Compare commits
No commits in common. 'c10-beta' and 'c9' have entirely different histories.
@ -1 +1 @@
|
||||
SOURCES/requests-v2.32.3.tar.gz
|
||||
SOURCES/requests-v2.25.1.tar.gz
|
||||
|
@ -1 +1 @@
|
||||
412ecbc13900d9cbba88681eb29d66da9c6cae80 SOURCES/requests-v2.32.3.tar.gz
|
||||
804fdbaf3dbc57f49a66cef920e9d4a5ce3460eb SOURCES/requests-v2.25.1.tar.gz
|
||||
|
@ -0,0 +1,59 @@
|
||||
From 88313c734876b90c266d183d07d26338a14bc54c Mon Sep 17 00:00:00 2001
|
||||
From: Nate Prewitt <nate.prewitt@gmail.com>
|
||||
Date: Mon, 22 May 2023 08:08:57 -0700
|
||||
Subject: [PATCH] Merge pull request from GHSA-j8r2-6x86-q33q
|
||||
|
||||
---
|
||||
requests/sessions.py | 4 +++-
|
||||
tests/test_requests.py | 20 ++++++++++++++++++++
|
||||
2 files changed, 23 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/requests/sessions.py b/requests/sessions.py
|
||||
index 45ab8a5..db9c594 100644
|
||||
--- a/requests/sessions.py
|
||||
+++ b/requests/sessions.py
|
||||
@@ -306,7 +306,9 @@ class SessionRedirectMixin(object):
|
||||
except KeyError:
|
||||
username, password = None, None
|
||||
|
||||
- if username and password:
|
||||
+ # urllib3 handles proxy authorization for us in the standard adapter.
|
||||
+ # Avoid appending this to TLS tunneled requests where it may be leaked.
|
||||
+ if not scheme.startswith('https') and username and password:
|
||||
headers['Proxy-Authorization'] = _basic_auth_str(username, password)
|
||||
|
||||
return new_proxies
|
||||
diff --git a/tests/test_requests.py b/tests/test_requests.py
|
||||
index 5e721cb..c70706f 100644
|
||||
--- a/tests/test_requests.py
|
||||
+++ b/tests/test_requests.py
|
||||
@@ -551,6 +551,26 @@ class TestRequests:
|
||||
with pytest.raises(InvalidProxyURL):
|
||||
requests.get(httpbin(), proxies={'http': 'http:///example.com:8080'})
|
||||
|
||||
+
|
||||
+ @pytest.mark.parametrize(
|
||||
+ "url,has_proxy_auth",
|
||||
+ (
|
||||
+ ('http://example.com', True),
|
||||
+ ('https://example.com', False),
|
||||
+ ),
|
||||
+ )
|
||||
+ def test_proxy_authorization_not_appended_to_https_request(self, url, has_proxy_auth):
|
||||
+ session = requests.Session()
|
||||
+ proxies = {
|
||||
+ 'http': 'http://test:pass@localhost:8080',
|
||||
+ 'https': 'http://test:pass@localhost:8090',
|
||||
+ }
|
||||
+ req = requests.Request('GET', url)
|
||||
+ prep = req.prepare()
|
||||
+ session.rebuild_proxies(prep, proxies)
|
||||
+
|
||||
+ assert ('Proxy-Authorization' in prep.headers) is has_proxy_auth
|
||||
+
|
||||
def test_basicauth_with_netrc(self, httpbin):
|
||||
auth = ('user', 'pass')
|
||||
wrong_auth = ('wronguser', 'wrongpass')
|
||||
--
|
||||
2.40.1
|
||||
|
@ -0,0 +1,13 @@
|
||||
diff --git a/setup.py b/setup.py
|
||||
index 065eb22..043ae42 100755
|
||||
--- a/setup.py
|
||||
+++ b/setup.py
|
||||
@@ -100,7 +100,7 @@ setup(
|
||||
cmdclass={'test': PyTest},
|
||||
tests_require=test_requirements,
|
||||
extras_require={
|
||||
- 'security': ['pyOpenSSL >= 0.14', 'cryptography>=1.3.4'],
|
||||
+ 'security': [],
|
||||
'socks': ['PySocks>=1.5.6, !=1.5.7'],
|
||||
'socks:sys_platform == "win32" and python_version == "2.7"': ['win_inet_pton'],
|
||||
},
|
@ -0,0 +1,55 @@
|
||||
From bb1c91432c5e9a1f402692db5c80c65136656afb Mon Sep 17 00:00:00 2001
|
||||
From: Jeremy Cline <jeremy@jcline.org>
|
||||
Date: Tue, 13 Jun 2017 09:08:09 -0400
|
||||
Subject: [PATCH] Remove tests that use the tarpit
|
||||
|
||||
The latest version of Mock has started using systemd containers. The
|
||||
systemd-nspawn command is being run with --private-network, which
|
||||
immediately kills connections to something other than localhost. These
|
||||
tests depend on the connection not being killed immediately and that
|
||||
they are never responded to.
