blob: 2c1c0c5afc25855d5cff301a28a00ee74a7decad [file] [log] [blame]
Guido van Rossume7b146f2000-02-04 15:28:42 +00001"""An extensible library for opening URLs using a variety of protocols
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00002
3The simplest way to use this module is to call the urlopen function,
Tim Peterse1190062001-01-15 03:34:38 +00004which accepts a string containing a URL or a Request object (described
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00005below). It opens the URL and returns the results as file-like
6object; the returned object has some extra methods described below.
7
Jeremy Hyltone1906632002-10-11 17:27:55 +00008The OpenerDirector manages a collection of Handler objects that do
Tim Peterse1190062001-01-15 03:34:38 +00009all the actual work. Each Handler implements a particular protocol or
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000010option. The OpenerDirector is a composite object that invokes the
11Handlers needed to open the requested URL. For example, the
12HTTPHandler performs HTTP GET and POST requests and deals with
13non-error returns. The HTTPRedirectHandler automatically deals with
Raymond Hettinger024aaa12003-04-24 15:32:12 +000014HTTP 301, 302, 303 and 307 redirect errors, and the HTTPDigestAuthHandler
15deals with digest authentication.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000016
Facundo Batistaca90ca82007-03-05 16:31:54 +000017urlopen(url, data=None) -- Basic usage is the same as original
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000018urllib. pass the url and optionally data to post to an HTTP URL, and
Tim Peterse1190062001-01-15 03:34:38 +000019get a file-like object back. One difference is that you can also pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000020a Request instance instead of URL. Raises a URLError (subclass of
21IOError); for HTTP errors, raises an HTTPError, which can also be
22treated as a valid response.
23
Facundo Batistaca90ca82007-03-05 16:31:54 +000024build_opener -- Function that creates a new OpenerDirector instance.
25Will install the default handlers. Accepts one or more Handlers as
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000026arguments, either instances or Handler classes that it will
Facundo Batistaca90ca82007-03-05 16:31:54 +000027instantiate. If one of the argument is a subclass of the default
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000028handler, the argument will be installed instead of the default.
29
Facundo Batistaca90ca82007-03-05 16:31:54 +000030install_opener -- Installs a new opener as the default opener.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000031
32objects of interest:
Senthil Kumaranf0bb4352009-11-15 06:14:36 +000033
34OpenerDirector -- Sets up the User Agent as the Python-urllib client and manages
35the Handler classes, while dealing with requests and responses.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000036
Facundo Batistaca90ca82007-03-05 16:31:54 +000037Request -- An object that encapsulates the state of a request. The
38state can be as simple as the URL. It can also include extra HTTP
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000039headers, e.g. a User-Agent.
40
41BaseHandler --
42
43exceptions:
Facundo Batistaca90ca82007-03-05 16:31:54 +000044URLError -- A subclass of IOError, individual protocols have their own
45specific subclass.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000046
Facundo Batistaca90ca82007-03-05 16:31:54 +000047HTTPError -- Also a valid HTTP response, so you can treat an HTTP error
48as an exceptional event or valid response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000049
50internals:
51BaseHandler and parent
52_call_chain conventions
53
54Example usage:
55
56import urllib2
57
58# set up authentication info
59authinfo = urllib2.HTTPBasicAuthHandler()
Neal Norwitz8eea9ac2007-04-24 04:53:12 +000060authinfo.add_password(realm='PDQ Application',
61 uri='https://mahler:8092/site-updates.py',
62 user='klem',
63 passwd='geheim$parole')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000064
Moshe Zadka8a18e992001-03-01 08:40:42 +000065proxy_support = urllib2.ProxyHandler({"http" : "http://ahad-haam:3128"})
66
Tim Peterse1190062001-01-15 03:34:38 +000067# build a new opener that adds authentication and caching FTP handlers
Moshe Zadka8a18e992001-03-01 08:40:42 +000068opener = urllib2.build_opener(proxy_support, authinfo, urllib2.CacheFTPHandler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000069
70# install it
71urllib2.install_opener(opener)
72
73f = urllib2.urlopen('http://www.python.org/')
74
75
76"""
77
78# XXX issues:
79# If an authentication error handler that tries to perform
Fred Draked5214b02001-11-08 17:19:29 +000080# authentication for some reason but fails, how should the error be
81# signalled? The client needs to know the HTTP error code. But if
82# the handler knows that the problem was, e.g., that it didn't know
83# that hash algo that requested in the challenge, it would be good to
84# pass that information along to the client, too.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000085# ftp errors aren't handled cleanly
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000086# check digest against correct (i.e. non-apache) implementation
87
Georg Brandlc5ffd912006-04-02 20:48:11 +000088# Possible extensions:
89# complex proxies XXX not sure what exactly was meant by this
90# abstract factory for opener
91
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000092import base64
Georg Brandlbffb0bc2006-04-30 08:57:35 +000093import hashlib
Georg Brandl9d6da3e2006-05-17 15:17:00 +000094import httplib
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000095import mimetools
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000096import os
97import posixpath
98import random
99import re
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000100import socket
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000101import sys
102import time
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000103import urlparse
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000104import bisect
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000105
106try:
107 from cStringIO import StringIO
108except ImportError:
109 from StringIO import StringIO
110
Georg Brandl7fff58c2006-04-02 21:13:13 +0000111from urllib import (unwrap, unquote, splittype, splithost, quote,
Brett Cannon88f801d2008-08-18 00:46:22 +0000112 addinfourl, splitport,
113 splitattr, ftpwrapper, splituser, splitpasswd, splitvalue)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000114
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000115# support for FileHandler, proxies via environment variables
Senthil Kumarandff20282009-10-11 05:35:44 +0000116from urllib import localhost, url2pathname, getproxies, proxy_bypass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000117
Georg Brandl720096a2006-04-02 20:45:34 +0000118# used in User-Agent header sent
119__version__ = sys.version[:3]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000120
121_opener = None
Facundo Batista4f1b1ed2008-05-29 16:39:26 +0000122def urlopen(url, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000123 global _opener
124 if _opener is None:
125 _opener = build_opener()
Facundo Batista10951d52007-06-06 17:15:23 +0000126 return _opener.open(url, data, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000127
128def install_opener(opener):
129 global _opener
130 _opener = opener
131
132# do these error classes make sense?
Tim Peterse1190062001-01-15 03:34:38 +0000133# make sure all of the IOError stuff is overridden. we just want to be
Fred Drakea87a5212002-08-13 13:59:55 +0000134# subtypes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000135
136class URLError(IOError):
137 # URLError is a sub-type of IOError, but it doesn't share any of
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000138 # the implementation. need to override __init__ and __str__.
139 # It sets self.args for compatibility with other EnvironmentError
140 # subclasses, but args doesn't have the typical format with errno in
141 # slot 0 and strerror in slot 1. This may be better than nothing.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000142 def __init__(self, reason):
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000143 self.args = reason,
Fred Drake13a2c272000-02-10 17:17:14 +0000144 self.reason = reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000145
146 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000147 return '<urlopen error %s>' % self.reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000148
149class HTTPError(URLError, addinfourl):
150 """Raised when HTTP error occurs, but also acts like non-error return"""
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000151 __super_init = addinfourl.__init__
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000152
153 def __init__(self, url, code, msg, hdrs, fp):
Fred Drake13a2c272000-02-10 17:17:14 +0000154 self.code = code
155 self.msg = msg
156 self.hdrs = hdrs
157 self.fp = fp
Fred Drake13a2c272000-02-10 17:17:14 +0000158 self.filename = url
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000159 # The addinfourl classes depend on fp being a valid file
160 # object. In some cases, the HTTPError may not have a valid
161 # file object. If this happens, the simplest workaround is to
Tim Petersc411dba2002-07-16 21:35:23 +0000162 # not initialize the base classes.
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000163 if fp is not None:
Georg Brandl99bb5f32008-04-09 17:57:38 +0000164 self.__super_init(fp, hdrs, url, code)
Tim Peterse1190062001-01-15 03:34:38 +0000165
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000166 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000167 return 'HTTP Error %s: %s' % (self.code, self.msg)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000168
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000169# copied from cookielib.py
Neal Norwitzb678ce52006-05-18 06:51:46 +0000170_cut_port_re = re.compile(r":\d+$")
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000171def request_host(request):
172 """Return request-host, as defined by RFC 2965.
173
174 Variation from RFC: returned value is lowercased, for convenient
175 comparison.
176
177 """
178 url = request.get_full_url()
179 host = urlparse.urlparse(url)[1]
180 if host == "":
181 host = request.get_header("Host", "")
182
183 # remove port, if present
Neal Norwitzb678ce52006-05-18 06:51:46 +0000184 host = _cut_port_re.sub("", host, 1)
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000185 return host.lower()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000186
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000187class Request:
Moshe Zadka8a18e992001-03-01 08:40:42 +0000188
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000189 def __init__(self, url, data=None, headers={},
190 origin_req_host=None, unverifiable=False):
Fred Drake13a2c272000-02-10 17:17:14 +0000191 # unwrap('<URL:type://host/path>') --> 'type://host/path'
192 self.__original = unwrap(url)
193 self.type = None
194 # self.__r_type is what's left after doing the splittype
195 self.host = None
196 self.port = None
Senthil Kumaran308681c2009-07-26 12:36:08 +0000197 self._tunnel_host = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000198 self.data = data
Fred Drake13a2c272000-02-10 17:17:14 +0000199 self.headers = {}
Brett Cannonc8b188a2003-05-17 19:51:26 +0000200 for key, value in headers.items():
Brett Cannon86503b12003-05-12 07:29:42 +0000201 self.add_header(key, value)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000202 self.unredirected_hdrs = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000203 if origin_req_host is None:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000204 origin_req_host = request_host(self)
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000205 self.origin_req_host = origin_req_host
206 self.unverifiable = unverifiable
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000207
208 def __getattr__(self, attr):
Fred Drake13a2c272000-02-10 17:17:14 +0000209 # XXX this is a fallback mechanism to guard against these
Tim Peterse1190062001-01-15 03:34:38 +0000210 # methods getting called in a non-standard order. this may be
Fred Drake13a2c272000-02-10 17:17:14 +0000211 # too complicated and/or unnecessary.
212 # XXX should the __r_XXX attributes be public?
213 if attr[:12] == '_Request__r_':
214 name = attr[12:]
215 if hasattr(Request, 'get_' + name):
216 getattr(self, 'get_' + name)()
217 return getattr(self, attr)
218 raise AttributeError, attr
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000219
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000220 def get_method(self):
221 if self.has_data():
222 return "POST"
223 else:
224 return "GET"
225
Jeremy Hylton023518a2003-12-17 18:52:16 +0000226 # XXX these helper methods are lame
227
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000228 def add_data(self, data):
229 self.data = data
230
231 def has_data(self):
232 return self.data is not None
233
234 def get_data(self):
235 return self.data
236
237 def get_full_url(self):
238 return self.__original
239
240 def get_type(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000241 if self.type is None:
242 self.type, self.__r_type = splittype(self.__original)
Jeremy Hylton78cae612001-05-09 15:49:24 +0000243 if self.type is None:
244 raise ValueError, "unknown url type: %s" % self.__original
Fred Drake13a2c272000-02-10 17:17:14 +0000245 return self.type
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000246
247 def get_host(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000248 if self.host is None:
249 self.host, self.__r_host = splithost(self.__r_type)
250 if self.host:
251 self.host = unquote(self.host)
252 return self.host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000253
254 def get_selector(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000255 return self.__r_host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000256
Moshe Zadka8a18e992001-03-01 08:40:42 +0000257 def set_proxy(self, host, type):
Senthil Kumaran308681c2009-07-26 12:36:08 +0000258 if self.type == 'https' and not self._tunnel_host:
259 self._tunnel_host = self.host
260 else:
261 self.type = type
262 self.__r_host = self.__original
263
264 self.host = host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000265
Facundo Batistaeb90b782008-08-16 14:44:07 +0000266 def has_proxy(self):
267 return self.__r_host == self.__original
268
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000269 def get_origin_req_host(self):
270 return self.origin_req_host
271
272 def is_unverifiable(self):
273 return self.unverifiable
274
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000275 def add_header(self, key, val):
Fred Drake13a2c272000-02-10 17:17:14 +0000276 # useful for something like authentication
Georg Brandl8c036cc2006-08-20 13:15:39 +0000277 self.headers[key.capitalize()] = val
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000278
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000279 def add_unredirected_header(self, key, val):
280 # will not be added to a redirected request
Georg Brandl8c036cc2006-08-20 13:15:39 +0000281 self.unredirected_hdrs[key.capitalize()] = val
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000282
283 def has_header(self, header_name):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000284 return (header_name in self.headers or
285 header_name in self.unredirected_hdrs)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000286
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000287 def get_header(self, header_name, default=None):
288 return self.headers.get(
289 header_name,
290 self.unredirected_hdrs.get(header_name, default))
291
292 def header_items(self):
293 hdrs = self.unredirected_hdrs.copy()
294 hdrs.update(self.headers)
295 return hdrs.items()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000296
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000297class OpenerDirector:
298 def __init__(self):
Georg Brandl8d457c72005-06-26 22:01:35 +0000299 client_version = "Python-urllib/%s" % __version__
Georg Brandl8c036cc2006-08-20 13:15:39 +0000300 self.addheaders = [('User-agent', client_version)]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000301 # manage the individual handlers
302 self.handlers = []
303 self.handle_open = {}
304 self.handle_error = {}
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000305 self.process_response = {}
306 self.process_request = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000307
308 def add_handler(self, handler):
Georg Brandlf91149e2007-07-12 08:05:45 +0000309 if not hasattr(handler, "add_parent"):
310 raise TypeError("expected BaseHandler instance, got %r" %
311 type(handler))
312
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000313 added = False
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000314 for meth in dir(handler):
Georg Brandl261e2512006-05-29 20:52:54 +0000315 if meth in ["redirect_request", "do_open", "proxy_open"]:
316 # oops, coincidental match
317 continue
318
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000319 i = meth.find("_")
320 protocol = meth[:i]
321 condition = meth[i+1:]
322
323 if condition.startswith("error"):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000324 j = condition.find("_") + i + 1
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000325 kind = meth[j+1:]
326 try:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000327 kind = int(kind)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000328 except ValueError:
329 pass
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000330 lookup = self.handle_error.get(protocol, {})
331 self.handle_error[protocol] = lookup
332 elif condition == "open":
333 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000334 lookup = self.handle_open
335 elif condition == "response":
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000336 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000337 lookup = self.process_response
338 elif condition == "request":
339 kind = protocol
340 lookup = self.process_request
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000341 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000342 continue
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000343
344 handlers = lookup.setdefault(kind, [])
345 if handlers:
346 bisect.insort(handlers, handler)
347 else:
348 handlers.append(handler)
349 added = True
350
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000351 if added:
Facundo Batistaca90ca82007-03-05 16:31:54 +0000352 # the handlers must work in an specific order, the order
353 # is specified in a Handler attribute
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000354 bisect.insort(self.handlers, handler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000355 handler.add_parent(self)
Tim Peterse1190062001-01-15 03:34:38 +0000356
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000357 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000358 # Only exists for backwards compatibility.
359 pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000360
361 def _call_chain(self, chain, kind, meth_name, *args):
Georg Brandlc5ffd912006-04-02 20:48:11 +0000362 # Handlers raise an exception if no one else should try to handle
363 # the request, or return None if they can't but another handler
364 # could. Otherwise, they return the response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000365 handlers = chain.get(kind, ())
366 for handler in handlers:
367 func = getattr(handler, meth_name)
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000368
369 result = func(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000370 if result is not None:
371 return result
372
Facundo Batista4f1b1ed2008-05-29 16:39:26 +0000373 def open(self, fullurl, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
Fred Drake13a2c272000-02-10 17:17:14 +0000374 # accept a URL or a Request object
Walter Dörwald65230a22002-06-03 15:58:32 +0000375 if isinstance(fullurl, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000376 req = Request(fullurl, data)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000377 else:
378 req = fullurl
379 if data is not None:
380 req.add_data(data)
Tim Peterse1190062001-01-15 03:34:38 +0000381
Facundo Batista10951d52007-06-06 17:15:23 +0000382 req.timeout = timeout
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000383 protocol = req.get_type()
384
385 # pre-process request
386 meth_name = protocol+"_request"
387 for processor in self.process_request.get(protocol, []):
388 meth = getattr(processor, meth_name)
389 req = meth(req)
390
391 response = self._open(req, data)
392
393 # post-process response
394 meth_name = protocol+"_response"
395 for processor in self.process_response.get(protocol, []):
396 meth = getattr(processor, meth_name)
397 response = meth(req, response)
398
399 return response
400
401 def _open(self, req, data=None):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000402 result = self._call_chain(self.handle_open, 'default',
Tim Peterse1190062001-01-15 03:34:38 +0000403 'default_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000404 if result:
405 return result
406
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000407 protocol = req.get_type()
408 result = self._call_chain(self.handle_open, protocol, protocol +
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000409 '_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000410 if result:
411 return result
412
413 return self._call_chain(self.handle_open, 'unknown',
414 'unknown_open', req)
415
416 def error(self, proto, *args):
Raymond Hettingerdbecd932005-02-06 06:57:08 +0000417 if proto in ('http', 'https'):
Fred Draked5214b02001-11-08 17:19:29 +0000418 # XXX http[s] protocols are special-cased
419 dict = self.handle_error['http'] # https is not different than http
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000420 proto = args[2] # YUCK!
