Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

httpserver: If no X-Scheme header, use the normal request value. #695

Merged
merged 1 commit into from
Mar 13, 2013
Merged

Conversation

evanj
Copy link
Contributor

@evanj evanj commented Mar 12, 2013

We ran into this problem when testing OAuth redirects on local development servers. In production, we use a reverse proxy. In testing, we use a local development server. It was always generating a redirect to http://localhost instead of https://localhost because of this issue.

Commit message:

Previously, if xheaders is True and there are no X headers passed (e.g. when
developing locally), scheme was always "http". This makes in "http" or
"https", based on what was actually used for the request.

Add tests for the X-Scheme and X-Forwarded-Proto headers.

Previously, if xheaders is True and there are no X headers passed (e.g. when
developing locally), scheme was always "http". This makes in "http" or
"https", based on what was actually used for the request.

Add tests for the X-Scheme and X-Forwarded-Proto headers.
bdarnell added a commit that referenced this pull request Mar 13, 2013
httpserver: If no X-Scheme header, use the normal request value.
@bdarnell bdarnell merged commit 330d8ec into tornadoweb:master Mar 13, 2013
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants