Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bpo-32008: don't use PROTOCOL_TLSv1 in example #5789

Merged
merged 1 commit into from
Feb 21, 2018
Merged

Conversation

benjaminp
Copy link
Contributor

@benjaminp benjaminp commented Feb 21, 2018

It's bad form to pin to an old version of TLS.

https://bugs.python.org/issue32008

It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway.
@benjaminp benjaminp merged commit e9edee0 into master Feb 21, 2018
@miss-islington
Copy link
Contributor

Thanks @benjaminp for the PR 🌮🎉.. I'm working now to backport this PR to: 2.7, 3.6, 3.7.
🐍🍒⛏🤖

@benjaminp benjaminp deleted the benjamin-tls-1 branch February 21, 2018 05:55
miss-islington pushed a commit to miss-islington/cpython that referenced this pull request Feb 21, 2018
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway.
(cherry picked from commit e9edee0)

Co-authored-by: Benjamin Peterson <benjamin@python.org>
@bedevere-bot
Copy link

GH-5790 is a backport of this pull request to the 3.7 branch.

miss-islington pushed a commit to miss-islington/cpython that referenced this pull request Feb 21, 2018
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway.
(cherry picked from commit e9edee0)

Co-authored-by: Benjamin Peterson <benjamin@python.org>
@bedevere-bot
Copy link

GH-5791 is a backport of this pull request to the 3.6 branch.

@miss-islington
Copy link
Contributor

Sorry, @benjaminp, I could not cleanly backport this to 2.7 due to a conflict.
Please backport using cherry_picker on command line.
cherry_picker e9edee0b65650c4f9db90cefc2e9a8125bad762c 2.7

benjaminp added a commit that referenced this pull request Feb 21, 2018
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway..
(cherry picked from commit e9edee0)
@bedevere-bot
Copy link

GH-5792 is a backport of this pull request to the 2.7 branch.

miss-islington added a commit that referenced this pull request Feb 21, 2018
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway.
(cherry picked from commit e9edee0)

Co-authored-by: Benjamin Peterson <benjamin@python.org>
miss-islington added a commit that referenced this pull request Feb 21, 2018
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway.
(cherry picked from commit e9edee0)

Co-authored-by: Benjamin Peterson <benjamin@python.org>
benjaminp added a commit that referenced this pull request Feb 21, 2018
…#5792)

It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway..
(cherry picked from commit e9edee0)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants