| # Test the support for SSL and sockets |
| |
| import sys |
| import unittest |
| from test import support |
| import socket |
| import select |
| import errno |
| import subprocess |
| import time |
| import os |
| import pprint |
| import urllib.parse, urllib.request |
| import shutil |
| import traceback |
| import asyncore |
| |
| from http.server import HTTPServer, SimpleHTTPRequestHandler |
| |
| # Optionally test SSL support, if we have it in the tested platform |
| skip_expected = False |
| try: |
| import ssl |
| except ImportError: |
| skip_expected = True |
| |
| HOST = support.HOST |
| CERTFILE = None |
| SVN_PYTHON_ORG_ROOT_CERT = None |
| |
| def handle_error(prefix): |
| exc_format = ' '.join(traceback.format_exception(*sys.exc_info())) |
| if support.verbose: |
| sys.stdout.write(prefix + exc_format) |
| |
| |
| class BasicTests(unittest.TestCase): |
| |
| def testSSLconnect(self): |
| if not support.is_resource_enabled('network'): |
| return |
| s = ssl.wrap_socket(socket.socket(socket.AF_INET), |
| cert_reqs=ssl.CERT_NONE) |
| s.connect(("svn.python.org", 443)) |
| c = s.getpeercert() |
| if c: |
| raise support.TestFailed("Peer cert %s shouldn't be here!") |
| s.close() |
| |
| # this should fail because we have no verification certs |
| s = ssl.wrap_socket(socket.socket(socket.AF_INET), |
| cert_reqs=ssl.CERT_REQUIRED) |
| try: |
| s.connect(("svn.python.org", 443)) |
| except ssl.SSLError: |
| pass |
| finally: |
| s.close() |
| |
| def testCrucialConstants(self): |
| ssl.PROTOCOL_SSLv2 |
| ssl.PROTOCOL_SSLv23 |
| ssl.PROTOCOL_SSLv3 |
| ssl.PROTOCOL_TLSv1 |
| ssl.CERT_NONE |
| ssl.CERT_OPTIONAL |
| ssl.CERT_REQUIRED |
| |
| def testRAND(self): |
| v = ssl.RAND_status() |
| if support.verbose: |
| sys.stdout.write("\n RAND_status is %d (%s)\n" |
| % (v, (v and "sufficient randomness") or |
| "insufficient randomness")) |
| try: |
| ssl.RAND_egd(1) |
| except TypeError: |
| pass |
| else: |
| print("didn't raise TypeError") |
| ssl.RAND_add("this is a random string", 75.0) |
| |
| def testParseCert(self): |
| # note that this uses an 'unofficial' function in _ssl.c, |
| # provided solely for this test, to exercise the certificate |
| # parsing code |
| p = ssl._ssl._test_decode_cert(CERTFILE, False) |
| if support.verbose: |
| sys.stdout.write("\n" + pprint.pformat(p) + "\n") |
| |
| def testDERtoPEM(self): |
| |
| pem = open(SVN_PYTHON_ORG_ROOT_CERT, 'r').read() |
| d1 = ssl.PEM_cert_to_DER_cert(pem) |
| p2 = ssl.DER_cert_to_PEM_cert(d1) |
| d2 = ssl.PEM_cert_to_DER_cert(p2) |
| if (d1 != d2): |
| raise support.TestFailed("PEM-to-DER or DER-to-PEM translation failed") |
| |
| class NetworkedTests(unittest.TestCase): |
| |
| def testConnect(self): |
| s = ssl.wrap_socket(socket.socket(socket.AF_INET), |
| cert_reqs=ssl.CERT_NONE) |
| s.connect(("svn.python.org", 443)) |
| c = s.getpeercert() |
| if c: |
| raise support.TestFailed("Peer cert %s shouldn't be here!") |
| s.close() |
| |
| # this should fail because we have no verification certs |
| s = ssl.wrap_socket(socket.socket(socket.AF_INET), |
| cert_reqs=ssl.CERT_REQUIRED) |
| try: |
| s.connect(("svn.python.org", 443)) |
| except ssl.SSLError: |
| pass |
| finally: |
| s.close() |
| |
| # this should succeed because we specify the root cert |
| s = ssl.wrap_socket(socket.socket(socket.AF_INET), |
| cert_reqs=ssl.CERT_REQUIRED, |
| ca_certs=SVN_PYTHON_ORG_ROOT_CERT) |
| try: |
| s.connect(("svn.python.org", 443)) |
| except ssl.SSLError as x: |
| raise support.TestFailed("Unexpected exception %s" % x) |
| finally: |
| s.close() |
| |
| def testNonBlockingHandshake(self): |
| s = socket.socket(socket.AF_INET) |
| s.connect(("svn.python.org", 443)) |
| s.setblocking(False) |
| s = ssl.wrap_socket(s, |
| cert_reqs=ssl.CERT_NONE, |
| do_handshake_on_connect=False) |
| count = 0 |
| while True: |
| try: |
| count += 1 |
| s.do_handshake() |
| break |
| except ssl.SSLError as err: |
| if err.args[0] == ssl.SSL_ERROR_WANT_READ: |
| select.select([s], [], []) |
