This repository has been archived by the owner on Mar 9, 2022. It is now read-only.
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* If a TDRemoteRequest gets an auth challenge and finds a new credential based on the Realm string, it now remembers that in its authorizer, and the replicator will pick it up and use that as its authorizer from then on. This should help pick up credentials registered with non-empty realms. * TDRemoteRequest now tries the 'proposed' credential, if there is one, on its first pass through the auth challenge handler. * Added more logging about the auth flow, for future debugging needs. I am not sure if these will fix issue #242 but they should help.
- Loading branch information
Showing
3 changed files
with
34 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters