aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKim Alvefur <zash@zash.se>2013-03-11 21:39:15 +0100
committerKim Alvefur <zash@zash.se>2013-03-11 21:39:15 +0100
commit5f13122f42087d5f052e0a9be03610c8a1fbd191 (patch)
tree8a3b05be3b74c78f03f2d148450e101cec41c3ba
parentd53df86e91cf56e780afc8a3975419ebec29be6f (diff)
downloadprosody-5f13122f42087d5f052e0a9be03610c8a1fbd191.tar.gz
prosody-5f13122f42087d5f052e0a9be03610c8a1fbd191.zip
mod_s2s: Make sure host variable is reachable
-rw-r--r--plugins/mod_s2s/mod_s2s.lua3
1 files changed, 1 insertions, 2 deletions
diff --git a/plugins/mod_s2s/mod_s2s.lua b/plugins/mod_s2s/mod_s2s.lua
index cabe8ea2..74014457 100644
--- a/plugins/mod_s2s/mod_s2s.lua
+++ b/plugins/mod_s2s/mod_s2s.lua
@@ -136,6 +136,7 @@ end
--- Helper to check that a session peer's certificate is valid
local function check_cert_status(session)
+ local host = session.direction == "incoming" and session.from_host or session.to_host
local conn = session.conn:socket()
local cert
if conn.getpeercertificate then
@@ -155,8 +156,6 @@ local function check_cert_status(session)
(session.log or log)("debug", "certificate chain validation result: valid");
session.cert_chain_status = "valid";
- local host = session.direction == "incoming" and session.from_host or session.to_host
-
-- We'll go ahead and verify the asserted identity if the
-- connecting server specified one.
if host then