Open
Description
Proposed change
At Airbnb, we have an internal deployment of configurable-http-proxy which sits behind our company-wide authentication proxy. The jupyter-rsession-proxy extension breaks with the x-forwarded-port
header set by configurable-http-proxy; so we forcibly replace it with an empty string.
That breaks some other open source IDEs (e.g. Zeppelin) so I'm wondering if there's a way to configure configurable-http-proxy to not set the x-forwarded-port
header at all, while passing all other existing x-forwarded-*
headers through.
Alternative options
None that I'm aware of.
Who would use this feature?
Enterprises using configurable-http-proxy behind additional proxy layers.
(Optional): Suggest a solution
A CLI flag --drop-header
that can be repeatedly set and causes those header key/value pairs to be dropped entirely.