This repository has been archived by the owner on Feb 22, 2022. It is now read-only.
[stable/nginx-ingress] Pass correct headers to downstream applications when letting AWS terminate SSL. #23559
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What this PR does / why we need it:
The README offers a sample configuration for terminating SSL with an ELB on AWS's side. When this configuration is used, the header
X-Forwarded-Proto
is rewritten by nginx to always behttp
(what nginx sees), rather thanhttp
orhttps
(what the ELB saw).Some example behaviors I observed as a result:
Setting
use-forwarded-headers
to true, anduse-proxy-protocol
to false in the ingress controller config corrects this, so thatX-Forwarded-Proto
readshttp
for a plain HTTP session, andhttps
for an HTTPS session.Since the behavior as-documented seemed broken, I chose to add these two parameters to the documentation.
Which issue this PR fixes
N/A
Special notes for your reviewer:
The link in the documentation was also broken, so I updated it.
I don't know if the broken config is correct in some other context, but I can't think of one, and it seems like it was just oversight.
Checklist
[stable/mychartname]
)