queues/venv/lib/python3.11/site-packages/pymongo/ocsp_cache.py
Egor Matveev 6c6a549aff
All checks were successful
Deploy Prod / Build (pull_request) Successful in 9s
Deploy Prod / Push (pull_request) Successful in 12s
Deploy Prod / Deploy prod (pull_request) Successful in 10s
fix
2024-12-28 22:48:16 +03:00

132 lines
4.7 KiB
Python

# Copyright 2020-present MongoDB, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Utilities for caching OCSP responses."""
from __future__ import annotations
from collections import namedtuple
from datetime import datetime as _datetime
from datetime import timezone
from typing import TYPE_CHECKING, Any, Optional
from pymongo.lock import _create_lock
if TYPE_CHECKING:
from cryptography.x509.ocsp import OCSPRequest, OCSPResponse
def _next_update(value: OCSPResponse) -> Optional[_datetime]:
"""Compat helper to return the response's next_update_utc."""
# Added in cryptography 43.0.0.
if hasattr(value, "next_update_utc"):
return value.next_update_utc
return value.next_update
def _this_update(value: OCSPResponse) -> Optional[_datetime]:
"""Compat helper to return the response's this_update_utc."""
# Added in cryptography 43.0.0.
if hasattr(value, "this_update_utc"):
return value.this_update_utc
return value.this_update
class _OCSPCache:
"""A cache for OCSP responses."""
CACHE_KEY_TYPE = namedtuple( # type: ignore
"OcspResponseCacheKey",
["hash_algorithm", "issuer_name_hash", "issuer_key_hash", "serial_number"],
)
def __init__(self) -> None:
self._data: dict[Any, OCSPResponse] = {}
# Hold this lock when accessing _data.
self._lock = _create_lock()
def _get_cache_key(self, ocsp_request: OCSPRequest) -> CACHE_KEY_TYPE:
return self.CACHE_KEY_TYPE(
hash_algorithm=ocsp_request.hash_algorithm.name.lower(),
issuer_name_hash=ocsp_request.issuer_name_hash,
issuer_key_hash=ocsp_request.issuer_key_hash,
serial_number=ocsp_request.serial_number,
)
def __setitem__(self, key: OCSPRequest, value: OCSPResponse) -> None:
"""Add/update a cache entry.
'key' is of type cryptography.x509.ocsp.OCSPRequest
'value' is of type cryptography.x509.ocsp.OCSPResponse
Validity of the OCSP response must be checked by caller.
"""
with self._lock:
cache_key = self._get_cache_key(key)
# As per the OCSP protocol, if the response's nextUpdate field is
# not set, the responder is indicating that newer revocation
# information is available all the time.
next_update = _next_update(value)
if next_update is None:
self._data.pop(cache_key, None)
return
this_update = _this_update(value)
if this_update is None:
return
now = _datetime.now(tz=timezone.utc)
if this_update.tzinfo is None:
# Make naive to match cryptography.
now = now.replace(tzinfo=None)
# Do nothing if the response is invalid.
if not (this_update <= now < next_update):
return
# Cache new response OR update cached response if new response
# has longer validity.
cached_value = self._data.get(cache_key, None)
if cached_value is None:
self._data[cache_key] = value
return
cached_next_update = _next_update(cached_value)
if cached_next_update is not None and cached_next_update < next_update:
self._data[cache_key] = value
def __getitem__(self, item: OCSPRequest) -> OCSPResponse:
"""Get a cache entry if it exists.
'item' is of type cryptography.x509.ocsp.OCSPRequest
Raises KeyError if the item is not in the cache.
"""
with self._lock:
cache_key = self._get_cache_key(item)
value = self._data[cache_key]
# Return cached response if it is still valid.
this_update = _this_update(value)
next_update = _next_update(value)
assert this_update is not None
assert next_update is not None
now = _datetime.now(tz=timezone.utc)
if this_update.tzinfo is None:
# Make naive to match cryptography.
now = now.replace(tzinfo=None)
if this_update <= now < next_update:
return value
self._data.pop(cache_key, None)
raise KeyError(cache_key)