-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Allow Enterprise configured for regular HTTP #488
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Since we use a test server representing the GitHub API, all requests get transformed to HTTP in tests. Make a check that the original requests really was intended to go over HTTPS.
Example `~/.config/hub`: my.example.org: - user: myuser oauth_token: mytoken protocol: http Currently there is no way to set `protocol` other than manually editing the configuration file.
Allows using these commands for Enterprise configurations over regular HTTP.
Works for me |
@jingweno This is something that I'm adding as a temp solution for people who really need to use hub for their Enterprise instances over HTTP. (Not sure why would anyone have Enterprise over HTTP, though). I'd like to make the user experience around this a little better in the next big version of hub. Maybe something like a dedicated command to whitelist + authenticate to an Enteprise host:
|
My company has GHE over HTTP. I guess they just never bothered to get or make an SSL cert and figured it was okay because it's behind our firewall. I probably should pester our DevOps guy again to make a self-signed cert, but this is my stop-gap solution. |
Just tested this out and it works for me. One comment/question:
Why do you think Just curious. Right now Thanks for your work on this! |
|
Cool. Thanks for the explanation! This looks good to me. |
Allow Enterprise configured for regular HTTP
Nice! Thank you! |
This allows the
protocol
option in hub config file to specify whether an Enterprise instance is using regular (non-secure) HTTP. The only way to set the option is by manually editing the config file. This is a temporary hack to allow people to use hub with non-secure Enterprise installs.This affects: API requests,
browse
&compare
commands. This doesn't affect: git protocol, i.e. git clone/fetch operations.Example
~/.config/hub
:Alternative to #247 #485. Advantages of the approach taken here:
protocol
instead ofuri_scheme
as a more intention-revealing name/cc @msabramo @mmrobins