-
Bug
-
Resolution: Done
-
Minor
-
None
-
False
-
False
-
Not Started
-
Not Started
-
Not Started
-
Not Started
-
Not Started
-
Not Started
-
No
-
+
-
Undefined
-
If IP Check Policy is configured in the UI as shown below:
Error_msg: IP address not allowed Client_IP_SOURCES : Get the IP from the X-Forwarded header( first IP of the list ) IP* List of IPS : <whitelist-ip> check_type( The type of check to apply ) : Allow only the IPS included in the list
then an API call with X-forwarded-for header with only ',' will result in the following Internal Error instead of being rejected.
<html>
<head><title>500 Internal Server Error</title></head>
<body>
<center><h1>500 Internal Server Error</h1></center>
<hr><center>openresty</center>
</body>
</html>