Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Send Authorization header irrespective of previous authentication status (#178) #183

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

chamakuri-vineel
Copy link

  • Currently 'force_preemptive' flag sends the 'Authorization' header only for the first call and not for subsequent calls. This is because 'Authorization' header is preemptively sent only if the request is not authenticated. The status of authentication is stored as 'auth_done' instance variable. Since all the HTTP calls use the same instance of HTTPKerberosAuth class the 'auth_done' instance variable is set to True after first successful authentication and thus 'Authorization' header is not set preemptively after that.
  • The fix is to send the Authorization header irrespective of the authentication status of previous call.

@chamakuri-vineel
Copy link
Author

@mkomitee @josecastroleon @dpursehouse please review the PR. This is to fix #178 issue.

…tus (requests#178)

- Currently 'force_preemptive' flag sends the 'Authorization' header only for the
  first call and not for subsequent calls. This is because 'Authorization' header
  is preemptively sent only if the request is not authenticated. The status of
  authentication is stored as 'auth_done' instance variable.
  Since all the HTTP calls use the same instance of HTTPKerberosAuth class
  the 'auth_done' instance variable is set to True after first successful
  authentication and thus 'Authorization' header is not set preemptively
  after that.
- The fix is to send the Authorization header irrespective of the
  authentication status of previous call.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant