An override for the wallet to daemon connection is provided, but not for
other SSL contexts. The intent is to prevent users from supplying a
system CA as the "user" whitelisted certificate, which is less secure
since the key is controlled by a third party.
constcommand_line::arg_descriptor<std::string>daemon_ssl_ca_certificates={"daemon-ssl-ca-certificates",tools::wallet2::tr("Path to file containing concatenated PEM format certificate(s) to replace system CA(s).")};
constcommand_line::arg_descriptor<std::vector<std::string>>daemon_ssl_allowed_fingerprints={"daemon-ssl-allowed-fingerprints",tools::wallet2::tr("List of valid fingerprints of allowed RPC servers")};
constcommand_line::arg_descriptor<bool>daemon_ssl_allow_any_cert={"daemon-ssl-allow-any-cert",tools::wallet2::tr("Allow any SSL certificate from the daemon"),false};
constcommand_line::arg_descriptor<bool>daemon_ssl_allow_chained={"daemon-ssl-allow-chained",tools::wallet2::tr("Allow user (via --daemon-ssl-ca-certificates) chain certificates"),false};
constcommand_line::arg_descriptor<bool>testnet={"testnet",tools::wallet2::tr("For testnet. Daemon must also be launched with --testnet flag"),false};
constcommand_line::arg_descriptor<bool>stagenet={"stagenet",tools::wallet2::tr("For stagenet. Daemon must also be launched with --stagenet flag"),false};