engineering grouparoo
2021-03-17 - Originally posted at https://www.grouparoo.com/blog/dont-use-underscores-in-http-headers
↞ See all posts
Don’t use underscores in your HTTP Headers... at least according to AWS and Nginx!
1# TLDR; 2curl --HEADER "AUTH_TOKEN: abc" example.com # is bad 3curl --HEADER "AUTH-TOKEN: abc" example.com # is OK
Grouparoo is a self-hosted application, and we are always helping folks run and deploy our service in new ways. Recently, we’ve been working an example application for Amazon Web Service’s (AWS) Elastic Beanstalk service. Elastic Beanstalk is AWS’s original Platform as a Service (PaaS) which means you can deploy your application without having to directly manage the servers yourself. Also, Elastic Beanstalk servers are within you Virtual Private Cloud (VPC), so they are good choice if you want to integrate with any of AWS’ other services, like a database or cache.
The app-example-aws
app deployed just fine, but we were running into a strange bug: users of our web UI would be logged out on every subsequent page load! We weren’t seeing this behavior on any of the other hosting platforms we’ve used, including other AWS deployments hosting options. What could be wrong?
Eventually we narrowed down the problem to communication between our website UI and the API server. The Grouparoo UI server uses a special header, X-GROUPAROO-SERVER_TOKEN
, along with the users’s session cookie, to authenticate against the API to pre-hydrate our pages on behalf of the user making the request. This page hydration request was the only type of request failing. Eventually we got into the weeds of the network request, and saw that the API was never receiving the X-GROUPAROO-SERVER_TOKEN
header, but everything else was coming though OK:
1{ 2 "headers": { 3 "connection": "upgrade", 4 "host": "app-example-aws.example.com", 5 "x-real-ip": "172.31.xxx.xxx", 6 "x-forwarded-for": "54.157.xxx.xxx, 172.31.xxx.xxx", 7 "x-forwarded-proto": "https", 8 "x-forwarded-port": "443", 9 "x-amzn-trace-id": "Root=1-60517ca4-xxxxx", 10 "accept": "application/json", 11 "content-type": "application/json", 12 "cookie": "grouparooSessionId=xxxxxxxxxx", 13 "user-agent": "axios/0.21.1" 14 } 15}
After some digging, we learned that Elastic Beanstalk fronts its applications with Nginx acting as a reverse proxy, which by default, considers headers with underscores CGI commands of yore and ignores them. By default the Nginx option underscores_in_headers
is off
, and you can learn more here. Please note that using underscores in headers is perfectly valid per the HTTP spec, but Nginx, by default, will ignore them.
It was a matter of preference whether or not right thing to do was to change the header we use and not use underscores (X-GROUPAROO-SERVER-TOKEN
) , or to modify the Nginx reverse proxy configuration on our Elastic Beanstalk servers (which is possible - see here). At the end of the day we want Grouparoo to work out-of-the box on as many platforms as possible without needing custom configuration. Nginx is a wildly popular web server, load balancer, and reverse proxy - and we should to be compatible with its defaults. To that end, we opted to change our headers not to use underscores. I recommend that everyone else developing a web application do the same and follow Nginx's defaults to avoid problems like this down the road.
I write about Technology, Software, and Startups. I use my Product Management, Software Engineering, and Leadership skills to build teams that create world-class digital products.
Get in touch