-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Thoughts on supporting authorization headers when fetching dependencies #973
Comments
Here's also an idea: import { env } from "deno";
const auth = env()["AUTH"]
import(`https://pkg.example.com/lodash@4.17.11/index.js?auth=${auth}`).then(m => {
console.log(m)
}) |
@reggi I tried using something like your example but it wouldn't work, I don't think import works at runtime at all? - so we can't construct URLs at runtime I take your idea was not intended as a working example |
I wonder if like authentication (or mere string replacements) for URL imports ought to be supported by deno itself, or if deno expects users to build proxy-servers instead in order to achieve this. It seems to me the former is preferred, enabling a way (like a |
this might relate to #1921 which might enable people to authenticate with tokens passed as URL params? |
Auth can be done using the |
As far as I can tell, --cert adds an untrusted RootCA but doesn't help with presenting a client certificate to the private server for mTLS. |
I've been thinking about how to maintain private files on a server and allowing deno to pull in those files.
Are there any thoughts on supporting basic auth or allowing deno to send any kind of auth header token?
The text was updated successfully, but these errors were encountered: