Hi Jonathan (2014.11.21_00:23:03_+0200)
> Please go ahead.

Looks like Daniele already uploaded 1.9.1-3, with the inclusion of an
additional bug fix - #770246

--- debian/changelog    (revision 31469)
+++ debian/changelog    (working copy)
@@ -1,12 +1,17 @@
-python-urllib3 (1.9.1-3) UNRELEASED; urgency=medium
+python-urllib3 (1.9.1-3) unstable; urgency=medium
 
-  * Team upload.
+  [ Stefano Rivera ]
   * Replace 05_do-not-use-embedded-ssl-match-hostname.patch with
     05_avoid-embedded-ssl-match-hostname.patch. Users may use virtualenv with
-    cPython << 2.7.9 (or Debian python2.7 2.7.8-7). (Closes: 755106, 763389)
+    cPython << 2.7.9 (or Debian python2.7 2.7.8-7). (Closes: #755106, #763389)
 
- -- Stefano Rivera <stefa...@debian.org>  Tue, 18 Nov 2014 12:45:49 -0800
+  [ Daniele Tricoli ]
+  * debian/patches/06_do-not-make-SSLv3-mandatory.patch
+    - Since SSL version 3 is insecure it is supported only if Python
+      supports it. (Closes: #770246)
 
+ -- Daniele Tricoli <er...@mornie.org>  Thu, 20 Nov 2014 13:17:59 +0100
+
 python-urllib3 (1.9.1-2) unstable; urgency=medium
 
   * debian/control
--- debian/patches/series       (revision 31469)
+++ debian/patches/series       (working copy)
@@ -3,3 +3,4 @@
 03_force_setuptools.patch
 04_relax_nosetests_options.patch
 05_avoid-embedded-ssl-match-hostname.patch
+06_do-not-make-SSLv3-mandatory.patch
--- debian/patches/06_do-not-make-SSLv3-mandatory.patch (revision 0)
+++ debian/patches/06_do-not-make-SSLv3-mandatory.patch (revision 31487)
@@ -0,0 +1,25 @@
+Description: Since SSL version 3 is insecure it is supported only if Python
+ supports it. In Debian SSL version 3 is disabled in system Python since
+ 2.7.8-12.
+Author: Daniele Tricoli <er...@mornie.org>
+Forwarded: https://github.com/shazow/urllib3/issues/487#issuecomment-63805742
+Last/Update: 2014-11-20
+
+--- a/urllib3/contrib/pyopenssl.py
++++ b/urllib3/contrib/pyopenssl.py
+@@ -70,9 +70,14 @@
+ # Map from urllib3 to PyOpenSSL compatible parameter-values.
+ _openssl_versions = {
+     ssl.PROTOCOL_SSLv23: OpenSSL.SSL.SSLv23_METHOD,
+-    ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD,
+     ssl.PROTOCOL_TLSv1: OpenSSL.SSL.TLSv1_METHOD,
+ }
++
++try:
++    _openssl_versions.update({ssl.PROTOCOL_SSLv3: OpenSSL.SSL.SSLv3_METHOD})
++except AttributeError:
++    pass
++
+ _openssl_verify = {
+     ssl.CERT_NONE: OpenSSL.SSL.VERIFY_NONE,
+     ssl.CERT_OPTIONAL: OpenSSL.SSL.VERIFY_PEER,

SR

-- 
Stefano Rivera
  http://tumbleweed.org.za/
  +1 415 683 3272


-- 
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20141121003430.gs4...@bach.rivera.co.za

Reply via email to