This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author janssen
Recipients forest, hodgestar, janssen
Date 2008-09-10.16:47:17
SpamBayes Score 7.864846e-05
Marked as misclassified No
Message-id <1221065239.35.0.578340373249.issue3823@psf.upfronthosting.co.za>
In-reply-to
Content
Thanks, Simon.

I remember digging through all this last year, and finally deciding
to keep things simple and use the strategy the current codebase uses.

It almost sounds like we'd need to create Key and Certificate objects
in the _ssl module, which could be used to load up all the keys and/or
certificates the server uses, before it changes UID (and presumbably
loses access to the files the data is kept in).  I was resisting
going down that path; there's a lot of complexity there I want to avoid.
But much of the mechanism of a Certificate object is already there;
perhaps adding an opaque Key object wouldn't be too bad.
History
Date User Action Args
2008-09-10 16:47:19janssensetrecipients: + janssen, forest, hodgestar
2008-09-10 16:47:19janssensetmessageid: <1221065239.35.0.578340373249.issue3823@psf.upfronthosting.co.za>
2008-09-10 16:47:18janssenlinkissue3823 messages
2008-09-10 16:47:17janssencreate