if ((info->flags & AUTH_REQUEST_FLAG_SUPPORT_FINAL_RESP) != 0)
str_append(str, "\tfinal-resp-ok");
- if ((info->flags & AUTH_REQUEST_FLAG_SECURED) != 0) {
+ if ((info->flags & AUTH_REQUEST_FLAG_CONN_SECURED) != 0) {
str_append(str, "\tsecured");
if ((info->flags & AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS) != 0) {
str_append(str, "=tls");
struct auth_client_request;
enum auth_request_flags {
- AUTH_REQUEST_FLAG_SECURED = 0x01,
+ /* Connection from the previous hop (client, proxy, haproxy) is
+ considered secured. Either because TLS is used, or because the
+ connection is otherwise considered not to need TLS. Note that this
+ doesn't necessarily mean that the client connection behind the
+ previous hop is secured. */
+ AUTH_REQUEST_FLAG_CONN_SECURED = 0x01,
AUTH_REQUEST_FLAG_VALID_CLIENT_CERT = 0x02,
/* Skip penalty checks for this request */
AUTH_REQUEST_FLAG_NO_PENALTY = 0x04,
info.mech = mech;
info.service = "test";
info.session_id = "23423dfd243daaa223";
- info.flags = AUTH_REQUEST_FLAG_SECURED;
+ info.flags = AUTH_REQUEST_FLAG_CONN_SECURED;
(void)net_addr2ip("10.0.0.15", &info.local_ip);
info.local_port = 143;
if (client->connection_tls_secured || client->haproxy_terminated_tls)
auth_flags |= AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS;
if (client->connection_secured)
- auth_flags |= AUTH_REQUEST_FLAG_SECURED;
+ auth_flags |= AUTH_REQUEST_FLAG_CONN_SECURED;
if (login_binary->sasl_support_final_reply)
auth_flags |= AUTH_REQUEST_FLAG_SUPPORT_FINAL_RESP;
return auth_flags;