| import os |
| import ssl |
|
|
| from . import errors |
| from .ssladapter import ssladapter |
|
|
|
|
| class TLSConfig(object): |
| cert = None |
| ca_cert = None |
| verify = None |
| ssl_version = None |
|
|
| def __init__(self, client_cert=None, ca_cert=None, verify=None, |
| ssl_version=None, assert_hostname=None, |
| assert_fingerprint=None): |
| |
| |
| |
| |
| |
|
|
| self.assert_hostname = assert_hostname |
| self.assert_fingerprint = assert_fingerprint |
|
|
| |
| |
|
|
| self.ssl_version = ssl_version or ssl.PROTOCOL_TLSv1 |
|
|
| |
| |
| |
|
|
| if client_cert: |
| try: |
| tls_cert, tls_key = client_cert |
| except ValueError: |
| raise errors.TLSParameterError( |
| 'client_config must be a tuple of' |
| ' (client certificate, key file)' |
| ) |
|
|
| if not (tls_cert and tls_key) or (not os.path.isfile(tls_cert) or |
| not os.path.isfile(tls_key)): |
| raise errors.TLSParameterError( |
| 'Path to a certificate and key files must be provided' |
| ' through the client_config param' |
| ) |
| self.cert = (tls_cert, tls_key) |
|
|
| |
| self.verify = verify |
| self.ca_cert = ca_cert |
| if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): |
| raise errors.TLSParameterError( |
| 'Invalid CA certificate provided for `tls_ca_cert`.' |
| ) |
|
|
| def configure_client(self, client): |
| client.ssl_version = self.ssl_version |
|
|
| if self.verify and self.ca_cert: |
| client.verify = self.ca_cert |
| else: |
| client.verify = self.verify |
|
|
| if self.cert: |
| client.cert = self.cert |
|
|
| client.mount('https://', ssladapter.SSLAdapter( |
| ssl_version=self.ssl_version, |
| assert_hostname=self.assert_hostname, |
| assert_fingerprint=self.assert_fingerprint, |
| )) |
|
|