2018-09-17 00:27:00 +00:00
|
|
|
from __future__ import absolute_import
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
import datetime
|
|
|
|
import logging
|
|
|
|
import os
|
2022-01-24 04:07:52 +00:00
|
|
|
import re
|
2018-09-17 00:27:00 +00:00
|
|
|
import socket
|
|
|
|
import warnings
|
2022-01-24 04:07:52 +00:00
|
|
|
from socket import error as SocketError
|
|
|
|
from socket import timeout as SocketTimeout
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
from .packages import six
|
|
|
|
from .packages.six.moves.http_client import HTTPConnection as _HTTPConnection
|
|
|
|
from .packages.six.moves.http_client import HTTPException # noqa: F401
|
2022-01-24 04:07:52 +00:00
|
|
|
from .util.proxy import create_proxy_ssl_context
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
try: # Compiled with SSL?
|
|
|
|
import ssl
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
BaseSSLError = ssl.SSLError
|
|
|
|
except (ImportError, AttributeError): # Platform-specific: No SSL.
|
|
|
|
ssl = None
|
|
|
|
|
|
|
|
class BaseSSLError(BaseException):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2019-09-18 15:30:46 +00:00
|
|
|
try:
|
|
|
|
# Python 3: not a no-op, we're adding this to the namespace so it can be imported.
|
2018-09-17 00:27:00 +00:00
|
|
|
ConnectionError = ConnectionError
|
2019-09-18 15:30:46 +00:00
|
|
|
except NameError:
|
|
|
|
# Python 2
|
2018-09-17 00:27:00 +00:00
|
|
|
class ConnectionError(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
try: # Python 3:
|
|
|
|
# Not a no-op, we're adding this to the namespace so it can be imported.
|
|
|
|
BrokenPipeError = BrokenPipeError
|
|
|
|
except NameError: # Python 2:
|
|
|
|
|
|
|
|
class BrokenPipeError(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
from ._collections import HTTPHeaderDict # noqa (historical, removed in v2)
|
|
|
|
from ._version import __version__
|
2018-09-17 00:27:00 +00:00
|
|
|
from .exceptions import (
|
|
|
|
ConnectTimeoutError,
|
2022-01-24 04:07:52 +00:00
|
|
|
NewConnectionError,
|
2018-09-17 00:27:00 +00:00
|
|
|
SubjectAltNameWarning,
|
|
|
|
SystemTimeWarning,
|
|
|
|
)
|
2022-01-24 04:07:52 +00:00
|
|
|
from .util import SKIP_HEADER, SKIPPABLE_HEADERS, connection
|
2018-09-17 00:27:00 +00:00
|
|
|
from .util.ssl_ import (
|
|
|
|
assert_fingerprint,
|
|
|
|
create_urllib3_context,
|
2022-01-24 04:07:52 +00:00
|
|
|
is_ipaddress,
|
|
|
|
resolve_cert_reqs,
|
|
|
|
resolve_ssl_version,
|
|
|
|
ssl_wrap_socket,
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
2022-01-24 04:07:52 +00:00
|
|
|
from .util.ssl_match_hostname import CertificateError, match_hostname
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
port_by_scheme = {"http": 80, "https": 443}
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
# When it comes time to update this value as a part of regular maintenance
|
|
|
|
# (ie test_recent_date is failing) update it to ~6 months before the current date.
|
|
|
|
RECENT_DATE = datetime.date(2020, 7, 1)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
_CONTAINS_CONTROL_CHAR_RE = re.compile(r"[^-!#$%&'*+.^_`|~0-9a-zA-Z]")
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
class HTTPConnection(_HTTPConnection, object):
|
|
|
|
"""
|
2022-01-24 04:07:52 +00:00
|
|
|
Based on :class:`http.client.HTTPConnection` but provides an extra constructor
|
2018-09-17 00:27:00 +00:00
|
|
|
backwards-compatibility layer between older and newer Pythons.
|
|
|
|
|
|
|
|
Additional keyword parameters are used to configure attributes of the connection.
|
|
|
|
Accepted parameters include:
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
- ``strict``: See the documentation on :class:`urllib3.connectionpool.HTTPConnectionPool`
|
|
|
|
- ``source_address``: Set the source address for the current connection.
|
|
|
|
- ``socket_options``: Set specific options on the underlying socket. If not specified, then
|
|
|
|
defaults are loaded from ``HTTPConnection.default_socket_options`` which includes disabling
|
|
|
|
Nagle's algorithm (sets TCP_NODELAY to 1) unless the connection is behind a proxy.
|
|
|
|
|
|
|
|
For example, if you wish to enable TCP Keep Alive in addition to the defaults,
|
|
|
|
you might pass:
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
.. code-block:: python
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
HTTPConnection.default_socket_options + [
|
|
|
|
(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1),
|
|
|
|
]
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
Or you may want to disable the defaults by passing an empty list (e.g., ``[]``).
|
2018-09-17 00:27:00 +00:00
|
|
|
"""
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
default_port = port_by_scheme["http"]
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
#: Disable Nagle's algorithm by default.
|
|
|
|
#: ``[(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)]``
|
|
|
|
default_socket_options = [(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)]
|
|
|
|
|
|
|
|
#: Whether this connection verifies the host's certificate.
|
|
|
|
is_verified = False
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
#: Whether this proxy connection (if used) verifies the proxy host's
|
|
|
|
#: certificate.
|
|
|
|
proxy_is_verified = None
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
def __init__(self, *args, **kw):
|
2022-01-24 04:07:52 +00:00
|
|
|
if not six.PY2:
|
|
|
|
kw.pop("strict", None)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2018-10-31 16:08:29 +00:00
|
|
|
# Pre-set source_address.
|
2022-01-24 04:07:52 +00:00
|
|
|
self.source_address = kw.get("source_address")
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
#: The socket options provided by the user. If no options are
|
|
|
|
#: provided, we use the default options.
|
2022-01-24 04:07:52 +00:00
|
|
|
self.socket_options = kw.pop("socket_options", self.default_socket_options)
|
|
|
|
|
|
|
|
# Proxy options provided by the user.
|
|
|
|
self.proxy = kw.pop("proxy", None)
|
|
|
|
self.proxy_config = kw.pop("proxy_config", None)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
_HTTPConnection.__init__(self, *args, **kw)
|
|
|
|
|
|
|
|
@property
|
|
|
|
def host(self):
|
|
|
|
"""
|
|
|
|
Getter method to remove any trailing dots that indicate the hostname is an FQDN.
|
|
|
|
|
|
|
|
In general, SSL certificates don't include the trailing dot indicating a
|
|
|
|
fully-qualified domain name, and thus, they don't validate properly when
|
|
|
|
checked against a domain name that includes the dot. In addition, some
|
|
|
|
servers may not expect to receive the trailing dot when provided.
|
|
|
|
|
|
|
|
However, the hostname with trailing dot is critical to DNS resolution; doing a
|
|
|
|
lookup with the trailing dot will properly only resolve the appropriate FQDN,
|
|
|
|
whereas a lookup without a trailing dot will search the system's search domain
|
|
|
|
list. Thus, it's important to keep the original host around for use only in
|
|
|
|
those cases where it's appropriate (i.e., when doing DNS lookup to establish the
|
|
|
|
actual TCP connection across which we're going to send HTTP requests).
|
|
|
|
"""
|
2022-01-24 04:07:52 +00:00
|
|
|
return self._dns_host.rstrip(".")
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
@host.setter
|
|
|
|
def host(self, value):
|
|
|
|
"""
|
|
|
|
Setter for the `host` property.
|
|
|
|
|
|
|
|
We assume that only urllib3 uses the _dns_host attribute; httplib itself
|
|
|
|
only uses `host`, and it seems reasonable that other libraries follow suit.
|
|
|
|
"""
|
|
|
|
self._dns_host = value
|
|
|
|
|
|
|
|
def _new_conn(self):
|
2022-01-24 04:07:52 +00:00
|
|
|
"""Establish a socket connection and set nodelay settings on it.
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
:return: New socket connection.
|
|
|
|
"""
|
|
|
|
extra_kw = {}
|
|
|
|
if self.source_address:
|
2022-01-24 04:07:52 +00:00
|
|
|
extra_kw["source_address"] = self.source_address
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
if self.socket_options:
|
2022-01-24 04:07:52 +00:00
|
|
|
extra_kw["socket_options"] = self.socket_options
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
conn = connection.create_connection(
|
2022-01-24 04:07:52 +00:00
|
|
|
(self._dns_host, self.port), self.timeout, **extra_kw
|
|
|
|
)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2019-09-18 15:30:46 +00:00
|
|
|
except SocketTimeout:
|
2018-09-17 00:27:00 +00:00
|
|
|
raise ConnectTimeoutError(
|
2022-01-24 04:07:52 +00:00
|
|
|
self,
|
|
|
|
"Connection to %s timed out. (connect timeout=%s)"
|
|
|
|
% (self.host, self.timeout),
|
|
|
|
)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
except SocketError as e:
|
|
|
|
raise NewConnectionError(
|
2022-01-24 04:07:52 +00:00
|
|
|
self, "Failed to establish a new connection: %s" % e
|
|
|
|
)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
return conn
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def _is_using_tunnel(self):
|
|
|
|
# Google App Engine's httplib does not define _tunnel_host
|
|
|
|
return getattr(self, "_tunnel_host", None)
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
def _prepare_conn(self, conn):
|
|
|
|
self.sock = conn
|
2022-01-24 04:07:52 +00:00
|
|
|
if self._is_using_tunnel():
|
2018-09-17 00:27:00 +00:00
|
|
|
# TODO: Fix tunnel so it doesn't depend on self.sock state.
|
|
|
|
self._tunnel()
|
|
|
|
# Mark this connection as not reusable
|
|
|
|
self.auto_open = 0
|
|
|
|
|
|
|
|
def connect(self):
|
|
|
|
conn = self._new_conn()
|
|
|
|
self._prepare_conn(conn)
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def putrequest(self, method, url, *args, **kwargs):
|
|
|
|
""" """
|
|
|
|
# Empty docstring because the indentation of CPython's implementation
|
|
|
|
# is broken but we don't want this method in our documentation.
|
|
|
|
match = _CONTAINS_CONTROL_CHAR_RE.search(method)
|
|
|
|
if match:
|
|
|
|
raise ValueError(
|
|
|
|
"Method cannot contain non-token characters %r (found at least %r)"
|
|
|
|
% (method, match.group())
|
|
|
|
)
|
|
|
|
|
|
|
|
return _HTTPConnection.putrequest(self, method, url, *args, **kwargs)
|
|
|
|
|
|
|
|
def putheader(self, header, *values):
|
|
|
|
""" """
|
|
|
|
if not any(isinstance(v, str) and v == SKIP_HEADER for v in values):
|
|
|
|
_HTTPConnection.putheader(self, header, *values)
|
|
|
|
elif six.ensure_str(header.lower()) not in SKIPPABLE_HEADERS:
|
|
|
|
raise ValueError(
|
|
|
|
"urllib3.util.SKIP_HEADER only supports '%s'"
|
|
|
|
% ("', '".join(map(str.title, sorted(SKIPPABLE_HEADERS))),)
|
|
|
|
)
|
|
|
|
|
|
|
|
def request(self, method, url, body=None, headers=None):
|
|
|
|
if headers is None:
|
|
|
|
headers = {}
|
|
|
|
else:
|
|
|
|
# Avoid modifying the headers passed into .request()
|
|
|
|
headers = headers.copy()
|
|
|
|
if "user-agent" not in (six.ensure_str(k.lower()) for k in headers):
|
|
|
|
headers["User-Agent"] = _get_default_user_agent()
|
|
|
|
super(HTTPConnection, self).request(method, url, body=body, headers=headers)
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
def request_chunked(self, method, url, body=None, headers=None):
|
|
|
|
"""
|
|
|
|
Alternative to the common request method, which sends the
|
|
|
|
body with chunked encoding and not as one block
|
|
|
|
"""
|
2022-01-24 04:07:52 +00:00
|
|
|
headers = headers or {}
|
|
|
|
header_keys = set([six.ensure_str(k.lower()) for k in headers])
|
|
|
|
skip_accept_encoding = "accept-encoding" in header_keys
|
|
|
|
skip_host = "host" in header_keys
|
2018-09-17 00:27:00 +00:00
|
|
|
self.putrequest(
|
2022-01-24 04:07:52 +00:00
|
|
|
method, url, skip_accept_encoding=skip_accept_encoding, skip_host=skip_host
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
2022-01-24 04:07:52 +00:00
|
|
|
if "user-agent" not in header_keys:
|
|
|
|
self.putheader("User-Agent", _get_default_user_agent())
|
2018-09-17 00:27:00 +00:00
|
|
|
for header, value in headers.items():
|
|
|
|
self.putheader(header, value)
|
2022-01-24 04:07:52 +00:00
|
|
|
if "transfer-encoding" not in header_keys:
|
|
|
|
self.putheader("Transfer-Encoding", "chunked")
|
2018-09-17 00:27:00 +00:00
|
|
|
self.endheaders()
|
|
|
|
|
|
|
|
if body is not None:
|
2018-10-31 16:08:29 +00:00
|
|
|
stringish_types = six.string_types + (bytes,)
|
2018-09-17 00:27:00 +00:00
|
|
|
if isinstance(body, stringish_types):
|
|
|
|
body = (body,)
|
|
|
|
for chunk in body:
|
|
|
|
if not chunk:
|
|
|
|
continue
|
2018-10-31 16:08:29 +00:00
|
|
|
if not isinstance(chunk, bytes):
|
2022-01-24 04:07:52 +00:00
|
|
|
chunk = chunk.encode("utf8")
|
2018-09-17 00:27:00 +00:00
|
|
|
len_str = hex(len(chunk))[2:]
|
2022-01-24 04:07:52 +00:00
|
|
|
to_send = bytearray(len_str.encode())
|
|
|
|
to_send += b"\r\n"
|
|
|
|
to_send += chunk
|
|
|
|
to_send += b"\r\n"
|
|
|
|
self.send(to_send)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
# After the if clause, to always have a closed body
|
2022-01-24 04:07:52 +00:00
|
|
|
self.send(b"0\r\n\r\n")
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
class HTTPSConnection(HTTPConnection):
|
2022-01-24 04:07:52 +00:00
|
|
|
"""
|
|
|
|
Many of the parameters to this constructor are passed to the underlying SSL
|
|
|
|
socket by means of :py:func:`urllib3.util.ssl_wrap_socket`.
|
|
|
|
"""
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
default_port = port_by_scheme["https"]
|
2018-09-17 00:27:00 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
cert_reqs = None
|
|
|
|
ca_certs = None
|
|
|
|
ca_cert_dir = None
|
|
|
|
ca_cert_data = None
|
|
|
|
ssl_version = None
|
|
|
|
assert_fingerprint = None
|
|
|
|
tls_in_tls_required = False
|
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
host,
|
|
|
|
port=None,
|
|
|
|
key_file=None,
|
|
|
|
cert_file=None,
|
|
|
|
key_password=None,
|
|
|
|
strict=None,
|
|
|
|
timeout=socket._GLOBAL_DEFAULT_TIMEOUT,
|
|
|
|
ssl_context=None,
|
|
|
|
server_hostname=None,
|
|
|
|
**kw
|
|
|
|
):
|
|
|
|
|
|
|
|
HTTPConnection.__init__(self, host, port, strict=strict, timeout=timeout, **kw)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
self.key_file = key_file
|
|
|
|
self.cert_file = cert_file
|
2019-09-18 15:30:46 +00:00
|
|
|
self.key_password = key_password
|
2018-09-17 00:27:00 +00:00
|
|
|
self.ssl_context = ssl_context
|
2018-10-31 16:08:29 +00:00
|
|
|
self.server_hostname = server_hostname
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
# Required property for Google AppEngine 1.9.0 which otherwise causes
|
|
|
|
# HTTPS requests to go out as HTTP. (See Issue #356)
|
2022-01-24 04:07:52 +00:00
|
|
|
self._protocol = "https"
|
|
|
|
|
|
|
|
def set_cert(
|
|
|
|
self,
|
|
|
|
key_file=None,
|
|
|
|
cert_file=None,
|
|
|
|
cert_reqs=None,
|
|
|
|
key_password=None,
|
|
|
|
ca_certs=None,
|
|
|
|
assert_hostname=None,
|
|
|
|
assert_fingerprint=None,
|
|
|
|
ca_cert_dir=None,
|
|
|
|
ca_cert_data=None,
|
|
|
|
):
|
2018-09-17 00:27:00 +00:00
|
|
|
"""
|
|
|
|
This method should only be called once, before the connection is used.
|
|
|
|
"""
|
2019-09-18 15:30:46 +00:00
|
|
|
# If cert_reqs is not provided we'll assume CERT_REQUIRED unless we also
|
|
|
|
# have an SSLContext object in which case we'll use its verify_mode.
|
2018-09-17 00:27:00 +00:00
|
|
|
if cert_reqs is None:
|
2019-09-18 15:30:46 +00:00
|
|
|
if self.ssl_context is not None:
|
2018-09-17 00:27:00 +00:00
|
|
|
cert_reqs = self.ssl_context.verify_mode
|
2019-09-18 15:30:46 +00:00
|
|
|
else:
|
|
|
|
cert_reqs = resolve_cert_reqs(None)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
self.key_file = key_file
|
|
|
|
self.cert_file = cert_file
|
|
|
|
self.cert_reqs = cert_reqs
|
2019-09-18 15:30:46 +00:00
|
|
|
self.key_password = key_password
|
2018-09-17 00:27:00 +00:00
|
|
|
self.assert_hostname = assert_hostname
|
|
|
|
self.assert_fingerprint = assert_fingerprint
|
|
|
|
self.ca_certs = ca_certs and os.path.expanduser(ca_certs)
|
|
|
|
self.ca_cert_dir = ca_cert_dir and os.path.expanduser(ca_cert_dir)
|
2022-01-24 04:07:52 +00:00
|
|
|
self.ca_cert_data = ca_cert_data
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
def connect(self):
|
|
|
|
# Add certificate verification
|
|
|
|
conn = self._new_conn()
|
|
|
|
hostname = self.host
|
2022-01-24 04:07:52 +00:00
|
|
|
tls_in_tls = False
|
|
|
|
|
|
|
|
if self._is_using_tunnel():
|
|
|
|
if self.tls_in_tls_required:
|
|
|
|
conn = self._connect_tls_proxy(hostname, conn)
|
|
|
|
tls_in_tls = True
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
self.sock = conn
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
# Calls self._set_hostport(), so self.host is
|
|
|
|
# self._tunnel_host below.
|
|
|
|
self._tunnel()
|
|
|
|
# Mark this connection as not reusable
|
|
|
|
self.auto_open = 0
|
|
|
|
|
|
|
|
# Override the host with the one we're requesting data from.
|
|
|
|
hostname = self._tunnel_host
|
|
|
|
|
2018-10-31 16:08:29 +00:00
|
|
|
server_hostname = hostname
|
|
|
|
if self.server_hostname is not None:
|
|
|
|
server_hostname = self.server_hostname
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
is_time_off = datetime.date.today() < RECENT_DATE
|
|
|
|
if is_time_off:
|
2022-01-24 04:07:52 +00:00
|
|
|
warnings.warn(
|
|
|
|
(
|
|
|
|
"System time is way off (before {0}). This will probably "
|
|
|
|
"lead to SSL verification errors"
|
|
|
|
).format(RECENT_DATE),
|
|
|
|
SystemTimeWarning,
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
# Wrap socket using verification with the root certs in
|
|
|
|
# trusted_root_certs
|
2019-09-18 15:30:46 +00:00
|
|
|
default_ssl_context = False
|
2018-09-17 00:27:00 +00:00
|
|
|
if self.ssl_context is None:
|
2019-09-18 15:30:46 +00:00
|
|
|
default_ssl_context = True
|
2018-09-17 00:27:00 +00:00
|
|
|
self.ssl_context = create_urllib3_context(
|
|
|
|
ssl_version=resolve_ssl_version(self.ssl_version),
|
|
|
|
cert_reqs=resolve_cert_reqs(self.cert_reqs),
|
|
|
|
)
|
|
|
|
|
|
|
|
context = self.ssl_context
|
|
|
|
context.verify_mode = resolve_cert_reqs(self.cert_reqs)
|
2019-09-18 15:30:46 +00:00
|
|
|
|
|
|
|
# Try to load OS default certs if none are given.
|
|
|
|
# Works well on Windows (requires Python3.4+)
|
2022-01-24 04:07:52 +00:00
|
|
|
if (
|
|
|
|
not self.ca_certs
|
|
|
|
and not self.ca_cert_dir
|
|
|
|
and not self.ca_cert_data
|
|
|
|
and default_ssl_context
|
|
|
|
and hasattr(context, "load_default_certs")
|
|
|
|
):
|
2019-09-18 15:30:46 +00:00
|
|
|
context.load_default_certs()
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
self.sock = ssl_wrap_socket(
|
|
|
|
sock=conn,
|
|
|
|
keyfile=self.key_file,
|
|
|
|
certfile=self.cert_file,
|
2019-09-18 15:30:46 +00:00
|
|
|
key_password=self.key_password,
|
2018-09-17 00:27:00 +00:00
|
|
|
ca_certs=self.ca_certs,
|
|
|
|
ca_cert_dir=self.ca_cert_dir,
|
2022-01-24 04:07:52 +00:00
|
|
|
ca_cert_data=self.ca_cert_data,
|
2018-10-31 16:08:29 +00:00
|
|
|
server_hostname=server_hostname,
|
2022-01-24 04:07:52 +00:00
|
|
|
ssl_context=context,
|
|
|
|
tls_in_tls=tls_in_tls,
|
|
|
|
)
|
|
|
|
|
|
|
|
# If we're using all defaults and the connection
|
|
|
|
# is TLSv1 or TLSv1.1 we throw a DeprecationWarning
|
|
|
|
# for the host.
|
|
|
|
if (
|
|
|
|
default_ssl_context
|
|
|
|
and self.ssl_version is None
|
|
|
|
and hasattr(self.sock, "version")
|
|
|
|
and self.sock.version() in {"TLSv1", "TLSv1.1"}
|
|
|
|
):
|
|
|
|
warnings.warn(
|
|
|
|
"Negotiating TLSv1/TLSv1.1 by default is deprecated "
|
|
|
|
"and will be disabled in urllib3 v2.0.0. Connecting to "
|
|
|
|
"'%s' with '%s' can be enabled by explicitly opting-in "
|
|
|
|
"with 'ssl_version'" % (self.host, self.sock.version()),
|
|
|
|
DeprecationWarning,
|
|
|
|
)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
if self.assert_fingerprint:
|
2022-01-24 04:07:52 +00:00
|
|
|
assert_fingerprint(
|
|
|
|
self.sock.getpeercert(binary_form=True), self.assert_fingerprint
|
|
|
|
)
|
|
|
|
elif (
|
|
|
|
context.verify_mode != ssl.CERT_NONE
|
|
|
|
and not getattr(context, "check_hostname", False)
|
|
|
|
and self.assert_hostname is not False
|
|
|
|
):
|
2018-09-17 00:27:00 +00:00
|
|
|
# While urllib3 attempts to always turn off hostname matching from
|
|
|
|
# the TLS library, this cannot always be done. So we check whether
|
|
|
|
# the TLS Library still thinks it's matching hostnames.
|
|
|
|
cert = self.sock.getpeercert()
|
2022-01-24 04:07:52 +00:00
|
|
|
if not cert.get("subjectAltName", ()):
|
|
|
|
warnings.warn(
|
|
|
|
(
|
|
|
|
"Certificate for {0} has no `subjectAltName`, falling back to check for a "
|
|
|
|
"`commonName` for now. This feature is being removed by major browsers and "
|
|
|
|
"deprecated by RFC 2818. (See https://github.com/urllib3/urllib3/issues/497 "
|
|
|
|
"for details.)".format(hostname)
|
|
|
|
),
|
|
|
|
SubjectAltNameWarning,
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
2018-10-31 16:08:29 +00:00
|
|
|
_match_hostname(cert, self.assert_hostname or server_hostname)
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
self.is_verified = (
|
2022-01-24 04:07:52 +00:00
|
|
|
context.verify_mode == ssl.CERT_REQUIRED
|
|
|
|
or self.assert_fingerprint is not None
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def _connect_tls_proxy(self, hostname, conn):
|
|
|
|
"""
|
|
|
|
Establish a TLS connection to the proxy using the provided SSL context.
|
|
|
|
"""
|
|
|
|
proxy_config = self.proxy_config
|
|
|
|
ssl_context = proxy_config.ssl_context
|
|
|
|
if ssl_context:
|
|
|
|
# If the user provided a proxy context, we assume CA and client
|
|
|
|
# certificates have already been set
|
|
|
|
return ssl_wrap_socket(
|
|
|
|
sock=conn,
|
|
|
|
server_hostname=hostname,
|
|
|
|
ssl_context=ssl_context,
|
|
|
|
)
|
|
|
|
|
|
|
|
ssl_context = create_proxy_ssl_context(
|
|
|
|
self.ssl_version,
|
|
|
|
self.cert_reqs,
|
|
|
|
self.ca_certs,
|
|
|
|
self.ca_cert_dir,
|
|
|
|
self.ca_cert_data,
|
|
|
|
)
|
|
|
|
|
|
|
|
# If no cert was provided, use only the default options for server
|
|
|
|
# certificate validation
|
|
|
|
socket = ssl_wrap_socket(
|
|
|
|
sock=conn,
|
|
|
|
ca_certs=self.ca_certs,
|
|
|
|
ca_cert_dir=self.ca_cert_dir,
|
|
|
|
ca_cert_data=self.ca_cert_data,
|
|
|
|
server_hostname=hostname,
|
|
|
|
ssl_context=ssl_context,
|
|
|
|
)
|
|
|
|
|
|
|
|
if ssl_context.verify_mode != ssl.CERT_NONE and not getattr(
|
|
|
|
ssl_context, "check_hostname", False
|
|
|
|
):
|
|
|
|
# While urllib3 attempts to always turn off hostname matching from
|
|
|
|
# the TLS library, this cannot always be done. So we check whether
|
|
|
|
# the TLS Library still thinks it's matching hostnames.
|
|
|
|
cert = socket.getpeercert()
|
|
|
|
if not cert.get("subjectAltName", ()):
|
|
|
|
warnings.warn(
|
|
|
|
(
|
|
|
|
"Certificate for {0} has no `subjectAltName`, falling back to check for a "
|
|
|
|
"`commonName` for now. This feature is being removed by major browsers and "
|
|
|
|
"deprecated by RFC 2818. (See https://github.com/urllib3/urllib3/issues/497 "
|
|
|
|
"for details.)".format(hostname)
|
|
|
|
),
|
|
|
|
SubjectAltNameWarning,
|
|
|
|
)
|
|
|
|
_match_hostname(cert, hostname)
|
|
|
|
|
|
|
|
self.proxy_is_verified = ssl_context.verify_mode == ssl.CERT_REQUIRED
|
|
|
|
return socket
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
|
|
|
|
def _match_hostname(cert, asserted_hostname):
|
2022-01-24 04:07:52 +00:00
|
|
|
# Our upstream implementation of ssl.match_hostname()
|
|
|
|
# only applies this normalization to IP addresses so it doesn't
|
|
|
|
# match DNS SANs so we do the same thing!
|
|
|
|
stripped_hostname = asserted_hostname.strip("u[]")
|
|
|
|
if is_ipaddress(stripped_hostname):
|
|
|
|
asserted_hostname = stripped_hostname
|
|
|
|
|
2018-09-17 00:27:00 +00:00
|
|
|
try:
|
|
|
|
match_hostname(cert, asserted_hostname)
|
|
|
|
except CertificateError as e:
|
2022-01-24 04:07:52 +00:00
|
|
|
log.warning(
|
|
|
|
"Certificate did not match expected hostname: %s. Certificate: %s",
|
|
|
|
asserted_hostname,
|
|
|
|
cert,
|
2018-09-17 00:27:00 +00:00
|
|
|
)
|
|
|
|
# Add cert to exception and reraise so client code can inspect
|
|
|
|
# the cert when catching the exception, if they want to
|
|
|
|
e._peer_cert = cert
|
|
|
|
raise
|
|
|
|
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def _get_default_user_agent():
|
|
|
|
return "python-urllib3/%s" % __version__
|
|
|
|
|
|
|
|
|
|
|
|
class DummyConnection(object):
|
|
|
|
"""Used to detect a failed ConnectionCls import."""
|
|
|
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
if not ssl:
|
|
|
|
HTTPSConnection = DummyConnection # noqa: F811
|
|
|
|
|
|
|
|
|
|
|
|
VerifiedHTTPSConnection = HTTPSConnection
|