[
https://issues.apache.org/jira/browse/CB-1494?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13457394#comment-13457394
]
Patrick Mueller commented on CB-1494:
-------------------------------------
This commit looks fine to me, in terms of the code.
I was wondering about "security aspects", but really the ip is only used to
further namespacing of the connection, and to ensure subsequent connections are
from the same ip. I don't think there are really any further security
implications by blindly reading/writing the xff header value.
Although, I'm wondering about places we dump the ip address into HTML to being
with - like in the remote panel. Can someone check that?
Also note that it wasn't immediately clear to me that the XFF header can
actually be a set of IP addresses, not just one. See:
http://rod.vagg.org/2011/07/wrangling-the-x-forwarded-for-header/
Again, I don't think this impacts anything, as it's a namespacing deal,
primarily, though it does show up in the UI in places.
Should we add something to the doc? I'm thinking a quick mention that we
support XFF should be good enough.
> Supports running server behind a proxy, such as Heroku Cedar
> ------------------------------------------------------------
>
> Key: CB-1494
> URL: https://issues.apache.org/jira/browse/CB-1494
> Project: Apache Cordova
> Issue Type: New Feature
> Components: weinre
> Reporter: Patrick Mueller
> Assignee: Patrick Mueller
>
> created for https://github.com/apache/incubator-cordova-weinre/pull/10
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira