-
Notifications
You must be signed in to change notification settings - Fork 18k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cmd/go: support sending credentials to an insecure GOPROXY #35975
Comments
It's very unlikely we'll make a change here. Have you seen https://blog.filippo.io/mkcert-valid-https-certificates-for-localhost/ ? That is likely the easier path forward for you. |
/cc @FiloSottile @bcmills |
We do support insecure proxies as We intentionally do not support sending credentials to insecure proxies. Accidentally dropping the |
Your use-case here is for testing a Ideally, you should test your That said, if you intentionally want to test the server with unrealistic requests — for example, in order to write tests that users can run without generating or installing certificates — it should be fairly trivial to inject a second proxy between the |
(CC @jayconrod) |
Please try the second-proxy approach and let us know if that works out. |
@bcmills I would not expect it to work by default to prevent the dropped The use case I have in mind for this requirement is development environment exclusively. I understand there are better solution for test/stage/production environments. I'll give the workarounds you pointed out a try and let you know about the results. |
Great! Closing the issue, since you have an acceptable workaround and we don't have any other use-cases for this at the moment. |
Hi Mayer,
Basically, you can use mkcert to generate private and public keys to any
domain and install them in a local CA in your machine.
I've just followed this tutorial to get it working:
https://medium.com/@shriramsharma/mkcert-you-changed-my-life-b157466880bf
Best,
Elio
…On Wed, Nov 18, 2020 at 8:22 PM Mayer Ma ***@***.***> wrote:
@elioengcomp <https://github.com/elioengcomp> I face the same issue with
you, i need to use a internal proxy like ***@***.***:8080
to download the package via go mod.
But I'm not sure how to use mkcert to let things work. Could you please
give me a clearly guide?
Thank you!
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#35975 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFQYW3J55DIUE4YQTI57WS3SQSMQPANCNFSM4JVQWYDQ>
.
|
What version of Go are you using (
go version
)?Does this issue reproduce with the latest release?
Yes
What operating system and processor architecture are you using (
go env
)?go env
OutputWhat did you do?
GOPROXY
to point to an insecure proxy using basic authenticationgo mod download
What did you expect to see?
I expect the module to be download successfully. I understand that, for security reasons, additional steps should be performed to allow the client to communicate with the insecure proxy, but it seems those additional steps are only available for the
go get
command through the-insecure
flag.We need to fully support insecure proxies for all the
go mod
commands. We cannot assume that all proxies are production ready specially when working on proxy development. Making all development environments secure is not feasible and we still need to be able to send authenticated requests against it to validate proxy features like user permissions.What did you see instead?
The command fails since the client refuses to send the credentials to the insecure proxy.
The text was updated successfully, but these errors were encountered: