Skip to content

Make cvmfs_http_proxy default to DIRECT #35

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 4, 2025

Conversation

DrDaveD
Copy link
Contributor

@DrDaveD DrDaveD commented Apr 4, 2025

Since github actions are run in Azure where there is not normally a proxy defined, leaving cvmfs_http_proxy unset results in a call to WLCG Web Proxy Auto Discovery (WPAD). If there are enough of them in a short period of time (125 requests within 15 minutes) from the one organization (as defined by Maxmind) then the WPAD directs clients to backup proxies, which causes an alarm. That alarm was triggered yesterday. This PR fixes that problem by defaulting cvmfs_http_proxy to DIRECT.

After merging I would like a new tag, and I will also backport to v4 where we'll need another tag. The specific action that likely triggered the alarm was using v4.

@DrDaveD DrDaveD force-pushed the proxy-default-direct branch from 5cd37fb to 9754258 Compare April 4, 2025 13:38
@DrDaveD DrDaveD requested review from wdconinc and vvolkl April 4, 2025 13:48
@wdconinc
Copy link
Collaborator

wdconinc commented Apr 4, 2025

I'm wondering, is this not shifting the burst of activity from a WPAD and the backup proxies to the primary server? Should we instead ensure that a proxy server is set in these actions so WPAD doesn't need to be contacted?

Also, possibly useful to alert the downstream workflow and encourage them to upgrade.

@DrDaveD
Copy link
Contributor Author

DrDaveD commented Apr 4, 2025

I'm wondering, is this not shifting the burst of activity from a WPAD and the backup proxies to the primary server? Should we instead ensure that a proxy server is set in these actions so WPAD doesn't need to be contacted?

Setting it to DIRECT is the right thing to do, because cvmfs_use_cdn is already defaulted to yes; all the requests will go to Cloudflare, which is what we want for this case. That's better then sending them to some random squid, unless we could run one in Azure itself and make it publicly available to all clients running in Azure.

Also, possibly useful to alert the downstream workflow and encourage them to upgrade.

That would be easy enough for this case but I don't know how many other users there may be or how to contact them.

@wdconinc
Copy link
Collaborator

wdconinc commented Apr 4, 2025

Thanks for the additional detail. Sounds like this is fine to merge then. The squid on azure can be for future consideration.

Also, possibly useful to alert the downstream workflow and encourage them to upgrade.

That would be easy enough for this case but I don't know how many other users there may be or how to contact them.

Yeah, that doesn't scale well. If it ever is useful, https://github.com/cvmfs-contrib/github-action-cvmfs/network/dependents has a full list of users of the action (but not the version).

@wdconinc wdconinc merged commit d8e39de into cvmfs-contrib:main Apr 4, 2025
3 checks passed
@DrDaveD DrDaveD deleted the proxy-default-direct branch April 4, 2025 17:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants