Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upadded configuration options for ForwardedHeaders #394
Conversation
|
There are many other projects as well: Identity, Icons, Notifications, etc. Do these all need these options too? |
|
These projects don't need the client IP. API and Admin use the IP for access logging |
|
Ok. Can you explain what type of setup you have here that is requiring these headers vs a regular installation? |
|
Our BitWarden setup is running on OpenShift. With this setup, each project has a different IP. When nginx is passing the X-Forwarded-For headers upstream, the API does not use this information as the nginx ip is not in its list of KnownProxies or KnownNetworks |
Do you mean each Bitwarden project (API, Admin, etc) or something else? |
|
yes, that's the issue |
|
If Admin and API have different proxy IP addresses then this solution would not work. You have it specified in global settings, which there is only one of (defined in global env file) that will apply to all containers. |
|
Admin and API get served by the same proxy but they reject the headers |
|
|
This allows for the use of load balancers not connected via localhost