-
Notifications
You must be signed in to change notification settings - Fork 343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rely on proxy-agent for detecting environment variables #765
Conversation
Note for testers (hello, testers): you can use Spoiler: it works as expected. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note for testers (hello, testers): you can use mitmproxy to verify whether the no_proxy environment variable is being honored or not.
Can we include a test to nt have to test it manually?
This comment has been minimized.
This comment has been minimized.
Can we include a test to nt have to test it manually? |
Yes, we can, of course. If the official |
We have a simple integration test launching a proxy and passing through it already, it does not covers every proxy type on how the SCM responds to them, but at least is one. I was thinking that maybe we could avoid manual test. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I missed an integration test but I guess we can assume it works
👍
Rest assured that it works, and that funcationality is already being tested by the official library. If you want, I can add a test on our side, though. 🤷🏼♂️ We can add an invalid proxy, set Still, it would be slightly pointless; we already use Line 3 in 4f7a5d9
|
This pull request will fix #760 by honoring the
no_proxy
environment variable and add compatibility for proxy types other thanhttps
as listed on this table.