You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			315 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Python
		
	
			
		
		
	
	
			315 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Python
		
	
"""
 | 
						|
requests.auth
 | 
						|
~~~~~~~~~~~~~
 | 
						|
 | 
						|
This module contains the authentication handlers for Requests.
 | 
						|
"""
 | 
						|
 | 
						|
import hashlib
 | 
						|
import os
 | 
						|
import re
 | 
						|
import threading
 | 
						|
import time
 | 
						|
import warnings
 | 
						|
from base64 import b64encode
 | 
						|
 | 
						|
from ._internal_utils import to_native_string
 | 
						|
from .compat import basestring, str, urlparse
 | 
						|
from .cookies import extract_cookies_to_jar
 | 
						|
from .utils import parse_dict_header
 | 
						|
 | 
						|
CONTENT_TYPE_FORM_URLENCODED = "application/x-www-form-urlencoded"
 | 
						|
CONTENT_TYPE_MULTI_PART = "multipart/form-data"
 | 
						|
 | 
						|
 | 
						|
def _basic_auth_str(username, password):
 | 
						|
    """Returns a Basic Auth string."""
 | 
						|
 | 
						|
    # "I want us to put a big-ol' comment on top of it that
 | 
						|
    # says that this behaviour is dumb but we need to preserve
 | 
						|
    # it because people are relying on it."
 | 
						|
    #    - Lukasa
 | 
						|
    #
 | 
						|
    # These are here solely to maintain backwards compatibility
 | 
						|
    # for things like ints. This will be removed in 3.0.0.
 | 
						|
    if not isinstance(username, basestring):
 | 
						|
        warnings.warn(
 | 
						|
            "Non-string usernames will no longer be supported in Requests "
 | 
						|
            "3.0.0. Please convert the object you've passed in ({!r}) to "
 | 
						|
            "a string or bytes object in the near future to avoid "
 | 
						|
            "problems.".format(username),
 | 
						|
            category=DeprecationWarning,
 | 
						|
        )
 | 
						|
        username = str(username)
 | 
						|
 | 
						|
    if not isinstance(password, basestring):
 | 
						|
        warnings.warn(
 | 
						|
            "Non-string passwords will no longer be supported in Requests "
 | 
						|
            "3.0.0. Please convert the object you've passed in ({!r}) to "
 | 
						|
            "a string or bytes object in the near future to avoid "
 | 
						|
            "problems.".format(type(password)),
 | 
						|
            category=DeprecationWarning,
 | 
						|
        )
 | 
						|
        password = str(password)
 | 
						|
    # -- End Removal --
 | 
						|
 | 
						|
    if isinstance(username, str):
 | 
						|
        username = username.encode("latin1")
 | 
						|
 | 
						|
    if isinstance(password, str):
 | 
						|
        password = password.encode("latin1")
 | 
						|
 | 
						|
    authstr = "Basic " + to_native_string(
 | 
						|
        b64encode(b":".join((username, password))).strip()
 | 
						|
    )
 | 
						|
 | 
						|
    return authstr
 | 
						|
 | 
						|
 | 
						|
class AuthBase:
 | 
						|
    """Base class that all auth implementations derive from"""
 | 
						|
 | 
						|
    def __call__(self, r):
 | 
						|
        raise NotImplementedError("Auth hooks must be callable.")
 | 
						|
 | 
						|
 | 
						|
class HTTPBasicAuth(AuthBase):
 | 
						|
    """Attaches HTTP Basic Authentication to the given Request object."""
 | 
						|
 | 
						|
    def __init__(self, username, password):
 | 
						|
        self.username = username
 | 
						|
        self.password = password
 | 
						|
 | 
						|
    def __eq__(self, other):
 | 
						|
        return all(
 | 
						|
            [
 | 
						|
                self.username == getattr(other, "username", None),
 | 
						|
                self.password == getattr(other, "password", None),
 | 
						|
            ]
 | 
						|
        )
 | 
						|
 | 
						|
    def __ne__(self, other):
 | 
						|
        return not self == other
 | 
						|
 | 
						|
    def __call__(self, r):
 | 
						|
        r.headers["Authorization"] = _basic_auth_str(self.username, self.password)
 | 
						|
        return r
 | 
						|
 | 
						|
 | 
						|
class HTTPProxyAuth(HTTPBasicAuth):
 | 
						|
    """Attaches HTTP Proxy Authentication to a given Request object."""
 | 
						|
 | 
						|
    def __call__(self, r):
 | 
						|
        r.headers["Proxy-Authorization"] = _basic_auth_str(self.username, self.password)
 | 
						|
        return r
 | 
						|
 | 
						|
 | 
						|
class HTTPDigestAuth(AuthBase):
 | 
						|
    """Attaches HTTP Digest Authentication to the given Request object."""
 | 
						|
 | 
						|
    def __init__(self, username, password):
 | 
						|
        self.username = username
 | 
						|
        self.password = password
 | 
						|
        # Keep state in per-thread local storage
 | 
						|
        self._thread_local = threading.local()
 | 
						|
 | 
						|
    def init_per_thread_state(self):
 | 
						|
        # Ensure state is initialized just once per-thread
 | 
						|
        if not hasattr(self._thread_local, "init"):
 | 
						|
            self._thread_local.init = True
 | 
						|
            self._thread_local.last_nonce = ""
 | 
						|
            self._thread_local.nonce_count = 0
 | 
						|
            self._thread_local.chal = {}
 | 
						|
            self._thread_local.pos = None
 | 
						|
            self._thread_local.num_401_calls = None
 | 
						|
 | 
						|
    def build_digest_header(self, method, url):
 | 
						|
        """
 | 
						|
        :rtype: str
 | 
						|
        """
 | 
						|
 | 
						|
        realm = self._thread_local.chal["realm"]
 | 
						|
        nonce = self._thread_local.chal["nonce"]
 | 
						|
        qop = self._thread_local.chal.get("qop")
 | 
						|
        algorithm = self._thread_local.chal.get("algorithm")
 | 
						|
        opaque = self._thread_local.chal.get("opaque")
 | 
						|
        hash_utf8 = None
 | 
						|
 | 
						|
        if algorithm is None:
 | 
						|
            _algorithm = "MD5"
 | 
						|
        else:
 | 
						|
            _algorithm = algorithm.upper()
 | 
						|
        # lambdas assume digest modules are imported at the top level
 | 
						|
        if _algorithm == "MD5" or _algorithm == "MD5-SESS":
 | 
						|
 | 
						|
            def md5_utf8(x):
 | 
						|
                if isinstance(x, str):
 | 
						|
                    x = x.encode("utf-8")
 | 
						|
                return hashlib.md5(x).hexdigest()
 | 
						|
 | 
						|
            hash_utf8 = md5_utf8
 | 
						|
        elif _algorithm == "SHA":
 | 
						|
 | 
						|
            def sha_utf8(x):
 | 
						|
                if isinstance(x, str):
 | 
						|
                    x = x.encode("utf-8")
 | 
						|
                return hashlib.sha1(x).hexdigest()
 | 
						|
 | 
						|
            hash_utf8 = sha_utf8
 | 
						|
        elif _algorithm == "SHA-256":
 | 
						|
 | 
						|
            def sha256_utf8(x):
 | 
						|
                if isinstance(x, str):
 | 
						|
                    x = x.encode("utf-8")
 | 
						|
                return hashlib.sha256(x).hexdigest()
 | 
						|
 | 
						|
            hash_utf8 = sha256_utf8
 | 
						|
        elif _algorithm == "SHA-512":
 | 
						|
 | 
						|
            def sha512_utf8(x):
 | 
						|
                if isinstance(x, str):
 | 
						|
                    x = x.encode("utf-8")
 | 
						|
                return hashlib.sha512(x).hexdigest()
 | 
						|
 | 
						|
            hash_utf8 = sha512_utf8
 | 
						|
 | 
						|
        KD = lambda s, d: hash_utf8(f"{s}:{d}")  # noqa:E731
 | 
						|
 | 
						|
        if hash_utf8 is None:
 | 
						|
            return None
 | 
						|
 | 
						|
        # XXX not implemented yet
 | 
						|
        entdig = None
 | 
						|
        p_parsed = urlparse(url)
 | 
						|
        #: path is request-uri defined in RFC 2616 which should not be empty
 | 
						|
        path = p_parsed.path or "/"
 | 
						|
        if p_parsed.query:
 | 
						|
            path += f"?{p_parsed.query}"
 | 
						|
 | 
						|
        A1 = f"{self.username}:{realm}:{self.password}"
 | 
						|
        A2 = f"{method}:{path}"
 | 
						|
 | 
						|
        HA1 = hash_utf8(A1)
 | 
						|
        HA2 = hash_utf8(A2)
 | 
						|
 | 
						|
        if nonce == self._thread_local.last_nonce:
 | 
						|
            self._thread_local.nonce_count += 1
 | 
						|
        else:
 | 
						|
            self._thread_local.nonce_count = 1
 | 
						|
        ncvalue = f"{self._thread_local.nonce_count:08x}"
 | 
						|
        s = str(self._thread_local.nonce_count).encode("utf-8")
 | 
						|
        s += nonce.encode("utf-8")
 | 
						|
        s += time.ctime().encode("utf-8")
 | 
						|
        s += os.urandom(8)
 | 
						|
 | 
						|
        cnonce = hashlib.sha1(s).hexdigest()[:16]
 | 
						|
        if _algorithm == "MD5-SESS":
 | 
						|
            HA1 = hash_utf8(f"{HA1}:{nonce}:{cnonce}")
 | 
						|
 | 
						|
        if not qop:
 | 
						|
            respdig = KD(HA1, f"{nonce}:{HA2}")
 | 
						|
        elif qop == "auth" or "auth" in qop.split(","):
 | 
						|
            noncebit = f"{nonce}:{ncvalue}:{cnonce}:auth:{HA2}"
 | 
						|
            respdig = KD(HA1, noncebit)
 | 
						|
        else:
 | 
						|
            # XXX handle auth-int.
 | 
						|
            return None
 | 
						|
 | 
						|
        self._thread_local.last_nonce = nonce
 | 
						|
 | 
						|
        # XXX should the partial digests be encoded too?
 | 
						|
        base = (
 | 
						|
            f'username="{self.username}", realm="{realm}", nonce="{nonce}", '
 | 
						|
            f'uri="{path}", response="{respdig}"'
 | 
						|
        )
 | 
						|
        if opaque:
 | 
						|
            base += f', opaque="{opaque}"'
 | 
						|
        if algorithm:
 | 
						|
            base += f', algorithm="{algorithm}"'
 | 
						|
        if entdig:
 | 
						|
            base += f', digest="{entdig}"'
 | 
						|
        if qop:
 | 
						|
            base += f', qop="auth", nc={ncvalue}, cnonce="{cnonce}"'
 | 
						|
 | 
						|
        return f"Digest {base}"
 | 
						|
 | 
						|
    def handle_redirect(self, r, **kwargs):
 | 
						|
        """Reset num_401_calls counter on redirects."""
 | 
						|
        if r.is_redirect:
 | 
						|
            self._thread_local.num_401_calls = 1
 | 
						|
 | 
						|
    def handle_401(self, r, **kwargs):
 | 
						|
        """
 | 
						|
        Takes the given response and tries digest-auth, if needed.
 | 
						|
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        # If response is not 4xx, do not auth
 | 
						|
        # See https://github.com/psf/requests/issues/3772
 | 
						|
        if not 400 <= r.status_code < 500:
 | 
						|
            self._thread_local.num_401_calls = 1
 | 
						|
            return r
 | 
						|
 | 
						|
        if self._thread_local.pos is not None:
 | 
						|
            # Rewind the file position indicator of the body to where
 | 
						|
            # it was to resend the request.
 | 
						|
            r.request.body.seek(self._thread_local.pos)
 | 
						|
        s_auth = r.headers.get("www-authenticate", "")
 | 
						|
 | 
						|
        if "digest" in s_auth.lower() and self._thread_local.num_401_calls < 2:
 | 
						|
            self._thread_local.num_401_calls += 1
 | 
						|
            pat = re.compile(r"digest ", flags=re.IGNORECASE)
 | 
						|
            self._thread_local.chal = parse_dict_header(pat.sub("", s_auth, count=1))
 | 
						|
 | 
						|
            # Consume content and release the original connection
 | 
						|
            # to allow our new request to reuse the same one.
 | 
						|
            r.content
 | 
						|
            r.close()
 | 
						|
            prep = r.request.copy()
 | 
						|
            extract_cookies_to_jar(prep._cookies, r.request, r.raw)
 | 
						|
            prep.prepare_cookies(prep._cookies)
 | 
						|
 | 
						|
            prep.headers["Authorization"] = self.build_digest_header(
 | 
						|
                prep.method, prep.url
 | 
						|
            )
 | 
						|
            _r = r.connection.send(prep, **kwargs)
 | 
						|
            _r.history.append(r)
 | 
						|
            _r.request = prep
 | 
						|
 | 
						|
            return _r
 | 
						|
 | 
						|
        self._thread_local.num_401_calls = 1
 | 
						|
        return r
 | 
						|
 | 
						|
    def __call__(self, r):
 | 
						|
        # Initialize per-thread state, if needed
 | 
						|
        self.init_per_thread_state()
 | 
						|
        # If we have a saved nonce, skip the 401
 | 
						|
        if self._thread_local.last_nonce:
 | 
						|
            r.headers["Authorization"] = self.build_digest_header(r.method, r.url)
 | 
						|
        try:
 | 
						|
            self._thread_local.pos = r.body.tell()
 | 
						|
        except AttributeError:
 | 
						|
            # In the case of HTTPDigestAuth being reused and the body of
 | 
						|
            # the previous request was a file-like object, pos has the
 | 
						|
            # file position of the previous body. Ensure it's set to
 | 
						|
            # None.
 | 
						|
            self._thread_local.pos = None
 | 
						|
        r.register_hook("response", self.handle_401)
 | 
						|
        r.register_hook("response", self.handle_redirect)
 | 
						|
        self._thread_local.num_401_calls = 1
 | 
						|
 | 
						|
        return r
 | 
						|
 | 
						|
    def __eq__(self, other):
 | 
						|
        return all(
 | 
						|
            [
 | 
						|
                self.username == getattr(other, "username", None),
 | 
						|
                self.password == getattr(other, "password", None),
 | 
						|
            ]
 | 
						|
        )
 | 
						|
 | 
						|
    def __ne__(self, other):
 | 
						|
        return not self == other
 |