| Index: third_party/google-endpoints/requests/auth.py
|
| diff --git a/third_party/google-endpoints/requests/auth.py b/third_party/google-endpoints/requests/auth.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..510846d698cdbf001bd9086d17fad468ec599c8d
|
| --- /dev/null
|
| +++ b/third_party/google-endpoints/requests/auth.py
|
| @@ -0,0 +1,288 @@
|
| +# -*- coding: utf-8 -*-
|
| +
|
| +"""
|
| +requests.auth
|
| +~~~~~~~~~~~~~
|
| +
|
| +This module contains the authentication handlers for Requests.
|
| +"""
|
| +
|
| +import os
|
| +import re
|
| +import time
|
| +import hashlib
|
| +import threading
|
| +import warnings
|
| +
|
| +from base64 import b64encode
|
| +
|
| +from .compat import urlparse, str, basestring
|
| +from .cookies import extract_cookies_to_jar
|
| +from ._internal_utils import to_native_string
|
| +from .utils import parse_dict_header
|
| +from .status_codes import codes
|
| +
|
| +CONTENT_TYPE_FORM_URLENCODED = 'application/x-www-form-urlencoded'
|
| +CONTENT_TYPE_MULTI_PART = 'multipart/form-data'
|
| +
|
| +
|
| +def _basic_auth_str(username, password):
|
| + """Returns a Basic Auth string."""
|
| +
|
| + # "I want us to put a big-ol' comment on top of it that
|
| + # says that this behaviour is dumb but we need to preserve
|
| + # it because people are relying on it."
|
| + # - Lukasa
|
| + #
|
| + # These are here solely to maintain backwards compatibility
|
| + # for things like ints. This will be removed in 3.0.0.
|
| + if not isinstance(username, basestring):
|
| + warnings.warn(
|
| + "Non-string usernames will no longer be supported in Requests "
|
| + "3.0.0. Please convert the object you've passed in ({0!r}) to "
|
| + "a string or bytes object in the near future to avoid "
|
| + "problems.".format(username),
|
| + category=DeprecationWarning,
|
| + )
|
| + username = str(username)
|
| +
|
| + if not isinstance(password, basestring):
|
| + warnings.warn(
|
| + "Non-string passwords will no longer be supported in Requests "
|
| + "3.0.0. Please convert the object you've passed in ({0!r}) to "
|
| + "a string or bytes object in the near future to avoid "
|
| + "problems.".format(password),
|
| + category=DeprecationWarning,
|
| + )
|
| + password = str(password)
|
| + # -- End Removal --
|
| +
|
| + if isinstance(username, str):
|
| + username = username.encode('latin1')
|
| +
|
| + if isinstance(password, str):
|
| + password = password.encode('latin1')
|
| +
|
| + authstr = 'Basic ' + to_native_string(
|
| + b64encode(b':'.join((username, password))).strip()
|
| + )
|
| +
|
| + return authstr
|
| +
|
| +
|
| +class AuthBase(object):
|
| + """Base class that all auth implementations derive from"""
|
| +
|
| + def __call__(self, r):
|
| + raise NotImplementedError('Auth hooks must be callable.')
|
| +
|
| +
|
| +class HTTPBasicAuth(AuthBase):
|
| + """Attaches HTTP Basic Authentication to the given Request object."""
|
| +
|
| + def __init__(self, username, password):
|
| + self.username = username
|
| + self.password = password
|
| +
|
| + def __eq__(self, other):
|
| + return all([
|
| + self.username == getattr(other, 'username', None),
|
| + self.password == getattr(other, 'password', None)
|
| + ])
|
| +
|
| + def __ne__(self, other):
|
| + return not self == other
|
| +
|
| + def __call__(self, r):
|
| + r.headers['Authorization'] = _basic_auth_str(self.username, self.password)
|
| + return r
|
| +
|
| +
|
| +class HTTPProxyAuth(HTTPBasicAuth):
|
| + """Attaches HTTP Proxy Authentication to a given Request object."""
|
| +
|
| + def __call__(self, r):
|
| + r.headers['Proxy-Authorization'] = _basic_auth_str(self.username, self.password)
|
| + return r
|
| +
|
| +
|
| +class HTTPDigestAuth(AuthBase):
|
| + """Attaches HTTP Digest Authentication to the given Request object."""
|
| +
|
| + def __init__(self, username, password):
|
| + self.username = username
|
| + self.password = password
|
| + # Keep state in per-thread local storage
|
| + self._thread_local = threading.local()
|
| +
|
| + def init_per_thread_state(self):
|
| + # Ensure state is initialized just once per-thread
|
| + if not hasattr(self._thread_local, 'init'):
|
| + self._thread_local.init = True
|
| + self._thread_local.last_nonce = ''
|
| + self._thread_local.nonce_count = 0
|
| + self._thread_local.chal = {}
|
| + self._thread_local.pos = None
|
| + self._thread_local.num_401_calls = None
|
| +
|
| + def build_digest_header(self, method, url):
|
| + """
|
| + :rtype: str
|
| + """
|
| +
|
| + realm = self._thread_local.chal['realm']
|
| + nonce = self._thread_local.chal['nonce']
|
| + qop = self._thread_local.chal.get('qop')
|
| + algorithm = self._thread_local.chal.get('algorithm')
|
| + opaque = self._thread_local.chal.get('opaque')
|
| + hash_utf8 = None
|
| +
|
| + if algorithm is None:
|
| + _algorithm = 'MD5'
|
| + else:
|
| + _algorithm = algorithm.upper()
|
| + # lambdas assume digest modules are imported at the top level
|
| + if _algorithm == 'MD5' or _algorithm == 'MD5-SESS':
|
| + def md5_utf8(x):
|
| + if isinstance(x, str):
|
| + x = x.encode('utf-8')
|
| + return hashlib.md5(x).hexdigest()
|
| + hash_utf8 = md5_utf8
|
| + elif _algorithm == 'SHA':
|
| + def sha_utf8(x):
|
| + if isinstance(x, str):
|
| + x = x.encode('utf-8')
|
| + return hashlib.sha1(x).hexdigest()
|
| + hash_utf8 = sha_utf8
|
| +
|
| + KD = lambda s, d: hash_utf8("%s:%s" % (s, d))
|
| +
|
| + if hash_utf8 is None:
|
| + return None
|
| +
|
| + # XXX not implemented yet
|
| + entdig = None
|
| + p_parsed = urlparse(url)
|
| + #: path is request-uri defined in RFC 2616 which should not be empty
|
| + path = p_parsed.path or "/"
|
| + if p_parsed.query:
|
| + path += '?' + p_parsed.query
|
| +
|
| + A1 = '%s:%s:%s' % (self.username, realm, self.password)
|
| + A2 = '%s:%s' % (method, path)
|
| +
|
| + HA1 = hash_utf8(A1)
|
| + HA2 = hash_utf8(A2)
|
| +
|
| + if nonce == self._thread_local.last_nonce:
|
| + self._thread_local.nonce_count += 1
|
| + else:
|
| + self._thread_local.nonce_count = 1
|
| + ncvalue = '%08x' % self._thread_local.nonce_count
|
| + s = str(self._thread_local.nonce_count).encode('utf-8')
|
| + s += nonce.encode('utf-8')
|
| + s += time.ctime().encode('utf-8')
|
| + s += os.urandom(8)
|
| +
|
| + cnonce = (hashlib.sha1(s).hexdigest()[:16])
|
| + if _algorithm == 'MD5-SESS':
|
| + HA1 = hash_utf8('%s:%s:%s' % (HA1, nonce, cnonce))
|
| +
|
| + if not qop:
|
| + respdig = KD(HA1, "%s:%s" % (nonce, HA2))
|
| + elif qop == 'auth' or 'auth' in qop.split(','):
|
| + noncebit = "%s:%s:%s:%s:%s" % (
|
| + nonce, ncvalue, cnonce, 'auth', HA2
|
| + )
|
| + respdig = KD(HA1, noncebit)
|
| + else:
|
| + # XXX handle auth-int.
|
| + return None
|
| +
|
| + self._thread_local.last_nonce = nonce
|
| +
|
| + # XXX should the partial digests be encoded too?
|
| + base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \
|
| + 'response="%s"' % (self.username, realm, nonce, path, respdig)
|
| + if opaque:
|
| + base += ', opaque="%s"' % opaque
|
| + if algorithm:
|
| + base += ', algorithm="%s"' % algorithm
|
| + if entdig:
|
| + base += ', digest="%s"' % entdig
|
| + if qop:
|
| + base += ', qop="auth", nc=%s, cnonce="%s"' % (ncvalue, cnonce)
|
| +
|
| + return 'Digest %s' % (base)
|
| +
|
| + def handle_redirect(self, r, **kwargs):
|
| + """Reset num_401_calls counter on redirects."""
|
| + if r.is_redirect:
|
| + self._thread_local.num_401_calls = 1
|
| +
|
| + def handle_401(self, r, **kwargs):
|
| + """
|
| + Takes the given response and tries digest-auth, if needed.
|
| +
|
| + :rtype: requests.Response
|
| + """
|
| +
|
| + if self._thread_local.pos is not None:
|
| + # Rewind the file position indicator of the body to where
|
| + # it was to resend the request.
|
| + r.request.body.seek(self._thread_local.pos)
|
| + s_auth = r.headers.get('www-authenticate', '')
|
| +
|
| + if 'digest' in s_auth.lower() and self._thread_local.num_401_calls < 2:
|
| +
|
| + self._thread_local.num_401_calls += 1
|
| + pat = re.compile(r'digest ', flags=re.IGNORECASE)
|
| + self._thread_local.chal = parse_dict_header(pat.sub('', s_auth, count=1))
|
| +
|
| + # Consume content and release the original connection
|
| + # to allow our new request to reuse the same one.
|
| + r.content
|
| + r.close()
|
| + prep = r.request.copy()
|
| + extract_cookies_to_jar(prep._cookies, r.request, r.raw)
|
| + prep.prepare_cookies(prep._cookies)
|
| +
|
| + prep.headers['Authorization'] = self.build_digest_header(
|
| + prep.method, prep.url)
|
| + _r = r.connection.send(prep, **kwargs)
|
| + _r.history.append(r)
|
| + _r.request = prep
|
| +
|
| + return _r
|
| +
|
| + self._thread_local.num_401_calls = 1
|
| + return r
|
| +
|
| + def __call__(self, r):
|
| + # Initialize per-thread state, if needed
|
| + self.init_per_thread_state()
|
| + # If we have a saved nonce, skip the 401
|
| + if self._thread_local.last_nonce:
|
| + r.headers['Authorization'] = self.build_digest_header(r.method, r.url)
|
| + try:
|
| + self._thread_local.pos = r.body.tell()
|
| + except AttributeError:
|
| + # In the case of HTTPDigestAuth being reused and the body of
|
| + # the previous request was a file-like object, pos has the
|
| + # file position of the previous body. Ensure it's set to
|
| + # None.
|
| + self._thread_local.pos = None
|
| + r.register_hook('response', self.handle_401)
|
| + r.register_hook('response', self.handle_redirect)
|
| + self._thread_local.num_401_calls = 1
|
| +
|
| + return r
|
| +
|
| + def __eq__(self, other):
|
| + return all([
|
| + self.username == getattr(other, 'username', None),
|
| + self.password == getattr(other, 'password', None)
|
| + ])
|
| +
|
| + def __ne__(self, other):
|
| + return not self == other
|
|
|