Show More
@@ -454,7 +454,7 b' def wrapsocket(sock, keyfile, certfile, ' | |||
|
454 | 454 | 'server; see ' |
|
455 | 455 | 'https://mercurial-scm.org/wiki/SecureConnections ' |
|
456 | 456 | 'for more info)\n') % ( |
|
457 | serverhostname, | |
|
457 | pycompat.bytesurl(serverhostname), | |
|
458 | 458 | ', '.join(sorted(supportedprotocols)))) |
|
459 | 459 | else: |
|
460 | 460 | ui.warn(_( |
@@ -463,7 +463,8 b' def wrapsocket(sock, keyfile, certfile, ' | |||
|
463 | 463 | 'supports TLS 1.0 because it has known security ' |
|
464 | 464 | 'vulnerabilities; see ' |
|
465 | 465 | 'https://mercurial-scm.org/wiki/SecureConnections ' |
|
466 |
'for more info)\n') % |
|
|
466 | 'for more info)\n') % | |
|
467 | pycompat.bytesurl(serverhostname)) | |
|
467 | 468 | else: |
|
468 | 469 | # We attempted TLS 1.1+. We can only get here if the client |
|
469 | 470 | # supports the configured protocol. So the likely reason is |
@@ -473,14 +474,15 b' def wrapsocket(sock, keyfile, certfile, ' | |||
|
473 | 474 | '(could not negotiate a common security protocol (%s+) ' |
|
474 | 475 | 'with %s; the likely cause is Mercurial is configured ' |
|
475 | 476 | 'to be more secure than the server can support)\n') % ( |
|
476 |
settings['protocolui'], |
|
|
477 | settings['protocolui'], | |
|
478 | pycompat.bytesurl(serverhostname))) | |
|
477 | 479 | ui.warn(_('(consider contacting the operator of this ' |
|
478 | 480 | 'server and ask them to support modern TLS ' |
|
479 | 481 | 'protocol versions; or, set ' |
|
480 | 482 | 'hostsecurity.%s:minimumprotocol=tls1.0 to allow ' |
|
481 | 483 | 'use of legacy, less secure protocols when ' |
|
482 | 484 | 'communicating with this server)\n') % |
|
483 | serverhostname) | |
|
485 | pycompat.bytesurl(serverhostname)) | |
|
484 | 486 | ui.warn(_( |
|
485 | 487 | '(see https://mercurial-scm.org/wiki/SecureConnections ' |
|
486 | 488 | 'for more info)\n')) |
General Comments 0
You need to be logged in to leave comments.
Login now