[Git][NTPsec/ntpsec][master] Fixed problem with python3 and python3.6 versions
Ian Bruene
gitlab at mg.gitlab.com
Tue Sep 26 17:24:42 UTC 2017
Ian Bruene pushed to branch master at NTPsec / ntpsec
Commits:
c6724621 by Ian Bruene at 2017-09-26T12:20:30-05:00
Fixed problem with python3 and python3.6 versions
Responses arrive from the socket as bytes, __parse_varlist wants to
deal with characters.
NOTE: I tried using polystr on the doquery function to nip the
problem right where the data first arrived, for unknown reasons this
did not work. So the polystr call is in __parse_varlist.
- - - - -
1 changed file:
- pylib/packet.py
Changes:
=====================================
pylib/packet.py
=====================================
--- a/pylib/packet.py
+++ b/pylib/packet.py
@@ -1268,6 +1268,7 @@ class ControlSession:
kvpairs = []
instring = False
response = ""
+ self.response = polystr(self.response)
for c in self.response:
cord = polyord(c)
if c == '"':
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/c672462120fac645d75107e8dd324fea50b46862
---
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/c672462120fac645d75107e8dd324fea50b46862
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20170926/37a04703/attachment.html>
More information about the vc
mailing list