Skip to content

documentation: improve proxy documentation#8840

Merged
eshitachandwani merged 4 commits intogrpc:masterfrom
eshitachandwani:improve_proxy_documentation
Jan 29, 2026
Merged

documentation: improve proxy documentation#8840
eshitachandwani merged 4 commits intogrpc:masterfrom
eshitachandwani:improve_proxy_documentation

Conversation

@eshitachandwani
Copy link
Copy Markdown
Member

@eshitachandwani eshitachandwani commented Jan 16, 2026

Fixes: #8618

This PR improves the documentation for HTTP CONNECT proxy in proxy.md and clearly states that the connect from client to proxy through https is not supported and also mentioned that in case of TLS, it does not compromise security.

RELEASE NOTES: None

@eshitachandwani eshitachandwani added this to the 1.79 Release milestone Jan 16, 2026
@eshitachandwani eshitachandwani added Type: Documentation Documentation or examples Area: Documentation Includes examples and docs. labels Jan 16, 2026
@codecov
Copy link
Copy Markdown

codecov bot commented Jan 16, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 83.20%. Comparing base (572fdca) to head (9bf2de5).
⚠️ Report is 21 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #8840      +/-   ##
==========================================
- Coverage   83.31%   83.20%   -0.11%     
==========================================
  Files         414      414              
  Lines       32753    32727      -26     
==========================================
- Hits        27288    27231      -57     
- Misses       4064     4077      +13     
- Partials     1401     1419      +18     

see 34 files with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

request](https://github.com/grpc/grpc/issues/35372) for it and might support it
in future.

Not using https to connect to HTTP CONNECT proxy does not compromise security.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did you mean to say http here instead of https?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it should be https only , because we want to explain why talking to proxy without https is not a security issue.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are right. I read it again, and it makes sense.

@easwars easwars assigned eshitachandwani and unassigned easwars and dfawley Jan 20, 2026
a plaintext CONNECT handshake to establish a tunnel and does not support the
additional encryption required to secure the initial connection to the proxy
itself. We have an open [feature
request](https://github.com/grpc/grpc/issues/35372) for it and might support it
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is little chance of this feature request being implemented. But if by some miracle, it does get implemented, there is little chance of this documentation being updated at that point. I would suggest leaving this out.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

request](https://github.com/grpc/grpc/issues/35372) for it and might support it
in future.

Not using https to connect to HTTP CONNECT proxy does not compromise security.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are right. I read it again, and it makes sense.

Comment on lines +15 to +16
The gRPC traffic is encrypted end-to-end between the client and the destination
server. The HTTP CONNECT proxy only sees the destination address and cannot
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't actually true with a plaintext connection, so we should be a little careful about what we're telling our users when it comes to security.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed.

specified by the environment variables `HTTPS_PROXY` and `NO_PROXY`. (Note that
these environment variables are case insensitive.)

**NOTE**: Talking to CONNECT proxies using https is not supported. gRPC performs
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: we might want to avoid anthropomorphizing words/phrases like "talking". Instead maybe Using CONNECT proxies via https is not supported.?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

request](https://github.com/grpc/grpc/issues/35372) for it and might support it
in future.

Not using https to talk to CONNECT proxy does not compromise security.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same nit re: "talk". And grammar nit: "to CONNECT proxies" or "to a CONNECT proxy".

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

@eshitachandwani eshitachandwani merged commit 6601041 into grpc:master Jan 29, 2026
15 checks passed
mbissa pushed a commit to mbissa/grpc-go that referenced this pull request Feb 16, 2026
Fixes: grpc#8618

This PR improves the documentation for HTTP CONNECT proxy in `proxy.md`
and clearly states that the connect from client to proxy through https
is not supported and also mentioned that in case of TLS, it does not
compromise security.

RELEASE NOTES: None
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Area: Documentation Includes examples and docs. Type: Documentation Documentation or examples

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Clearly document that grpc-go does not support talking to a CONNECT proxy using https

4 participants