brooklynDev / airborne

RSpec driven API testing framework
MIT License
1.13k stars 122 forks source link

How to set verify_ssl => false #118

Closed kagalenitin closed 5 years ago

kagalenitin commented 7 years ago

I want to bypass ssl by setting it to false. In RestClient, I can set by passing verify_ssl: false, but I didn't find anything in Airborne. Am I missing something? I looked up the issues and didn't find anywhere, also searched for SSL in the code base, but nothing in there.

I used: OpenSSL::SSL::VERIFY_PEER = OpenSSL::SSL::VERIFY_NONE unless OpenSSL::SSL::VERIFY_PEER==0 but I get a warning

WARNING: OpenSSL::SSL::VERIFY_PEER == OpenSSL::SSL::VERIFY_NONE This dangerous monkey patch leaves you open to MITM attacks! Try passing :verify_ssl => false instead.

Has anyone run into this before? Any help would be appreciated.

torandu commented 7 years ago

@brooklynDev Is there a recommended solution or workaround? I have the same need to run tests with :verify_ssl => false. Thanks!

con91 commented 7 years ago

yeah Im in the same situation, cant seem to pass :verify_ssl => false with airborne

abdulgmohd commented 6 years ago

@brooklynDev, Any update or workaround for this issue?

Thanks.

mycargus commented 5 years ago

@sethpollack I'm being a bit selfish here but this one is has become important to me and my team. I'll see if I can put together a PR for it. Hopefully it's as simple as passing the hash down to RestClient.