Cayin Wan
Cayin Wan
> Did you use a proxy? yes ```shell ❯ echo $HTTP_PROXY http://127.0.0.1:7890 ❯ echo $HTTPS_PROXY http://127.0.0.1:7890 ```
In previous Docker versions, this configuration worked fine though ```shell # .wslconfig [wsl2] networkingMode=mirrored dnsTunneling=true firewall=true autoProxy=true [experimental] # requires dnsTunneling but are also OPTIONAL bestEffortDnsParsing=true #useWindowsDnsCache=true ```
> 4. Solution > Add *.docker.internal to NO_PROXY. This can be configured in the proxy software. ```shell ❯ curl -iv gateway.docker.internal * Uses proxy env variable no_proxy == 'kubernetes.docker.internal,gateway.docker.internal,host.docker.internal,192.168.*,172.31.*,172.30.*,172.29.*,172.28.*,172.27.*,172.26.*,172.25.*,172.24.*,172.23.*,172.22.*,172.21.*,172.20.*,172.19.*,172.18.*,172.17.*,172.16.*,10.*,127.*,localhost,' *...
@jkruebbe > ERROR: permission denied while trying to connect to the Docker daemon socket at unix:///run/podman/podman.sock: Get "http://%2Frun%2Fpodman%2Fpodman.sock/v1.44/info": dial unix /run/podman/podman.sock: connect: permission denied errors pretty printing info **It seems...
@yzztin It's unrelated to the HTTP proxy; internal communication uses a pipe. To launch it on WSL, simply change `mirrored` to `nat`. Mirrored mode currently has a bug, and the...
> Could you please share a PCAP recording of this? Starting with mitmproxy 12 we now do add CRL entries, I'd like to confirm that they go through the proxy....
The new file contains more comprehensive information. PCAP link: https://drive.google.com/file/d/1xu4Hk0ALM-w84En8sZC3Sbzm8-rcbxmM/view ```shell Mitmproxy: 12.1.1 binary Python: 3.13.3 OpenSSL: OpenSSL 3.4.1 11 Feb 2025 Platform: Windows-11-10.0.26100-SP0 ```
> There's still nothing in the PCAP that would explain the issues you are describing. I didn't capture any relevant non-TCP requests using Wireshark. Please tell me what is needed.
The new file contains `http://c.pki.goog/mitmproxy-195882422594300812035352643412233847608560028623.crl` request, but the response is 404. No DNS request, send directly to the proxy service. All captured in lookback. PCAP link: https://drive.google.com/file/d/1EDHeiZNCOhyWGUcrPLzV2mnWr2dGW3Yy/view
The 7890 is an upstream proxy service based on Clash, used to bypass network restrictions. `mitmproxy -m upstream:http://127.0.0.1:7890/`