I posted this query previously on the envoy-dev Slack channel, but it may have not hit the right audience there.
We have a use case in which we’d like to inspect traffic that is tunnelled over an HTTP CONNECT connection. Specifically, we’d like to be able to interrupt the connection if the tunnelled application layer properties (e.g. application protocol or application metadata) violate some defined policy.
I was looking at the incoming HTTP CONNECT PR and I was wondering if anyone had given any thought to the above use case. The WebSocket implementation seems to be able to accomplish this with the upgrade config’s “filters” list, but I haven’t been able to find any details on how this will/would be implemented for HTTP CONNECT.
If there aren’t any current plans to implement support for inspecting the tunnelled traffic and this is something that makes sense for an upstream submission, we have some development time to contribute to the effort.