You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I was able to repro this and see where the confusion is coming from.
Short names like api are routed through the envoy sidecar container, which then uses https to communicate with the main envoy instance. That intermediate https is what causes envoy to add x-forwarded-proto: https.
Workaround: use the FQDN to bypass the envoy sidecar and communicate directly with the main envoy instance using http. http://api.internal.kindwater-1f6ab775.azurecontainerapps.io.
We'll consider if there are other ways to enable this scenario in the future.
Unfortunately, our solution heavily relies on simple names for inter-service calls. We resorted to a workaround to set the dynamically resolved URLs to fixed ones.
This issue is a:
Issue description
Calling from inside of the custom Vnet-integrated internal ACA environment:
curl **http**://api
On the
api
side in logs I findThis e.g. breaks internal IdentityServer calls that emit the https:// issuer instead of http://
Ingress configuration:
UseForwardedHeaders()
is being used in our Apps.Expected behavior
x-forwarded-proto
equals tohttp
when the request is HTTPActual behavior
x-forwarded-proto
equals tohttps
when the request is HTTPThe text was updated successfully, but these errors were encountered: