-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Tables] Expose client option allowInsecureConnection #15938
Conversation
I am guessing that this is not exposed from |
Fixes #15854 |
Sounds great, this will also be helpful for EventGrid, which is on CoreV2. |
Should we add something to the changelog for core-client or do we normally do a rollup before release by looking at the commit history since the last release? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great!
Hello @joheredi! Because this pull request has the p.s. you can customize the way I help with merging this pull request, such as holding this pull request until a specific person approves. Simply @mention me (
|
|
||
### Features Added | ||
|
||
- Moved `allowInsecureConnection` from `ServiceClientOptions` to `CommonClientOptions` [issue 15938](https://github.com/azure/azure-sdk-for-js/issues/15938) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a PR not an issue:
- Moved `allowInsecureConnection` from `ServiceClientOptions` to `CommonClientOptions` [issue 15938](https://github.com/azure/azure-sdk-for-js/issues/15938) | |
- Moved `allowInsecureConnection` from `ServiceClientOptions` to `CommonClientOptions` [PR 15938](https://github.com/Azure/azure-sdk-for-js/pull/15938) |
In Azure#15938 we exposed the `allowInsecureConnection` option to allow connections to the service over HTTP instead of HTTPS. However, even if a table client was created allowing insecure connections, we would still require a secure connection when submitting a batch transaction, since the implementation of batch operations interact with the pipeline directly. We now record if the client was created allowing insecure connections and thread that information along when creating requests for batch operations. With this change, you can now submit batch transactions to storage emulators, which commonly run over HTTP instead of HTTPS. Fixes Azure#15854
In Azure#15938 we exposed the `allowInsecureConnection` option to allow connections to the service over HTTP instead of HTTPS. However, even if a table client was created allowing insecure connections, we would still require a secure connection when submitting a batch transaction, since the implementation of batch operations interact with the pipeline directly. We now record if the client was created allowing insecure connections and thread that information along when creating requests for batch operations. With this change, you can now submit batch transactions to storage emulators, which commonly run over HTTP instead of HTTPS. Fixes Azure#15854
In Azure#15938 we exposed the `allowInsecureConnection` option to allow connections to the service over HTTP instead of HTTPS. However, even if a table client was created allowing insecure connections, we would still require a secure connection when submitting a batch transaction, since the implementation of batch operations interact with the pipeline directly. We now record if the client was created allowing insecure connections and thread that information along when creating requests for batch operations. With this change, you can now submit batch transactions to storage emulators, which commonly run over HTTP instead of HTTPS. Fixes Azure#15854
In #15938 we exposed the `allowInsecureConnection` option to allow connections to the service over HTTP instead of HTTPS. However, even if a table client was created allowing insecure connections, we would still require a secure connection when submitting a batch transaction, since the implementation of batch operations interact with the pipeline directly. We now record if the client was created allowing insecure connections and thread that information along when creating requests for batch operations. With this change, you can now submit batch transactions to storage emulators, which commonly run over HTTP instead of HTTPS. Fixes #15854
Merge Dev-containerservice-microsoft.containerservice-2021-08-01 branch to main (Azure#15954) * Adds base for updating Microsoft.ContainerService from version stable/2021-07-01 to version 2021-08-01 * Updates readme * Updates API version in new specs and examples * add publicNetworkAccess property per network platform's request (Azure#15489) * add publicNetworkAccess per network platform's request * fix quota Co-authored-by: Li Ma <[email protected]> * update readme for 2021-08-01 sdk generation (Azure#15476) * update readme for sdk generation * update readme for sdk generation Co-authored-by: Charlie Li <[email protected]> * allow disabling of runcommand (Azure#15481) * allow disabling of runcommand * rename file * another rename * fix prittier check * fix stupid prettier check * change publicNetworkAccess to enum (Azure#15564) Co-authored-by: Li Ma <[email protected]> * Add CreationData property to Agentpool level in 2021-08-01 API (Azure#15563) * Add CreationData property to Agentpool level in 2021-08-01 API * fix json format * fix swagger spell check Co-authored-by: Charlie Li <[email protected]> * chore: add enableMultipleStandardLoadBalancers to loadBalancerProfile (Azure#15579) * Add snapshot related new APIs and properties to AKS 2021-08-01 swagger (Azure#15586) * Add CreationData property to Agentpool level in 2021-08-01 API * Add snapshot related APIs and properties to AKS 2021-08-01 swagger * fix lint and spell checks * fix lint and spell checks * fix PrettierCheck * Change some Nodepool to NodePool * some changes according to ARM team's review comments Co-authored-by: Charlie Li <[email protected]> * fix tag typo to match tag convention (Azure#15683) * add workload runtime to agent pool api (Azure#15726) * add workload runtime to agent pool api * reference example * add custom words * fix: workload runtime description (Azure#15782) * fix: workload runtime description * add wasmtime to custom words * clarify single workload type per node Co-authored-by: Matthew Christopher <[email protected]> Co-authored-by: Matthew Christopher <[email protected]> * fix typo in readme.python.md (Azure#15903) * Add CreationData property to Agentpool level in 2021-08-01 API * fix typos in readme.python.md Co-authored-by: Charlie Li <[email protected]> * merge recent custom-words.txt changes from main branch to resolve conflicts (Azure#15938) * Add CreationData property to Agentpool level in 2021-08-01 API * merge recent custom-words.txt changes from main branch to resolve conflicts Co-authored-by: Charlie Li <[email protected]> * pull custom-words.txt from main * add a new word - NodePool * add two more words Co-authored-by: Super <[email protected]> Co-authored-by: Li Ma <[email protected]> Co-authored-by: Charlie Li <[email protected]> Co-authored-by: Haitao Chen <[email protected]> Co-authored-by: Qi Ni <[email protected]> Co-authored-by: Ariel Silverman <[email protected]> Co-authored-by: Ace Eldeib <[email protected]> Co-authored-by: Matthew Christopher <[email protected]>
In order for Tables to connect to Azurite and Storage emulator, the client needs to accept
allowInsecureConnection
. Also when using the emulator connection string shortcut, setting it by default.