-
Notifications
You must be signed in to change notification settings - Fork 104
Make reqwest/rustls-tls
an optional feature
#706
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Note Other AI code review bot(s) detectedCodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review. WalkthroughCargo manifest changes remove Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
Pre-merge checks and finishing touches✅ Passed checks (5 passed)
✨ Finishing touches🧪 Generate unit tests
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
Tip 👮 Agentic pre-merge checks are now available in preview!Pro plan users can now enable pre-merge checks in their settings to enforce checklists before merging PRs.
Please see the documentation for more information. Example: reviews:
pre_merge_checks:
custom_checks:
- name: "Undocumented Breaking Changes"
mode: "warning"
instructions: |
Pass/fail criteria: All breaking changes to public APIs, CLI flags, environment variables, configuration keys, database schemas, or HTTP/GraphQL endpoints must be documented in the "Breaking Change" section of the PR description and in CHANGELOG.md. Exclude purely internal or private changes (e.g., code not exported from package entry points or explicitly marked as internal). Please share your feedback with us on this Discord post. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
🧹 Nitpick comments (1)
Cargo.toml (1)
27-27
: Gatehttp2
behindtls
.Remove reqwest's "http2" feature from the dependency and enable it only via the
tls
feature to avoid pullingh2
for non‑TLS builds. File: Cargo.toml (lines 27, 47)-reqwest = { version = "0.12.22", optional = true, default-features = false, features = ["http2", "stream"] } +reqwest = { version = "0.12.22", optional = true, default-features = false, features = ["stream"] }-tls = ["reqwest/rustls-tls"] +tls = ["reqwest/rustls-tls", "reqwest/http2"]
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
Cargo.toml
(2 hunks)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Cursor Bugbot
🔇 Additional comments (1)
Cargo.toml (1)
47-47
: Newtls
feature alias looks good — update docs/examples/tests & CI
- Evidence: Cargo.toml contains
tls = ["reqwest/rustls-tls"]
.- Action: Update README, docs, examples, and CI to recommend
features = ["tls"]
for HTTPS and explicitly state this uses rustls (not native-tls).- Action: Add a CI job that runs examples/tests both with and without
tls
.- Verification: automated HTTPS scan in the sandbox was inconclusive (ripgrep skipped files); run locally
rg -n -uu --hidden 'https://'
to find examples/tests that must be updated.
Pull Request
Related issue
Fixes #705
What does this PR do?
reqwest/rustls-tls
as a required feature for themeilisearch/reqwest
feature.meilisearch/tls
which enablesreqwest/rustlts-tls
PR checklist
Please check if your PR fulfills the following requirements:
Summary by CodeRabbit
New Features
Chores