Skip to content

Bugfix/pdpdevtool 6490 cli proxy does not work behind oracle vpn#1032

Open
carolnavarropereira wants to merge 4 commits into
devfrom
bugfix/PDPDEVTOOL-6490-cli-proxy-does-not-work-behind-oracle-vpn
Open

Bugfix/pdpdevtool 6490 cli proxy does not work behind oracle vpn#1032
carolnavarropereira wants to merge 4 commits into
devfrom
bugfix/PDPDEVTOOL-6490-cli-proxy-does-not-work-behind-oracle-vpn

Conversation

@carolnavarropereira
Copy link
Copy Markdown
Member

No description provided.

@carolnavarropereira carolnavarropereira requested a review from a team as a code owner May 14, 2026 15:15
@oracle-contributor-agreement oracle-contributor-agreement Bot added the OCA Verified All contributors have signed the Oracle Contributor Agreement. label May 14, 2026
@carolnavarropereira carolnavarropereira self-assigned this May 14, 2026
Comment thread packages/node-cli/src/services/ProxyService.js Outdated
Comment thread packages/node-cli/src/services/ProxyService.js Outdated
Comment thread packages/node-cli/src/services/ProxyService.js Outdated
Comment thread packages/node-cli/src/services/ProxyService.js Outdated
Comment on lines +334 to +337
//Add proxy agent for production in order to work properly with vpn
requestOptions.agent = this._proxyService.getProxyAgent();
} else {
//Add agent for insecure connections when connecting to runboxes
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would refrain from adding comments with internal data or confidential information.

Suggested change
//Add proxy agent for production in order to work properly with vpn
requestOptions.agent = this._proxyService.getProxyAgent();
} else {
//Add agent for insecure connections when connecting to runboxes
// Add a proxy agent to support restricted network environments (e.g: VPN)
requestOptions.agent = this._proxyService.getProxyAgent();
} else {
// Add an agent to support relaxed TLS settings (development environments)

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This message was already there.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. But, still, my point remains and I would use this opportunity to fix it now

Comment on lines +1 to +4
/*
** Copyright (c) 2024 Oracle and/or its affiliates. All rights reserved.
** Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
*/
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copyright notice should point to 2026, 2024 is not right.

(We should probably find the culprit config_file and update that one, but this is very much outside the scope so obviously I won't enforce it).

Comment on lines +1 to +4
/*
** Copyright (c) 2022 Oracle and/or its affiliates. All rights reserved.
** Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl.
*/
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copyright notice should point to 2026, 2022 is not right.

(We should probably find the culprit config_file and update that one, but this is very much outside the scope so obviously I won't enforce it).

},
SUITECLOUD_PROXY_SERVICE: {
SUPPORTED_PROTOCOLS: ['http:', 'https:'],
REGEX_SYSTEM_URL : /^system\.netsuite\.com$/,
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if you've noticed, but this REGEX is more restrictive that the one we've been using.
See ApplicationConstants.js, line 44:

	DOMAIN: {
		PRODUCTION: {
			GENERIC_NETSUITE_DOMAIN: 'system.netsuite.com',
			PRODUCTION_DOMAIN_REGEX: '^system\\.(\\w+\\.)*netsuite\\.com$',
		...
		}
}

So the old Regex would allow system.na1.netsuite.com but the new one wouldn't...
We should verify which is the one we want to use and then use the same value, right?

Probably David, Antonio or Ali can provide more context here. Let me know what do you think

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

OCA Verified All contributors have signed the Oracle Contributor Agreement.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants