Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow specificion of trusted downstream proxies for xheaders #1864

Merged
merged 1 commit into from
Mar 26, 2017

Conversation

leynos
Copy link
Contributor

@leynos leynos commented Oct 23, 2016

This is an attempt to address the limitation whereby only the closest host in the X-Forwarded-For header may be used as the remote ip address. The developer may now specify a list of trusted downstream proxy hosts that will be skipped in parsing the X-Forwarded-For header.

This is analogous to similar functionality offered by Squid and Nginx. I discussed this in ticket #1840. I'll create a separate PR for proxies that include their connection port in their X-Forwarded-For entry.

…roxy hosts to be skipped in the `X-Forwarded-For` chain when using the `xheaders` option.
@bdarnell
Copy link
Member

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants