1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124
|
import logging
from typing import Dict, Iterable, List, Union
import aiohttp
from asn1crypto import cms, crl, pem, x509
from ... import errors
from ...util import get_relevant_crl_dps, issuer_serial
from ..api import CRLFetcher
from ..common_utils import crl_job_results_as_completed
from .util import AIOHttpMixin, LazySession
logger = logging.getLogger(__name__)
class AIOHttpCRLFetcher(CRLFetcher, AIOHttpMixin):
def __init__(
self,
session: Union[aiohttp.ClientSession, LazySession],
user_agent=None,
per_request_timeout=10,
):
super().__init__(session, user_agent, per_request_timeout)
self._by_cert: Dict[bytes, List[crl.CertificateList]] = {}
async def fetch(
self,
cert: Union[x509.Certificate, cms.AttributeCertificateV2],
*,
use_deltas=True,
):
iss_serial = issuer_serial(cert)
try:
return self._by_cert[iss_serial]
except KeyError:
pass
results = []
async for fetched_crl in self._fetch(cert, use_deltas=use_deltas):
results.append(fetched_crl)
self._by_cert[iss_serial] = results
return results
async def _fetch(self, cert: x509.Certificate, *, use_deltas):
sources = get_relevant_crl_dps(cert, use_deltas=use_deltas)
if not sources:
return
if isinstance(cert, x509.Certificate):
target = cert.subject.human_friendly
else:
# TODO log audit ID
target = "attribute certificate"
logger.info(f"Retrieving CRLs for {target}...")
def _fetch_jobs():
for distribution_point in sources:
url = distribution_point.url
# Only fetch CRLs over http
# (or https, but that doesn't really happen all that often)
# In particular, don't attempt to grab CRLs over LDAP
if url.startswith('http'):
yield self._single_fetch(url)
# when the issue with .crl_distribution_points is fixed,
# we should handle at_least_one_success and last_e on a per-DP basis
async for result in crl_job_results_as_completed(_fetch_jobs()):
yield result
async def _single_fetch(self, url):
async def task():
return await _grab_crl(
url,
user_agent=self.user_agent,
session=await self.get_session(),
timeout=self.per_request_timeout,
)
return await self._post_fetch_task(url, task)
def fetched_crls(self) -> Iterable[crl.CertificateList]:
return {crl_ for crl_ in self.get_results()}
def fetched_crls_for_cert(self, cert) -> Iterable[crl.CertificateList]:
return self._by_cert[issuer_serial(cert)]
async def _grab_crl(
url, *, user_agent, session: aiohttp.ClientSession, timeout
):
"""
Fetches a CRL and parses it
:param url:
A unicode string of the URL to fetch the CRL from
:param user_agent:
A unicode string of the user agent to use when fetching the URL
:param session:
``aiohttp`` client session to use.
:param timeout:
Timeout in seconds.
:return:
An asn1crypto.crl.CertificateList object
"""
try:
logger.info(f"Requesting CRL from {url}...")
headers = {'Accept': 'application/pkix-crl', 'User-Agent': user_agent}
cl_timeout = aiohttp.ClientTimeout(total=timeout)
async with session.get(
url=url, headers=headers, timeout=cl_timeout, raise_for_status=True
) as response:
data = await response.read()
if pem.detect(data):
_, _, data = pem.unarmor(data)
return crl.CertificateList.load(data)
except (ValueError, aiohttp.ClientError) as e:
raise errors.CRLFetchError(
f"Failure to fetch CRL from URL {url}"
) from e
|