@@ -1073,26 +1073,26 @@ get_cacerts() ->
1073
1073
ssl_opts (ssl_verify_enabled , Url ) ->
1074
1074
case check_ssl_version () of
1075
1075
true ->
1076
- #{host := Hostname } = rebar_uri :parse (rebar_utils :to_list (Url )),
1077
- VerifyFun = {fun ssl_verify_hostname :verify_fun /3 ,
1078
- [{check_hostname , Hostname }]},
1079
1076
CACerts = get_cacerts (),
1080
1077
SslOpts = [{verify , verify_peer }, {depth , 10 }, {cacerts , CACerts },
1081
- {partial_chain , fun partial_chain /1 }, { verify_fun , VerifyFun } ],
1082
- check_hostname_opt (SslOpts );
1078
+ {partial_chain , fun partial_chain /1 }],
1079
+ check_hostname_opt (Url , SslOpts );
1083
1080
false ->
1084
1081
? WARN (" Insecure HTTPS request (peer verification disabled), "
1085
1082
" please update to OTP 17.4 or later" , []),
1086
1083
[{verify , verify_none }]
1087
1084
end .
1088
1085
1089
1086
-ifdef (no_customize_hostname_check ).
1090
- check_hostname_opt (Opts ) ->
1091
- Opts .
1087
+ check_hostname_opt (Url , Opts ) ->
1088
+ #{host := Hostname } = rebar_uri :parse (rebar_utils :to_list (Url )),
1089
+ VerifyFun = {fun ssl_verify_hostname :verify_fun /3 ,
1090
+ [{check_hostname , Hostname }]},
1091
+ [{verify_fun , VerifyFun } | Opts ].
1092
1092
-else .
1093
- check_hostname_opt (Opts ) ->
1094
- MatchFun = public_key :pkix_verify_hostname_match_fun (https ),
1095
- [{customize_hostname_check , [{match_fun , MatchFun }]} | Opts ].
1093
+ check_hostname_opt (_ , Opts ) ->
1094
+ MatchFun = public_key :pkix_verify_hostname_match_fun (https ),
1095
+ [{customize_hostname_check , [{match_fun , MatchFun }]} | Opts ].
1096
1096
-endif .
1097
1097
1098
1098
-spec partial_chain (Certs ) -> Res when
0 commit comments