roded commented on a change in pull request #64: URL: https://github.com/apache/jclouds/pull/64#discussion_r412901632
########## File path: core/src/main/java/org/jclouds/http/config/SSLModule.java ########## @@ -43,8 +44,8 @@ @Override protected void configure() { bind(HostnameVerifier.class).annotatedWith(Names.named("untrusted")).to(LogToMapHostnameVerifier.class); - bind(new TypeLiteral<Supplier<SSLContext>>() { - }).annotatedWith(Names.named("untrusted")).to(new TypeLiteral<UntrustedSSLContextSupplier>() { + bind(new TypeLiteral<Supplier<SSLSocketFactory>>() { + }).annotatedWith(Names.named("untrusted")).to(new TypeLiteral<UntrustedSSLSocketFactorySupplier>() { Review comment: I understand your concern. I could have JavaUrlHttpCommandExecutorService accept both a nullable Supplier<SSLContext> and a Supplier<SSLSocketFactory> for the untrusted use case as a fallback - this will be in line with the existing behavior and shouldn't break existing users providing SSLContext. In this case though, I suspect that only the untrusted use case will be using the socket cache. I'm not sure if the untrusted SSLSocketFactory supplier should build upon another injected SSLContext supplier since these are currently mutually exclusive use cases in JavaUrlHttpCommandExecutorService (and also I don't think SSLContext can be init-ed twice). ---------------------------------------------------------------- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org