This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author Adam.Goodman
Recipients Adam.Goodman, christian.heimes, loewis, pitrou
Date 2014-03-17.19:53:38
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1395086018.59.0.573380355818.issue20916@psf.upfronthosting.co.za>
In-reply-to
Content
What Martin said is correct, IMO.

The actual problem I'd like to correct is: If I - for example - create an HTTPSConnection with cert validation enabled, and set to use the default OS trust mechanism, then the validation process should trigger Windows' root CA download mechanism if necessary (i.e. rather than just rejecting the CA cert if it hasn't already been locally cached).

I don't expect that ssl.enum_certificates() ever will return all the certificates that are (implicitly, via the update mechanism) trusted by Windows; that's probably not feasible. I chose that as the title of the issue because it seemed to be the most concrete root-cause, but maybe that wasn't ideal.

(I'll file a separate issue for that traceback I ran into, if I get a chance to dig into it more)
History
Date User Action Args
2014-03-17 19:53:38Adam.Goodmansetrecipients: + Adam.Goodman, loewis, pitrou, christian.heimes
2014-03-17 19:53:38Adam.Goodmansetmessageid: <1395086018.59.0.573380355818.issue20916@psf.upfronthosting.co.za>
2014-03-17 19:53:38Adam.Goodmanlinkissue20916 messages
2014-03-17 19:53:38Adam.Goodmancreate