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000421 meth_name = 'http_error_%s' % proto
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000422 http_err = 1
423 orig_args = args
424 else:
425 dict = self.handle_error
426 meth_name = proto + '_error'
427 http_err = 0
428 args = (dict, proto, meth_name) + args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000429 result = self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000430 if result:
431 return result
432
433 if http_err:
434 args = (dict, 'default', 'http_error_default') + orig_args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000435 return self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000436
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000437# XXX probably also want an abstract factory that knows when it makes
438# sense to skip a superclass in favor of a subclass and when it might
439# make sense to include both
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000440
441def build_opener(*handlers):
442 """Create an opener object from a list of handlers.
443
444 The opener will use several default handlers, including support
Senthil Kumaranf0bb4352009-11-15 06:14:36 +0000445 for HTTP, FTP and when applicable, HTTPS.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000446
447 If any of the handlers passed as arguments are subclasses of the
448 default handlers, the default handlers will not be used.
449 """
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000450 import types
451 def isclass(obj):
452 return isinstance(obj, types.ClassType) or hasattr(obj, "__bases__")
Tim Peterse1190062001-01-15 03:34:38 +0000453
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000454 opener = OpenerDirector()
455 default_classes = [ProxyHandler, UnknownHandler, HTTPHandler,
456 HTTPDefaultErrorHandler, HTTPRedirectHandler,
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000457 FTPHandler, FileHandler, HTTPErrorProcessor]
Moshe Zadka8a18e992001-03-01 08:40:42 +0000458 if hasattr(httplib, 'HTTPS'):
459 default_classes.append(HTTPSHandler)
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000460 skip = set()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000461 for klass in default_classes:
462 for check in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000463 if isclass(check):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000464 if issubclass(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000465 skip.add(klass)
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000466 elif isinstance(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000467 skip.add(klass)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000468 for klass in skip:
469 default_classes.remove(klass)
470
471 for klass in default_classes:
472 opener.add_handler(klass())
473
474 for h in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000475 if isclass(h):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000476 h = h()
477 opener.add_handler(h)
478 return opener
479
480class BaseHandler:
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000481 handler_order = 500
482
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000483 def add_parent(self, parent):
484 self.parent = parent
Tim Peters58eb11c2004-01-18 20:29:55 +0000485
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000486 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000487 # Only exists for backwards compatibility
488 pass
Tim Peters58eb11c2004-01-18 20:29:55 +0000489
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000490 def __lt__(self, other):
491 if not hasattr(other, "handler_order"):
492 # Try to preserve the old behavior of having custom classes
493 # inserted after default ones (works only for custom user
494 # classes which are not aware of handler_order).
495 return True
496 return self.handler_order < other.handler_order
Tim Petersf545baa2003-06-15 23:26:30 +0000497
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000498
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000499class HTTPErrorProcessor(BaseHandler):
500 """Process HTTP error responses."""
501 handler_order = 1000 # after all other processing
502
503 def http_response(self, request, response):
504 code, msg, hdrs = response.code, response.msg, response.info()
505
Neal Norwitz0d4c06e2007-04-25 06:30:05 +0000506 # According to RFC 2616, "2xx" code indicates that the client's
Facundo Batista9fab9f12007-04-23 17:08:31 +0000507 # request was successfully received, understood, and accepted.
508 if not (200 <= code < 300):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000509 response = self.parent.error(
510 'http', request, response, code, msg, hdrs)
511
512 return response
513
514 https_response = http_response
515
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000516class HTTPDefaultErrorHandler(BaseHandler):
517 def http_error_default(self, req, fp, code, msg, hdrs):
Fred Drake13a2c272000-02-10 17:17:14 +0000518 raise HTTPError(req.get_full_url(), code, msg, hdrs, fp)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000519
520class HTTPRedirectHandler(BaseHandler):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000521 # maximum number of redirections to any single URL
522 # this is needed because of the state that cookies introduce
523 max_repeats = 4
524 # maximum total number of redirections (regardless of URL) before
525 # assuming we're in a loop
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000526 max_redirections = 10
527
Jeremy Hylton03892952003-05-05 04:09:13 +0000528 def redirect_request(self, req, fp, code, msg, headers, newurl):
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000529 """Return a Request or None in response to a redirect.
530
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000531 This is called by the http_error_30x methods when a
532 redirection response is received. If a redirection should
533 take place, return a new Request to allow http_error_30x to
534 perform the redirect. Otherwise, raise HTTPError if no-one
535 else should try to handle this url. Return None if you can't
536 but another Handler might.
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000537 """
Jeremy Hylton828023b2003-05-04 23:44:49 +0000538 m = req.get_method()
539 if (code in (301, 302, 303, 307) and m in ("GET", "HEAD")
Martin v. Löwis162f0812003-07-12 07:33:32 +0000540 or code in (301, 302, 303) and m == "POST"):
541 # Strictly (according to RFC 2616), 301 or 302 in response
542 # to a POST MUST NOT cause a redirection without confirmation
Jeremy Hylton828023b2003-05-04 23:44:49 +0000543 # from the user (of urllib2, in this case). In practice,
544 # essentially all clients do redirect in this case, so we
545 # do the same.
Georg Brandlddb84d72006-03-18 11:35:18 +0000546 # be conciliant with URIs containing a space
547 newurl = newurl.replace(' ', '%20')
Facundo Batista86371d62008-02-07 19:06:52 +0000548 newheaders = dict((k,v) for k,v in req.headers.items()
549 if k.lower() not in ("content-length", "content-type")
550 )
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000551 return Request(newurl,
Facundo Batista86371d62008-02-07 19:06:52 +0000552 headers=newheaders,
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000553 origin_req_host=req.get_origin_req_host(),
554 unverifiable=True)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000555 else:
Martin v. Löwise3b67bc2003-06-14 05:51:25 +0000556 raise HTTPError(req.get_full_url(), code, msg, headers, fp)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000557
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000558 # Implementation note: To avoid the server sending us into an
559 # infinite loop, the request object needs to track what URLs we
560 # have already seen. Do this by adding a handler-specific
561 # attribute to the Request object.
562 def http_error_302(self, req, fp, code, msg, headers):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000563 # Some servers (incorrectly) return multiple Location headers
564 # (so probably same goes for URI). Use first header.
Raymond Hettinger54f02222002-06-01 14:18:47 +0000565 if 'location' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000566 newurl = headers.getheaders('location')[0]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000567 elif 'uri' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000568 newurl = headers.getheaders('uri')[0]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000569 else:
570 return
Facundo Batista94f243a2008-08-17 03:38:39 +0000571
572 # fix a possible malformed URL
573 urlparts = urlparse.urlparse(newurl)
574 if not urlparts.path:
575 urlparts = list(urlparts)
576 urlparts[2] = "/"
577 newurl = urlparse.urlunparse(urlparts)
578
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000579 newurl = urlparse.urljoin(req.get_full_url(), newurl)
580
guido@google.com60a4a902011-03-24 08:07:45 -0700581 # For security reasons we do not allow redirects to protocols
guido@google.com2bc23b82011-03-24 10:44:17 -0700582 # other than HTTP, HTTPS or FTP.
guido@google.com60a4a902011-03-24 08:07:45 -0700583 newurl_lower = newurl.lower()
584 if not (newurl_lower.startswith('http://') or
guido@google.com2bc23b82011-03-24 10:44:17 -0700585 newurl_lower.startswith('https://') or
586 newurl_lower.startswith('ftp://')):
guido@google.comf1509302011-03-28 13:47:01 -0700587 raise HTTPError(newurl, code,
588 msg + " - Redirection to url '%s' is not allowed" %
589 newurl,
590 headers, fp)
guido@google.com60a4a902011-03-24 08:07:45 -0700591
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000592 # XXX Probably want to forget about the state of the current
593 # request, although that might interact poorly with other
594 # handlers that also use handler-specific request attributes
Jeremy Hylton03892952003-05-05 04:09:13 +0000595 new = self.redirect_request(req, fp, code, msg, headers, newurl)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000596 if new is None:
597 return
598
599 # loop detection
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000600 # .redirect_dict has a key url if url was previously visited.
