# HG changeset patch # User Matthew Wild # Date 1378206671 -3600 # Node ID b93d096607b437d0901b129e88559e3f8a01ccc8 # Parent c888f548876b7dc9735c713ed13df2730ba25696 certmanager: Fix for working around a bug with LuaSec 0.4.1 that causes it to not honour the 'ciphers' option. This change will apply 0.9's default cipher string for LuaSec 0.4.1 users. diff -r c888f548876b -r b93d096607b4 core/certmanager.lua --- a/core/certmanager.lua Mon Sep 02 20:52:19 2013 +0100 +++ b/core/certmanager.lua Tue Sep 03 12:11:11 2013 +0100 @@ -74,11 +74,11 @@ local ctx, err = ssl_newcontext(ssl_config); - -- LuaSec ignores the cipher list from the config, so we have to take care - -- of it ourselves (W/A for #x) - if ctx and user_ssl_config.ciphers then + -- COMPAT: LuaSec 0.4.1 ignores the cipher list from the config, so we have to take + -- care of it ourselves... + if ctx and ssl_config.ciphers then local success; - success, err = ssl.context.setcipher(ctx, user_ssl_config.ciphers); + success, err = ssl.context.setcipher(ctx, ssl_config.ciphers); if not success then ctx = nil; end end