Challenges¶
ACME Identifier Validation Challenges.
-
class
acme.challenges.
Challenge
(**kwargs)[source]¶ Bases:
josepy.json_util.TypedJSONObjectWithFields
ACME challenge.
-
class
acme.challenges.
ChallengeResponse
(**kwargs)[source]¶ Bases:
acme.mixins.ResourceMixin
,acme.mixins.TypeMixin
,josepy.json_util.TypedJSONObjectWithFields
ACME challenge response.
-
class
acme.challenges.
UnrecognizedChallenge
(jobj)[source]¶ Bases:
acme.challenges.Challenge
Unrecognized challenge.
ACME specification defines a generic framework for challenges and defines some standard challenges that are implemented in this module. However, other implementations (including peers) might define additional challenge types, which should be ignored if unrecognized.
Variables: jobj – Original JSON decoded object.
-
class
acme.challenges.
KeyAuthorizationChallengeResponse
(**kwargs)[source]¶ Bases:
acme.challenges.ChallengeResponse
Response to Challenges based on Key Authorization.
Parameters: key_authorization (unicode) –
-
class
acme.challenges.
KeyAuthorizationChallenge
(**kwargs)[source]¶ Bases:
acme.challenges._TokenChallenge
Challenge based on Key Authorization.
Parameters: - response_cls – Subclass of
KeyAuthorizationChallengeResponse
that will be used to generateresponse
. - typ (str) – type of the challenge
Generate Key Authorization.
Parameters: account_key (JWK) – Rtype unicode:
-
response
(account_key)[source]¶ Generate response to the challenge.
Parameters: account_key (JWK) – Returns: Response (initialized response_cls
) to the challenge.Return type: KeyAuthorizationChallengeResponse
-
validation
(account_key, **kwargs)[source]¶ Generate validation for the challenge.
Subclasses must implement this method, but they are likely to return completely different data structures, depending on what’s necessary to complete the challenge. Interpretation of that return value must be known to the caller.
Parameters: account_key (JWK) – Returns: Challenge-specific validation.
-
response_and_validation
(account_key, *args, **kwargs)[source]¶ Generate response and validation.
Convenience function that return results of
response
andvalidation
.Parameters: account_key (JWK) – Return type: tuple
- response_cls – Subclass of
-
class
acme.challenges.
DNS01Response
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallengeResponse
ACME dns-01 challenge response.
-
simple_verify
(chall, domain, account_public_key)[source]¶ Simple verify.
This method no longer checks DNS records and is a simple wrapper around
KeyAuthorizationChallengeResponse.verify
.Parameters: - chall (challenges.DNS01) – Corresponding challenge.
- domain (unicode) – Domain name being verified.
- account_public_key (JWK) – Public key for the key pair being authorized.
Returns: True
iff verification of the key authorization was successful.Return type: bool
-
-
class
acme.challenges.
DNS01
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallenge
ACME dns-01 challenge.
-
response_cls
¶ alias of
DNS01Response
-
LABEL
= '_acme-challenge'¶ Label clients prepend to the domain name being validated.
-
-
class
acme.challenges.
HTTP01Response
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallengeResponse
ACME http-01 challenge response.
-
PORT
= 80¶ Verification port as defined by the protocol.
You can override it (e.g. for testing) by passing
port
tosimple_verify
.
-
WHITESPACE_CUTSET
= '\n\r\t '¶ Whitespace characters which should be ignored at the end of the body.
-
simple_verify
(chall, domain, account_public_key, port=None)[source]¶ Simple verify.
Parameters: - chall (challenges.SimpleHTTP) – Corresponding challenge.
- domain (unicode) – Domain name being verified.
- account_public_key (JWK) – Public key for the key pair being authorized.
- port (int) – Port used in the validation.
Returns: True
iff validation with the files currently served by the HTTP server is successful.Return type: bool
-
-
class
acme.challenges.
HTTP01
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallenge
ACME http-01 challenge.
-
response_cls
¶ alias of
HTTP01Response
-
URI_ROOT_PATH
= '.well-known/acme-challenge'¶ URI root path for the server provisioned resource.
-
path
¶ Path (starting with ‘/’) for provisioned resource.
Return type: string
-
-
class
acme.challenges.
TLSALPN01Response
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallengeResponse
ACME tls-alpn-01 challenge response.
-
PORT
= 443¶ Verification port as defined by the protocol.
You can override it (e.g. for testing) by passing
port
tosimple_verify
.
-
h
¶ Hash value stored in challenge certificate
-
gen_cert
(domain, key=None, bits=2048)[source]¶ Generate tls-alpn-01 certificate.
Parameters: - domain (unicode) – Domain verified by the challenge.
- key (OpenSSL.crypto.PKey) – Optional private key used in
certificate generation. If not provided (
None
), then fresh key will be generated. - bits (int) – Number of bits for newly generated key.
Return type: tuple
ofOpenSSL.crypto.X509
andOpenSSL.crypto.PKey
-
probe_cert
(domain, host=None, port=None)[source]¶ Probe tls-alpn-01 challenge certificate.
Parameters: - domain (unicode) – domain being validated, required.
- host (string) – IP address used to probe the certificate.
- port (int) – Port used to probe the certificate.
-
verify_cert
(domain, cert)[source]¶ Verify tls-alpn-01 challenge certificate.
Parameters: - domain (unicode) – Domain name being validated.
- cert (OpensSSL.crypto.X509) – Challenge certificate.
Returns: Whether the certificate was successfully verified.
Return type: bool
-
simple_verify
(chall, domain, account_public_key, cert=None, host=None, port=None)[source]¶ Simple verify.
Verify
validation
usingaccount_public_key
, optionally probe tls-alpn-01 certificate and check usingverify_cert
.Parameters: - chall (challenges.TLSALPN01) – Corresponding challenge.
- domain (str) – Domain name being validated.
- account_public_key (JWK) –
- cert (OpenSSL.crypto.X509) – Optional certificate. If not
provided (
None
) certificate will be retrieved usingprobe_cert
. - host (string) – IP address used to probe the certificate.
- port (int) – Port used to probe the certificate.
Returns: True
if and only if client’s control of the domain has been verified.Return type: bool
-
-
class
acme.challenges.
TLSALPN01
(**kwargs)[source]¶ Bases:
acme.challenges.KeyAuthorizationChallenge
ACME tls-alpn-01 challenge.
-
response_cls
¶ alias of
TLSALPN01Response
-
validation
(account_key, **kwargs)[source]¶ Generate validation.
Parameters: - account_key (JWK) –
- domain (unicode) – Domain verified by the challenge.
- cert_key (OpenSSL.crypto.PKey) – Optional private key used
in certificate generation. If not provided (
None
), then fresh key will be generated.
Return type: tuple
ofOpenSSL.crypto.X509
andOpenSSL.crypto.PKey
-
static
is_supported
()[source]¶ Check if TLS-ALPN-01 challenge is supported on this machine. This implies that a recent version of OpenSSL is installed (>= 1.0.2), or a recent cryptography version shipped with the OpenSSL library is installed.
Returns: True
if TLS-ALPN-01 is supported on this machine,False
otherwise.Return type: bool
-
-
class
acme.challenges.
DNS
(**kwargs)[source]¶ Bases:
acme.challenges._TokenChallenge
ACME “dns” challenge.
-
LABEL
= '_acme-challenge'¶ Label clients prepend to the domain name being validated.
-
gen_validation
(account_key, alg=RS256, **kwargs)[source]¶ Generate validation.
Parameters: - account_key (JWK) – Private account key.
- alg (JWA) –
Returns: This challenge wrapped in
JWS
Return type: JWS
-
check_validation
(validation, account_public_key)[source]¶ Check validation.
Parameters: - validation (JWS) –
- account_public_key (JWK) –
Return type: bool
-
-
class
acme.challenges.
DNSResponse
(**kwargs)[source]¶ Bases:
acme.challenges.ChallengeResponse
ACME “dns” challenge response.
Parameters: validation (JWS) – -
check_validation
(chall, account_public_key)[source]¶ Check validation.
Parameters: - chall (challenges.DNS) –
- account_public_key (JWK) –
Return type: bool
-