|
|
@ -0,0 +1,87 @@ |
|
|
|
commit ea489aa18caacf057880c67b933689c363307a23 |
|
|
|
Author: Amaury Denoyelle <adenoyelle@haproxy.com> |
|
|
|
Date: Thu Nov 25 10:20:19 2021 +0100 |
|
|
|
|
|
|
|
BUILD/MINOR: server: fix compilation without SSL |
|
|
|
|
|
|
|
The build without SSL was broken by the following backported commit: |
|
|
|
8e99b84dba7755e73563093a8fcedb25e70e7b94 |
|
|
|
MEDIUM: server/backend: implement websocket protocol selection |
|
|
|
|
|
|
|
Fix this by checking the ALPN only if USE_OPENSSL and |
|
|
|
TLSEXT_TYPE_application_layer_protocol_negotiation are defined. Else |
|
|
|
always use the server mux-proto. |
|
|
|
|
|
|
|
No need to backport. |
|
|
|
|
|
|
|
--- a/src/server.c
|
|
|
|
+++ b/src/server.c
|
|
|
|
@@ -204,7 +204,33 @@ void srv_set_dyncookie(struct server *s)
|
|
|
|
*/ |
|
|
|
int srv_check_reuse_ws(struct server *srv) |
|
|
|
{ |
|
|
|
- if (srv->mux_proto || srv->use_ssl != 1 || !srv->ssl_ctx.alpn_str) {
|
|
|
|
+#if defined(USE_OPENSSL) && defined(TLSEXT_TYPE_application_layer_protocol_negotiation)
|
|
|
|
+ if (!srv->mux_proto && srv->use_ssl && srv->ssl_ctx.alpn_str) {
|
|
|
|
+ /* ALPN selection.
|
|
|
|
+ * Based on the assumption that only "h2" and "http/1.1" token
|
|
|
|
+ * are used on server ALPN.
|
|
|
|
+ */
|
|
|
|
+ const struct ist alpn = ist2(srv->ssl_ctx.alpn_str,
|
|
|
|
+ srv->ssl_ctx.alpn_len);
|
|
|
|
+
|
|
|
|
+ switch (srv->ws) {
|
|
|
|
+ case SRV_WS_AUTO:
|
|
|
|
+ /* for auto mode, consider reuse as possible if the
|
|
|
|
+ * server uses a single protocol ALPN
|
|
|
|
+ */
|
|
|
|
+ if (!istchr(alpn, ','))
|
|
|
|
+ return 1;
|
|
|
|
+ break;
|
|
|
|
+
|
|
|
|
+ case SRV_WS_H2:
|
|
|
|
+ return isteq(alpn, ist("\x02h2"));
|
|
|
|
+
|
|
|
|
+ case SRV_WS_H1:
|
|
|
|
+ return isteq(alpn, ist("\x08http/1.1"));
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else {
|
|
|
|
+#endif /* defined(OPENSSL) && defined(TLSEXT_TYPE_application_layer_protocol_negotiation) */
|
|
|
|
/* explicit srv.mux_proto or no ALPN : srv.mux_proto is used |
|
|
|
* for mux selection. |
|
|
|
*/ |
|
|
|
@@ -232,31 +258,9 @@ int srv_check_reuse_ws(struct server *sr
|
|
|
|
return 1; |
|
|
|
break; |
|
|
|
} |
|
|
|
+#if defined(USE_OPENSSL) && defined(TLSEXT_TYPE_application_layer_protocol_negotiation)
|
|
|
|
} |
|
|
|
- else {
|
|
|
|
- /* ALPN selection.
|
|
|
|
- * Based on the assumption that only "h2" and "http/1.1" token
|
|
|
|
- * are used on server ALPN.
|
|
|
|
- */
|
|
|
|
- const struct ist alpn = ist2(srv->ssl_ctx.alpn_str,
|
|
|
|
- srv->ssl_ctx.alpn_len);
|
|
|
|
-
|
|
|
|
- switch (srv->ws) {
|
|
|
|
- case SRV_WS_AUTO:
|
|
|
|
- /* for auto mode, consider reuse as possible if the
|
|
|
|
- * server uses a single protocol ALPN
|
|
|
|
- */
|
|
|
|
- if (!istchr(alpn, ','))
|
|
|
|
- return 1;
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case SRV_WS_H2:
|
|
|
|
- return isteq(alpn, ist("\x02h2"));
|
|
|
|
-
|
|
|
|
- case SRV_WS_H1:
|
|
|
|
- return isteq(alpn, ist("\x08http/1.1"));
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
+#endif /* defined(OPENSSL) && defined(TLSEXT_TYPE_application_layer_protocol_negotiation) */
|
|
|
|
|
|
|
|
return 0; |
|
|
|
} |