| | import os |
| | import ssl |
| |
|
| | from . import errors |
| | from .ssladapter import ssladapter |
| |
|
| |
|
| | class TLSConfig(object): |
| | cert = None |
| | ca_cert = None |
| | verify = None |
| | ssl_version = None |
| |
|
| | def __init__(self, client_cert=None, ca_cert=None, verify=None, |
| | ssl_version=None, assert_hostname=None, |
| | assert_fingerprint=None): |
| | |
| | |
| | |
| | |
| | |
| |
|
| | self.assert_hostname = assert_hostname |
| | self.assert_fingerprint = assert_fingerprint |
| |
|
| | |
| | |
| |
|
| | self.ssl_version = ssl_version or ssl.PROTOCOL_TLSv1 |
| |
|
| | |
| | |
| | |
| |
|
| | if client_cert: |
| | try: |
| | tls_cert, tls_key = client_cert |
| | except ValueError: |
| | raise errors.TLSParameterError( |
| | 'client_config must be a tuple of' |
| | ' (client certificate, key file)' |
| | ) |
| |
|
| | if not (tls_cert and tls_key) or (not os.path.isfile(tls_cert) or |
| | not os.path.isfile(tls_key)): |
| | raise errors.TLSParameterError( |
| | 'Path to a certificate and key files must be provided' |
| | ' through the client_config param' |
| | ) |
| | self.cert = (tls_cert, tls_key) |
| |
|
| | |
| | self.verify = verify |
| | self.ca_cert = ca_cert |
| | if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): |
| | raise errors.TLSParameterError( |
| | 'Invalid CA certificate provided for `tls_ca_cert`.' |
| | ) |
| |
|
| | def configure_client(self, client): |
| | client.ssl_version = self.ssl_version |
| |
|
| | if self.verify and self.ca_cert: |
| | client.verify = self.ca_cert |
| | else: |
| | client.verify = self.verify |
| |
|
| | if self.cert: |
| | client.cert = self.cert |
| |
|
| | client.mount('https://', ssladapter.SSLAdapter( |
| | ssl_version=self.ssl_version, |
| | assert_hostname=self.assert_hostname, |
| | assert_fingerprint=self.assert_fingerprint, |
| | )) |
| |
|