Skip to content

Commit a3e3bda

Browse files
downgrade cryptography version
1 parent edf3372 commit a3e3bda

File tree

2 files changed

+21
-30
lines changed

2 files changed

+21
-30
lines changed

requirements.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
aiofiles==24.1.0
22
aiohttp==3.11.13
3-
cryptography==44.0.2
3+
cryptography==44.0.0
44
google-auth==2.38.0
55
requests==2.32.3
66
protobuf==6.30.0

tests/unit/mocks.py

Lines changed: 20 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,7 @@
2323
import struct
2424
from typing import Any, Callable, Literal, Optional
2525

26-
from cryptography.x509 import (
27-
CertificateBuilder as x509_CertificateBuilder,
28-
NameAttribute as x509_NameAttribute,
29-
random_serial_number as x509_random_serial_number,
30-
SubjectAlternativeName as x509_SubjectAlternativeName,
31-
IPAddress as x509_IPAddress,
32-
DNSName as x509_DNSName,
33-
load_pem_x509_certificate as x509_load_pem_x509_certificate,
34-
Name as x509_Name,
35-
)
26+
from cryptography import x509
3627
from cryptography.hazmat.primitives import hashes
3728
from cryptography.hazmat.primitives import serialization
3829
from cryptography.hazmat.primitives.asymmetric import rsa
@@ -98,7 +89,7 @@ def token_state(
9889

9990
def generate_cert(
10091
common_name: str, expires_in: int = 60, server_cert: bool = False
101-
) -> tuple[x509_CertificateBuilder, rsa.RSAPrivateKey]:
92+
) -> tuple[x509.CertificateBuilder, rsa.RSAPrivateKey]:
10293
"""
10394
Generate a private key and cert object to be used in testing.
10495
@@ -108,40 +99,40 @@ def generate_cert(
10899
server_cert (bool): Whether it is a server certificate.
109100
110101
Returns:
111-
tuple[x509_CertificateBuilder, rsa.RSAPrivateKey]
102+
tuple[x509.CertificateBuilder, rsa.RSAPrivateKey]
112103
"""
113104
# generate private key
114105
key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
115106
# calculate expiry time
116107
now = datetime.now(timezone.utc)
117108
expiration = now + timedelta(minutes=expires_in)
118109
# configure cert subject
119-
subject = issuer = x509_Name(
110+
subject = issuer = x509.Name(
120111
[
121-
x509_NameAttribute(NameOID.COUNTRY_NAME, "US"),
122-
x509_NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, "California"),
123-
x509_NameAttribute(NameOID.LOCALITY_NAME, "Mountain View"),
124-
x509_NameAttribute(NameOID.ORGANIZATION_NAME, "Google Inc"),
125-
x509_NameAttribute(NameOID.COMMON_NAME, common_name),
112+
x509.NameAttribute(NameOID.COUNTRY_NAME, "US"),
113+
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, "California"),
114+
x509.NameAttribute(NameOID.LOCALITY_NAME, "Mountain View"),
115+
x509.NameAttribute(NameOID.ORGANIZATION_NAME, "Google Inc"),
116+
x509.NameAttribute(NameOID.COMMON_NAME, common_name),
126117
]
127118
)
128119
# build cert
129120
cert = (
130-
x509_CertificateBuilder()
121+
x509.CertificateBuilder()
131122
.subject_name(subject)
132123
.issuer_name(issuer)
133124
.public_key(key.public_key())
134-
.serial_number(x509_random_serial_number())
125+
.serial_number(x509.random_serial_number())
135126
.not_valid_before(now)
136127
.not_valid_after(expiration)
137128
)
138129
if server_cert:
139130
cert = cert.add_extension(
140-
x509_SubjectAlternativeName(
131+
x509.SubjectAlternativeName(
141132
general_names=[
142-
x509_IPAddress(ipaddress.ip_address("127.0.0.1")),
143-
x509_IPAddress(ipaddress.ip_address("10.0.0.1")),
144-
x509_DNSName("x.y.alloydb.goog."),
133+
x509.IPAddress(ipaddress.ip_address("127.0.0.1")),
134+
x509.IPAddress(ipaddress.ip_address("10.0.0.1")),
135+
x509.DNSName("x.y.alloydb.goog."),
145136
]
146137
),
147138
critical=False,
@@ -215,11 +206,11 @@ def generate_pem_certificate_chain(self, pub_key: str) -> tuple[str, list[str]]:
215206
)
216207
# build client cert
217208
client_cert = (
218-
x509_CertificateBuilder()
209+
x509.CertificateBuilder()
219210
.subject_name(self.intermediate_cert.subject)
220211
.issuer_name(self.intermediate_cert.issuer)
221212
.public_key(pub_key_bytes)
222-
.serial_number(x509_random_serial_number())
213+
.serial_number(x509.random_serial_number())
223214
.not_valid_before(self.cert_before)
224215
.not_valid_after(self.cert_expiry)
225216
)
@@ -262,11 +253,11 @@ async def _get_client_certificate(
262253
)
263254
# build client cert
264255
client_cert = (
265-
x509_CertificateBuilder()
256+
x509.CertificateBuilder()
266257
.subject_name(self.instance.intermediate_cert.subject)
267258
.issuer_name(self.instance.intermediate_cert.issuer)
268259
.public_key(pub_key_bytes)
269-
.serial_number(x509_random_serial_number())
260+
.serial_number(x509.random_serial_number())
270261
.not_valid_before(self.instance.cert_before)
271262
.not_valid_after(self.instance.cert_expiry)
272263
)
@@ -315,7 +306,7 @@ async def get_connection_info(
315306
# unpack certs
316307
ca_cert, cert_chain = certs
317308
# get expiration from client certificate
318-
cert_obj = x509_load_pem_x509_certificate(cert_chain[0].encode("UTF-8"))
309+
cert_obj = x509.load_pem_x509_certificate(cert_chain[0].encode("UTF-8"))
319310
expiration = cert_obj.not_valid_after_utc
320311

321312
return ConnectionInfo(

0 commit comments

Comments
 (0)