|
import os |
|
|
|
from . import errors |
|
|
|
|
|
class TLSConfig: |
|
""" |
|
TLS configuration. |
|
|
|
Args: |
|
client_cert (tuple of str): Path to client cert, path to client key. |
|
ca_cert (str): Path to CA cert file. |
|
verify (bool or str): This can be a bool or a path to a CA cert |
|
file to verify against. If ``True``, verify using ca_cert; |
|
if ``False`` or not specified, do not verify. |
|
""" |
|
cert = None |
|
ca_cert = None |
|
verify = None |
|
|
|
def __init__(self, client_cert=None, ca_cert=None, verify=None): |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if client_cert: |
|
try: |
|
tls_cert, tls_key = client_cert |
|
except ValueError: |
|
raise errors.TLSParameterError( |
|
'client_cert must be a tuple of' |
|
' (client certificate, key file)' |
|
) from None |
|
|
|
if not (tls_cert and tls_key) or (not os.path.isfile(tls_cert) or |
|
not os.path.isfile(tls_key)): |
|
raise errors.TLSParameterError( |
|
'Path to a certificate and key files must be provided' |
|
' through the client_cert param' |
|
) |
|
self.cert = (tls_cert, tls_key) |
|
|
|
|
|
self.verify = verify |
|
self.ca_cert = ca_cert |
|
if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): |
|
raise errors.TLSParameterError( |
|
'Invalid CA certificate provided for `ca_cert`.' |
|
) |
|
|
|
def configure_client(self, client): |
|
""" |
|
Configure a client with these TLS options. |
|
""" |
|
if self.verify and self.ca_cert: |
|
client.verify = self.ca_cert |
|
else: |
|
client.verify = self.verify |
|
|
|
if self.cert: |
|
client.cert = self.cert |
|
|