Skip to content

Conversation

@lforst
Copy link
Contributor

@lforst lforst commented Sep 4, 2023

Fixes #8931

Since the tunnel route usually goes through user's domains and our ingest endpoint has HSTS we were unintentionally promoting user's requests which are unrelated to Sentry to https. This PR fixes that by setting the hsts=0 query param on the tunnel request to the ingest endpoint which will disable hsts for the responses as implemented in https://github.com/getsentry/ops/pull/7832.

Should wait for https://github.com/getsentry/ops/pull/7832 to land before merging.

@lforst lforst requested review from AbhiPrasad, Lms24 and mydea September 4, 2023 08:48
@lforst lforst merged commit 3076e09 into develop Sep 6, 2023
@lforst lforst deleted the lforst-tunnel-route-no-hsts branch September 6, 2023 12:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

tunnelRoute passes through Strict-Transport-Security header, enabling HSTS on users' domains

5 participants