Index: net/tools/testserver/testserver.py |
diff --git a/net/tools/testserver/testserver.py b/net/tools/testserver/testserver.py |
index 13aafcd538bdfd4775fcf3ba0a8915e193753273..8f10d8a49924f02225acfbcf2b0a476dbdc05f03 100755 |
--- a/net/tools/testserver/testserver.py |
+++ b/net/tools/testserver/testserver.py |
@@ -44,14 +44,24 @@ import testserver_base |
# Append at the end of sys.path, it's fine to use the system library. |
sys.path.append(os.path.join(ROOT_DIR, 'third_party', 'pyftpdlib', 'src')) |
-sys.path.append(os.path.join(ROOT_DIR, 'third_party', 'tlslite')) |
import pyftpdlib.ftpserver |
-import tlslite |
-import tlslite.api |
+ |
+# Temporary hack to deal with tlslite 0.3.8 -> 0.4.0 upgrade. |
+# |
+# TODO(davidben): Remove this when it has landed and cycled through all the |
+# bots. |
+try: |
+ os.remove(os.path.join(ROOT_DIR, 'third_party', 'tlslite', |
+ 'tlslite', 'utils', 'hmac.pyc')) |
+except Exception: |
+ pass |
# Insert at the beginning of the path, we want this to be used |
# unconditionally. |
sys.path.insert(0, os.path.join(ROOT_DIR, 'third_party', 'pywebsocket', 'src')) |
+sys.path.insert(0, os.path.join(ROOT_DIR, 'third_party', 'tlslite')) |
+import tlslite |
+import tlslite.api |
import mod_pywebsocket.standalone |
from mod_pywebsocket.standalone import WebSocketServer |
# import manually |
@@ -142,7 +152,8 @@ class HTTPSServer(tlslite.api.TLSSocketServerMixIn, |
ssl_client_auth, ssl_client_cas, ssl_bulk_ciphers, |
record_resume_info, tls_intolerant, signed_cert_timestamps, |
fallback_scsv_enabled, ocsp_response): |
- self.cert_chain = tlslite.api.X509CertChain().parseChain(pem_cert_and_key) |
+ self.cert_chain = tlslite.api.X509CertChain() |
+ self.cert_chain.parsePemList(pem_cert_and_key) |
# Force using only python implementation - otherwise behavior is different |
# depending on whether m2crypto Python module is present (error is thrown |
# when it is). m2crypto uses a C (based on OpenSSL) implementation under |
@@ -152,7 +163,10 @@ class HTTPSServer(tlslite.api.TLSSocketServerMixIn, |
implementations=['python']) |
self.ssl_client_auth = ssl_client_auth |
self.ssl_client_cas = [] |
- self.tls_intolerant = tls_intolerant |
+ if tls_intolerant == 0: |
+ self.tls_intolerant = None |
+ else: |
+ self.tls_intolerant = (3, tls_intolerant) |
self.signed_cert_timestamps = signed_cert_timestamps |
self.fallback_scsv_enabled = fallback_scsv_enabled |
self.ocsp_response = ocsp_response |
@@ -1436,11 +1450,14 @@ class TestPageHandler(testserver_base.BasePageHandler): |
self.send_header('Content-Type', 'text/plain') |
self.end_headers() |
try: |
- for (action, sessionID) in self.server.session_cache.log: |
- self.wfile.write('%s\t%s\n' % (action, sessionID.encode('hex'))) |
+ log = self.server.session_cache.log |
except AttributeError: |
self.wfile.write('Pass --https-record-resume in order to use' + |
' this request') |
+ return True |
+ |
+ for (action, sessionID) in log: |
+ self.wfile.write('%s\t%s\n' % (action, bytes(sessionID).encode('hex'))) |
return True |
def SSLManySmallRecords(self): |
@@ -1470,7 +1487,7 @@ class TestPageHandler(testserver_base.BasePageHandler): |
self.send_response(200) |
self.send_header('Content-Type', 'text/plain') |
self.end_headers() |
- channel_id = self.server.tlsConnection.channel_id.tostring() |
+ channel_id = bytes(self.server.tlsConnection.channel_id) |
self.wfile.write(hashlib.sha256(channel_id).digest().encode('base64')) |
return True |