Mercurial > prosody-modules
changeset 1266:51e7a4bbd70b
mod_s2s_auth_dane: Style fixes
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Sat, 04 Jan 2014 20:07:14 +0100 |
parents | 020165014e56 |
children | 589991b148e8 |
files | mod_s2s_auth_dane/mod_s2s_auth_dane.lua |
diffstat | 1 files changed, 9 insertions(+), 9 deletions(-) [+] |
line wrap: on
line diff
--- a/mod_s2s_auth_dane/mod_s2s_auth_dane.lua Sat Jan 04 20:04:12 2014 +0100 +++ b/mod_s2s_auth_dane/mod_s2s_auth_dane.lua Sat Jan 04 20:07:14 2014 +0100 @@ -11,7 +11,7 @@ local base64 = require"util.encodings".base64; local s2sout = module:depends"s2s".route_to_new_session.s2sout; -local _try_connect = s2sout.try_connect +local _try_connect = s2sout.try_connect; local pat = "%-%-%-%-%-BEGIN ([A-Z ]+)%-%-%-%-%-\r?\n".. "([0-9A-Za-z=+/\r\n]*)\r?\n%-%-%-%-%-END %1%-%-%-%-%-"; @@ -37,9 +37,9 @@ module:log("debug", "TLSA %s", tostring(tlsa)); end end - end, ("_%d._tcp.%s"):format(connect_port, connect_host), "TLSA") + end, ("_%d._tcp.%s"):format(connect_port, connect_host), "TLSA"); end - return _try_connect(host_session, connect_host, connect_port, err) + return _try_connect(host_session, connect_host, connect_port, err); end module:hook("s2s-check-certificate", function(event) @@ -48,9 +48,9 @@ local srv_choice = session.srv_choice; local choosen = srv_hosts and srv_hosts[srv_choice]; if choosen and choosen.dane then - local use, select, match, tlsa, certdata, match_found + local use, select, match, tlsa, certdata, match_found; for i, rr in ipairs(choosen.dane) do - tlsa = rr.tlsa + tlsa = rr.tlsa; module:log("debug", "TLSA %s", tostring(tlsa)); use, select, match, certdata = tlsa.use, tlsa.select, tlsa.match; @@ -69,18 +69,18 @@ certdata = hashes.sha512(certdata); elseif match ~= 0 then module:log("warn", "DANE match rule %d is unsupported", match); - certdata = nil + certdata = nil; end -- Should we check if the cert subject matches? if certdata and certdata == tlsa.data then (session.log or module._log)("info", "DANE validation successful"); - session.cert_identity_status = "valid" + session.cert_identity_status = "valid"; if use == 3 then - session.cert_chain_status = "valid" + session.cert_chain_status = "valid"; -- for usage 1 the chain has to be valid already end - match_found = true + match_found = true; break; end else