-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to set verify_ssl => false #118
Comments
@brooklynDev Is there a recommended solution or workaround? I have the same need to run tests with :verify_ssl => false. Thanks! |
yeah Im in the same situation, cant seem to pass :verify_ssl => false with airborne |
@brooklynDev, Any update or workaround for this issue? Thanks. |
@sethpollack I'm being a bit selfish here but this one is has become important to me and my team. I'll see if I can put together a PR for it. Hopefully it's as simple as passing the hash down to RestClient. |
I want to bypass ssl by setting it to false. In RestClient, I can set by passing verify_ssl: false, but I didn't find anything in Airborne. Am I missing something? I looked up the issues and didn't find anywhere, also searched for SSL in the code base, but nothing in there.
I used: OpenSSL::SSL::VERIFY_PEER = OpenSSL::SSL::VERIFY_NONE unless OpenSSL::SSL::VERIFY_PEER==0 but I get a warning
WARNING: OpenSSL::SSL::VERIFY_PEER == OpenSSL::SSL::VERIFY_NONE
This dangerous monkey patch leaves you open to MITM attacks!
Try passing :verify_ssl => false instead.
Has anyone run into this before? Any help would be appreciated.
The text was updated successfully, but these errors were encountered: