feat: TLS config option availability using the client options#1168
feat: TLS config option availability using the client options#1168ssi-anik wants to merge 6 commits intogetsentry:masterfrom
Conversation
aldy505
left a comment
There was a problem hiding this comment.
Curious, wouldn't it possible to set the *tls.Config from ClientOptions.HTTPClient?
|
@aldy505 yes, it could be done. But setting the value using that HttpClient will require more lines. Also, allowing the package to choose the defaults rather than having the task done by the developer. |
|
I'm a bit doubtful with the actual usefulness of this and don't really want to populate the clientOptions with so many conflicting options. Currently TlsConfig completely overrides CaCerts, which might be confusing to users, so even if we want to add the option we need to:
In general the plan at some point is to deprecate the current transport and use the new one, when it would make sense to simplify the httpConfig to actually make sense and make all the breaking changes then. |
|
@giortzisg Thanks for your concern. Firstly, in my case, the use case of As the
Yes, when trying to include breaking changes, you might do things like that. But IMO, it was the least change someone has to add to get their application running as soon as they figure it out, just like I did. |
Let's at least try and merge the two in case that TlsConfig exists without any CaCerts |
Did you mean to say that if the developer provides both the However, my thought was that if the developer is adding |
if TlsConfig already specifies CaCerts then the other option gets ignored, but if TlsConfig doesn't and CaCerts does, we need to merge them. So the precedence would go from: |
…ored, but if TlsConfig doesn't and CaCerts does, we need to merge them
Added those changes mention in your comment. |
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with Cloud Agents, enable Autofix in the Cursor dashboard.
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #1168 +/- ##
==========================================
+ Coverage 86.04% 86.05% +0.01%
==========================================
Files 62 63 +1
Lines 6090 6169 +79
==========================================
+ Hits 5240 5309 +69
- Misses 635 644 +9
- Partials 215 216 +1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Let's fix the lint issues and extract |
Semver Impact of This PR🟡 Minor (new features) 📋 Changelog PreviewThis is how your changes will appear in the changelog. New Features ✨
Build / dependencies / internal 🔧
🤖 This preview updates automatically when you update the PR. |
|
@giortzisg is there any update required? |
Description
This PR allows developers to provide the TLS config during the client creation via the client options.
Issues