** Description changed:

  Workaround
  ----------
  
- Execute
+ Add
  
-   echo 'default_ccache_name = FILE:/home/%{username}/krb5cc' >>
- /etc/krb5.conf
+   default_ccache_name = FILE:/run/user/%{euid}/krb5cc
  
- so that the Kerberos credentials are stored in a file path a snapped
- application can read.
+ to the [libdefaults] section of /etc/krb5.conf so that the Kerberos
+ credentials are stored in a file path a snapped application can read.
  
  Acknowledgement: For many that can't work for {different reasons}, as
  stated in multiple comments below. Nonetheless it is worth a mention.
  
  Original report
  ---------------
  
  I configure AuthServerWhitelist as documented:
  
  https://www.chromium.org/developers/design-documents/http-authentication
  
  and can see my whitelisted domains in chrome://policy/
  
  but websites that used to work with SPNEGO/GSSAPI/kerberos no longer
  work. I'm guessing the snap needs some sort of permission to use the
  kerberos ticket cache (or the plumbing to do so doesn't exist...).
  
  I can confirm that Chrome has the desired behavior.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849346

Title:
  [snap] kerberos GSSAPI no longer works after deb->snap transition

To manage notifications about this bug go to:
https://bugs.launchpad.net/firefox/+bug/1849346/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to