diff options
author | Phil Dibowitz <phil@ipom.com> | 2015-01-16 14:16:31 -0800 |
---|---|---|
committer | Phil Dibowitz <phil@ipom.com> | 2015-01-16 14:21:14 -0800 |
commit | d29a38eb258c006bec566fac30f142aeae0c9e36 (patch) | |
tree | 12c53d5ad8a97d1e2e740ba5b30943ca70d7a75c /lib/chef/client.rb | |
parent | d93bda662722486b1dc160adef764095a3b03b80 (diff) | |
download | chef-d29a38eb258c006bec566fac30f142aeae0c9e36.tar.gz |
Drop the SSL warning now that we have a safe default
Diffstat (limited to 'lib/chef/client.rb')
-rw-r--r-- | lib/chef/client.rb | 33 |
1 files changed, 0 insertions, 33 deletions
diff --git a/lib/chef/client.rb b/lib/chef/client.rb index 9fe45b77df..3d9678ea31 100644 --- a/lib/chef/client.rb +++ b/lib/chef/client.rb @@ -419,8 +419,6 @@ class Chef begin runlock.save_pid - check_ssl_config - request_id = Chef::RequestID.instance.request_id run_context = nil @events.run_start(Chef::VERSION) @@ -529,37 +527,6 @@ class Chef Chef::ReservedNames::Win32::Security.has_admin_privileges? end - def check_ssl_config - if Chef::Config[:ssl_verify_mode] == :verify_none and !Chef::Config[:verify_api_cert] and !Chef::Config[:suppress_ssl_warnings] - Chef::Log.warn(<<-WARN) - -* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * -SSL validation of HTTPS requests is disabled. HTTPS connections are still -encrypted, but chef is not able to detect forged replies or man in the middle -attacks. - -To fix this issue add an entry like this to your configuration file: - -``` - # Verify all HTTPS connections (recommended) - ssl_verify_mode :verify_peer - - # OR, Verify only connections to chef-server - verify_api_cert true -``` - -To check your SSL configuration, or troubleshoot errors, you can use the -`knife ssl check` command like so: - -``` - knife ssl check -c #{Chef::Config.config_file} -``` - -* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * -WARN - end - end - end end |