Hello community, here is the log from the commit of package python-requests for openSUSE:Factory checked in at 2016-01-01 19:48:20 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/python-requests (Old) and /work/SRC/openSUSE:Factory/.python-requests.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-requests" Changes: -------- --- /work/SRC/openSUSE:Factory/python-requests/python-requests.changes 2015-10-26 12:48:49.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.python-requests.new/python-requests.changes 2016-01-01 19:50:21.000000000 +0100 @@ -1,0 +2,11 @@ +Thu Dec 17 13:45:59 UTC 2015 - rjsch...@suse.com + +- Modify no-default-cacert + + The call to set_default_verify_paths() is not necessary. The openSUSE + and SLES Python has been patched to always use the system certs. + Additionally this call breaks the use of python-requests on older systems, + openSUSE_13.2 and original release of SLES 12 which fall back to + the built in implementation of ssl which doe not implement + this method + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ no-default-cacert.patch ++++++ --- /var/tmp/diff_new_pack.G8lpQr/_old 2016-01-01 19:50:23.000000000 +0100 +++ /var/tmp/diff_new_pack.G8lpQr/_new 2016-01-01 19:50:23.000000000 +0100 @@ -29,14 +29,3 @@ if __name__ == '__main__': print(where()) ---- a/requests/packages/urllib3/util/ssl_.py -+++ b/requests/packages/urllib3/util/ssl_.py -@@ -278,6 +278,8 @@ def ssl_wrap_socket(sock, keyfile=None, - if e.errno == errno.ENOENT: - raise SSLError(e) - raise -+ elif cert_reqs != CERT_NONE: -+ context.set_default_verify_paths() - - if certfile: - context.load_cert_chain(certfile, keyfile)