Verify certificates using OS trust stores
MIT License
Bot releases are visible (Hide)
Full Changelog: https://github.com/sethmlarson/truststore/compare/v0.9.0...v0.9.1
Published by sethmlarson 6 months ago
Full Changelog: https://github.com/sethmlarson/truststore/compare/v0.8.0...v0.9.0
Published by sethmlarson about 1 year ago
Full Changelog: https://github.com/sethmlarson/truststore/compare/v0.7.0...v0.8.0
Published by sethmlarson over 1 year ago
OSError
to an ImportError
to match the error raised in other situations where the module isn't supported.Published by sethmlarson over 1 year ago
RecursionError
that would be raised when setting SSLContext.minimum_version
or .maximum_version
.Published by sethmlarson over 1 year ago
Truststore is now beta! Truststore will be made the default in a future pip release.
inject_into_ssl()
and extract_from_ssl()
to enable Truststore for all packages using ssl.SSLContext
automatically.check_hostname
, verify_mode
, and verify_flags
.ssl.SSLContext
methods like load_cert_chain()
, set_alpn_protocols()
, etc.Published by sethmlarson about 2 years ago
truststore
with urllib3, Requests, aiohttp, and pip.ssl.SSLError
withPublished by sethmlarson over 2 years ago
⚠️ This package is experimental and shouldn't be used in applications
ssl.SSLCertVerificationError
determined by the OS on macOS and Windows.SSLContext.verify_flags
for strictly checking CRLs instead of checking CRLs strictly by default.Published by sethmlarson over 2 years ago
⚠️ This package is experimental and shouldn't be used in applications
SSLContext.load_verify_locations()
.TruststoreSSLContext
to SSLContext
.Published by sethmlarson over 2 years ago
⚠️ This package is experimental and shouldn't be used in applications
Published by sethmlarson over 2 years ago
⚠️ This package is experimental and shouldn't be used in applications