mirror of
https://github.com/ovh/the-bastion.git
synced 2026-05-09 16:35:33 +02:00
[GH-ISSUE #564] [Feature] Improve compatibilty with reverse proxies #147
Labels
No labels
answered
bug
documentation
enhancement
enhancement
feature
feature
kept-open-for-info
pull-request
question
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/the-bastion#147
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @DavidutzDev on GitHub (Jul 10, 2025).
Original GitHub issue: https://github.com/ovh/the-bastion/issues/564
Hello,
This might not be a priority or a main feature of Bastion. But since there's a HTTP Proxy service it may still be relative to the project. Here's a detailed version of my issue.
I'm currently running a network where I want Bastion to be the only secured entry point. Behind bastion I have a Traefik instance serving as my main reverse proxy to route my domain names to the correct WebUI. (I've seen issues opened relating the same problems but I didn't had any issue in forwarding a WebUI without reverse proxy).
Currently the main issue I have is that Bastion doesn't seems to forward the dns name to the targeted source.
Working situation :
USER -> BASTION -> NGINXNot working situation
USER -> BASTION -> TRAEFIK -> NGINXI didn't give a look to the internal implementation of the proxy used by bastion but here's what I have observed. I also mention that either HTTPS and HTTP routes are enabled in my reverse proxy and no one worked. Is it even possible using Bastion to achieve what I try to do ? Is there any quick fix ? Or is it a whole feature that isn't even on plans ?
I am open and available to share any additional information if that could help.
(also sorry if the message isn't clear and need more details).
Here's a small dump of the logs of my tests :
Thanks for reading !
@speed47 commented on GitHub (Sep 11, 2025):
Indeed the "Host" header is not crafted currently on the egress side, but I reckon it might be of use if the remote webserver has several hostnames with differing contents on the same IP.
Our main use case is network devices APIs, and there's no need of the "host" header, but it should be easy to add nonetheless!
@speed47 commented on GitHub (Sep 11, 2025):
Merged, will be included in the next release :)