blob: 40e442751e0786ef2c3860238074fe5195121c11 [file] [log] [blame]
Guido van Rossume7b146f2000-02-04 15:28:42 +00001"""An extensible library for opening URLs using a variety of protocols
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00002
3The simplest way to use this module is to call the urlopen function,
Tim Peterse1190062001-01-15 03:34:38 +00004which accepts a string containing a URL or a Request object (described
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00005below). It opens the URL and returns the results as file-like
6object; the returned object has some extra methods described below.
7
Jeremy Hyltone1906632002-10-11 17:27:55 +00008The OpenerDirector manages a collection of Handler objects that do
Tim Peterse1190062001-01-15 03:34:38 +00009all the actual work. Each Handler implements a particular protocol or
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000010option. The OpenerDirector is a composite object that invokes the
11Handlers needed to open the requested URL. For example, the
12HTTPHandler performs HTTP GET and POST requests and deals with
13non-error returns. The HTTPRedirectHandler automatically deals with
Raymond Hettinger024aaa12003-04-24 15:32:12 +000014HTTP 301, 302, 303 and 307 redirect errors, and the HTTPDigestAuthHandler
15deals with digest authentication.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000016
Facundo Batistaca90ca82007-03-05 16:31:54 +000017urlopen(url, data=None) -- Basic usage is the same as original
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000018urllib. pass the url and optionally data to post to an HTTP URL, and
Tim Peterse1190062001-01-15 03:34:38 +000019get a file-like object back. One difference is that you can also pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000020a Request instance instead of URL. Raises a URLError (subclass of
21IOError); for HTTP errors, raises an HTTPError, which can also be
22treated as a valid response.
23
Facundo Batistaca90ca82007-03-05 16:31:54 +000024build_opener -- Function that creates a new OpenerDirector instance.
25Will install the default handlers. Accepts one or more Handlers as
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000026arguments, either instances or Handler classes that it will
Facundo Batistaca90ca82007-03-05 16:31:54 +000027instantiate. If one of the argument is a subclass of the default
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000028handler, the argument will be installed instead of the default.
29
Facundo Batistaca90ca82007-03-05 16:31:54 +000030install_opener -- Installs a new opener as the default opener.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000031
32objects of interest:
Senthil Kumaran51200272009-11-15 06:10:30 +000033
34OpenerDirector -- Sets up the User Agent as the Python-urllib client and manages
35the Handler classes, while dealing with requests and responses.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000036
Facundo Batistaca90ca82007-03-05 16:31:54 +000037Request -- An object that encapsulates the state of a request. The
38state can be as simple as the URL. It can also include extra HTTP
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000039headers, e.g. a User-Agent.
40
41BaseHandler --
42
43exceptions:
Facundo Batistaca90ca82007-03-05 16:31:54 +000044URLError -- A subclass of IOError, individual protocols have their own
45specific subclass.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000046
Facundo Batistaca90ca82007-03-05 16:31:54 +000047HTTPError -- Also a valid HTTP response, so you can treat an HTTP error
48as an exceptional event or valid response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000049
50internals:
51BaseHandler and parent
52_call_chain conventions
53
54Example usage:
55
56import urllib2
57
58# set up authentication info
59authinfo = urllib2.HTTPBasicAuthHandler()
Neal Norwitz8eea9ac2007-04-24 04:53:12 +000060authinfo.add_password(realm='PDQ Application',
61 uri='https://mahler:8092/site-updates.py',
62 user='klem',
63 passwd='geheim$parole')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000064
Moshe Zadka8a18e992001-03-01 08:40:42 +000065proxy_support = urllib2.ProxyHandler({"http" : "http://ahad-haam:3128"})
66
Tim Peterse1190062001-01-15 03:34:38 +000067# build a new opener that adds authentication and caching FTP handlers
Moshe Zadka8a18e992001-03-01 08:40:42 +000068opener = urllib2.build_opener(proxy_support, authinfo, urllib2.CacheFTPHandler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000069
70# install it
71urllib2.install_opener(opener)
72
73f = urllib2.urlopen('http://www.python.org/')
74
75
76"""
77
78# XXX issues:
79# If an authentication error handler that tries to perform
Fred Draked5214b02001-11-08 17:19:29 +000080# authentication for some reason but fails, how should the error be
81# signalled? The client needs to know the HTTP error code. But if
82# the handler knows that the problem was, e.g., that it didn't know
83# that hash algo that requested in the challenge, it would be good to
84# pass that information along to the client, too.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000085# ftp errors aren't handled cleanly
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000086# check digest against correct (i.e. non-apache) implementation
87
Georg Brandlc5ffd912006-04-02 20:48:11 +000088# Possible extensions:
89# complex proxies XXX not sure what exactly was meant by this
90# abstract factory for opener
91
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000092import base64
Georg Brandlbffb0bc2006-04-30 08:57:35 +000093import hashlib
Georg Brandl9d6da3e2006-05-17 15:17:00 +000094import httplib
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000095import mimetools
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000096import os
97import posixpath
98import random
99import re
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000100import socket
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000101import sys
102import time
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000103import urlparse
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000104import bisect
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000105
106try:
107 from cStringIO import StringIO
108except ImportError:
109 from StringIO import StringIO
110
Georg Brandl7fff58c2006-04-02 21:13:13 +0000111from urllib import (unwrap, unquote, splittype, splithost, quote,
Brett Cannon88f801d2008-08-18 00:46:22 +0000112 addinfourl, splitport,
113 splitattr, ftpwrapper, splituser, splitpasswd, splitvalue)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000114
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000115# support for FileHandler, proxies via environment variables
Senthil Kumaran27468662009-10-11 02:00:07 +0000116from urllib import localhost, url2pathname, getproxies, proxy_bypass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000117
Georg Brandl720096a2006-04-02 20:45:34 +0000118# used in User-Agent header sent
119__version__ = sys.version[:3]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000120
121_opener = None
Facundo Batista4f1b1ed2008-05-29 16:39:26 +0000122def urlopen(url, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000123 global _opener
124 if _opener is None:
125 _opener = build_opener()
Facundo Batista10951d52007-06-06 17:15:23 +0000126 return _opener.open(url, data, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000127
128def install_opener(opener):
129 global _opener
130 _opener = opener
131
132# do these error classes make sense?
Tim Peterse1190062001-01-15 03:34:38 +0000133# make sure all of the IOError stuff is overridden. we just want to be
Fred Drakea87a5212002-08-13 13:59:55 +0000134# subtypes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000135
136class URLError(IOError):
137 # URLError is a sub-type of IOError, but it doesn't share any of
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000138 # the implementation. need to override __init__ and __str__.
139 # It sets self.args for compatibility with other EnvironmentError
140 # subclasses, but args doesn't have the typical format with errno in
141 # slot 0 and strerror in slot 1. This may be better than nothing.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000142 def __init__(self, reason):
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000143 self.args = reason,
Fred Drake13a2c272000-02-10 17:17:14 +0000144 self.reason = reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000145
146 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000147 return '<urlopen error %s>' % self.reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000148
149class HTTPError(URLError, addinfourl):
150 """Raised when HTTP error occurs, but also acts like non-error return"""
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000151 __super_init = addinfourl.__init__
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000152
153 def __init__(self, url, code, msg, hdrs, fp):
Fred Drake13a2c272000-02-10 17:17:14 +0000154 self.code = code
155 self.msg = msg
156 self.hdrs = hdrs
157 self.fp = fp
Fred Drake13a2c272000-02-10 17:17:14 +0000158 self.filename = url
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000159 # The addinfourl classes depend on fp being a valid file
160 # object. In some cases, the HTTPError may not have a valid
161 # file object. If this happens, the simplest workaround is to
Tim Petersc411dba2002-07-16 21:35:23 +0000162 # not initialize the base classes.
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000163 if fp is not None:
Georg Brandl99bb5f32008-04-09 17:57:38 +0000164 self.__super_init(fp, hdrs, url, code)
Tim Peterse1190062001-01-15 03:34:38 +0000165
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000166 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000167 return 'HTTP Error %s: %s' % (self.code, self.msg)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000168
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000169# copied from cookielib.py
Neal Norwitzb678ce52006-05-18 06:51:46 +0000170_cut_port_re = re.compile(r":\d+$")
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000171def request_host(request):
172 """Return request-host, as defined by RFC 2965.
173
174 Variation from RFC: returned value is lowercased, for convenient
175 comparison.
176
177 """
178 url = request.get_full_url()
179 host = urlparse.urlparse(url)[1]
180 if host == "":
181 host = request.get_header("Host", "")
182
183 # remove port, if present
Neal Norwitzb678ce52006-05-18 06:51:46 +0000184 host = _cut_port_re.sub("", host, 1)
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000185 return host.lower()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000186
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000187class Request:
Moshe Zadka8a18e992001-03-01 08:40:42 +0000188
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000189 def __init__(self, url, data=None, headers={},
190 origin_req_host=None, unverifiable=False):
Fred Drake13a2c272000-02-10 17:17:14 +0000191 # unwrap('<URL:type://host/path>') --> 'type://host/path'
192 self.__original = unwrap(url)
193 self.type = None
194 # self.__r_type is what's left after doing the splittype
195 self.host = None
196 self.port = None
Senthil Kumarane266f252009-05-24 09:14:50 +0000197 self._tunnel_host = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000198 self.data = data
Fred Drake13a2c272000-02-10 17:17:14 +0000199 self.headers = {}
Brett Cannonc8b188a2003-05-17 19:51:26 +0000200 for key, value in headers.items():
Brett Cannon86503b12003-05-12 07:29:42 +0000201 self.add_header(key, value)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000202 self.unredirected_hdrs = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000203 if origin_req_host is None:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000204 origin_req_host = request_host(self)
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000205 self.origin_req_host = origin_req_host
206 self.unverifiable = unverifiable
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000207
208 def __getattr__(self, attr):
Fred Drake13a2c272000-02-10 17:17:14 +0000209 # XXX this is a fallback mechanism to guard against these
Tim Peterse1190062001-01-15 03:34:38 +0000210 # methods getting called in a non-standard order. this may be
Fred Drake13a2c272000-02-10 17:17:14 +0000211 # too complicated and/or unnecessary.
212 # XXX should the __r_XXX attributes be public?
213 if attr[:12] == '_Request__r_':
214 name = attr[12:]
215 if hasattr(Request, 'get_' + name):
216 getattr(self, 'get_' + name)()
217 return getattr(self, attr)
218 raise AttributeError, attr
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000219
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000220 def get_method(self):
221 if self.has_data():
222 return "POST"
223 else:
224 return "GET"
225
Jeremy Hylton023518a2003-12-17 18:52:16 +0000226 # XXX these helper methods are lame
227
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000228 def add_data(self, data):
229 self.data = data
230
231 def has_data(self):
232 return self.data is not None
233
234 def get_data(self):
235 return self.data
236
237 def get_full_url(self):
238 return self.__original
239
240 def get_type(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000241 if self.type is None:
242 self.type, self.__r_type = splittype(self.__original)
Jeremy Hylton78cae612001-05-09 15:49:24 +0000243 if self.type is None:
244 raise ValueError, "unknown url type: %s" % self.__original
Fred Drake13a2c272000-02-10 17:17:14 +0000245 return self.type
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000246
247 def get_host(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000248 if self.host is None:
249 self.host, self.__r_host = splithost(self.__r_type)
250 if self.host:
251 self.host = unquote(self.host)
252 return self.host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000253
254 def get_selector(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000255 return self.__r_host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000256
Moshe Zadka8a18e992001-03-01 08:40:42 +0000257 def set_proxy(self, host, type):
Senthil Kumarane266f252009-05-24 09:14:50 +0000258 if self.type == 'https' and not self._tunnel_host:
259 self._tunnel_host = self.host
260 else:
261 self.type = type
262 self.__r_host = self.__original
263
264 self.host = host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000265
Facundo Batistaeb90b782008-08-16 14:44:07 +0000266 def has_proxy(self):
267 return self.__r_host == self.__original
268
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000269 def get_origin_req_host(self):
270 return self.origin_req_host
271
272 def is_unverifiable(self):
273 return self.unverifiable
274
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000275 def add_header(self, key, val):
Fred Drake13a2c272000-02-10 17:17:14 +0000276 # useful for something like authentication
Georg Brandl8c036cc2006-08-20 13:15:39 +0000277 self.headers[key.capitalize()] = val
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000278
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000279 def add_unredirected_header(self, key, val):
280 # will not be added to a redirected request
Georg Brandl8c036cc2006-08-20 13:15:39 +0000281 self.unredirected_hdrs[key.capitalize()] = val
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000282
283 def has_header(self, header_name):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000284 return (header_name in self.headers or
285 header_name in self.unredirected_hdrs)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000286
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000287 def get_header(self, header_name, default=None):
288 return self.headers.get(
289 header_name,
290 self.unredirected_hdrs.get(header_name, default))
291
292 def header_items(self):
293 hdrs = self.unredirected_hdrs.copy()
294 hdrs.update(self.headers)
295 return hdrs.items()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000296
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000297class OpenerDirector:
298 def __init__(self):
Georg Brandl8d457c72005-06-26 22:01:35 +0000299 client_version = "Python-urllib/%s" % __version__
Georg Brandl8c036cc2006-08-20 13:15:39 +0000300 self.addheaders = [('User-agent', client_version)]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000301 # manage the individual handlers
302 self.handlers = []
303 self.handle_open = {}
304 self.handle_error = {}
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000305 self.process_response = {}
306 self.process_request = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000307
308 def add_handler(self, handler):
Georg Brandlf91149e2007-07-12 08:05:45 +0000309 if not hasattr(handler, "add_parent"):
310 raise TypeError("expected BaseHandler instance, got %r" %
311 type(handler))
312
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000313 added = False
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000314 for meth in dir(handler):
Georg Brandl261e2512006-05-29 20:52:54 +0000315 if meth in ["redirect_request", "do_open", "proxy_open"]:
316 # oops, coincidental match
317 continue
318
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000319 i = meth.find("_")
320 protocol = meth[:i]
321 condition = meth[i+1:]
322
323 if condition.startswith("error"):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000324 j = condition.find("_") + i + 1
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000325 kind = meth[j+1:]
326 try:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000327 kind = int(kind)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000328 except ValueError:
329 pass
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000330 lookup = self.handle_error.get(protocol, {})
331 self.handle_error[protocol] = lookup
332 elif condition == "open":
333 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000334 lookup = self.handle_open
335 elif condition == "response":
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000336 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000337 lookup = self.process_response
338 elif condition == "request":
339 kind = protocol
340 lookup = self.process_request
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000341 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000342 continue
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000343
344 handlers = lookup.setdefault(kind, [])
345 if handlers:
346 bisect.insort(handlers, handler)
347 else:
348 handlers.append(handler)
349 added = True
350
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000351 if added:
Facundo Batistaca90ca82007-03-05 16:31:54 +0000352 # the handlers must work in an specific order, the order
353 # is specified in a Handler attribute
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000354 bisect.insort(self.handlers, handler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000355 handler.add_parent(self)
Tim Peterse1190062001-01-15 03:34:38 +0000356
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000357 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000358 # Only exists for backwards compatibility.
359 pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000360
361 def _call_chain(self, chain, kind, meth_name, *args):
Georg Brandlc5ffd912006-04-02 20:48:11 +0000362 # Handlers raise an exception if no one else should try to handle
363 # the request, or return None if they can't but another handler
364 # could. Otherwise, they return the response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000365 handlers = chain.get(kind, ())
366 for handler in handlers:
367 func = getattr(handler, meth_name)
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000368
369 result = func(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000370 if result is not None:
371 return result
372
Facundo Batista4f1b1ed2008-05-29 16:39:26 +0000373 def open(self, fullurl, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
Fred Drake13a2c272000-02-10 17:17:14 +0000374 # accept a URL or a Request object
Walter Dörwald65230a22002-06-03 15:58:32 +0000375 if isinstance(fullurl, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000376 req = Request(fullurl, data)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000377 else:
378 req = fullurl
379 if data is not None:
380 req.add_data(data)
Tim Peterse1190062001-01-15 03:34:38 +0000381
Facundo Batista10951d52007-06-06 17:15:23 +0000382 req.timeout = timeout
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000383 protocol = req.get_type()
384
385 # pre-process request
386 meth_name = protocol+"_request"
387 for processor in self.process_request.get(protocol, []):
388 meth = getattr(processor, meth_name)
389 req = meth(req)
390
391 response = self._open(req, data)
392
393 # post-process response
394 meth_name = protocol+"_response"
395 for processor in self.process_response.get(protocol, []):
396 meth = getattr(processor, meth_name)
397 response = meth(req, response)
398
399 return response
400
401 def _open(self, req, data=None):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000402 result = self._call_chain(self.handle_open, 'default',
Tim Peterse1190062001-01-15 03:34:38 +0000403 'default_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000404 if result:
405 return result
406
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000407 protocol = req.get_type()
408 result = self._call_chain(self.handle_open, protocol, protocol +
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000409 '_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000410 if result:
411 return result
412
413 return self._call_chain(self.handle_open, 'unknown',
414 'unknown_open', req)
415
416 def error(self, proto, *args):
Raymond Hettingerdbecd932005-02-06 06:57:08 +0000417 if proto in ('http', 'https'):
Fred Draked5214b02001-11-08 17:19:29 +0000418 # XXX http[s] protocols are special-cased
419 dict = self.handle_error['http'] # https is not different than http
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000420 proto = args[2] # YUCK!
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000421 meth_name = 'http_error_%s' % proto
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000422 http_err = 1
423 orig_args = args
424 else:
425 dict = self.handle_error
426 meth_name = proto + '_error'
427 http_err = 0
428 args = (dict, proto, meth_name) + args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000429 result = self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000430 if result:
431 return result
432
433 if http_err:
434 args = (dict, 'default', 'http_error_default') + orig_args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000435 return self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000436
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000437# XXX probably also want an abstract factory that knows when it makes
438# sense to skip a superclass in favor of a subclass and when it might
439# make sense to include both
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000440
441def build_opener(*handlers):
442 """Create an opener object from a list of handlers.
443
444 The opener will use several default handlers, including support
Senthil Kumaran51200272009-11-15 06:10:30 +0000445 for HTTP, FTP and when applicable, HTTPS.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000446
447 If any of the handlers passed as arguments are subclasses of the
448 default handlers, the default handlers will not be used.
449 """
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000450 import types
451 def isclass(obj):
Benjamin Peterson4bb96fe2009-02-12 04:17:04 +0000452 return isinstance(obj, (types.ClassType, type))
Tim Peterse1190062001-01-15 03:34:38 +0000453
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000454 opener = OpenerDirector()
455 default_classes = [ProxyHandler, UnknownHandler, HTTPHandler,
456 HTTPDefaultErrorHandler, HTTPRedirectHandler,
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000457 FTPHandler, FileHandler, HTTPErrorProcessor]
Moshe Zadka8a18e992001-03-01 08:40:42 +0000458 if hasattr(httplib, 'HTTPS'):
459 default_classes.append(HTTPSHandler)
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000460 skip = set()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000461 for klass in default_classes:
462 for check in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000463 if isclass(check):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000464 if issubclass(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000465 skip.add(klass)
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000466 elif isinstance(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000467 skip.add(klass)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000468 for klass in skip:
469 default_classes.remove(klass)
470
471 for klass in default_classes:
472 opener.add_handler(klass())
473
474 for h in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000475 if isclass(h):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000476 h = h()
477 opener.add_handler(h)
478 return opener
479
480class BaseHandler:
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000481 handler_order = 500
482
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000483 def add_parent(self, parent):
484 self.parent = parent
Tim Peters58eb11c2004-01-18 20:29:55 +0000485
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000486 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000487 # Only exists for backwards compatibility
488 pass
Tim Peters58eb11c2004-01-18 20:29:55 +0000489
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000490 def __lt__(self, other):
491 if not hasattr(other, "handler_order"):
492 # Try to preserve the old behavior of having custom classes
493 # inserted after default ones (works only for custom user
494 # classes which are not aware of handler_order).
495 return True
496 return self.handler_order < other.handler_order
Tim Petersf545baa2003-06-15 23:26:30 +0000497
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000498
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000499class HTTPErrorProcessor(BaseHandler):
500 """Process HTTP error responses."""
501 handler_order = 1000 # after all other processing
502
503 def http_response(self, request, response):
504 code, msg, hdrs = response.code, response.msg, response.info()
505
Neal Norwitz0d4c06e2007-04-25 06:30:05 +0000506 # According to RFC 2616, "2xx" code indicates that the client's
Facundo Batista9fab9f12007-04-23 17:08:31 +0000507 # request was successfully received, understood, and accepted.
508 if not (200 <= code < 300):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000509 response = self.parent.error(
510 'http', request, response, code, msg, hdrs)
511
512 return response
513
514 https_response = http_response
515
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000516class HTTPDefaultErrorHandler(BaseHandler):
517 def http_error_default(self, req, fp, code, msg, hdrs):
Fred Drake13a2c272000-02-10 17:17:14 +0000518 raise HTTPError(req.get_full_url(), code, msg, hdrs, fp)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000519
520class HTTPRedirectHandler(BaseHandler):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000521 # maximum number of redirections to any single URL
522 # this is needed because of the state that cookies introduce
523 max_repeats = 4
524 # maximum total number of redirections (regardless of URL) before
525 # assuming we're in a loop
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000526 max_redirections = 10
527
Jeremy Hylton03892952003-05-05 04:09:13 +0000528 def redirect_request(self, req, fp, code, msg, headers, newurl):
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000529 """Return a Request or None in response to a redirect.
530
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000531 This is called by the http_error_30x methods when a
532 redirection response is received. If a redirection should
533 take place, return a new Request to allow http_error_30x to
534 perform the redirect. Otherwise, raise HTTPError if no-one
535 else should try to handle this url. Return None if you can't
536 but another Handler might.
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000537 """
Jeremy Hylton828023b2003-05-04 23:44:49 +0000538 m = req.get_method()
539 if (code in (301, 302, 303, 307) and m in ("GET", "HEAD")
Martin v. Löwis162f0812003-07-12 07:33:32 +0000540 or code in (301, 302, 303) and m == "POST"):
541 # Strictly (according to RFC 2616), 301 or 302 in response
542 # to a POST MUST NOT cause a redirection without confirmation
Jeremy Hylton828023b2003-05-04 23:44:49 +0000543 # from the user (of urllib2, in this case). In practice,
544 # essentially all clients do redirect in this case, so we
545 # do the same.
Georg Brandlddb84d72006-03-18 11:35:18 +0000546 # be conciliant with URIs containing a space
547 newurl = newurl.replace(' ', '%20')
Facundo Batista86371d62008-02-07 19:06:52 +0000548 newheaders = dict((k,v) for k,v in req.headers.items()
549 if k.lower() not in ("content-length", "content-type")
550 )
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000551 return Request(newurl,
Facundo Batista86371d62008-02-07 19:06:52 +0000552 headers=newheaders,
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000553 origin_req_host=req.get_origin_req_host(),
554 unverifiable=True)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000555 else:
Martin v. Löwise3b67bc2003-06-14 05:51:25 +0000556 raise HTTPError(req.get_full_url(), code, msg, headers, fp)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000557
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000558 # Implementation note: To avoid the server sending us into an
559 # infinite loop, the request object needs to track what URLs we
560 # have already seen. Do this by adding a handler-specific
561 # attribute to the Request object.
562 def http_error_302(self, req, fp, code, msg, headers):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000563 # Some servers (incorrectly) return multiple Location headers
564 # (so probably same goes for URI). Use first header.
