You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			832 lines
		
	
	
		
			30 KiB
		
	
	
	
		
			Python
		
	
			
		
		
	
	
			832 lines
		
	
	
		
			30 KiB
		
	
	
	
		
			Python
		
	
"""
 | 
						|
requests.sessions
 | 
						|
~~~~~~~~~~~~~~~~~
 | 
						|
 | 
						|
This module provides a Session object to manage and persist settings across
 | 
						|
requests (cookies, auth, proxies).
 | 
						|
"""
 | 
						|
import os
 | 
						|
import sys
 | 
						|
import time
 | 
						|
from collections import OrderedDict
 | 
						|
from datetime import timedelta
 | 
						|
 | 
						|
from ._internal_utils import to_native_string
 | 
						|
from .adapters import HTTPAdapter
 | 
						|
from .auth import _basic_auth_str
 | 
						|
from .compat import Mapping, cookielib, urljoin, urlparse
 | 
						|
from .cookies import (
 | 
						|
    RequestsCookieJar,
 | 
						|
    cookiejar_from_dict,
 | 
						|
    extract_cookies_to_jar,
 | 
						|
    merge_cookies,
 | 
						|
)
 | 
						|
from .exceptions import (
 | 
						|
    ChunkedEncodingError,
 | 
						|
    ContentDecodingError,
 | 
						|
    InvalidSchema,
 | 
						|
    TooManyRedirects,
 | 
						|
)
 | 
						|
from .hooks import default_hooks, dispatch_hook
 | 
						|
 | 
						|
# formerly defined here, reexposed here for backward compatibility
 | 
						|
from .models import (  # noqa: F401
 | 
						|
    DEFAULT_REDIRECT_LIMIT,
 | 
						|
    REDIRECT_STATI,
 | 
						|
    PreparedRequest,
 | 
						|
    Request,
 | 
						|
)
 | 
						|
from .status_codes import codes
 | 
						|
from .structures import CaseInsensitiveDict
 | 
						|
from .utils import (  # noqa: F401
 | 
						|
    DEFAULT_PORTS,
 | 
						|
    default_headers,
 | 
						|
    get_auth_from_url,
 | 
						|
    get_environ_proxies,
 | 
						|
    get_netrc_auth,
 | 
						|
    requote_uri,
 | 
						|
    resolve_proxies,
 | 
						|
    rewind_body,
 | 
						|
    should_bypass_proxies,
 | 
						|
    to_key_val_list,
 | 
						|
)
 | 
						|
 | 
						|
# Preferred clock, based on which one is more accurate on a given system.
 | 
						|
if sys.platform == "win32":
 | 
						|
    preferred_clock = time.perf_counter
 | 
						|
else:
 | 
						|
    preferred_clock = time.time
 | 
						|
 | 
						|
 | 
						|
def merge_setting(request_setting, session_setting, dict_class=OrderedDict):
 | 
						|
    """Determines appropriate setting for a given request, taking into account
 | 
						|
    the explicit setting on that request, and the setting in the session. If a
 | 
						|
    setting is a dictionary, they will be merged together using `dict_class`
 | 
						|
    """
 | 
						|
 | 
						|
    if session_setting is None:
 | 
						|
        return request_setting
 | 
						|
 | 
						|
    if request_setting is None:
 | 
						|
        return session_setting
 | 
						|
 | 
						|
    # Bypass if not a dictionary (e.g. verify)
 | 
						|
    if not (
 | 
						|
        isinstance(session_setting, Mapping) and isinstance(request_setting, Mapping)
 | 
						|
    ):
 | 
						|
        return request_setting
 | 
						|
 | 
						|
    merged_setting = dict_class(to_key_val_list(session_setting))
 | 
						|
    merged_setting.update(to_key_val_list(request_setting))
 | 
						|
 | 
						|
    # Remove keys that are set to None. Extract keys first to avoid altering
 | 
						|
    # the dictionary during iteration.
 | 
						|
    none_keys = [k for (k, v) in merged_setting.items() if v is None]
 | 
						|
    for key in none_keys:
 | 
						|
        del merged_setting[key]
 | 
						|
 | 
						|
    return merged_setting
 | 
						|
 | 
						|
 | 
						|
def merge_hooks(request_hooks, session_hooks, dict_class=OrderedDict):
 | 
						|
    """Properly merges both requests and session hooks.
 | 
						|
 | 
						|
    This is necessary because when request_hooks == {'response': []}, the
 | 
						|
    merge breaks Session hooks entirely.
 | 
						|
    """
 | 
						|
    if session_hooks is None or session_hooks.get("response") == []:
 | 
						|
        return request_hooks
 | 
						|
 | 
						|
    if request_hooks is None or request_hooks.get("response") == []:
 | 
						|
        return session_hooks
 | 
						|
 | 
						|
    return merge_setting(request_hooks, session_hooks, dict_class)
 | 
						|
 | 
						|
 | 
						|
class SessionRedirectMixin:
 | 
						|
    def get_redirect_target(self, resp):
 | 
						|
        """Receives a Response. Returns a redirect URI or ``None``"""
 | 
						|
        # Due to the nature of how requests processes redirects this method will
 | 
						|
        # be called at least once upon the original response and at least twice
 | 
						|
        # on each subsequent redirect response (if any).
 | 
						|
        # If a custom mixin is used to handle this logic, it may be advantageous
 | 
						|
        # to cache the redirect location onto the response object as a private
 | 
						|
        # attribute.
 | 
						|
        if resp.is_redirect:
 | 
						|
            location = resp.headers["location"]
 | 
						|
            # Currently the underlying http module on py3 decode headers
 | 
						|
            # in latin1, but empirical evidence suggests that latin1 is very
 | 
						|
            # rarely used with non-ASCII characters in HTTP headers.
 | 
						|
            # It is more likely to get UTF8 header rather than latin1.
 | 
						|
            # This causes incorrect handling of UTF8 encoded location headers.
 | 
						|
            # To solve this, we re-encode the location in latin1.
 | 
						|
            location = location.encode("latin1")
 | 
						|
            return to_native_string(location, "utf8")
 | 
						|
        return None
 | 
						|
 | 
						|
    def should_strip_auth(self, old_url, new_url):
 | 
						|
        """Decide whether Authorization header should be removed when redirecting"""
 | 
						|
        old_parsed = urlparse(old_url)
 | 
						|
        new_parsed = urlparse(new_url)
 | 
						|
        if old_parsed.hostname != new_parsed.hostname:
 | 
						|
            return True
 | 
						|
        # Special case: allow http -> https redirect when using the standard
 | 
						|
        # ports. This isn't specified by RFC 7235, but is kept to avoid
 | 
						|
        # breaking backwards compatibility with older versions of requests
 | 
						|
        # that allowed any redirects on the same host.
 | 
						|
        if (
 | 
						|
            old_parsed.scheme == "http"
 | 
						|
            and old_parsed.port in (80, None)
 | 
						|
            and new_parsed.scheme == "https"
 | 
						|
            and new_parsed.port in (443, None)
 | 
						|
        ):
 | 
						|
            return False
 | 
						|
 | 
						|
        # Handle default port usage corresponding to scheme.
 | 
						|
        changed_port = old_parsed.port != new_parsed.port
 | 
						|
        changed_scheme = old_parsed.scheme != new_parsed.scheme
 | 
						|
        default_port = (DEFAULT_PORTS.get(old_parsed.scheme, None), None)
 | 
						|
        if (
 | 
						|
            not changed_scheme
 | 
						|
            and old_parsed.port in default_port
 | 
						|
            and new_parsed.port in default_port
 | 
						|
        ):
 | 
						|
            return False
 | 
						|
 | 
						|
        # Standard case: root URI must match
 | 
						|
        return changed_port or changed_scheme
 | 
						|
 | 
						|
    def resolve_redirects(
 | 
						|
        self,
 | 
						|
        resp,
 | 
						|
        req,
 | 
						|
        stream=False,
 | 
						|
        timeout=None,
 | 
						|
        verify=True,
 | 
						|
        cert=None,
 | 
						|
        proxies=None,
 | 
						|
        yield_requests=False,
 | 
						|
        **adapter_kwargs,
 | 
						|
    ):
 | 
						|
        """Receives a Response. Returns a generator of Responses or Requests."""
 | 
						|
 | 
						|
        hist = []  # keep track of history
 | 
						|
 | 
						|
        url = self.get_redirect_target(resp)
 | 
						|
        previous_fragment = urlparse(req.url).fragment
 | 
						|
        while url:
 | 
						|
            prepared_request = req.copy()
 | 
						|
 | 
						|
            # Update history and keep track of redirects.
 | 
						|
            # resp.history must ignore the original request in this loop
 | 
						|
            hist.append(resp)
 | 
						|
            resp.history = hist[1:]
 | 
						|
 | 
						|
            try:
 | 
						|
                resp.content  # Consume socket so it can be released
 | 
						|
            except (ChunkedEncodingError, ContentDecodingError, RuntimeError):
 | 
						|
                resp.raw.read(decode_content=False)
 | 
						|
 | 
						|
            if len(resp.history) >= self.max_redirects:
 | 
						|
                raise TooManyRedirects(
 | 
						|
                    f"Exceeded {self.max_redirects} redirects.", response=resp
 | 
						|
                )
 | 
						|
 | 
						|
            # Release the connection back into the pool.
 | 
						|
            resp.close()
 | 
						|
 | 
						|
            # Handle redirection without scheme (see: RFC 1808 Section 4)
 | 
						|
            if url.startswith("//"):
 | 
						|
                parsed_rurl = urlparse(resp.url)
 | 
						|
                url = ":".join([to_native_string(parsed_rurl.scheme), url])
 | 
						|
 | 
						|
            # Normalize url case and attach previous fragment if needed (RFC 7231 7.1.2)
 | 
						|
            parsed = urlparse(url)
 | 
						|
            if parsed.fragment == "" and previous_fragment:
 | 
						|
                parsed = parsed._replace(fragment=previous_fragment)
 | 
						|
            elif parsed.fragment:
 | 
						|
                previous_fragment = parsed.fragment
 | 
						|
            url = parsed.geturl()
 | 
						|
 | 
						|
            # Facilitate relative 'location' headers, as allowed by RFC 7231.
 | 
						|
            # (e.g. '/path/to/resource' instead of 'http://domain.tld/path/to/resource')
 | 
						|
            # Compliant with RFC3986, we percent encode the url.
 | 
						|
            if not parsed.netloc:
 | 
						|
                url = urljoin(resp.url, requote_uri(url))
 | 
						|
            else:
 | 
						|
                url = requote_uri(url)
 | 
						|
 | 
						|
            prepared_request.url = to_native_string(url)
 | 
						|
 | 
						|
            self.rebuild_method(prepared_request, resp)
 | 
						|
 | 
						|
            # https://github.com/psf/requests/issues/1084
 | 
						|
            if resp.status_code not in (
 | 
						|
                codes.temporary_redirect,
 | 
						|
                codes.permanent_redirect,
 | 
						|
            ):
 | 
						|
                # https://github.com/psf/requests/issues/3490
 | 
						|
                purged_headers = ("Content-Length", "Content-Type", "Transfer-Encoding")
 | 
						|
                for header in purged_headers:
 | 
						|
                    prepared_request.headers.pop(header, None)
 | 
						|
                prepared_request.body = None
 | 
						|
 | 
						|
            headers = prepared_request.headers
 | 
						|
            headers.pop("Cookie", None)
 | 
						|
 | 
						|
            # Extract any cookies sent on the response to the cookiejar
 | 
						|
            # in the new request. Because we've mutated our copied prepared
 | 
						|
            # request, use the old one that we haven't yet touched.
 | 
						|
            extract_cookies_to_jar(prepared_request._cookies, req, resp.raw)
 | 
						|
            merge_cookies(prepared_request._cookies, self.cookies)
 | 
						|
            prepared_request.prepare_cookies(prepared_request._cookies)
 | 
						|
 | 
						|
            # Rebuild auth and proxy information.
 | 
						|
            proxies = self.rebuild_proxies(prepared_request, proxies)
 | 
						|
            self.rebuild_auth(prepared_request, resp)
 | 
						|
 | 
						|
            # A failed tell() sets `_body_position` to `object()`. This non-None
 | 
						|
            # value ensures `rewindable` will be True, allowing us to raise an
 | 
						|
            # UnrewindableBodyError, instead of hanging the connection.
 | 
						|
            rewindable = prepared_request._body_position is not None and (
 | 
						|
                "Content-Length" in headers or "Transfer-Encoding" in headers
 | 
						|
            )
 | 
						|
 | 
						|
            # Attempt to rewind consumed file-like object.
 | 
						|
            if rewindable:
 | 
						|
                rewind_body(prepared_request)
 | 
						|
 | 
						|
            # Override the original request.
 | 
						|
            req = prepared_request
 | 
						|
 | 
						|
            if yield_requests:
 | 
						|
                yield req
 | 
						|
            else:
 | 
						|
                resp = self.send(
 | 
						|
                    req,
 | 
						|
                    stream=stream,
 | 
						|
                    timeout=timeout,
 | 
						|
                    verify=verify,
 | 
						|
                    cert=cert,
 | 
						|
                    proxies=proxies,
 | 
						|
                    allow_redirects=False,
 | 
						|
                    **adapter_kwargs,
 | 
						|
                )
 | 
						|
 | 
						|
                extract_cookies_to_jar(self.cookies, prepared_request, resp.raw)
 | 
						|
 | 
						|
                # extract redirect url, if any, for the next loop
 | 
						|
                url = self.get_redirect_target(resp)
 | 
						|
                yield resp
 | 
						|
 | 
						|
    def rebuild_auth(self, prepared_request, response):
 | 
						|
        """When being redirected we may want to strip authentication from the
 | 
						|
        request to avoid leaking credentials. This method intelligently removes
 | 
						|
        and reapplies authentication where possible to avoid credential loss.
 | 
						|
        """
 | 
						|
        headers = prepared_request.headers
 | 
						|
        url = prepared_request.url
 | 
						|
 | 
						|
        if "Authorization" in headers and self.should_strip_auth(
 | 
						|
            response.request.url, url
 | 
						|
        ):
 | 
						|
            # If we get redirected to a new host, we should strip out any
 | 
						|
            # authentication headers.
 | 
						|
            del headers["Authorization"]
 | 
						|
 | 
						|
        # .netrc might have more auth for us on our new host.
