1From 2769cb607d4e696e2fe70802d4246ccc5abd64a8 Mon Sep 17 00:00:00 2001
2From: Nate Prewitt <nate.prewitt@gmail.com>
3Date: Wed, 29 May 2024 12:48:48 -0700
4Subject: [PATCH 1/3] Consider cert settings when using default context
5
6---
7 src/requests/adapters.py | 26 ++++++++++++++++++--------
8 1 file changed, 18 insertions(+), 8 deletions(-)
9
10diff --git a/src/requests/adapters.py b/src/requests/adapters.py
11index 9a58b16025..991b7e21c9 100644
12--- a/src/requests/adapters.py
13+++ b/src/requests/adapters.py
14@@ -87,6 +87,23 @@ def SOCKSProxyManager(*args, **kwargs):
15 _preloaded_ssl_context = None
16
17
18+def _should_use_default_context(
19+ verify: "bool | str | None",
20+ client_cert: "typing.Tuple[str, str] | str | None",
21+ poolmanager_kwargs: typing.Dict[str, typing.Any],
22+) -> bool:
23+ # Determine if we have and should use our default SSLContext
24+ # to optimize performance on standard requests.
25+ has_poolmanager_ssl_context = poolmanager_kwargs.get("ssl_context")
26+ should_use_default_ssl_context = (
27+ verify is True
28+ and _preloaded_ssl_context is not None
29+ and not has_poolmanager_ssl_context
30+ and client_cert is None
31+ )
32+ return should_use_default_ssl_context
33+
34+
35 def _urllib3_request_context(
36 request: "PreparedRequest",
37 verify: "bool | str | None",
38@@ -98,19 +115,12 @@ def _urllib3_request_context(
39 parsed_request_url = urlparse(request.url)
40 scheme = parsed_request_url.scheme.lower()
41 port = parsed_request_url.port
42-
43- # Determine if we have and should use our default SSLContext
44- # to optimize performance on standard requests.
45 poolmanager_kwargs = getattr(poolmanager, "connection_pool_kw", {})
46- has_poolmanager_ssl_context = poolmanager_kwargs.get("ssl_context")
47- should_use_default_ssl_context = (
48- _preloaded_ssl_context is not None and not has_poolmanager_ssl_context
49- )
50
51 cert_reqs = "CERT_REQUIRED"
52 if verify is False:
53 cert_reqs = "CERT_NONE"
54- elif verify is True and should_use_default_ssl_context:
55+ elif _should_use_default_context(verify, client_cert, poolmanager_kwargs):
56 pool_kwargs["ssl_context"] = _preloaded_ssl_context
57 elif isinstance(verify, str):
58 if not os.path.isdir(verify):
59
60From e341df3efa0323072fab5d16307e2a20295675b9 Mon Sep 17 00:00:00 2001
61From: Nate Prewitt <nate.prewitt@gmail.com>
62Date: Fri, 31 May 2024 11:41:48 -0700
63Subject: [PATCH 2/3] Set default ca_cert bundle if verify is True
64
65---
66 src/requests/adapters.py | 14 +++++++++++---
67 1 file changed, 11 insertions(+), 3 deletions(-)
68
69diff --git a/src/requests/adapters.py b/src/requests/adapters.py
70index 991b7e21c9..ba5a0ec4f0 100644
71--- a/src/requests/adapters.py
72+++ b/src/requests/adapters.py
73@@ -118,15 +118,23 @@ def _urllib3_request_context(
74 poolmanager_kwargs = getattr(poolmanager, "connection_pool_kw", {})
75
76 cert_reqs = "CERT_REQUIRED"
77+ cert_loc = None
78 if verify is False:
79 cert_reqs = "CERT_NONE"
80 elif _should_use_default_context(verify, client_cert, poolmanager_kwargs):
81 pool_kwargs["ssl_context"] = _preloaded_ssl_context
82+ elif verify is True:
83+ # Set default ca cert location if none provided
84+ cert_loc = extract_zipped_paths(DEFAULT_CA_BUNDLE_PATH)
85 elif isinstance(verify, str):
86- if not os.path.isdir(verify):
87- pool_kwargs["ca_certs"] = verify
88+ cert_loc = verify
89+
90+ if cert_loc is not None:
91+ if not os.path.isdir(cert_loc):
92+ pool_kwargs["ca_certs"] = cert_loc
93 else:
94- pool_kwargs["ca_cert_dir"] = verify
95+ pool_kwargs["ca_cert_dir"] = cert_loc
96+
97 pool_kwargs["cert_reqs"] = cert_reqs
98 if client_cert is not None:
99 if isinstance(client_cert, tuple) and len(client_cert) == 2:
100
101From da96a92e2eb6dfe7c74704267bcb8f9fd6fb92b0 Mon Sep 17 00:00:00 2001
102From: Nate Prewitt <nate.prewitt@gmail.com>
103Date: Fri, 31 May 2024 12:20:11 -0700
104Subject: [PATCH 3/3] Correct comment to match actual behavior
105
106---
107 src/requests/adapters.py | 6 ++----
108 1 file changed, 2 insertions(+), 4 deletions(-)
109
110diff --git a/src/requests/adapters.py b/src/requests/adapters.py
111index ba5a0ec4f0..54143f9e6b 100644
112--- a/src/requests/adapters.py
113+++ b/src/requests/adapters.py
114@@ -334,10 +334,8 @@ def cert_verify(self, conn, url, verify, cert):
115 if url.lower().startswith("https") and verify:
116 conn.cert_reqs = "CERT_REQUIRED"
117
118- # Only load the CA certificates if 'verify' is a string indicating the CA bundle to use.
119- # Otherwise, if verify is a boolean, we don't load anything since
120- # the connection will be using a context with the default certificates already loaded,
121- # and this avoids a call to the slow load_verify_locations()
122+ # Only load the CA certificates if `verify` is a
123+ # string indicating the CA bundle to use.
124 if verify is not True:
125 # `verify` must be a str with a path then
126 cert_loc = verify