-
Bug
-
Resolution: Not a Bug
-
Major
-
None
-
4.14, 4.15, 4.16
-
None
-
No
-
3
-
WINC - Sprint 252, WINC - Sprint 253
-
2
-
False
-
-
-
Bug Fix
Description of problem:
Accessing http/https endpoints do not pass through proxy settings using powershell
Version-Release number of selected component (if applicable):
9.0.1-8cb2ffb
How reproducible:
100%
Steps to Reproduce:
1. Install IPI Windows containers cluster with proxy enabled 2. Login to Windows worker by SSH 3. invoke web request to external endpoint: Invoke-WebRequest http://raw.githubusercontent.com/openshift/windows-machine-config-operator/master/README.md -UseBasicParsing
Actual results:
Request should pass through configured proxy Clear port 80: tcpdump -ttttnnr trace.pcapng port 80 reading from PCAP-NG file trace.pcapng 2024-01-30 16:18:44.605349 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [SEW], seq 2477283850, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:18:44.605427 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [SEW], seq 2477283850, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:18:44.605604 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [S.E], seq 1694099473, ack 2477283851, win 63280, options [mss 9040,nop,nop,sackOK,nop,wscale 7], length 0 2024-01-30 16:18:44.605729 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [S.E], seq 1694099473, ack 2477283851, win 63280, options [mss 9040,nop,nop,sackOK,nop,wscale 7], length 0 2024-01-30 16:18:44.605799 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:18:44.605816 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:18:44.606510 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [P.], seq 1:192, ack 1, win 1024, length 191: HTTP: GET /latest/meta-data/local-hostname HTTP/1.1 2024-01-30 16:18:44.606531 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [P.], seq 1:192, ack 1, win 1024, length 191: HTTP: GET /latest/meta-data/local-hostname HTTP/1.1 2024-01-30 16:18:44.606607 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [.], ack 192, win 493, length 0 2024-01-30 16:18:44.606674 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [.], ack 192, win 493, length 0 2024-01-30 16:18:44.606861 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [P.], seq 1:245, ack 192, win 493, length 244: HTTP: HTTP/1.1 200 OK 2024-01-30 16:18:44.606909 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [P.], seq 1:245, ack 192, win 493, length 244: HTTP: HTTP/1.1 200 OK 2024-01-30 16:18:44.606953 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [F.], seq 245, ack 192, win 493, length 0 2024-01-30 16:18:44.606994 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [F.], seq 245, ack 192, win 493, length 0 2024-01-30 16:18:44.607013 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [.], ack 246, win 1023, length 0 2024-01-30 16:18:44.607026 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [.], ack 246, win 1023, length 0 2024-01-30 16:18:44.607808 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [F.], seq 192, ack 246, win 1023, length 0 2024-01-30 16:18:44.607831 IP 10.0.64.189.51012 > 169.254.169.254.80: Flags [F.], seq 192, ack 246, win 1023, length 0 2024-01-30 16:18:44.607938 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [.], ack 193, win 493, length 0 2024-01-30 16:18:44.608006 IP 169.254.169.254.80 > 10.0.64.189.51012: Flags [.], ack 193, win 493, length 0 2024-01-30 16:19:22.865723 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [SEW], seq 282208634, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:19:22.865757 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [SEW], seq 282208634, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:19:22.866680 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [S.], seq 318398462, ack 282208635, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0 2024-01-30 16:19:22.866762 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [S.], seq 318398462, ack 282208635, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0 2024-01-30 16:19:22.866823 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:19:22.866838 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:19:22.867136 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [P.], seq 1:229, ack 1, win 1024, length 228: HTTP: GET /openshift/windows-machine-config-operator/master/README.md HTTP/1.1 2024-01-30 16:19:22.867153 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [P.], seq 1:229, ack 1, win 1024, length 228: HTTP: GET /openshift/windows-machine-config-operator/master/README.md HTTP/1.1 2024-01-30 16:19:22.867891 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [.], ack 229, win 288, length 0 2024-01-30 16:19:22.867963 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [.], ack 