 | 
						|
        new_auth = get_netrc_auth(url) if self.trust_env else None
 | 
						|
        if new_auth is not None:
 | 
						|
            prepared_request.prepare_auth(new_auth)
 | 
						|
 | 
						|
    def rebuild_proxies(self, prepared_request, proxies):
 | 
						|
        """This method re-evaluates the proxy configuration by considering the
 | 
						|
        environment variables. If we are redirected to a URL covered by
 | 
						|
        NO_PROXY, we strip the proxy configuration. Otherwise, we set missing
 | 
						|
        proxy keys for this URL (in case they were stripped by a previous
 | 
						|
        redirect).
 | 
						|
 | 
						|
        This method also replaces the Proxy-Authorization header where
 | 
						|
        necessary.
 | 
						|
 | 
						|
        :rtype: dict
 | 
						|
        """
 | 
						|
        headers = prepared_request.headers
 | 
						|
        scheme = urlparse(prepared_request.url).scheme
 | 
						|
        new_proxies = resolve_proxies(prepared_request, proxies, self.trust_env)
 | 
						|
 | 
						|
        if "Proxy-Authorization" in headers:
 | 
						|
            del headers["Proxy-Authorization"]
 | 
						|
 | 
						|
        try:
 | 
						|
            username, password = get_auth_from_url(new_proxies[scheme])
 | 
						|
        except KeyError:
 | 
						|
            username, password = None, None
 | 
						|
 | 
						|
        # urllib3 handles proxy authorization for us in the standard adapter.
 | 
						|
        # Avoid appending this to TLS tunneled requests where it may be leaked.
 | 
						|
        if not scheme.startswith("https") and username and password:
 | 
						|
            headers["Proxy-Authorization"] = _basic_auth_str(username, password)
 | 
						|
 | 
						|
        return new_proxies
 | 
						|
 | 
						|
    def rebuild_method(self, prepared_request, response):
 | 
						|
        """When being redirected we may want to change the method of the request
 | 
						|
        based on certain specs or browser behavior.
 | 
						|
        """
 | 
						|
        method = prepared_request.method
 | 
						|
 | 
						|
        # https://tools.ietf.org/html/rfc7231#section-6.4.4
 | 
						|
        if response.status_code == codes.see_other and method != "HEAD":
 | 
						|
            method = "GET"
 | 
						|
 | 
						|
        # Do what the browsers do, despite standards...
 | 
						|
        # First, turn 302s into GETs.
 | 
						|
        if response.status_code == codes.found and method != "HEAD":
 | 
						|
            method = "GET"
 | 
						|
 | 
						|
        # Second, if a POST is responded to with a 301, turn it into a GET.
 | 
						|
        # This bizarre behaviour is explained in Issue 1704.
 | 
						|
        if response.status_code == codes.moved and method == "POST":
 | 
						|
            method = "GET"
 | 
						|
 | 
						|
        prepared_request.method = method
 | 
						|
 | 
						|
 | 
						|
class Session(SessionRedirectMixin):
 | 
						|
    """A Requests session.
 | 
						|
 | 
						|
    Provides cookie persistence, connection-pooling, and configuration.
 | 
						|
 | 
						|
    Basic Usage::
 | 
						|
 | 
						|
      >>> import requests
 | 
						|
      >>> s = requests.Session()
 | 
						|
      >>> s.get('https://httpbin.org/get')
 | 
						|
      <Response [200]>
 | 
						|
 | 
						|
    Or as a context manager::
 | 
						|
 | 
						|
      >>> with requests.Session() as s:
 | 
						|
      ...     s.get('https://httpbin.org/get')
 | 
						|
      <Response [200]>
 | 
						|
    """
 | 
						|
 | 
						|
    __attrs__ = [
 | 
						|
        "headers",
 | 
						|
        "cookies",
 | 
						|
        "auth",
 | 
						|
        "proxies",
 | 
						|
        "hooks",
 | 
						|
        "params",
 | 
						|
        "verify",
 | 
						|
        "cert",
 | 
						|
        "adapters",
 | 
						|
        "stream",
 | 
						|
        "trust_env",
 | 
						|
        "max_redirects",
 | 
						|
    ]
 | 
						|
 | 
						|
    def __init__(self):
 | 
						|
        #: A case-insensitive dictionary of headers to be sent on each
 | 
						|
        #: :class:`Request <Request>` sent from this
 | 
						|
        #: :class:`Session <Session>`.
 | 
						|
        self.headers = default_headers()
 | 
						|
 | 
						|
        #: Default Authentication tuple or object to attach to
 | 
						|
        #: :class:`Request <Request>`.
 | 
						|
        self.auth = None
 | 
						|
 | 
						|
        #: Dictionary mapping protocol or protocol and host to the URL of the proxy
 | 
						|
        #: (e.g. {'http': 'foo.bar:3128', 'http://host.name': 'foo.bar:4012'}) to
 | 
						|
        #: be used on each :class:`Request <Request>`.
 | 
						|
        self.proxies = {}
 | 
						|
 | 
						|
        #: Event-handling hooks.
 | 
						|
        self.hooks = default_hooks()
 | 
						|
 | 
						|
        #: Dictionary of querystring data to attach to each
 | 
						|
        #: :class:`Request <Request>`. The dictionary values may be lists for
 | 
						|
        #: representing multivalued query parameters.
 | 
						|
        self.params = {}
 | 
						|
 | 
						|
        #: Stream response content default.
 | 
						|
        self.stream = False
 | 
						|
 | 
						|
        #: SSL Verification default.
 | 
						|
        #: Defaults to `True`, requiring requests to verify the TLS certificate at the
 | 
						|
        #: remote end.
 | 
						|
        #: If verify is set to `False`, requests will accept any TLS certificate
 | 
						|
        #: presented by the server, and will ignore hostname mismatches and/or
 | 
						|
        #: expired certificates, which will make your application vulnerable to
 | 
						|
        #: man-in-the-middle (MitM) attacks.
 | 
						|
        #: Only set this to `False` for testing.
 | 
						|
        self.verify = True
 | 
						|
 | 
						|
        #: SSL client certificate default, if String, path to ssl client
 | 
						|
        #: cert file (.pem). If Tuple, ('cert', 'key') pair.
 | 
						|
        self.cert = None
 | 
						|
 | 
						|
        #: Maximum number of redirects allowed. If the request exceeds this
 | 
						|
        #: limit, a :class:`TooManyRedirects` exception is raised.
 | 
						|
        #: This defaults to requests.models.DEFAULT_REDIRECT_LIMIT, which is
 | 
						|
        #: 30.
 | 
						|
        self.max_redirects = DEFAULT_REDIRECT_LIMIT
 | 
						|
 | 
						|
        #: Trust environment settings for proxy configuration, default
 | 
						|
        #: authentication and similar.
 | 
						|
        self.trust_env = True
 | 
						|
 | 
						|
        #: A CookieJar containing all currently outstanding cookies set on this
 | 
						|
        #: session. By default it is a
 | 
						|
        #: :class:`RequestsCookieJar <requests.cookies.RequestsCookieJar>`, but
 | 
						|
        #: may be any other ``cookielib.CookieJar`` compatible object.
 | 
						|
        self.cookies = cookiejar_from_dict({})
 | 
						|
 | 
						|
        # Default connection adapters.
 | 
						|
        self.adapters = OrderedDict()
 | 
						|
        self.mount("https://", HTTPAdapter())
 | 
						|
        self.mount("http://", HTTPAdapter())
 | 
						|
 | 
						|
    def __enter__(self):
 | 
						|
        return self
 | 
						|
 | 
						|
    def __exit__(self, *args):
 | 
						|
        self.close()
 | 
						|
 | 
						|
    def prepare_request(self, request):
 | 
						|
        """Constructs a :class:`PreparedRequest <PreparedRequest>` for
 | 
						|
        transmission and returns it. The :class:`PreparedRequest` has settings
 | 
						|
        merged from the :class:`Request <Request>` instance and those of the
 | 
						|
        :class:`Session`.
 | 
						|
 | 
						|
        :param request: :class:`Request` instance to prepare with this
 | 
						|
            session's settings.
 | 
						|
        :rtype: requests.PreparedRequest
 | 
						|
        """
 | 
						|
        cookies = request.cookies or {}
 | 
						|
 | 
						|
        # Bootstrap CookieJar.
 | 
						|
        if not isinstance(cookies, cookielib.CookieJar):
 | 
						|
            cookies = cookiejar_from_dict(cookies)
 | 
						|
 | 
						|
        # Merge with session cookies
 | 
						|
        merged_cookies = merge_cookies(
 | 
						|
            merge_cookies(RequestsCookieJar(), self.cookies), cookies
 | 
						|
        )
 | 
						|
 | 
						|
        # Set environment's basic authentication if not explicitly set.
 | 
						|
        auth = request.auth
 | 
						|
        if self.trust_env and not auth and not self.auth:
 | 
						|
            auth = get_netrc_auth(request.url)
 | 
						|
 | 
						|
        p = PreparedRequest()
 | 
						|
        p.prepare(
 | 
						|
            method=request.method.upper(),
 | 
						|
            url=request.url,
 | 
						|
            files=request.files,
 | 
						|
            data=request.data,
 | 
						|
            json=request.json,
 | 
						|
            headers=merge_setting(
 | 
						|
                request.headers, self.headers, dict_class=CaseInsensitiveDict
 | 
						|
            ),
 | 
						|
            params=merge_setting(request.params, self.params),
 | 
						|
            auth=merge_setting(auth, self.auth),
 | 
						|
            cookies=merged_cookies,
 | 
						|
            hooks=merge_hooks(request.hooks, self.hooks),
 | 
						|
        )
 | 
						|
        return p
 | 
						|
 | 
						|
    def request(
 | 
						|
        self,
 | 
						|
        method,
 | 
						|
        url,
 | 
						|
        params=None,
 | 
						|
        data=None,
 | 
						|
        headers=None,
 | 
						|
        cookies=None,
 | 
						|
        files=None,
 | 
						|
        auth=None,
 | 
						|
        timeout=None,
 | 
						|
        allow_redirects=True,
 | 
						|
        proxies=None,
 | 
						|
        hooks=None,
 | 
						|
        stream=None,
 | 
						|
        verify=None,
 | 
						|
        cert=None,
 | 
						|
        json=None,
 | 
						|
    ):
 | 
						|
        """Constructs a :class:`Request <Request>`, prepares it and sends it.
 | 
						|
        Returns :class:`Response <Response>` object.
 | 
						|
 | 
						|
        :param method: method for the new :class:`Request` object.
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param params: (optional) Dictionary or bytes to be sent in the query
 | 
						|
            string for the :class:`Request`.
 | 
						|
        :param data: (optional) Dictionary, list of tuples, bytes, or file-like
 | 
						|
            object to send in the body of the :class:`Request`.
 | 
						|
        :param json: (optional) json to send in the body of the
 | 
						|
            :class:`Request`.
 | 
						|
        :param headers: (optional) Dictionary of HTTP Headers to send with the
 | 
						|
            :class:`Request`.
 | 
						|
        :param cookies: (optional) Dict or CookieJar object to send with the
 | 
						|
            :class:`Request`.
 | 
						|
        :param files: (optional) Dictionary of ``'filename': file-like-objects``
 | 
						|
            for multipart encoding upload.
 | 
						|
        :param auth: (optional) Auth tuple or callable to enable
 | 
						|
            Basic/Digest/Custom HTTP Auth.
 | 
						|
        :param timeout: (optional) How many seconds to wait for the server to send
 | 
						|
            data before giving up, as a float, or a :ref:`(connect timeout,
 | 
						|
            read timeout) <timeouts>` tuple.
 | 
						|
        :type timeout: float or tuple
 | 
						|
        :param allow_redirects: (optional) Set to True by default.
 | 
						|
        :type allow_redirects: bool
 | 
						|
        :param proxies: (optional) Dictionary mapping protocol or protocol and
 | 
						|
            hostname to the URL of the proxy.
 | 
						|
        :param hooks: (optional) Dictionary mapping hook name to one event or
 | 
						|
            list of events, event must be callable.
 | 
						|
        :param stream: (optional) whether to immediately download the response
 | 
						|
            content. Defaults to ``False``.
 | 
						|
        :param verify: (optional) Either a boolean, in which case it controls whether we verify
 | 
						|
            the server's TLS certificate, or a string, in which case it must be a path
 | 
						|
            to a CA bundle to use. Defaults to ``True``. When set to
 | 
						|
            ``False``, requests will accept any TLS certificate presented by
 | 
						|
            the server, and will ignore hostname mismatches and/or expired
 | 
						|
            certificates, which will make your application vulnerable to
 | 
						|
            man-in-the-middle (MitM) attacks. Setting verify to ``False``
 | 
						|
            may be useful during local development or testing.
 | 
						|
        :param cert: (optional) if String, path to ssl client cert file (.pem).
 | 
						|
            If Tuple, ('cert', 'key') pair.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
        # Create the Request.
 | 
						|
        req = Request(
 | 
						|
            method=method.upper(),
 | 
						|
            url=url,
 | 
						|
            headers=headers,
 | 
						|
            files=files,
 | 
						|
            data=data or {},
 | 
						|
            json=json,
 | 
						|
            params=params or {},
 | 
						|
            auth=auth,
 | 
						|
            cookies=cookies,
 | 
						|
            hooks=hooks,
 | 
						|
        )
 | 
						|
        prep = self.prepare_request(req)
 | 
						|
 | 
						|
        proxies = proxies or {}
 | 
						|
 | 
						|
        settings = self.merge_environment_settings(
 | 
						|
            prep.url, proxies, stream, verify, cert
 | 
						|
        )
 | 
						|
 | 
						|
        # Send the request.
 | 
						|
        send_kwargs = {
 | 
						|
            "timeout": timeout,
 | 
						|
            "allow_redirects": allow_redirects,
 | 
						|
        }
 | 
						|
        send_kwargs.update(settings)
 | 
						|
        resp = self.send(prep, **send_kwargs)
 | 
						|
 | 
						|
        return resp
 | 
						|
 | 
						|
    def get(self, url, **kwargs):
 | 
						|
        r"""Sends a GET request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        kwargs.setdefault("allow_redirects", True)
 | 
						|
        return self.request("GET", url, **kwargs)
 | 
						|
 | 
						|
    def options(self, url, **kwargs):
 | 
						|
        r"""Sends a OPTIONS request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        kwargs.setdefault("allow_redirects", True)
 | 
						|
        return self.request("OPTIONS", url, **kwargs)
 | 
						|
 | 
						|
    def head(self, url, **kwargs):
 | 
						|
        r"""Sends a HEAD request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        kwargs.setdefault("allow_redirects", False)
 | 
						|
        return self.request("HEAD", url, **kwargs)
 | 
						|
 | 
						|
    def post(self, url, data=None, json=None, **kwargs):
 | 
						|
        r"""Sends a POST request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param data: (optional) Dictionary, list of tuples, bytes, or file-like
 | 
						|
            object to send in the body of the :class:`Request`.
 | 
						|
        :param json: (optional) json to send in the body of the :class:`Request`.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        return self.request("POST", url, data=data, json=json, **kwargs)
 | 
						|
 | 
						|
    def put(self, url, data=None, **kwargs):
 | 
						|
        r"""Sends a PUT request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param data: (optional) Dictionary, list of tuples, bytes, or file-like
 | 
						|
            object to send in the body of the :class:`Request`.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        return self.request("PUT", url, data=data, **kwargs)
 | 
						|
 | 
						|
    def patch(self, url, data=None, **kwargs):
 | 
						|
        r"""Sends a PATCH request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param data: (optional) Dictionary, list of tuples, bytes, or file-like
 | 
						|
            object to send in the body of the :class:`Request`.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        return self.request("PATCH", url, data=data, **kwargs)
 | 
						|
 | 
						|
    def delete(self, url, **kwargs):
 | 
						|
        r"""Sends a DELETE request. Returns :class:`Response` object.
 | 
						|
 | 
						|
        :param url: URL for the new :class:`Request` object.
 | 
						|
        :param \*\*kwargs: Optional arguments that ``request`` takes.
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
 | 
						|
        return self.request("DELETE", url, **kwargs)
 | 
						|
 | 
						|
    def send(self, request, **kwargs):
 | 
						|
        """Send a given PreparedRequest.
 | 
						|
 | 
						|
        :rtype: requests.Response
 | 
						|
        """
 | 
						|
        # Set defaults that the hooks can utilize to ensure they always have
 | 
						|
        # the correct parameters to reproduce the previous request.
 | 
						|
        kwargs.setdefault("stream", self.stream)
 | 
						|
        kwargs.setdefault("verify", self.verify)
 | 
						|
        kwargs.setdefault("cert", self.cert)
 | 
						|
        if "proxies" not in kwargs:
 | 
						|
            kwargs["proxies"] = resolve_proxies(request, self.proxies, self.trust_env)
 | 
						|
 | 
						|
        # It's possible that users might accidentally send a Request object.
 | 
						|
        # Guard against that specific failure case.
 | 
						|
        if isinstance(request, Request):
 | 
						|
            raise ValueError("You can only send PreparedRequests.")
 | 
						|
 | 
						|
        # Set up variables needed for resolve_redirects and dispatching of hooks
 | 
						|
        allow_redirects = kwargs.pop("allow_redirects", True)
 | 
						|
        stream = kwargs.get("stream")
 | 
						|
        hooks = request.hooks
 | 
						|
 | 
						|
        # Get the appropriate adapter to use
 | 
						|
        adapter = self.get_adapter(url=request.url)
 | 
						|
 | 
						|
        # Start time (approximately) of the request
 | 
						|
        start = preferred_clock()
 | 
						|
 | 
						|
        # Send the request
 | 
						|
        r = adapter.send(request, **kwargs)
 | 
						|
 | 
						|
        # Total elapsed time of the request (approximately)
 | 
						|
        elapsed = preferred_clock() - start
 | 
						|
        r.elapsed = timedelta(seconds=elapsed)
 | 
						|
 | 
						|
        # Response manipulation hooks
 | 
						|
        r = dispatch_hook("response", hooks, r, **kwargs)
 | 
						|
 | 
						|
        # Persist cookies
 | 
						|
        if r.history:
 | 
						|
            # If the hooks create history then we want those cookies too
 | 
						|
            for resp in r.history:
 | 
						|
                extract_cookies_to_jar(self.cookies, resp.request, resp.raw)
 | 
						|
 | 
						|
        extract_cookies_to_jar(self.cookies, request, r.raw)
 | 
						|
 | 
						|
        # Resolve redirects if allowed.
 | 
						|
        if allow_redirects:
 | 
						|
            # Redirect resolving generator.
 | 
						|
            gen = self.resolve_redirects(r, request, **kwargs)
 | 
						|
            history = [resp for resp in gen]
 | 
						|
        else:
 | 
						|
            history = []
 | 
						|
 | 
						|
        # Shuffle things around if there's history.
 | 
						|
        if history:
 | 
						|
            # Insert the first (original) request at the start
 | 
						|
            history.insert(0, r)
 | 
						|
            # Get the last request made
 | 
						|
            r = history.pop()
 | 
						|
            r.history = history
 | 
						|
 | 
						|
        # If redirects aren't being followed, store the response on the Request for Response.next().
 | 
						|
        if not allow_redirects:
 | 
						|
            try:
 | 
						|
                r._next = next(
 | 
						|
                    self.resolve_redirects(r, request, yield_requests=True, **kwargs)
 | 
						|
                )
 | 
						|
            except StopIteration:
 | 
						|
                pass
 | 
						|
 | 
						|
        if not stream:
 | 
						|
            r.content
 | 
						|
 | 
						|
        return r
 | 
						|
 | 
						|
    def merge_environment_settings(self, url, proxies, stream, verify, cert):
 | 
						|
        """
 | 
						|
        Check the environment and merge it with some settings.
 | 
						|
 | 
						|
        :rtype: dict
 | 
						|
        """
 | 
						|
        # Gather clues from the surrounding environment.
 | 
						|
        if self.trust_env:
 | 
						|
            # Set environment's proxies.
 | 
						|
            no_proxy = proxies.get("no_proxy") if proxies is not None else None
 | 
						|
            env_proxies = get_environ_proxies(url, no_proxy=no_proxy)
 | 
						|
            for k, v in env_proxies.items():
 | 
						|
                proxies.setdefault(k, v)
 | 
						|
 | 
						|
            # Look for requests environment configuration
 | 
						|
            # and be compatible with cURL.
 | 
						|
            if verify is True or verify is None:
 | 
						|
                verify = (
 | 
						|
                    os.environ.get("REQUESTS_CA_BUNDLE")
 | 
						|
                    or os.environ.get("CURL_CA_BUNDLE")
 | 
						|
                    or verify
 | 
						|
                )
 | 
						|
 | 
						|
        # Merge all the kwargs.
 | 
						|
        proxies = merge_setting(proxies, self.proxies)
 | 
						|
        stream = merge_setting(stream, self.stream)
 | 
						|
        verify = merge_setting(verify, self.verify)
 | 
						|
        cert = merge_setting(cert, self.cert)
 | 
						|
 | 
						|
        return {"proxies": proxies, "stream": stream, "verify": verify, "cert": cert}
 | 
						|
 | 
						|
    def get_adapter(self, url):
 | 
						|
        """
 | 
						|
        Returns the appropriate connection adapter for the given URL.
 | 
						|
 | 
						|
        :rtype: requests.adapters.BaseAdapter
 | 
						|
        """
 | 
						|
        for prefix, adapter in self.adapters.items():
 | 
						|
            if url.lower().startswith(prefix.lower()):
 | 
						|
                return adapter
 | 
						|
 | 
						|
        # Nothing matches :-/
 | 
						|
        raise InvalidSchema(f"No connection adapters were found for {url!r}")
 | 
						|
 | 
						|
    def close(self):
 | 
						|
        """Closes all adapters and as such the session"""
 | 
						|
        for v in self.adapters.values():
 | 
						|
            v.close()
 | 
						|
 | 
						|
    def mount(self, prefix, adapter):
 | 
						|
        """Registers a connection adapter to a prefix.
 | 
						|
 | 
						|
        Adapters are sorted in descending order by prefix length.
 | 
						|
        """
 | 
						|
        self.adapters[prefix] = adapter
 | 
						|
        keys_to_move = [k for k in self.adapters if len(k) < len(prefix)]
 | 
						|
 | 
						|
        for key in keys_to_move:
 | 
						|
            self.adapters[key] = self.adapters.pop(key)
 | 
						|
 | 
						|
    def __getstate__(self):
 | 
						|
        state = {attr: getattr(self, attr, None) for attr in self.__attrs__}
 | 
						|
        return state
 | 
						|
 | 
						|
    def __setstate__(self, state):
 | 
						|
        for attr, value in state.items():
 | 
						|
            setattr(self, attr, value)
 | 
						|
 | 
						|
 | 
						|
def session():
 | 
						|
    """
 | 
						|
    Returns a :class:`Session` for context-management.
 | 
						|
 | 
						|
    .. deprecated:: 1.0.0
 | 
						|
 | 
						|
        This method has been deprecated since version 1.0.0 and is only kept for
 | 
						|
        backwards compatibility. New code should use :class:`~requests.sessions.Session`
 | 
						|
        to create a session. This may be removed at a future date.
 | 
						|
 | 
						|
    :rtype: Session
 | 
						|
    """
 | 
						|
    return Session()
 |