[OBCDC][SSL] Fix use invalid ca_cert to verify rpc

This commit is contained in:
SanmuWangZJU
2024-09-18 07:14:04 +00:00
committed by ob-robot
parent 14e651ff4d
commit 42756bbbc9

View File

@ -262,6 +262,9 @@ int ObLogRpc::reload_ssl_config()
} else if (last_ssl_info_hash_ == new_hash_value) { } else if (last_ssl_info_hash_ == new_hash_value) {
LOG_INFO("no need reload_ssl_config", K(new_hash_value)); LOG_INFO("no need reload_ssl_config", K(new_hash_value));
} else { } else {
#ifdef OB_BUILD_TDE_SECURITY
share::ObSSLClient client;
#endif
bool use_bkmi = false; bool use_bkmi = false;
bool use_sm = false; bool use_sm = false;
const char *ca_cert = NULL; const char *ca_cert = NULL;
@ -286,8 +289,6 @@ int ObLogRpc::reload_ssl_config()
ret = OB_NOT_SUPPORTED; ret = OB_NOT_SUPPORTED;
LOG_WARN("only support local file mode", K(ret)); LOG_WARN("only support local file mode", K(ret));
#else #else
share::ObSSLClient client;
if (OB_FAIL(client.init(ssl_config.ptr(), ssl_config.length()))) { if (OB_FAIL(client.init(ssl_config.ptr(), ssl_config.length()))) {
OB_LOG(WARN, "kms client init", K(ret), K(ssl_config)); OB_LOG(WARN, "kms client init", K(ret), K(ssl_config));
} else if (OB_FAIL(client.check_param_valid())) { } else if (OB_FAIL(client.check_param_valid())) {