Skip to content

fix(nextjs): Request for no HSTS in tunnel route endpoint #8936

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Sep 6, 2023

Conversation

lforst
Copy link
Contributor

@lforst lforst commented Sep 4, 2023

Fixes #8931

Since the tunnel route usually goes through user's domains and our ingest endpoint has HSTS we were unintentionally promoting user's requests which are unrelated to Sentry to https. This PR fixes that by setting the hsts=0 query param on the tunnel request to the ingest endpoint which will disable hsts for the responses as implemented in https://github.com/getsentry/ops/pull/7832.

Should wait for https://github.com/getsentry/ops/pull/7832 to land before merging.

@lforst lforst requested review from mydea, Lms24 and AbhiPrasad September 4, 2023 08:48
@lforst lforst merged commit 3076e09 into develop Sep 6, 2023
@lforst lforst deleted the lforst-tunnel-route-no-hsts branch September 6, 2023 12:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

tunnelRoute passes through Strict-Transport-Security header, enabling HSTS on users' domains
4 participants