mirror of
https://github.com/samsonjs/vdirsyncer.git
synced 2026-04-10 11:35:53 +00:00
Merge pull request #106 from untitaker/tls_fingerprints
TLS fingerprints (2.1)
This commit is contained in:
commit
686441b5ab
9 changed files with 66 additions and 16 deletions
|
|
@ -7,3 +7,4 @@ In alphabetical order:
|
|||
- Clément Mondon
|
||||
- Julian Mehne
|
||||
- Markus Unterwaditzer
|
||||
- Thomas Weißschuh
|
||||
|
|
|
|||
|
|
@ -20,6 +20,6 @@
|
|||
|
||||
* But not because you wrote too few tests.
|
||||
|
||||
* Add yourself to ``CONTRIBUTORS.rst``. Don't add anything to
|
||||
* Add yourself to ``AUTHORS.rst``. Don't add anything to
|
||||
``CHANGELOG.rst``, I do that myself shortly before the release. You can
|
||||
help by writing meaningful commit messages.
|
||||
|
|
|
|||
2
build.sh
2
build.sh
|
|
@ -33,7 +33,7 @@ _davserver() {
|
|||
}
|
||||
|
||||
command__install_tests() {
|
||||
$PIP_INSTALL pytest pytest-xprocess
|
||||
$PIP_INSTALL pytest pytest-xprocess git+https://github.com/mitsuhiko/werkzeug/ pytest-localserver
|
||||
_optimize_pip
|
||||
_davserver $DAV_SERVER
|
||||
[ "$TRAVIS" != "true" ] || $PIP_INSTALL coverage coveralls
|
||||
|
|
|
|||
|
|
@ -8,8 +8,6 @@ import pytest
|
|||
import wsgi_intercept
|
||||
import wsgi_intercept.requests_intercept
|
||||
|
||||
wsgi_intercept.requests_intercept.install()
|
||||
|
||||
|
||||
RADICALE_SCHEMA = '''
|
||||
create table collection (
|
||||
|
|
@ -93,10 +91,12 @@ class ServerMixin(object):
|
|||
do_the_radicale_dance(str(tmpdir))
|
||||
from radicale import Application
|
||||
|
||||
wsgi_intercept.requests_intercept.install()
|
||||
wsgi_intercept.add_wsgi_intercept('127.0.0.1', 80, Application)
|
||||
|
||||
def teardown():
|
||||
wsgi_intercept.remove_wsgi_intercept('127.0.0.1', 80)
|
||||
wsgi_intercept.requests_intercept.uninstall()
|
||||
request.addfinalizer(teardown)
|
||||
|
||||
def get_storage_args(self, collection='test'):
|
||||
|
|
|
|||
|
|
@ -41,7 +41,7 @@ def test_list(monkeypatch):
|
|||
u'\n'.join([u'BEGIN:VCALENDAR'] + items + [u'END:VCALENDAR'])
|
||||
] * 2
|
||||
|
||||
def get(method, url, *a, **kw):
|
||||
def get(self, method, url, *a, **kw):
|
||||
assert method == 'GET'
|
||||
assert url == collection_url
|
||||
r = Response()
|
||||
|
|
@ -52,7 +52,7 @@ def test_list(monkeypatch):
|
|||
r.encoding = 'ISO-8859-1'
|
||||
return r
|
||||
|
||||
monkeypatch.setattr('requests.request', get)
|
||||
monkeypatch.setattr('requests.sessions.Session.request', get)
|
||||
|
||||
s = HttpStorage(url=collection_url)
|
||||
|
||||
|
|
|
|||
|
|
@ -11,6 +11,8 @@ import click
|
|||
|
||||
from click.testing import CliRunner
|
||||
import pytest
|
||||
import requests
|
||||
|
||||
import vdirsyncer.utils as utils
|
||||
import vdirsyncer.doubleclick as doubleclick
|
||||
from vdirsyncer.utils.vobject import split_collection
|
||||
|
|
@ -178,3 +180,18 @@ def test_get_class_init_args_on_storage():
|
|||
all, required = utils.get_class_init_args(MemoryStorage)
|
||||
assert all == set(['collection', 'read_only', 'instance_name'])
|
||||
assert not required
|
||||
|
||||
|
||||
def test_request_ssl(httpsserver):
|
||||
sha1 = '94:FD:7A:CB:50:75:A4:69:82:0A:F8:23:DF:07:FC:69:3E:CD:90:CA'
|
||||
md5 = '19:90:F7:23:94:F2:EF:AB:2B:64:2D:57:3D:25:95:2D'
|
||||
|
||||
httpsserver.serve_content('') # we need to serve something
|
||||
|
||||
with pytest.raises(requests.exceptions.SSLError) as excinfo:
|
||||
utils.request('GET', httpsserver.url)
|
||||
assert 'certificate verify failed' in str(excinfo.value)
|
||||
utils.request('GET', httpsserver.url, verify=False)
|
||||
utils.request('GET', httpsserver.url, verify=False,
|
||||
verify_fingerprint=sha1)
|
||||
utils.request('GET', httpsserver.url, verify=False, verify_fingerprint=md5)
|
||||
|
|
|
|||
|
|
@ -162,13 +162,15 @@ class DavSession(object):
|
|||
'''
|
||||
|
||||
def __init__(self, url, username='', password='', verify=True, auth=None,
|
||||
useragent=USERAGENT, dav_header=None):
|
||||
useragent=USERAGENT, verify_fingerprint=None,
|
||||
dav_header=None):
|
||||
if username and not password:
|
||||
password = utils.get_password(username, url)
|
||||
|
||||
self._settings = {
|
||||
'verify': prepare_verify(verify),
|
||||
'auth': prepare_auth(auth, username, password)
|
||||
'auth': prepare_auth(auth, username, password),
|
||||
'verify_fingerprint': verify_fingerprint,
|
||||
}
|
||||
self.useragent = useragent
|
||||
self.url = url.rstrip('/') + '/'
|
||||
|
|
@ -222,6 +224,8 @@ class DavStorage(Storage):
|
|||
:param password: Password for authentication.
|
||||
:param verify: Verify SSL certificate, default True. This can also be a
|
||||
local path to a self-signed SSL certificate.
|
||||
:param verify_fingerprint: Optional. SHA1 or MD5 fingerprint of the
|
||||
expected server certificate.
|
||||
:param auth: Optional. Either ``basic``, ``digest`` or ``guess``. Default
|
||||
``guess``. If you know yours, consider setting it explicitly for
|
||||
performance.
|
||||
|
|
@ -248,14 +252,15 @@ class DavStorage(Storage):
|
|||
|
||||
def __init__(self, url, username='', password='', collection=None,
|
||||
verify=True, auth=None, useragent=USERAGENT,
|
||||
unsafe_href_chars='@', **kwargs):
|
||||
unsafe_href_chars='@', verify_fingerprint=None, **kwargs):
|
||||
super(DavStorage, self).__init__(**kwargs)
|
||||
|
||||
url = url.rstrip('/') + '/'
|
||||
if collection is not None:
|
||||
url = utils.urlparse.urljoin(url, collection)
|
||||
self.session = DavSession(url, username, password, verify, auth,
|
||||
useragent, dav_header=self.dav_header)
|
||||
useragent, verify_fingerprint,
|
||||
dav_header=self.dav_header)
|
||||
self.collection = collection
|
||||
self.unsafe_href_chars = unsafe_href_chars
|
||||
|
||||
|
|
@ -268,7 +273,8 @@ class DavStorage(Storage):
|
|||
if kwargs.pop('collection', None) is not None:
|
||||
raise TypeError('collection argument must not be given.')
|
||||
discover_args, _ = utils.split_dict(kwargs, lambda key: key in (
|
||||
'username', 'password', 'verify', 'auth', 'useragent'
|
||||
'username', 'password', 'verify', 'auth', 'useragent',
|
||||
'verify_fingerprint',
|
||||
))
|
||||
d = cls.discovery_class(DavSession(
|
||||
url=url, dav_header=cls.dav_header, **discover_args))
|
||||
|
|
|
|||
|
|
@ -54,6 +54,8 @@ class HttpStorage(Storage):
|
|||
:param password: Password for authentication.
|
||||
:param verify: Verify SSL certificate, default True. This can also be a
|
||||
local path to a self-signed SSL certificate.
|
||||
:param verify_fingerprint: Optional. SHA1 or MD5 fingerprint of the
|
||||
expected server certificate.
|
||||
:param auth: Optional. Either ``basic``, ``digest`` or ``guess``. Default
|
||||
``guess``. If you know yours, consider setting it explicitly for
|
||||
performance.
|
||||
|
|
@ -81,7 +83,8 @@ class HttpStorage(Storage):
|
|||
_items = None
|
||||
|
||||
def __init__(self, url, username='', password='', collection=None,
|
||||
verify=True, auth=None, useragent=USERAGENT, **kwargs):
|
||||
verify=True, auth=None, useragent=USERAGENT,
|
||||
verify_fingerprint=None, **kwargs):
|
||||
super(HttpStorage, self).__init__(**kwargs)
|
||||
|
||||
if username and not password:
|
||||
|
|
@ -89,6 +92,7 @@ class HttpStorage(Storage):
|
|||
|
||||
self._settings = {
|
||||
'verify': prepare_verify(verify),
|
||||
'verify_fingerprint': verify_fingerprint,
|
||||
'auth': prepare_auth(auth, username, password),
|
||||
'latin1_fallback': False
|
||||
}
|
||||
|
|
|
|||
|
|
@ -11,6 +11,7 @@ import os
|
|||
import threading
|
||||
|
||||
import requests
|
||||
from requests.packages.urllib3.poolmanager import PoolManager
|
||||
|
||||
from .. import exceptions, log
|
||||
from ..doubleclick import click, ctx
|
||||
|
|
@ -165,13 +166,27 @@ def _password_from_keyring(username, host):
|
|||
return keyring.get_password(password_key_prefix + host, username)
|
||||
|
||||
|
||||
class _FingerprintAdapter(requests.adapters.HTTPAdapter):
|
||||
def __init__(self, fingerprint=None, **kwargs):
|
||||
self.fingerprint = str(fingerprint)
|
||||
super(_FingerprintAdapter, self).__init__(**kwargs)
|
||||
|
||||
def init_poolmanager(self, connections, maxsize, block=False):
|
||||
self.poolmanager = PoolManager(num_pools=connections,
|
||||
maxsize=maxsize,
|
||||
block=block,
|
||||
assert_fingerprint=self.fingerprint)
|
||||
|
||||
|
||||
def request(method, url, data=None, headers=None, auth=None, verify=None,
|
||||
session=None, latin1_fallback=True):
|
||||
session=None, latin1_fallback=True, verify_fingerprint=None):
|
||||
'''
|
||||
Wrapper method for requests, to ease logging and mocking. Parameters should
|
||||
be the same as for ``requests.request``, except:
|
||||
|
||||
:param session: A requests session object to use.
|
||||
:param verify_fingerprint: Optional. SHA1 or MD5 fingerprint of the
|
||||
expected server certificate.
|
||||
:param latin1_fallback: RFC-2616 specifies the default Content-Type of
|
||||
text/* to be latin1, which is not always correct, but exactly what
|
||||
requests is doing. Setting this parameter to False will use charset
|
||||
|
|
@ -181,9 +196,16 @@ def request(method, url, data=None, headers=None, auth=None, verify=None,
|
|||
'''
|
||||
|
||||
if session is None:
|
||||
func = requests.request
|
||||
else:
|
||||
func = session.request
|
||||
session = requests.Session()
|
||||
|
||||
if verify_fingerprint is not None:
|
||||
https_prefix = 'https://'
|
||||
|
||||
if not isinstance(session.adapters[https_prefix], _FingerprintAdapter):
|
||||
fingerprint_adapter = _FingerprintAdapter(verify_fingerprint)
|
||||
session.mount(https_prefix, fingerprint_adapter)
|
||||
|
||||
func = session.request
|
||||
|
||||
logger.debug(u'{} {}'.format(method, url))
|
||||
logger.debug(headers)
|
||||
|
|
|
|||
Loading…
Reference in a new issue