Skip to content

Filter out websocket extensions from upstream #53

Open
@Lalufu

Description

@Lalufu

Describe the bug

In

headers=client_request_headers,
, headers are copied from the upstream websocket connection to the httpx_ws call. This can lead to a desync in the negotiated options. For example, passing through sec-websocket-extensions: permessage-deflate from upstream to downstream may cause the downstream host to compress websocket messages, which httpx_ws will not expect and fail.

Probably all sec-websocket* headers should not be passed to downstream.

Observed on fastapi-proxy-lib 0.2.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions