зеркало из https://github.com/mozilla/gecko-dev.git
2ed70b195c
MozReview-Commit-ID: LNJVCNNHGDg --HG-- extra : rebase_source : 296672ac301e12d1c6b5954eca844f7b0a527583 |
||
---|---|---|
.. | ||
certifi | ||
LICENSE | ||
MANIFEST.in | ||
PKG-INFO | ||
README.rst | ||
setup.cfg | ||
setup.py |
README.rst
Certifi: Python SSL Certificates ================================ `Certifi`_ is a carefully curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. It has been extracted from the `Requests`_ project. Installation ------------ ``certifi`` is available on PyPI. Simply install it with ``pip``:: $ pip install certifi Usage ----- To reference the installed certificate authority (CA) bundle, you can use the built-in function:: >>> import certifi >>> certifi.where() '/usr/local/lib/python2.7/site-packages/certifi/cacert.pem' Enjoy! 1024-bit Root Certificates ~~~~~~~~~~~~~~~~~~~~~~~~~~ Browsers and certificate authorities have concluded that 1024-bit keys are unacceptably weak for certificates, particularly root certificates. For this reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key) certificate from the same CA. Because Mozilla removed these certificates from its bundle, ``certifi`` removed them as well. In previous versions, ``certifi`` provided the ``certifi.old_where()`` function to intentionally re-add the 1024-bit roots back into your bundle. This was not recommended in production and therefore was removed. To assist in migrating old code, the function ``certifi.old_where()`` continues to exist as an alias of ``certifi.where()``. Please update your code to use ``certifi.where()`` instead. ``certifi.old_where()`` will be removed in 2018. .. _`Certifi`: http://certifi.io/en/latest/ .. _`Requests`: http://docs.python-requests.org/en/latest/