You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Allow to control the minimum SSL version
It's useful for applications that has strict security requirements.
* Add tests for minimum SSL version
The commit updates test_tcp_ssl_connect for both sync and async
connections. Now it sets the minimum SSL version. The test is ran with
both TLSv1.2 and TLSv1.3 (if supported).
A new test case is test_tcp_ssl_version_mismatch. The test added for
both sync and async connections. It uses TLS 1.3 on the client side,
and TLS 1.2 on the server side. It expects a connection error. The
test is skipped if TLS 1.3 is not supported.
* Add example of using a minimum TLS version
Copy file name to clipboardExpand all lines: redis/connection.py
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -684,6 +684,7 @@ def __init__(
684
684
ssl_validate_ocsp_stapled=False,
685
685
ssl_ocsp_context=None,
686
686
ssl_ocsp_expected_cert=None,
687
+
ssl_min_version=None,
687
688
**kwargs,
688
689
):
689
690
"""Constructor
@@ -702,6 +703,7 @@ def __init__(
702
703
ssl_validate_ocsp_stapled: If set, perform a validation on a stapled ocsp response
703
704
ssl_ocsp_context: A fully initialized OpenSSL.SSL.Context object to be used in verifying the ssl_ocsp_expected_cert
704
705
ssl_ocsp_expected_cert: A PEM armoured string containing the expected certificate to be returned from the ocsp verification service.
706
+
ssl_min_version: The lowest supported SSL version. It affects the supported SSL versions of the SSLContext. None leaves the default provided by ssl module.
0 commit comments