Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for X-Forwarded-* (and/or Forwarded) headers #1563

Open
nblumhardt opened this issue May 3, 2022 · 1 comment
Open

Support for X-Forwarded-* (and/or Forwarded) headers #1563

nblumhardt opened this issue May 3, 2022 · 1 comment

Comments

@nblumhardt
Copy link
Member

Seq uses api.canonicalUri to generate inbound links that target a particular scheme, hostname, port, and path, irrespective of whether Seq thinks its listening at that location or sees the correct location on inbound requests.

This works well in many different cases, but in a few situations it's not flexible enough - for example, if OIDC or Azure AD authentication is used, but Seq is accessed via two different hostnames, a single canonical URI is insufficient to generate the correct inbound link for users using each address.

Enabling forwarded header support, via X-Forwarded-* (or the newer Forwarded header) will cover these cases. Support needs to be opt-in as these headers can only be validly/safely used behind a trusted proxy in a secured environment.

@codymullins
Copy link

codymullins commented Jun 18, 2024

+1 to this, just locked myself out enabling Entra ID authentication because our Seq instance is http but using a proxy for http 😬

set the canonical uri in the env variables, but it would be nice to just have it work if the proxy headers are enabled.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants