-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated Dashboard to accept/map forwarded headers #6969
base: main
Are you sure you want to change the base?
Updated Dashboard to accept/map forwarded headers #6969
Conversation
@JamesNK @drewnoakes |
I’m that doesn’t seem right. Do you need to forward all headers? |
@davidfowl I just need For example if a developer uses Yarp to cut the SSL connection at the edge they will need to map the Protocol too. |
@adamint @davidfowl i have limited the forwarded headers to host and protocol, let me know your thoughts. |
Description
This change addresses the need to map the forwarded headers in the application when ASPNETCORE_FORWARDEDHEADERS_ENABLED is enabled. Currently even if a developer enables the ASPNETCORE_FORWARDEDHEADERS_ENABLED environment variable, the application does not map the forwarded headers properly because the application doesn't specify which headers to map.
Without this change the dashboard doesn't work well behind a reverse proxy like YARP when doing OpenID Auth since the app doesn't map the Host or Protocol (http/https) properly and the redirect ends up being the address YARP redirects the call to.
I need guidance for the test I was thinking calling the dashboard and do something similar to
ValidateTokenMiddlewareTests
to validate theHost
, andProto
.Fixes # (issue)
Checklist
<remarks />
and<code />
elements on your triple slash comments?breaking-change
template):doc-idea
template):Microsoft Reviewers: Open in CodeFlow