Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

config: omit Authorization header for empty claims #1284

Merged
merged 1 commit into from
Jun 11, 2021

Conversation

hdonnay
Copy link
Member

@hdonnay hdonnay commented Jun 3, 2021

This change makes the HTTP client configuration method accept a Claims
pointer, and if nil is passed, omits the automatic signing that would
happen if a PSK was configured.

Fixes #1283.

@hdonnay
Copy link
Member Author

hdonnay commented Jun 3, 2021

@majewsky could you give this a try when you get a chance?

@majewsky
Copy link

majewsky commented Jun 4, 2021

@hdonnay Thanks for your quick response on this issue. Unfortunately, I will be on vacation next week, and I did not get to test-driving this PR today. I'll get back to you when I'm back from vacation.

This change makes the HTTP client configuration method accept a Claims
pointer, and if `nil` is passed, omits the automatic signing that would
happen if a PSK was configured.

Fixes quay#1283.

Signed-off-by: Hank Donnay <hdonnay@redhat.com>
hdonnay added a commit to hdonnay/clair that referenced this pull request Jun 11, 2021
This change makes the HTTP client configuration method accept a Claims
pointer, and if `nil` is passed, omits the automatic signing that would
happen if a PSK was configured.

Backports quay#1284.

Signed-off-by: Hank Donnay <hdonnay@redhat.com>
@hdonnay
Copy link
Member Author

hdonnay commented Jun 11, 2021

Feeling confident about this, so I'm going to merge and we can deal with any edge cases that pop-up.

@hdonnay hdonnay merged commit af6a1f4 into quay:main Jun 11, 2021
@hdonnay hdonnay deleted the issue/1283 branch June 11, 2021 19:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

Clair wrongly injects Authorization headers when fetching layers
2 participants