Skip to content

Commit

Permalink
Fix unsupported https scheme in web proxy - references #1080
Browse files Browse the repository at this point in the history
  • Loading branch information
forki committed Sep 22, 2015
1 parent 533886c commit f796058
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 4 deletions.
3 changes: 3 additions & 0 deletions RELEASE_NOTES.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
#### 2.3.6 - 22.09.2015
* BUGFIX: Fix unsupported https scheme in web proxy - https://github.com/fsprojects/Paket/pull/1080

#### 2.3.5 - 22.09.2015
* BUGFIX: Ignore DotNET 5.0 framework when TargetFramework 4 is specified - https://github.com/fsprojects/Paket/issues/1066

Expand Down
2 changes: 1 addition & 1 deletion tests/Paket.Bootstrapper.Tests/EnvWebProxyShould.cs
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ [Test] public void GetHttpsProxyWithPortAndCredentials()
Assert.IsTrue(envProxy.TryGetProxyFor(new Uri("https://github.com"), out proxy));
var webProxy = proxy as WebProxy;
Assert.IsNotNull(webProxy);
Assert.That(webProxy.Address, Is.EqualTo(new Uri("https://proxy.local:8080")));
Assert.That(webProxy.Address, Is.EqualTo(new Uri("http://proxy.local:8080")));
Assert.IsTrue(webProxy.BypassProxyOnLocal);
Assert.That(webProxy.BypassList.Length, Is.EqualTo(0));
var credentials = webProxy.Credentials as NetworkCredential;
Expand Down
6 changes: 3 additions & 3 deletions tests/Paket.Tests/UtilsSpecs.fs
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ let ``get https env proxy no port nor credentials``() =
let pOpt = envProxies().TryFind "https"
Option.isSome pOpt |> shouldEqual true
let p = Option.get pOpt
p.Address |> shouldEqual (new Uri("https://proxy.local"))
p.Address |> shouldEqual (new Uri("http://proxy.local:443"))
p.BypassProxyOnLocal |> shouldEqual true
p.BypassList.Length |> shouldEqual 0
p.Credentials |> shouldEqual null
Expand All @@ -177,7 +177,7 @@ let ``get https env proxy with port no credentials``() =
let pOpt = envProxies().TryFind "https"
Option.isSome pOpt |> shouldEqual true
let p = Option.get pOpt
p.Address |> shouldEqual (new Uri("https://proxy.local:8080"))
p.Address |> shouldEqual (new Uri("http://proxy.local:8080"))
p.BypassProxyOnLocal |> shouldEqual true
p.BypassList.Length |> shouldEqual 0
p.Credentials |> shouldEqual null
Expand Down Expand Up @@ -205,7 +205,7 @@ let ``get https env proxy with port and credentials``() =
let pOpt = envProxies().TryFind "https"
Option.isSome pOpt |> shouldEqual true
let p = Option.get pOpt
p.Address |> shouldEqual (new Uri("https://proxy.local:8080"))
p.Address |> shouldEqual (new Uri("http://proxy.local:8080"))
p.BypassProxyOnLocal |> shouldEqual true
p.BypassList.Length |> shouldEqual 0
let credentials = p.Credentials :?> NetworkCredential
Expand Down

3 comments on commit f796058

@dedale
Copy link
Contributor

@dedale dedale commented on f796058 Sep 22, 2015

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You need to fix the scheme, not the port, so rollback 443 above

@forki
Copy link
Member Author

@forki forki commented on f796058 Sep 22, 2015

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But that doesn't fix the test

@dedale
Copy link
Contributor

@dedale dedale commented on f796058 Sep 22, 2015

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes sorry, found out after that http+443 is automatically translated into https with implicit port

Please sign in to comment.