-
For HTTPS apps, Teleport automatically adds "X-Forwarded-Host" (among others) containing e.g "myapp.teleport.example.org". This causes a mismatch between "Host" (being e.g. "myapp.example.org") and XFH. If these don't match, Django 1.9 and above raise a CSRF error. (c.f this stackoverflow answer or this django ticket) I attempted to add a Header rewrite rule to my app's yaml config, but this seems to be ignored. I even found a test case specifically checking that this header cannot be modified.
Other than placing another reverse proxy (eg. nginx) between teleport and myapp, can I somehow make Teleport not add this header to proxied requests? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
No, unfortunately not. You may be better off relaxing the CSRF restrictions in Django. |
Beta Was this translation helpful? Give feedback.
No, unfortunately not. You may be better off relaxing the CSRF restrictions in Django.