Hello community,

here is the log from the commit of package python-requests for openSUSE:Factory 
checked in at 2016-01-01 19:48:20
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-requests (Old)
 and      /work/SRC/openSUSE:Factory/.python-requests.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-requests"

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-requests/python-requests.changes  
2015-10-26 12:48:49.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.python-requests.new/python-requests.changes     
2016-01-01 19:50:21.000000000 +0100
@@ -1,0 +2,11 @@
+Thu Dec 17 13:45:59 UTC 2015 - rjsch...@suse.com
+
+- Modify no-default-cacert
+  + The call to set_default_verify_paths() is not necessary. The openSUSE
+    and SLES Python has been patched to always use the system certs.
+    Additionally this call breaks the use of python-requests on older systems,
+    openSUSE_13.2 and original release of SLES 12 which fall back to
+    the built in implementation of ssl which doe not implement
+    this method
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ no-default-cacert.patch ++++++
--- /var/tmp/diff_new_pack.G8lpQr/_old  2016-01-01 19:50:23.000000000 +0100
+++ /var/tmp/diff_new_pack.G8lpQr/_new  2016-01-01 19:50:23.000000000 +0100
@@ -29,14 +29,3 @@
  
  if __name__ == '__main__':
      print(where())
---- a/requests/packages/urllib3/util/ssl_.py
-+++ b/requests/packages/urllib3/util/ssl_.py
-@@ -278,6 +278,8 @@ def ssl_wrap_socket(sock, keyfile=None,
-             if e.errno == errno.ENOENT:
-                 raise SSLError(e)
-             raise
-+    elif cert_reqs != CERT_NONE:
-+        context.set_default_verify_paths()
- 
-     if certfile:
-         context.load_cert_chain(certfile, keyfile)


Reply via email to