diff options
author | Ed Tanous <ed@tanous.net> | 2024-05-10 01:48:09 +0300 |
---|---|---|
committer | Ed Tanous <ed@tanous.net> | 2024-05-10 02:16:06 +0300 |
commit | 83328316857b42960edd46cadf06902d2d4ba00b (patch) | |
tree | 1329cd1fe0eb4084411f8d9459a52f8cf3f0ed14 /http/http2_connection.hpp | |
parent | 3eaecac33685ca3297d53e041ab5c5116bc18d25 (diff) | |
download | bmcweb-83328316857b42960edd46cadf06902d2d4ba00b.tar.xz |
Fix lesser used options
25b54dba775b31021a3a4677eb79e9771bcb97f7 missed several cases where we
had ifndef instead of ifdef. because these weren't the defaults, these
don't show up as failures when testing.
Tested: Redfish service validator passes. Inspection primarily.
Mechanical change.
Change-Id: I3f6915a97eb44d071795aed76476c6bee7e8ed27
Signed-off-by: Ed Tanous <ed@tanous.net>
Diffstat (limited to 'http/http2_connection.hpp')
-rw-r--r-- | http/http2_connection.hpp | 41 |
1 files changed, 20 insertions, 21 deletions
diff --git a/http/http2_connection.hpp b/http/http2_connection.hpp index efe66b635f..446c38f302 100644 --- a/http/http2_connection.hpp +++ b/http/http2_connection.hpp @@ -262,31 +262,30 @@ class HTTP2Connection : }); auto asyncResp = std::make_shared<bmcweb::AsyncResp>(std::move(it->second.res)); -#ifndef BMCWEB_INSECURE_DISABLE_AUTHX - thisReq.session = crow::authentication::authenticate( - {}, asyncResp->res, thisReq.method(), thisReq.req, nullptr); - if (!crow::authentication::isOnAllowlist(thisReq.url().path(), - thisReq.method()) && - thisReq.session == nullptr) - { - BMCWEB_LOG_WARNING("Authentication failed"); - forward_unauthorized::sendUnauthorized( - thisReq.url().encoded_path(), - thisReq.getHeaderValue("X-Requested-With"), - thisReq.getHeaderValue("Accept"), asyncResp->res); - } - else -#endif // BMCWEB_INSECURE_DISABLE_AUTHX + if constexpr (!BMCWEB_INSECURE_DISABLE_AUTH) { - std::string_view expected = thisReq.getHeaderValue( - boost::beast::http::field::if_none_match); - BMCWEB_LOG_DEBUG("Setting expected hash {}", expected); - if (!expected.empty()) + thisReq.session = crow::authentication::authenticate( + {}, asyncResp->res, thisReq.method(), thisReq.req, nullptr); + if (!crow::authentication::isOnAllowlist(thisReq.url().path(), + thisReq.method()) && + thisReq.session == nullptr) { - asyncResp->res.setExpectedHash(expected); + BMCWEB_LOG_WARNING("Authentication failed"); + forward_unauthorized::sendUnauthorized( + thisReq.url().encoded_path(), + thisReq.getHeaderValue("X-Requested-With"), + thisReq.getHeaderValue("Accept"), asyncResp->res); + return 0; } - handler->handle(it->second.req, asyncResp); } + std::string_view expected = + thisReq.getHeaderValue(boost::beast::http::field::if_none_match); + BMCWEB_LOG_DEBUG("Setting expected hash {}", expected); + if (!expected.empty()) + { + asyncResp->res.setExpectedHash(expected); + } + handler->handle(it->second.req, asyncResp); return 0; } |