Raymond Hettinger54f02222002-06-01 14:18:47 +0000565 if 'location' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000566 newurl = headers.getheaders('location')[0]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000567 elif 'uri' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000568 newurl = headers.getheaders('uri')[0]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000569 else:
570 return
Facundo Batista94f243a2008-08-17 03:38:39 +0000571
572 # fix a possible malformed URL
573 urlparts = urlparse.urlparse(newurl)
574 if not urlparts.path:
575 urlparts = list(urlparts)
576 urlparts[2] = "/"
577 newurl = urlparse.urlunparse(urlparts)
578
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000579 newurl = urlparse.urljoin(req.get_full_url(), newurl)
580
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000581 # XXX Probably want to forget about the state of the current
582 # request, although that might interact poorly with other
583 # handlers that also use handler-specific request attributes
Jeremy Hylton03892952003-05-05 04:09:13 +0000584 new = self.redirect_request(req, fp, code, msg, headers, newurl)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000585 if new is None:
586 return
587
588 # loop detection
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000589 # .redirect_dict has a key url if url was previously visited.
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000590 if hasattr(req, 'redirect_dict'):
591 visited = new.redirect_dict = req.redirect_dict
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000592 if (visited.get(newurl, 0) >= self.max_repeats or
593 len(visited) >= self.max_redirections):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000594 raise HTTPError(req.get_full_url(), code,
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000595 self.inf_msg + msg, headers, fp)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000596 else:
597 visited = new.redirect_dict = req.redirect_dict = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000598 visited[newurl] = visited.get(newurl, 0) + 1
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000599
600 # Don't close the fp until we are sure that we won't use it
Tim Petersab9ba272001-08-09 21:40:30 +0000601 # with HTTPError.
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000602 fp.read()
603 fp.close()
604
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000605 return self.parent.open(new, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000606
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000607 http_error_301 = http_error_303 = http_error_307 = http_error_302
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000608
Martin v. Löwis162f0812003-07-12 07:33:32 +0000609 inf_msg = "The HTTP server returned a redirect error that would " \
Thomas Wouters7e474022000-07-16 12:04:32 +0000610 "lead to an infinite loop.\n" \
Martin v. Löwis162f0812003-07-12 07:33:32 +0000611 "The last 30x error message was:\n"
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000612
Georg Brandl720096a2006-04-02 20:45:34 +0000613
614def _parse_proxy(proxy):
615 """Return (scheme, user, password, host/port) given a URL or an authority.
616
617 If a URL is supplied, it must have an authority (host:port) component.
618 According to RFC 3986, having an authority component means the URL must
619 have two slashes after the scheme:
620
621 >>> _parse_proxy('file:/ftp.example.com/')
622 Traceback (most recent call last):
623 ValueError: proxy URL with no authority: 'file:/ftp.example.com/'
624
625 The first three items of the returned tuple may be None.
626
627 Examples of authority parsing:
628
629 >>> _parse_proxy('proxy.example.com')
630 (None, None, None, 'proxy.example.com')
631 >>> _parse_proxy('proxy.example.com:3128')
632 (None, None, None, 'proxy.example.com:3128')
633
634 The authority component may optionally include userinfo (assumed to be
635 username:password):
636
637 >>> _parse_proxy('joe:password@proxy.example.com')
638 (None, 'joe', 'password', 'proxy.example.com')
639 >>> _parse_proxy('joe:password@proxy.example.com:3128')
640 (None, 'joe', 'password', 'proxy.example.com:3128')
641
642 Same examples, but with URLs instead:
643
644 >>> _parse_proxy('http://proxy.example.com/')
645 ('http', None, None, 'proxy.example.com')
646 >>> _parse_proxy('http://proxy.example.com:3128/')
647 ('http', None, None, 'proxy.example.com:3128')
648 >>> _parse_proxy('http://joe:password@proxy.example.com/')
649 ('http', 'joe', 'password', 'proxy.example.com')
650 >>> _parse_proxy('http://joe:password@proxy.example.com:3128')
651 ('http', 'joe', 'password', 'proxy.example.com:3128')
652
653 Everything after the authority is ignored:
654
655 >>> _parse_proxy('ftp://joe:password@proxy.example.com/rubbish:3128')
656 ('ftp', 'joe', 'password', 'proxy.example.com')
657
658 Test for no trailing '/' case:
659
660 >>> _parse_proxy('http://joe:password@proxy.example.com')
661 ('http', 'joe', 'password', 'proxy.example.com')
662
663 """
Georg Brandl720096a2006-04-02 20:45:34 +0000664 scheme, r_scheme = splittype(proxy)
665 if not r_scheme.startswith("/"):
666 # authority
667 scheme = None
668 authority = proxy
669 else:
670 # URL
671 if not r_scheme.startswith("//"):
672 raise ValueError("proxy URL with no authority: %r" % proxy)
673 # We have an authority, so for RFC 3986-compliant URLs (by ss 3.
674 # and 3.3.), path is empty or starts with '/'
675 end = r_scheme.find("/", 2)
676 if end == -1:
677 end = None
678 authority = r_scheme[2:end]
679 userinfo, hostport = splituser(authority)
680 if userinfo is not None:
681 user, password = splitpasswd(userinfo)
682 else:
683 user = password = None
684 return scheme, user, password, hostport
685
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000686class ProxyHandler(BaseHandler):
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000687 # Proxies must be in front
688 handler_order = 100
689
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000690 def __init__(self, proxies=None):
Fred Drake13a2c272000-02-10 17:17:14 +0000691 if proxies is None:
692 proxies = getproxies()
693 assert hasattr(proxies, 'has_key'), "proxies must be a mapping"
694 self.proxies = proxies
Brett Cannondf0d87a2003-05-18 02:25:07 +0000695 for type, url in proxies.items():
Tim Peterse1190062001-01-15 03:34:38 +0000696 setattr(self, '%s_open' % type,
Fred Drake13a2c272000-02-10 17:17:14 +0000697 lambda r, proxy=url, type=type, meth=self.proxy_open: \
698 meth(r, proxy, type))
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000699
700 def proxy_open(self, req, proxy, type):
Fred Drake13a2c272000-02-10 17:17:14 +0000701 orig_type = req.get_type()
Georg Brandl720096a2006-04-02 20:45:34 +0000702 proxy_type, user, password, hostport = _parse_proxy(proxy)
Senthil Kumaran27468662009-10-11 02:00:07 +0000703
Georg Brandl720096a2006-04-02 20:45:34 +0000704 if proxy_type is None:
705 proxy_type = orig_type
Senthil Kumaran27468662009-10-11 02:00:07 +0000706
707 if req.host and proxy_bypass(req.host):
708 return None
709
Georg Brandl531ceba2006-01-21 07:20:56 +0000710 if user and password:
Georg Brandl720096a2006-04-02 20:45:34 +0000711 user_pass = '%s:%s' % (unquote(user), unquote(password))
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000712 creds = base64.b64encode(user_pass).strip()
Georg Brandl8c036cc2006-08-20 13:15:39 +0000713 req.add_header('Proxy-authorization', 'Basic ' + creds)
Georg Brandl720096a2006-04-02 20:45:34 +0000714 hostport = unquote(hostport)
715 req.set_proxy(hostport, proxy_type)
Senthil Kumaran27468662009-10-11 02:00:07 +0000716
Senthil Kumarane266f252009-05-24 09:14:50 +0000717 if orig_type == proxy_type or orig_type == 'https':
Fred Drake13a2c272000-02-10 17:17:14 +0000718 # let other handlers take care of it
Fred Drake13a2c272000-02-10 17:17:14 +0000719 return None
720 else:
721 # need to start over, because the other handlers don't
722 # grok the proxy's URL type
Georg Brandl720096a2006-04-02 20:45:34 +0000723 # e.g. if we have a constructor arg proxies like so:
724 # {'http': 'ftp://proxy.example.com'}, we may end up turning
725 # a request for http://acme.example.com/a into one for
726 # ftp://proxy.example.com/a
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000727 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000728
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000729class HTTPPasswordMgr:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000730
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000731 def __init__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000732 self.passwd = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000733
734 def add_password(self, realm, uri, user, passwd):
Fred Drake13a2c272000-02-10 17:17:14 +0000735 # uri could be a single URI or a sequence
Walter Dörwald65230a22002-06-03 15:58:32 +0000736 if isinstance(uri, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000737 uri = [uri]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000738 if not realm in self.passwd:
Fred Drake13a2c272000-02-10 17:17:14 +0000739 self.passwd[realm] = {}
Georg Brandl2b330372006-05-28 20:23:12 +0000740 for default_port in True, False:
741 reduced_uri = tuple(
742 [self.reduce_uri(u, default_port) for u in uri])
743 self.passwd[realm][reduced_uri] = (user, passwd)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000744
745 def find_user_password(self, realm, authuri):
Fred Drake13a2c272000-02-10 17:17:14 +0000746 domains = self.passwd.get(realm, {})
Georg Brandl2b330372006-05-28 20:23:12 +0000747 for default_port in True, False:
748 reduced_authuri = self.reduce_uri(authuri, default_port)
749 for uris, authinfo in domains.iteritems():
750 for uri in uris:
751 if self.is_suburi(uri, reduced_authuri):
752 return authinfo
Fred Drake13a2c272000-02-10 17:17:14 +0000753 return None, None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000754
Georg Brandl2b330372006-05-28 20:23:12 +0000755 def reduce_uri(self, uri, default_port=True):
756 """Accept authority or URI and extract only the authority and path."""
