Skip to content

Commit

Permalink
tls: removed redundant IsTlsConfigured() calls
Browse files Browse the repository at this point in the history
  • Loading branch information
franku committed Nov 20, 2018
1 parent 48bba6d commit c6d1bf8
Show file tree
Hide file tree
Showing 4 changed files with 16 additions and 37 deletions.
4 changes: 0 additions & 4 deletions core/src/dird/verify.cc
Expand Up @@ -346,10 +346,6 @@ bool DoVerify(JobControlRecord *jcr)
store->SDDport = store->SDport;
}

/*
* TLS Requirement
*/

tls_need = store->IsTlsConfigured() ? TlsPolicy::kBnetTlsAuto : TlsPolicy::kBnetTlsNone;

fd->fsend(storaddrcmd, store->address, store->SDDport, tls_need, jcr->sd_auth_key);
Expand Down
30 changes: 13 additions & 17 deletions core/src/lib/bsock.cc
Expand Up @@ -428,19 +428,17 @@ bool BareosSocket::DoTlsHandshakeAsAServer(ConfigurationParser *config, JobContr

void BareosSocket::ParameterizeTlsCert(Tls *tls_conn_init, TlsResource *tls_resource)
{
if (tls_resource->IsTlsConfigured()) {
const std::string empty;
tls_conn_init->Setca_certfile_(tls_resource->tls_cert_.ca_certfile_ ? *tls_resource->tls_cert_.ca_certfile_ : empty);
tls_conn_init->SetCaCertdir(tls_resource->tls_cert_.ca_certdir_ ? *tls_resource->tls_cert_.ca_certdir_ : empty);
tls_conn_init->SetCrlfile(tls_resource->tls_cert_.crlfile_ ? *tls_resource->tls_cert_.crlfile_ : empty);
tls_conn_init->SetCertfile(tls_resource->tls_cert_.certfile_ ? *tls_resource->tls_cert_.certfile_ : empty);
tls_conn_init->SetKeyfile(tls_resource->tls_cert_.keyfile_ ? *tls_resource->tls_cert_.keyfile_ : empty);
// tls_conn_init->SetPemCallback(TlsPemCallback); Ueb: --> Feature not implemented: Console Callback
tls_conn_init->SetPemUserdata(tls_resource->tls_cert_.pem_message_);
tls_conn_init->SetDhFile(tls_resource->tls_cert_.dhfile_ ? *tls_resource->tls_cert_.dhfile_ : empty);
tls_conn_init->SetCipherList(tls_resource->cipherlist_ ? *tls_resource->cipherlist_ : empty);
tls_conn_init->SetVerifyPeer(tls_resource->tls_cert_.verify_peer_);
}
const std::string empty;
tls_conn_init->Setca_certfile_(tls_resource->tls_cert_.ca_certfile_ ? *tls_resource->tls_cert_.ca_certfile_ : empty);
tls_conn_init->SetCaCertdir(tls_resource->tls_cert_.ca_certdir_ ? *tls_resource->tls_cert_.ca_certdir_ : empty);
tls_conn_init->SetCrlfile(tls_resource->tls_cert_.crlfile_ ? *tls_resource->tls_cert_.crlfile_ : empty);
tls_conn_init->SetCertfile(tls_resource->tls_cert_.certfile_ ? *tls_resource->tls_cert_.certfile_ : empty);
tls_conn_init->SetKeyfile(tls_resource->tls_cert_.keyfile_ ? *tls_resource->tls_cert_.keyfile_ : empty);
// tls_conn_init->SetPemCallback(TlsPemCallback); Ueb: --> Feature not implemented: Console Callback
tls_conn_init->SetPemUserdata(tls_resource->tls_cert_.pem_message_);
tls_conn_init->SetDhFile(tls_resource->tls_cert_.dhfile_ ? *tls_resource->tls_cert_.dhfile_ : empty);
tls_conn_init->SetCipherList(tls_resource->cipherlist_ ? *tls_resource->cipherlist_ : empty);
tls_conn_init->SetVerifyPeer(tls_resource->tls_cert_.verify_peer_);
}

bool BareosSocket::ParameterizeAndInitTlsConnectionAsAServer(ConfigurationParser *config)
Expand All @@ -461,9 +459,7 @@ bool BareosSocket::ParameterizeAndInitTlsConnectionAsAServer(ConfigurationParser

ParameterizeTlsCert(tls_conn_init.get(), tls_resource);

if (tls_resource->IsTlsConfigured()) {
tls_conn_init->SetTlsPskServerContext(config, config->GetTlsPskByFullyQualifiedResourceName);
}
tls_conn_init->SetTlsPskServerContext(config, config->GetTlsPskByFullyQualifiedResourceName);

if (!tls_conn_init->init()) {
tls_conn_init.reset();
Expand Down Expand Up @@ -517,7 +513,7 @@ bool BareosSocket::ParameterizeAndInitTlsConnection(TlsResource *tls_resource,
const char *password,
bool initiated_by_remote)
{
if (!tls_resource->IsTlsConfigured() && !tls_resource->IsTlsConfigured()) { return true; }
if (!tls_resource->IsTlsConfigured()) { return true; }

tls_conn_init.reset(Tls::CreateNewTlsContext(Tls::TlsImplementationType::kTlsOpenSsl));
if (!tls_conn_init) {
Expand Down
2 changes: 1 addition & 1 deletion core/src/lib/parse_conf.cc
Expand Up @@ -1030,7 +1030,7 @@ bool ConfigurationParser::GetCleartextConfigured(uint32_t r_code,
}

if (name == std::string("*UserAgent*")) {
cleartext = !own_tls_resource->IsTlsConfigured() && !own_tls_resource->IsTlsConfigured();
cleartext = !own_tls_resource->IsTlsConfigured();
} else {
cleartext = !own_tls_resource->IsTlsConfigured() && !foreign_tls_resource->IsTlsConfigured();
}
Expand Down
17 changes: 2 additions & 15 deletions core/src/tests/bsock_test.cc
Expand Up @@ -84,19 +84,6 @@ void InitForTest()
InitMsg(NULL, NULL);
}

#if 0
static bool check_cipher(const TlsResource &tls, const std::string &cipher)
{
bool success = false;
if (tls.IsTlsConfigured() && !tls.IsTlsConfigured()) { /* cert && !psk */
success = cipher.find("-RSA-") != std::string::npos;
} else if (!tls.IsTlsConfigured() && tls.IsTlsConfigured()) { /* !cert && psk */
success = cipher.find("-PSK-") != std::string::npos;
}
return success;
}
#endif

static void clone_a_server_socket(BareosSocket* bs)
{
std::unique_ptr<BareosSocket> bs2(bs->clone());
Expand Down Expand Up @@ -141,7 +128,7 @@ static void start_bareos_server(std::promise<bool> *promise, std::string console
Dmsg1(10, "Server used cipher: <%s>\n", cipher.c_str());
cipher_server = cipher;
}
if (dir_cons_config->IsTlsConfigured() || dir_cons_config->IsTlsConfigured()) {
if (dir_cons_config->IsTlsConfigured()) {
Dmsg0(10, bs->TlsEstablished() ? "Tls enable\n" : "Tls failed to establish\n");
success = bs->TlsEstablished();
} else {
Expand Down Expand Up @@ -219,7 +206,7 @@ static bool connect_to_server(std::string console_name, std::string console_pass
Dmsg1(10, "Client used cipher: <%s>\n", cipher.c_str());
cipher_client = cipher;
}
if (cons_dir_config->IsTlsConfigured() || cons_dir_config->IsTlsConfigured()) {
if (cons_dir_config->IsTlsConfigured()) {
Dmsg0(10, UA_sock->TlsEstablished() ? "Tls enable\n" : "Tls failed to establish\n");
success = UA_sock->TlsEstablished();
} else {
Expand Down

0 comments on commit c6d1bf8

Please sign in to comment.