Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(3573)

Side by Side Diff: tests/s3/test_https_cert_validation.py

Issue 4425052: Adds optional support for SSL server certificate validation
Patch Set: Created 13 years, 11 months ago
Left:
Right:
Use n/p to move between diff chunks; N/P to move between comments. Please Sign in to add in-line comments.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 # Copyright 2010 Google Inc.
Mike Schwartz 2011/04/19 23:49:13 2011
xtof.g 2011/04/20 16:18:38 Done.
2 #
3 # Permission is hereby granted, free of charge, to any person obtaining a
4 # copy of this software and associated documentation files (the
5 # "Software"), to deal in the Software without restriction, including
6 # without limitation the rights to use, copy, modify, merge, publish, dis-
7 # tribute, sublicense, and/or sell copies of the Software, and to permit
8 # persons to whom the Software is furnished to do so, subject to the fol-
9 # lowing conditions:
10 #
11 # The above copyright notice and this permission notice shall be included
12 # in all copies or substantial portions of the Software.
13 #
14 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15 # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
16 # ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
17 # SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,·
18 # WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
19 # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
20 # IN THE SOFTWARE.
21
22 """
23 Tests to validate correct validation of SSL server certificates.
24
25 Note that this test assumes two external dependencies are available:
26 - A http proxy, which by default is assumed to be at host 'cache' and port
27 3128. This can be overridden with environment variables PROXY_HOST and
28 PROXY_PORT, respectively.
29 - An ssl-enabled web server that will return a valid certificate signed by one
30 of the bundled CAs, and which can be reached by an alternate hostname that
31 does not match the CN in that certificate. By default, this test usees host
Mike Schwartz 2011/04/19 23:49:13 uses
xtof.g 2011/04/20 16:18:38 Done.
32 'www' (without fully qualified domain). This can be overridden with
33 environment variable INVALID_HOSTNAME_HOST. If no suitable host is already
34 available, such a mapping can be established by temporarily adding an IP
35 address for, say. www.google.com or www.amazon.com to /etc/hosts.
Mike Schwartz 2011/04/19 23:49:13 say,
36 """
37
38 import os
39 import ssl
40 import unittest
41
42 import boto
43 from boto import exception, https_connection
44 from boto.gs.connection import GSConnection
45 from boto.s3.connection import S3Connection
46
47 # Other CA certs contains a valid CA certificate of a CA that is used by neither
Mike Schwartz 2011/04/19 23:49:13 Do you mean "other_cacerts.txt" ? If so it would b
xtof.g 2011/04/20 16:18:38 Thanks, fixed.
48 # S3 nor Google Storage. Validation against this CA cert should result in a
49 # certificate error.
50 DEFAULT_CA_CERTS_FILE = os.path.join(
51 os.path.dirname(os.path.abspath(__file__ )), 'other_cacerts.txt')
52
53
54 PROXY_HOST = os.environ.get('PROXY_HOST', 'cache')
55 PROXY_PORT = os.environ.get('PROXY_PORT', '3128')
56
57 # This test assumes that this host returs a certificate signed by one of the
Mike Schwartz 2011/04/19 23:49:13 returns
xtof.g 2011/04/20 16:18:38 Thanks... Sorry -- I should have spell checked...
58 # trusted CAs, but with a Common Name that won't match host name 'www' (i.e.,
59 # the server should return a certificate with CN 'www.<somedomain>.com'.
Mike Schwartz 2011/04/19 23:49:13 missing close paren
xtof.g 2011/04/20 16:18:38 Done.
60 INVALID_HOSTNAME_HOST = os.environ.get('INVALID_HOSTNAME_HOST', 'www')
61
62 class CertValidationTest (unittest.TestCase):
63
64 def setUp(self):
65 # Clear config
66 for section in boto.config.sections():
67 boto.config.remove_section(section)
68
69 # Enable https_validate_certificates (which is not the default yet).
Mike Schwartz 2011/04/19 23:49:13 any reason to include this parenthetical? Even aft
xtof.g 2011/04/20 16:18:38 Good point, removed.
70 boto.config.add_section('Boto')
71 boto.config.setbool('Boto', 'https_validate_certificates', True)
72
73 # Set up bogus credentials so that the auth module is willing to go
74 # ahead and make a request; the request should fail with a service-level
75 # error if it does get to the service (S3 or GS).
76 boto.config.add_section('Credentials')
77 boto.config.set('Credentials', 'gs_access_key_id', 'xyz')
78 boto.config.set('Credentials', 'gs_secret_access_key', 'xyz')
79 boto.config.set('Credentials', 'aws_access_key_id', 'xyz')
80 boto.config.set('Credentials', 'aws_secret_access_key', 'xyz')
81
82 def enableProxy(self):
83 boto.config.set('Boto', 'proxy', PROXY_HOST)
84 boto.config.set('Boto', 'proxy_port', PROXY_PORT)
85
86 def assertConnectionThrows(self, connection_class, error):
87 conn = connection_class()
88 self.assertRaises(error, conn.get_all_buckets)
89
90 def do_test_valid_cert(self):
91 # When connecting to actual servers with bundled root certificates, no
92 # cert errors should be thrown; instead we will get "invalid
93 # credentials" errors since the config used does not contain any
94 # credentials.
95 self.assertConnectionThrows(S3Connection, exception.S3ResponseError)
96 self.assertConnectionThrows(GSConnection, exception.GSResponseError)
97
98 def test_valid_cert(self):
99 self.do_test_valid_cert()
100
101 def test_valid_cert_with_proxy(self):
102 self.enableProxy()
103 self.do_test_valid_cert()
104
105 def do_test_invalid_signature(self):
106 boto.config.set('Boto', 'ca_certificates_file', DEFAULT_CA_CERTS_FILE)
107 self.assertConnectionThrows(S3Connection, ssl.SSLError)
108 self.assertConnectionThrows(GSConnection, ssl.SSLError)
109
110 def test_invalid_signature(self):
111 self.do_test_invalid_signature()
112
113 def test_invalid_signature_with_proxy(self):
114 self.enableProxy()
115 self.do_test_invalid_signature()
116
117 def do_test_invalid_host(self):
118 boto.config.set('Credentials', 'gs_host', INVALID_HOSTNAME_HOST)
119 boto.config.set('Credentials', 's3_host', INVALID_HOSTNAME_HOST)
120 self.assertConnectionThrows(S3Connection, ssl.SSLError)
121 self.assertConnectionThrows(GSConnection, ssl.SSLError)
122
123 def do_test_invalid_host(self):
124 boto.config.set('Credentials', 'gs_host', INVALID_HOSTNAME_HOST)
125 boto.config.set('Credentials', 's3_host', INVALID_HOSTNAME_HOST)
126 self.assertConnectionThrows(
127 S3Connection, https_connection.InvalidCertificateException)
128 self.assertConnectionThrows(
129 GSConnection, https_connection.InvalidCertificateException)
130
131 def test_invalid_host(self):
132 self.do_test_invalid_host()
133
134 def test_invalid_host_with_proxy(self):
135 self.enableProxy()
136 self.do_test_invalid_host()
137
OLDNEW
« boto/https_connection.py ('K') | « tests/s3/other_cacerts.txt ('k') | tests/test.py » ('j') | no next file with comments »

Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b