afsocket/transport-mapper: fix auto transport with tls#482
Closed
OverOrion wants to merge 2 commits intoaxoflow:mainfrom
Closed
afsocket/transport-mapper: fix auto transport with tls#482OverOrion wants to merge 2 commits intoaxoflow:mainfrom
OverOrion wants to merge 2 commits intoaxoflow:mainfrom
Conversation
This patch makes sure that TLS transport is used for reading, not plain-text Signed-off-by: Szilard Parrag <[email protected]>
Signed-off-by: Szilard Parrag <[email protected]>
Member
|
My original plan was to auto-detect if we are receiving TLS in addition to auto-detect framing, see #361 I understand that that PR needs to be rebased and perhaps split, but could we discuss before we merge this? |
bazsi
added a commit
to bazsi/axosyslog
that referenced
this pull request
Feb 1, 2025
This reworks the various boolean members in TransportMapperInet that control which logproto/transport we apply to a specific connection. With these renames, it's much easier to follow what happens and why. NOTE: there's a followup bugfix that fixes the same bug as axoflow#482. Signed-off-by: Balazs Scheidler <[email protected]>
bazsi
added a commit
to bazsi/axosyslog
that referenced
this pull request
Feb 2, 2025
This reworks the various boolean members in TransportMapperInet that control which logproto/transport we apply to a specific connection. With these renames, it's much easier to follow what happens and why. NOTE: there's a followup bugfix that fixes the same bug as axoflow#482. Signed-off-by: Balazs Scheidler <[email protected]>
bazsi
added a commit
to bazsi/axosyslog
that referenced
this pull request
Feb 2, 2025
This reworks the various boolean members in TransportMapperInet that control which logproto/transport we apply to a specific connection. With these renames, it's much easier to follow what happens and why. NOTE: there's a followup bugfix that fixes the same bug as axoflow#482. Signed-off-by: Balazs Scheidler <[email protected]>
bazsi
added a commit
to bazsi/axosyslog
that referenced
this pull request
Feb 4, 2025
This reworks the various boolean members in TransportMapperInet that control which logproto/transport we apply to a specific connection. With these renames, it's much easier to follow what happens and why. NOTE: there's a followup bugfix that fixes the same bug as axoflow#482. Signed-off-by: Balazs Scheidler <[email protected]>
Contributor
|
We closed this in favor of #361, it contains almost exactly the same but on a different base. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This patch makes sure that TLS transport is used for reading, not plain-text.
transport(auto)andtls()didn't work in conjunction.Without this patch it fails:
(use
loggen -P -r 1 -n 1 --debug -U localhost 5143)TLS transport was not used as the last
elsebranch constructs alogprotofrom thetransport(autoin this case),require_tls_when_has_tls_contexttakes care of this.After the patch: