aboutsummaryrefslogtreecommitdiff
path: root/sproxy.example.yml
diff options
context:
space:
mode:
authorIgor Pashev <pashev.igor@gmail.com>2016-12-27 21:53:30 +0300
committerIgor Pashev <pashev.igor@gmail.com>2016-12-27 21:53:30 +0300
commitd7e5277c680d73ac2e11aea0b473d98b2d48350c (patch)
tree8b2e2ae8b01ab984ea76a32d2b1bcfe1e78d6763 /sproxy.example.yml
parent43bf95e21d4a616a55b211670076a8c7c48c06a3 (diff)
downloadsproxy2-d7e5277c680d73ac2e11aea0b473d98b2d48350c.tar.gz
Disregard possible port in the Host HTTP header
Motivation: to make it easy to switch Sproxy's primary port. This could be useful when running private (behind Sproxy) and public (e. g. nginx) HTTPS services on the same server. In such a setup one can use port 443 for public services and alt. HTTPS port 8443 for Sproxy. Before this change, Sproxy took possible port number into account when looking for backend and privileges. Now it ignores port and considers domain name only. This also gets Sproxy in line with browsers and SSL certificates: certificates do not include port numbers, browsers ignore ports when sending cookies.
Diffstat (limited to 'sproxy.example.yml')
-rw-r--r--sproxy.example.yml5
1 files changed, 2 insertions, 3 deletions
diff --git a/sproxy.example.yml b/sproxy.example.yml
index 063f51e..0259dfc 100644
--- a/sproxy.example.yml
+++ b/sproxy.example.yml
@@ -147,11 +147,10 @@ ssl_key: /path/key.pem
# Unix sockets should be secured with proper unix file permissions.
#
# Backend attributes:
-# name - the host name as in the Host HTTP header.
+# name - the domain name as in the Host HTTP header (without optional colon and port).
# May include wildcards * and ?. The first matching
# backend will be used. Examples: "*.example.com", "wiki.corp.com".
-# Optional. Default is "*". Note, that the name must include
-# port number if non-standard.
+# Optional. Default is "*".
# address - backend IP address. Optional. Default is 127.0.0.1.
# port - backend TCP port. Required unless unix socket is defined.
# socket - unix socket. Highly recommended for security reasons.