On Thu, 17 Oct 2024 10:36:32 GMT, Michael McMahon <micha...@openjdk.org> wrote:

>> Hi,
>> 
>> I closed https://github.com/openjdk/jdk/pull/21249 and am continuing the 
>> review on this PR.
>> 
>> This fix relaxes the constraints on user set authentication headers. 
>> Currently, any user set authentication headers are filtered out, if the 
>> HttpClient has an Authenticator set. The reason being that the authenticator 
>> is expected to manage authentication. With this fix, it will be possible to 
>> use pre-emptive authentication through user set headers, even if an 
>> authenticator is set. The expected use case is where the authenticator would 
>> manage either proxy or server authentication and the user set headers would 
>> manage server authentication if the authenticator is managing proxy (or vice 
>> versa).
>> 
>> A CSR will be filed to document this change.
>> 
>> Thanks,
>> Michael
>
> Michael McMahon has updated the pull request incrementally with one 
> additional commit since the last revision:
> 
>   test update

test/jdk/java/net/httpclient/UserAuthWithAuthenticator.java line 158:

> 156:             } else {
> 157:                 assertTrue(resp.statusCode() == 200, "Expected 200 
> response");
> 158:                 assertTrue(!h.authValue().equals(encoded), "Expected 
> user set header to not be set");

It would be good to have a third scenario where the provided user header are 
bad (e.g. wrong password) and we verify that 401 is returned and that the 
request is not retried with the authenticator.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/21408#discussion_r1805032589

Reply via email to