Skip to content

Conversation

@djthorpe
Copy link
Member

@djthorpe djthorpe commented Dec 17, 2025

This PR updates the client connection logic to support HTTPS endpoints based on port detection. The changes enable the pgmanager CLI tool to automatically use HTTPS when connecting to servers on port 443.

  • Added automatic scheme detection (HTTP vs HTTPS) based on port 443
  • Implemented host defaulting to "localhost" when the address starts with a colon
  • Refactored URL construction to use parsed numeric port values
@djthorpe djthorpe self-assigned this Dec 17, 2025
Copilot AI review requested due to automatic review settings December 17, 2025 08:04
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the client connection logic to support HTTPS endpoints based on port detection. The changes enable the pgmanager CLI tool to automatically use HTTPS when connecting to servers on port 443.

Key Changes:

  • Added automatic scheme detection (HTTP vs HTTPS) based on port 443
  • Implemented host defaulting to "localhost" when the address starts with a colon
  • Refactored URL construction to use parsed numeric port values

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@djthorpe djthorpe merged commit 7506c99 into main Dec 17, 2025
7 checks passed
@djthorpe djthorpe deleted the djt/1217/secureclient branch December 17, 2025 08:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

1 participant