Index: third_party/requests/auth.py |
diff --git a/third_party/requests/auth.py b/third_party/requests/auth.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..fab05cf3bce29288863102e3e8bbd9bf36113493 |
--- /dev/null |
+++ b/third_party/requests/auth.py |
@@ -0,0 +1,177 @@ |
+# -*- coding: utf-8 -*- |
+ |
+""" |
+requests.auth |
+~~~~~~~~~~~~~ |
+ |
+This module contains the authentication handlers for Requests. |
+""" |
+ |
+import os |
+import re |
+import time |
+import hashlib |
+import logging |
+ |
+from base64 import b64encode |
+ |
+from .compat import urlparse, str |
+from .utils import parse_dict_header |
+ |
+ |
+log = logging.getLogger(__name__) |
+ |
+CONTENT_TYPE_FORM_URLENCODED = 'application/x-www-form-urlencoded' |
+CONTENT_TYPE_MULTI_PART = 'multipart/form-data' |
+ |
+ |
+def _basic_auth_str(username, password): |
+ """Returns a Basic Auth string.""" |
+ |
+ return 'Basic ' + b64encode(('%s:%s' % (username, password)).encode('latin1')).strip().decode('latin1') |
+ |
+ |
+class AuthBase(object): |
+ """Base class that all auth implementations derive from""" |
+ |
+ def __call__(self, r): |
+ raise NotImplementedError('Auth hooks must be callable.') |
+ |
+ |
+class HTTPBasicAuth(AuthBase): |
+ """Attaches HTTP Basic Authentication to the given Request object.""" |
+ def __init__(self, username, password): |
+ self.username = username |
+ self.password = password |
+ |
+ def __call__(self, r): |
+ r.headers['Authorization'] = _basic_auth_str(self.username, self.password) |
+ return r |
+ |
+ |
+class HTTPProxyAuth(HTTPBasicAuth): |
+ """Attaches HTTP Proxy Authentication to a given Request object.""" |
+ def __call__(self, r): |
+ r.headers['Proxy-Authorization'] = _basic_auth_str(self.username, self.password) |
+ return r |
+ |
+ |
+class HTTPDigestAuth(AuthBase): |
+ """Attaches HTTP Digest Authentication to the given Request object.""" |
+ def __init__(self, username, password): |
+ self.username = username |
+ self.password = password |
+ self.last_nonce = '' |
+ self.nonce_count = 0 |
+ self.chal = {} |
+ |
+ def build_digest_header(self, method, url): |
+ |
+ realm = self.chal['realm'] |
+ nonce = self.chal['nonce'] |
+ qop = self.chal.get('qop') |
+ algorithm = self.chal.get('algorithm') |
+ opaque = self.chal.get('opaque') |
+ |
+ if algorithm is None: |
+ _algorithm = 'MD5' |
+ else: |
+ _algorithm = algorithm.upper() |
+ # lambdas assume digest modules are imported at the top level |
+ if _algorithm == 'MD5': |
+ def md5_utf8(x): |
+ if isinstance(x, str): |
+ x = x.encode('utf-8') |
+ return hashlib.md5(x).hexdigest() |
+ hash_utf8 = md5_utf8 |
+ elif _algorithm == 'SHA': |
+ def sha_utf8(x): |
+ if isinstance(x, str): |
+ x = x.encode('utf-8') |
+ return hashlib.sha1(x).hexdigest() |
+ hash_utf8 = sha_utf8 |
+ # XXX MD5-sess |
+ KD = lambda s, d: hash_utf8("%s:%s" % (s, d)) |
+ |
+ if hash_utf8 is None: |
+ return None |
+ |
+ # XXX not implemented yet |
+ entdig = None |
+ p_parsed = urlparse(url) |
+ path = p_parsed.path |
+ if p_parsed.query: |
+ path += '?' + p_parsed.query |
+ |
+ A1 = '%s:%s:%s' % (self.username, realm, self.password) |
+ A2 = '%s:%s' % (method, path) |
+ |
+ if qop == 'auth': |
+ if nonce == self.last_nonce: |
+ self.nonce_count += 1 |
+ else: |
+ self.nonce_count = 1 |
+ |
+ ncvalue = '%08x' % self.nonce_count |
+ s = str(self.nonce_count).encode('utf-8') |
+ s += nonce.encode('utf-8') |
+ s += time.ctime().encode('utf-8') |
+ s += os.urandom(8) |
+ |
+ cnonce = (hashlib.sha1(s).hexdigest()[:16]) |
+ noncebit = "%s:%s:%s:%s:%s" % (nonce, ncvalue, cnonce, qop, hash_utf8(A2)) |
+ respdig = KD(hash_utf8(A1), noncebit) |
+ elif qop is None: |
+ respdig = KD(hash_utf8(A1), "%s:%s" % (nonce, hash_utf8(A2))) |
+ else: |
+ # XXX handle auth-int. |
+ return None |
+ |
+ self.last_nonce = nonce |
+ |
+ # XXX should the partial digests be encoded too? |
+ base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \ |
+ 'response="%s"' % (self.username, realm, nonce, path, respdig) |
+ if opaque: |
+ base += ', opaque="%s"' % opaque |
+ if algorithm: |
+ base += ', algorithm="%s"' % algorithm |
+ if entdig: |
+ base += ', digest="%s"' % entdig |
+ if qop: |
+ base += ', qop=auth, nc=%s, cnonce="%s"' % (ncvalue, cnonce) |
+ |
+ return 'Digest %s' % (base) |
+ |
+ def handle_401(self, r, **kwargs): |
+ """Takes the given response and tries digest-auth, if needed.""" |
+ |
+ num_401_calls = getattr(self, 'num_401_calls', 1) |
+ s_auth = r.headers.get('www-authenticate', '') |
+ |
+ if 'digest' in s_auth.lower() and num_401_calls < 2: |
+ |
+ setattr(self, 'num_401_calls', num_401_calls + 1) |
+ pat = re.compile(r'digest ', flags=re.IGNORECASE) |
+ self.chal = parse_dict_header(pat.sub('', s_auth, count=1)) |
+ |
+ # Consume content and release the original connection |
+ # to allow our new request to reuse the same one. |
+ r.content |
+ r.raw.release_conn() |
+ |
+ r.request.headers['Authorization'] = self.build_digest_header(r.request.method, r.request.url) |
+ _r = r.connection.send(r.request, **kwargs) |
+ _r.history.append(r) |
+ |
+ return _r |
+ |
+ setattr(self, 'num_401_calls', 1) |
+ return r |
+ |
+ def __call__(self, r): |
+ # If we have a saved nonce, skip the 401 |
+ if self.last_nonce: |
+ r.headers['Authorization'] = self.build_digest_header(r.method, r.url) |
+ r.register_hook('response', self.handle_401) |
+ return r |