mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-02 04:38:36 +00:00
fix(gateway): add HSTS header hardening and docs
This commit is contained in:
@@ -119,6 +119,10 @@ export const FIELD_HELP: Record<string, string> = {
|
||||
"Gateway HTTP API configuration grouping endpoint toggles and transport-facing API exposure controls. Keep only required endpoints enabled to reduce attack surface.",
|
||||
"gateway.http.endpoints":
|
||||
"HTTP endpoint feature toggles under the gateway API surface for compatibility routes and optional integrations. Enable endpoints intentionally and monitor access patterns after rollout.",
|
||||
"gateway.http.securityHeaders":
|
||||
"Optional HTTP response security headers applied by the gateway process itself. Prefer setting these at your reverse proxy when TLS terminates there.",
|
||||
"gateway.http.securityHeaders.strictTransportSecurity":
|
||||
"Value for the Strict-Transport-Security response header. Set only on HTTPS origins that you fully control; use false to explicitly disable.",
|
||||
"gateway.remote.url": "Remote Gateway WebSocket URL (ws:// or wss://).",
|
||||
"gateway.remote.token":
|
||||
"Bearer token used to authenticate this client to a remote gateway in token-auth deployments. Store via secret/env substitution and rotate alongside remote gateway auth changes.",
|
||||
|
||||
Reference in New Issue
Block a user