2020-05-23 13:26:06 +02:00
|
|
|
|
import ssl
|
2022-03-01 15:16:37 +01:00
|
|
|
|
from typing import NamedTuple, Optional
|
2020-05-23 13:26:06 +02:00
|
|
|
|
|
2021-11-25 00:41:37 +01:00
|
|
|
|
from httpie.adapters import HTTPAdapter
|
2020-05-23 13:26:06 +02:00
|
|
|
|
# noinspection PyPackageRequirements
|
2020-05-23 15:01:33 +02:00
|
|
|
|
from urllib3.util.ssl_ import (
|
2023-05-19 21:18:55 +02:00
|
|
|
|
create_urllib3_context,
|
2020-05-23 15:01:33 +02:00
|
|
|
|
resolve_ssl_version,
|
|
|
|
|
)
|
2020-05-23 13:26:06 +02:00
|
|
|
|
|
2023-05-19 22:26:33 +02:00
|
|
|
|
|
2020-05-23 13:26:06 +02:00
|
|
|
|
SSL_VERSION_ARG_MAPPING = {
|
|
|
|
|
'ssl2.3': 'PROTOCOL_SSLv23',
|
|
|
|
|
'ssl3': 'PROTOCOL_SSLv3',
|
|
|
|
|
'tls1': 'PROTOCOL_TLSv1',
|
|
|
|
|
'tls1.1': 'PROTOCOL_TLSv1_1',
|
|
|
|
|
'tls1.2': 'PROTOCOL_TLSv1_2',
|
|
|
|
|
'tls1.3': 'PROTOCOL_TLSv1_3',
|
|
|
|
|
}
|
|
|
|
|
AVAILABLE_SSL_VERSION_ARG_MAPPING = {
|
|
|
|
|
arg: getattr(ssl, constant_name)
|
|
|
|
|
for arg, constant_name in SSL_VERSION_ARG_MAPPING.items()
|
|
|
|
|
if hasattr(ssl, constant_name)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2022-03-01 15:16:37 +01:00
|
|
|
|
class HTTPieCertificate(NamedTuple):
|
|
|
|
|
cert_file: Optional[str] = None
|
|
|
|
|
key_file: Optional[str] = None
|
|
|
|
|
key_password: Optional[str] = None
|
|
|
|
|
|
|
|
|
|
def to_raw_cert(self):
|
|
|
|
|
"""Synthesize a requests-compatible (2-item tuple of cert and key file)
|
|
|
|
|
object from HTTPie's internal representation of a certificate."""
|
|
|
|
|
return (self.cert_file, self.key_file)
|
|
|
|
|
|
|
|
|
|
|
2020-05-23 13:26:06 +02:00
|
|
|
|
class HTTPieHTTPSAdapter(HTTPAdapter):
|
2020-05-23 20:19:16 +02:00
|
|
|
|
def __init__(
|
|
|
|
|
self,
|
|
|
|
|
verify: bool,
|
|
|
|
|
ssl_version: str = None,
|
|
|
|
|
ciphers: str = None,
|
|
|
|
|
**kwargs
|
|
|
|
|
):
|
2020-05-23 20:30:25 +02:00
|
|
|
|
self._ssl_context = self._create_ssl_context(
|
|
|
|
|
verify=verify,
|
|
|
|
|
ssl_version=ssl_version,
|
2020-05-23 13:26:06 +02:00
|
|
|
|
ciphers=ciphers,
|
|
|
|
|
)
|
2024-11-01 17:37:11 +01:00
|
|
|
|
# workaround for a bug in requests 2.32.3, see:
|
|
|
|
|
# https://github.com/httpie/cli/issues/1583
|
|
|
|
|
if getattr(self._ssl_context, 'load_default_certs', None) is not None:
|
|
|
|
|
# if load_default_certs is present, get_ca_certs must be
|
|
|
|
|
# also, no need for another getattr
|
|
|
|
|
if not self._ssl_context.get_ca_certs():
|
|
|
|
|
self._ssl_context.load_default_certs()
|
2020-05-23 13:26:06 +02:00
|
|
|
|
super().__init__(**kwargs)
|
|
|
|
|
|
|
|
|
|
def init_poolmanager(self, *args, **kwargs):
|
|
|
|
|
kwargs['ssl_context'] = self._ssl_context
|
|
|
|
|
return super().init_poolmanager(*args, **kwargs)
|
|
|
|
|
|
|
|
|
|
def proxy_manager_for(self, *args, **kwargs):
|
|
|
|
|
kwargs['ssl_context'] = self._ssl_context
|
|
|
|
|
return super().proxy_manager_for(*args, **kwargs)
|
2020-05-23 20:30:25 +02:00
|
|
|
|
|
2022-03-01 15:16:37 +01:00
|
|
|
|
def cert_verify(self, conn, url, verify, cert):
|
|
|
|
|
if isinstance(cert, HTTPieCertificate):
|
|
|
|
|
conn.key_password = cert.key_password
|
|
|
|
|
cert = cert.to_raw_cert()
|
|
|
|
|
|
|
|
|
|
return super().cert_verify(conn, url, verify, cert)
|
|
|
|
|
|
2020-05-23 20:30:25 +02:00
|
|
|
|
@staticmethod
|
|
|
|
|
def _create_ssl_context(
|
|
|
|
|
verify: bool,
|
|
|
|
|
ssl_version: str = None,
|
|
|
|
|
ciphers: str = None,
|
2020-09-25 14:44:22 +02:00
|
|
|
|
) -> 'ssl.SSLContext':
|
2020-05-23 20:30:25 +02:00
|
|
|
|
return create_urllib3_context(
|
|
|
|
|
ciphers=ciphers,
|
|
|
|
|
ssl_version=resolve_ssl_version(ssl_version),
|
|
|
|
|
# Since we are using a custom SSL context, we need to pass this
|
|
|
|
|
# here manually, even though it’s also passed to the connection
|
|
|
|
|
# in `super().cert_verify()`.
|
|
|
|
|
cert_reqs=ssl.CERT_REQUIRED if verify else ssl.CERT_NONE
|
|
|
|
|
)
|
2022-03-01 15:16:37 +01:00
|
|
|
|
|
2023-05-19 22:26:33 +02:00
|
|
|
|
@classmethod
|
|
|
|
|
def get_default_ciphers_names(cls):
|
|
|
|
|
return [cipher['name'] for cipher in cls._create_ssl_context(verify=False).get_ciphers()]
|
|
|
|
|
|
2022-03-01 15:16:37 +01:00
|
|
|
|
|
|
|
|
|
def _is_key_file_encrypted(key_file):
|
|
|
|
|
"""Detects if a key file is encrypted or not.
|
|
|
|
|
|
|
|
|
|
Copy of the internal urllib function (urllib3.util.ssl_)"""
|
|
|
|
|
|
|
|
|
|
with open(key_file, "r") as f:
|
|
|
|
|
for line in f:
|
|
|
|
|
# Look for Proc-Type: 4,ENCRYPTED
|
|
|
|
|
if "ENCRYPTED" in line:
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
|
return False
|
2023-05-19 22:26:33 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# We used to import the default set of TLS ciphers from urllib3, but they removed it.
|
|
|
|
|
# Instead, now urllib3 uses the list of ciphers configured by the system.
|
2023-08-06 14:04:32 +02:00
|
|
|
|
# <https://github.com/httpie/cli/pull/1501>
|
2023-05-19 22:26:33 +02:00
|
|
|
|
DEFAULT_SSL_CIPHERS_STRING = ':'.join(HTTPieHTTPSAdapter.get_default_ciphers_names())
|