mirror of
https://github.com/traefik/traefik.git
synced 2025-05-05 15:33:01 +00:00
Change version for path sanitization migration guide
This commit is contained in:
parent
8816cb86a4
commit
160edff257
@ -657,11 +657,11 @@ Please check out the [entrypoint forwarded headers connection option configurati
|
||||
In `v2.11.14`, the `X-Forwarded-Prefix` header is now handled like the other `X-Forwarded-*` headers: Traefik removes it when it's sent from an untrusted source.
|
||||
Please refer to the Forwarded headers [documentation](../routing/entrypoints.md#forwarded-headers) for more details.
|
||||
|
||||
## v2.11.23
|
||||
## v2.11.24
|
||||
|
||||
### Request Path Sanitization
|
||||
|
||||
Since `v2.11.23`, the incoming request path is now cleaned before being used to match the router rules and sent to the backends.
|
||||
Since `v2.11.24`, the incoming request path is now cleaned before being used to match the router rules and sent to the backends.
|
||||
Any `/../`, `/./` or duplicate slash segments in the request path is interpreted and/or collapsed.
|
||||
|
||||
If you want to disable this behavior, you can set the [`sanitizePath` option](../routing/entrypoints.md#sanitizepath) to `false` in the entryPoint HTTP configuration.
|
||||
|
Loading…
x
Reference in New Issue
Block a user