#34290: X-Forwarded-Prefix support
-----------------------------------------+-----------------------------
               Reporter:  Marc Perrin    |          Owner:  nobody
                   Type:  New feature    |         Status:  new
              Component:  HTTP handling  |        Version:  4.1
               Severity:  Normal         |       Keywords:  X-Forwarded
           Triage Stage:  Unreviewed     |      Has patch:  0
    Needs documentation:  0              |    Needs tests:  0
Patch needs improvement:  0              |  Easy pickings:  0
                  UI/UX:  0              |
-----------------------------------------+-----------------------------
 Is there any plan to deal with the **X-Forwarded-Prefix** header?

 (similar to
 {{{
 USE_X_FORWARDED_HOST
 }}}
 and
 {{{
 USE_X_FORWARDED_PORT
 }}}
 for X-Forwarded-Host and X-Forwarded-Port)

 (NB: and as far as X-Forwarded-Proto is concerned, it's usually dealt with
 via
 {{{
 SECURE_PROXY_SSL_HEADER = ('HTTP_X_FORWARDED_PROTO', 'https')
 }}}
 )

 Or is this header not standard enough?

 If not, what would be a standard - or at least effective - way for a user
 to (sort of) customize HttpRequest (get_raw_uri, build_absolute_uri) to
 deal with this header?

-- 
Ticket URL: <https://code.djangoproject.com/ticket/34290>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/01070185e5d8c65f-09fb700e-e0a2-45f8-a65d-c910a0aac5c6-000000%40eu-central-1.amazonses.com.

Reply via email to