Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[http-client] Decode credentials for Basic Authentication #5223

Merged

Conversation

draker94
Copy link
Contributor

@draker94 draker94 commented Jul 17, 2024

Currently HttpClient decode all characters except unsafe, but we don't need encoding of such characters when using Basic Auth, so they should be decoded too

@draker94 draker94 requested a review from a team as a code owner July 17, 2024 13:18
Copy link

codecov bot commented Jul 17, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 97.49%. Comparing base (b0f6e79) to head (925ce37).
Report is 5 commits behind head on master.

Additional details and impacted files
@@             Coverage Diff              @@
##             master    #5223      +/-   ##
============================================
+ Coverage     97.48%   97.49%   +0.01%     
- Complexity     6856     6899      +43     
============================================
  Files           947      950       +3     
  Lines         19812    19899      +87     
  Branches       1308     1313       +5     
============================================
+ Hits          19313    19400      +87     
  Misses          390      390              
  Partials        109      109              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@draker94 draker94 force-pushed the decode_unsafe_chars_http_client branch from 4af5f0a to d24aa2e Compare July 18, 2024 07:20
@draker94 draker94 force-pushed the decode_unsafe_chars_http_client branch from d24aa2e to 925ce37 Compare July 18, 2024 07:29
@valfirst valfirst merged commit 0239ff6 into vividus-framework:master Jul 18, 2024
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants