Skip to content
This repository has been archived by the owner on Dec 18, 2018. It is now read-only.

IHttpRequestFeature.Scheme not set to HTTPS #365

Closed
Tratcher opened this issue Nov 11, 2015 · 5 comments
Closed

IHttpRequestFeature.Scheme not set to HTTPS #365

Tratcher opened this issue Nov 11, 2015 · 5 comments
Assignees
Labels
Milestone

Comments

@Tratcher
Copy link
Member

When using HTTPS/TLS the IHttpRequestFeature is not set accordingly, all requests are reported as http.

@Tratcher Tratcher added the bug label Nov 11, 2015
@halter73 halter73 added this to the 1.0.0-rc2 milestone Nov 13, 2015
@NickCraver
Copy link
Contributor

What's the expectation on reporting in the SSL termination (e.g. reverse proxy) case? For example, will Kestrel eventually be aware of the X-Forwarded-Proto chain or is that entirely up to the application to determine?

@halter73
Copy link
Member

@NickCraver I think the expectation is that the developer needs to add our OverrideHeaderMiddleware if they're behind a reverse proxy.

@NickCraver
Copy link
Contributor

@halter73 ah just what I was looking for, thanks! The middleware seems incorrect though. For example, X-Forwarded-Proto is a comma list as well, not a single entry...it's just usually a single entry. The "spec" is multiple though, for example CloudFlare adds one and HAProxy adds one in our case.

@NickCraver
Copy link
Contributor

@halter73 I appreciate the link; I couldn't find that when looking. Issue opened on that repo: aspnet/BasicMiddleware#18

@halter73
Copy link
Member

Fixed by #385

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

4 participants