if N == 'arc' then
sym_check = 'ARC_REJECT'
end
+ if domain then
+ domain = tostring(domain)
+ end
if task:has_symbol(sym_check) then
local sym = task:get_symbol(sym_check)[1]
logger.infox(task, 'skip signing for %s: violation %s found: %s',
return false, {}
end
+ domain = tostring(domain)
+ selector = tostring(selector)
+ key = tostring(key)
+
-- Now check if we need to check the existing auth
local hdr = task:get_request_header(headers.sign_on_reject_header)
if not hdr or tostring(hdr) == '0' or tostring(hdr) == 'false' then
local p = {}
local k = {
- domain = tostring(domain),
- rawkey = tostring(key),
- selector = tostring(selector),
+ domain = domain,
+ rawkey = key,
+ selector = selector,
}
table.insert(p, k)
return true, p
['get_value'] = function(task, args)
local hdr = task:get_request_header(args[1])
if hdr then
- return hdr, 'string'
+ return tostring(hdr), 'string'
end
return nil
if query_set then
local parser = ucl.parser()
- local res, err = parser:parse_text(query_set)
+ local res, err = parser:parse_text(tostring(query_set))
if res then
if settings_id then
rspamd_logger.warnx(task, "both settings-id '%s' and settings headers are presented, ignore settings-id; ",
return function(task)
local rh = task:get_request_header(hname)
if rh then
- return { rh }
+ return { tostring(rh) }
end
return {}
end