Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add functions for proxy on adjust headers #275

Merged
merged 1 commit into from
Feb 3, 2025

Conversation

tomboulossf
Copy link
Contributor

@tomboulossf tomboulossf commented Feb 1, 2025

Proposed changes

When operating Deepgram on-premises in a k8s environment using istio service-mesh, the websocket handshake fails to complete with the standard setup. In our environment the proxy configuration options are provided via the standard environment variables, so resolving the proxy via the golang net/http standard function performs the proper proxy configuration. The presence of the "Host" header still prevents a successful websocket setup to be established, but rather than simply remove that header, providing the ability of the caller to modify headers prior to websocket setup appeared a preferable solution .

Types of changes

What types of changes does your code introduce to the community Go SDK?
Put an x in the boxes that apply

  • [ x] Bugfix (non-breaking change which fixes an issue)
  • [ x] New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation update or tests (if none of the other choices apply)

Checklist

Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

  • [ x] I have read the CONTRIBUTING doc
  • I have lint'ed all of my code using repo standards
  • I have added tests that prove my fix is effective or that my feature works
  • I have added necessary documentation (if appropriate)

Further comments

Summary by CodeRabbit

  • New Features

    • Added support for custom WebSocket header processing
    • Introduced proxy configuration for WebSocket connections
  • Improvements

    • Enhanced client options with more flexible connection settings
    • Improved WebSocket connection configuration capabilities

Copy link

coderabbitai bot commented Feb 1, 2025

Walkthrough

The pull request introduces enhancements to the WebSocket client configuration by adding two new features to the ClientOptions struct: a Proxy function for configuring proxy settings and a WSHeaderProcessor function for custom WebSocket header processing. These modifications are implemented in the pkg/client/interfaces/v1/types-client.go file and utilized in the pkg/client/common/v1/websocket.go file to provide more flexible WebSocket connection setup.

Changes

File Change Summary
pkg/client/interfaces/v1/types-client.go - Added Proxy function field to ClientOptions
- Added WSHeaderProcessor function field to ClientOptions
- Reformatted existing struct fields
pkg/client/common/v1/websocket.go - Updated internalConnectWithCancel method to use new WSHeaderProcessor
- Added proxy configuration to WebSocket dialer

Sequence Diagram

sequenceDiagram
    participant Client
    participant ClientOptions
    participant WebSocketDialer
    participant ProxyConfig
    participant HeaderProcessor

    Client->>ClientOptions: Configure Proxy and Header Processor
    Client->>WebSocketDialer: Establish Connection
    WebSocketDialer->>ProxyConfig: Apply Proxy Settings
    WebSocketDialer->>HeaderProcessor: Process WebSocket Headers
    WebSocketDialer->>Client: Return WebSocket Connection
Loading

Possibly related PRs

Suggested reviewers

  • jpvajda
  • naomi-lgbt
  • lukeocodes
✨ Finishing Touches
  • 📝 Generate Docstrings (Beta)

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR. (Beta)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (2)
pkg/client/interfaces/v1/types-client.go (1)

19-20: LGTM! Consider enhancing the documentation.

The new fields provide flexible solutions for proxy configuration and header processing. The implementation aligns well with Go best practices by using function types.

Consider adding more detailed documentation for the new fields:

-	Proxy             func(*http.Request) (*url.URL, error) // provide function for proxy -- e.g. http.ProxyFromEnvironment
-	WSHeaderProcessor func(http.Header)                     // process headers before dialing for websocket connection
+	// Proxy specifies the function to determine the proxy for a given request.
+	// For example, http.ProxyFromEnvironment can be used to respect standard proxy environment variables.
+	Proxy             func(*http.Request) (*url.URL, error)
+
+	// WSHeaderProcessor allows custom processing of WebSocket headers before the connection is established.
+	// This can be used to modify or remove headers that might interfere with the WebSocket handshake.
+	WSHeaderProcessor func(http.Header)
pkg/client/common/v1/websocket.go (1)

202-202: LGTM! Consider reducing code duplication in dialer configuration.

The proxy configuration is correctly set for both secure and non-secure connections.

Consider reducing code duplication by extracting common dialer options:

+		// Common dialer options
+		dialerOpts := websocket.Dialer{
+			HandshakeTimeout: 15 * time.Second,
+			RedirectService:  c.cOptions.RedirectService,
+			Proxy:           c.cOptions.Proxy,
+		}
+
 		// if host starts with "ws://", then disable TLS
-		var dialer websocket.Dialer
 		if url[:5] == "ws://" {
-			dialer = websocket.Dialer{
-				HandshakeTimeout: 15 * time.Second,
-				RedirectService:  c.cOptions.RedirectService,
-				Proxy:            c.cOptions.Proxy,
-			}
+			dialer = dialerOpts
 		} else {
-			dialer = websocket.Dialer{
-				HandshakeTimeout: 15 * time.Second,
-				/* #nosec G402 */
-				TLSClientConfig: &tls.Config{InsecureSkipVerify: c.cOptions.SkipServerAuth},
-				RedirectService: c.cOptions.RedirectService,
-				SkipServerAuth:  c.cOptions.SkipServerAuth,
-				Proxy:           c.cOptions.Proxy,
-			}
+			dialer = dialerOpts
+			dialer.TLSClientConfig = &tls.Config{InsecureSkipVerify: c.cOptions.SkipServerAuth}
+			dialer.SkipServerAuth = c.cOptions.SkipServerAuth
 		}

Also applies to: 211-211

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 42c3486 and 8782c16.

📒 Files selected for processing (2)
  • pkg/client/common/v1/websocket.go (3 hunks)
  • pkg/client/interfaces/v1/types-client.go (1 hunks)
🔇 Additional comments (1)
pkg/client/common/v1/websocket.go (1)

162-164: LGTM! Header processing is implemented correctly.

The header processor is called at the right time, after all standard headers are set but before the connection is established.

@jpvajda jpvajda requested review from jpvajda and naomi-lgbt February 3, 2025 16:11
@jpvajda
Copy link
Contributor

jpvajda commented Feb 3, 2025

Testing this now, thanks @tomboulossf!

Copy link
Contributor

@lukeocodes lukeocodes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me, and similar to something we do on the Node SDK. Pending testing, this is a great addition @jpvajda

Copy link
Contributor

@jpvajda jpvajda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested and approved!

@jpvajda jpvajda merged commit 3a43c6a into deepgram:main Feb 3, 2025
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants