Print

Print


This causes HTTP requests coming in using an X509 proxy to generate a new macaroon used internally.  Since the macaroon serializes the security session, this avoids problems to forward authorization if this is a gateway.
You can view, comment on, or merge this pull request online at:

  https://github.com/xrootd/xrootd/pull/1115

-- Commit Summary --

  * Initial code to internally proxy security credentials with a macaroon.

-- File Changes --

    M src/XrdHttp.cmake (14)
    M src/XrdHttp/XrdHttpProtocol.cc (129)
    M src/XrdHttp/XrdHttpProtocol.hh (5)
    M src/XrdHttp/XrdHttpReq.cc (18)
    M src/XrdHttp/XrdHttpReq.hh (3)
    M src/XrdMacaroons/XrdMacaroonsAuthz.cc (176)
    M src/XrdMacaroons/XrdMacaroonsAuthz.hh (11)
    M src/XrdTpc/XrdTpcTPC.cc (10)

-- Patch Links --

https://github.com/xrootd/xrootd/pull/1115.patch
https://github.com/xrootd/xrootd/pull/1115.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/xrootd/xrootd/pull/1115

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1