-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attach authentication header to proxy agent #2382
Conversation
Signed-off-by: Rudy Flores <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #2382 +/- ##
==========================================
+ Coverage 91.26% 91.28% +0.01%
==========================================
Files 638 638
Lines 18190 18207 +17
Branches 3923 3930 +7
==========================================
+ Hits 16602 16620 +18
+ Misses 1587 1586 -1
Partials 1 1 ☔ View full report in Codecov by Sentry. |
Signed-off-by: Rudy Flores <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @rudyflores,
The changes make sense to me 😋
Could you provide some steps to test it?
Also, could you update the changelog to capture this fix?
Signed-off-by: Rudy Flores <[email protected]>
… into attach-proxy-options
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes LGTM, but looks like existing tests are failing in AbstractRestClient, so I'll approve once resolved. I also agree with Fernando's suggestion to have tests for this case - looks like they might just need moved and refactored. Thanks Rudy!
@zFernand0 @traeok instructions for testing this is on the PR readme now, currently working on the unit tests! |
Signed-off-by: Rudy Flores <[email protected]>
Signed-off-by: Rudy Flores <[email protected]>
Signed-off-by: Rudy Flores <[email protected]>
… into attach-proxy-options
Signed-off-by: Rudy Flores <[email protected]>
@traeok @zFernand0 FYI not sure why the CHANGELOG check is failing even after updating it... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes makes sense to me 🙏
left a suggestion to help fix the changelog check
Signed-off-by: Rudy Flores <[email protected]>
Quality Gate passedIssues Measures |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks Rudy!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, LGTM! 😋
I'm very curious about your prettier settings 😋
I don't mind the reformatting of the ProxySettings files, but I'm curious to know if people think we should enforce this sort of style going forward. 😋
Release succeeded for the The following packages have been published:
Powered by Octorelease 🚀 |
What It Does
Change the current way the authorization header is attached for the proxy request to instead be attached in the agent itself to avoid 403 error.
How to Test
In order to test this, use a proxy available that requires authentication and follow these setup steps:
Edit in settings.json
and replace thenull
property with the authentication type followed by space and the credentials in base64. Example:Basic ==MyBase64UserPassword
. Note the credentials should use this pattern before encodinguser:password
Review Checklist
I certify that I have:
Additional Comments