aboutsummaryrefslogtreecommitdiff
path: root/migration
diff options
context:
space:
mode:
authorDaniel P. Berrangé <berrange@redhat.com>2022-03-10 17:18:09 +0000
committerDr. David Alan Gilbert <dgilbert@redhat.com>2022-04-21 19:36:46 +0100
commit4b2bbca7a0b58475d7ffb2fea05adbe08cde57f8 (patch)
tree0a4870e0dcac5d50f1acca1214f9d373e6ffcd91 /migration
parent0c2b6c85c99d8d2a957e6637c7cc0fd33f2b0540 (diff)
downloadqemu-4b2bbca7a0b58475d7ffb2fea05adbe08cde57f8.zip
qemu-4b2bbca7a0b58475d7ffb2fea05adbe08cde57f8.tar.gz
qemu-4b2bbca7a0b58475d7ffb2fea05adbe08cde57f8.tar.bz2
migration: fix use of TLS PSK credentials with a UNIX socket
The migration TLS code has a check mandating that a hostname be available when starting a TLS session. This is expected when using x509 credentials, but is bogus for PSK and anonymous credentials as neither involve hostname validation. The TLS crdentials object gained suitable error reporting in the case of TLS with x509 credentials, so there is no longer any need for the migration code to do its own (incorrect) validation. Signed-off-by: Daniel P. Berrangé <berrange@redhat.com> Message-Id: <20220310171821.3724080-7-berrange@redhat.com> Reviewed-by: Juan Quintela <quintela@redhat.com> Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Diffstat (limited to 'migration')
-rw-r--r--migration/tls.c4
1 files changed, 0 insertions, 4 deletions
diff --git a/migration/tls.c b/migration/tls.c
index ca1ea3b..32c384a 100644
--- a/migration/tls.c
+++ b/migration/tls.c
@@ -137,10 +137,6 @@ QIOChannelTLS *migration_tls_client_create(MigrationState *s,
if (s->parameters.tls_hostname && *s->parameters.tls_hostname) {
hostname = s->parameters.tls_hostname;
}
- if (!hostname) {
- error_setg(errp, "No hostname available for TLS");
- return NULL;
- }
tioc = qio_channel_tls_new_client(
ioc, creds, hostname, errp);