757 # note HTTP URLs do not have a userinfo component
Georg Brandlfa42bd72006-04-30 07:06:11 +0000758 parts = urlparse.urlsplit(uri)
Fred Drake13a2c272000-02-10 17:17:14 +0000759 if parts[1]:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000760 # URI
Georg Brandl2b330372006-05-28 20:23:12 +0000761 scheme = parts[0]
762 authority = parts[1]
763 path = parts[2] or '/'
Fred Drake13a2c272000-02-10 17:17:14 +0000764 else:
Georg Brandl2b330372006-05-28 20:23:12 +0000765 # host or host:port
766 scheme = None
767 authority = uri
768 path = '/'
769 host, port = splitport(authority)
770 if default_port and port is None and scheme is not None:
771 dport = {"http": 80,
772 "https": 443,
773 }.get(scheme)
774 if dport is not None:
775 authority = "%s:%d" % (host, dport)
776 return authority, path
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000777
778 def is_suburi(self, base, test):
Fred Drake13a2c272000-02-10 17:17:14 +0000779 """Check if test is below base in a URI tree
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000780
Fred Drake13a2c272000-02-10 17:17:14 +0000781 Both args must be URIs in reduced form.
782 """
783 if base == test:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000784 return True
Fred Drake13a2c272000-02-10 17:17:14 +0000785 if base[0] != test[0]:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000786 return False
Moshe Zadka8a18e992001-03-01 08:40:42 +0000787 common = posixpath.commonprefix((base[1], test[1]))
Fred Drake13a2c272000-02-10 17:17:14 +0000788 if len(common) == len(base[1]):
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000789 return True
790 return False
Tim Peterse1190062001-01-15 03:34:38 +0000791
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000792
Moshe Zadka8a18e992001-03-01 08:40:42 +0000793class HTTPPasswordMgrWithDefaultRealm(HTTPPasswordMgr):
794
795 def find_user_password(self, realm, authuri):
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000796 user, password = HTTPPasswordMgr.find_user_password(self, realm,
797 authuri)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000798 if user is not None:
799 return user, password
800 return HTTPPasswordMgr.find_user_password(self, None, authuri)
801
802
803class AbstractBasicAuthHandler:
804
Georg Brandl172e7252007-03-07 07:39:06 +0000805 # XXX this allows for multiple auth-schemes, but will stupidly pick
806 # the last one with a realm specified.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000807
Georg Brandl33124322008-03-21 19:54:00 +0000808 # allow for double- and single-quoted realm values
809 # (single quotes are a violation of the RFC, but appear in the wild)
810 rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
811 'realm=(["\'])(.*?)\\2', re.I)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000812
Georg Brandl261e2512006-05-29 20:52:54 +0000813 # XXX could pre-emptively send auth info already accepted (RFC 2617,
814 # end of section 2, and section 1.2 immediately after "credentials"
815 # production).
816
Moshe Zadka8a18e992001-03-01 08:40:42 +0000817 def __init__(self, password_mgr=None):
818 if password_mgr is None:
819 password_mgr = HTTPPasswordMgr()
820 self.passwd = password_mgr
Fred Drake13a2c272000-02-10 17:17:14 +0000821 self.add_password = self.passwd.add_password
Senthil Kumaran4f0108b2010-06-01 12:40:07 +0000822 self.retried = 0
Tim Peterse1190062001-01-15 03:34:38 +0000823
Moshe Zadka8a18e992001-03-01 08:40:42 +0000824 def http_error_auth_reqed(self, authreq, host, req, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000825 # host may be an authority (without userinfo) or a URL with an
826 # authority
Moshe Zadka8a18e992001-03-01 08:40:42 +0000827 # XXX could be multiple headers
828 authreq = headers.get(authreq, None)
Senthil Kumaran4f0108b2010-06-01 12:40:07 +0000829
830 if self.retried > 5:
831 # retry sending the username:password 5 times before failing.
832 raise HTTPError(req.get_full_url(), 401, "basic auth failed",
833 headers, None)
834 else:
835 self.retried += 1
836
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000837 if authreq:
Martin v. Löwis65a79752004-08-03 12:59:55 +0000838 mo = AbstractBasicAuthHandler.rx.search(authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000839 if mo:
Georg Brandl33124322008-03-21 19:54:00 +0000840 scheme, quote, realm = mo.groups()
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000841 if scheme.lower() == 'basic':
Moshe Zadka8a18e992001-03-01 08:40:42 +0000842 return self.retry_http_basic_auth(host, req, realm)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000843
Moshe Zadka8a18e992001-03-01 08:40:42 +0000844 def retry_http_basic_auth(self, host, req, realm):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000845 user, pw = self.passwd.find_user_password(realm, host)
Martin v. Löwis8b3e8712004-05-06 01:41:26 +0000846 if pw is not None:
Fred Drake13a2c272000-02-10 17:17:14 +0000847 raw = "%s:%s" % (user, pw)
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000848 auth = 'Basic %s' % base64.b64encode(raw).strip()
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000849 if req.headers.get(self.auth_header, None) == auth:
850 return None
Senthil Kumaran8526adf2010-02-24 16:45:46 +0000851 req.add_unredirected_header(self.auth_header, auth)
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000852 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000853 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000854 return None
855
Georg Brandlfa42bd72006-04-30 07:06:11 +0000856
Moshe Zadka8a18e992001-03-01 08:40:42 +0000857class HTTPBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000858
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000859 auth_header = 'Authorization'
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000860
Moshe Zadka8a18e992001-03-01 08:40:42 +0000861 def http_error_401(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000862 url = req.get_full_url()
Tim Peters30edd232001-03-16 08:29:48 +0000863 return self.http_error_auth_reqed('www-authenticate',
Georg Brandlfa42bd72006-04-30 07:06:11 +0000864 url, req, headers)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000865
866
867class ProxyBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
868
Georg Brandl8c036cc2006-08-20 13:15:39 +0000869 auth_header = 'Proxy-authorization'
Moshe Zadka8a18e992001-03-01 08:40:42 +0000870
871 def http_error_407(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000872 # http_error_auth_reqed requires that there is no userinfo component in
873 # authority. Assume there isn't one, since urllib2 does not (and
874 # should not, RFC 3986 s. 3.2.1) support requests for URLs containing
875 # userinfo.
876 authority = req.get_host()
Tim Peters30edd232001-03-16 08:29:48 +0000877 return self.http_error_auth_reqed('proxy-authenticate',
Georg Brandlfa42bd72006-04-30 07:06:11 +0000878 authority, req, headers)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000879
880
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000881def randombytes(n):
882 """Return n random bytes."""
883 # Use /dev/urandom if it is available. Fall back to random module
884 # if not. It might be worthwhile to extend this function to use
885 # other platform-specific mechanisms for getting random bytes.
886 if os.path.exists("/dev/urandom"):
887 f = open("/dev/urandom")
888 s = f.read(n)
889 f.close()
890 return s
891 else:
892 L = [chr(random.randrange(0, 256)) for i in range(n)]
893 return "".join(L)
894
Moshe Zadka8a18e992001-03-01 08:40:42 +0000895class AbstractDigestAuthHandler:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000896 # Digest authentication is specified in RFC 2617.
897
898 # XXX The client does not inspect the Authentication-Info header
899 # in a successful response.
