-
Notifications
You must be signed in to change notification settings - Fork 349
prevent HTTP 413 #285
Comments
How do your cookie sizes look like in the browser? There was my issue and my PR, which increase the effective size of data in the cookies - #278 - Do you use latest master branch version? |
Thanks for this feature @jangaraj . I saw that and compiled from latest master branch but that didn't help in my case. The Cookie payload was around 3.8k. I guess my upstream has a hard header limit of 4k for all headers combined. I fixed it by stripping my JWT payload to the absolute minimum but It would be nice if the keycloak-proxy provides a switch to drop the openidc cookies on reverse proxying. |
I agree. I have had a similar issue, but I was able to increase header size limit in my infrastructure. My suggestion:
|
hi @pschulten ... i've started a PR to add the functionality #287 .. just need to fix up the unit test but i should have this available by the weekend |
fixed in #287 |
Note about potential cookie suffix: 81c7892 |
good spot @jangaraj !!!! ... i'll amend the check and update the unit test ... thank you kindly :-) |
Ty! Works. Nice solution. |
@gambol99 Thanks for this project.
Is it possible to not send the Cookie Header to upstream?
In my current use-case I have no control on upstream and it has a very conservative header size policy :(
With encryption and refresh tokens the Cookie header is too large for upstream and it sends an 413
The text was updated successfully, but these errors were encountered: