Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Selectively enable client X509 authentication #1563

Merged
merged 3 commits into from
Aug 19, 2024

Conversation

bbockelm
Copy link
Collaborator

When a requested object matches a pre-configured set of paths, then indicate to the cache it should turn on client X509 authentication.

This fixes support for legacy OSDF namespaces which may require the cache to use client X509 authentication when requesting from the origin because a token is not otherwise available.

Fixes #1562

When a requested object matches a pre-configured set of paths, then
indicate to the cache it should turn on client X509 authentication.

This fixes support for legacy OSDF namespaces which may require the
cache to use client X509 authentication when requesting from the
origin because a token is not otherwise available.
@bbockelm bbockelm requested a review from jhiemstrawisc August 16, 2024 13:56
Copy link
Member

@jhiemstrawisc jhiemstrawisc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I tested for the header and everything looks good. I changed the specified default prefixes for OSDF to include a trailing /, which I think is marginally safer given the way we do matching to construct the X-Osdf-X509 header.

@jhiemstrawisc jhiemstrawisc merged commit 212f1e5 into PelicanPlatform:main Aug 19, 2024
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add support for X.509-authenticated origins
2 participants