Skip to content
This repository was archived by the owner on Apr 14, 2021. It is now read-only.

Fully switch to https sources#7142

Merged
1 commit merged intomasterfrom
https_sources
May 5, 2019
Merged

Fully switch to https sources#7142
1 commit merged intomasterfrom
https_sources

Conversation

@deivid-rodriguez
Copy link
Copy Markdown
Contributor

What was the end-user problem that led to this PR?

The problem was that in #7000 I implemented a plan to migrate to https source by default and deprecate github/gist/bitbucket builtin sources, but I changed my mind and I think it's overkill.

The reasons I changed my mind are:

  • We actually announced the switch and the fact that it didn't happen was not intented. So this can be considered as fixing a bug.

  • We have warned non https git sources for ages

https://github.com/bundler/bundler/blob/a6533c0fe6541cc929f895ee0b7a9b673d34cb4d/lib/bundler/source_list.rb#L144-L153

I think people should be ready by now.

Also, we introduced a new setting github.https that seems to do essentially the same thing as git.allow_insecure.

What is your fix for the problem, implemented in this PR?

My fix is to take the initial approach of #6911 and actually do this in the next release.

Copy link
Copy Markdown

@indirect indirect left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ghost pushed a commit that referenced this pull request May 5, 2019
7142: Fully switch to https sources r=indirect a=deivid-rodriguez

### What was the end-user problem that led to this PR?

The problem was that in #7000 I implemented a plan to migrate to https source by default and deprecate github/gist/bitbucket builtin sources, but I changed my mind and I think it's overkill.

The reasons I changed my mind are:

* We [actually announced the switch](https://bundler.io/blog/2019/01/03/announcing-bundler-2.html) and the fact that it didn't happen was not intented. So this can be considered as fixing a bug.

* We have warned non https git sources for ages

https://github.com/bundler/bundler/blob/a6533c0fe6541cc929f895ee0b7a9b673d34cb4d/lib/bundler/source_list.rb#L144-L153

I think people should be ready by now.

Also, we introduced a new setting `github.https` that seems to do essentially the same thing as `git.allow_insecure`. 

### What is your fix for the problem, implemented in this PR?

My fix is to take the initial approach of #6911 and actually do this in the next release.

Co-authored-by: David Rodríguez <deivid.rodriguez@riseup.net>
@ghost
Copy link
Copy Markdown

ghost commented May 5, 2019

Build succeeded

@ghost ghost merged commit 26d3a59 into master May 5, 2019
@ghost ghost deleted the https_sources branch May 5, 2019 09:27
This pull request was closed.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants