uedvt359
uedvt359
Another use case for this (which we need at $work): gunicorn doesn't allow disabling of TLS session renegotiation, [a potential DoS vector](https://blog.qualys.com/product-tech/2011/10/31/tls-renegotiation-and-denial-of-service-attacks). With access to the SSLContext, one could disable...
What exactly is holding this up? This PR blocks a lot of TLS improvements we'd like to roll out, so if there is anything I could help with to get...
rebased on top of master.
@zachmoody: what do you think about the approach I've lined out in #430? Is this something that could be accepted into pynetbox?
> Would #433 work for your use-case? sorry, I didn't notice your response. I guess #433 could work, although AFAICT this would require implementing a secrets-plugin in every script we...
Pinging possibly interested people: I am proposing a different, much smaller, patch for this at #129.
This patch does (afaiu) not address the root cause of issue 108, and instead adds `PyErr_SetString()` calls at various locations to work around the actual problem (that the exception is...
It looks like this PR is stuck waiting for approval/rereview by @javabrett. Brett, could you please take a look at this again? In your [last comment](https://github.com/benoitc/gunicorn/pull/2649#issuecomment-1029639863) you mentioned you wanted...
Well, this is really unfortunate. I understand your concern about which plugins to support, but this shouldn't be the can of worms you think it is. This patch hooks into...
@benoitc: I noticed you made a "prepare for release " commit a week ago. Will this PR be included in this upcoming release?