Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ref #1130 - Partial revert of c5ba541 / #904 to allow cert detection in bad ssl #1137

Merged
merged 1 commit into from
Nov 2, 2023

Conversation

mxsasha
Copy link
Collaborator

@mxsasha mxsasha commented Nov 2, 2023

While using a standard HTTP client is good, it does mean we
can't connect to some very obscure setups with it anymore.
In the case of cert detection, the HTTP client was exclusively
used for guessing if there even is any SSL, while the rest of the
code can still handle very bad configs.

As we needed our legacy clients in a few places anyways until
finishing #714, this commit reverts the cert check back to
the legacy client, allowing cert checks in these very bad configs.

Ref #1130

…in bad ssl

While using a standard HTTP client is good, it does mean we
can't connect to some very obscure setups with it anymore.
In the case of cert detection, the HTTP client was exclusively
used for guessing if there even is any SSL, while the rest of the
code can still handle very bad configs.

As we needed our legacy clients in a few places anyways until
finishing #714, this commit reverts the cert check back to
the legacy client, allowing cert checks in these very bad configs.
@mxsasha mxsasha self-assigned this Nov 2, 2023
@mxsasha mxsasha added this to the v1.8 milestone Nov 2, 2023
@mxsasha mxsasha merged commit 3695c9b into main Nov 2, 2023
@mxsasha mxsasha deleted the fix-cert-rc4 branch November 2, 2023 10:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant