Hi Richard, all,
On Wed, Mar 20, 2013 at 17:30 -0700, Richard Jones wrote:
I've pushed the latest PEP to the repos. It has all the recent
clarifications and the API docs. Just need to wait for the website to
rebuild or something.
It's online now. Current references to PEP438 (also inlined
On 20 March 2013 23:22, holger krekel hol...@merlinux.eu wrote:
On Wed, Mar 20, 2013 at 17:30 -0700, Richard Jones wrote:
I've pushed the latest PEP to the repos. It has all the recent
clarifications and the API docs. Just need to wait for the website to
rebuild or something.
It's online
On Wed, Mar 20, 2013 at 19:27 -0700, Christian Theune wrote:
On 2013-03-20 23:59:21 +, Christian Theune said:
I'm currently re-initializing my own mirror. This basically can be
run in-place by just removing the existing state data and calling
my sync script (bsn-mirror) instead of
Hi,
the message is slightly off-topic but it might be interesting for pip,
setuptools and other developers that are working on HTTPS for PyPI.
I while ago I found C++ example code that shows how to dump CA and CRL
certs from Windows's system cert store. The system cert store contains
the
On 21.03.2013 13:06, Christian Heimes wrote:
Hi,
the message is slightly off-topic but it might be interesting for pip,
setuptools and other developers that are working on HTTPS for PyPI.
I while ago I found C++ example code that shows how to dump CA and CRL
certs from Windows's system
Am 21.03.2013 13:58, schrieb M.-A. Lemburg:
Why not simply use the Firefox certs ?
We started adding these to our pyOpenSSL distribution with the last release:
https://cms.egenix.com/products/python/pyOpenSSL/doc/#Module_OpenSSL.ca_bundle
Sure, that's another viable option. But IIRC some
On Mar 21, 2013, at 9:32 AM, Christian Heimes christ...@python.org wrote:
Am 21.03.2013 13:58, schrieb M.-A. Lemburg:
Why not simply use the Firefox certs ?
We started adding these to our pyOpenSSL distribution with the last release:
On 21.03.2013 14:32, Christian Heimes wrote:
Am 21.03.2013 13:58, schrieb M.-A. Lemburg:
Why not simply use the Firefox certs ?
We started adding these to our pyOpenSSL distribution with the last release:
https://cms.egenix.com/products/python/pyOpenSSL/doc/#Module_OpenSSL.ca_bundle
Sure,
Christian Heimes christian at python.org writes:
I'm planing to add the feature to Python 3.4, too.
http://bugs.python.org/issue17134
You can download the code from
https://bitbucket.org/tiran/wincertstore
This is nice, but can you follow up on the bug tracker? It would be much
more
On Thu, Mar 21, 2013 at 8:06 AM, Christian Heimes christ...@python.org wrote:
Hi,
the message is slightly off-topic but it might be interesting for pip,
setuptools and other developers that are working on HTTPS for PyPI.
I while ago I found C++ example code that shows how to dump CA and CRL
Am 21.03.2013 16:29, schrieb PJ Eby:
Very nice! I definitely would like to use this for setuptools, but I
actually want it for versions 2.3-2.5, which can't use requests or
urllib3 or anything like that. So I hacked on the code a bit and got
it to work (or at least got the __main__ stub to
Am 21.03.2013 15:12, schrieb Antoine Pitrou:
This is nice, but can you follow up on the bug tracker? It would be much
more appropriate than catalog-sig.
Also you shouldn't need to encode the certs into PEM format. AFAICT,
SSL_CTX_get_cert_store(), d2i_X509_AUX() and X509_STORE_add_cert()
On 20 March 2013 19:27, Christian Theune c...@gocept.com wrote:
On 2013-03-20 23:59:21 +, Christian Theune said:
I'm currently re-initializing my own mirror. This basically can be run
in-place by just removing the existing state data and calling my sync script
(bsn-mirror) instead of
On Mar 21, 2013, at 3:28 AM, holger krekel hol...@merlinux.eu wrote:
On Wed, Mar 20, 2013 at 19:27 -0700, Christian Theune wrote:
On 2013-03-20 23:59:21 +, Christian Theune said:
I'm currently re-initializing my own mirror. This basically can be
run in-place by just removing the
Hi,
I'm slowly wrapping up my sprint. Here's what happened today:
- fixed some errors reported by users
- allow running a non-deleting mirror (with the hint that official ones
must not do this)
- add config file handling to avoid complicated command lines including
some documentation how to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Christian Theune wrote:
Hi,
I'm slowly wrapping up my sprint. Here's what happened today:
- fixed some errors reported by users - allow running a non-deleting
mirror (with the hint that official ones must not do this) - add
config file
16 matches
Mail list logo