Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

httpc #129

Open
wants to merge 13 commits into
base: master
Choose a base branch
from
Open

httpc #129

wants to merge 13 commits into from

Conversation

polymetis
Copy link

@polymetis polymetis commented Jun 2, 2022

Was doing something today and noticed @wojtekmach in #123 and I had most of the code already. Just unsure if we want to drop hackney completely or continue with the callback implementation. So I updated to latest and rejiggered the code but if I can a little direction here how we want to move forward I can move some code around.

polymetis and others added 9 commits December 29, 2018 03:39
I am aware of the ssl issue but I am under the impression
I can grab it from ssl module stdlib.

Either way it will be an adventure
With one minor exception. I have added the cacert file that
curl uses, which in turn is built from firefox. It does add
a little weight to the priv directory but the file revs
very infrequently (about 3 times a year) and is easy to
maintain.

I am unsure at present what happens when the cacert file
falls out of date.

More info here. https://curl.haxx.se/docs/caextract.html
Replaces all hackney calls in dataloader module with
httpc based client.

Tested a Man in The Middle attach and the ssl cert thing
seems to work.

There was a concious effort to change as little code as possible
in data loader but I made the call to switch the header filter
to charlists rather than iterate over the httpc header return
values as that seemed silly.
Just a brief and first draft of a file to explain the need and the how
of the cacert.pem file.
Also other supporting libraries than are now in the vm
@polymetis polymetis marked this pull request as draft June 2, 2022 04:36
@polymetis
Copy link
Author

Also if we are willing to make future version as otp 25 and above I can just grab the os provided cacert in an easier to implement cross platform way.

@polymetis polymetis marked this pull request as ready for review January 10, 2023 17:15
@dch
Copy link

dch commented Jun 15, 2023

🚀🌈🍈 would love to see this in a future tzdata release. httpc is ideally placed to do this and provide all the cert checking we expect, without introducing dependencies.

@codeadict
Copy link

I would love to see this too

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants