poa-bridge/integration-tests/tests
Yurii Rashkovskii 18802df14c
Problem: insecure RPCs are subject to MITM attacks
Solution: by default, disallow use of non-TLS RPC endpoints

For testing, there's an escape hatch of a command line
argument `--allow-insecure-rpc-endpoints` (purposefully
long) that will reduce the severity of using a non-TLS
RPC endpoint to a warning in a log file.

It was not made to be a configuration file option to reduce
the risk of this option slipping into a production configuration
file by mistake.

Closes #79
2018-06-04 14:33:32 -07:00
..
basic_deposit_then_withdraw.rs Problem: insecure RPCs are subject to MITM attacks 2018-06-04 14:33:32 -07:00
insufficient_funds.rs Problem: insecure RPCs are subject to MITM attacks 2018-06-04 14:33:32 -07:00