-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add CA certificate verification and insecure option #125
add CA certificate verification and insecure option #125
Conversation
I'm active. But the way Hashicorp is dealing with this repository make me feel that they don't need further contributions on this. #29 is 2 years old with lot of effort of keeping the PR up to date. I think I've already signed this CLA twice since I opened this PR. So I ended by forking this into https://github.com/terraform-aws-modules/terraform-provider-http. BTW, feel free to maintain this one and I hope that someone at Hashicorp will get this merged. |
@detro I would like to pull you for a review here, since I saw some recent activity on your side. In case you are too busy, please ping others. Thanks. |
@barryib I saw your fork and currently l‘m using it. Since you are remove the forked provider from the eks module, there is some risk that the fork will be deprecated. |
4c9e8ce
to
c08a54e
Compare
Rebased. |
18a2037
to
3df1515
Compare
3df1515
to
e189244
Compare
Rebased on #142 @bendbennett Can we have an review/merge soon? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
e189244
to
492c2a2
Compare
Hi @bendbennett thanks for the review. I apply all the suggestion except on the ExceptError. since giving the URL would not work without any escape here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I apply all the suggestion except on the ExceptError. since giving the URL would not work without any escape here.
I've added suggestions for using the URL in ExpectError
.
Can you also add a CHANGELOG.md
entry for 3.1.0 (unreleased)
492c2a2
to
f676eab
Compare
f676eab
to
eeb9bb1
Compare
Changed applied. make test is fine.
|
I will add an additional test case for invalid certificates. |
eeb9bb1
to
0d63144
Compare
0d63144
to
1892d8a
Compare
CHANGELOG.md entry added. |
Branch rebased on main. |
23bd0a9
to
1afbe6b
Compare
Rebased. @bendbennett can we merge this PR soon? |
@bendbennett Can I help here to move forward here? |
@jkroepke apologies for the delay in responding. We are just finalising some other changes to the http provider. We will get back to you as soon as we can. |
1afbe6b
to
fa3edc8
Compare
I would much appreciate it, if this can. get merged soon. |
hello @jkroepke - thank you for your contribution and apologies for the delay, we'll be able to put more energy into this over the next few weeks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Apologies for the delay in getting back to you on this PR @jkroepke.
fa3edc8
to
d16de1e
Compare
Rebased. all comments addressed. Tests for the Validators added. I hope, we are complete here now. |
It feels like the No idea, whats wrong here... edit: It should work now. On my local machine. 0.14 is green now. |
Signed-off-by: Jan-Otto Kröpke <jok@cloudeteer.de>
d16de1e
to
600313a
Compare
woohoo, it made it! thanks @jkroepke and maintainers 🎉 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Hi,
this PR is 1:1 copy of #29. The original author looks inactive and is not able to sign the CLA. To unblock the process, I'm create new PR here.
This PR will let user validate TLS certificate with a provided root CA or choose an insecure option with no validation at all.
May solves hashicorp/terraform-provider-aws#11426 and have a lot of common usage.
Link for tests jkroepke#1
Closes: #29
insecure
should conflicts withca_cert_pem
.