-
Notifications
You must be signed in to change notification settings - Fork 3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
5f3f592
commit 18c0a7f
Showing
9 changed files
with
1,189 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
The MIT License (MIT) | ||
|
||
Copyright (c) 2022 Seth Michael Larson | ||
|
||
Permission is hereby granted, free of charge, to any person obtaining a copy | ||
of this software and associated documentation files (the "Software"), to deal | ||
in the Software without restriction, including without limitation the rights | ||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
copies of the Software, and to permit persons to whom the Software is | ||
furnished to do so, subject to the following conditions: | ||
|
||
The above copyright notice and this permission notice shall be included in | ||
all copies or substantial portions of the Software. | ||
|
||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | ||
THE SOFTWARE. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
"""Verify certificates using OS trust stores""" | ||
|
||
import sys as _sys | ||
|
||
if _sys.version_info < (3, 10): | ||
raise ImportError("truststore requires Python 3.10 or later") | ||
del _sys | ||
|
||
from ._api import SSLContext # noqa: E402 | ||
|
||
__all__ = ["SSLContext"] | ||
__version__ = "0.5.0" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
import os | ||
import platform | ||
import socket | ||
import ssl | ||
from typing import Any | ||
|
||
from _ssl import ENCODING_DER # type: ignore[import] | ||
|
||
if platform.system() == "Windows": | ||
from ._windows import _configure_context, _verify_peercerts_impl | ||
elif platform.system() == "Darwin": | ||
from ._macos import _configure_context, _verify_peercerts_impl | ||
else: | ||
from ._openssl import _configure_context, _verify_peercerts_impl | ||
|
||
|
||
class SSLContext(ssl.SSLContext): | ||
"""SSLContext API that uses system certificates on all platforms""" | ||
|
||
def __init__(self, protocol: int = ssl.PROTOCOL_TLS) -> None: | ||
self._ctx = ssl.SSLContext(protocol) | ||
_configure_context(self._ctx) | ||
|
||
class TruststoreSSLObject(ssl.SSLObject): | ||
# This object exists because wrap_bio() doesn't | ||
# immediately do the handshake so we need to do | ||
# certificate verifications after SSLObject.do_handshake() | ||
|
||
def do_handshake(self) -> None: | ||
ret = super().do_handshake() | ||
_verify_peercerts(self, server_hostname=self.server_hostname) | ||
return ret | ||
|
||
self._ctx.sslobject_class = TruststoreSSLObject | ||
|
||
def wrap_socket( | ||
self, | ||
sock: socket.socket, | ||
server_side: bool = False, | ||
do_handshake_on_connect: bool = True, | ||
suppress_ragged_eofs: bool = True, | ||
server_hostname: str | None = None, | ||
session: ssl.SSLSession | None = None, | ||
) -> ssl.SSLSocket: | ||
ssl_sock = self._ctx.wrap_socket( | ||
sock, | ||
server_side=server_side, | ||
server_hostname=server_hostname, | ||
do_handshake_on_connect=do_handshake_on_connect, | ||
suppress_ragged_eofs=suppress_ragged_eofs, | ||
session=session, | ||
) | ||
try: | ||
_verify_peercerts(ssl_sock, server_hostname=server_hostname) | ||
except ssl.SSLError: | ||
ssl_sock.close() | ||
raise | ||
return ssl_sock | ||
|
||
def wrap_bio( | ||
self, | ||
incoming: ssl.MemoryBIO, | ||
outgoing: ssl.MemoryBIO, | ||
server_side: bool = False, | ||
server_hostname: str | None = None, | ||
session: ssl.SSLSession | None = None, | ||
) -> ssl.SSLObject: | ||
ssl_obj = self._ctx.wrap_bio( | ||
incoming, | ||
outgoing, | ||
server_hostname=server_hostname, | ||
server_side=server_side, | ||
session=session, | ||
) | ||
return ssl_obj | ||
|
||
def load_verify_locations( | ||
self, | ||
cafile: str | bytes | os.PathLike[str] | os.PathLike[bytes] | None = None, | ||
capath: str | bytes | os.PathLike[str] | os.PathLike[bytes] | None = None, | ||
cadata: str | bytes | None = None, | ||
) -> None: | ||
return self._ctx.load_verify_locations(cafile, capath, cadata) | ||
|
||
def __getattr__(self, name: str) -> Any: | ||
return getattr(self._ctx, name) | ||
|
||
def __setattr__(self, name: str, value: Any) -> None: | ||
if name == "verify_flags": | ||
self._ctx.verify_flags = value | ||
else: | ||
return super().__setattr__(name, value) | ||
|
||
|
||
def _verify_peercerts( | ||
sock_or_sslobj: ssl.SSLSocket | ssl.SSLObject, server_hostname: str | None | ||
) -> None: | ||
""" | ||
Verifies the peer certificates from an SSLSocket or SSLObject | ||
against the certificates in the OS trust store. | ||
""" | ||
sslobj: ssl.SSLObject = sock_or_sslobj # type: ignore[assignment] | ||
try: | ||
while not hasattr(sslobj, "get_unverified_chain"): | ||
sslobj = sslobj._sslobj # type: ignore[attr-defined] | ||
except AttributeError: | ||
pass | ||
|
||
cert_bytes = [ | ||
cert.public_bytes(ENCODING_DER) for cert in sslobj.get_unverified_chain() # type: ignore[attr-defined] | ||
] | ||
_verify_peercerts_impl( | ||
sock_or_sslobj.context, cert_bytes, server_hostname=server_hostname | ||
) |
Oops, something went wrong.