Dirk Mueller
b53e7d4f88
* Fixed SecureTransport issue that would cause long delays in response body delivery. (Pull #1154) * Fixed regression in 1.21 that threw exceptions when users passed the ``socket_options`` flag to the ``PoolManager``. (Issue #1165) * Fixed regression in 1.21 that threw exceptions when users passed the ``assert_hostname`` or ``assert_fingerprint`` flag to the ``PoolManager``. * Improved performance of certain selector system calls on Python 3.5 and later. (Pull #1095) * Resolved issue where the PyOpenSSL backend would not wrap SysCallError exceptions appropriately when sending data. (Pull #1125) * Selectors now detects a monkey-patched select module after import for modules that patch the select module like eventlet, greenlet. (Pull #1128) * Reduced memory consumption when streaming zlib-compressed responses (as opposed to raw deflate streams). (Pull #1129) * Connection pools now use the entire request context when constructing the pool key. (Pull #1016) * ``PoolManager.connection_from_*`` methods now accept a new keyword argument, ``pool_kwargs``, which are merged with the existing ``connection_pool_kw``. * Add retry counter for ``status_forcelist``. (Issue #1147) * Added ``contrib`` module for using SecureTransport on macOS: ``urllib3.contrib.securetransport``. (Pull #1122) * urllib3 now only normalizes the case of ``http://`` and ``https://`` schemes: for schemes it does not recognise, it assumes they are case-sensitive and leaves them unchanged. ------------------------------------------------------------------- OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-urllib3?expand=0&rev=27
14 lines
649 B
Diff
14 lines
649 B
Diff
Index: urllib3-1.21.1/urllib3/util/ssl_.py
|
|
===================================================================
|
|
--- urllib3-1.21.1.orig/urllib3/util/ssl_.py
|
|
+++ urllib3-1.21.1/urllib3/util/ssl_.py
|
|
@@ -318,6 +318,8 @@ def ssl_wrap_socket(sock, keyfile=None,
|
|
elif getattr(context, 'load_default_certs', None) is not None:
|
|
# try to load OS default certs; works well on Windows (require Python3.4+)
|
|
context.load_default_certs()
|
|
+ elif cert_reqs != ssl.CERT_NONE and hasattr(context, 'set_default_verify_paths'):
|
|
+ context.set_default_verify_paths()
|
|
|
|
if certfile:
|
|
context.load_cert_chain(certfile, keyfile)
|