Skip to content

feat(client): allow to disable server cert verification on dangerous feature for all http version#1175

Open
joelwurtz wants to merge 1 commit intoHFQR:mainfrom
joelwurtz:feat/allow-invalid-certificate
Open

feat(client): allow to disable server cert verification on dangerous feature for all http version#1175
joelwurtz wants to merge 1 commit intoHFQR:mainfrom
joelwurtz:feat/allow-invalid-certificate

Conversation

@joelwurtz
Copy link
Contributor

@joelwurtz joelwurtz commented Jan 9, 2025

This extends the dangerous feature which add a new method to the client allowing invalid certificates, could be useful in trusted network / test environment and simplify process for end user.

It changes the current behavior for http3 where before it was always allowing invalidate certificate when feature was enable, now it requires both feature and config option to be set to allow this.

@joelwurtz joelwurtz force-pushed the feat/allow-invalid-certificate branch from 834b9fa to 2c8ad5a Compare January 9, 2025 20:56
@joelwurtz joelwurtz force-pushed the feat/allow-invalid-certificate branch from 2c8ad5a to e81aca9 Compare February 2, 2025 19:48
@fakeshadow
Copy link
Collaborator

fakeshadow commented Feb 15, 2025

What do you think if we add a ClientBuilder::danger(Danger) API where struct Danger contains extra states for dangerous feature. It could make possible future extension of said feature easier and help hiding the feature flag code in it's own module.

I can work on the module making integration to this PR easier

@joelwurtz
Copy link
Contributor Author

joelwurtz commented Feb 15, 2025

Sure, we could also use a marker system like other struct in xitca and restrict those feature to builder having this marker

@joelwurtz joelwurtz force-pushed the feat/allow-invalid-certificate branch from e81aca9 to 13a1ad1 Compare January 13, 2026 13:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants