Skip to content

Commit d545edb

Browse files
author
Sean Cribbs
committed
Rename has_credential to _has_credential
Also removed places where we guarded calling check_revoked_cert with has_credential('crl'); the method already handles that internally.
1 parent a124622 commit d545edb

File tree

6 files changed

+8
-11
lines changed

6 files changed

+8
-11
lines changed

docs/advanced.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,7 @@ Security helpers
116116
.. autoclass:: fileobject
117117

118118
.. automethod:: riak.security.SecurityCreds.check_revoked_cert
119+
.. automethod:: riak.security.SecurityCreds._has_credential
119120

120121
^^^^^^^^^^^^^^
121122
HTTP Transport

docs/security.rst

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -222,5 +222,3 @@ SecurityCreds object
222222
.. autoattribute:: pkey
223223
.. autoattribute:: ciphers
224224
.. autoattribute:: ssl_version
225-
226-
.. automethod:: SecurityCreds.has_credential

riak/security.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ def _cached_cert(self, key, loader):
185185
setattr(self, key, cert_list)
186186
return getattr(self, key)
187187

188-
def has_credential(self, key):
188+
def _has_credential(self, key):
189189
"""
190190
``True`` if a credential or filename value has been supplied for the
191191
given property.
@@ -207,7 +207,7 @@ def check_revoked_cert(self, ssl_socket):
207207
:rtype: bool
208208
:raises SecurityError: when the certificate has been revoked
209209
"""
210-
if not self.has_credential('crl'):
210+
if not self._has_credential('crl'):
211211
return True
212212

213213
servcert = ssl_socket.get_peer_certificate()

riak/transports/http/__init__.py

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,7 @@ def connect(self):
102102
break
103103

104104
self.sock = RiakWrappedSocket(cxn, sock)
105-
if self.credentials.has_credential('crl'):
106-
self.credentials.check_revoked_cert(self.sock)
105+
self.credentials.check_revoked_cert(self.sock)
107106

108107

109108
class RiakHttpPool(Pool):

riak/transports/pbc/connection.py

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,8 +126,7 @@ def _ssl_handshake(self):
126126
# ssl handshake successful
127127
self._socket = ssl_socket
128128

129-
if self._client._credentials.has_credential('crl'):
130-
self._client._credentials.check_revoked_cert(ssl_socket)
129+
self._client._credentials.check_revoked_cert(ssl_socket)
131130

132131
return True
133132
except Exception as e:

riak/transports/security.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ def configure_context(ssl_ctx, credentials):
4545
:type credentials: :class:`~riak.security.SecurityCreds`
4646
"""
4747

48-
if credentials.has_credential('pkey'):
48+
if credentials._has_credential('pkey'):
4949
ssl_ctx.use_privatekey(credentials.pkey)
50-
if credentials.has_credential('cert'):
50+
if credentials._has_credential('cert'):
5151
ssl_ctx.use_certificate(credentials.cert)
52-
if credentials.has_credential('cacert'):
52+
if credentials._has_credential('cacert'):
5353
store = ssl_ctx.get_cert_store()
5454
cacerts = credentials.cacert
5555
if not isinstance(cacerts, list):

0 commit comments

Comments
 (0)