Skip to content

Conversation

@msw-kialo
Copy link
Contributor

Since Python 3.13, ssl.VERIFY_X509_STRICT is enabled by default.

Old Kubernetes clusters might have certificates that do not (yet) comply with that.

Add a (custom) configuration option to disable this flag.

Fix #349

Since Python 3.13, ssl.VERIFY_X509_STRICT is enabled by default.

Old Kubernetes clusters might have certificates that do not (yet) comply
with that.

Add a (custom) configuration option to disable this flag.
@codecov
Copy link

codecov bot commented Feb 10, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 27.06%. Comparing base (1504929) to head (13c856a).
Report is 1 commits behind head on master.

Additional details and impacted files
@@           Coverage Diff           @@
##           master     #350   +/-   ##
=======================================
  Coverage   27.05%   27.06%           
=======================================
  Files         805      805           
  Lines       98706    98717   +11     
=======================================
+ Hits        26704    26715   +11     
  Misses      72002    72002           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@tomplus
Copy link
Owner

tomplus commented Feb 11, 2025

Thanks for you contribution.

@tomplus tomplus merged commit abc421b into tomplus:master Feb 11, 2025
7 checks passed
tomplus pushed a commit that referenced this pull request Mar 30, 2025
Since Python 3.13, ssl.VERIFY_X509_STRICT is enabled by default.

Old Kubernetes clusters might have certificates that do not (yet) comply
with that.

Add a (custom) configuration option to disable this flag.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Connection issue due to ssl strict verification

2 participants