|
||||
|
||||
Signed-off-by: Jeremy Cline <jeremy@jcline.org>
|
||||
---
|
||||
tests/test_requests.py | 25 -------------------------
|
||||
1 file changed, 25 deletions(-)
|
||||
|
||||
diff --git a/tests/test_requests.py b/tests/test_requests.py
|
||||
index 7d4a4eb5..8d1c55fc 100644
|
||||
--- a/tests/test_requests.py
|
||||
+++ b/tests/test_requests.py
|
||||
@@ -2186,31 +2186,6 @@ class TestTimeout:
|
||||
except ReadTimeout:
|
||||
pass
|
||||
|
||||
- @pytest.mark.parametrize(
|
||||
- 'timeout', (
|
||||
- (0.1, None),
|
||||
- Urllib3Timeout(connect=0.1, read=None)
|
||||
- ))
|
||||
- def test_connect_timeout(self, timeout):
|
||||
- try:
|
||||
- requests.get(TARPIT, timeout=timeout)
|
||||
- pytest.fail('The connect() request should time out.')
|
||||
- except ConnectTimeout as e:
|
||||
- assert isinstance(e, ConnectionError)
|
||||
- assert isinstance(e, Timeout)
|
||||
-
|
||||
- @pytest.mark.parametrize(
|
||||
- 'timeout', (
|
||||
- (0.1, 0.1),
|
||||
- Urllib3Timeout(connect=0.1, read=0.1)
|
||||
- ))
|
||||
- def test_total_timeout_connect(self, timeout):
|
||||
- try:
|
||||
- requests.get(TARPIT, timeout=timeout)
|
||||
- pytest.fail('The connect() request should time out.')
|
||||
- except ConnectTimeout:
|
||||
- pass
|
||||
-
|
||||
def test_encoded_methods(self, httpbin):
|
||||
"""See: https://github.com/psf/requests/issues/2316"""
|
||||
r = requests.request(b'GET', httpbin('get'))
|
||||
--
|
||||
2.24.1
|
||||
|
@ -0,0 +1,29 @@
|
||||
diff --color -Nur requests-2.25.1.orig/requests/certs.py requests-2.25.1/requests/certs.py
|
||||
--- requests-2.25.1.orig/requests/certs.py 2021-01-10 16:27:05.027059634 -0800
|
||||
+++ requests-2.25.1/requests/certs.py 2021-01-10 16:29:06.973238179 -0800
|
||||
@@ -10,8 +10,13 @@
|
||||
If you are packaging Requests, e.g., for a Linux distribution or a managed
|
||||
environment, you can change the definition of where() to return a separately
|
||||
packaged CA bundle.
|
||||
+
|
||||
+This Fedora-patched package returns "/etc/pki/tls/certs/ca-bundle.crt" provided
|
||||
+by the ca-certificates RPM package.
|
||||
"""
|
||||
-from certifi import where
|
||||
+def where():
|
||||
+ """Return the absolute path to the system CA bundle."""
|
||||
+ return '/etc/pki/tls/certs/ca-bundle.crt'
|
||||
|
||||
if __name__ == '__main__':
|
||||
print(where())
|
||||
diff --color -Nur requests-2.25.1.orig/setup.py requests-2.25.1/setup.py
|
||||
--- requests-2.25.1.orig/setup.py 2020-12-16 11:34:26.000000000 -0800
|
||||
+++ requests-2.25.1/setup.py 2021-01-10 16:29:21.570259552 -0800
|
||||
@@ -45,7 +45,6 @@
|
||||
'chardet>=3.0.2,<5',
|
||||
'idna>=2.5,<3',
|
||||
'urllib3>=1.21.1,<1.27',
|
||||
- 'certifi>=2017.4.17'
|
||||
|
||||
]
|
||||
test_requirements = [
|
@ -0,0 +1,11 @@
|
||||
--- requests-2.12.4/tests/testserver/server.py 2016-12-21 11:31:56.000000000 -0800
|
||||
+++ requests-2.12.4/tests/testserver/server.py.new 2016-12-30 10:40:06.085995065 -0800
|
||||
@@ -27,7 +27,7 @@
|
||||
"""Dummy server using for unit testing"""
|
||||
WAIT_EVENT_TIMEOUT = 5
|
||||
|
||||
- def __init__(self, handler=None, host='localhost', port=0, requests_to_handle=1, wait_to_close_event=None):
|
||||
+ def __init__(self, handler=None, host='127.0.0.1', port=0, requests_to_handle=1, wait_to_close_event=None):
|
||||
super(Server, self).__init__()
|
||||
|
||||
self.handler = handler or consume_socket_content
|
@ -1,277 +0,0 @@
|
||||
From 91526670ad66e83e799459cb23b031b88bb680b4 Mon Sep 17 00:00:00 2001
|
||||
From: Derek Higgins <derekh@redhat.com>
|
||||
Date: Thu, 30 May 2024 11:15:18 +0200
|
||||
Subject: [PATCH 2/2] Add ipv6 support to should_bypass_proxies
|
||||
|
||||
Add support to should_bypass_proxies to support
|
||||
IPv6 ipaddresses and CIDRs in no_proxy. Includes
|
||||
adding IPv6 support to various other helper functions.
|
||||
|
||||
Co-authored-by: Lumir Balhar <lbalhar@redhat.com>
|
||||
---
|
||||
src/requests/utils.py | 83 ++++++++++++++++++++++++++++++++++++-------
|
||||
tests/test_utils.py | 66 +++++++++++++++++++++++++++++++---
|
||||
2 files changed, 132 insertions(+), 17 deletions(-)
|
||||
|
||||
diff --git a/src/requests/utils.py b/src/requests/utils.py
|
||||
index ae6c42f..0363698 100644
|
||||
--- a/src/requests/utils.py
|
||||
+++ b/src/requests/utils.py
|
||||
@@ -679,18 +679,46 @@ def requote_uri(uri):
|
||||
return quote(uri, safe=safe_without_percent)
|
||||
|
||||
|
||||
+def _get_mask_bits(mask, totalbits=32):
|
||||
+ """Converts a mask from /xx format to a int
|
||||
+ to be used as a mask for IP's in int format
|
||||
+
|
||||
+ Example: if mask is 24 function returns 0xFFFFFF00
|
||||
+ if mask is 24 and totalbits=128 function
|
||||
+ returns 0xFFFFFF00000000000000000000000000
|
||||
+
|
||||
+ :rtype: int
|
||||
+ """
|
||||
+ bits = ((1 << mask) - 1) << (totalbits - mask)
|
||||
+ return bits
|
||||
+
|
||||
+
|
||||
def address_in_network(ip, net):
|
||||
"""This function allows you to check if an IP belongs to a network subnet
|
||||
|
||||
Example: returns True if ip = 192.168.1.1 and net = 192.168.1.0/24
|
||||
returns False if ip = 192.168.1.1 and net = 192.168.100.0/24
|
||||
+ returns True if ip = 1:2:3:4::1 and net = 1:2:3:4::/64
|
||||
|
||||
:rtype: bool
|
||||
"""
|
||||
- ipaddr = struct.unpack("=L", socket.inet_aton(ip))[0]
|
||||
netaddr, bits = net.split("/")
|
||||
- netmask = struct.unpack("=L", socket.inet_aton(dotted_netmask(int(bits))))[0]
|
||||
- network = struct.unpack("=L", socket.inet_aton(netaddr))[0] & netmask
|
||||
+ if is_ipv4_address(ip) and is_ipv4_address(netaddr):
|
||||
+ ipaddr = struct.unpack(">L", socket.inet_aton(ip))[0]
|
||||
+ netmask = _get_mask_bits(int(bits))
|
||||
+ network = struct.unpack(">L", socket.inet_aton(netaddr))[0]
|
||||
+ elif is_ipv6_address(ip) and is_ipv6_address(netaddr):
|
||||
+ ipaddr_msb, ipaddr_lsb = struct.unpack(
|
||||
+ ">QQ", socket.inet_pton(socket.AF_INET6, ip)
|
||||
+ )
|
||||
+ ipaddr = (ipaddr_msb << 64) ^ ipaddr_lsb
|
||||
+ netmask = _get_mask_bits(int(bits), 128)
|
||||
+ network_msb, network_lsb = struct.unpack(
|
||||
+ ">QQ", socket.inet_pton(socket.AF_INET6, netaddr)
|
||||
+ )
|
||||
+ network = (network_msb << 64) ^ network_lsb
|
||||
+ else:
|
||||
+ return False
|
||||
return (ipaddr & netmask) == (network & netmask)
|
||||
|
||||
|
||||
@@ -710,12 +738,39 @@ def is_ipv4_address(string_ip):
|
||||
:rtype: bool
|
||||
"""
|
||||
try:
|
||||
- socket.inet_aton(string_ip)
|
||||
+ socket.inet_pton(socket.AF_INET, string_ip)
|
||||
+ except OSError:
|
||||
+ return False
|
||||
+ return True
|
||||
+
|
||||
+
|
||||
+def is_ipv6_address(string_ip):
|
||||
+ """
|
||||
+ :rtype: bool
|
||||
+ """
|
||||
+ try:
|
||||
+ socket.inet_pton(socket.AF_INET6, string_ip)
|
||||
except OSError:
|
||||
return False
|
||||
return True
|
||||
|
||||
|
||||
+def compare_ips(a, b):
|
||||
+ """
|
||||
+ Compare 2 IP's, uses socket.inet_pton to normalize IPv6 IPs
|
||||
+
|
||||
+ :rtype: bool
|
||||
+ """
|
||||
+ if a == b:
|
||||
+ return True
|
||||
+ try:
|
||||
+ return socket.inet_pton(socket.AF_INET6, a) == socket.inet_pton(
|
||||
+ socket.AF_INET6, b
|
||||
+ )
|
||||
+ except OSError:
|
||||
+ return False
|
||||
+
|
||||
+
|
||||
def is_valid_cidr(string_network):
|
||||
"""
|
||||
Very simple check of the cidr format in no_proxy variable.
|
||||
@@ -723,17 +778,19 @@ def is_valid_cidr(string_network):
|
||||
:rtype: bool
|
||||
"""
|
||||
if string_network.count("/") == 1:
|
||||
+ address, mask = string_network.split("/")
|
||||
try:
|
||||
- mask = int(string_network.split("/")[1])
|
||||
+ mask = int(mask)
|
||||
except ValueError:
|
||||
return False
|
||||
|
||||
- if mask < 1 or mask > 32:
|
||||
- return False
|
||||
-
|
||||
- try:
|
||||
- socket.inet_aton(string_network.split("/")[0])
|
||||
- except OSError:
|
||||
+ if is_ipv4_address(address):
|
||||
+ if mask < 1 or mask > 32:
|
||||
+ return False
|
||||
+ elif is_ipv6_address(address):
|
||||
+ if mask < 1 or mask > 128:
|
||||
+ return False
|
||||
+ else:
|
||||
return False
|
||||
else:
|
||||
return False
|
||||
@@ -790,12 +847,12 @@ def should_bypass_proxies(url, no_proxy):
|
||||
# the end of the hostname, both with and without the port.
|
||||
no_proxy = (host for host in no_proxy.replace(" ", "").split(",") if host)
|
||||
|
||||
- if is_ipv4_address(parsed.hostname):
|
||||
+ if is_ipv4_address(parsed.hostname) or is_ipv6_address(parsed.hostname):
|
||||
for proxy_ip in no_proxy:
|
||||
if is_valid_cidr(proxy_ip):
|
||||
if address_in_network(parsed.hostname, proxy_ip):
|
||||
return True
|
||||
- elif parsed.hostname == proxy_ip:
|
||||
+ elif compare_ips(parsed.hostname, proxy_ip):
|
||||
# If no_proxy ip was defined in plain IP notation instead of cidr notation &
|
||||
# matches the IP of the index
|
||||
return True
|
||||
diff --git a/tests/test_utils.py b/tests/test_utils.py
|
||||
index 5e9b56e..befbb46 100644
|
||||
--- a/tests/test_utils.py
|
||||
+++ b/tests/test_utils.py
|
||||
@@ -14,9 +14,11 @@ from requests._internal_utils import unicode_is_ascii
|
||||
from requests.cookies import RequestsCookieJar
|
||||
from requests.structures import CaseInsensitiveDict
|
||||
from requests.utils import (
|
||||
+ _get_mask_bits,
|
||||
_parse_content_type_header,
|
||||
add_dict_to_cookiejar,
|
||||
address_in_network,
|
||||
+ compare_ips,
|
||||
dotted_netmask,
|
||||
extract_zipped_paths,
|
||||
get_auth_from_url,
|
||||
@@ -263,8 +265,15 @@ class TestIsIPv4Address:
|
||||
|
||||
|
||||
class TestIsValidCIDR:
|
||||
- def test_valid(self):
|
||||
- assert is_valid_cidr("192.168.1.0/24")
|
||||
+ @pytest.mark.parametrize(
|
||||
+ "value",
|
||||
+ (
|
||||
+ "192.168.1.0/24",
|
||||
+ "1:2:3:4::/64",
|
||||
+ ),
|
||||
+ )
|
||||
+ def test_valid(self, value):
|
||||
+ assert is_valid_cidr(value)
|
||||
|
||||
@pytest.mark.parametrize(
|
||||
"value",
|
||||
@@ -274,6 +283,11 @@ class TestIsValidCIDR:
|
||||
"192.168.1.0/128",
|
||||
"192.168.1.0/-1",
|
||||
"192.168.1.999/24",
|
||||
+ "1:2:3:4::1",
|
||||
+ "1:2:3:4::/a",
|
||||
+ "1:2:3:4::0/321",
|
||||
+ "1:2:3:4::/-1",
|
||||
+ "1:2:3:4::12211/64",
|
||||
),
|
||||
)
|
||||
def test_invalid(self, value):
|
||||
@@ -287,6 +301,12 @@ class TestAddressInNetwork:
|
||||
def test_invalid(self):
|
||||
assert not address_in_network("172.16.0.1", "192.168.1.0/24")
|
||||
|
||||
+ def test_valid_v6(self):
|
||||
+ assert address_in_network("1:2:3:4::1111", "1:2:3:4::/64")
|
||||
+
|
||||
+ def test_invalid_v6(self):
|
||||
+ assert not address_in_network("1:2:3:4:1111", "1:2:3:4::/124")
|
||||
+
|
||||
|
||||
class TestGuessFilename:
|
||||
@pytest.mark.parametrize(
|
||||
@@ -722,6 +742,11 @@ def test_urldefragauth(url, expected):
|
||||
("http://172.16.1.12:5000/", False),
|
||||
("http://google.com:5000/v1.0/", False),
|
||||
("file:///some/path/on/disk", True),
|
||||
+ ("http://[1:2:3:4:5:6:7:8]:5000/", True),
|
||||
+ ("http://[1:2:3:4::1]/", True),
|
||||
+ ("http://[1:2:3:9::1]/", True),
|
||||
+ ("http://[1:2:3:9:0:0:0:1]/", True),
|
||||
+ ("http://[1:2:3:9::2]/", False),
|
||||
),
|
||||
)
|
||||
def test_should_bypass_proxies(url, expected, monkeypatch):
|
||||
@@ -730,11 +755,11 @@ def test_should_bypass_proxies(url, expected, monkeypatch):
|
||||
"""
|
||||
monkeypatch.setenv(
|
||||
"no_proxy",
|
||||
- "192.168.0.0/24,127.0.0.1,localhost.localdomain,172.16.1.1, google.com:6000",
|
||||
+ "192.168.0.0/24,127.0.0.1,localhost.localdomain,1:2:3:4::/64,1:2:3:9::1,172.16.1.1, google.com:6000",
|
||||
)
|
||||
monkeypatch.setenv(
|
||||
"NO_PROXY",
|
||||
- "192.168.0.0/24,127.0.0.1,localhost.localdomain,172.16.1.1, google.com:6000",
|
||||
+ "192.168.0.0/24,127.0.0.1,localhost.localdomain,1:2:3:4::/64,1:2:3:9::1,172.16.1.1, google.com:6000",
|
||||
)
|
||||
assert should_bypass_proxies(url, no_proxy=None) == expected
|
||||
|
||||
@@ -956,3 +981,36 @@ def test_should_bypass_proxies_win_registry_ProxyOverride_value(monkeypatch):
|
||||
monkeypatch.setattr(winreg, "OpenKey", OpenKey)
|
||||
monkeypatch.setattr(winreg, "QueryValueEx", QueryValueEx)
|
||||
assert should_bypass_proxies("http://example.com/", None) is False
|
||||
+
|
||||
+
|
||||
+@pytest.mark.parametrize(
|
||||
+ "mask, totalbits, maskbits",
|
||||
+ (
|
||||
+ (24, None, 0xFFFFFF00),
|
||||
+ (31, None, 0xFFFFFFFE),
|
||||
+ (0, None, 0x0),
|
||||
+ (4, 4, 0xF),
|
||||
+ (24, 128, 0xFFFFFF00000000000000000000000000),
|
||||
+ ),
|
||||
+)
|
||||
+def test__get_mask_bits(mask, totalbits, maskbits):
|
||||
+ args = {"mask": mask}
|
||||
+ if totalbits:
|
||||
+ args["totalbits"] = totalbits
|
||||
+ assert _get_mask_bits(**args) == maskbits
|
||||
+
|
||||
+
|
||||
+@pytest.mark.parametrize(
|
||||
+ "a, b, expected",
|
||||
+ (
|
||||
+ ("1.2.3.4", "1.2.3.4", True),
|
||||
+ ("1.2.3.4", "2.2.3.4", False),
|
||||
+ ("1::4", "1.2.3.4", False),
|
||||
+ ("1::4", "1::4", True),
|
||||
+ ("1::4", "1:0:0:0:0:0:0:4", True),
|
||||
+ ("1::4", "1:0:0:0:0:0::4", True),
|
||||
+ ("1::4", "1:0:0:0:0:0:1:4", False),
|
||||
+ ),
|
||||
+)
|
||||
+def test_compare_ips(a, b, expected):
|
||||
+ assert compare_ips(a, b) == expected
|
||||
--
|
||||
2.45.1
|
||||
|
@ -1,59 +0,0 @@
|
||||
From bb733473e91e71b812ada46bc110f607630f9327 Mon Sep 17 00:00:00 2001
|
||||
From: =?UTF-8?q?Tom=C3=A1=C5=A1=20Hrn=C4=8Diar?= <thrnciar@redhat.com>
|
||||
Date: Thu, 30 May 2024 11:10:29 +0200
|
||||
Subject: [PATCH 1/2] system certs
|
||||
|
||||
Co-authored-by: Lumir Balhar <lbalhar@redhat.com>
|
||||
---
|
||||
setup.cfg | 1 -
|
||||
setup.py | 1 -
|
||||
src/requests/certs.py | 8 +++++++-
|
||||
3 files changed, 7 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/setup.cfg b/setup.cfg
|
||||
index 8d44e0e..fa10a53 100644
|
||||
--- a/setup.cfg
|
||||
+++ b/setup.cfg
|
||||
@@ -4,7 +4,6 @@ provides-extra =
|
||||
socks
|
||||
use_chardet_on_py3
|
||||
requires-dist =
|
||||
- certifi>=2017.4.17
|
||||
charset_normalizer>=2,<4
|
||||
idna>=2.5,<4
|
||||
urllib3>=1.21.1,<3
|
||||
diff --git a/setup.py b/setup.py
|
||||
index 1b0eb37..03d19b0 100755
|
||||
--- a/setup.py
|
||||
+++ b/setup.py
|
||||
@@ -62,7 +62,6 @@ requires = [
|
||||
"charset_normalizer>=2,<4",
|
||||
"idna>=2.5,<4",
|
||||
"urllib3>=1.21.1,<3",
|
||||
- "certifi>=2017.4.17",
|
||||
]
|
||||
test_requirements = [
|
||||
"pytest-httpbin==2.0.0",
|
||||
diff --git a/src/requests/certs.py b/src/requests/certs.py
|
||||
index be422c3..9aee713 100644
|
||||
--- a/src/requests/certs.py
|
||||
+++ b/src/requests/certs.py
|
||||
@@ -10,8 +10,14 @@ only one — the one from the certifi package.
|
||||
If you are packaging Requests, e.g., for a Linux distribution or a managed
|
||||
environment, you can change the definition of where() to return a separately
|
||||
packaged CA bundle.
|
||||
+
|
||||
+This Fedora-patched package returns "/etc/pki/tls/certs/ca-bundle.crt" provided
|
||||
+by the ca-certificates RPM package.
|
||||
"""
|
||||
-from certifi import where
|
||||
+
|
||||
+def where():
|
||||
+ """Return the absolute path to the system CA bundle."""
|
||||
+ return '/etc/pki/tls/certs/ca-bundle.crt'
|
||||
|
||||
if __name__ == "__main__":
|
||||
print(where())
|
||||
--
|
||||
2.45.1
|
||||
|
Loading…
Reference in new issue