[Git][NTPsec/ntpsec][master] Fixed problem with python3 and python3.6 versions

Ian Bruene gitlab at mg.gitlab.com
Tue Sep 26 17:24:42 UTC 2017


Ian Bruene pushed to branch master at NTPsec / ntpsec


Commits:
c6724621 by Ian Bruene at 2017-09-26T12:20:30-05:00
Fixed problem with python3 and python3.6 versions

Responses arrive from the socket as bytes, __parse_varlist wants to
deal with characters.

NOTE: I tried using polystr on the doquery function to nip the
problem right where the data first arrived, for unknown reasons this
did not work. So the polystr call is in __parse_varlist.

- - - - -


1 changed file:

- pylib/packet.py


Changes:

=====================================
pylib/packet.py
=====================================
--- a/pylib/packet.py
+++ b/pylib/packet.py
@@ -1268,6 +1268,7 @@ class ControlSession:
         kvpairs = []
         instring = False
         response = ""
+        self.response = polystr(self.response)
         for c in self.response:
             cord = polyord(c)
             if c == '"':



View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/c672462120fac645d75107e8dd324fea50b46862

---
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/c672462120fac645d75107e8dd324fea50b46862
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20170926/37a04703/attachment.html>


More information about the vc mailing list