summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndras Timar <andras.timar@collabora.com>2024-06-27 16:13:45 +0200
committerAndras Timar <andras.timar@collabora.com>2024-06-28 11:02:08 +0200
commitbad165851667c08ae4547374e21865c3b4f1c13a (patch)
treef71e8f64be99fd0be8004cea14bea0b5694f632d
parentRead storage.ssl.*_file_path without fallback in case of SSL termination (diff)
downloadonline-bad165851667c08ae4547374e21865c3b4f1c13a.tar.gz
online-bad165851667c08ae4547374e21865c3b4f1c13a.zip
Instead of ssl.termination, the condition should depend on ssl.enable cp-22.05.23-1
So that we fall back from storage.ssl.*_file_path to ssl.*_file_path when ssl.enable=true, because in this case we can expect that these fallbacks exist. Otherwise we do not fall back. ssl.termination does not matter. Signed-off-by: Andras Timar <andras.timar@collabora.com> Change-Id: I6ca86c5ce5849fffcd5c41f0ce2a54977ab50faa
-rw-r--r--wsd/Storage.cpp14
1 files changed, 7 insertions, 7 deletions
diff --git a/wsd/Storage.cpp b/wsd/Storage.cpp
index 6fe39bb6e6..056b18cffe 100644
--- a/wsd/Storage.cpp
+++ b/wsd/Storage.cpp
@@ -135,18 +135,18 @@ void StorageBase::initialize()
if (SSLEnabled || SSLAsScheme)
{
- if (COOLWSD::isSSLTermination())
- {
- sslClientParams.certificateFile = COOLWSD::getPathFromConfig("storage.ssl.cert_file_path");
- sslClientParams.privateKeyFile = COOLWSD::getPathFromConfig("storage.ssl.key_file_path");
- sslClientParams.caLocation = COOLWSD::getPathFromConfig("storage.ssl.ca_file_path");
- }
- else
+ if (COOLWSD::isSSLEnabled())
{
sslClientParams.certificateFile = COOLWSD::getPathFromConfigWithFallback("storage.ssl.cert_file_path", "ssl.cert_file_path");
sslClientParams.privateKeyFile = COOLWSD::getPathFromConfigWithFallback("storage.ssl.key_file_path", "ssl.key_file_path");
sslClientParams.caLocation = COOLWSD::getPathFromConfigWithFallback("storage.ssl.ca_file_path", "ssl.ca_file_path");
}
+ else
+ {
+ sslClientParams.certificateFile = COOLWSD::getPathFromConfig("storage.ssl.cert_file_path");
+ sslClientParams.privateKeyFile = COOLWSD::getPathFromConfig("storage.ssl.key_file_path");
+ sslClientParams.caLocation = COOLWSD::getPathFromConfig("storage.ssl.ca_file_path");
+ }
sslClientParams.cipherList = COOLWSD::getPathFromConfigWithFallback("storage.ssl.cipher_list", "ssl.cipher_list");
const bool sslVerification = COOLWSD::getConfigValue<bool>("ssl.ssl_verification", true);
sslClientParams.verificationMode = !sslVerification ? Poco::Net::Context::VERIFY_NONE : Poco::Net::Context::VERIFY_STRICT;