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000601 if hasattr(req, 'redirect_dict'):
602 visited = new.redirect_dict = req.redirect_dict
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000603 if (visited.get(newurl, 0) >= self.max_repeats or
604 len(visited) >= self.max_redirections):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000605 raise HTTPError(req.get_full_url(), code,
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000606 self.inf_msg + msg, headers, fp)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000607 else:
608 visited = new.redirect_dict = req.redirect_dict = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000609 visited[newurl] = visited.get(newurl, 0) + 1
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000610
611 # Don't close the fp until we are sure that we won't use it
Tim Petersab9ba272001-08-09 21:40:30 +0000612 # with HTTPError.
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000613 fp.read()
614 fp.close()
615
Senthil Kumaran428e9d12009-07-19 04:20:46 +0000616 return self.parent.open(new, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000617
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000618 http_error_301 = http_error_303 = http_error_307 = http_error_302
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000619
Martin v. Löwis162f0812003-07-12 07:33:32 +0000620 inf_msg = "The HTTP server returned a redirect error that would " \
Thomas Wouters7e474022000-07-16 12:04:32 +0000621 "lead to an infinite loop.\n" \
Martin v. Löwis162f0812003-07-12 07:33:32 +0000622 "The last 30x error message was:\n"
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000623
Georg Brandl720096a2006-04-02 20:45:34 +0000624
625def _parse_proxy(proxy):
626 """Return (scheme, user, password, host/port) given a URL or an authority.
627
628 If a URL is supplied, it must have an authority (host:port) component.
629 According to RFC 3986, having an authority component means the URL must
630 have two slashes after the scheme:
631
632 >>> _parse_proxy('file:/ftp.example.com/')
633 Traceback (most recent call last):
634 ValueError: proxy URL with no authority: 'file:/ftp.example.com/'
635
636 The first three items of the returned tuple may be None.
637
638 Examples of authority parsing:
639
640 >>> _parse_proxy('proxy.example.com')
641 (None, None, None, 'proxy.example.com')
642 >>> _parse_proxy('proxy.example.com:3128')
643 (None, None, None, 'proxy.example.com:3128')
644
645 The authority component may optionally include userinfo (assumed to be
646 username:password):
647
648 >>> _parse_proxy('joe:password@proxy.example.com')
649 (None, 'joe', 'password', 'proxy.example.com')
650 >>> _parse_proxy('joe:password@proxy.example.com:3128')
651 (None, 'joe', 'password', 'proxy.example.com:3128')
652
653 Same examples, but with URLs instead:
654
655 >>> _parse_proxy('http://proxy.example.com/')
656 ('http', None, None, 'proxy.example.com')
657 >>> _parse_proxy('http://proxy.example.com:3128/')
658 ('http', None, None, 'proxy.example.com:3128')
659 >>> _parse_proxy('http://joe:password@proxy.example.com/')
660 ('http', 'joe', 'password', 'proxy.example.com')
661 >>> _parse_proxy('http://joe:password@proxy.example.com:3128')
662 ('http', 'joe', 'password', 'proxy.example.com:3128')
663
664 Everything after the authority is ignored:
665
666 >>> _parse_proxy('ftp://joe:password@proxy.example.com/rubbish:3128')
667 ('ftp', 'joe', 'password', 'proxy.example.com')
668
669 Test for no trailing '/' case:
670
671 >>> _parse_proxy('http://joe:password@proxy.example.com')
672 ('http', 'joe', 'password', 'proxy.example.com')
673
674 """
Georg Brandl720096a2006-04-02 20:45:34 +0000675 scheme, r_scheme = splittype(proxy)
676 if not r_scheme.startswith("/"):
677 # authority
678 scheme = None
679 authority = proxy
680 else:
681 # URL
682 if not r_scheme.startswith("//"):
683 raise ValueError("proxy URL with no authority: %r" % proxy)
684 # We have an authority, so for RFC 3986-compliant URLs (by ss 3.
685 # and 3.3.), path is empty or starts with '/'
686 end = r_scheme.find("/", 2)
687 if end == -1:
688 end = None
689 authority = r_scheme[2:end]
690 userinfo, hostport = splituser(authority)
691 if userinfo is not None:
692 user, password = splitpasswd(userinfo)
693 else:
694 user = password = None
695 return scheme, user, password, hostport
696
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000697class ProxyHandler(BaseHandler):
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000698 # Proxies must be in front
699 handler_order = 100
700
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000701 def __init__(self, proxies=None):
Fred Drake13a2c272000-02-10 17:17:14 +0000702 if proxies is None:
703 proxies = getproxies()
704 assert hasattr(proxies, 'has_key'), "proxies must be a mapping"
705 self.proxies = proxies
Brett Cannondf0d87a2003-05-18 02:25:07 +0000706 for type, url in proxies.items():
Tim Peterse1190062001-01-15 03:34:38 +0000707 setattr(self, '%s_open' % type,
Fred Drake13a2c272000-02-10 17:17:14 +0000708 lambda r, proxy=url, type=type, meth=self.proxy_open: \
709 meth(r, proxy, type))
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000710
711 def proxy_open(self, req, proxy, type):
Fred Drake13a2c272000-02-10 17:17:14 +0000712 orig_type = req.get_type()
Georg Brandl720096a2006-04-02 20:45:34 +0000713 proxy_type, user, password, hostport = _parse_proxy(proxy)
Senthil Kumarandff20282009-10-11 05:35:44 +0000714
Georg Brandl720096a2006-04-02 20:45:34 +0000715 if proxy_type is None:
716 proxy_type = orig_type
Senthil Kumarandff20282009-10-11 05:35:44 +0000717
718 if req.host and proxy_bypass(req.host):
719 return None
720
Georg Brandl531ceba2006-01-21 07:20:56 +0000721 if user and password:
Georg Brandl720096a2006-04-02 20:45:34 +0000722 user_pass = '%s:%s' % (unquote(user), unquote(password))
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000723 creds = base64.b64encode(user_pass).strip()
Georg Brandl8c036cc2006-08-20 13:15:39 +0000724 req.add_header('Proxy-authorization', 'Basic ' + creds)
Georg Brandl720096a2006-04-02 20:45:34 +0000725 hostport = unquote(hostport)
726 req.set_proxy(hostport, proxy_type)
Senthil Kumarandff20282009-10-11 05:35:44 +0000727
Senthil Kumaran308681c2009-07-26 12:36:08 +0000728 if orig_type == proxy_type or orig_type == 'https':
Fred Drake13a2c272000-02-10 17:17:14 +0000729 # let other handlers take care of it
Fred Drake13a2c272000-02-10 17:17:14 +0000730 return None
731 else:
732 # need to start over, because the other handlers don't
733 # grok the proxy's URL type
Georg Brandl720096a2006-04-02 20:45:34 +0000734 # e.g. if we have a constructor arg proxies like so:
735 # {'http': 'ftp://proxy.example.com'}, we may end up turning
736 # a request for http://acme.example.com/a into one for
737 # ftp://proxy.example.com/a
Senthil Kumaran428e9d12009-07-19 04:20:46 +0000738 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000739
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000740class HTTPPasswordMgr:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000741
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000742 def __init__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000743 self.passwd = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000744
745 def add_password(self, realm, uri, user, passwd):
Fred Drake13a2c272000-02-10 17:17:14 +0000746 # uri could be a single URI or a sequence
Walter Dörwald65230a22002-06-03 15:58:32 +0000747 if isinstance(uri, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000748 uri = [uri]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000749 if not realm in self.passwd:
Fred Drake13a2c272000-02-10 17:17:14 +0000750 self.passwd[realm] = {}
Georg Brandl2b330372006-05-28 20:23:12 +0000751 for default_port in True, False:
752 reduced_uri = tuple(
753 [self.reduce_uri(u, default_port) for u in uri])
754 self.passwd[realm][reduced_uri] = (user, passwd)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000755
756 def find_user_password(self, realm, authuri):
Fred Drake13a2c272000-02-10 17:17:14 +0000757 domains = self.passwd.get(realm, {})
Georg Brandl2b330372006-05-28 20:23:12 +0000758 for default_port in True, False:
759 reduced_authuri = self.reduce_uri(authuri, default_port)
760 for uris, authinfo in domains.iteritems():
761 for uri in uris:
762 if self.is_suburi(uri, reduced_authuri):
763 return authinfo
Fred Drake13a2c272000-02-10 17:17:14 +0000764 return None, None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000765
Georg Brandl2b330372006-05-28 20:23:12 +0000766 def reduce_uri(self, uri, default_port=True):
767 """Accept authority or URI and extract only the authority and path."""
768 # note HTTP URLs do not have a userinfo component
Georg Brandlfa42bd72006-04-30 07:06:11 +0000769 parts = urlparse.urlsplit(uri)
Fred Drake13a2c272000-02-10 17:17:14 +0000770 if parts[1]:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000771 # URI
Georg Brandl2b330372006-05-28 20:23:12 +0000772 scheme = parts[0]
773 authority = parts[1]
774 path = parts[2] or '/'
Fred Drake13a2c272000-02-10 17:17:14 +0000775 else:
Georg Brandl2b330372006-05-28 20:23:12 +0000776 # host or host:port
777 scheme = None
778 authority = uri
779 path = '/'
780 host, port = splitport(authority)
781 if default_port and port is None and scheme is not None:
782 dport = {"http": 80,
783 "https": 443,
784 }.get(scheme)
785 if dport is not None:
786 authority = "%s:%d" % (host, dport)
787 return authority, path
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000788
789 def is_suburi(self, base, test):
Fred Drake13a2c272000-02-10 17:17:14 +0000790 """Check if test is below base in a URI tree
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000791
Fred Drake13a2c272000-02-10 17:17:14 +0000792 Both args must be URIs in reduced form.
793 """
794 if base == test:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000795 return True
Fred Drake13a2c272000-02-10 17:17:14 +0000796 if base[0] != test[0]:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000797 return False
Moshe Zadka8a18e992001-03-01 08:40:42 +0000798 common = posixpath.commonprefix((base[1], test[1]))
Fred Drake13a2c272000-02-10 17:17:14 +0000799 if len(common) == len(base[1]):
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000800 return True
801 return False
Tim Peterse1190062001-01-15 03:34:38 +0000802
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000803
Moshe Zadka8a18e992001-03-01 08:40:42 +0000804class HTTPPasswordMgrWithDefaultRealm(HTTPPasswordMgr):
805
806 def find_user_password(self, realm, authuri):
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000807 user, password = HTTPPasswordMgr.find_user_password(self, realm,
808 authuri)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000809 if user is not None:
810 return user, password
811 return HTTPPasswordMgr.find_user_password(self, None, authuri)
812
813
814class AbstractBasicAuthHandler:
815
Georg Brandl172e7252007-03-07 07:39:06 +0000816 # XXX this allows for multiple auth-schemes, but will stupidly pick
817 # the last one with a realm specified.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000818
Georg Brandl33124322008-03-21 19:54:00 +0000819 # allow for double- and single-quoted realm values
820 # (single quotes are a violation of the RFC, but appear in the wild)
821 rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
822 'realm=(["\'])(.*?)\\2', re.I)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000823
Georg Brandl261e2512006-05-29 20:52:54 +0000824 # XXX could pre-emptively send auth info already accepted (RFC 2617,
825 # end of section 2, and section 1.2 immediately after "credentials"
826 # production).
827
Moshe Zadka8a18e992001-03-01 08:40:42 +0000828 def __init__(self, password_mgr=None):
829 if password_mgr is None:
830 password_mgr = HTTPPasswordMgr()
831 self.passwd = password_mgr
Fred Drake13a2c272000-02-10 17:17:14 +0000832 self.add_password = self.passwd.add_password
Senthil Kumaran7c7244b2010-06-01 12:42:44 +0000833 self.retried = 0
Tim Peterse1190062001-01-15 03:34:38 +0000834
Moshe Zadka8a18e992001-03-01 08:40:42 +0000835 def http_error_auth_reqed(self, authreq, host, req, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000836 # host may be an authority (without userinfo) or a URL with an
837 # authority
Moshe Zadka8a18e992001-03-01 08:40:42 +0000838 # XXX could be multiple headers
839 authreq = headers.get(authreq, None)
Senthil Kumaran7c7244b2010-06-01 12:42:44 +0000840
841 if self.retried > 5:
842 # retry sending the username:password 5 times before failing.
843 raise HTTPError(req.get_full_url(), 401, "basic auth failed",
844 headers, None)
845 else:
846 self.retried += 1
847
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000848 if authreq:
Martin v. Löwis65a79752004-08-03 12:59:55 +0000849 mo = AbstractBasicAuthHandler.rx.search(authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000850 if mo:
Georg Brandl33124322008-03-21 19:54:00 +0000851 scheme, quote, realm = mo.groups()
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000852 if scheme.lower() == 'basic':
Moshe Zadka8a18e992001-03-01 08:40:42 +0000853 return self.retry_http_basic_auth(host, req, realm)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000854
Moshe Zadka8a18e992001-03-01 08:40:42 +0000855 def retry_http_basic_auth(self, host, req, realm):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000856 user, pw = self.passwd.find_user_password(realm, host)
Martin v. Löwis8b3e8712004-05-06 01:41:26 +0000857 if pw is not None:
Fred Drake13a2c272000-02-10 17:17:14 +0000858 raw = "%s:%s" % (user, pw)
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000859 auth = 'Basic %s' % base64.b64encode(raw).strip()
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000860 if req.headers.get(self.auth_header, None) == auth:
861 return None
Senthil Kumarane3c651a2010-02-24 16:49:45 +0000862 req.add_unredirected_header(self.auth_header, auth)
Senthil Kumaran428e9d12009-07-19 04:20:46 +0000863 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000864 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000865 return None
866
Georg Brandlfa42bd72006-04-30 07:06:11 +0000867
Moshe Zadka8a18e992001-03-01 08:40:42 +0000868class HTTPBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000869
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000870 auth_header = 'Authorization'
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000871
Moshe Zadka8a18e992001-03-01 08:40:42 +0000872 def http_error_401(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000873 url = req.get_full_url()
Tim Peters30edd232001-03-16 08:29:48 +0000874 return self.http_error_auth_reqed('www-authenticate',
Georg Brandlfa42bd72006-04-30 07:06:11 +0000875 url, req, headers)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000876
877
878class ProxyBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
879
Georg Brandl8c036cc2006-08-20 13:15:39 +0000880 auth_header = 'Proxy-authorization'
Moshe Zadka8a18e992001-03-01 08:40:42 +0000881
882 def http_error_407(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000883 # http_error_auth_reqed requires that there is no userinfo component in
884 # authority. Assume there isn't one, since urllib2 does not (and
885 # should not, RFC 3986 s. 3.2.1) support requests for URLs containing
886 # userinfo.
887 authority = req.get_host()
Tim Peters30edd232001-03-16 08:29:48 +0000888 return self.http_error_auth_reqed('proxy-authenticate',
Georg Brandlfa42bd72006-04-30 07:06:11 +0000889 authority, req, headers)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000890
891
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000892def randombytes(n):
893 """Return n random bytes."""
894 # Use /dev/urandom if it is available. Fall back to random module
895 # if not. It might be worthwhile to extend this function to use
896 # other platform-specific mechanisms for getting random bytes.
897 if os.path.exists("/dev/urandom"):
898 f = open("/dev/urandom")
899 s = f.read(n)
900 f.close()
901 return s
902 else:
903 L = [chr(random.randrange(0, 256)) for i in range(n)]
904 return "".join(L)
905
Moshe Zadka8a18e992001-03-01 08:40:42 +0000906class AbstractDigestAuthHandler:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000907 # Digest authentication is specified in RFC 2617.
908
909 # XXX The client does not inspect the Authentication-Info header
910 # in a successful response.
911
912 # XXX It should be possible to test this implementation against
913 # a mock server that just generates a static set of challenges.
914
915 # XXX qop="auth-int" supports is shaky
Moshe Zadka8a18e992001-03-01 08:40:42 +0000916
917 def __init__(self, passwd=None):
918 if passwd is None:
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000919 passwd = HTTPPasswordMgr()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000920 self.passwd = passwd
Fred Drake13a2c272000-02-10 17:17:14 +0000921 self.add_password = self.passwd.add_password
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000922 self.retried = 0
923 self.nonce_count = 0
Senthil Kumaran10c858a2009-11-15 08:39:10 +0000924 self.last_nonce = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000925
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000926 def reset_retry_count(self):
927 self.retried = 0
928
929 def http_error_auth_reqed(self, auth_header, host, req, headers):
930 authreq = headers.get(auth_header, None)
931 if self.retried > 5:
932 # Don't fail endlessly - if we failed once, we'll probably
933 # fail a second time. Hm. Unless the Password Manager is
934 # prompting for the information. Crap. This isn't great
935 # but it's better than the current 'repeat until recursion
936 # depth exceeded' approach <wink>
Tim Peters58eb11c2004-01-18 20:29:55 +0000937 raise HTTPError(req.get_full_url(), 401, "digest auth failed",
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000938 headers, None)
939 else:
940 self.retried += 1
Fred Drake13a2c272000-02-10 17:17:14 +0000941 if authreq:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000942 scheme = authreq.split()[0]
943 if scheme.lower() == 'digest':
Fred Drake13a2c272000-02-10 17:17:14 +0000944 return self.retry_http_digest_auth(req, authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000945
946 def retry_http_digest_auth(self, req, auth):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000947 token, challenge = auth.split(' ', 1)
Fred Drake13a2c272000-02-10 17:17:14 +0000948 chal = parse_keqv_list(parse_http_list(challenge))
949 auth = self.get_authorization(req, chal)
950 if auth:
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000951 auth_val = 'Digest %s' % auth
952 if req.headers.get(self.auth_header, None) == auth_val:
953 return None
Georg Brandl852bb002006-05-03 05:05:02 +0000954 req.add_unredirected_header(self.auth_header, auth_val)
Senthil Kumaran428e9d12009-07-19 04:20:46 +0000955 resp = self.parent.open(req, timeout=req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +0000956 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000957
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000958 def get_cnonce(self, nonce):
959 # The cnonce-value is an opaque
960 # quoted string value provided by the client and used by both client
961 # and server to avoid chosen plaintext attacks, to provide mutual
962 # authentication, and to provide some message integrity protection.
963 # This isn't a fabulous effort, but it's probably Good Enough.
Georg Brandlbffb0bc2006-04-30 08:57:35 +0000964 dig = hashlib.sha1("%s:%s:%s:%s" % (self.nonce_count, nonce, time.ctime(),
965 randombytes(8))).hexdigest()
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000966 return dig[:16]
967
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000968 def get_authorization(self, req, chal):
Fred Drake13a2c272000-02-10 17:17:14 +0000969 try:
970 realm = chal['realm']
971 nonce = chal['nonce']
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000972 qop = chal.get('qop')
Fred Drake13a2c272000-02-10 17:17:14 +0000973 algorithm = chal.get('algorithm', 'MD5')
974 # mod_digest doesn't send an opaque, even though it isn't
975 # supposed to be optional
976 opaque = chal.get('opaque', None)
977 except KeyError:
978 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000979
Fred Drake13a2c272000-02-10 17:17:14 +0000980 H, KD = self.get_algorithm_impls(algorithm)
981 if H is None:
982 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000983
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000984 user, pw = self.passwd.find_user_password(realm, req.get_full_url())
Fred Drake13a2c272000-02-10 17:17:14 +0000985 if user is None:
986 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000987
Fred Drake13a2c272000-02-10 17:17:14 +0000988 # XXX not implemented yet
989 if req.has_data():
990 entdig = self.get_entity_digest(req.get_data(), chal)
991 else:
992 entdig = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000993
Fred Drake13a2c272000-02-10 17:17:14 +0000994 A1 = "%s:%s:%s" % (user, realm, pw)
Johannes Gijsberscdd625a2005-01-09 05:51:49 +0000995 A2 = "%s:%s" % (req.get_method(),
Fred Drake13a2c272000-02-10 17:17:14 +0000996 # XXX selector: what about proxies and full urls
997 req.get_selector())
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000998 if qop == 'auth':
Senthil Kumaran10c858a2009-11-15 08:39:10 +0000999 if nonce == self.last_nonce:
1000 self.nonce_count += 1
1001 else:
1002 self.nonce_count = 1
1003 self.last_nonce = nonce
1004
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001005 ncvalue = '%08x' % self.nonce_count
1006 cnonce = self.get_cnonce(nonce)
1007 noncebit = "%s:%s:%s:%s:%s" % (nonce, ncvalue, cnonce, qop, H(A2))
1008 respdig = KD(H(A1), noncebit)
1009 elif qop is None:
1010 respdig = KD(H(A1), "%s:%s" % (nonce, H(A2)))
1011 else:
1012 # XXX handle auth-int.
Georg Brandlff871222007-06-07 13:34:10 +00001013 raise URLError("qop '%s' is not supported." % qop)
Tim Peters58eb11c2004-01-18 20:29:55 +00001014
Fred Drake13a2c272000-02-10 17:17:14 +00001015 # XXX should the partial digests be encoded too?
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001016
Fred Drake13a2c272000-02-10 17:17:14 +00001017 base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \
1018 'response="%s"' % (user, realm, nonce, req.get_selector(),
1019 respdig)
1020 if opaque:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001021 base += ', opaque="%s"' % opaque
Fred Drake13a2c272000-02-10 17:17:14 +00001022 if entdig:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001023 base += ', digest="%s"' % entdig
1024 base += ', algorithm="%s"' % algorithm
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001025 if qop:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001026 base += ', qop=auth, nc=%s, cnonce="%s"' % (ncvalue, cnonce)
Fred Drake13a2c272000-02-10 17:17:14 +00001027 return base
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001028
1029 def get_algorithm_impls(self, algorithm):
Georg Brandl8d66dcd2008-05-04 21:40:44 +00001030 # algorithm should be case-insensitive according to RFC2617
1031 algorithm = algorithm.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001032 # lambdas assume digest modules are imported at the top level
1033 if algorithm == 'MD5':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001034 H = lambda x: hashlib.md5(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001035 elif algorithm == 'SHA':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001036 H = lambda x: hashlib.sha1(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001037 # XXX MD5-sess
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001038 KD = lambda s, d: H("%s:%s" % (s, d))
Fred Drake13a2c272000-02-10 17:17:14 +00001039 return H, KD
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001040
1041 def get_entity_digest(self, data, chal):
Fred Drake13a2c272000-02-10 17:17:14 +00001042 # XXX not implemented yet
1043 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001044
Moshe Zadka8a18e992001-03-01 08:40:42 +00001045
1046class HTTPDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1047 """An authentication protocol defined by RFC 2069
1048
1049 Digest authentication improves on basic authentication because it
1050 does not transmit passwords in the clear.
1051 """
1052
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001053 auth_header = 'Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001054 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001055
1056 def http_error_401(self, req, fp, code, msg, headers):
1057 host = urlparse.urlparse(req.get_full_url())[1]
Tim Peters58eb11c2004-01-18 20:29:55 +00001058 retry = self.http_error_auth_reqed('www-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001059 host, req, headers)
1060 self.reset_retry_count()
1061 return retry
Moshe Zadka8a18e992001-03-01 08:40:42 +00001062
1063
1064class ProxyDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1065
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001066 auth_header = 'Proxy-Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001067 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001068
1069 def http_error_407(self, req, fp, code, msg, headers):
1070 host = req.get_host()
Tim Peters58eb11c2004-01-18 20:29:55 +00001071 retry = self.http_error_auth_reqed('proxy-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001072 host, req, headers)
1073 self.reset_retry_count()
1074 return retry
Tim Peterse1190062001-01-15 03:34:38 +00001075
Moshe Zadka8a18e992001-03-01 08:40:42 +00001076class AbstractHTTPHandler(BaseHandler):
1077
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001078 def __init__(self, debuglevel=0):
1079 self._debuglevel = debuglevel
1080
1081 def set_http_debuglevel(self, level):
1082 self._debuglevel = level
1083
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001084 def do_request_(self, request):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001085 host = request.get_host()
1086 if not host:
1087 raise URLError('no host given')
1088
1089 if request.has_data(): # POST
1090 data = request.get_data()
Georg Brandl8c036cc2006-08-20 13:15:39 +00001091 if not request.has_header('Content-type'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001092 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001093 'Content-type',
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001094 'application/x-www-form-urlencoded')
Georg Brandl8c036cc2006-08-20 13:15:39 +00001095 if not request.has_header('Content-length'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001096 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001097 'Content-length', '%d' % len(data))
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001098
Facundo Batistaeb90b782008-08-16 14:44:07 +00001099 sel_host = host
1100 if request.has_proxy():
1101 scheme, sel = splittype(request.get_selector())
1102 sel_host, sel_path = splithost(sel)
1103
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001104 if not request.has_header('Host'):
Facundo Batistaeb90b782008-08-16 14:44:07 +00001105 request.add_unredirected_header('Host', sel_host)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001106 for name, value in self.parent.addheaders:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001107 name = name.capitalize()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001108 if not request.has_header(name):
1109 request.add_unredirected_header(name, value)
1110
1111 return request
1112
Moshe Zadka8a18e992001-03-01 08:40:42 +00001113 def do_open(self, http_class, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001114 """Return an addinfourl object for the request, using http_class.
1115
1116 http_class must implement the HTTPConnection API from httplib.
1117 The addinfourl return value is a file-like object. It also
1118 has methods and attributes including:
1119 - info(): return a mimetools.Message object for the headers
1120 - geturl(): return the original request URL
1121 - code: HTTP status code
1122 """
Moshe Zadka76676802001-04-11 07:44:53 +00001123 host = req.get_host()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001124 if not host:
1125 raise URLError('no host given')
1126
Facundo Batista10951d52007-06-06 17:15:23 +00001127 h = http_class(host, timeout=req.timeout) # will parse host:port
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001128 h.set_debuglevel(self._debuglevel)
Tim Peterse1190062001-01-15 03:34:38 +00001129
Jeremy Hylton023518a2003-12-17 18:52:16 +00001130 headers = dict(req.headers)
1131 headers.update(req.unredirected_hdrs)
Jeremy Hyltonb3ee6f92004-02-24 19:40:35 +00001132 # We want to make an HTTP/1.1 request, but the addinfourl
1133 # class isn't prepared to deal with a persistent connection.
1134 # It will try to read all remaining data from the socket,
1135 # which will block while the server waits for the next request.
1136 # So make sure the connection gets closed after the (only)
1137 # request.
1138 headers["Connection"] = "close"
Georg Brandl8c036cc2006-08-20 13:15:39 +00001139 headers = dict(
1140 (name.title(), val) for name, val in headers.items())
Senthil Kumaran308681c2009-07-26 12:36:08 +00001141
1142 if req._tunnel_host:
Senthil Kumaran81163642009-12-20 06:32:46 +00001143 tunnel_headers = {}
1144 proxy_auth_hdr = "Proxy-Authorization"
1145 if proxy_auth_hdr in headers:
1146 tunnel_headers[proxy_auth_hdr] = headers[proxy_auth_hdr]
1147 # Proxy-Authorization should not be sent to origin
1148 # server.
1149 del headers[proxy_auth_hdr]
1150 h._set_tunnel(req._tunnel_host, headers=tunnel_headers)
Senthil Kumaran308681c2009-07-26 12:36:08 +00001151
Jeremy Hylton828023b2003-05-04 23:44:49 +00001152 try:
Jeremy Hylton023518a2003-12-17 18:52:16 +00001153 h.request(req.get_method(), req.get_selector(), req.data, headers)
1154 r = h.getresponse()
1155 except socket.error, err: # XXX what error?
Jeremy Hylton828023b2003-05-04 23:44:49 +00001156 raise URLError(err)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001157
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001158 # Pick apart the HTTPResponse object to get the addinfourl
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001159 # object initialized properly.
1160
1161 # Wrap the HTTPResponse object in socket's file object adapter
1162 # for Windows. That adapter calls recv(), so delegate recv()
1163 # to read(). This weird wrapping allows the returned object to
1164 # have readline() and readlines() methods.
Tim Peters9ca3f852004-08-08 01:05:14 +00001165
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001166 # XXX It might be better to extract the read buffering code
1167 # out of socket._fileobject() and into a base class.
Tim Peters9ca3f852004-08-08 01:05:14 +00001168
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001169 r.recv = r.read
Georg Brandldd7b0522007-01-21 10:35:10 +00001170 fp = socket._fileobject(r, close=True)
Tim Peters9ca3f852004-08-08 01:05:14 +00001171
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001172 resp = addinfourl(fp, r.msg, req.get_full_url())
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001173 resp.code = r.status
1174 resp.msg = r.reason
1175 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001176
Moshe Zadka8a18e992001-03-01 08:40:42 +00001177
1178class HTTPHandler(AbstractHTTPHandler):
1179
1180 def http_open(self, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001181 return self.do_open(httplib.HTTPConnection, req)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001182
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001183 http_request = AbstractHTTPHandler.do_request_
Moshe Zadka8a18e992001-03-01 08:40:42 +00001184
1185if hasattr(httplib, 'HTTPS'):
1186 class HTTPSHandler(AbstractHTTPHandler):
1187
1188 def https_open(self, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001189 return self.do_open(httplib.HTTPSConnection, req)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001190
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001191 https_request = AbstractHTTPHandler.do_request_
1192
1193class HTTPCookieProcessor(BaseHandler):
1194 def __init__(self, cookiejar=None):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001195 import cookielib
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001196 if cookiejar is None:
Neal Norwitz1cdd3632004-06-07 03:49:50 +00001197 cookiejar = cookielib.CookieJar()
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001198 self.cookiejar = cookiejar
1199
1200 def http_request(self, request):
1201 self.cookiejar.add_cookie_header(request)
1202 return request
1203
1204 def http_response(self, request, response):
1205 self.cookiejar.extract_cookies(response, request)
1206 return response
1207
1208 https_request = http_request
1209 https_response = http_response
Moshe Zadka8a18e992001-03-01 08:40:42 +00001210
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001211class UnknownHandler(BaseHandler):
1212 def unknown_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001213 type = req.get_type()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001214 raise URLError('unknown url type: %s' % type)
1215
1216def parse_keqv_list(l):
1217 """Parse list of key=value strings where keys are not duplicated."""
1218 parsed = {}
1219 for elt in l:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001220 k, v = elt.split('=', 1)
Fred Drake13a2c272000-02-10 17:17:14 +00001221 if v[0] == '"' and v[-1] == '"':
1222 v = v[1:-1]
1223 parsed[k] = v
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001224 return parsed
1225
1226def parse_http_list(s):
1227 """Parse lists as described by RFC 2068 Section 2.
Tim Peters9e34c042005-08-26 15:20:46 +00001228
Andrew M. Kuchling22ab06e2004-04-06 19:43:03 +00001229 In particular, parse comma-separated lists where the elements of
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001230 the list may include quoted-strings. A quoted-string could
Georg Brandle1b13d22005-08-24 22:20:32 +00001231 contain a comma. A non-quoted string could have quotes in the
1232 middle. Neither commas nor quotes count if they are escaped.
1233 Only double-quotes count, not single-quotes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001234 """
Georg Brandle1b13d22005-08-24 22:20:32 +00001235 res = []
1236 part = ''
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001237
Georg Brandle1b13d22005-08-24 22:20:32 +00001238 escape = quote = False
1239 for cur in s:
1240 if escape:
1241 part += cur
1242 escape = False
1243 continue
1244 if quote:
1245 if cur == '\\':
1246 escape = True
Fred Drake13a2c272000-02-10 17:17:14 +00001247 continue
Georg Brandle1b13d22005-08-24 22:20:32 +00001248 elif cur == '"':
1249 quote = False
1250 part += cur
1251 continue
1252
1253 if cur == ',':
1254 res.append(part)
1255 part = ''
1256 continue
1257
1258 if cur == '"':
1259 quote = True
Tim Peters9e34c042005-08-26 15:20:46 +00001260
Georg Brandle1b13d22005-08-24 22:20:32 +00001261 part += cur
1262
1263 # append last part
1264 if part:
1265 res.append(part)
1266
1267 return [part.strip() for part in res]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001268
1269class FileHandler(BaseHandler):
1270 # Use local file or FTP depending on form of URL
1271 def file_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001272 url = req.get_selector()
Senthil Kumaran9d3c5c82010-07-11 03:33:38 +00001273 if url[:2] == '//' and url[2:3] != '/' and (req.host and
1274 req.host != 'localhost'):
Fred Drake13a2c272000-02-10 17:17:14 +00001275 req.type = 'ftp'
1276 return self.parent.open(req)
1277 else:
1278 return self.open_local_file(req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001279
1280 # names for the localhost
1281 names = None
1282 def get_names(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001283 if FileHandler.names is None:
Georg Brandl4eb521e2006-04-02 20:37:17 +00001284 try:
Senthil Kumaranc4151ef2009-12-27 09:16:30 +00001285 FileHandler.names = tuple(
1286 socket.gethostbyname_ex('localhost')[2] +
1287 socket.gethostbyname_ex(socket.gethostname())[2])
Georg Brandl4eb521e2006-04-02 20:37:17 +00001288 except socket.gaierror:
1289 FileHandler.names = (socket.gethostbyname('localhost'),)
Fred Drake13a2c272000-02-10 17:17:14 +00001290 return FileHandler.names
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001291
1292 # not entirely sure what the rules are here
1293 def open_local_file(self, req):
Georg Brandl5a096e12007-01-22 19:40:21 +00001294 import email.utils
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001295 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001296 host = req.get_host()
Senthil Kumarana9a9f692010-05-08 05:03:45 +00001297 filename = req.get_selector()
1298 localfile = url2pathname(filename)
Georg Brandlceede5c2007-03-13 08:14:27 +00001299 try:
1300 stats = os.stat(localfile)
1301 size = stats.st_size
1302 modified = email.utils.formatdate(stats.st_mtime, usegmt=True)
Senthil Kumarana9a9f692010-05-08 05:03:45 +00001303 mtype = mimetypes.guess_type(filename)[0]
Georg Brandlceede5c2007-03-13 08:14:27 +00001304 headers = mimetools.Message(StringIO(
1305 'Content-type: %s\nContent-length: %d\nLast-modified: %s\n' %
1306 (mtype or 'text/plain', size, modified)))
1307 if host:
1308 host, port = splitport(host)
1309 if not host or \
1310 (not port and socket.gethostbyname(host) in self.get_names()):
Senthil Kumarana9a9f692010-05-08 05:03:45 +00001311 if host:
1312 origurl = 'file://' + host + filename
1313 else:
1314 origurl = 'file://' + filename
1315 return addinfourl(open(localfile, 'rb'), headers, origurl)
Georg Brandlceede5c2007-03-13 08:14:27 +00001316 except OSError, msg:
1317 # urllib2 users shouldn't expect OSErrors coming from urlopen()
1318 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001319 raise URLError('file not on local host')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001320
1321class FTPHandler(BaseHandler):
1322 def ftp_open(self, req):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001323 import ftplib
1324 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001325 host = req.get_host()
1326 if not host:
Neal Norwitz70700942008-01-24 07:40:51 +00001327 raise URLError('ftp error: no host given')
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001328 host, port = splitport(host)
1329 if port is None:
1330 port = ftplib.FTP_PORT
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001331 else:
1332 port = int(port)
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001333
1334 # username/password handling
1335 user, host = splituser(host)
1336 if user:
1337 user, passwd = splitpasswd(user)
1338 else:
1339 passwd = None
1340 host = unquote(host)
1341 user = unquote(user or '')
1342 passwd = unquote(passwd or '')
1343
Jeremy Hylton73574ee2000-10-12 18:54:18 +00001344 try:
1345 host = socket.gethostbyname(host)
1346 except socket.error, msg:
1347 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001348 path, attrs = splitattr(req.get_selector())
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001349 dirs = path.split('/')
Martin v. Löwis7db04e72004-02-15 20:51:39 +00001350 dirs = map(unquote, dirs)
Fred Drake13a2c272000-02-10 17:17:14 +00001351 dirs, file = dirs[:-1], dirs[-1]
1352 if dirs and not dirs[0]:
1353 dirs = dirs[1:]
Fred Drake13a2c272000-02-10 17:17:14 +00001354 try:
Facundo Batista10951d52007-06-06 17:15:23 +00001355 fw = self.connect_ftp(user, passwd, host, port, dirs, req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +00001356 type = file and 'I' or 'D'
1357 for attr in attrs:
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001358 attr, value = splitvalue(attr)
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001359 if attr.lower() == 'type' and \
Fred Drake13a2c272000-02-10 17:17:14 +00001360 value in ('a', 'A', 'i', 'I', 'd', 'D'):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001361 type = value.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001362 fp, retrlen = fw.retrfile(file, type)
Guido van Rossum833a8d82001-08-24 13:10:13 +00001363 headers = ""
1364 mtype = mimetypes.guess_type(req.get_full_url())[0]
1365 if mtype:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001366 headers += "Content-type: %s\n" % mtype
Fred Drake13a2c272000-02-10 17:17:14 +00001367 if retrlen is not None and retrlen >= 0:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001368 headers += "Content-length: %d\n" % retrlen
Guido van Rossum833a8d82001-08-24 13:10:13 +00001369 sf = StringIO(headers)
1370 headers = mimetools.Message(sf)
Fred Drake13a2c272000-02-10 17:17:14 +00001371 return addinfourl(fp, headers, req.get_full_url())
1372 except ftplib.all_errors, msg:
Neal Norwitz70700942008-01-24 07:40:51 +00001373 raise URLError, ('ftp error: %s' % msg), sys.exc_info()[2]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001374
Facundo Batista10951d52007-06-06 17:15:23 +00001375 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1376 fw = ftpwrapper(user, passwd, host, port, dirs, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001377## fw.ftp.set_debuglevel(1)
1378 return fw
1379
1380class CacheFTPHandler(FTPHandler):
1381 # XXX would be nice to have pluggable cache strategies
1382 # XXX this stuff is definitely not thread safe
1383 def __init__(self):
1384 self.cache = {}
1385 self.timeout = {}
1386 self.soonest = 0
1387 self.delay = 60
Fred Drake13a2c272000-02-10 17:17:14 +00001388 self.max_conns = 16
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001389
1390 def setTimeout(self, t):
1391 self.delay = t
1392
1393 def setMaxConns(self, m):
Fred Drake13a2c272000-02-10 17:17:14 +00001394 self.max_conns = m
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001395
Facundo Batista10951d52007-06-06 17:15:23 +00001396 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1397 key = user, host, port, '/'.join(dirs), timeout
Raymond Hettinger54f02222002-06-01 14:18:47 +00001398 if key in self.cache:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001399 self.timeout[key] = time.time() + self.delay
1400 else:
Facundo Batista10951d52007-06-06 17:15:23 +00001401 self.cache[key] = ftpwrapper(user, passwd, host, port, dirs, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001402 self.timeout[key] = time.time() + self.delay
Fred Drake13a2c272000-02-10 17:17:14 +00001403 self.check_cache()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001404 return self.cache[key]
1405
1406 def check_cache(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001407 # first check for old ones
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001408 t = time.time()
1409 if self.soonest <= t:
Raymond Hettinger4ec4fa22003-05-23 08:51:51 +00001410 for k, v in self.timeout.items():
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001411 if v < t:
1412 self.cache[k].close()
1413 del self.cache[k]
1414 del self.timeout[k]
1415 self.soonest = min(self.timeout.values())
1416
1417 # then check the size
Fred Drake13a2c272000-02-10 17:17:14 +00001418 if len(self.cache) == self.max_conns:
Brett Cannonc8b188a2003-05-17 19:51:26 +00001419 for k, v in self.timeout.items():
Fred Drake13a2c272000-02-10 17:17:14 +00001420 if v == self.soonest:
1421 del self.cache[k]
1422 del self.timeout[k]
1423 break
1424 self.soonest = min(self.timeout.values())