explicitly sets Host header in a self-request" certainly feels like a wildly obscure edge case. Given that it's not trivial to determine, I'm happy to punt on it for the time being. Thanks for the detailed investigation!

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll try to dig into where the header actually gets set. I will also update the rust SDK that the app uses to main instead of pinning it to v2.2 to see if that interaction differs.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I did some digging and this originates from the parsing of the uri by hyper. The first request goes through fine because the host is set properly on the incoming request that we use that to construct the URL and then in the subsequent requests, it fails.

ref: https://play.rust-lang.org/?version=stable&mode=debug&edition=2021&gist=fb83cc1730a01a63f2d9c70ff95074a8

@karthik2804
Copy link
Contributor Author

The fix only seems to be needed for the wasi_http interface. The spin_http interface seems to work as expected.

Copy link
Contributor

@itowlson itowlson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice - thanks!

@itowlson itowlson merged commit e82985b into fermyon:main Mar 12, 2024
10 checks passed
@karthik2804 karthik2804 deleted the fix_self_outbound branch March 28, 2024 18:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Chaining HTTP self-requests gives DNS error
2 participants