Skip to content
This repository has been archived by the owner on Sep 5, 2023. It is now read-only.

Use original client IP when checking ACLs #362

Closed
wants to merge 1 commit into from

Conversation

benthorner
Copy link
Contributor

@benthorner benthorner commented Sep 21, 2021

https://www.pivotaltracker.com/story/show/179659713

Previously we used "client.ip" to control access to Staging and
Integration, but this won't work for GOV.UK Alerts, since the IP
gets modified due to its use of the shielding feature 1. This
moves setting the existing Fastly-Client-IP header earlier so that
we can reuse it as a reliable means of checking who's allowed in.

Disclaimer: I haven't tested this, since I don't have access to do
so. I'm fairly confident the header will always be set, so I don't
expect any of the subsequent uses of it to fail.

Previously we used "client.ip" to control access to Staging and
Integration, but this won't work for GOV.UK Alerts, since the IP
gets modified due to its use of the shielding feature [1]. This
moves setting the existing Fastly-Client-IP header earlier so that
we can reuse it as a reliable means of checking who's allowed in.

[1]: https://developer.fastly.com/reference/vcl/variables/client-connection/client-ip/
@benthorner benthorner marked this pull request as draft October 7, 2021 09:39
@benthorner
Copy link
Contributor Author

Closing as this isn't something we're actively working on.

@benthorner benthorner closed this Mar 7, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant