Support for SOCKS proxy configuration on control planes #344
No reviewers
Labels
No labels
API
Billing
UI/UX
dependencies
bug
change
duplicate
enhancement
help wanted
invalid
question
wontfix
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
servala/servala-portal!344
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "socks-proxy-per-controlplane"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Allow specifying a SOCKS proxy URL per control plane. Use case: Connect to a control plane via a user-space VPN like Netbird or Tailscale.
@tobru What does the typical SOCKS URL look like in practical use? Will it contain URL-based credentials or is it just a URL? Might be worth using a URLField for this, or at least an input validator. (This validator could also be reused in the SOCKS client class to make sure at instantiation that the URL is really valid.)
@tobru Also re
servala/servala-portal@6fa4b09b6a– the models file is already fairly huge, and putting a HTTP client in there makes it even larger and is not great re: separation of concerns imo. TheSOCKSRESTClientObjectalso does not callsuper().__init__(), and instead vendors most of it. Might be worth callingsuper()and then overridingpool_managerafterwards, cutting down on code duplication.