| elif err.args[0] == ssl.SSL_ERROR_WANT_WRITE: |
| select.select([], [s], []) |
| else: |
| raise |
| s.close() |
| if support.verbose: |
| sys.stdout.write("\nNeeded %d calls to do_handshake() to establish session.\n" % count) |
| |
| def testFetchServerCert(self): |
| |
| pem = ssl.get_server_certificate(("svn.python.org", 443)) |
| if not pem: |
| raise support.TestFailed("No server certificate on svn.python.org:443!") |
| |
| return |
| |
| try: |
| pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE) |
| except ssl.SSLError as x: |
| #should fail |
| if support.verbose: |
| sys.stdout.write("%s\n" % x) |
| else: |
| raise support.TestFailed("Got server certificate %s for svn.python.org!" % pem) |
| |
| pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT) |
| if not pem: |
| raise support.TestFailed("No server certificate on svn.python.org:443!") |
| if support.verbose: |
| sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem) |
| |
| |
| try: |
| import threading |
| except ImportError: |
| _have_threads = False |
| else: |
| |
| _have_threads = True |
| |
| class ThreadedEchoServer(threading.Thread): |
| |
| class ConnectionHandler(threading.Thread): |
| |
| """A mildly complicated class, because we want it to work both |
| with and without the SSL wrapper around the socket connection, so |
| that we can test the STARTTLS functionality.""" |
| |
| def __init__(self, server, connsock, addr): |
| self.server = server |
| self.running = False |
| self.sock = connsock |
| self.addr = addr |
| self.sock.setblocking(1) |
| self.sslconn = None |
| threading.Thread.__init__(self) |
| self.set_daemon(True) |
| |
| def wrap_conn (self): |
| try: |
| self.sslconn = ssl.wrap_socket(self.sock, server_side=True, |
| certfile=self.server.certificate, |
| ssl_version=self.server.protocol, |
| ca_certs=self.server.cacerts, |
| cert_reqs=self.server.certreqs) |
| except: |
| if self.server.chatty: |
| handle_error("\n server: bad connection attempt from " + repr(self.addr) + ":\n") |
| if not self.server.expect_bad_connects: |
| # here, we want to stop the server, because this shouldn't |
| # happen in the context of our test case |
| self.running = False |
| # normally, we'd just stop here, but for the test |
| # harness, we want to stop the server |
| self.server.stop() |
| self.close() |
| return False |
| |
| else: |
| if self.server.certreqs == ssl.CERT_REQUIRED: |
| cert = self.sslconn.getpeercert() |
| if support.verbose and self.server.chatty: |
| sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n") |
| cert_binary = self.sslconn.getpeercert(True) |
| if support.verbose and self.server.chatty: |
| sys.stdout.write(" cert binary is " + str(len(cert_binary)) + " bytes\n") |
| cipher = self.sslconn.cipher() |
| if support.verbose and self.server.chatty: |
| sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n") |
| return True |
| |
| def read(self): |
| if self.sslconn: |
| return self.sslconn.read() |
| else: |
| return self.sock.recv(1024) |
| |
| def write(self, bytes): |
| if self.sslconn: |
| return self.sslconn.write(bytes) |
| else: |
| return self.sock.send(bytes) |
| |
| def close(self): |
| if self.sslconn: |
| self.sslconn.close() |
| else: |
| self.sock.close() |
| |
| def run (self): |
| self.running = True |
| if not self.server.starttls_server: |
| if not self.wrap_conn(): |
| return |
| while self.running: |
| try: |
| msg = self.read() |
| amsg = (msg and str(msg, 'ASCII', 'strict')) or '' |
| if not msg: |
| # eof, so quit this handler |
| self.running = False |
| self.close() |
| elif amsg.strip() == 'over': |
| if support.verbose and self.server.connectionchatty: |
| sys.stdout.write(" server: client closed connection\n") |
| self.close() |
| return |
| elif (self.server.starttls_server and |
| amsg.strip() == 'STARTTLS'): |
| if support.verbose and self.server.connectionchatty: |
| sys.stdout.write(" server: read STARTTLS from client, sending OK...\n") |
| self.write("OK\n".encode("ASCII", "strict")) |
| if not self.wrap_conn(): |
| return |
| elif (self.server.starttls_server and self.sslconn |
| and amsg.strip() == 'ENDTLS'): |
| if support.verbose and self.server.connectionchatty: |
| sys.stdout.write(" server: read ENDTLS from client, sending OK...\n") |
| self.write("OK\n".encode("ASCII", "strict")) |
| self.sock = self.sslconn.unwrap() |
| self.sslconn = None |
| if support.verbose and self.server.connectionchatty: |
| sys.stdout.write(" server: connection is now unencrypted...\n") |
| else: |
| if (support.verbose and |
| self.server.connectionchatty): |
| ctype = (self.sslconn and "encrypted") or "unencrypted" |
| sys.stdout.write(" server: read %s (%s), sending back %s (%s)...\n" |
| % (repr(msg), ctype, repr(msg.lower()), ctype)) |
| self.write(amsg.lower().encode('ASCII', 'strict')) |
| except socket.error: |
| if self.server.chatty: |
| handle_error("Test server failure:\n") |
| self.close() |
| self.running = False |
| # normally, we'd just stop here, but for the test |
| # harness, we want to stop the server |
| self.server.stop() |
| except: |
| handle_error('') |
| |
| def __init__(self, certificate, ssl_version=None, |
| certreqs=None, cacerts=None, expect_bad_connects=False, |
| chatty=True, connectionchatty=False, starttls_server=False): |
| if ssl_version is None: |
| ssl_version = ssl.PROTOCOL_TLSv1 |
| if certreqs is None: |
| certreqs = ssl.CERT_NONE |
| self.certificate = certificate |
| self.protocol = ssl_version |
| self.certreqs = certreqs |
| self.cacerts = cacerts |
| self.expect_bad_connects = expect_bad_connects |
| self.chatty = chatty |
| self.connectionchatty = connectionchatty |
| self.starttls_server = starttls_server |
| self.sock = socket.socket() |
| self.port = support.bind_port(self.sock) |
| self.flag = None |
| self.active = False |
| threading.Thread.__init__(self) |
| self.set_daemon(False) |
| |
| def start (self, flag=None): |
| self.flag = flag |
| threading.Thread.start(self) |
| |
| def run (self): |
| self.sock.settimeout(0.5) |
| self.sock.listen(5) |
| self.active = True |
| if self.flag: |
| # signal an event |
| self.flag.set() |
| while self.active: |
| try: |
| newconn, connaddr = self.sock.accept() |
| if support.verbose and self.chatty: |
| sys.stdout.write(' server: new connection from ' |
| + repr(connaddr) + '\n') |
| handler = self.ConnectionHandler(self, newconn, connaddr) |
| handler.start() |
| except socket.timeout: |
| pass |
| except KeyboardInterrupt: |
| self.stop() |
| except: |
| if self.chatty: |
| handle_error("Test server failure:\n") |
| self.sock.close() |
| |
| def stop (self): |
| self.active = False |
| |
| class OurHTTPSServer(threading.Thread): |
| |
| # This one's based on HTTPServer, which is based on SocketServer |
| |
| class HTTPSServer(HTTPServer): |
| |
| def __init__(self, server_address, RequestHandlerClass, certfile): |
| |
| HTTPServer.__init__(self, server_address, RequestHandlerClass) |
| # we assume the certfile contains both private key and certificate |
| self.certfile = certfile |
| self.active = False |
| self.active_lock = threading.Lock() |
| self.allow_reuse_address = True |
| |
| def __str__(self): |
| return ('<%s %s:%s>' % |
| (self.__class__.__name__, |
| self.server_name, |
| self.server_port)) |
| |
| def get_request (self): |
| # override this to wrap socket with SSL |
| sock, addr = self.socket.accept() |
| sslconn = ssl.wrap_socket(sock, server_side=True, |
| certfile=self.certfile) |
| return sslconn, addr |
| |
| # The methods overridden below this are mainly so that we |
| # can run it in a thread and be able to stop it from another |
| # You probably wouldn't need them in other uses. |
| |
| def server_activate(self): |
| # We want to run this in a thread for testing purposes, |
| # so we override this to set timeout, so that we get |
| # a chance to stop the server |
| self.socket.settimeout(0.5) |
| HTTPServer.server_activate(self) |
| |
| def serve_forever(self): |
| # We want this to run in a thread, so we use a slightly |
| # modified version of "forever". |
| self.active = True |
| while 1: |
| try: |
| # We need to lock while handling the request. |
| # Another thread can close the socket after self.active |
| # has been checked and before the request is handled. |
| # This causes an exception when using the closed socket. |
| with self.active_lock: |
| if not self.active: |
| break |
| self.handle_request() |
| except socket.timeout: |
| pass |
| except KeyboardInterrupt: |
| self.server_close() |
| return |
| except: |
| sys.stdout.write(''.join(traceback.format_exception(*sys.exc_info()))) |
| break |
| time.sleep(0.1) |
| |
| def server_close(self): |
| # Again, we want this to run in a thread, so we need to override |
| # close to clear the "active" flag, so that serve_forever() will |
| # terminate. |
| with self.active_lock: |
| HTTPServer.server_close(self) |
| self.active = False |
| |
| class RootedHTTPRequestHandler(SimpleHTTPRequestHandler): |
| |
| # need to override translate_path to get a known root, |
| # instead of using os.curdir, since the test could be |
| # run from anywhere |
| |
| server_version = "TestHTTPS/1.0" |
| |
| root = None |
| |
| def translate_path(self, path): |
| """Translate a /-separated PATH to the local filename syntax. |
| |
| Components that mean special things to the local file system |
| (e.g. drive or directory names) are ignored. (XXX They should |
| probably be diagnosed.) |
| |
| """ |
| # abandon query parameters |
| path = urllib.parse.urlparse(path)[2] |
| path = os.path.normpath(urllib.parse.unquote(path)) |
| words = path.split('/') |
| words = filter(None, words) |
| path = self.root |
| for word in words: |
| drive, word = os.path.splitdrive(word) |
| head, word = os.path.split(word) |
| if word in self.root: continue |
| path = os.path.join(path, word) |
| return path |
| |
| def log_message(self, format, *args): |
| |
| # we override this to suppress logging unless "verbose" |
| |
| if support.verbose: |
| sys.stdout.write(" server (%s:%d %s):\n [%s] %s\n" % |
| (self.server.server_address, |
| self.server.server_port, |
| self.request.cipher(), |
| self.log_date_time_string(), |
| format%args)) |
| |
| |
| def __init__(self, certfile): |
| self.flag = None |
| self.active = False |
| self.RootedHTTPRequestHandler.root = os.path.split(CERTFILE)[0] |
| self.port = support.find_unused_port() |
| self.server = self.HTTPSServer( |
| (HOST, self.port), self.RootedHTTPRequestHandler, certfile) |
| threading.Thread.__init__(self) |
| self.set_daemon(True) |
| |
| def __str__(self): |
| return "<%s %s>" % (self.__class__.__name__, self.server) |
| |
| def start (self, flag=None): |
| self.flag = flag |
| threading.Thread.start(self) |
| |
| def run (self): |
| self.active = True |
| if self.flag: |
| self.flag.set() |
| self.server.serve_forever() |
| self.active = False |
| |
| def stop (self): |
| self.active = False |
| self.server.server_close() |
| |
| |
| class AsyncoreEchoServer(threading.Thread): |
| |
| # this one's based on asyncore.dispatcher |
| |
| class EchoServer (asyncore.dispatcher): |
| |
| class ConnectionHandler (asyncore.dispatcher_with_send): |
| |
| def __init__(self, conn, certfile): |
| self.socket = ssl.wrap_socket(conn, server_side=True, |
| certfile=certfile, |
| do_handshake_on_connect=False) |
| asyncore.dispatcher_with_send.__init__(self, self.socket) |
| # now we have to do the handshake |
| # we'll just do it the easy way, and block the connection |
| # till it's finished. If we were doing it right, we'd |
| # do this in multiple calls to handle_read... |
| self.do_handshake(block=True) |
| |
| def readable(self): |
| if isinstance(self.socket, ssl.SSLSocket): |
| while self.socket.pending() > 0: |
| self.handle_read_event() |
| return True |
| |
| def handle_read(self): |
| data = self.recv(1024) |
| if support.verbose: |
| sys.stdout.write(" server: read %s from client\n" % repr(data)) |
| if not data: |
| self.close() |
| else: |
| self.send(str(data, 'ASCII', 'strict').lower().encode('ASCII', 'strict')) |
| |
| def handle_close(self): |
| self.close() |
| if support.verbose: |
| sys.stdout.write(" server: closed connection %s\n" % self.socket) |
| |
| def handle_error(self): |
| raise |
| |
| def __init__(self, port, certfile): |
| self.port = port |
| self.certfile = certfile |
| asyncore.dispatcher.__init__(self) |
| self.create_socket(socket.AF_INET, socket.SOCK_STREAM) |
| self.bind(('', port)) |
| self.listen(5) |
| |
| def handle_accept(self): |
| sock_obj, addr = self.accept() |
| if support.verbose: |
| sys.stdout.write(" server: new connection from %s:%s\n" %addr) |
| self.ConnectionHandler(sock_obj, self.certfile) |
| |
| def handle_error(self): |
| raise |
| |
| def __init__(self, certfile): |
| self.flag = None |
| self.active = False |
| self.port = support.find_unused_port() |
| self.server = self.EchoServer(self.port, certfile) |
| threading.Thread.__init__(self) |
| self.set_daemon(True) |
| |
| def __str__(self): |
| return "<%s %s>" % (self.__class__.__name__, self.server) |
| |
| def start (self, flag=None): |
| self.flag = flag |
| threading.Thread.start(self) |
| |
| def run (self): |
| self.active = True |
| if self.flag: |
| self.flag.set() |
| while self.active: |
| try: |
| asyncore.loop(1) |
| except: |
| pass |
| |
| def stop (self): |
| self.active = False |
| self.server.close() |
| |
| def badCertTest (certfile): |
| server = ThreadedEchoServer(CERTFILE, |
| certreqs=ssl.CERT_REQUIRED, |
| cacerts=CERTFILE, chatty=False, |
| connectionchatty=False) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| try: |
| try: |
| s = ssl.wrap_socket(socket.socket(), |
| certfile=certfile, |
| ssl_version=ssl.PROTOCOL_TLSv1) |
| s.connect((HOST, server.port)) |
| except ssl.SSLError as x: |
| if support.verbose: |
| sys.stdout.write("\nSSLError is %s\n" % x) |
| except socket.error as x: |
| if support.verbose: |
| sys.stdout.write("\nsocket.error is %s\n" % x) |
| else: |
| raise support.TestFailed( |
| "Use of invalid cert should have failed!") |
| finally: |
| server.stop() |
| server.join() |
| |
| def serverParamsTest (certfile, protocol, certreqs, cacertsfile, |
| client_certfile, client_protocol=None, |
| indata="FOO\n", |
| chatty=False, connectionchatty=False): |
| |
| server = ThreadedEchoServer(certfile, |
| certreqs=certreqs, |
| ssl_version=protocol, |
| cacerts=cacertsfile, |
| chatty=chatty, |
| connectionchatty=False) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| if client_protocol is None: |
| client_protocol = protocol |
| try: |
| s = ssl.wrap_socket(socket.socket(), |
| server_side=False, |
| certfile=client_certfile, |
| ca_certs=cacertsfile, |
| cert_reqs=certreqs, |
| ssl_version=client_protocol) |
| s.connect((HOST, server.port)) |
| except ssl.SSLError as x: |
| raise support.TestFailed("Unexpected SSL error: " + str(x)) |
| except Exception as x: |
| raise support.TestFailed("Unexpected exception: " + str(x)) |
| else: |
| if connectionchatty: |
| if support.verbose: |
| sys.stdout.write( |
| " client: sending %s...\n" % (repr(indata))) |
| s.write(indata.encode('ASCII', 'strict')) |
| outdata = s.read() |
| if connectionchatty: |
| if support.verbose: |
| sys.stdout.write(" client: read %s\n" % repr(outdata)) |
| outdata = str(outdata, 'ASCII', 'strict') |
| if outdata != indata.lower(): |
| raise support.TestFailed( |
| "bad data <<%s>> (%d) received; expected <<%s>> (%d)\n" |
| % (repr(outdata[:min(len(outdata),20)]), len(outdata), |
| repr(indata[:min(len(indata),20)].lower()), len(indata))) |
| s.write("over\n".encode("ASCII", "strict")) |
| if connectionchatty: |
| if support.verbose: |
| sys.stdout.write(" client: closing connection.\n") |
| s.close() |
| finally: |
| server.stop() |
| server.join() |
| |
| def tryProtocolCombo (server_protocol, |
| client_protocol, |
| expectedToWork, |
| certsreqs=None): |
| |
| if certsreqs is None: |
| certsreqs = ssl.CERT_NONE |
| |
| if certsreqs == ssl.CERT_NONE: |
| certtype = "CERT_NONE" |
| elif certsreqs == ssl.CERT_OPTIONAL: |
