Restricting X-Forwarded-* header parsing #29887
Answered
by
sberyozkin
Doctor-love
asked this question in
Q&A
-
Hi y'all, Is it possible in Quarkus to restrict from which IP addresses the X-Forwarded-* headers are parsed/trusted? My use-case is exposing a distributed application both via a load balancer and direct connections, but for traceability I don't want to enable trivial spoofing of source IP addresses. Something like "quarkus.http.proxy.allow-forwarded-from=ip.address.of.loadbalancer" would be useful. |
Beta Was this translation helpful? Give feedback.
Answered by
sberyozkin
Dec 15, 2022
Replies: 1 comment
-
Hi @Doctor-love I've opened an enhancement request at #29888 |
Beta Was this translation helpful? Give feedback.
0 replies
Answer selected by
Doctor-love
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi @Doctor-love I've opened an enhancement request at #29888