Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add support for insecure TLS connections #34

Merged
merged 1 commit into from
Oct 5, 2024
Merged

feat: add support for insecure TLS connections #34

merged 1 commit into from
Oct 5, 2024

Conversation

appleboy
Copy link
Owner

@appleboy appleboy commented Oct 5, 2024

  • Add crypto/tls import in jenkins.go
  • Add Client field to Jenkins struct
  • Modify NewJenkins function to accept an insecure parameter and configure HTTP client accordingly
  • Update sendRequest method to use the Client field from the Jenkins struct
  • Update tests in jenkins_test.go to include the insecure parameter in NewJenkins calls
  • Add insecure flag to CLI options in main.go
  • Add Insecure field to Plugin struct
  • Update Plugin.Exec method to pass Insecure field to NewJenkins

- Add `crypto/tls` import in `jenkins.go`
- Add `Client` field to `Jenkins` struct
- Modify `NewJenkins` function to accept an `insecure` parameter and configure HTTP client accordingly
- Update `sendRequest` method to use the `Client` field from the `Jenkins` struct
- Update tests in `jenkins_test.go` to include the `insecure` parameter in `NewJenkins` calls
- Add `insecure` flag to CLI options in `main.go`
- Add `Insecure` field to `Plugin` struct
- Update `Plugin.Exec` method to pass `Insecure` field to `NewJenkins`

Signed-off-by: appleboy <[email protected]>
@appleboy appleboy merged commit 1bb020b into master Oct 5, 2024
9 of 11 checks passed
@appleboy appleboy deleted the patch branch October 5, 2024 00:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant