Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.Sign up
Unhide secure cookies when behind TLS-originating HTTP-Proxy #833
We use the Java cometd client behind a TLS-orginating http proxy. Thus, the communication between cometd client and proxy is unencrypted through plain http.
This will cause the Java cookie store used in
This is very likely to be the actual cause for #644.
Are you aware of a way to "convince" the cookie store to also expose the secure cookies. Or otherwise, do you consider it a useful feature in cometd to allow a workaround of this security feature in Java?
Cometd App --> HTTP --> Envoy --> HTTPS -> Salesforce
These cookies are omitted in the subsequent requests, thus leading to auth errors.
Yes, it can be built like this, modifying the response headers received by salesforce.
However, this seemed to have caused trouble for other people as well:
So basically I wanted to create awareness for this "problem" and potentially help others who face the same issue.
A very simple "fix", yet not ideal would be to build the lookup url in