| certtype = "CERT_OPTIONAL" |
| elif certsreqs == ssl.CERT_REQUIRED: |
| certtype = "CERT_REQUIRED" |
| if support.verbose: |
| formatstr = (expectedToWork and " %s->%s %s\n") or " {%s->%s} %s\n" |
| sys.stdout.write(formatstr % |
| (ssl.get_protocol_name(client_protocol), |
| ssl.get_protocol_name(server_protocol), |
| certtype)) |
| try: |
| serverParamsTest(CERTFILE, server_protocol, certsreqs, |
| CERTFILE, CERTFILE, client_protocol, |
| chatty=False, connectionchatty=False) |
| except support.TestFailed: |
| if expectedToWork: |
| raise |
| else: |
| if not expectedToWork: |
| raise support.TestFailed( |
| "Client protocol %s succeeded with server protocol %s!" |
| % (ssl.get_protocol_name(client_protocol), |
| ssl.get_protocol_name(server_protocol))) |
| |
| |
| class ThreadedTests(unittest.TestCase): |
| |
| def testEcho (self): |
| |
| if support.verbose: |
| sys.stdout.write("\n") |
| serverParamsTest(CERTFILE, ssl.PROTOCOL_TLSv1, ssl.CERT_NONE, |
| CERTFILE, CERTFILE, ssl.PROTOCOL_TLSv1, |
| chatty=True, connectionchatty=True) |
| |
| def testReadCert(self): |
| |
| if support.verbose: |
| sys.stdout.write("\n") |
| s2 = socket.socket() |
| server = ThreadedEchoServer(CERTFILE, |
| certreqs=ssl.CERT_NONE, |
| ssl_version=ssl.PROTOCOL_SSLv23, |
| cacerts=CERTFILE, |
| chatty=False) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| try: |
| try: |
| s = ssl.wrap_socket(socket.socket(), |
| certfile=CERTFILE, |
| ca_certs=CERTFILE, |
| cert_reqs=ssl.CERT_REQUIRED, |
| ssl_version=ssl.PROTOCOL_SSLv23) |
| s.connect((HOST, server.port)) |
| except ssl.SSLError as x: |
| raise support.TestFailed( |
| "Unexpected SSL error: " + str(x)) |
| except Exception as x: |
| raise support.TestFailed( |
| "Unexpected exception: " + str(x)) |
| else: |
| if not s: |
| raise support.TestFailed( |
| "Can't SSL-handshake with test server") |
| cert = s.getpeercert() |
| if not cert: |
| raise support.TestFailed( |
| "Can't get peer certificate.") |
| cipher = s.cipher() |
| if support.verbose: |
| sys.stdout.write(pprint.pformat(cert) + '\n') |
| sys.stdout.write("Connection cipher is " + str(cipher) + '.\n') |
| if 'subject' not in cert: |
| raise support.TestFailed( |
| "No subject field in certificate: %s." % |
| pprint.pformat(cert)) |
| if ((('organizationName', 'Python Software Foundation'),) |
| not in cert['subject']): |
| raise support.TestFailed( |
| "Missing or invalid 'organizationName' field in certificate subject; " |
| "should be 'Python Software Foundation'.") |
| s.close() |
| finally: |
| server.stop() |
| server.join() |
| |
| def testNULLcert(self): |
| badCertTest(os.path.join(os.path.dirname(__file__) or os.curdir, |
| "nullcert.pem")) |
| def testMalformedCert(self): |
| badCertTest(os.path.join(os.path.dirname(__file__) or os.curdir, |
| "badcert.pem")) |
| def testMalformedKey(self): |
| badCertTest(os.path.join(os.path.dirname(__file__) or os.curdir, |
| "badkey.pem")) |
| |
| def testRudeShutdown(self): |
| |
| listener_ready = threading.Event() |
| listener_gone = threading.Event() |
| port = support.find_unused_port() |
| |
| # `listener` runs in a thread. It opens a socket listening on |
| # PORT, and sits in an accept() until the main thread connects. |
| # Then it rudely closes the socket, and sets Event `listener_gone` |
| # to let the main thread know the socket is gone. |
| def listener(): |
| s = socket.socket() |
| s.bind((HOST, port)) |
| s.listen(5) |
| listener_ready.set() |
| s.accept() |
| s = None # reclaim the socket object, which also closes it |
| listener_gone.set() |
| |
| def connector(): |
| listener_ready.wait() |
| s = socket.socket() |
| s.connect((HOST, port)) |
| listener_gone.wait() |
| try: |
| ssl_sock = ssl.wrap_socket(s) |
| except IOError: |
| pass |
| else: |
| raise support.TestFailed( |
| 'connecting to closed SSL socket should have failed') |
| |
| t = threading.Thread(target=listener) |
| t.start() |
| connector() |
| t.join() |
| |
| def testProtocolSSL2(self): |
| if support.verbose: |
| sys.stdout.write("\n") |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv2, True) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv2, True, ssl.CERT_OPTIONAL) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv2, True, ssl.CERT_REQUIRED) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, True) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv3, False) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_TLSv1, False) |
| |
| def testProtocolSSL23(self): |
| if support.verbose: |
| sys.stdout.write("\n") |
| try: |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv2, True) |
| except support.TestFailed as x: |
| # this fails on some older versions of OpenSSL (0.9.7l, for instance) |
| if support.verbose: |
| sys.stdout.write( |
| " SSL2 client to SSL23 server test unexpectedly failed:\n %s\n" |
| % str(x)) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv3, True) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv23, True) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_TLSv1, True) |
| |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv3, True, ssl.CERT_OPTIONAL) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv23, True, ssl.CERT_OPTIONAL) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_TLSv1, True, ssl.CERT_OPTIONAL) |
| |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv3, True, ssl.CERT_REQUIRED) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv23, True, ssl.CERT_REQUIRED) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_TLSv1, True, ssl.CERT_REQUIRED) |
| |
| def testProtocolSSL3(self): |
| if support.verbose: |
| sys.stdout.write("\n") |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv3, True) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv3, True, ssl.CERT_OPTIONAL) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv3, True, ssl.CERT_REQUIRED) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv2, False) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv23, False) |
| tryProtocolCombo(ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_TLSv1, False) |
| |
| def testProtocolTLS1(self): |
| if support.verbose: |
| sys.stdout.write("\n") |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_TLSv1, True) |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_TLSv1, True, ssl.CERT_OPTIONAL) |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_TLSv1, True, ssl.CERT_REQUIRED) |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_SSLv2, False) |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_SSLv3, False) |
| tryProtocolCombo(ssl.PROTOCOL_TLSv1, ssl.PROTOCOL_SSLv23, False) |
| |
| def testSTARTTLS (self): |
| |
| msgs = ("msg 1", "MSG 2", "STARTTLS", "MSG 3", "msg 4", "ENDTLS", "msg 5", "msg 6") |
| |
| server = ThreadedEchoServer(CERTFILE, |
| ssl_version=ssl.PROTOCOL_TLSv1, |
| starttls_server=True, |
| chatty=True, |
| connectionchatty=True) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| wrapped = False |
| try: |
| try: |
| s = socket.socket() |
| s.setblocking(1) |
| s.connect((HOST, server.port)) |
| except Exception as x: |
| raise support.TestFailed("Unexpected exception: " + str(x)) |
| else: |
| if support.verbose: |
| sys.stdout.write("\n") |
| for indata in msgs: |
| msg = indata.encode('ASCII', 'replace') |
| if support.verbose: |
| sys.stdout.write( |
| " client: sending %s...\n" % repr(msg)) |
| if wrapped: |
| conn.write(msg) |
| outdata = conn.read() |
| else: |
| s.send(msg) |
| outdata = s.recv(1024) |
| if (indata == "STARTTLS" and |
| str(outdata, 'ASCII', 'replace').strip().lower().startswith("ok")): |
| if support.verbose: |
| msg = str(outdata, 'ASCII', 'replace') |
| sys.stdout.write( |
| " client: read %s from server, starting TLS...\n" |
| % repr(msg)) |
| conn = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_TLSv1) |
| wrapped = True |
| elif (indata == "ENDTLS" and |
| str(outdata, 'ASCII', 'replace').strip().lower().startswith("ok")): |
| if support.verbose: |
| msg = str(outdata, 'ASCII', 'replace') |