900
901 # XXX It should be possible to test this implementation against
902 # a mock server that just generates a static set of challenges.
903
904 # XXX qop="auth-int" supports is shaky
Moshe Zadka8a18e992001-03-01 08:40:42 +0000905
906 def __init__(self, passwd=None):
907 if passwd is None:
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000908 passwd = HTTPPasswordMgr()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000909 self.passwd = passwd
Fred Drake13a2c272000-02-10 17:17:14 +0000910 self.add_password = self.passwd.add_password
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000911 self.retried = 0
912 self.nonce_count = 0
Senthil Kumaran20eb4f02009-11-15 08:36:20 +0000913 self.last_nonce = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000914
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000915 def reset_retry_count(self):
916 self.retried = 0
917
918 def http_error_auth_reqed(self, auth_header, host, req, headers):
919 authreq = headers.get(auth_header, None)
920 if self.retried > 5:
921 # Don't fail endlessly - if we failed once, we'll probably
922 # fail a second time. Hm. Unless the Password Manager is
923 # prompting for the information. Crap. This isn't great
924 # but it's better than the current 'repeat until recursion
925 # depth exceeded' approach <wink>
Tim Peters58eb11c2004-01-18 20:29:55 +0000926 raise HTTPError(req.get_full_url(), 401, "digest auth failed",
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000927 headers, None)
928 else:
929 self.retried += 1
Fred Drake13a2c272000-02-10 17:17:14 +0000930 if authreq:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000931 scheme = authreq.split()[0]
932 if scheme.lower() == 'digest':
Fred Drake13a2c272000-02-10 17:17:14 +0000933 return self.retry_http_digest_auth(req, authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000934
935 def retry_http_digest_auth(self, req, auth):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000936 token, challenge = auth.split(' ', 1)
Fred Drake13a2c272000-02-10 17:17:14 +0000937 chal = parse_keqv_list(parse_http_list(challenge))
938 auth = self.get_authorization(req, chal)
939 if auth:
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000940 auth_val = 'Digest %s' % auth
941 if req.headers.get(self.auth_header, None) == auth_val:
942 return None
Georg Brandl852bb002006-05-03 05:05:02 +0000943 req.add_unredirected_header(self.auth_header, auth_val)
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000944 resp = self.parent.open(req, timeout=req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +0000945 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000946
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000947 def get_cnonce(self, nonce):
948 # The cnonce-value is an opaque
949 # quoted string value provided by the client and used by both client
950 # and server to avoid chosen plaintext attacks, to provide mutual
951 # authentication, and to provide some message integrity protection.
952 # This isn't a fabulous effort, but it's probably Good Enough.
Georg Brandlbffb0bc2006-04-30 08:57:35 +0000953 dig = hashlib.sha1("%s:%s:%s:%s" % (self.nonce_count, nonce, time.ctime(),
954 randombytes(8))).hexdigest()
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000955 return dig[:16]
956
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000957 def get_authorization(self, req, chal):
Fred Drake13a2c272000-02-10 17:17:14 +0000958 try:
959 realm = chal['realm']
960 nonce = chal['nonce']
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000961 qop = chal.get('qop')
Fred Drake13a2c272000-02-10 17:17:14 +0000962 algorithm = chal.get('algorithm', 'MD5')
963 # mod_digest doesn't send an opaque, even though it isn't
964 # supposed to be optional
965 opaque = chal.get('opaque', None)
966 except KeyError:
967 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000968
Fred Drake13a2c272000-02-10 17:17:14 +0000969 H, KD = self.get_algorithm_impls(algorithm)
970 if H is None:
971 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000972
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000973 user, pw = self.passwd.find_user_password(realm, req.get_full_url())
Fred Drake13a2c272000-02-10 17:17:14 +0000974 if user is None:
975 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000976
Fred Drake13a2c272000-02-10 17:17:14 +0000977 # XXX not implemented yet
978 if req.has_data():
979 entdig = self.get_entity_digest(req.get_data(), chal)
980 else:
981 entdig = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000982
Fred Drake13a2c272000-02-10 17:17:14 +0000983 A1 = "%s:%s:%s" % (user, realm, pw)
Johannes Gijsberscdd625a2005-01-09 05:51:49 +0000984 A2 = "%s:%s" % (req.get_method(),
Fred Drake13a2c272000-02-10 17:17:14 +0000985 # XXX selector: what about proxies and full urls
986 req.get_selector())
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000987 if qop == 'auth':
Senthil Kumaran20eb4f02009-11-15 08:36:20 +0000988 if nonce == self.last_nonce:
989 self.nonce_count += 1
990 else:
991 self.nonce_count = 1
992 self.last_nonce = nonce
993
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000994 ncvalue = '%08x' % self.nonce_count
995 cnonce = self.get_cnonce(nonce)
996 noncebit = "%s:%s:%s:%s:%s" % (nonce, ncvalue, cnonce, qop, H(A2))
997 respdig = KD(H(A1), noncebit)
998 elif qop is None:
999 respdig = KD(H(A1), "%s:%s" % (nonce, H(A2)))
1000 else:
1001 # XXX handle auth-int.
Georg Brandlff871222007-06-07 13:34:10 +00001002 raise URLError("qop '%s' is not supported." % qop)
Tim Peters58eb11c2004-01-18 20:29:55 +00001003
Fred Drake13a2c272000-02-10 17:17:14 +00001004 # XXX should the partial digests be encoded too?
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001005
Fred Drake13a2c272000-02-10 17:17:14 +00001006 base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \
1007 'response="%s"' % (user, realm, nonce, req.get_selector(),
1008 respdig)
1009 if opaque:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001010 base += ', opaque="%s"' % opaque
Fred Drake13a2c272000-02-10 17:17:14 +00001011 if entdig:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001012 base += ', digest="%s"' % entdig
1013 base += ', algorithm="%s"' % algorithm
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001014 if qop:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001015 base += ', qop=auth, nc=%s, cnonce="%s"' % (ncvalue, cnonce)
Fred Drake13a2c272000-02-10 17:17:14 +00001016 return base
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001017
1018 def get_algorithm_impls(self, algorithm):
Georg Brandl8d66dcd2008-05-04 21:40:44 +00001019 # algorithm should be case-insensitive according to RFC2617
1020 algorithm = algorithm.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001021 # lambdas assume digest modules are imported at the top level
1022 if algorithm == 'MD5':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001023 H = lambda x: hashlib.md5(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001024 elif algorithm == 'SHA':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001025 H = lambda x: hashlib.sha1(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001026 # XXX MD5-sess
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001027 KD = lambda s, d: H("%s:%s" % (s, d))
Fred Drake13a2c272000-02-10 17:17:14 +00001028 return H, KD
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001029
1030 def get_entity_digest(self, data, chal):
Fred Drake13a2c272000-02-10 17:17:14 +00001031 # XXX not implemented yet
1032 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001033
Moshe Zadka8a18e992001-03-01 08:40:42 +00001034
1035class HTTPDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1036 """An authentication protocol defined by RFC 2069
1037
1038 Digest authentication improves on basic authentication because it
1039 does not transmit passwords in the clear.
