Skip to content

Commit 1971a3d

Browse files
Release 0.9.0
Overview This release features SSL support. To use encrypted connection with Tarantool Enterprise Edition instance, pass "ssl" `transport` parameter on connect: con = tarantool.Connection( host, port, user=user, password=pass, transport="ssl") To verify the server, set client trusted certificate authorities (CA) file with `ssl_ca_file` parameter: con = tarantool.Connection( host, port, user=user, password=password, transport="ssl", ssl_ca_file=client_ca_file) If the server authenticates clients using certificates issued by given CA, you must provide private SSL key file with `ssl_key_file` parameter and SSL certificate file with `ssl_cert_file` parameter. Otherwise, these parameters are optional. con = tarantool.Connection( host, port, user=user, password=password, transport="ssl", ssl_key_file=client_key_file, ssl_cert_file=client_cert_file) To set SSL ciphers, set them with `ssl_ciphers` parameter as a colon-separated (:) string: con = tarantool.Connection( host, port, user=user, password=password, transport="ssl", ssl_ciphers=client_ssl_ciphers) ConnectionPool and MeshConnection also support these parameters. mesh = tarantool.MeshConnection( addrs={ "host": host, "post": port, "transport": "ssl", "ssl_key_file": client_key_file, "ssl_cert_file": client_cert_file, "ssl_ca_file": client_ca_file, "ssl_ciphers": client_ssl_ciphers, }, user=user, password=password) pool = tarantool.ConnectionPool( addrs={ "host": host, "post": port, "transport": "ssl", "ssl_key_file": client_key_file, "ssl_cert_file": client_cert_file, "ssl_ca_file": client_ca_file, "ssl_ciphers": client_ssl_ciphers, }, user=user, password=password) See Tarantool Enterprise Edition manual for details [1]. 1. https://www.tarantool.io/en/enterprise_doc/security/#enterprise-iproto-encryption Breaking changes There are no breaking changes in the release. New features * SSL support (PR #220, #217). Testing * Tarantool Enterprise testing workflow on GitHub actions (PR #220).
1 parent 0970382 commit 1971a3d

File tree

4 files changed

+112
-4
lines changed

4 files changed

+112
-4
lines changed

Diff for: CHANGELOG.md

+6-2
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,17 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
77
## Unreleased
88

99
### Added
10-
- SSL support (PR #220, #217).
11-
- Tarantool Enterprise testing workflow on GitHub actions (PR #220).
1210

1311
### Changed
1412

1513
### Fixed
1614

15+
## 0.9.0 - 2022-06-20
16+
17+
### Added
18+
- SSL support (PR #220, #217).
19+
- Tarantool Enterprise testing workflow on GitHub actions (PR #220).
20+
1721
## 0.8.0 - 2022-04-29
1822

1923
### Added

Diff for: debian/changelog

+104
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,107 @@
1+
tarantool-python (0.9.0-0) unstable; urgency=medium
2+
## Overview
3+
4+
This release features SSL support.
5+
6+
To use encrypted connection with Tarantool Enterprise Edition
7+
instance, pass "ssl" `transport` parameter on connect:
8+
9+
```python
10+
con = tarantool.Connection(
11+
host, port,
12+
user=user,
13+
password=pass,
14+
transport="ssl")
15+
```
16+
17+
To verify the server, set client trusted certificate
18+
authorities (CA) file with `ssl_ca_file` parameter:
19+
20+
```python
21+
con = tarantool.Connection(
22+
host, port,
23+
user=user,
24+
password=password,
25+
transport="ssl",
26+
ssl_ca_file=client_ca_file)
27+
```
28+
29+
If the server authenticates clients using certificates issued by
30+
given CA, you must provide private SSL key file with `ssl_key_file`
31+
parameter and SSL certificate file with `ssl_cert_file` parameter.
32+
Otherwise, these parameters are optional.
33+
34+
```python
35+
con = tarantool.Connection(
36+
host, port,
37+
user=user,
38+
password=password,
39+
transport="ssl",
40+
ssl_key_file=client_key_file,
41+
ssl_cert_file=client_cert_file)
42+
```
43+
44+
To set SSL ciphers, set them with `ssl_ciphers` parameter as
45+
a colon-separated (:) string:
46+
47+
```python
48+
con = tarantool.Connection(
49+
host, port,
50+
user=user,
51+
password=password,
52+
transport="ssl",
53+
ssl_ciphers=client_ssl_ciphers)
54+
```
55+
56+
ConnectionPool and MeshConnection also support these parameters.
57+
58+
```python
59+
mesh = tarantool.MeshConnection(
60+
addrs={
61+
"host": host,
62+
"post": port,
63+
"transport": "ssl",
64+
"ssl_key_file": client_key_file,
65+
"ssl_cert_file": client_cert_file,
66+
"ssl_ca_file": client_ca_file,
67+
"ssl_ciphers": client_ssl_ciphers,
68+
},
69+
user=user,
70+
password=password)
71+
```
72+
73+
```python
74+
pool = tarantool.ConnectionPool(
75+
addrs={
76+
"host": host,
77+
"post": port,
78+
"transport": "ssl",
79+
"ssl_key_file": client_key_file,
80+
"ssl_cert_file": client_cert_file,
81+
"ssl_ca_file": client_ca_file,
82+
"ssl_ciphers": client_ssl_ciphers,
83+
},
84+
user=user,
85+
password=password)
86+
```
87+
88+
See [Tarantool Enterprise Edition manual](https://www.tarantool.io/en/enterprise_doc/security/#enterprise-iproto-encryption)
89+
for details.
90+
91+
## Breaking changes
92+
93+
There are no breaking changes in the release.
94+
95+
## New features
96+
97+
* SSL support (PR #220, #217).
98+
99+
## Testing
100+
101+
* Tarantool Enterprise testing workflow on GitHub actions (PR #220).
102+
103+
-- Georgy Moiseev <[email protected]> Mon, 20 Jun 2022 18:00:00 +0300
104+
1105
tarantool-python (0.8.0-0) unstable; urgency=medium
2106

3107
## Overview

Diff for: rpm/tarantool-python.spec

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Summary: Python client library for Tarantool Database
22
Name: tarantool-python
3-
Version: 0.8.0
3+
Version: 0.9.0
44
Release: 1%{?dist}
55
Source0: tarantool-python-%{version}.tar.gz
66
License: BSD

Diff for: tarantool/__init__.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@
3232
ENCODING_DEFAULT,
3333
)
3434

35-
__version__ = "0.8.0"
35+
__version__ = "0.9.0"
3636

3737

3838
def connect(host="localhost", port=33013, user=None, password=None,

0 commit comments

Comments
 (0)