comparison mercurial/sslutil.py @ 43117:8ff1ecfadcd1

cleanup: join string literals that are already on one line Thanks to Kyle for noticing this and for providing the regular expression to run on the codebase. This patch has been reviewed by the test suite and they approved of it. # skip-blame: fallout from mass reformatting Differential Revision: https://phab.mercurial-scm.org/D7028
author Martin von Zweigbergk <martinvonz@google.com>
date Tue, 08 Oct 2019 15:06:18 -0700
parents c59eb1560c44
children 9f70512ae2cf
comparison
equal deleted inserted replaced
43116:defabf63e969 43117:8ff1ecfadcd1
208 ) 208 )
209 for fingerprint in fingerprints: 209 for fingerprint in fingerprints:
210 if not (fingerprint.startswith((b'sha1:', b'sha256:', b'sha512:'))): 210 if not (fingerprint.startswith((b'sha1:', b'sha256:', b'sha512:'))):
211 raise error.Abort( 211 raise error.Abort(
212 _(b'invalid fingerprint for %s: %s') % (bhostname, fingerprint), 212 _(b'invalid fingerprint for %s: %s') % (bhostname, fingerprint),
213 hint=_(b'must begin with "sha1:", "sha256:", ' b'or "sha512:"'), 213 hint=_(b'must begin with "sha1:", "sha256:", or "sha512:"'),
214 ) 214 )
215 215
216 alg, fingerprint = fingerprint.split(b':', 1) 216 alg, fingerprint = fingerprint.split(b':', 1)
217 fingerprint = fingerprint.replace(b':', b'').lower() 217 fingerprint = fingerprint.replace(b':', b'').lower()
218 s[b'certfingerprints'].append((alg, fingerprint)) 218 s[b'certfingerprints'].append((alg, fingerprint))
326 # However, SSLContext.options doesn't work unless we have the 326 # However, SSLContext.options doesn't work unless we have the
327 # full/real SSLContext available to us. 327 # full/real SSLContext available to us.
328 if supportedprotocols == {b'tls1.0'}: 328 if supportedprotocols == {b'tls1.0'}:
329 if protocol != b'tls1.0': 329 if protocol != b'tls1.0':
330 raise error.Abort( 330 raise error.Abort(
331 _(b'current Python does not support protocol ' b'setting %s') 331 _(b'current Python does not support protocol setting %s')
332 % protocol, 332 % protocol,
333 hint=_( 333 hint=_(
334 b'upgrade Python or disable setting since ' 334 b'upgrade Python or disable setting since '
335 b'only TLS 1.0 is supported' 335 b'only TLS 1.0 is supported'
336 ), 336 ),
614 # This function is not used much by core Mercurial, so the error messaging 614 # This function is not used much by core Mercurial, so the error messaging
615 # doesn't have to be as detailed as for wrapsocket(). 615 # doesn't have to be as detailed as for wrapsocket().
616 for f in (certfile, keyfile, cafile): 616 for f in (certfile, keyfile, cafile):
617 if f and not os.path.exists(f): 617 if f and not os.path.exists(f):
618 raise error.Abort( 618 raise error.Abort(
619 _(b'referenced certificate file (%s) does not ' b'exist') % f 619 _(b'referenced certificate file (%s) does not exist') % f
620 ) 620 )
621 621
622 protocol, options, _protocolui = protocolsettings(b'tls1.0') 622 protocol, options, _protocolui = protocolsettings(b'tls1.0')
623 623
624 # This config option is intended for use in tests only. It is a giant 624 # This config option is intended for use in tests only. It is a giant
926 except AttributeError: 926 except AttributeError:
927 raise error.Abort(_(b'%s ssl connection error') % host) 927 raise error.Abort(_(b'%s ssl connection error') % host)
928 928
929 if not peercert: 929 if not peercert:
930 raise error.Abort( 930 raise error.Abort(
931 _(b'%s certificate error: ' b'no certificate received') % host 931 _(b'%s certificate error: no certificate received') % host
932 ) 932 )
933 933
934 if settings[b'disablecertverification']: 934 if settings[b'disablecertverification']:
935 # We don't print the certificate fingerprint because it shouldn't 935 # We don't print the certificate fingerprint because it shouldn't
936 # be necessary: if the user requested certificate verification be 936 # be necessary: if the user requested certificate verification be
988 nice = fmtfingerprint(peerfingerprints[b'sha1']) 988 nice = fmtfingerprint(peerfingerprints[b'sha1'])
989 else: 989 else:
990 section = b'hostsecurity' 990 section = b'hostsecurity'
991 nice = b'%s:%s' % (hash, fmtfingerprint(peerfingerprints[hash])) 991 nice = b'%s:%s' % (hash, fmtfingerprint(peerfingerprints[hash]))
992 raise error.Abort( 992 raise error.Abort(
993 _(b'certificate for %s has unexpected ' b'fingerprint %s') 993 _(b'certificate for %s has unexpected fingerprint %s')
994 % (host, nice), 994 % (host, nice),
995 hint=_(b'check %s configuration') % section, 995 hint=_(b'check %s configuration') % section,
996 ) 996 )
997 997
998 # Security is enabled but no CAs are loaded. We can't establish trust 998 # Security is enabled but no CAs are loaded. We can't establish trust