+++ This bug was initially created as a clone of Bug #1977454 +++ Description of problem: The build in-cluster service test deploys a Redis service, then checks the service availability by running a `curl` command against the redis endpoint. Newer versions of Redis won't allow these requests when proxy environment variables are set. Version-Release number of selected component (if applicable): 4.8 How reproducible: Always Steps to Reproduce: 1. Install OCP behind a proxy 2. Start a Redis service in a project 3. In the same project, start a build which connects to the redis service Actual results: Connection is aborted. Redis error message: ``` # Possible SECURITY ATTACK detected. It looks like somebody is sending POST or Host: commands to Redis. This is likely due to an attacker attempting to use Cross Protocol Scripting to compromise your Redis instance. Connection aborted. ``` Expected results: Connection succeeds Additional info: https://prow.ci.openshift.org/view/gs/origin-ci-test/logs/periodic-ci-openshift-release-master-nightly-4.9-e2e-aws-proxy/1409477255171674112
Validate e2e passed.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (OpenShift Container Platform 4.8.3 bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:2896