server session FEATURE any transport combination support
diff --git a/src/session_server.c b/src/session_server.c
index d49edb1..1f6c856 100644
--- a/src/session_server.c
+++ b/src/session_server.c
@@ -1716,8 +1716,6 @@
nc_ps_unlock(ps, q_id, __func__);
}
-#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
-
static int
nc_get_uid(int sock, uid_t *uid)
{
@@ -2103,13 +2101,24 @@
}
if (sock > -1) {
-#if defined(NC_ENABLED_SSH) && defined(NC_ENABLED_TLS)
- VRB("Listening on %s:%u for %s connections.", address, port, (endpt->ti == NC_TI_LIBSSH ? "SSH" : "TLS"));
-#elif defined(NC_ENABLED_SSH)
- VRB("Listening on %s:%u for SSH connections.", address, port);
-#else
- VRB("Listening on %s:%u for TLS connections.", address, port);
+ switch (endpt->ti) {
+ case NC_TI_UNIX:
+ VRB("Listening on %s for UNIX connections.", address);
+ break;
+#ifdef NC_ENABLED_SSH
+ case NC_TI_LIBSSH:
+ VRB("Listening on %s:%u for SSH connections.", address, port);
+ break;
#endif
+#ifdef NC_ENABLED_TLS
+ case NC_TI_OPENSSL:
+ VRB("Listening on %s:%u for TLS connections.", address, port);
+ break;
+#endif
+ default:
+ ERRINT;
+ break;
+ }
}
cleanup:
@@ -2128,12 +2137,16 @@
return nc_server_endpt_set_address_port(endpt_name, address, 0);
}
+#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
+
API int
nc_server_endpt_set_port(const char *endpt_name, uint16_t port)
{
return nc_server_endpt_set_address_port(endpt_name, NULL, port);
}
+#endif
+
API int
nc_server_endpt_set_perms(const char *endpt_name, mode_t mode, uid_t uid, gid_t gid)
{
@@ -2363,6 +2376,8 @@
return msgtype;
}
+#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
+
/* client is expected to be locked */
static int
_nc_server_ch_client_del_endpt(struct nc_ch_client *client, const char *endpt_name, NC_TRANSPORT_IMPL ti)