229, win 288, length 0 2024-01-30 16:19:22.871603 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [P.], seq 1:543, ack 229, win 288, length 542: HTTP: HTTP/1.1 301 Moved Permanently 2024-01-30 16:19:22.871682 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [P.], seq 1:543, ack 229, win 288, length 542: HTTP: HTTP/1.1 301 Moved Permanently 2024-01-30 16:19:22.871739 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [F.], seq 543, ack 229, win 288, length 0 2024-01-30 16:19:22.871780 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [F.], seq 543, ack 229, win 288, length 0 2024-01-30 16:19:22.871802 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [.], ack 544, win 1022, length 0 2024-01-30 16:19:22.871819 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [.], ack 544, win 1022, length 0 2024-01-30 16:19:22.872034 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [F.], seq 229, ack 544, win 1022, length 0 2024-01-30 16:19:22.872054 IP 10.0.64.189.51013 > 185.199.111.133.80: Flags [F.], seq 229, ack 544, win 1022, length 0 2024-01-30 16:19:22.872685 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [.], ack 230, win 288, length 0 2024-01-30 16:19:22.872758 IP 185.199.111.133.80 > 10.0.64.189.51013: Flags [.], ack 230, win 288, length 0 2024-01-30 16:19:36.011388 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [SEW], seq 1744195223, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:19:36.011453 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [SEW], seq 1744195223, win 64860, options [mss 1410,nop,wscale 8,nop,nop,sackOK], length 0 2024-01-30 16:19:36.012701 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [S.], seq 1056032842, ack 1744195224, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0 2024-01-30 16:19:36.012813 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [S.], seq 1056032842, ack 1744195224, win 65535, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0 2024-01-30 16:19:36.012879 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:19:36.012895 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [.], ack 1, win 1024, length 0 2024-01-30 16:19:36.013064 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [P.], seq 1:205, ack 1, win 1024, length 204: HTTP: GET /openshift/windows-machine-config-operator/master/README.md HTTP/1.1 2024-01-30 16:19:36.013081 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [P.], seq 1:205, ack 1, win 1024, length 204: HTTP: GET /openshift/windows-machine-config-operator/master/README.md HTTP/1.1 2024-01-30 16:19:36.013863 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [.], ack 205, win 288, length 0 2024-01-30 16:19:36.013929 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [.], ack 205, win 288, length 0 2024-01-30 16:19:36.017761 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [P.], seq 1:543, ack 205, win 288, length 542: HTTP: HTTP/1.1 301 Moved Permanently 2024-01-30 16:19:36.017796 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [P.], seq 1:543, ack 205, win 288, length 542: HTTP: HTTP/1.1 301 Moved Permanently 2024-01-30 16:19:36.017956 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [F.], seq 543, ack 205, win 288, length 0 2024-01-30 16:19:36.017961 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [F.], seq 205, ack 543, win 1022, length 0 2024-01-30 16:19:36.017975 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [F.], seq 205, ack 543, win 1022, length 0 2024-01-30 16:19:36.018007 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [F.], seq 543, ack 205, win 288, length 0 2024-01-30 16:19:36.018039 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [.], ack 544, win 1022, length 0 2024-01-30 16:19:36.018053 IP 10.0.64.189.51015 > 185.199.111.133.80: Flags [.], ack 544, win 1022, length 0 2024-01-30 16:19:36.018525 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [.], ack 206, win 288, length 0 2024-01-30 16:19:36.018566 IP 185.199.111.133.80 > 10.0.64.189.51015: Flags [.], ack 206, win 288, length 0 empty results filtered proxy port: tcpdump -ttttnnr trace.pcapng port 3128 reading from PCAP-NG file trace.pcapng oc get proxies -o=jsonpath="{.items[0].status}" {"httpProxy":"http://proxy-user1:********@**-**-**-**.us-east-2.compute.amazonaws.com:3128","httpsProxy":"http://proxy-user1:********@**-**-**-**.us-east-2.compute.amazonaws.com:3128","noProxy":".cluster.local,.svc,.us-east-2.compute.internal,10.0.0.0/16,10.128.0.0/14,127.0.0.1,169.254.169.254,172.30.0.0/16,api-int.rrasouli-1093.qe.devcluster.openshift.com,localhost,test.no-proxy.com"}%
Expected results:
Additional info:
- is related to
-
WINC-1152 Add e2e test for Windows node egress traffic routing through global proxy
- Closed
- links to
- mentioned on