diff mercurial/sslutil.py @ 44957:d61c05450b37

sslutil: properly detect which TLS versions are supported by the ssl module For the record, I contacted the CPython developers to remark that unconditionally defining ssl.PROTOCOL_TLSv1_1 / ssl.PROTOCOL_TLSv1_2 is problematic: https://github.com/python/cpython/commit/6e8cda91d92da72800d891b2fc2073ecbc134d98#r39569316
author Manuel Jacob <me@manueljacob.de>
date Mon, 01 Jun 2020 03:51:54 +0200
parents 941fef7523c7
children 4ca1110991c4
line wrap: on
line diff
--- a/mercurial/sslutil.py	Sun May 31 22:31:49 2020 +0200
+++ b/mercurial/sslutil.py	Mon Jun 01 03:51:54 2020 +0200
@@ -44,19 +44,17 @@
 
 hassni = getattr(ssl, 'HAS_SNI', False)
 
-# TLS 1.1 and 1.2 may not be supported if the OpenSSL Python is compiled
-# against doesn't support them.
-# FIXME: Since CPython commit 6e8cda91d92da72800d891b2fc2073ecbc134d98
-# individual TLS versions can be turned on and off, and the
-# ssl.PROTOCOL_TLSv1_* constants are always defined.
-# This means that, on unusual configurations, the following dict may contain
-# too many entries. A proper fix would be to check ssl.HAS_TLSv* where
-# available (Python 3.7+). Before that, this module should be proofed against
-# all possible combinations.
-supportedprotocols = {b'tls1.0'}
-if util.safehasattr(ssl, b'PROTOCOL_TLSv1_1'):
+# ssl.HAS_TLSv1* are preferred to check support but they were added in Python
+# 3.7. Prior to CPython commit 6e8cda91d92da72800d891b2fc2073ecbc134d98
+# (backported to the 3.7 branch), ssl.PROTOCOL_TLSv1_1 / ssl.PROTOCOL_TLSv1_2
+# were defined only if compiled against a OpenSSL version with TLS 1.1 / 1.2
+# support. At the mentioned commit, they were unconditionally defined.
+supportedprotocols = set()
+if getattr(ssl, 'HAS_TLSv1', util.safehasattr(ssl, 'PROTOCOL_TLSv1')):
+    supportedprotocols.add(b'tls1.0')
+if getattr(ssl, 'HAS_TLSv1_1', util.safehasattr(ssl, 'PROTOCOL_TLSv1_1')):
     supportedprotocols.add(b'tls1.1')
-if util.safehasattr(ssl, b'PROTOCOL_TLSv1_2'):
+if getattr(ssl, 'HAS_TLSv1_2', util.safehasattr(ssl, 'PROTOCOL_TLSv1_2')):
     supportedprotocols.add(b'tls1.2')