From b9a8111a00b58e355baf60a55893dbfc70b0dfdd Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bartek=20Iwa=C5=84czuk?= Date: Tue, 10 Aug 2021 13:19:45 +0200 Subject: refactor: --unsafely-ignore-certificate-errors (#11629) --- cli/program_state.rs | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'cli/program_state.rs') diff --git a/cli/program_state.rs b/cli/program_state.rs index 721ccda9c..0ec233b88 100644 --- a/cli/program_state.rs +++ b/cli/program_state.rs @@ -119,15 +119,15 @@ impl ProgramState { } if let Some(insecure_allowlist) = - flags.unsafely_treat_insecure_origin_as_secure.as_ref() + flags.unsafely_ignore_certificate_errors.as_ref() { let domains = if insecure_allowlist.is_empty() { - "for all domains".to_string() + "for all hostnames".to_string() } else { format!("for: {}", insecure_allowlist.join(", ")) }; let msg = format!( - "DANGER: SSL ceritificate validation is disabled {}", + "DANGER: TLS ceritificate validation is disabled {}", domains ); eprintln!("{}", colors::yellow(msg)); @@ -153,7 +153,7 @@ impl ProgramState { !flags.no_remote, Some(root_cert_store.clone()), blob_store.clone(), - flags.unsafely_treat_insecure_origin_as_secure.clone(), + flags.unsafely_ignore_certificate_errors.clone(), )?; let lockfile = if let Some(filename) = &flags.lock { -- cgit v1.2.3