else
s.setClientCertificatePath(client_cert);
}
- Pathname client_key( url.getQueryParam("ssl_clientkey") );
- if( ! client_key.empty())
- {
- if( !PathInfo(client_key).isFile() || !client_key.absolute())
- ZYPP_THROW(MediaBadUrlException(url, "Invalid ssl_clientkey file"));
- else
- s.setClientKeyPath(client_key);
- }
param = url.getQueryParam( "proxy" );
if ( ! param.empty() )
// so that we don't add headers twice
TransferSettings vol_settings(_settings);
- // add custom headers for download.opensuse.org (bsc#955801)
- if ( _url.getHost() == "download.opensuse.org" )
- {
- vol_settings.addHeader(anonymousIdHeader());
- vol_settings.addHeader(distributionFlavorHeader());
- }
+ // add custom headers
+ vol_settings.addHeader(anonymousIdHeader());
+ vol_settings.addHeader(distributionFlavorHeader());
vol_settings.addHeader("Pragma:");
_settings.setTimeout(ZConfig::instance().download_transfer_timeout());
{
SET_OPTION(CURLOPT_SSLCERT, _settings.clientCertificatePath().c_str());
}
- if( ! _settings.clientKeyPath().empty() )
- {
- SET_OPTION(CURLOPT_SSLKEY, _settings.clientKeyPath().c_str());
- }
#ifdef CURLSSLOPT_ALLOW_BEAST
// see bnc#779177
break;
case CURLE_SSL_PEER_CERTIFICATE:
default:
- err = "Curl error " + str::numstring( code );
+ err = "Unrecognized error";
break;
}