-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(http.cr): default to HTTPS #70
Conversation
Probably shouldn't be doing anything over HTTP anyway, so I would not consider this a breaking change. With HTTP I was getting this error and it seems onerous to have to specify a `@custom_endpoint` for HTTPS `Requests specifying Server Side Encryption with AWS KMS managed keys must be made over a secure connection`
fixes compatibility with crystal 0.33
there is no queuing in the crystal HTTP library so if two requests occur on different fibers they both write to the same IO This typically causes requests to fail as the S3 hash check fails
@taylorfinnell fixed up the spec and a couple of other issues i ran into when using this in production. |
Hey, thanks! Happy to merge this, looks like some tests are still failing and I think it needs a |
Sweet, that was probably it. |
Ahh now it's a crystal 0.34 error. |
couldn't make crystal tool format find any issues on linux or macos - so not sure what travis is complaining about.
@taylorfinnell I literally cannot replicate the issue with |
Yea, I can't repro it locally either, very weird. I will go ahead and merge this. Thank you! |
Probably shouldn't be doing anything over HTTP anyway, so I would not consider this a breaking change.
With HTTP I was getting this error and it seems onerous to have to specify a
@custom_endpoint
for HTTPSRequests specifying Server Side Encryption with AWS KMS managed keys must be made over a secure connection