This causes HTTP requests coming in using an X509 proxy to generate a new macaroon used internally. Since the macaroon serializes the security session, this avoids problems to forward authorization if this is a gateway.
You can view, comment on, or merge this pull request online at:
https://github.com/xrootd/xrootd/pull/1115
Commit Summary
- Initial code to internally proxy security credentials with a macaroon.
File Changes
Patch Links:
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/xrootd/xrootd/pull/1115?email_source=notifications\u0026email_token=AA7NRDW4EU4HW7EEL6MSGMLQ54IEBA5CNFSM4KHD2E2KYY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4IGLLT2A",
"url": "https://github.com/xrootd/xrootd/pull/1115?email_source=notifications\u0026email_token=AA7NRDW4EU4HW7EEL6MSGMLQ54IEBA5CNFSM4KHD2E2KYY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4IGLLT2A",
"name": "View Pull Request"
},
"description": "View this Pull Request on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
}
]
Use REPLY-ALL to reply to list
To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1