SAML_FAKE_HTTPS needs to be configurable without requiring debug mode
See original GitHub issueWhen we run Confidant using Kubernetes we have problems when the SAML_FAKE_HTTPS
is set to false
. We would like to set it to true
without enabling debug mode. Otherwise we get this error:
{
"errors": [
"invalid_response"
],
"message": "SAML request failed",
"reason": "The response was received at http://XXXXX/saml/consume instead of https://XXXXX/saml/consume",
"request_id": null
}
Issue Analytics
- State:
- Created 7 years ago
- Comments:6 (5 by maintainers)
Top Results From Across the Web
Set debug and release configurations - Visual Studio (Windows)
The release configuration of your program has no symbolic debug information and is fully optimized. For managed code and C++ code, ...
Read more >Debugging - MoodleDocs
Using debugging messages. Debugging messages are intended to help diagnose problems and/or help Moodle developers. If you have a problem ...
Read more >Debugging in Visual Studio Code
The Debug: Run (Start Without Debugging) action is triggered with Ctrl+F5 and uses the currently selected launch configuration. Many of the launch configuration...
Read more >Preview and debug containers - Tag Manager Help
Google Tag Manager's preview and debug mode allows you to browse a site on which ... so that you can test a container...
Read more >Configure on-device developer options - Android Developers
Learn how to configure system behaviors that help you profile and debug your ... Note: The adb demo mode commands might not work...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
If you have a reverse proxy in front then X-Forwarded-Proto should solve your problem here. You need to set
--forwarded-allow-ips=*
for your gunicorn config for this, though; see https://github.com/lyft/confidant/issues/50In #50 I mentioned that we’re recommending setting the FORWARDED_ALLOW_IPS environment var when running the docker image, because it’s difficult to modify the setting if we set it by default in the image. We may followup later and have the docker image run a script as a command where we have a bit more flexibility in how we start the process in docker.