1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
|
# Copyright (C) 2006 Canonical Ltd
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
"""Implementaion of urllib2 tailored to bzr needs
This file complements the urllib2 class hierarchy with custom classes.
For instance, we create a new HTTPConnection and HTTPSConnection that inherit
from the original urllib2.HTTP(s)Connection objects, but also have a new base
which implements a custom getresponse and fake_close handlers.
And then we implement custom HTTPHandler and HTTPSHandler classes, that use
the custom HTTPConnection classes.
We have a custom Response class, which lets us maintain a keep-alive
connection even for requests that urllib2 doesn't expect to contain body data.
And a custom Request class that lets us track redirections, and
handle authentication schemes.
"""
DEBUG = 0
# TODO: It may be possible to share the password_manager across
# all transports by prefixing the realm by the protocol used
# (especially if other protocols do not use realms). See
# PasswordManager below.
# FIXME: Oversimplifying, two kind of exceptions should be
# raised, once a request is issued: URLError before we have been
# able to process the response, HTTPError after that. Process the
# response means we are able to leave the socket clean, so if we
# are not able to do that, we should close the connection. The
# actual code more or less do that, tests should be written to
# ensure that.
import httplib
import md5
import sha
import socket
import urllib
import urllib2
import urlparse
import re
import sys
import time
from bzrlib import __version__ as bzrlib_version
from bzrlib import (
errors,
ui,
)
# We define our own Response class to keep our httplib pipe clean
class Response(httplib.HTTPResponse):
"""Custom HTTPResponse, to avoid the need to decorate.
httplib prefers to decorate the returned objects, rather
than using a custom object.
"""
# Some responses have bodies in which we have no interest
_body_ignored_responses = [301,302, 303, 307, 401, 403, 404]
def __init__(self, *args, **kwargs):
httplib.HTTPResponse.__init__(self, *args, **kwargs)
def begin(self):
"""Begin to read the response from the server.
httplib assumes that some responses get no content and do
not even attempt to read the body in that case, leaving
the body in the socket, blocking the next request. Let's
try to workaround that.
"""
httplib.HTTPResponse.begin(self)
if self.status in self._body_ignored_responses:
if self.debuglevel > 0:
print "For status: [%s]," % self.status,
print "will ready body, length: ",
if self.length is not None:
print "[%d]" % self.length
else:
print "None"
if not (self.length is None or self.will_close):
# In some cases, we just can't read the body not
# even try or we may encounter a 104, 'Connection
# reset by peer' error if there is indeed no body
# and the server closed the connection just after
# having issued the response headers (even if the
# headers indicate a Content-Type...)
body = self.fp.read(self.length)
if self.debuglevel > 0:
print "Consumed body: [%s]" % body
self.close()
# Not inheriting from 'object' because httplib.HTTPConnection doesn't.
class AbstractHTTPConnection:
"""A custom HTTP(S) Connection, which can reset itself on a bad response"""
response_class = Response
strict = 1 # We don't support HTTP/0.9
def fake_close(self):
"""Make the connection believes the response have been fully handled.
That makes the httplib.HTTPConnection happy
"""
# Preserve our preciousss
sock = self.sock
self.sock = None
self.close()
self.sock = sock
class HTTPConnection(AbstractHTTPConnection, httplib.HTTPConnection):
pass
class HTTPSConnection(AbstractHTTPConnection, httplib.HTTPSConnection):
pass
class Request(urllib2.Request):
"""A custom Request object.
urllib2 determines the request method heuristically (based on
the presence or absence of data). We set the method
statically.
The Request object tracks:
- the connection the request will be made on.
- the authentication parameters needed to preventively set
the authentication header once a first authentication have
been made.
"""
def __init__(self, method, url, data=None, headers={},
origin_req_host=None, unverifiable=False,
connection=None, parent=None,):
urllib2.Request.__init__(self, url, data, headers,
origin_req_host, unverifiable)
self.method = method
self.connection = connection
# To handle redirections
self.parent = parent
self.redirected_to = None
# Unless told otherwise, redirections are not followed
self.follow_redirections = False
# auth and proxy_auth are dicts containing, at least
# (scheme, url, realm, user, password).
# The dict entries are mostly handled by the AuthHandler.
# Some authentication schemes may add more entries.
self.auth = {}
self.proxy_auth = {}
def get_method(self):
return self.method
def extract_credentials(url):
"""Extracts credentials information from url.
Get user and password from url of the form: http://user:pass@host/path
:returns: (clean_url, user, password)
"""
scheme, netloc, path, query, fragment = urlparse.urlsplit(url)
if '@' in netloc:
auth, netloc = netloc.split('@', 1)
if ':' in auth:
user, password = auth.split(':', 1)
else:
user, password = auth, None
user = urllib.unquote(user)
if password is not None:
password = urllib.unquote(password)
else:
user = None
password = None
# Build the clean url
clean_url = urlparse.urlunsplit((scheme, netloc, path, query, fragment))
return clean_url, user, password
def extract_authentication_uri(url):
"""Extract the authentication uri from any url.
In the context of bzr, we simplified the authentication uri
to the host only. For the transport lifetime, we allow only
one user by realm on a given host. I.e. handling several
users for different paths for the same realm should be done
at a higher level.
"""
scheme, host, path, query, fragment = urlparse.urlsplit(url)
return '%s://%s' % (scheme, host)
# The urlib2.xxxAuthHandler handle the authentication of the
# requests, to do that, they need an urllib2 PasswordManager *at
# build time*. We also need one to reuse the passwords entered by
# the user.
class PasswordManager(urllib2.HTTPPasswordMgrWithDefaultRealm):
def __init__(self):
urllib2.HTTPPasswordMgrWithDefaultRealm.__init__(self)
class ConnectionHandler(urllib2.BaseHandler):
"""Provides connection-sharing by pre-processing requests.
urllib2 provides no way to access the HTTPConnection object
internally used. But we need it in order to achieve
connection sharing. So, we add it to the request just before
it is processed, and then we override the do_open method for
http[s] requests in AbstractHTTPHandler.
"""
handler_order = 1000 # after all pre-processings
def create_connection(self, request, http_connection_class):
host = request.get_host()
if not host:
# Just a bit of paranoia here, this should have been
# handled in the higher levels
raise errors.InvalidURL(request.get_full_url(), 'no host given.')
# We create a connection (but it will not connect yet)
try:
connection = http_connection_class(host)
except httplib.InvalidURL, exception:
# There is only one occurrence of InvalidURL in httplib
raise errors.InvalidURL(request.get_full_url(),
extra='nonnumeric port')
return connection
def capture_connection(self, request, http_connection_class):
"""Capture or inject the request connection.
Two cases:
- the request have no connection: create a new one,
- the request have a connection: this one have been used
already, let's capture it, so that we can give it to
another transport to be reused. We don't do that
ourselves: the Transport object get the connection from
a first request and then propagate it, from request to
request or to cloned transports.
"""
connection = request.connection
if connection is None:
# Create a new one
connection = self.create_connection(request, http_connection_class)
request.connection = connection
# All connections will pass here, propagate debug level
connection.set_debuglevel(DEBUG)
return request
def http_request(self, request):
return self.capture_connection(request, HTTPConnection)
def https_request(self, request):
return self.capture_connection(request, HTTPSConnection)
class AbstractHTTPHandler(urllib2.AbstractHTTPHandler):
"""A custom handler for HTTP(S) requests.
We overrive urllib2.AbstractHTTPHandler to get a better
control of the connection, the ability to implement new
request types and return a response able to cope with
persistent connections.
"""
# We change our order to be before urllib2 HTTP[S]Handlers
# and be chosen instead of them (the first http_open called
# wins).
handler_order = 400
_default_headers = {'Pragma': 'no-cache',
'Cache-control': 'max-age=0',
'Connection': 'Keep-Alive',
# FIXME: Spell it User-*A*gent once we
# know how to properly avoid bogus
# urllib2 using capitalize() for headers
# instead of title(sp?).
'User-agent': 'bzr/%s (urllib)' % bzrlib_version,
'Accept': '*/*',
}
def __init__(self):
urllib2.AbstractHTTPHandler.__init__(self, debuglevel=DEBUG)
def http_request(self, request):
"""Common headers setting"""
request.headers.update(self._default_headers.copy())
# FIXME: We may have to add the Content-Length header if
# we have data to send.
return request
def retry_or_raise(self, http_class, request, first_try):
"""Retry the request (once) or raise the exception.
urllib2 raises exception of application level kind, we
just have to translate them.
httplib can raise exceptions of transport level (badly
formatted dialog, loss of connexion or socket level
problems). In that case we should issue the request again
(httplib will close and reopen a new connection if
needed).
"""
# When an exception occurs, we give back the original
# Traceback or the bugs are hard to diagnose.
exc_type, exc_val, exc_tb = sys.exc_info()
if exc_type == socket.gaierror:
# No need to retry, that will not help
raise errors.ConnectionError("Couldn't resolve host '%s'"
% request.get_origin_req_host(),
orig_error=exc_val)
else:
if first_try:
if self._debuglevel > 0:
print 'Received exception: [%r]' % exc_val
print ' On connection: [%r]' % request.connection
method = request.get_method()
url = request.get_full_url()
print ' Will retry, %s %r' % (method, url)
request.connection.close()
response = self.do_open(http_class, request, False)
convert_to_addinfourl = False
else:
if self._debuglevel > 0:
print 'Received second exception: [%r]' % exc_val
print ' On connection: [%r]' % request.connection
if exc_type in (httplib.BadStatusLine, httplib.UnknownProtocol):
# httplib.BadStatusLine and
# httplib.UnknownProtocol indicates that a
# bogus server was encountered or a bad
# connection (i.e. transient errors) is
# experimented, we have already retried once
# for that request so we raise the exception.
my_exception = errors.InvalidHttpResponse(
request.get_full_url(),
'Bad status line received',
orig_error=exc_val)
else:
# All other exception are considered connection related.
# httplib.HTTPException should indicate a bug
# in the urllib implementation, somewhow the
# httplib pipeline is in an incorrect state,
# we retry in hope that this will correct the
# problem but that may need investigation
# (note that no such bug is known as of
# 20061005 --vila).
# socket errors generally occurs for reasons
# far outside our scope, so closing the
# connection and retrying is the best we can
# do.
# FIXME: and then there is HTTPError raised by:
# - HTTPDefaultErrorHandler (we define our own)
# - HTTPRedirectHandler.redirect_request
# - AbstractDigestAuthHandler.http_error_auth_reqed
my_exception = errors.ConnectionError(
msg= 'while sending %s %s:' % (request.get_method(),
request.get_selector()),
orig_error=exc_val)
if self._debuglevel > 0:
print 'On connection: [%r]' % request.connection
method = request.get_method()
url = request.get_full_url()
print ' Failed again, %s %r' % (method, url)
print ' Will raise: [%r]' % my_exception
raise my_exception, None, exc_tb
return response, convert_to_addinfourl
def do_open(self, http_class, request, first_try=True):
"""See urllib2.AbstractHTTPHandler.do_open for the general idea.
The request will be retried once if it fails.
"""
connection = request.connection
assert connection is not None, \
'Cannot process a request without a connection'
# Get all the headers
headers = {}
headers.update(request.header_items())
headers.update(request.unredirected_hdrs)
try:
connection._send_request(request.get_method(),
request.get_selector(),
# FIXME: implements 100-continue
#None, # We don't send the body yet
request.get_data(),
headers)
if self._debuglevel > 0:
print 'Request sent: [%r]' % request
response = connection.getresponse()
convert_to_addinfourl = True
except (socket.gaierror, httplib.BadStatusLine, httplib.UnknownProtocol,
socket.error, httplib.HTTPException):
response, convert_to_addinfourl = self.retry_or_raise(http_class,
request,
first_try)
# FIXME: HTTPConnection does not fully support 100-continue (the
# server responses are just ignored)
# if code == 100:
# mutter('Will send the body')
# # We can send the body now
# body = request.get_data()
# if body is None:
# raise URLError("No data given")
# connection.send(body)
# response = connection.getresponse()
if self._debuglevel > 0:
print 'Receives response: %r' % response
print ' For: %r(%r)' % (request.get_method(),
request.get_full_url())
if convert_to_addinfourl:
# Shamelessly copied from urllib2
req = request
r = response
r.recv = r.read
fp = socket._fileobject(r)
resp = urllib2.addinfourl(fp, r.msg, req.get_full_url())
resp.code = r.status
resp.msg = r.reason
if self._debuglevel > 0:
print 'Create addinfourl: %r' % resp
print ' For: %r(%r)' % (request.get_method(),
request.get_full_url())
else:
resp = response
return resp
# # we need titled headers in a dict but
# # response.getheaders returns a list of (lower(header).
# # Let's title that because most of bzr handle titled
# # headers, but maybe we should switch to lowercased
# # headers...
# # jam 20060908: I think we actually expect the headers to
# # be similar to mimetools.Message object, which uses
# # case insensitive keys. It lowers() all requests.
# # My concern is that the code may not do perfect title case.
# # For example, it may use Content-type rather than Content-Type
#
# # When we get rid of addinfourl, we must ensure that bzr
# # always use titled headers and that any header received
# # from server is also titled.
#
# headers = {}
# for header, value in (response.getheaders()):
# headers[header.title()] = value
# # FIXME: Implements a secured .read method
# response.code = response.status
# response.headers = headers
# return response
class HTTPHandler(AbstractHTTPHandler):
"""A custom handler that just thunks into HTTPConnection"""
def http_open(self, request):
return self.do_open(HTTPConnection, request)
class HTTPSHandler(AbstractHTTPHandler):
"""A custom handler that just thunks into HTTPSConnection"""
def https_open(self, request):
return self.do_open(HTTPSConnection, request)
class HTTPRedirectHandler(urllib2.HTTPRedirectHandler):
"""Handles redirect requests.
We have to implement our own scheme because we use a specific
Request object and because we want to implement a specific
policy.
"""
_debuglevel = DEBUG
# RFC2616 says that only read requests should be redirected
# without interacting with the user. But bzr use some
# shortcuts to optimize against roundtrips which can leads to
# write requests being issued before read requests of
# containing dirs can be redirected. So we redirect write
# requests in the same way which seems to respect the spirit
# of the RFC if not its letter.
def redirect_request(self, req, fp, code, msg, headers, newurl):
"""See urllib2.HTTPRedirectHandler.redirect_request"""
# We would have preferred to update the request instead
# of creating a new one, but the urllib2.Request object
# has a too complicated creation process to provide a
# simple enough equivalent update process. Instead, when
# redirecting, we only update the following request in
# the redirect chain with a reference to the parent
# request .
# Some codes make no sense in our context and are treated
# as errors:
# 300: Multiple choices for different representations of
# the URI. Using that mechanisn with bzr will violate the
# protocol neutrality of Transport.
# 304: Not modified (SHOULD only occurs with conditional
# GETs which are not used by our implementation)
# 305: Use proxy. I can't imagine this one occurring in
# our context-- vila/20060909
# 306: Unused (if the RFC says so...)
# If the code is 302 and the request is HEAD, some may
# think that it is a sufficent hint that the file exists
# and that we MAY avoid following the redirections. But
# if we want to be sure, we MUST follow them.
if code in (301, 302, 303, 307):
return Request(req.get_method(),newurl,
headers = req.headers,
origin_req_host = req.get_origin_req_host(),
unverifiable = True,
# TODO: It will be nice to be able to
# detect virtual hosts sharing the same
# IP address, that will allow us to
# share the same connection...
connection = None,
parent = req,
)
else:
raise urllib2.HTTPError(req.get_full_url(), code, msg, headers, fp)
def http_error_302(self, req, fp, code, msg, headers):
"""Requests the redirected to URI.
Copied from urllib2 to be able to fake_close the
associated connection, *before* issuing the redirected
request but *after* having eventually raised an error.
"""
# Some servers (incorrectly) return multiple Location headers
# (so probably same goes for URI). Use first header.
# TODO: Once we get rid of addinfourl objects, the
# following will need to be updated to use correct case
# for headers.
if 'location' in headers:
newurl = headers.getheaders('location')[0]
elif 'uri' in headers:
newurl = headers.getheaders('uri')[0]
else:
return
if self._debuglevel > 0:
print 'Redirected to: %s (followed: %r)' % (newurl,
req.follow_redirections)
if req.follow_redirections is False:
req.redirected_to = newurl
return fp
newurl = urlparse.urljoin(req.get_full_url(), newurl)
# This call succeeds or raise an error. urllib2 returns
# if redirect_request returns None, but our
# redirect_request never returns None.
redirected_req = self.redirect_request(req, fp, code, msg, headers,
newurl)
# loop detection
# .redirect_dict has a key url if url was previously visited.
if hasattr(req, 'redirect_dict'):
visited = redirected_req.redirect_dict = req.redirect_dict
if (visited.get(newurl, 0) >= self.max_repeats or
len(visited) >= self.max_redirections):
raise urllib2.HTTPError(req.get_full_url(), code,
self.inf_msg + msg, headers, fp)
else:
visited = redirected_req.redirect_dict = req.redirect_dict = {}
visited[newurl] = visited.get(newurl, 0) + 1
# We can close the fp now that we are sure that we won't
# use it with HTTPError.
fp.close()
# We have all we need already in the response
req.connection.fake_close()
return self.parent.open(redirected_req)
http_error_301 = http_error_303 = http_error_307 = http_error_302
class ProxyHandler(urllib2.ProxyHandler):
"""Handles proxy setting.
Copied and modified from urllib2 to be able to modify the
request during the request pre-processing instead of
modifying it at _open time. As we capture (or create) the
connection object during request processing, _open time was
too late.
Note that the proxy handling *may* modify the protocol used;
the request may be against an https server proxied through an
http proxy. So, https_request will be called, but later it's
really http_open that will be called. This explain why we
don't have to call self.parent.open as the urllib2 did.
"""
# Proxies must be in front
handler_order = 100
_debuglevel = DEBUG
def __init__(self, password_manager, proxies=None):
urllib2.ProxyHandler.__init__(self, proxies)
self.password_manager = password_manager
# First, let's get rid of urllib2 implementation
for type, proxy in self.proxies.items():
if self._debuglevel > 0:
print 'Will unbind %s_open for %r' % (type, proxy)
delattr(self, '%s_open' % type)
# We are interested only by the http[s] proxies
http_proxy = self.get_proxy_env_var('http')
https_proxy = self.get_proxy_env_var('https')
if http_proxy is not None:
if self._debuglevel > 0:
print 'Will bind http_request for %r' % http_proxy
setattr(self, 'http_request',
lambda request: self.set_proxy(request, 'http'))
if https_proxy is not None:
if self._debuglevel > 0:
print 'Will bind http_request for %r' % https_proxy
setattr(self, 'https_request',
lambda request: self.set_proxy(request, 'https'))
def get_proxy_env_var(self, name, default_to='all'):
"""Get a proxy env var.
Note that we indirectly rely on
urllib.getproxies_environment taking into account the
uppercased values for proxy variables.
"""
try:
return self.proxies[name.lower()]
except KeyError:
if default_to is not None:
# Try to get the alternate environment variable
try:
return self.proxies[default_to]
except KeyError:
pass
return None
def proxy_bypass(self, host):
"""Check if host should be proxied or not"""
no_proxy = self.get_proxy_env_var('no', None)
if no_proxy is None:
return False
hhost, hport = urllib.splitport(host)
# Does host match any of the domains mentioned in
# no_proxy ? The rules about what is authorized in no_proxy
# are fuzzy (to say the least). We try to allow most
# commonly seen values.
for domain in no_proxy.split(','):
dhost, dport = urllib.splitport(domain)
if hport == dport or dport is None:
# Protect glob chars
dhost = dhost.replace(".", r"\.")
dhost = dhost.replace("*", r".*")
dhost = dhost.replace("?", r".")
if re.match(dhost, hhost, re.IGNORECASE):
return True
# Nevertheless, there are platform-specific ways to
# ignore proxies...
return urllib.proxy_bypass(host)
def set_proxy(self, request, type):
if self.proxy_bypass(request.get_host()):
return request
proxy = self.get_proxy_env_var(type)
if self._debuglevel > 0:
print 'set_proxy %s_request for %r' % (type, proxy)
# Extract credentials from the url and store them in the
# password manager so that the proxy AuthHandler can use
# them later.
proxy, user, password = extract_credentials(proxy)
if request.proxy_auth == {}:
# No proxy auth parameter are available, we are
# handling the first proxied request, intialize.
# scheme and realm will be set by the AuthHandler
authuri = extract_authentication_uri(proxy)
request.proxy_auth = {'user': user, 'password': password,
'authuri': authuri}
if user and password is not None: # '' is a valid password
# We default to a realm of None to catch them all.
self.password_manager.add_password(None, authuri,
user, password)
orig_type = request.get_type()
scheme, r_scheme = urllib.splittype(proxy)
if self._debuglevel > 0:
print 'scheme: %s, r_scheme: %s' % (scheme, r_scheme)
host, XXX = urllib.splithost(r_scheme)
if host is None:
raise errors.InvalidURL(proxy,
'Invalid syntax in proxy env variable')
host = urllib.unquote(host)
request.set_proxy(host, type)
if self._debuglevel > 0:
print 'set_proxy: proxy set to %s://%s' % (type, host)
return request
class AbstractAuthHandler(urllib2.BaseHandler):
"""A custom abstract authentication handler for all http authentications.
Provides the meat to handle authentication errors and
preventively set authentication headers after the first
successful authentication.
This can be used for http and proxy, as well as for basic and
digest authentications.
This provides an unified interface for all authentication handlers
(urllib2 provides far too many with different policies).
The interaction between this handler and the urllib2
framework is not obvious, it works as follow:
opener.open(request) is called:
- that may trigger http_request which will add an authentication header
(self.build_header) if enough info is available.
- the request is sent to the server,
- if an authentication error is received self.auth_required is called,
we acquire the authentication info in the error headers and call
self.auth_match to check that we are able to try the
authentication and complete the authentication parameters,
- we call parent.open(request), that may trigger http_request
and will add a header (self.build_header), but here we have
all the required info (keep in mind that the request and
authentication used in the recursive calls are really (and must be)
the *same* objects).
- if the call returns a response, the authentication have been
successful and the request authentication parameters have been updated.
"""
# The following attributes should be defined by daughter
# classes:
# - auth_required_header: the header received from the server
# - auth_header: the header sent in the request
def __init__(self, password_manager):
self.password_manager = password_manager
self.find_user_password = password_manager.find_user_password
self.add_password = password_manager.add_password
def update_auth(self, auth, key, value):
"""Update a value in auth marking the auth as modified if needed"""
old_value = auth.get(key, None)
if old_value != value:
auth[key] = value
auth['modified'] = True
def auth_required(self, request, headers):
"""Retry the request if the auth scheme is ours.
:param request: The request needing authentication.
:param headers: The headers for the authentication error response.
:return: None or the response for the authenticated request.
"""
server_header = headers.get(self.auth_required_header, None)
if server_header is None:
# The http error MUST have the associated
# header. This must never happen in production code.
raise KeyError('%s not found' % self.auth_required_header)
auth = self.get_auth(request)
if auth.get('user', None) is None:
# Without a known user, we can't authenticate
return None
auth['modified'] = False
if self.auth_match(server_header, auth):
# auth_match may have modified auth (by adding the
# password or changing the realm, for example)
if request.get_header(self.auth_header, None) is not None \
and not auth['modified']:
# We already tried that, give up
return None
response = self.parent.open(request)
if response:
self.auth_successful(request, response)
return response
# We are not qualified to handle the authentication.
# Note: the authentication error handling will try all
# available handlers. If one of them authenticates
# successfully, a response will be returned. If none of
# them succeeds, None will be returned and the error
# handler will raise the 401 'Unauthorized' or the 407
# 'Proxy Authentication Required' error.
return None
def add_auth_header(self, request, header):
"""Add the authentication header to the request"""
request.add_unredirected_header(self.auth_header, header)
def auth_match(self, header, auth):
"""Check that we are able to handle that authentication scheme.
The request authentication parameters may need to be
updated with info from the server. Some of these
parameters, when combined, are considered to be the
authentication key, if one of them change the
authentication result may change. 'user' and 'password'
are exampls, but some auth schemes may have others
(digest's nonce is an example, digest's nonce_count is a
*counter-example*). Such parameters must be updated by
using the update_auth() method.
:param header: The authentication header sent by the server.
:param auth: The auth parameters already known. They may be
updated.
:returns: True if we can try to handle the authentication.
"""
raise NotImplementedError(self.auth_match)
def build_auth_header(self, auth, request):
"""Build the value of the header used to authenticate.
:param auth: The auth parameters needed to build the header.
:param request: The request needing authentication.
:return: None or header.
"""
raise NotImplementedError(self.build_auth_header)
def auth_successful(self, request, response):
"""The authentification was successful for the request.
Additional infos may be available in the response.
:param request: The succesfully authenticated request.
:param response: The server response (may contain auth info).
"""
pass
def get_password(self, user, authuri, realm=None):
"""Ask user for a password if none is already available."""
user_found, password = self.find_user_password(realm, authuri)
if user_found != user:
# FIXME: write a test for that case
password = None
if password is None:
# Prompt user only if we can't find a password
if realm:
realm_prompt = " Realm: '%s'" % realm
else:
realm_prompt = ''
scheme, host, path, query, fragment = urlparse.urlsplit(authuri)
password = ui.ui_factory.get_password(prompt=self.password_prompt,
user=user, host=host,
realm=realm_prompt)
if password is not None:
self.add_password(realm, authuri, user, password)
return password
def http_request(self, request):
"""Insert an authentication header if information is available"""
auth = self.get_auth(request)
if self.auth_params_reusable(auth):
self.add_auth_header(request, self.build_auth_header(auth, request))
return request
https_request = http_request # FIXME: Need test
class BasicAuthHandler(AbstractAuthHandler):
"""A custom basic authentication handler."""
auth_regexp = re.compile('realm="([^"]*)"', re.I)
def build_auth_header(self, auth, request):
raw = '%s:%s' % (auth['user'], auth['password'])
auth_header = 'Basic ' + raw.encode('base64').strip()
return auth_header
def auth_match(self, header, auth):
scheme, raw_auth = header.split(None, 1)
scheme = scheme.lower()
if scheme != 'basic':
return False
match = self.auth_regexp.search(raw_auth)
if match:
realm = match.groups()
if scheme != 'basic':
return False
# Put useful info into auth
self.update_auth(auth, 'scheme', scheme)
self.update_auth(auth, 'realm', realm)
if auth.get('password',None) is None:
password = self.get_password(auth['user'], auth['authuri'],
auth['realm'])
self.update_auth(auth, 'password', password)
return match is not None
def auth_params_reusable(self, auth):
# If the auth scheme is known, it means a previous
# authentication was successful, all information is
# available, no further checks are needed.
return auth.get('scheme', None) == 'basic'
def get_digest_algorithm_impls(algorithm):
H = None
KD = None
if algorithm == 'MD5':
H = lambda x: md5.new(x).hexdigest()
elif algorithm == 'SHA':
H = lambda x: sha.new(x).hexdigest()
if H is not None:
KD = lambda secret, data: H("%s:%s" % (secret, data))
return H, KD
def get_new_cnonce(nonce, nonce_count):
raw = '%s:%d:%s:%s' % (nonce, nonce_count, time.ctime(),
urllib2.randombytes(8))
return sha.new(raw).hexdigest()[:16]
class DigestAuthHandler(AbstractAuthHandler):
"""A custom digest authentication handler."""
def auth_params_reusable(self, auth):
# If the auth scheme is known, it means a previous
# authentication was successful, all information is
# available, no further checks are needed.
return auth.get('scheme', None) == 'digest'
def auth_match(self, header, auth):
scheme, raw_auth = header.split(None, 1)
scheme = scheme.lower()
if scheme != 'digest':
return False
# Put the requested authentication info into a dict
req_auth = urllib2.parse_keqv_list(urllib2.parse_http_list(raw_auth))
# Check that we can handle that authentication
qop = req_auth.get('qop', None)
if qop != 'auth': # No auth-int so far
return False
H, KD = get_digest_algorithm_impls(req_auth.get('algorithm', 'MD5'))
if H is None:
return False
realm = req_auth.get('realm', None)
if auth.get('password',None) is None:
auth['password'] = self.get_password(auth['user'],
auth['authuri'],
realm)
# Put useful info into auth
try:
self.update_auth(auth, 'scheme', scheme)
if req_auth.get('algorithm', None) is not None:
self.update_auth(auth, 'algorithm', req_auth.get('algorithm'))
self.update_auth(auth, 'realm', realm)
nonce = req_auth['nonce']
if auth.get('nonce', None) != nonce:
# A new nonce, never used
self.update_auth(auth, 'nonce_count', 0)
self.update_auth(auth, 'nonce', nonce)
self.update_auth(auth, 'qop', qop)
auth['opaque'] = req_auth.get('opaque', None)
except KeyError:
# Some required field is not there
return False
return True
def build_auth_header(self, auth, request):
url_scheme, url_selector = urllib.splittype(request.get_selector())
sel_host, uri = urllib.splithost(url_selector)
A1 = '%s:%s:%s' % (auth['user'], auth['realm'], auth['password'])
A2 = '%s:%s' % (request.get_method(), uri)
nonce = auth['nonce']
qop = auth['qop']
nonce_count = auth['nonce_count'] + 1
ncvalue = '%08x' % nonce_count
cnonce = get_new_cnonce(nonce, nonce_count)
H, KD = get_digest_algorithm_impls(auth.get('algorithm', 'MD5'))
nonce_data = '%s:%s:%s:%s:%s' % (nonce, ncvalue, cnonce, qop, H(A2))
request_digest = KD(H(A1), nonce_data)
header = 'Digest '
header += 'username="%s", realm="%s", nonce="%s"' % (auth['user'],
auth['realm'],
nonce)
header += ', uri="%s"' % uri
header += ', cnonce="%s", nc=%s' % (cnonce, ncvalue)
header += ', qop="%s"' % qop
header += ', response="%s"' % request_digest
# Append the optional fields
opaque = auth.get('opaque', None)
if opaque:
header += ', opaque="%s"' % opaque
if auth.get('algorithm', None):
header += ', algorithm="%s"' % auth.get('algorithm')
# We have used the nonce once more, update the count
auth['nonce_count'] = nonce_count
return header
class HTTPAuthHandler(AbstractAuthHandler):
"""Custom http authentication handler.
Send the authentication preventively to avoid the roundtrip
associated with the 401 error and keep the revelant info in
the auth request attribute.
"""
password_prompt = 'HTTP %(user)s@%(host)s%(realm)s password'
auth_required_header = 'www-authenticate'
auth_header = 'Authorization'
def get_auth(self, request):
"""Get the auth params from the request"""
return request.auth
def set_auth(self, request, auth):
"""Set the auth params for the request"""
request.auth = auth
def http_error_401(self, req, fp, code, msg, headers):
return self.auth_required(req, headers)
class ProxyAuthHandler(AbstractAuthHandler):
"""Custom proxy authentication handler.
Send the authentication preventively to avoid the roundtrip
associated with the 407 error and keep the revelant info in
the proxy_auth request attribute..
"""
password_prompt = 'Proxy %(user)s@%(host)s%(realm)s password'
auth_required_header = 'proxy-authenticate'
# FIXME: the correct capitalization is Proxy-Authorization,
# but python-2.4 urllib2.Request insist on using capitalize()
# instead of title().
auth_header = 'Proxy-authorization'
def get_auth(self, request):
"""Get the auth params from the request"""
return request.proxy_auth
def set_auth(self, request, auth):
"""Set the auth params for the request"""
request.proxy_auth = auth
def http_error_407(self, req, fp, code, msg, headers):
return self.auth_required(req, headers)
class HTTPBasicAuthHandler(BasicAuthHandler, HTTPAuthHandler):
"""Custom http basic authentication handler"""
class ProxyBasicAuthHandler(BasicAuthHandler, ProxyAuthHandler):
"""Custom proxy basic authentication handler"""
class HTTPDigestAuthHandler(DigestAuthHandler, HTTPAuthHandler):
"""Custom http basic authentication handler"""
class ProxyDigestAuthHandler(DigestAuthHandler, ProxyAuthHandler):
"""Custom proxy basic authentication handler"""
class HTTPErrorProcessor(urllib2.HTTPErrorProcessor):
"""Process HTTP error responses.
We don't really process the errors, quite the contrary
instead, we leave our Transport handle them.
"""
def http_response(self, request, response):
code, msg, hdrs = response.code, response.msg, response.info()
if code not in (200, # Ok
206, # Partial content
404, # Not found
):
response = self.parent.error('http', request, response,
code, msg, hdrs)
return response
https_response = http_response
class HTTPDefaultErrorHandler(urllib2.HTTPDefaultErrorHandler):
"""Translate common errors into bzr Exceptions"""
def http_error_default(self, req, fp, code, msg, hdrs):
if code == 404:
raise errors.NoSuchFile(req.get_selector(),
extra=HTTPError(req.get_full_url(),
code, msg,
hdrs, fp))
elif code == 403:
raise errors.TransportError('Server refuses to fullfil the request')
elif code == 416:
# We don't know which, but one of the ranges we
# specified was wrong. So we raise with 0 for a lack
# of a better magic value.
raise errors.InvalidRange(req.get_full_url(),0)
else:
raise errors.InvalidHttpResponse(req.get_full_url(),
'Unable to handle http code %d: %s'
% (code, msg))
class Opener(object):
"""A wrapper around urllib2.build_opener
Daughter classes can override to build their own specific opener
"""
# TODO: Provides hooks for daughter classes.
def __init__(self,
connection=ConnectionHandler,
redirect=HTTPRedirectHandler,
error=HTTPErrorProcessor,):
self.password_manager = PasswordManager()
self._opener = urllib2.build_opener( \
connection, redirect, error,
ProxyHandler(self.password_manager),
HTTPBasicAuthHandler(self.password_manager),
HTTPDigestAuthHandler(self.password_manager),
ProxyBasicAuthHandler(self.password_manager),
ProxyDigestAuthHandler(self.password_manager),
HTTPHandler,
HTTPSHandler,
HTTPDefaultErrorHandler,
)
self.open = self._opener.open
if DEBUG >= 2:
# When dealing with handler order, it's easy to mess
# things up, the following will help understand which
# handler is used, when and for what.
import pprint
pprint.pprint(self._opener.__dict__)
|