[ 
https://issues.apache.org/jira/browse/SHINDIG-1812?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stanton Sievers updated SHINDIG-1812:
-------------------------------------

    Attachment: SHINDIG-1812.patch
    
> X-Shindig-St behaves differently when the security token is null between 
> Firefox and WebKit browsers
> ----------------------------------------------------------------------------------------------------
>
>                 Key: SHINDIG-1812
>                 URL: https://issues.apache.org/jira/browse/SHINDIG-1812
>             Project: Shindig
>          Issue Type: Bug
>          Components: Javascript 
>    Affects Versions: 2.5.0-beta2
>            Reporter: Stanton Sievers
>            Assignee: Stanton Sievers
>             Fix For: 2.5.0-beta3
>
>         Attachments: SHINDIG-1812.patch
>
>
> From Doug Davies:
> Here's what I think it going on.
> In io.js this code
>       var opt_headers = {
>         'X-Shindig-ST' : shindig.auth.getSecurityToken()
>       };
> behaves differently.  Even though I see both browsers set it as follows:
> {"X-Shindig-ST":null}
> later on in UrlParameterAuthenticationHandler it's set to the STRING "null"
> (not the value null) for webkit browsers.
>    // no token yet, see if it was attached as a header
>     if (StringUtils.isEmpty(token)) {
>       String t = request.getHeader( "X-Shindig-ST" );
>       if (StringUtils.isNotBlank(t)) {
>         token = t;
>       }
>     }
> This blows up during decryption:

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to