diff options
author | Bartek IwaĆczuk <biwanczuk@gmail.com> | 2021-08-10 13:19:45 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-08-10 13:19:45 +0200 |
commit | b9a8111a00b58e355baf60a55893dbfc70b0dfdd (patch) | |
tree | 99f88f95143ddeaa11f77dd80dccacb03f6d5270 /cli/tests | |
parent | 465cf9a6fe2d77f4c3cdaeb8eea60bd2b8697608 (diff) |
refactor: --unsafely-ignore-certificate-errors (#11629)
Diffstat (limited to 'cli/tests')
-rw-r--r-- | cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out | 2 | ||||
-rw-r--r-- | cli/tests/cafile_url_imports_unsafe_ssl.ts.out | 2 | ||||
-rw-r--r-- | cli/tests/integration/mod.rs | 4 |
3 files changed, 4 insertions, 4 deletions
diff --git a/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out b/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out index f0b63833a..66b3258ee 100644 --- a/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out +++ b/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out @@ -1,2 +1,2 @@ -DANGER: SSL ceritificate validation is disabled for all domains +DANGER: TLS ceritificate validation is disabled for all hostnames Hello diff --git a/cli/tests/cafile_url_imports_unsafe_ssl.ts.out b/cli/tests/cafile_url_imports_unsafe_ssl.ts.out index 3f6a0c07f..2a3df0ea4 100644 --- a/cli/tests/cafile_url_imports_unsafe_ssl.ts.out +++ b/cli/tests/cafile_url_imports_unsafe_ssl.ts.out @@ -1,3 +1,3 @@ -DANGER: SSL ceritificate validation is disabled for: localhost +DANGER: TLS ceritificate validation is disabled for: localhost Hello success diff --git a/cli/tests/integration/mod.rs b/cli/tests/integration/mod.rs index 76bda70a7..392101e54 100644 --- a/cli/tests/integration/mod.rs +++ b/cli/tests/integration/mod.rs @@ -475,14 +475,14 @@ fn broken_stdout() { // }); itest!(cafile_url_imports_unsafe_ssl { - args: "run --quiet --reload --unsafely-treat-insecure-origin-as-secure=localhost cafile_url_imports.ts", + args: "run --quiet --reload --unsafely-ignore-certificate-errors=localhost cafile_url_imports.ts", output: "cafile_url_imports_unsafe_ssl.ts.out", http_server: true, }); itest!(cafile_ts_fetch_unsafe_ssl { args: - "run --quiet --reload --allow-net --unsafely-treat-insecure-origin-as-secure cafile_ts_fetch.ts", + "run --quiet --reload --allow-net --unsafely-ignore-certificate-errors cafile_ts_fetch.ts", output: "cafile_ts_fetch_unsafe_ssl.ts.out", http_server: true, }); |