3 Pf%w1@sdZddlmZddlZddlZddlZddlZddlZddl Z ddl Z ddl Z ddl Z ddl mZddlmZmZmZddlmZmZmZmZydd l mZWn$ek rdZdd lmZYnXy ed Wnek red YnXd dgZdZejZ ej!j"Z#e j$Z%e j&Z'dZ(ej)ej*ej+ej,ej-ej.ej/ej0ej1ej2ej3ej4ej5ej6ej7ej8ej9ej:ej;ejej?ej@ejAejBejCejDejEejFejGejHejIg!ZJe jKejLejMfiZNeOe drejPejPfeNe jQ<eOe drejRejRfeNe jS<eOe drejLejLfeNe jT<eOe dr0ejUejUfeNe jV<eOe drNejMejMfeNe jW<eOe drjeNe jKeNe jX<dd ZYddZZddZ[ddZ\ej]e[Z^ej_e\Z`GdddeaZberd&dd Zcn d'd"d Zceceb_cGd#d$d$eaZddS)(aU SecureTranport support for urllib3 via ctypes. This makes platform-native TLS available to urllib3 users on macOS without the use of a compiler. This is an important feature because the Python Package Index is moving to become a TLSv1.2-or-higher server, and the default OpenSSL that ships with macOS is not capable of doing TLSv1.2. The only way to resolve this is to give macOS users an alternative solution to the problem, and that solution is to use SecureTransport. We use ctypes here because this solution must not require a compiler. That's because pip is not allowed to require a compiler either. This is not intended to be a seriously long-term solution to this problem. The hope is that PEP 543 will eventually solve this issue for us, at which point we can retire this contrib module. But in the short term, we need to solve the impending tire fire that is Python on Mac without this kind of contrib module. So...here we are. To use this module, simply import and inject it:: import urllib3.contrib.securetransport urllib3.contrib.securetransport.inject_into_urllib3() Happy TLSing! )absolute_importN)util)Security SecurityConstCoreFoundation)_assert_no_error_cert_array_from_pem_temporary_keychain_load_client_cert_chain) _fileobject)backport_makefilez5SecureTransport only works on Pythons with memoryviewinject_into_urllib3extract_from_urllib3Ti@PROTOCOL_SSLv2PROTOCOL_SSLv3PROTOCOL_TLSv1PROTOCOL_TLSv1_1PROTOCOL_TLSv1_2 PROTOCOL_TLScCs(ttj_tt_ttj_dt_dtj_dS)zG Monkey-patch urllib3 with SecureTransport-backed SSL-support. TN)SecureTransportContextrssl_ SSLContextHAS_SNIIS_SECURETRANSPORTrr%/usr/lib/python3.6/securetransport.pyrs cCs(ttj_tt_ttj_dt_dtj_dS)z> Undo monkey-patching by :func:`inject_into_urllib3`. FN)orig_util_SSLContextrrrorig_util_HAS_SNIrrrrrrrs cCsld}y,tj|}|dkr tjS|j}|d}|j}d}d}tj|j|} t | } ylxf||kr|dksr|dkrt j |g|} | stj t jd|j| ||} || 7}| sZ|stjSPqZWWnTtj k r} z4| j }|dk o|t jkr|t jkrtjSWYdd} ~ XnX||d<||kr0tjSdStk rf} z|dk rV| |_tjSd} ~ XnXdS)zs SecureTransport read callback. This is called by ST to request that data be returned from the socket. Nrz timed out)_connection_refsgetrerrSSLInternalsocket gettimeoutctypesc_charZ from_address memoryviewrZ wait_for_readerrorerrnoEAGAIN recv_intoerrSSLClosedGraceful ECONNRESETerrSSLClosedAborterrSSLWouldBlock Exception _exception) connection_id data_bufferdata_length_pointerwrapped_socket base_socketZrequested_lengthtimeoutr)Z read_countbufferZ buffer_viewZ readablesZ chunk_sizeerrr_read_callbacksN      