Skip to content

Commit e9f1300

Browse files
Dobbyclaude
andcommitted
fix: remove -k flag from verify curl calls
The gateway's TLS cert is now signed by our private CA (installed into CVM system CA store via cloud-init). No need to skip TLS verification. See privateclaw PR #301 for the CA chain implementation. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent b05c98c commit e9f1300

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

privateclaw

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -377,13 +377,13 @@ cmd_verify() {
377377
# with `-X POST` and curl bails out producing no output. Use `-D -` to
378378
# dump headers from a real GET request instead. The /v1/models endpoint
379379
# returns the same Attestation-Report header as /chat/completions.
380-
# -k: accept self-signed TLS cert on gateway; the attestation headers
381-
# (VCEK chain) provide the real trust anchor, not TLS cert validation.
380+
# The gateway's TLS cert is signed by our private CA, which is installed
381+
# into the CVM's system CA store at boot (via cloud-init). No -k needed.
382382
CURL_AUTH_ARGS=()
383383
if [ -n "$BEARER_TOKEN" ] && [ "$BEARER_TOKEN" != "not-needed" ]; then
384384
CURL_AUTH_ARGS=(-H "Authorization: Bearer $BEARER_TOKEN")
385385
fi
386-
INF_HEADERS=$(curl -s -k -D - -o /dev/null "${CURL_AUTH_ARGS[@]}" "$ENDPOINT/models" \
386+
INF_HEADERS=$(curl -s -D - -o /dev/null "${CURL_AUTH_ARGS[@]}" "$ENDPOINT/models" \
387387
--max-time 10 2>/dev/null) || true
388388
fi
389389

0 commit comments

Comments
 (0)