Today I was playing around with httpstat which is described as
“like curl -v, with colours.” Very handy tool tells you timing information,
headers and can dump the response body into an output file. Super handy if you
are troubleshooting.
I decided to try to hack in client credentials which was pretty
fun. As you can see I am really just the following additions:
I am just loading the x509 key pair from the client cert file and key, and
adding the tls certificate to the list of the transport’s tls config, as well
as add the client’s ca signing certificate to the transport’s tls config root
ca.
Here is the call site of this helper function in the visit function:
Issue is here and hoping this is useful for anyone.
PR is here and hoping this is useful for anyone.