Accepting request 315859 from devel:languages:python
1 OBS-URL: https://build.opensuse.org/request/show/315859 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-requests?expand=0&rev=24
This commit is contained in:
commit
ffd4f57adb
@ -1,6 +1,8 @@
|
|||||||
--- a/requests/adapters.py
|
Index: requests-2.6.0/requests/adapters.py
|
||||||
+++ b/requests/adapters.py
|
===================================================================
|
||||||
@@ -132,9 +132,6 @@
|
--- requests-2.6.0.orig/requests/adapters.py
|
||||||
|
+++ requests-2.6.0/requests/adapters.py
|
||||||
|
@@ -177,9 +177,6 @@ class HTTPAdapter(BaseAdapter):
|
||||||
if not cert_loc:
|
if not cert_loc:
|
||||||
cert_loc = DEFAULT_CA_BUNDLE_PATH
|
cert_loc = DEFAULT_CA_BUNDLE_PATH
|
||||||
|
|
||||||
@ -10,20 +12,40 @@
|
|||||||
conn.cert_reqs = 'CERT_REQUIRED'
|
conn.cert_reqs = 'CERT_REQUIRED'
|
||||||
conn.ca_certs = cert_loc
|
conn.ca_certs = cert_loc
|
||||||
else:
|
else:
|
||||||
--- a/requests/certs.py
|
Index: requests-2.6.0/requests/certs.py
|
||||||
+++ b/requests/certs.py
|
===================================================================
|
||||||
@@ -19,7 +19,7 @@
|
--- requests-2.6.0.orig/requests/certs.py
|
||||||
|
+++ requests-2.6.0/requests/certs.py
|
||||||
|
@@ -18,8 +18,9 @@ try:
|
||||||
|
except ImportError:
|
||||||
def where():
|
def where():
|
||||||
"""Return the preferred certificate bundle."""
|
"""Return the preferred certificate bundle."""
|
||||||
# vendored bundle inside Requests
|
- # vendored bundle inside Requests
|
||||||
- return os.path.join(os.path.dirname(__file__), 'cacert.pem')
|
- return os.path.join(os.path.dirname(__file__), 'cacert.pem')
|
||||||
+ return '/etc/ssl/certs/'
|
+ # in openSUSE we rely on openssl's default instead of
|
||||||
|
+ # hardcoding stuff elsewhere
|
||||||
|
+ return None
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
print(where())
|
print(where())
|
||||||
--- a/MANIFEST.in
|
Index: requests-2.6.0/MANIFEST.in
|
||||||
+++ b/MANIFEST.in
|
===================================================================
|
||||||
|
--- requests-2.6.0.orig/MANIFEST.in
|
||||||
|
+++ requests-2.6.0/MANIFEST.in
|
||||||
@@ -1 +1 @@
|
@@ -1 +1 @@
|
||||||
-include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt requests/cacert.pem
|
-include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt requests/cacert.pem
|
||||||
+include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt
|
+include README.rst LICENSE NOTICE HISTORY.rst test_requests.py requirements.txt
|
||||||
|
Index: requests-2.6.0/requests/packages/urllib3/util/ssl_.py
|
||||||
|
===================================================================
|
||||||
|
--- requests-2.6.0.orig/requests/packages/urllib3/util/ssl_.py
|
||||||
|
+++ requests-2.6.0/requests/packages/urllib3/util/ssl_.py
|
||||||
|
@@ -259,6 +259,9 @@ def ssl_wrap_socket(sock, keyfile=None,
|
||||||
|
if e.errno == errno.ENOENT:
|
||||||
|
raise SSLError(e)
|
||||||
|
raise
|
||||||
|
+ elif cert_reqs != CERT_NONE:
|
||||||
|
+ context.set_default_verify_paths()
|
||||||
|
+
|
||||||
|
if certfile:
|
||||||
|
context.load_cert_chain(certfile, keyfile)
|
||||||
|
if HAS_SNI: # Platform-specific: OpenSSL with enabled SNI
|
||||||
|
@ -1,3 +1,8 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jun 30 08:39:24 UTC 2015 - lnussel@suse.de
|
||||||
|
|
||||||
|
- update no-default-cacert.patch to not hardcode a ca cert location
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Apr 20 12:25:21 UTC 2015 - mcihar@suse.cz
|
Mon Apr 20 12:25:21 UTC 2015 - mcihar@suse.cz
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user