summaryrefslogtreecommitdiff
path: root/docs/release-notes/version-4.4.9.rst
blob: b64d626226662c5ae8b75256dec7179bf2df039a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
=============
Version 4.4.9
=============

Version 4.4.9 of mod_wsgi can be obtained from:

  https://codeload.github.com/GrahamDumpleton/mod_wsgi/tar.gz/4.4.9

For details on the availability of Windows binaries see:

  https://github.com/GrahamDumpleton/mod_wsgi/tree/master/win32

Features Changed
----------------

1. The ``--proxy-url-alias`` option of ``mod_wsgi-express`` has been
superseded by the ``--proxy-mount-point`` option. This option now should
only be used to proxy to a whole site or sub site and not individual file
resources. If the mount point URL for what should be proxied doesn't have a
trailing slash, the trailing slash redirection will first be performed on
the proxy for the mount point rather than simply passing it through to
the backend.

2. The signal handler intercept will now be removed automatically from a
Python child process forked from either an Apache child process or a daemon
process. This avoids the requirement of setting ``WSGIRestrictSignal`` to
``Off`` if wanting to setup new signal handlers from a forked child process.

3. The signal handler registrations setup in daemon processes to manage
process shutdown, will now revert to exiting the process when invoked from
a Python process forked from a daemon process. This avoids the need to set
new signal handlers in forked processes to override what was inherited.

Note that this only applies to processes forked from daemon mode processes.
If you are forking processes when your WSGI application is running in
embedded mode, it is still a good idea to set signal handles for ``SIGINT``,
``SIGTERM`` and ``SIGUSR1`` back to ``SIG_DFL`` using ``signal.signal()``
if you want to avoid the possibility of strange behaviour due to the
inherited Apache child worker process signal registrations.

New Features
------------

1. Added ``--hsts-policy`` option to ``mod_wsgi-express`` to allow a HSTS
(``Strict-Transport-Security``) policy response header to be specified which
should be included when the ``--https-only`` option is used to ensure that
the site only accepts HTTPS connections.

2. Added ``WSGITrustedProxyHeaders`` directive. This allows you to specify
a space separated list of inbound HTTP headers used to transfer client
connection information from a proxy to a backend server, that are trusted.
When the specified headers are seen in a request, the values passed via
them will be used to fix up the values in the WSGI ``environ`` dictionary
to reflect client information as was seen by the proxy.

Only the specific headers you are expecting and which is guaranteed to have
only been set by the proxy should be listed. Whether it exists or not, all
other headers in a category will be removed so as to avoid an issue with
a forged header getting through to a WSGI middleware which is looking for a
different header and subsequently overriding whatever the trusted header
specified. This applies to the following as well when more than one
convention is used for the header name.

The header names which are accepted for specifying the HTTP scheme used are
``X-Forwarded-Proto``, ``X-Forwarded-Scheme`` and ``X-Scheme``. It is
expected that the value these supply will be ``http`` or ``https``. When it
is ``https``, the ``wsgi.url_scheme`` value in the WSGI ``environ``
dictionary will be overridden to be ``https``.

Alternate headers accepted are ``X-Forwarded-HTTPS``, ``X-Forwarded-SSL``
and ``X-HTTPS``. If these are passed, the value needs to be ``On``,
``true`` or ``1``. A case insensitive match is performed. When matched, the
``wsgi.url_scheme`` value in the WSGI ``environ`` dictionary will be
overridden to be ``https``.

The header names which are accepted for specifying the target host are
``X-Forwarded-Host`` and ``X-Host``. When found, the value will be used
to override the ``HTTP_HOST`` value in the WSGI ``environ`` dictionary.

The sole header name accepted for specifying the front end proxy server
name is ``X-Forwarded-Server``. When found, the value will be used to
override the ``SERVER_NAME`` value in the WSGI ``environ`` dictionary.

The sole header name accepted for specifying the front end proxy server
port is ``X-Forwarded-Port``. When found, the value will be used to
override the ``SERVER_PORT`` value in the WSGI ``environ`` dictionary.

The header names accepted for specifying the client IP address are
``X-Forwarded-For`` and ``X-Real-IP``. When ``X-Forwarded-For`` is used
then the first IP address listed in the header value will be used. For
``X-Real-IP`` only one IP address should be given. When found, the value
will be used to override the ``REMOTE_ADDR`` value in the WSGI ``environ``
dictionary.

Note that at present there is no facility for specifying a list of trusted
IP addresses to be specified for front end proxies. This will be a feature
added in a future version. When that is available and ``X-Forwarded-For``
is used, then the IP address preceding the furthest away trusted proxy IP
address will instead be used, even if not the first in the list.

The header names accepted for specifying the application mount point are
``X-Script-Name`` and ``X-Forwarded-Script-Name``. When found, the value
will override the ``SCRIPT_NAME`` value in the ``WSGI`` environ dictionary.

When using ``mod_wsgi-express`` the equivalent command line option is
``--trust-proxy-header``. The option can be used multiple times to specify
more than one header.