diff --git a/no-default-cacert.patch b/no-default-cacert.patch index f0a4219..64d9891 100644 --- a/no-default-cacert.patch +++ b/no-default-cacert.patch @@ -29,14 +29,3 @@ if __name__ == '__main__': print(where()) ---- a/requests/packages/urllib3/util/ssl_.py -+++ b/requests/packages/urllib3/util/ssl_.py -@@ -278,6 +278,8 @@ def ssl_wrap_socket(sock, keyfile=None, - if e.errno == errno.ENOENT: - raise SSLError(e) - raise -+ elif cert_reqs != CERT_NONE: -+ context.set_default_verify_paths() - - if certfile: - context.load_cert_chain(certfile, keyfile) diff --git a/python-requests.changes b/python-requests.changes index fb88a5e..2163bce 100644 --- a/python-requests.changes +++ b/python-requests.changes @@ -1,3 +1,14 @@ +------------------------------------------------------------------- +Thu Dec 17 13:45:59 UTC 2015 - rjschwei@suse.com + +- Modify no-default-cacert + + The call to set_default_verify_paths() is not necessary. The openSUSE + and SLES Python has been patched to always use the system certs. + Additionally this call breaks the use of python-requests on older systems, + openSUSE_13.2 and original release of SLES 12 which fall back to + the built in implementation of ssl which doe not implement + this method + ------------------------------------------------------------------- Wed Oct 21 21:08:29 UTC 2015 - dmueller@suse.com