-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Working with CONNECT tunnels #1037
Comments
This is something that Tokio needs to figure, since hyper is using Tokio internally. I've discussed the concept before with the Tokio devs, but apparently there wasn't a tracking issue, so I've filed tokio-rs/tokio-proto#138. |
Thank you! I'll think of a workaround in the meantime. |
I'm also interested in CONNECT support. Looking to correlate TLS SNI with the domain name passed to CONNECT, to (dynamically) whitelist and also map the name to another for the resolution of the next hop. Context an in-bound forward proxy for one platform to reach other platforms within an enterprise network across DMZs and fronted by reverse proxies. Another protocol switch example is to support the proxy protocol (aka ELBs) stripping and insertion. |
I think this has been resolved by https://docs.rs/hyper/0.12.1/hyper/server/conn/struct.Connection.html#method.poll_without_shutdown, right? |
Yep, this can be done now with the |
Hi,
I am currently writing a toy HTTP proxy using hyper with tokio (current master). While plain HTTP proxying was easy to write, I am struggling with how to handle CONNECT tcp tunnels (typically used to proxy https without ssl interception).
How would you proceed to switch from the Http service to a raw tcp proxy service (such as the one demonstrated in
tokio-socks5
) on the same socket ?Solving this issue would also be beneficial for switching protocols to websockets or cleartext http2.
Thank you in advance for any advice.
Florent
The text was updated successfully, but these errors were encountered: