summaryrefslogtreecommitdiff
path: root/cli/tests
diff options
context:
space:
mode:
Diffstat (limited to 'cli/tests')
-rw-r--r--cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out2
-rw-r--r--cli/tests/cafile_url_imports_unsafe_ssl.ts.out3
-rw-r--r--cli/tests/integration/mod.rs13
3 files changed, 18 insertions, 0 deletions
diff --git a/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out b/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out
new file mode 100644
index 000000000..f0b63833a
--- /dev/null
+++ b/cli/tests/cafile_ts_fetch_unsafe_ssl.ts.out
@@ -0,0 +1,2 @@
+DANGER: SSL ceritificate validation is disabled for all domains
+Hello
diff --git a/cli/tests/cafile_url_imports_unsafe_ssl.ts.out b/cli/tests/cafile_url_imports_unsafe_ssl.ts.out
new file mode 100644
index 000000000..3f6a0c07f
--- /dev/null
+++ b/cli/tests/cafile_url_imports_unsafe_ssl.ts.out
@@ -0,0 +1,3 @@
+DANGER: SSL ceritificate validation is disabled for: localhost
+Hello
+success
diff --git a/cli/tests/integration/mod.rs b/cli/tests/integration/mod.rs
index cc016382f..938d40125 100644
--- a/cli/tests/integration/mod.rs
+++ b/cli/tests/integration/mod.rs
@@ -474,6 +474,19 @@ fn broken_stdout() {
// http_server: true,
// });
+itest!(cafile_url_imports_unsafe_ssl {
+ args: "run --quiet --reload --unsafely-treat-insecure-origin-as-secure=localhost cafile_url_imports.ts",
+ output: "cafile_url_imports_unsafe_ssl.ts.out",
+ http_server: true,
+});
+
+itest!(cafile_ts_fetch_unsafe_ssl {
+ args:
+ "run --quiet --reload --allow-net --unsafely-treat-insecure-origin-as-secure cafile_ts_fetch.ts",
+ output: "cafile_ts_fetch_unsafe_ssl.ts.out",
+ http_server: true,
+});
+
#[test]
#[ignore]
fn cafile_env_fetch() {