Skip to content

fix: honor saved insecure TLS setting#287

Open
mynk8 wants to merge 1 commit intomicrocks:masterfrom
mynk8:fix-context-insecure-tls
Open

fix: honor saved insecure TLS setting#287
mynk8 wants to merge 1 commit intomicrocks:masterfrom
mynk8:fix-context-insecure-tls

Conversation

@mynk8
Copy link
Copy Markdown

@mynk8 mynk8 commented May 5, 2026

Description

This fixes saved context TLS semantics. After login, later commands should use the same TLS policy that was persisted for that Microcks server.

login was always storing insecureTLS: true, even when --insecure-tls was not passed. At the same time, later commands were not honoring the saved context value when creating the HTTP client.

This PR makes the behavior consistent:

  • persist insecureTLS from the actual login flag value
  • honor the saved context TLS setting in NewClient()

Testing

go test ./pkg/connectors

Also verified manually with a real Microcks uber container behind a self-signed HTTPS proxy.

Also follows up the changes from #180 . That fix made the current --insecure-tls flag apply to client construction. This PR covers the saved-context side: login now persists the flag value, and later context-based commands honor that persisted setting.

Fixes #286

Signed-off-by: mynk8 <mr.mayankgame@gmail.com>
@mynk8 mynk8 requested review from Harsh4902, lbroudoux and yada as code owners May 5, 2026 10:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Persisted context TLS settings are inconsistent for different HTTPS servers

1 participant