Merge lp:~twom/lazr.sshserver/python3-turnip into lp:~cjwatson/lazr.sshserver/python3

Proposed by Tom Wardill
Status: Merged
Merged at revision: 89
Proposed branch: lp:~twom/lazr.sshserver/python3-turnip
Merge into: lp:~cjwatson/lazr.sshserver/python3
Diff against target: 95 lines (+15/-15)
3 files modified
src/lazr/sshserver/auth.py (+7/-7)
src/lazr/sshserver/service.py (+1/-1)
src/lazr/sshserver/tests/test_auth.py (+7/-7)
To merge this branch: bzr merge lp:~twom/lazr.sshserver/python3-turnip
Reviewer Review Type Date Requested Status
Colin Watson Approve
Review via email: mp+361063@code.launchpad.net

Commit message

Required fixes for turnip

To post a comment you must log in.
Revision history for this message
Colin Watson (cjwatson) :
review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1=== modified file 'src/lazr/sshserver/auth.py'
2--- src/lazr/sshserver/auth.py 2018-07-04 11:52:47 +0000
3+++ src/lazr/sshserver/auth.py 2018-12-18 11:51:31 +0000
4@@ -99,9 +99,9 @@
5
6 # Set the only channel as a standard SSH session (with a couple of bug
7 # fixes).
8- self.channelLookup = {'session': PatchedSSHSession}
9+ self.channelLookup = {b'session': PatchedSSHSession}
10 # ...and set the only subsystem to be SFTP.
11- self.subsystemLookup = {'sftp': FileTransferServer}
12+ self.subsystemLookup = {b'sftp': FileTransferServer}
13
14 def logout(self):
15 notify(events.UserLoggedOut(self))
16@@ -182,7 +182,7 @@
17 self._configured_banner_sent = False
18 self._mind = UserDetailsMind()
19 self.interfaceToMethod = userauth.SSHUserAuthServer.interfaceToMethod
20- self.interfaceToMethod[ISSHPrivateKeyWithMind] = 'publickey'
21+ self.interfaceToMethod[ISSHPrivateKeyWithMind] = b'publickey'
22
23 def sendBanner(self, text, language='en'):
24 bytes = b'\r\n'.join(text.encode('UTF8').splitlines() + [b''])
25@@ -331,13 +331,13 @@
26
27 def _checkForAuthorizedKey(self, user_dict, credentials):
28 """Check the key data in credentials against the keys found in LP."""
29- if credentials.algName == 'ssh-dss':
30+ if credentials.algName == b'ssh-dss':
31 wantKeyType = 'DSA'
32- elif credentials.algName == 'ssh-rsa':
33+ elif credentials.algName == b'ssh-rsa':
34 wantKeyType = 'RSA'
35- elif credentials.algName.startswith('ecdsa-sha2-'):
36+ elif credentials.algName.startswith(b'ecdsa-sha2-'):
37 wantKeyType = 'ECDSA'
38- elif credentials.algName == 'ssh-ed25519':
39+ elif credentials.algName == b'ssh-ed25519':
40 wantKeyType = 'ED25519'
41 else:
42 # unknown key type
43
44=== modified file 'src/lazr/sshserver/service.py'
45--- src/lazr/sshserver/service.py 2018-12-18 09:46:55 +0000
46+++ src/lazr/sshserver/service.py 2018-12-18 11:51:31 +0000
47@@ -92,7 +92,7 @@
48 # at it. (Look for the beautiful line "self.portal =
49 # self.transport.factory.portal").
50 self.portal = portal
51- self.services['ssh-userauth'] = self._makeAuthServer
52+ self.services[b'ssh-userauth'] = self._makeAuthServer
53 self._private_key = private_key
54 self._public_key = public_key
55 self._banner = banner
56
57=== modified file 'src/lazr/sshserver/tests/test_auth.py'
58--- src/lazr/sshserver/tests/test_auth.py 2018-07-04 11:53:22 +0000
59+++ src/lazr/sshserver/tests/test_auth.py 2018-12-18 11:51:31 +0000
60@@ -488,10 +488,10 @@
61 # Attempting to log in with a username and key known to the
62 # authentication end-point succeeds.
63 for key_type, public_key in (
64- ('ssh-rsa', self.authserver.valid_key_rsa),
65- ('ssh-dss', self.authserver.valid_key_dsa),
66- ('ecdsa-sha2-nistp256', self.authserver.valid_key_ecdsa),
67- ('ssh-ed25519', self.authserver.valid_key_ed25519),
68+ (b'ssh-rsa', self.authserver.valid_key_rsa),
69+ (b'ssh-dss', self.authserver.valid_key_dsa),
70+ (b'ecdsa-sha2-nistp256', self.authserver.valid_key_ecdsa),
71+ (b'ssh-ed25519', self.authserver.valid_key_ed25519),
72 ):
73 creds = self.makeCredentials(
74 self.authserver.valid_user, key_type, public_key)
75@@ -550,7 +550,7 @@
76 # server informs you that the account has no keys.
77 checker = self.makeChecker()
78 creds = self.makeCredentials(
79- self.authserver.no_key_user, 'ssh-dss',
80+ self.authserver.no_key_user, b'ssh-dss',
81 self.authserver.valid_key_dsa)
82 return self.assertLoginError(
83 checker, creds,
84@@ -600,9 +600,9 @@
85 checker = self.makeChecker()
86 mind = auth.UserDetailsMind()
87 wrong_key_creds = self.makeCredentials(
88- self.authserver.valid_user, 'ssh-dss', 'invalid key', mind)
89+ self.authserver.valid_user, b'ssh-dss', 'invalid key', mind)
90 right_key_creds = self.makeCredentials(
91- self.authserver.valid_user, 'ssh-dss',
92+ self.authserver.valid_user, b'ssh-dss',
93 self.authserver.valid_key_dsa, mind)
94 try:
95 username = yield checker.requestAvatarId(wrong_key_creds)

Subscribers

People subscribed via source and target branches

to all changes: