123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103 |
- # -*- coding: utf-8 -*-
- """The module containing HTTPProxyDigestAuth."""
- import re
- from requests import cookies, utils
- from . import _digest_auth_compat as auth
- class HTTPProxyDigestAuth(auth.HTTPDigestAuth):
- """HTTP digest authentication between proxy
- :param stale_rejects: The number of rejects indicate that:
- the client may wish to simply retry the request
- with a new encrypted response, without reprompting the user for a
- new username and password. i.e., retry build_digest_header
- :type stale_rejects: int
- """
- _pat = re.compile(r'digest ', flags=re.IGNORECASE)
- def __init__(self, *args, **kwargs):
- super(HTTPProxyDigestAuth, self).__init__(*args, **kwargs)
- self.stale_rejects = 0
- self.init_per_thread_state()
- @property
- def stale_rejects(self):
- thread_local = getattr(self, '_thread_local', None)
- if thread_local is None:
- return self._stale_rejects
- return thread_local.stale_rejects
- @stale_rejects.setter
- def stale_rejects(self, value):
- thread_local = getattr(self, '_thread_local', None)
- if thread_local is None:
- self._stale_rejects = value
- else:
- thread_local.stale_rejects = value
- def init_per_thread_state(self):
- try:
- super(HTTPProxyDigestAuth, self).init_per_thread_state()
- except AttributeError:
- # If we're not on requests 2.8.0+ this method does not exist
- pass
- def handle_407(self, r, **kwargs):
- """Handle HTTP 407 only once, otherwise give up
- :param r: current response
- :returns: responses, along with the new response
- """
- if r.status_code == 407 and self.stale_rejects < 2:
- s_auth = r.headers.get("proxy-authenticate")
- if s_auth is None:
- raise IOError(
- "proxy server violated RFC 7235:"
- "407 response MUST contain header proxy-authenticate")
- elif not self._pat.match(s_auth):
- return r
- self.chal = utils.parse_dict_header(
- self._pat.sub('', s_auth, count=1))
- # if we present the user/passwd and still get rejected
- # http://tools.ietf.org/html/rfc2617#section-3.2.1
- if ('Proxy-Authorization' in r.request.headers and
- 'stale' in self.chal):
- if self.chal['stale'].lower() == 'true': # try again
- self.stale_rejects += 1
- # wrong user/passwd
- elif self.chal['stale'].lower() == 'false':
- raise IOError("User or password is invalid")
- # Consume content and release the original connection
- # to allow our new request to reuse the same one.
- r.content
- r.close()
- prep = r.request.copy()
- cookies.extract_cookies_to_jar(prep._cookies, r.request, r.raw)
- prep.prepare_cookies(prep._cookies)
- prep.headers['Proxy-Authorization'] = self.build_digest_header(
- prep.method, prep.url)
- _r = r.connection.send(prep, **kwargs)
- _r.history.append(r)
- _r.request = prep
- return _r
- else: # give up authenticate
- return r
- def __call__(self, r):
- self.init_per_thread_state()
- # if we have nonce, then just use it, otherwise server will tell us
- if self.last_nonce:
- r.headers['Proxy-Authorization'] = self.build_digest_header(
- r.method, r.url
- )
- r.register_hook('response', self.handle_407)
- return r
|