aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/python/Twisted/py2/twisted/internet/ssl.py
diff options
context:
space:
mode:
authorshmel1k <shmel1k@ydb.tech>2023-11-26 18:16:14 +0300
committershmel1k <shmel1k@ydb.tech>2023-11-26 18:43:30 +0300
commitb8cf9e88f4c5c64d9406af533d8948deb050d695 (patch)
tree218eb61fb3c3b96ec08b4d8cdfef383104a87d63 /contrib/python/Twisted/py2/twisted/internet/ssl.py
parent523f645a83a0ec97a0332dbc3863bb354c92a328 (diff)
downloadydb-b8cf9e88f4c5c64d9406af533d8948deb050d695.tar.gz
add kikimr_configure
Diffstat (limited to 'contrib/python/Twisted/py2/twisted/internet/ssl.py')
-rw-r--r--contrib/python/Twisted/py2/twisted/internet/ssl.py255
1 files changed, 255 insertions, 0 deletions
diff --git a/contrib/python/Twisted/py2/twisted/internet/ssl.py b/contrib/python/Twisted/py2/twisted/internet/ssl.py
new file mode 100644
index 0000000000..591df8cb82
--- /dev/null
+++ b/contrib/python/Twisted/py2/twisted/internet/ssl.py
@@ -0,0 +1,255 @@
+# -*- test-case-name: twisted.test.test_ssl -*-
+# Copyright (c) Twisted Matrix Laboratories.
+# See LICENSE for details.
+
+"""
+This module implements Transport Layer Security (TLS) support for Twisted. It
+requires U{PyOpenSSL <https://pypi.python.org/pypi/pyOpenSSL>}.
+
+If you wish to establish a TLS connection, please use one of the following
+APIs:
+
+ - SSL endpoints for L{servers
+ <twisted.internet.endpoints.SSL4ServerEndpoint>} and L{clients
+ <twisted.internet.endpoints.SSL4ClientEndpoint>}
+
+ - L{startTLS <twisted.internet.interfaces.ITLSTransport.startTLS>}
+
+ - L{connectSSL <twisted.internet.interfaces.IReactorSSL.connectSSL>}
+
+ - L{listenSSL <twisted.internet.interfaces.IReactorSSL.listenSSL>}
+
+These APIs all require a C{contextFactory} argument that specifies their
+security properties, such as certificate, private key, certificate authorities
+to verify the peer, allowed TLS protocol versions, cipher suites, and so on.
+The recommended value for this argument is a L{CertificateOptions} instance;
+see its documentation for an explanation of the available options.
+
+The C{contextFactory} name is a bit of an anachronism now, as context factories
+have been replaced with "connection creators", but these objects serve the same
+role.
+
+Be warned that implementing your own connection creator (i.e.: value for the
+C{contextFactory}) is both difficult and dangerous; the Twisted team has worked
+hard to make L{CertificateOptions}' API comprehensible and unsurprising, and
+the Twisted team is actively maintaining it to ensure that it becomes more
+secure over time.
+
+If you are really absolutely sure that you want to take on the risk of
+implementing your own connection creator based on the pyOpenSSL API, see the
+L{server connection creator
+<twisted.internet.interfaces.IOpenSSLServerConnectionCreator>} and L{client
+connection creator
+<twisted.internet.interfaces.IOpenSSLServerConnectionCreator>} interfaces.
+
+Developers using Twisted, please ignore the L{Port}, L{Connector}, and
+L{Client} classes defined here, as these are details of certain reactors' TLS
+implementations, exposed by accident (and remaining here only for compatibility
+reasons). If you wish to establish a TLS connection, please use one of the
+APIs listed above.
+
+@note: "SSL" (Secure Sockets Layer) is an antiquated synonym for "TLS"
+ (Transport Layer Security). You may see these terms used interchangeably
+ throughout the documentation.
+"""
+
+from __future__ import division, absolute_import
+
+# System imports
+from OpenSSL import SSL
+supported = True
+
+from zope.interface import implementer, implementer_only, implementedBy
+
+# Twisted imports
+from twisted.internet import tcp, interfaces
+from twisted.python._oldstyle import _oldStyle
+
+
+@implementer(interfaces.IOpenSSLContextFactory)
+@_oldStyle
+class ContextFactory:
+ """A factory for SSL context objects, for server SSL connections."""
+
+ isClient = 0
+
+ def getContext(self):
+ """Return a SSL.Context object. override in subclasses."""
+ raise NotImplementedError
+
+
+
+class DefaultOpenSSLContextFactory(ContextFactory):
+ """
+ L{DefaultOpenSSLContextFactory} is a factory for server-side SSL context
+ objects. These objects define certain parameters related to SSL
+ handshakes and the subsequent connection.
+
+ @ivar _contextFactory: A callable which will be used to create new
+ context objects. This is typically L{OpenSSL.SSL.Context}.
+ """
+ _context = None
+
+ def __init__(self, privateKeyFileName, certificateFileName,
+ sslmethod=SSL.SSLv23_METHOD, _contextFactory=SSL.Context):
+ """
+ @param privateKeyFileName: Name of a file containing a private key
+ @param certificateFileName: Name of a file containing a certificate
+ @param sslmethod: The SSL method to use
+ """
+ self.privateKeyFileName = privateKeyFileName
+ self.certificateFileName = certificateFileName
+ self.sslmethod = sslmethod
+ self._contextFactory = _contextFactory
+
+ # Create a context object right now. This is to force validation of
+ # the given parameters so that errors are detected earlier rather
+ # than later.
+ self.cacheContext()
+
+
+ def cacheContext(self):
+ if self._context is None:
+ ctx = self._contextFactory(self.sslmethod)
+ # Disallow SSLv2! It's insecure! SSLv3 has been around since
+ # 1996. It's time to move on.
+ ctx.set_options(SSL.OP_NO_SSLv2)
+ ctx.use_certificate_file(self.certificateFileName)
+ ctx.use_privatekey_file(self.privateKeyFileName)
+ self._context = ctx
+
+
+ def __getstate__(self):
+ d = self.__dict__.copy()
+ del d['_context']
+ return d
+
+
+ def __setstate__(self, state):
+ self.__dict__ = state
+
+
+ def getContext(self):
+ """
+ Return an SSL context.
+ """
+ return self._context
+
+
+
+@implementer(interfaces.IOpenSSLContextFactory)
+@_oldStyle
+class ClientContextFactory:
+ """A context factory for SSL clients."""
+
+ isClient = 1
+
+ # SSLv23_METHOD allows SSLv2, SSLv3, and TLSv1. We disable SSLv2 below,
+ # though.
+ method = SSL.SSLv23_METHOD
+
+ _contextFactory = SSL.Context
+
+ def getContext(self):
+ ctx = self._contextFactory(self.method)
+ # See comment in DefaultOpenSSLContextFactory about SSLv2.
+ ctx.set_options(SSL.OP_NO_SSLv2)
+ return ctx
+
+
+
+@implementer_only(interfaces.ISSLTransport,
+ *[i for i in implementedBy(tcp.Client)
+ if i != interfaces.ITLSTransport])
+class Client(tcp.Client):
+ """
+ I am an SSL client.
+ """
+
+ def __init__(self, host, port, bindAddress, ctxFactory, connector, reactor=None):
+ # tcp.Client.__init__ depends on self.ctxFactory being set
+ self.ctxFactory = ctxFactory
+ tcp.Client.__init__(self, host, port, bindAddress, connector, reactor)
+
+ def _connectDone(self):
+ self.startTLS(self.ctxFactory)
+ self.startWriting()
+ tcp.Client._connectDone(self)
+
+
+
+@implementer(interfaces.ISSLTransport)
+class Server(tcp.Server):
+ """
+ I am an SSL server.
+ """
+
+ def __init__(self, *args, **kwargs):
+ tcp.Server.__init__(self, *args, **kwargs)
+ self.startTLS(self.server.ctxFactory)
+
+
+
+class Port(tcp.Port):
+ """
+ I am an SSL port.
+ """
+ transport = Server
+
+ _type = 'TLS'
+
+ def __init__(self, port, factory, ctxFactory, backlog=50, interface='', reactor=None):
+ tcp.Port.__init__(self, port, factory, backlog, interface, reactor)
+ self.ctxFactory = ctxFactory
+
+
+ def _getLogPrefix(self, factory):
+ """
+ Override the normal prefix to include an annotation indicating this is a
+ port for TLS connections.
+ """
+ return tcp.Port._getLogPrefix(self, factory) + ' (TLS)'
+
+
+
+class Connector(tcp.Connector):
+ def __init__(self, host, port, factory, contextFactory, timeout, bindAddress, reactor=None):
+ self.contextFactory = contextFactory
+ tcp.Connector.__init__(self, host, port, factory, timeout, bindAddress, reactor)
+
+ # Force some parameter checking in pyOpenSSL. It's better to fail now
+ # than after we've set up the transport.
+ contextFactory.getContext()
+
+
+ def _makeTransport(self):
+ return Client(self.host, self.port, self.bindAddress, self.contextFactory, self, self.reactor)
+
+
+
+from twisted.internet._sslverify import (
+ KeyPair, DistinguishedName, DN, Certificate,
+ CertificateRequest, PrivateCertificate,
+ OpenSSLAcceptableCiphers as AcceptableCiphers,
+ OpenSSLCertificateOptions as CertificateOptions,
+ OpenSSLDiffieHellmanParameters as DiffieHellmanParameters,
+ platformTrust, OpenSSLDefaultPaths, VerificationError,
+ optionsForClientTLS, ProtocolNegotiationSupport,
+ protocolNegotiationMechanisms,
+ trustRootFromCertificates,
+ TLSVersion,
+)
+
+__all__ = [
+ "ContextFactory", "DefaultOpenSSLContextFactory", "ClientContextFactory",
+
+ 'DistinguishedName', 'DN',
+ 'Certificate', 'CertificateRequest', 'PrivateCertificate',
+ 'KeyPair',
+ 'AcceptableCiphers', 'CertificateOptions', 'DiffieHellmanParameters',
+ 'platformTrust', 'OpenSSLDefaultPaths', 'TLSVersion',
+
+ 'VerificationError', 'optionsForClientTLS',
+ 'ProtocolNegotiationSupport', 'protocolNegotiationMechanisms',
+ 'trustRootFromCertificates',
+]