I was indeed being tricked. I actually tested soap with a real client, but
with xmlrpc i was using the browser. I was expecting to see the same error
message, and instead got a new one that was presented by the modifications
I pulled out of the trunk to support the issue in #4014. I was expect
Using the current trunk r27366 (which is after #4014 fixed a related
issue), I am having trouble with an implementation of web.guard wrapped
XMLRPC. This is a new test implementation to expose both a soap and xmlrpc
interface. SOAP works, but xmlrpc throws UnsupportedMethod POST.
Here is my
!
--
On Sat, 4 Jul 2009 02:11:36 -0700, asset wrote:
>Ive been at it for several days now trying to get at the username
>(avatarId), session id (SSHChannel session # I imagine), and terminal
>protocol instance (recvline.HistoricRecvLine) of my application's SSH
>terminal
Ive been at it for several days now trying to get at the username
(avatarId), session id (SSHChannel session # I imagine), and terminal
protocol instance (recvline.HistoricRecvLine) of my application's SSH
terminal service's clients. Specifically, I'm trying to expose these three
things (for a
-
From: "Paul Swartz"
Sent: Thursday, May 14, 2009 12:11 PM
To: as...@impactdamage.com, "Twisted general discussion"
Subject: SPAM-LOW: Re: [Twisted-Python] Conch Checkers Help
On 05/14/2009 07:14 PM, asset wrote:
> Can somebody point me into the rig
Can somebody point me into the right direction in how to switch out
checkers.InMemoryUsernamePasswordDatabaseDontUse with something that would
authenticate linux users, like root?
On some things i just cant seem to get past documentation and api docs.
Hoping for a slight push in the right dire
Would I be right in assuming that the example echoserv_ssl.py and
echoclient_ssl.py will only result in encryption from the client to server and
not from the server back to the client?
Im referencing these examples specifically,
http://twistedmatrix.com/projects/core/documentation/examples/echoc