Bug 1813581 - Enable HTTP Strict Transport Security
Summary: Enable HTTP Strict Transport Security
Keywords:
Status: ON_DEV
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-octavia
Version: 17.0 (Wallaby)
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: ---
Assignee: Tom Weininger
QA Contact: Bruna Bonguardo
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-14 14:31 UTC by Carlos Goncalves
Modified: 2023-07-19 07:12 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 880806 0 None NEW Add support for HTTP Strict Transport Security 2023-07-19 07:10:18 UTC
OpenStack gerrit 880808 0 None NEW Add support for HTTP Strict Transport Security 2023-07-19 07:12:50 UTC
OpenStack gerrit 880821 0 None MERGED Add support for HTTP Strict Transport Security 2023-07-19 07:12:50 UTC
OpenStack gerrit 881553 0 None NEW Add Octavia support for HSTS 2023-07-19 07:12:50 UTC
Red Hat Issue Tracker OSP-2811 0 None None None 2022-11-15 16:48:59 UTC

Description Carlos Goncalves 2020-03-14 14:31:47 UTC
Enables the ability to insert the required Strict-Transport-Security header values.

https://www.haproxy.com/blog/haproxy-and-http-strict-transport-security-hsts-header-in-http-redirects/
https://tools.ietf.org/html/rfc6797


Note You need to log in before you can comment on or make changes to this bug.