This causes HTTP requests coming in using an X509 proxy to generate a new macaroon used internally. Since the macaroon serializes the security session, this avoids problems to forward authorization if this is a gateway. You can view, comment on, or merge this pull request online at: https://github.com/xrootd/xrootd/pull/1115 -- Commit Summary -- * Initial code to internally proxy security credentials with a macaroon. -- File Changes -- M src/XrdHttp.cmake (14) M src/XrdHttp/XrdHttpProtocol.cc (129) M src/XrdHttp/XrdHttpProtocol.hh (5) M src/XrdHttp/XrdHttpReq.cc (18) M src/XrdHttp/XrdHttpReq.hh (3) M src/XrdMacaroons/XrdMacaroonsAuthz.cc (176) M src/XrdMacaroons/XrdMacaroonsAuthz.hh (11) M src/XrdTpc/XrdTpcTPC.cc (10) -- Patch Links -- https://github.com/xrootd/xrootd/pull/1115.patch https://github.com/xrootd/xrootd/pull/1115.diff -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/xrootd/xrootd/pull/1115 ######################################################################## Use REPLY-ALL to reply to list To unsubscribe from the XROOTD-DEV list, click the following link: https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1