1040 """
1041
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001042 auth_header = 'Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001043 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001044
1045 def http_error_401(self, req, fp, code, msg, headers):
1046 host = urlparse.urlparse(req.get_full_url())[1]
Tim Peters58eb11c2004-01-18 20:29:55 +00001047 retry = self.http_error_auth_reqed('www-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001048 host, req, headers)
1049 self.reset_retry_count()
1050 return retry
Moshe Zadka8a18e992001-03-01 08:40:42 +00001051
1052
1053class ProxyDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1054
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001055 auth_header = 'Proxy-Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001056 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001057
1058 def http_error_407(self, req, fp, code, msg, headers):
1059 host = req.get_host()
Tim Peters58eb11c2004-01-18 20:29:55 +00001060 retry = self.http_error_auth_reqed('proxy-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001061 host, req, headers)
1062 self.reset_retry_count()
1063 return retry
Tim Peterse1190062001-01-15 03:34:38 +00001064
Moshe Zadka8a18e992001-03-01 08:40:42 +00001065class AbstractHTTPHandler(BaseHandler):
1066
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001067 def __init__(self, debuglevel=0):
1068 self._debuglevel = debuglevel
1069
1070 def set_http_debuglevel(self, level):
1071 self._debuglevel = level
1072
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001073 def do_request_(self, request):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001074 host = request.get_host()
1075 if not host:
1076 raise URLError('no host given')
1077
1078 if request.has_data(): # POST
1079 data = request.get_data()
Georg Brandl8c036cc2006-08-20 13:15:39 +00001080 if not request.has_header('Content-type'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001081 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001082 'Content-type',
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001083 'application/x-www-form-urlencoded')
Georg Brandl8c036cc2006-08-20 13:15:39 +00001084 if not request.has_header('Content-length'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001085 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001086 'Content-length', '%d' % len(data))
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001087
Facundo Batistaeb90b782008-08-16 14:44:07 +00001088 sel_host = host
1089 if request.has_proxy():
1090 scheme, sel = splittype(request.get_selector())
1091 sel_host, sel_path = splithost(sel)
1092
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001093 if not request.has_header('Host'):
Facundo Batistaeb90b782008-08-16 14:44:07 +00001094 request.add_unredirected_header('Host', sel_host)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001095 for name, value in self.parent.addheaders:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001096 name = name.capitalize()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001097 if not request.has_header(name):
1098 request.add_unredirected_header(name, value)
1099
1100 return request
1101
Moshe Zadka8a18e992001-03-01 08:40:42 +00001102 def do_open(self, http_class, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001103 """Return an addinfourl object for the request, using http_class.
1104
1105 http_class must implement the HTTPConnection API from httplib.
1106 The addinfourl return value is a file-like object. It also
1107 has methods and attributes including:
1108 - info(): return a mimetools.Message object for the headers
1109 - geturl(): return the original request URL
1110 - code: HTTP status code
1111 """
Moshe Zadka76676802001-04-11 07:44:53 +00001112 host = req.get_host()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001113 if not host:
1114 raise URLError('no host given')
1115
Facundo Batista10951d52007-06-06 17:15:23 +00001116 h = http_class(host, timeout=req.timeout) # will parse host:port
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001117 h.set_debuglevel(self._debuglevel)
Tim Peterse1190062001-01-15 03:34:38 +00001118
Jeremy Hylton023518a2003-12-17 18:52:16 +00001119 headers = dict(req.headers)
1120 headers.update(req.unredirected_hdrs)
Jeremy Hyltonb3ee6f92004-02-24 19:40:35 +00001121 # We want to make an HTTP/1.1 request, but the addinfourl
1122 # class isn't prepared to deal with a persistent connection.
1123 # It will try to read all remaining data from the socket,
1124 # which will block while the server waits for the next request.
1125 # So make sure the connection gets closed after the (only)
1126 # request.
1127 headers["Connection"] = "close"
Georg Brandl8c036cc2006-08-20 13:15:39 +00001128 headers = dict(
1129 (name.title(), val) for name, val in headers.items())
Senthil Kumarane266f252009-05-24 09:14:50 +00001130
1131 if req._tunnel_host:
Senthil Kumaran7713acf2009-12-20 06:05:13 +00001132 tunnel_headers = {}
1133 proxy_auth_hdr = "Proxy-Authorization"
1134 if proxy_auth_hdr in headers:
1135 tunnel_headers[proxy_auth_hdr] = headers[proxy_auth_hdr]
1136 # Proxy-Authorization should not be sent to origin
1137 # server.
1138 del headers[proxy_auth_hdr]
1139 h.set_tunnel(req._tunnel_host, headers=tunnel_headers)
Senthil Kumarane266f252009-05-24 09:14:50 +00001140
Jeremy Hylton828023b2003-05-04 23:44:49 +00001141 try:
Jeremy Hylton023518a2003-12-17 18:52:16 +00001142 h.request(req.get_method(), req.get_selector(), req.data, headers)
Kristján Valur Jónsson3c43fcb2009-01-11 16:23:37 +00001143 try:
1144 r = h.getresponse(buffering=True)
1145 except TypeError: #buffering kw not supported
1146 r = h.getresponse()
Jeremy Hylton023518a2003-12-17 18:52:16 +00001147 except socket.error, err: # XXX what error?
Jeremy Hylton828023b2003-05-04 23:44:49 +00001148 raise URLError(err)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001149
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001150 # Pick apart the HTTPResponse object to get the addinfourl
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001151 # object initialized properly.
1152
1153 # Wrap the HTTPResponse object in socket's file object adapter
1154 # for Windows. That adapter calls recv(), so delegate recv()
1155 # to read(). This weird wrapping allows the returned object to
1156 # have readline() and readlines() methods.
Tim Peters9ca3f852004-08-08 01:05:14 +00001157
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001158 # XXX It might be better to extract the read buffering code
1159 # out of socket._fileobject() and into a base class.
Tim Peters9ca3f852004-08-08 01:05:14 +00001160
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001161 r.recv = r.read
Georg Brandldd7b0522007-01-21 10:35:10 +00001162 fp = socket._fileobject(r, close=True)
Tim Peters9ca3f852004-08-08 01:05:14 +00001163
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001164 resp = addinfourl(fp, r.msg, req.get_full_url())
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001165 resp.code = r.status
1166 resp.msg = r.reason
1167 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001168
Moshe Zadka8a18e992001-03-01 08:40:42 +00001169
1170class HTTPHandler(AbstractHTTPHandler):
1171
1172 def http_open(self, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001173 return self.do_open(httplib.HTTPConnection, req)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001174
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001175 http_request = AbstractHTTPHandler.do_request_
Moshe Zadka8a18e992001-03-01 08:40:42 +00001176
1177if hasattr(httplib, 'HTTPS'):
1178 class HTTPSHandler(AbstractHTTPHandler):
1179
1180 def https_open(self, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001181 return self.do_open(httplib.HTTPSConnection, req)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001182
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001183 https_request = AbstractHTTPHandler.do_request_
1184
1185class HTTPCookieProcessor(BaseHandler):
1186 def __init__(self, cookiejar=None):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001187 import cookielib
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001188 if cookiejar is None:
Neal Norwitz1cdd3632004-06-07 03:49:50 +00001189 cookiejar = cookielib.CookieJar()
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001190 self.cookiejar = cookiejar
1191
1192 def http_request(self, request):
1193 self.cookiejar.add_cookie_header(request)
1194 return request
1195
1196 def http_response(self, request, response):
1197 self.cookiejar.extract_cookies(response, request)
1198 return response
1199
1200 https_request = http_request
1201 https_response = http_response
Moshe Zadka8a18e992001-03-01 08:40:42 +00001202
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001203class UnknownHandler(BaseHandler):
1204 def unknown_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001205 type = req.get_type()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001206 raise URLError('unknown url type: %s' % type)
1207
1208def parse_keqv_list(l):
1209 """Parse list of key=value strings where keys are not duplicated."""
1210 parsed = {}
1211 for elt in l:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001212 k, v = elt.split('=', 1)
Fred Drake13a2c272000-02-10 17:17:14 +00001213 if v[0] == '"' and v[-1] == '"':
1214 v = v[1:-1]
1215 parsed[k] = v
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001216 return parsed
1217
1218def parse_http_list(s):
1219 """Parse lists as described by RFC 2068 Section 2.
Tim Peters9e34c042005-08-26 15:20:46 +00001220
Andrew M. Kuchling22ab06e2004-04-06 19:43:03 +00001221 In particular, parse comma-separated lists where the elements of
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001222 the list may include quoted-strings. A quoted-string could
Georg Brandle1b13d22005-08-24 22:20:32 +00001223 contain a comma. A non-quoted string could have quotes in the
1224 middle. Neither commas nor quotes count if they are escaped.
1225 Only double-quotes count, not single-quotes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001226 """
Georg Brandle1b13d22005-08-24 22:20:32 +00001227 res = []
1228 part = ''
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001229
Georg Brandle1b13d22005-08-24 22:20:32 +00001230 escape = quote = False
1231 for cur in s:
1232 if escape:
1233 part += cur
1234 escape = False
1235 continue
1236 if quote:
1237 if cur == '\\':
1238 escape = True
Fred Drake13a2c272000-02-10 17:17:14 +00001239 continue
Georg Brandle1b13d22005-08-24 22:20:32 +00001240 elif cur == '"':
1241 quote = False
1242 part += cur
1243 continue
1244
1245 if cur == ',':
1246 res.append(part)
1247 part = ''
1248 continue
1249
1250 if cur == '"':
1251 quote = True
Tim Peters9e34c042005-08-26 15:20:46 +00001252
Georg Brandle1b13d22005-08-24 22:20:32 +00001253 part += cur
1254
1255 # append last part
1256 if part:
1257 res.append(part)
1258
1259 return [part.strip() for part in res]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001260
1261class FileHandler(BaseHandler):
1262 # Use local file or FTP depending on form of URL
1263 def file_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001264 url = req.get_selector()
1265 if url[:2] == '//' and url[2:3] != '/':
1266 req.type = 'ftp'
1267 return self.parent.open(req)
1268 else:
1269 return self.open_local_file(req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001270
1271 # names for the localhost
1272 names = None
1273 def get_names(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001274 if FileHandler.names is None:
Georg Brandl4eb521e2006-04-02 20:37:17 +00001275 try:
Senthil Kumaran13c2ef92009-12-27 09:11:09 +00001276 FileHandler.names = tuple(
1277 socket.gethostbyname_ex('localhost')[2] +
1278 socket.gethostbyname_ex(socket.gethostname())[2])
Georg Brandl4eb521e2006-04-02 20:37:17 +00001279 except socket.gaierror:
1280 FileHandler.names = (socket.gethostbyname('localhost'),)
Fred Drake13a2c272000-02-10 17:17:14 +00001281 return FileHandler.names
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001282
1283 # not entirely sure what the rules are here
1284 def open_local_file(self, req):
Georg Brandl5a096e12007-01-22 19:40:21 +00001285 import email.utils
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001286 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001287 host = req.get_host()
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001288 filename = req.get_selector()
1289 localfile = url2pathname(filename)
Georg Brandlceede5c2007-03-13 08:14:27 +00001290 try:
1291 stats = os.stat(localfile)
1292 size = stats.st_size
1293 modified = email.utils.formatdate(stats.st_mtime, usegmt=True)
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001294 mtype = mimetypes.guess_type(filename)[0]
Georg Brandlceede5c2007-03-13 08:14:27 +00001295 headers = mimetools.Message(StringIO(
1296 'Content-type: %s\nContent-length: %d\nLast-modified: %s\n' %
1297 (mtype or 'text/plain', size, modified)))
1298 if host:
1299 host, port = splitport(host)
1300 if not host or \
1301 (not port and socket.gethostbyname(host) in self.get_names()):
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001302 if host:
1303 origurl = 'file://' + host + filename
1304 else:
1305 origurl = 'file://' + filename
1306 return addinfourl(open(localfile, 'rb'), headers, origurl)
Georg Brandlceede5c2007-03-13 08:14:27 +00001307 except OSError, msg:
1308 # urllib2 users shouldn't expect OSErrors coming from urlopen()
1309 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001310 raise URLError('file not on local host')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001311
1312class FTPHandler(BaseHandler):
1313 def ftp_open(self, req):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001314 import ftplib
1315 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001316 host = req.get_host()
1317 if not host:
Neal Norwitz70700942008-01-24 07:40:51 +00001318 raise URLError('ftp error: no host given')
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001319 host, port = splitport(host)
1320 if port is None:
1321 port = ftplib.FTP_PORT
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001322 else:
1323 port = int(port)
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001324
1325 # username/password handling
1326 user, host = splituser(host)
1327 if user:
1328 user, passwd = splitpasswd(user)
1329 else:
1330 passwd = None
1331 host = unquote(host)
1332 user = unquote(user or '')
1333 passwd = unquote(passwd or '')
1334
Jeremy Hylton73574ee2000-10-12 18:54:18 +00001335 try:
1336 host = socket.gethostbyname(host)
1337 except socket.error, msg:
1338 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001339 path, attrs = splitattr(req.get_selector())
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001340 dirs = path.split('/')
Martin v. Löwis7db04e72004-02-15 20:51:39 +00001341 dirs = map(unquote, dirs)
Fred Drake13a2c272000-02-10 17:17:14 +00001342 dirs, file = dirs[:-1], dirs[-1]
1343 if dirs and not dirs[0]:
1344 dirs = dirs[1:]
Fred Drake13a2c272000-02-10 17:17:14 +00001345 try:
Facundo Batista10951d52007-06-06 17:15:23 +00001346 fw = self.connect_ftp(user, passwd, host, port, dirs, req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +00001347 type = file and 'I' or 'D'
1348 for attr in attrs:
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001349 attr, value = splitvalue(attr)
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001350 if attr.lower() == 'type' and \
Fred Drake13a2c272000-02-10 17:17:14 +00001351 value in ('a', 'A', 'i', 'I', 'd', 'D'):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001352 type = value.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001353 fp, retrlen = fw.retrfile(file, type)
Guido van Rossum833a8d82001-08-24 13:10:13 +00001354 headers = ""
1355 mtype = mimetypes.guess_type(req.get_full_url())[0]
1356 if mtype:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001357 headers += "Content-type: %s\n" % mtype
Fred Drake13a2c272000-02-10 17:17:14 +00001358 if retrlen is not None and retrlen >= 0:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001359 headers += "Content-length: %d\n" % retrlen
Guido van Rossum833a8d82001-08-24 13:10:13 +00001360 sf = StringIO(headers)
1361 headers = mimetools.Message(sf)
Fred Drake13a2c272000-02-10 17:17:14 +00001362 return addinfourl(fp, headers, req.get_full_url())
1363 except ftplib.all_errors, msg:
Neal Norwitz70700942008-01-24 07:40:51 +00001364 raise URLError, ('ftp error: %s' % msg), sys.exc_info()[2]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001365
Facundo Batista10951d52007-06-06 17:15:23 +00001366 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1367 fw = ftpwrapper(user, passwd, host, port, dirs, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001368## fw.ftp.set_debuglevel(1)
1369 return fw
1370
1371class CacheFTPHandler(FTPHandler):
1372 # XXX would be nice to have pluggable cache strategies
1373 # XXX this stuff is definitely not thread safe
1374 def __init__(self):
1375 self.cache = {}
1376 self.timeout = {}
1377 self.soonest = 0
1378 self.delay = 60
Fred Drake13a2c272000-02-10 17:17:14 +00001379 self.max_conns = 16
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001380
1381 def setTimeout(self, t):
1382 self.delay = t
1383
1384 def setMaxConns(self, m):
Fred Drake13a2c272000-02-10 17:17:14 +00001385 self.max_conns = m
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001386
Facundo Batista10951d52007-06-06 17:15:23 +00001387 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1388 key = user, host, port, '/'.join(dirs), timeout
Raymond Hettinger54f02222002-06-01 14:18:47 +00001389 if key in self.cache:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001390 self.timeout[key] = time.time() + self.delay
1391 else:
Facundo Batista10951d52007-06-06 17:15:23 +00001392 self.cache[key] = ftpwrapper(user, passwd, host, port, dirs, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001393 self.timeout[key] = time.time() + self.delay
Fred Drake13a2c272000-02-10 17:17:14 +00001394 self.check_cache()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001395 return self.cache[key]
1396
1397 def check_cache(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001398 # first check for old ones
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001399 t = time.time()
1400 if self.soonest <= t:
Raymond Hettinger4ec4fa22003-05-23 08:51:51 +00001401 for k, v in self.timeout.items():
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001402 if v < t:
1403 self.cache[k].close()
1404 del self.cache[k]
1405 del self.timeout[k]
1406 self.soonest = min(self.timeout.values())
1407
1408 # then check the size
Fred Drake13a2c272000-02-10 17:17:14 +00001409 if len(self.cache) == self.max_conns:
Brett Cannonc8b188a2003-05-17 19:51:26 +00001410 for k, v in self.timeout.items():
Fred Drake13a2c272000-02-10 17:17:14 +00001411 if v == self.soonest:
1412 del self.cache[k]
1413 del self.timeout[k]
1414 break
1415 self.soonest = min(self.timeout.values())