-
-
Notifications
You must be signed in to change notification settings - Fork 351
fix: allow HTTP egress traffic to all destinations #1303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Hey @jonpas! 👋 Thank you for your contribution to the project. Please refer to the contribution rules for a quick overview of the process. Make sure that this PR clearly explains:
With submitting this PR you confirm that you hold the rights of the code added and agree that it will published under this LICENSE. The following ChatOps commands are supported:
Simply add a comment with the command in the first line. If you need to pass more information, separate it with a blank line from the command. This message was generated automatically. You are welcome to improve it. |
|
I can't comment on the appropriateness of this for the default configuration, but I had to add this to my deployment to fix an issue with some installation steps that hit http endpoints. |
|
The interesting part is that this issue only occurs when the runners are public (i.e., behind an Internet Gateway). In this case, However, when the runners are private (i.e., behind a NAT Gateway), it works without any issues. |
|
@karthikholla you are correct. I completely forgot to mention our runners are public (Internet Gateway) to reduce costs with NAT Gateway. |
|
I'm using private runners, though with the following setup with a self-hosted NAT instance (int128/nat-instance/aws) instead of an expensive NAT gateway. Spent a few hours debugging. After updating terraform-aws-gitlab-runner, any Would be nice to merge this PR to avoid headaches for other users 👌 Docker build logs output |
kayman-mk
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for pointing this out.
🤖 I have created a release *beep* *boop* --- ## [9.2.3](9.2.2...9.2.3) (2025-08-14) ### Bug Fixes * allow HTTP egress traffic to all destinations ([#1303](#1303)) ([62bab5a](62bab5a)) * handle scaling properly when capacity_per_instance > 1 with docker job runners ([#1313](#1313)) ([91d7681](91d7681)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --------- Co-authored-by: cattle-ops-releaser-2[bot] <134548870+cattle-ops-releaser-2[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Description
Allow HTTP (port 80) traffic by default to allow commonly-used resources to be accessible from the
docker-autoscalerrunner workers.Fix #1302.
Migrations required
No
Verification
See #1302 for test cases.