Allow server-side TLS without client auth
Modified TLS logic to allow enabling TLS server-side auth without using client certificates. Added ability to skip TLS certificate verification for self-signed certs, when a CA can't be provided. Updated README to reflect new environment variable for MQTT_TLS_INSECURE.
This commit is contained in:
11
README.md
11
README.md
@@ -9,15 +9,16 @@ It supports the following environment variables:
|
|||||||
- `AMCREST_PORT` (optional, default = 80)
|
- `AMCREST_PORT` (optional, default = 80)
|
||||||
- `AMCREST_USERNAME` (optional, default = admin)
|
- `AMCREST_USERNAME` (optional, default = admin)
|
||||||
- `AMCREST_PASSWORD` (required)
|
- `AMCREST_PASSWORD` (required)
|
||||||
- `MQTT_USERNAME` (required)
|
- `MQTT_USERNAME` (required, unless using TLS client authentication)
|
||||||
- `MQTT_PASSWORD` (optional, default = empty password)
|
- `MQTT_PASSWORD` (optional, default = empty password)
|
||||||
- `MQTT_HOST` (optional, default = 'localhost')
|
- `MQTT_HOST` (optional, default = 'localhost')
|
||||||
- `MQTT_QOS` (optional, default = 0)
|
- `MQTT_QOS` (optional, default = 0)
|
||||||
- `MQTT_PORT` (optional, default = 1883)
|
- `MQTT_PORT` (optional, default = 1883)
|
||||||
- `MQTT_TLS_ENABLED` (required if using TLS) - set to `true` to enable
|
- `MQTT_TLS_ENABLED` (optional, default = false) - set to `true` to enable TLS server authentication
|
||||||
- `MQTT_TLS_CA_CERT` (required if using TLS) - path to the ca certs
|
- `MQTT_TLS_INSECURE` (optional, default = false) - disables TLS certificate verification - use with caution! Consider using `MQTT_TLS_CA_CERT` instead.
|
||||||
- `MQTT_TLS_CERT` (required if using TLS) - path to the private cert
|
- `MQTT_TLS_CA_CERT` (required if using TLS, unless `MQTT_TLS_INSECURE` is set) - path to the trusted CA certificate file
|
||||||
- `MQTT_TLS_KEY` (required if using TLS) - path to the private key
|
- `MQTT_TLS_CERT` (required if using TLS client authentication) - path to the client's certificate file
|
||||||
|
- `MQTT_TLS_KEY` (required if using TLS client authentication) - path to the client's private key file
|
||||||
- `HOME_ASSISTANT` (optional, default = false)
|
- `HOME_ASSISTANT` (optional, default = false)
|
||||||
- `HOME_ASSISTANT_PREFIX` (optional, default = 'homeassistant')
|
- `HOME_ASSISTANT_PREFIX` (optional, default = 'homeassistant')
|
||||||
- `STORAGE_POLL_INTERVAL` (optional, default = 3600) - how often to fetch storage data (in seconds) (set to 0 to disable functionality)
|
- `STORAGE_POLL_INTERVAL` (optional, default = 3600) - how often to fetch storage data (in seconds) (set to 0 to disable functionality)
|
||||||
|
|||||||
@@ -28,6 +28,7 @@ mqtt_port = int(os.getenv("MQTT_PORT") or 1883)
|
|||||||
mqtt_username = os.getenv("MQTT_USERNAME")
|
mqtt_username = os.getenv("MQTT_USERNAME")
|
||||||
mqtt_password = os.getenv("MQTT_PASSWORD") # can be None
|
mqtt_password = os.getenv("MQTT_PASSWORD") # can be None
|
||||||
mqtt_tls_enabled = os.getenv("MQTT_TLS_ENABLED") == "true"
|
mqtt_tls_enabled = os.getenv("MQTT_TLS_ENABLED") == "true"
|
||||||
|
mqtt_tls_insecure = os.getenv("MQTT_TLS_INSECURE") == "true"
|
||||||
mqtt_tls_ca_cert = os.getenv("MQTT_TLS_CA_CERT")
|
mqtt_tls_ca_cert = os.getenv("MQTT_TLS_CA_CERT")
|
||||||
mqtt_tls_cert = os.getenv("MQTT_TLS_CERT")
|
mqtt_tls_cert = os.getenv("MQTT_TLS_CERT")
|
||||||
mqtt_tls_key = os.getenv("MQTT_TLS_KEY")
|
mqtt_tls_key = os.getenv("MQTT_TLS_KEY")
|
||||||
@@ -123,8 +124,45 @@ if amcrest_password is None:
|
|||||||
log("Please set the AMCREST_PASSWORD environment variable", level="ERROR")
|
log("Please set the AMCREST_PASSWORD environment variable", level="ERROR")
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
|
|
||||||
if mqtt_username is None:
|
if mqtt_tls_enabled:
|
||||||
log("Please set the MQTT_USERNAME environment variable", level="ERROR")
|
# TLS will be enabled
|
||||||
|
if not mqtt_tls_insecure:
|
||||||
|
# TLS verification will be enforced
|
||||||
|
if mqtt_tls_ca_cert is None:
|
||||||
|
# No TLS CA certificate was given
|
||||||
|
log("Missing var: MQTT_TLS_CA_CERT", level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
elif not os.path.exists(mqtt_tls_ca_cert) or not os.path.isfile(mqtt_tls_ca_cert):
|
||||||
|
# Provided TLS CA certificate not found
|
||||||
|
log("Missing file: MQTT_TLS_CA_CERT file {} not found".format(mqtt_tls_ca_cert), level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
# For TLS, MQTT accepts either TLS client auth or username auth.
|
||||||
|
if bool(mqtt_tls_cert) != bool(mqtt_tls_key):
|
||||||
|
# One TLS client auth variable was given, but not the other
|
||||||
|
if mqtt_tls_cert is None:
|
||||||
|
log("Missing var: MQTT_TLS_CERT", level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
if mqtt_tls_key is None:
|
||||||
|
log("Missing var: MQTT_TLS_KEY", level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
elif mqtt_tls_cert is not None and mqtt_tls_key is not None:
|
||||||
|
# Both TLS client auth variables were given
|
||||||
|
if not os.path.exists(mqtt_tls_cert) or not os.path.isfile(mqtt_tls_cert):
|
||||||
|
log("Missing file: MQTT_TLS_CERT file {} not found".format(mqtt_tls_cert), level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
if not os.path.exists(mqtt_tls_key) or not os.path.isfile(mqtt_tls_key):
|
||||||
|
log("Missing file: MQTT_TLS_KEY file {} not found".format(mqtt_tls_key), level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
# No TLS client auth variables were given, so username auth is required
|
||||||
|
if mqtt_username is None:
|
||||||
|
log("Missing var: MQTT_USERNAME", level="ERROR")
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
# TLS not enabled, so only option is username auth.
|
||||||
|
if mqtt_username is None:
|
||||||
|
log("Missing var: MQTT_USERNAME", level="ERROR")
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
|
|
||||||
version = read_version()
|
version = read_version()
|
||||||
@@ -212,25 +250,22 @@ mqtt_client = mqtt.Client(
|
|||||||
)
|
)
|
||||||
mqtt_client.on_disconnect = on_mqtt_disconnect
|
mqtt_client.on_disconnect = on_mqtt_disconnect
|
||||||
mqtt_client.will_set(topics["status"], payload="offline", qos=mqtt_qos, retain=True)
|
mqtt_client.will_set(topics["status"], payload="offline", qos=mqtt_qos, retain=True)
|
||||||
|
|
||||||
if mqtt_tls_enabled:
|
if mqtt_tls_enabled:
|
||||||
log(f"Setting up MQTT for TLS")
|
log(f"Setting up MQTT for TLS")
|
||||||
if mqtt_tls_ca_cert is None:
|
|
||||||
log("Missing var: MQTT_TLS_CA_CERT", level="ERROR")
|
|
||||||
sys.exit(1)
|
|
||||||
if mqtt_tls_cert is None:
|
|
||||||
log("Missing var: MQTT_TLS_CERT", level="ERROR")
|
|
||||||
sys.exit(1)
|
|
||||||
if mqtt_tls_cert is None:
|
|
||||||
log("Missing var: MQTT_TLS_KEY", level="ERROR")
|
|
||||||
sys.exit(1)
|
|
||||||
mqtt_client.tls_set(
|
mqtt_client.tls_set(
|
||||||
ca_certs=mqtt_tls_ca_cert,
|
ca_certs=mqtt_tls_ca_cert,
|
||||||
certfile=mqtt_tls_cert,
|
certfile=mqtt_tls_cert,
|
||||||
keyfile=mqtt_tls_key,
|
keyfile=mqtt_tls_key,
|
||||||
cert_reqs=ssl.CERT_REQUIRED,
|
cert_reqs=ssl.CERT_NONE if mqtt_tls_insecure else ssl.CERT_REQUIRED,
|
||||||
tls_version=ssl.PROTOCOL_TLS,
|
tls_version=ssl.PROTOCOL_TLS,
|
||||||
)
|
)
|
||||||
else:
|
if mqtt_tls_insecure:
|
||||||
|
log("MQTT TLS verification disabled - this is very insecure! Consider setting MQTT_TLS_CA_CERT instead.", level="WARN")
|
||||||
|
mqtt_client.tls_insecure_set(mqtt_tls_insecure)
|
||||||
|
|
||||||
|
# Need to pass username and password if not using TLS client authentication
|
||||||
|
if not mqtt_tls_enabled or (mqtt_tls_cert is None and mqtt_tls_key is None):
|
||||||
mqtt_client.username_pw_set(mqtt_username, password=mqtt_password)
|
mqtt_client.username_pw_set(mqtt_username, password=mqtt_password)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
|||||||
Reference in New Issue
Block a user