r;c CsNd}ytj|}|dkr tjS|j}|d}tj||}|j}d}d} y`xZ| |kr|dksf|dkrtj |g|} | stj t j d|j |} | | 7} || d}qNWWnNtj k r} z0| j }|dk r|t j kr|t jkrtjSWYdd} ~ XnX| |d<| |krtjSdStk rH} z|dk r8| |_tjSd} ~ XnXdS)zx SecureTransport write callback. This is called by ST to request that data actually be sent on the network. Nrz timed out)r!r"rr#r$r& string_atr%rZwait_for_writer)r*r+sendr.r/r0r1r2) r3r4r5r6r7Zbytes_to_writedatar8r)sentZ writablesZ chunk_sentr:rrr_write_callbacksD       r@c@seZdZdZddZejddZddZdd Z d d Z d d Z ddZ ddZ d(ddZddZddZddZddZddZdd Zd)d"d#Zd$d%Zd&d'ZdS)* WrappedSocketz API-compatibility wrapper for Python's OpenSSL wrapped socket object. Note: _makefile_refs, _drop(), and _reuse() are needed for the garbage collector of PyPy. cCsL||_d|_d|_d|_d|_d|_d|_d|_|jj|_ |jj ddS)NrF) r$context_makefile_refs_closedr2 _keychain _keychain_dir_client_cert_chainr%_timeout settimeout)selfr$rrr__init__.s zWrappedSocket.__init__ccs4d|_dV|jdk r0|jd}|_|j|dS)a] A context manager that can be used to wrap calls that do I/O from SecureTransport. If any of the I/O callbacks hit an exception, this context manager will correctly propagate the exception after the fact. This avoids silently swallowing those exceptions. It also correctly forces the socket closed. N)r2close)rJZ exceptionrrr_raise_on_error@s  zWrappedSocket._raise_on_errorcCs2tjttt}tj|j|tt}t|dS)a4 Sets up the allowed ciphers. By default this matches the set in util.ssl_.DEFAULT_CIPHERS, at least as supported by macOS. This is done custom and doesn't allow changing at this time, mostly because parsing OpenSSL cipher strings is going to be a freaking nightmare. N)rZSSLCipherSuitelen CIPHER_SUITESZSSLSetEnabledCiphersrBr )rJciphersresultrrr _set_ciphersUszWrappedSocket._set_ciphersc Cs|sdStjj|r2t|d}|j}WdQRXd}tj}zt|}tj|j t j |}t ||srt jdtj||}t |tj|d}t |tj}tj|t j |}t |Wd|rtj||dkrtj|Xtjtjf}|j|kr t jd|jdS)z Called when we have set custom validation. We do this in two cases: first, when cert validation is entirely disabled; and second, when using a custom trust DB. NrbzFailed to copy trust referenceTz)certificate verify failed, error code: %d)ospathisfileopenreadr SecTrustRefr SSLCopyPeerTrustrBr&byrefr sslZSSLErrorZSecTrustSetAnchorCertificatesZ!SecTrustSetAnchorCertificatesOnlyZSecTrustResultTypeZSecTrustEvaluater CFReleaserZkSecTrustResultUnspecifiedZkSecTrustResultProceedvalue) rJverify trust_bundlefZ cert_arraytrustrQZ trust_resultZ successesrrr_custom_validatebs@         zWrappedSocket._custom_validatec Cstjdtjtj|_tj|jtt} t | t 4t |d} x| t krV| dd} q@W|t | <WdQRXtj |j| } t | |rt|ts|jd}tj|j|t|} t | |jtj|j|} t | tj|j|} t | | s|dk rtj|jtjd} t | |rNt\|_|_t|j|||_tj|j|j} t | xf|jRtj|j} | tj kr~t!j"dn(| tj#kr|j$||wPn t | PWdQRXqPWdS)z Actually performs the TLS handshake. This is run automatically by wrapped socket, and shouldn't be needed in user code. Nirzutf-8Tzhandshake timed out)%rZSSLCreateContextrZkSSLClientSideZkSSLStreamTyperBZ SSLSetIOFuncs_read_callback_pointer_write_callback_pointerr _connection_ref_lockidr!ZSSLSetConnection isinstancebytesencodeZSSLSetPeerDomainNamerNrRZSSLSetProtocolVersionMinZSSLSetProtocolVersionMaxZSSLSetSessionOptionZ"kSSLSessionOptionBreakOnServerAuthr rErFr rGZSSLSetCertificaterMZ SSLHandshaker0r$r8ZerrSSLServerAuthCompletedrc) rJserver_hostnamer_r`Z min_versionZ max_versionZ client_certZ client_keyZclient_key_passphraserQZhandlerrr handshakes\            zWrappedSocket.handshakecCs |jjS)N)r$fileno)rJrrrrmszWrappedSocket.filenocCs*|jdkr|jd8_|jr&|jdS)Nrr)rCrDrL)rJrrr_decref_socketioss zWrappedSocket._decref_socketioscCs&tj|}|j||}|d|}|S)N)r&Zcreate_string_bufferr,)rJZbufsizr9Z bytes_readr>rrrrecvs   zWrappedSocket.recvNc Cs|jr dS|dkrt|}tj|j|}tjd}|jtj|j ||tj |}WdQRX|t j kr|j dkrtjdn"|t jt jfkr|jnt||j S)Nrzrecv timed out)rDrNr&r'Z from_bufferc_size_trMrZSSLReadrBr[rr0r^r$r8r-ZerrSSLClosedNoNotifyrLr )rJr9nbytesprocessed_bytesrQrrrr, s       zWrappedSocket.recv_intocCs ||_dS)N)rH)rJr8rrrrI2szWrappedSocket.settimeoutcCs|jS)N)rH)rJrrrr%5szWrappedSocket.gettimeoutc Cshtjd}|j"tj|j|t|tj|}WdQRX|tj krZ|j dkrZt j dnt ||j S)Nrzsend timed out)r&rprMrZSSLWriterBrNr[rr0r^r$r8r )rJr>rrrQrrrr=8s  " zWrappedSocket.sendcCs8d}x.|t|kr2|j|||t}||7}qWdS)Nr)rNr=SSL_WRITE_BLOCKSIZE)rJr>Z total_sentr?rrrsendallIszWrappedSocket.sendallc Cs$|jtj|jWdQRXdS)N)rMrZSSLCloserB)rJrrrshutdownOs zWrappedSocket.shutdowncCs|jdkrd|_|jr(tj|jd|_|jr@tj|jd|_|jrvtj|jtj|jt j |j d|_|_ |j j S|jd8_dS)NrT)rCrDrBrr]rGrErZSecKeychainDeleteshutilZrmtreerFr$rL)rJrrrrLSs        zWrappedSocket.closeFc Cs|s tdtj}d}d}zptj|jtj|}t||sBdStj|}|sTdStj |d}tj |}t j |}t j |} tj| |}Wd|rt j||rt j|X|S)Nz2SecureTransport only supports dumping binary certsr) ValueErrorrrYrZrBr&r[r ZSecTrustGetCertificateCountZSecTrustGetCertificateAtIndexZSecCertificateCopyDatarZCFDataGetLengthZCFDataGetBytePtrr<r]) rJZ binary_formrbZcertdataZ der_bytesrQZ cert_countZleafZ data_lengthr4rrr getpeercertfs2       zWrappedSocket.getpeercertcCs|jd7_dS)Nr)rC)rJrrr_reuseszWrappedSocket._reusecCs&|jdkr|jn|jd8_dS)Nr)rCrL)rJrrr_drops  zWrappedSocket._drop)N)F)__name__ __module__ __qualname____doc__rK contextlibcontextmanagerrMrRrcrlrmrnror,rIr%r=rtrurLrxryrzrrrrrA's& >Z ( >rAcCs|jd7_t|||ddS)NrT)rL)rCr )rJmodebufsizerrrmakefilesrrcOsd}t|||f||S)Nr)r)rJr bufferingargskwargsrrrrsc@seZdZdZddZeddZejddZeddZejd dZed d Z e jd d Z d dZ ddZ ddZ dddZ dddZdddZdS)rz I am a wrapper class for the SecureTransport library, to translate the interface of the standard library ``SSLContext`` object to calls into SecureTransport. cCs8t|\|_|_d|_d|_d|_d|_d|_d|_dS)NrF) _protocol_to_min_max _min_version _max_version_options_verify _trust_bundle _client_cert _client_key_client_key_passphrase)rJZprotocolrrrrKszSecureTransportContext.__init__cCsdS)z SecureTransport cannot have its hostname checking disabled. For more, see the comment on getpeercert() in this file. Tr)rJrrrcheck_hostnamesz%SecureTransportContext.check_hostnamecCsdS)z SecureTransport cannot have its hostname checking disabled. For more, see the comment on getpeercert() in this file. Nr)rJr^rrrrscCs|jS)N)r)rJrrroptionsszSecureTransportContext.optionscCs ||_dS)N)r)rJr^rrrrscCs|jr tjStjS)N)rr\ CERT_REQUIREDZ CERT_NONE)rJrrr verify_modesz"SecureTransportContext.verify_modecCs|tjkrdnd|_dS)NTF)r\rr)rJr^rrrrscCsdS)Nr)rJrrrset_default_verify_pathss z/SecureTransportContext.set_default_verify_pathscCs|jS)N)r)rJrrrload_default_certssz)SecureTransportContext.load_default_certscCs|tjjkrtddS)Nz5SecureTransport doesn't support custom cipher strings)rrZDEFAULT_CIPHERSrw)rJrPrrr set_cipherss z"SecureTransportContext.set_ciphersNcCs|dk rtd|p||_dS)Nz1SecureTransport does not support cert directories)rwr)rJZcafileZcapathZcadatarrrload_verify_locationssz,SecureTransportContext.load_verify_locationscCs||_||_||_dS)N)rrZ_client_cert_passphrase)rJZcertfileZkeyfileZpasswordrrrload_cert_chainsz&SecureTransportContext.load_cert_chainFTc Cs2t|}|j||j|j|j|j|j|j|j|S)N) rArlrrrrrrr)rJZsockZ server_sideZdo_handshake_on_connectZsuppress_ragged_eofsrkr6rrr wrap_sockets    z"SecureTransportContext.wrap_socket)NNN)NN)FTTN)r{r|r}r~rKpropertyrsetterrrrrrrrrrrrrrs      r)r)rN)er~Z __future__rrr&r*Zos.pathrTrvr$r\Z threadingweakrefrZ_securetransport.bindingsrrrZ_securetransport.low_levelr r r r r ImportErrorZpackages.backports.makefilerr( NameError__all__rr rrrWeakValueDictionaryr!ZLockrfrsZTLS_AES_256_GCM_SHA384ZTLS_CHACHA20_POLY1305_SHA256ZTLS_AES_128_GCM_SHA256Z'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384Z%TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Z'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256Z%TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256Z#TLS_DHE_DSS_WITH_AES_256_GCM_SHA384Z#TLS_DHE_RSA_WITH_AES_256_GCM_SHA384Z#TLS_DHE_DSS_WITH_AES_128_GCM_SHA256Z#TLS_DHE_RSA_WITH_AES_128_GCM_SHA256Z'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384Z%TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384Z$TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHAZ"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAZ#TLS_DHE_RSA_WITH_AES_256_CBC_SHA256Z#TLS_DHE_DSS_WITH_AES_256_CBC_SHA256Z TLS_DHE_RSA_WITH_AES_256_CBC_SHAZ TLS_DHE_DSS_WITH_AES_256_CBC_SHAZ'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256Z%TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256Z$TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHAZ"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHAZ#TLS_DHE_RSA_WITH_AES_128_CBC_SHA256Z#TLS_DHE_DSS_WITH_AES_128_CBC_SHA256Z TLS_DHE_RSA_WITH_AES_128_CBC_SHAZ TLS_DHE_DSS_WITH_AES_128_CBC_SHAZTLS_RSA_WITH_AES_256_GCM_SHA384ZTLS_RSA_WITH_AES_128_GCM_SHA256ZTLS_RSA_WITH_AES_256_CBC_SHA256ZTLS_RSA_WITH_AES_128_CBC_SHA256ZTLS_RSA_WITH_AES_256_CBC_SHAZTLS_RSA_WITH_AES_128_CBC_SHArOZPROTOCOL_SSLv23Z kTLSProtocol1ZkTLSProtocol12rhasattrZ kSSLProtocol2rZ kSSLProtocol3rrZkTLSProtocol11rrrrrr;r@Z SSLReadFuncrdZ SSLWriteFuncreobjectrArrrrrrs           95