This bug has been migrated to another issue tracking site. It has been closed here and may no longer be being monitored.

If you would like to get updates for this issue, or to participate in it, you may do so at Red Hat Issue Tracker .
Bug 1813581 - Enable HTTP Strict Transport Security
Summary: Enable HTTP Strict Transport Security
Keywords:
Status: CLOSED MIGRATED
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-octavia
Version: 17.0 (Wallaby)
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: ---
Assignee: Tom Weininger
QA Contact: Bruna Bonguardo
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-14 14:31 UTC by Carlos Goncalves
Modified: 2023-10-10 13:16 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-10-10 13:15:19 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 880806 0 None MERGED Add support for HTTP Strict Transport Security 2024-02-13 09:37:30 UTC
OpenStack gerrit 880808 0 None MERGED Add support for HTTP Strict Transport Security 2024-02-13 09:37:33 UTC
OpenStack gerrit 880821 0 None MERGED Add support for HTTP Strict Transport Security 2023-07-19 07:12:50 UTC
OpenStack gerrit 881553 0 None MERGED Add Octavia support for HSTS 2024-02-13 09:37:34 UTC
Red Hat Issue Tracker   OSP-2811 0 None None None 2023-10-10 13:15:18 UTC
Red Hat Issue Tracker OSP-29580 0 None None None 2023-10-10 13:16:33 UTC

Description Carlos Goncalves 2020-03-14 14:31:47 UTC
Enables the ability to insert the required Strict-Transport-Security header values.

https://www.haproxy.com/blog/haproxy-and-http-strict-transport-security-hsts-header-in-http-redirects/
https://tools.ietf.org/html/rfc6797


Note You need to log in before you can comment on or make changes to this bug.