-
Notifications
You must be signed in to change notification settings - Fork 286
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/v2 http-plugin dangerous settings / disable ssl verification - issue #518 #2204
base: v2
Are you sure you want to change the base?
Feature/v2 http-plugin dangerous settings / disable ssl verification - issue #518 #2204
Conversation
No manual version bumps, only change files like https://github.com/tauri-apps/plugins-workspace/blob/10ce3537b460a1e72e8c9063f6ad910a24140664/.changes/persist-cookies.md |
Package Changes Through 6c58554There are 2 changes which include http with minor, http-js with minor Planned Package VersionsThe following package releases are the planned based on the context of changes in this pull request.
Add another change file through the GitHub UI by following this link. Read about change files or the docs at github.com/jbolda/covector |
…om/RickeyWard/tauri-apps-plugins-workspace into feature/v2-http-dangerous-settings
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Since the HTTP plugin uses Reqwest under the hood, this adds the ability to set Reqwest client builder flags for danger_accept_invalid_certs and danger_accept_invalid_hostnames
Its on the roadmap as a proposal via #518
I'm uncertain how versioning works with the plugins-workspace monorepo, but I bumped the version of the http plugin.
I put this behind a feature flag for security reasons.
I attempted to follow existing conventions as closely as possible.
API changes allow for