gecko-dev/third_party/python/certifi
Dave Hunt 2ed70b195c Bug 1346026 - Vendor pipenv 2018.5.18 and transient dependencies; r=ahal
MozReview-Commit-ID: LNJVCNNHGDg

--HG--
extra : rebase_source : 296672ac301e12d1c6b5954eca844f7b0a527583
2018-05-17 19:06:20 +01:00
..
certifi Bug 1346026 - Vendor pipenv 2018.5.18 and transient dependencies; r=ahal 2018-05-17 19:06:20 +01:00
LICENSE Bug 1437593 - Vendor certifi 2018.1.18; r=ted 2018-03-27 16:37:44 +01:00
MANIFEST.in Bug 1437593 - Vendor certifi 2018.1.18; r=ted 2018-03-27 16:37:44 +01:00
PKG-INFO Bug 1346026 - Vendor pipenv 2018.5.18 and transient dependencies; r=ahal 2018-05-17 19:06:20 +01:00
README.rst Bug 1437593 - Vendor certifi 2018.1.18; r=ted 2018-03-27 16:37:44 +01:00
setup.cfg Bug 1437593 - Vendor certifi 2018.1.18; r=ted 2018-03-27 16:37:44 +01:00
setup.py Bug 1437593 - Vendor certifi 2018.1.18; r=ted 2018-03-27 16:37:44 +01:00

README.rst

Certifi: Python SSL Certificates
================================

`Certifi`_ is a carefully curated collection of Root Certificates for
validating the trustworthiness of SSL certificates while verifying the identity
of TLS hosts. It has been extracted from the `Requests`_ project.

Installation
------------

``certifi`` is available on PyPI. Simply install it with ``pip``::

    $ pip install certifi

Usage
-----

To reference the installed certificate authority (CA) bundle, you can use the
built-in function::

    >>> import certifi

    >>> certifi.where()
    '/usr/local/lib/python2.7/site-packages/certifi/cacert.pem'

Enjoy!

1024-bit Root Certificates
~~~~~~~~~~~~~~~~~~~~~~~~~~

Browsers and certificate authorities have concluded that 1024-bit keys are
unacceptably weak for certificates, particularly root certificates. For this
reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its
bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key)
certificate from the same CA. Because Mozilla removed these certificates from
its bundle, ``certifi`` removed them as well.

In previous versions, ``certifi`` provided the ``certifi.old_where()`` function
to intentionally re-add the 1024-bit roots back into your bundle. This was not
recommended in production and therefore was removed. To assist in migrating old
code, the function ``certifi.old_where()`` continues to exist as an alias of
``certifi.where()``. Please update your code to use ``certifi.where()``
instead. ``certifi.old_where()`` will be removed in 2018.

.. _`Certifi`: http://certifi.io/en/latest/
.. _`Requests`: http://docs.python-requests.org/en/latest/