On Tue, Aug 13, 2013 at 04:56:57PM +0200, Willy Tarreau wrote:
> On Tue, Aug 13, 2013 at 03:36:09PM +0100, Scott McKeown wrote:
> > Hi Guys,
> > 
> > I've not applied any patches to the download as this was a direct 'wget'
> > from the Git repository.
> > As follows is the OpenSSL v1.0.0 Centos 6.4 x64 build
> > 
> > [root@localhost ~]# wget
> > https://github.com/horms/haproxy/archive/agent-check-20130806.zip
> 
> Hmmm it looks to me that this is not the mainstream code, but Simon's tree.
> Oh BTW that reminds me that I have still not reviewed his patch set, shame
> on me :-(

Although Scott would have been better off using your tree it it does seem
that Scott has uncovered a bug in the patches in my tree, thanks for that.
I will squash the following into "MEDIUM: Split up struct server's check
element" before reposting to resolve this problem.


diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index ce1712d..23bf4a3 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -793,7 +793,7 @@ int ssl_sock_prepare_srv_ctx(struct server *srv, struct 
proxy *curproxy)
        if (srv->use_ssl)
                srv->xprt = &ssl_sock;
        if (srv->check.use_ssl)
-               srv->check.xprt = &ssl_sock;
+               srv->check_common.xprt = &ssl_sock;
 
        srv->ssl_ctx.ctx = SSL_CTX_new(SSLv23_client_method());
        if (!srv->ssl_ctx.ctx) {

Reply via email to