-
|
How do I tell TLSsocket (ecma 419 version) to ignore the certificate validity, e.g. for self-signed certificates? It seems that's something left out of the 419 standard? |
Beta Was this translation helpful? Give feedback.
Answered by
phoddie
Nov 13, 2023
Replies: 1 comment 5 replies
-
|
It doesn't seem to be in the spec, though it was intended to be. The TLS implementation supports that by setting the const http = new device.network.http.io({
...device.network.http,
host: "www.google.com",
port: 443,
socket: {
io: TLSSocket,
TCP: device.network.http.socket,
secure: {
verify: false
},
}
}); |
Beta Was this translation helpful? Give feedback.
5 replies
Answer selected by
tve
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
It doesn't seem to be in the spec, though it was intended to be.
The TLS implementation supports that by setting the
verifyflag tofalse. It may be that the intended name for 419 is different (I don't have time to run that down now, but I think it is supposed to match the equivalent Node flag). This works in httpclient example to disable certificate verification: