1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
# Copyright (C) 2005-2010 Canonical Ltd
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
"""Base implementation of Transport over http.
There are separate implementation modules for each http client implementation.
"""
DEBUG = 0
import os
import ssl
import sys
from ... import (
version_string as breezy_version,
config,
)
def default_user_agent():
return 'Breezy/%s' % breezy_version
# Note for packagers: if there is no package providing certs for your platform,
# the curl project produces http://curl.haxx.se/ca/cacert.pem weekly.
_ssl_ca_certs_known_locations = [
u'/etc/ssl/certs/ca-certificates.crt', # Ubuntu/debian/gentoo
u'/etc/pki/tls/certs/ca-bundle.crt', # Fedora/CentOS/RH
u'/etc/ssl/ca-bundle.pem', # OpenSuse
u'/etc/ssl/cert.pem', # OpenSuse
u"/usr/local/share/certs/ca-root-nss.crt", # FreeBSD
# XXX: Needs checking, can't trust the interweb ;) -- vila 2012-01-25
u'/etc/openssl/certs/ca-certificates.crt', # Solaris
]
def default_ca_certs():
if sys.platform == 'win32':
return os.path.join(os.path.dirname(sys.executable), u"cacert.pem")
elif sys.platform == 'darwin':
# FIXME: Needs some default value for osx, waiting for osx installers
# guys feedback -- vila 2012-01-25
pass
else:
# Try known locations for friendly OSes providing the root certificates
# without making them hard to use for any https client.
for path in _ssl_ca_certs_known_locations:
if os.path.exists(path):
# First found wins
return path
# A default path that makes sense and will be mentioned in the error
# presented to the user, even if not correct for all platforms
return _ssl_ca_certs_known_locations[0]
def ca_certs_from_store(path):
if not os.path.exists(path):
raise ValueError("ca certs path %s does not exist" % path)
return path
def cert_reqs_from_store(unicode_str):
import ssl
try:
return {"required": ssl.CERT_REQUIRED,
"none": ssl.CERT_NONE}[unicode_str]
except KeyError:
raise ValueError("invalid value %s" % unicode_str)
def default_ca_reqs():
if sys.platform in ('win32', 'darwin'):
# FIXME: Once we get a native access to root certificates there, this
# won't needed anymore. See http://pad.lv/920455 -- vila 2012-02-15
return u'none'
else:
return u'required'
opt_ssl_ca_certs = config.Option('ssl.ca_certs',
from_unicode=ca_certs_from_store,
default=default_ca_certs,
invalid='warning',
help="""\
Path to certification authority certificates to trust.
This should be a valid path to a bundle containing all root Certificate
Authorities used to verify an https server certificate.
Use ssl.cert_reqs=none to disable certificate verification.
""")
opt_ssl_cert_reqs = config.Option('ssl.cert_reqs',
default=default_ca_reqs,
from_unicode=cert_reqs_from_store,
invalid='error',
help="""\
Whether to require a certificate from the remote side. (default:required)
Possible values:
* none: Certificates ignored
* required: Certificates required and validated
""")
|