Don't require content-type for OHTTP key fetch in masque_tcp_server This should have never been there, and the client was fixed in cl/841205501. PiperOrigin-RevId: 843681249
diff --git a/quiche/quic/masque/masque_tcp_server_bin.cc b/quiche/quic/masque/masque_tcp_server_bin.cc index 1f33213..8ea142b 100644 --- a/quiche/quic/masque/masque_tcp_server_bin.cc +++ b/quiche/quic/masque/masque_tcp_server_bin.cc
@@ -464,14 +464,14 @@ auto path_pair = headers.find(":path"); auto method_pair = headers.find(":method"); auto content_type_pair = headers.find("content-type"); + auto accept_pair = headers.find("accept"); if (path_pair == headers.end() || method_pair == headers.end()) { // This should never happen because the h2 adapter should have rejected // the request, but handle it gracefully just in case. response_headers[":status"] = "400"; response_body = "Request missing pseudo-headers"; - } else if (method_pair->second == "GET" && - content_type_pair != headers.end() && - content_type_pair->second == "application/ohttp-keys") { + } else if (method_pair->second == "GET" && accept_pair != headers.end() && + accept_pair->second == "application/ohttp-keys") { response_headers[":status"] = "200"; response_headers["content-type"] = "application/ohttp-keys"; response_body = masque_ohttp_gateway_->concatenated_keys();