| sys.stdout.write( |
| " client: read %s from server, ending TLS...\n" |
| % repr(msg)) |
| s = conn.unwrap() |
| wrapped = False |
| else: |
| if support.verbose: |
| msg = str(outdata, 'ASCII', 'replace') |
| sys.stdout.write( |
| " client: read %s from server\n" % repr(msg)) |
| if support.verbose: |
| sys.stdout.write(" client: closing connection.\n") |
| if wrapped: |
| conn.write("over\n".encode("ASCII", "strict")) |
| else: |
| s.send("over\n".encode("ASCII", "strict")) |
| if wrapped: |
| conn.close() |
| else: |
| s.close() |
| finally: |
| server.stop() |
| server.join() |
| |
| def testSocketServer(self): |
| |
| server = OurHTTPSServer(CERTFILE) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| try: |
| if support.verbose: |
| sys.stdout.write('\n') |
| d1 = open(CERTFILE, 'rb').read() |
| d2 = '' |
| # now fetch the same data from the HTTPS server |
| url = 'https://%s:%d/%s' % ( |
| HOST, server.port, os.path.split(CERTFILE)[1]) |
| f = urllib.request.urlopen(url) |
| dlen = f.info().get("content-length") |
| if dlen and (int(dlen) > 0): |
| d2 = f.read(int(dlen)) |
| if support.verbose: |
| sys.stdout.write( |
| " client: read %d bytes from remote server '%s'\n" |
| % (len(d2), server)) |
| f.close() |
| except: |
| msg = ''.join(traceback.format_exception(*sys.exc_info())) |
| if support.verbose: |
| sys.stdout.write('\n' + msg) |
| raise support.TestFailed(msg) |
| else: |
| if not (d1 == d2): |
| print("d1 is", len(d1), repr(d1)) |
| print("d2 is", len(d2), repr(d2)) |
| raise support.TestFailed( |
| "Couldn't fetch data from HTTPS server") |
| finally: |
| if support.verbose: |
| sys.stdout.write('stopping server\n') |
| server.stop() |
| if support.verbose: |
| sys.stdout.write('joining thread\n') |
| server.join() |
| |
| def testAsyncoreServer(self): |
| |
| if support.verbose: |
| sys.stdout.write("\n") |
| |
| indata="FOO\n" |
| server = AsyncoreEchoServer(CERTFILE) |
| flag = threading.Event() |
| server.start(flag) |
| # wait for it to start |
| flag.wait() |
| # try to connect |
| try: |
| s = ssl.wrap_socket(socket.socket()) |
| s.connect((HOST, server.port)) |
| except ssl.SSLError as x: |
| raise support.TestFailed("Unexpected SSL error: " + str(x)) |
| except Exception as x: |
| raise support.TestFailed("Unexpected exception: " + str(x)) |
| else: |
| if support.verbose: |
| sys.stdout.write( |
| " client: sending %s...\n" % (repr(indata))) |
| s.sendall(indata.encode('ASCII', 'strict')) |
| outdata = s.recv() |
| if support.verbose: |
| sys.stdout.write(" client: read %s\n" % repr(outdata)) |
| outdata = str(outdata, 'ASCII', 'strict') |
| if outdata != indata.lower(): |
| raise support.TestFailed( |
| "bad data <<%s>> (%d) received; expected <<%s>> (%d)\n" |
| % (repr(outdata[:min(len(outdata),20)]), len(outdata), |
| repr(indata[:min(len(indata),20)].lower()), len(indata))) |
| s.write("over\n".encode("ASCII", "strict")) |
| if support.verbose: |
| sys.stdout.write(" client: closing connection.\n") |
| s.close() |
| finally: |
| server.stop() |
| server.join() |
| |
| def test_main(verbose=False): |
| if skip_expected: |
| raise support.TestSkipped("No SSL support") |
| |
| global CERTFILE, SVN_PYTHON_ORG_ROOT_CERT |
| CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, |
| "keycert.pem") |
| SVN_PYTHON_ORG_ROOT_CERT = os.path.join( |
| os.path.dirname(__file__) or os.curdir, |
| "https_svn_python_org_root.pem") |
| |
| if (not os.path.exists(CERTFILE) or |
| not os.path.exists(SVN_PYTHON_ORG_ROOT_CERT)): |
| raise support.TestFailed("Can't read certificate files!") |
| |
| tests = [BasicTests] |
| |
| if support.is_resource_enabled('network'): |
| tests.append(NetworkedTests) |
| |
| if _have_threads: |
| thread_info = support.threading_setup() |
| if thread_info and support.is_resource_enabled('network'): |
| tests.append(ThreadedTests) |
| |
| support.run_unittest(*tests) |
| |
| if _have_threads: |
| support.threading_cleanup(*thread_info) |
| |
| if __name__ == "__main__": |
| test_main() |