Skip to content
Snippets Groups Projects
  1. Oct 26, 2010
  2. Oct 25, 2010
  3. Oct 22, 2010
  4. Oct 21, 2010
  5. Oct 20, 2010
  6. Oct 19, 2010
  7. Oct 15, 2010
    • Michael Hanselmann's avatar
      Merge branch 'devel-2.2' · 25c45709
      Michael Hanselmann authored
      
      * devel-2.2:
        http.client: Disable SSL session ID cache
        Crude workaround for pylint breakage
      
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarGuido Trotter <ultrotter@google.com>
      25c45709
    • Apollon Oikonomopoulos's avatar
      http.client: Disable SSL session ID cache · 4ba4fe14
      Apollon Oikonomopoulos authored
      
      This patch disables the SSL session ID cache for all cURL operations.
      This is needed because http.HttpBase's PyOpenSSL implementation does not
      currently set a context using SSL_set_session_id_context(3SSL), cURL
      tries to re-use the session ID and, according to
      SSL_set_session_id_context(3SSL):
      
       If the session id context is not set on an SSL/TLS server and client
       certificates are used, stored sessions will not be reused but a fatal
       error will be flagged and the handshake will fail.
      
      Ideally, session caching should be either controlled, or disabled in
      HttpBase, however PyOpenSSL does not seem to implement
      SSL_CTX_set_session_cache_mode nor SSL_CTX_set_session_id_context which
      are used for these purposes (it seems that only M2Crypto's SSL module
      supports these).
      
      Signed-off-by: default avatarApollon Oikonomopoulos <apollon@noc.grnet.gr>
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarMichael Hanselmann <hansmi@google.com>
      4ba4fe14
    • Apollon Oikonomopoulos's avatar
      http.client: Disable SSL session ID cache · 7b70d7a8
      Apollon Oikonomopoulos authored
      
      This patch disables the SSL session ID cache for all cURL operations.
      This is needed because http.HttpBase's PyOpenSSL implementation does not
      currently set a context using SSL_set_session_id_context(3SSL), cURL
      tries to re-use the session ID and, according to
      SSL_set_session_id_context(3SSL):
      
       If the session id context is not set on an SSL/TLS server and client
       certificates are used, stored sessions will not be reused but a fatal
       error will be flagged and the handshake will fail.
      
      Ideally, session caching should be either controlled, or disabled in
      HttpBase, however PyOpenSSL does not seem to implement
      SSL_CTX_set_session_cache_mode nor SSL_CTX_set_session_id_context which
      are used for these purposes (it seems that only M2Crypto's SSL module
      supports these).
      
      Signed-off-by: default avatarApollon Oikonomopoulos <apollon@noc.grnet.gr>
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarMichael Hanselmann <hansmi@google.com>
      7b70d7a8
    • Iustin Pop's avatar
      Crude workaround for pylint breakage · f1763373
      Iustin Pop authored
      
      The way we currently call pylint, the exact order it inspect modules in
      lib/http/ depends on the filesystem order. This is not good, and if
      lib/http/server.py is loaded before lib/http/__init__.py, it will throw
      a "R0921:763:HttpMessageReader: Abstract class not referenced" (as that
      class is used in server.py).
      
      For the short-term fix, we just add server.py after "ganeti", so that
      it gets parsed (again?) and pylint sees the usage of the class.
      
      Signed-off-by: default avatarIustin Pop <iustin@google.com>
      Reviewed-by: default avatarMichael Hanselmann <hansmi@google.com>
      f1763373
Loading