152 |
152 |
153 # If a host cert fingerprint is defined, it is the only thing that |
153 # If a host cert fingerprint is defined, it is the only thing that |
154 # matters. No need to validate CA certs. |
154 # matters. No need to validate CA certs. |
155 if s['certfingerprints']: |
155 if s['certfingerprints']: |
156 s['verifymode'] = ssl.CERT_NONE |
156 s['verifymode'] = ssl.CERT_NONE |
|
157 s['allowloaddefaultcerts'] = False |
157 |
158 |
158 # If --insecure is used, don't take CAs into consideration. |
159 # If --insecure is used, don't take CAs into consideration. |
159 elif ui.insecureconnections: |
160 elif ui.insecureconnections: |
160 s['disablecertverification'] = True |
161 s['disablecertverification'] = True |
161 s['verifymode'] = ssl.CERT_NONE |
162 s['verifymode'] = ssl.CERT_NONE |
|
163 s['allowloaddefaultcerts'] = False |
162 |
164 |
163 if ui.configbool('devel', 'disableloaddefaultcerts'): |
165 if ui.configbool('devel', 'disableloaddefaultcerts'): |
164 s['allowloaddefaultcerts'] = False |
166 s['allowloaddefaultcerts'] = False |
165 |
167 |
166 # If both fingerprints and a per-host ca file are specified, issue a warning |
168 # If both fingerprints and a per-host ca file are specified, issue a warning |