summaryrefslogtreecommitdiffstats
path: root/main/halberd/halberd-sslwrap.patch
diff options
context:
space:
mode:
authorFabian Affolter <fabian@affolter-engineering.ch>2011-07-05 21:44:55 +0000
committerFabian Affolter <fabian@affolter-engineering.ch>2011-07-05 21:44:55 +0000
commit37c3cc1e3f72ed7301e749cfc1138609e7498c8a (patch)
treec71bb1c985d164f96484a4b28a3822e0b3997b47 /main/halberd/halberd-sslwrap.patch
parent7f9851115264bca9bce3926ddb29e533a23929dd (diff)
downloadaports-37c3cc1e3f72ed7301e749cfc1138609e7498c8a.tar.bz2
aports-37c3cc1e3f72ed7301e749cfc1138609e7498c8a.tar.xz
Initial APKBUILD for halberd
Package description: To cope with heavy traffic loads, web site administrators often install load balancer devices. These machines hide (possibly) many real web servers behind a virtual IP. They receive HTTP requests and redirect them to the real web servers in order to share the traffic between them. Halberd is a tool aimed at discovering real servers behind virtual IPs.
Diffstat (limited to 'main/halberd/halberd-sslwrap.patch')
-rw-r--r--main/halberd/halberd-sslwrap.patch30
1 files changed, 30 insertions, 0 deletions
diff --git a/main/halberd/halberd-sslwrap.patch b/main/halberd/halberd-sslwrap.patch
new file mode 100644
index 000000000..fc172e034
--- /dev/null
+++ b/main/halberd/halberd-sslwrap.patch
@@ -0,0 +1,30 @@
+--- Halberd/clientlib.py.orig
++++ Halberd/clientlib.py
+@@ -31,6 +31,7 @@
+
+ import time
+ import socket
++import ssl
+ import urlparse
+
+ from itertools import takewhile
+@@ -310,7 +311,7 @@
+
+ self._recv = None
+ self._sslsock = None
+- self._timeout_exceptions.append(socket.sslerror)
++ self._timeout_exceptions.append(ssl.SSLError)
+
+ # Path to an SSL key file and certificate.
+ self.keyfile = None
+@@ -327,8 +328,8 @@
+ """
+ HTTPClient._connect(self, addr)
+ try:
+- self._sslsock = socket.ssl(self._sock, self.keyfile, self.certfile)
+- except socket.sslerror, msg:
++ self._sslsock = ssl.wrap_socket(self._sock, self.keyfile, self.certfile)
++ except ssl.SSLError, msg:
+ raise HTTPSError, msg
+
+ self._recv = self._sslsock.read