Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Add redirect to https viewer protocol policy #1378

Merged
merged 1 commit into from
Feb 1, 2024

Conversation

truggeriaws
Copy link
Contributor

Fixes #1351 by making use of the viewer protocol policy of Cloudfront distributions.

  • Enforces https redirects for clients that do not support HSTS header
  • Applied to all behaviors of Cloudfront distribution

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

* Enforces https for clients that do not support HSTS header
* Applied to all behaviors of Cloudfront distribution
@truggeriaws truggeriaws self-assigned this Jan 30, 2024
@truggeriaws truggeriaws changed the title Add redirect to https viewer protocol policy fix: Add redirect to https viewer protocol policy Jan 30, 2024
Copy link
Contributor

@MrArnoldPalmer MrArnoldPalmer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:shipit:

@cdklabs-automation cdklabs-automation added this pull request to the merge queue Feb 1, 2024
Merged via the queue into main with commit 3c02595 Feb 1, 2024
7 of 8 checks passed
@cdklabs-automation cdklabs-automation deleted the truggeriaws/redirect-to-https branch February 1, 2024 18:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Site is served over http
3 participants