blob: 267a90dd80db29f55408c10017536ad0efc2296c [file] [log] [blame]
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001"""An extensible library for opening URLs using a variety of protocols
2
3The simplest way to use this module is to call the urlopen function,
4which accepts a string containing a URL or a Request object (described
5below). It opens the URL and returns the results as file-like
6object; the returned object has some extra methods described below.
7
8The OpenerDirector manages a collection of Handler objects that do
9all the actual work. Each Handler implements a particular protocol or
10option. The OpenerDirector is a composite object that invokes the
11Handlers needed to open the requested URL. For example, the
12HTTPHandler performs HTTP GET and POST requests and deals with
13non-error returns. The HTTPRedirectHandler automatically deals with
14HTTP 301, 302, 303 and 307 redirect errors, and the HTTPDigestAuthHandler
15deals with digest authentication.
16
17urlopen(url, data=None) -- Basic usage is the same as original
18urllib. pass the url and optionally data to post to an HTTP URL, and
19get a file-like object back. One difference is that you can also pass
20a Request instance instead of URL. Raises a URLError (subclass of
Andrew Svetlovf7a17b42012-12-25 16:47:37 +020021OSError); for HTTP errors, raises an HTTPError, which can also be
Jeremy Hylton1afc1692008-06-18 20:49:58 +000022treated as a valid response.
23
24build_opener -- Function that creates a new OpenerDirector instance.
25Will install the default handlers. Accepts one or more Handlers as
26arguments, either instances or Handler classes that it will
27instantiate. If one of the argument is a subclass of the default
28handler, the argument will be installed instead of the default.
29
30install_opener -- Installs a new opener as the default opener.
31
32objects of interest:
Senthil Kumaran1107c5d2009-11-15 06:20:55 +000033
Senthil Kumaran47fff872009-12-20 07:10:31 +000034OpenerDirector -- Sets up the User Agent as the Python-urllib client and manages
35the Handler classes, while dealing with requests and responses.
Jeremy Hylton1afc1692008-06-18 20:49:58 +000036
37Request -- An object that encapsulates the state of a request. The
38state can be as simple as the URL. It can also include extra HTTP
39headers, e.g. a User-Agent.
40
41BaseHandler --
42
43internals:
44BaseHandler and parent
45_call_chain conventions
46
47Example usage:
48
Georg Brandl029986a2008-06-23 11:44:14 +000049import urllib.request
Jeremy Hylton1afc1692008-06-18 20:49:58 +000050
51# set up authentication info
Georg Brandl029986a2008-06-23 11:44:14 +000052authinfo = urllib.request.HTTPBasicAuthHandler()
Jeremy Hylton1afc1692008-06-18 20:49:58 +000053authinfo.add_password(realm='PDQ Application',
54 uri='https://mahler:8092/site-updates.py',
55 user='klem',
56 passwd='geheim$parole')
57
Georg Brandl029986a2008-06-23 11:44:14 +000058proxy_support = urllib.request.ProxyHandler({"http" : "http://ahad-haam:3128"})
Jeremy Hylton1afc1692008-06-18 20:49:58 +000059
60# build a new opener that adds authentication and caching FTP handlers
Georg Brandl029986a2008-06-23 11:44:14 +000061opener = urllib.request.build_opener(proxy_support, authinfo,
62 urllib.request.CacheFTPHandler)
Jeremy Hylton1afc1692008-06-18 20:49:58 +000063
64# install it
Georg Brandl029986a2008-06-23 11:44:14 +000065urllib.request.install_opener(opener)
Jeremy Hylton1afc1692008-06-18 20:49:58 +000066
Georg Brandl029986a2008-06-23 11:44:14 +000067f = urllib.request.urlopen('http://www.python.org/')
Jeremy Hylton1afc1692008-06-18 20:49:58 +000068"""
69
70# XXX issues:
71# If an authentication error handler that tries to perform
72# authentication for some reason but fails, how should the error be
73# signalled? The client needs to know the HTTP error code. But if
74# the handler knows that the problem was, e.g., that it didn't know
75# that hash algo that requested in the challenge, it would be good to
76# pass that information along to the client, too.
77# ftp errors aren't handled cleanly
78# check digest against correct (i.e. non-apache) implementation
79
80# Possible extensions:
81# complex proxies XXX not sure what exactly was meant by this
82# abstract factory for opener
83
84import base64
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +000085import bisect
Jeremy Hylton1afc1692008-06-18 20:49:58 +000086import email
87import hashlib
88import http.client
89import io
90import os
91import posixpath
Jeremy Hylton1afc1692008-06-18 20:49:58 +000092import re
93import socket
Martin Pantere6f06092016-05-16 01:14:20 +000094import string
Jeremy Hylton1afc1692008-06-18 20:49:58 +000095import sys
96import time
Senthil Kumarane24f96a2012-03-13 19:29:33 -070097import tempfile
98import contextlib
Senthil Kumaran38b968b92012-03-14 13:43:53 -070099import warnings
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700100
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000101
Georg Brandl13e89462008-07-01 19:56:00 +0000102from urllib.error import URLError, HTTPError, ContentTooShortError
103from urllib.parse import (
Rémi Lapeyre674ee122019-05-27 15:43:45 +0200104 urlparse, urlsplit, urljoin, unwrap, quote, unquote,
Cheryl Sabella0250de42018-04-25 16:51:54 -0700105 _splittype, _splithost, _splitport, _splituser, _splitpasswd,
106 _splitattr, _splitquery, _splitvalue, _splittag, _to_bytes,
Antoine Pitroudf204be2012-11-24 17:59:08 +0100107 unquote_to_bytes, urlunparse)
Georg Brandl13e89462008-07-01 19:56:00 +0000108from urllib.response import addinfourl, addclosehook
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000109
110# check for SSL
111try:
112 import ssl
Brett Cannoncd171c82013-07-04 17:43:24 -0400113except ImportError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000114 _have_ssl = False
115else:
116 _have_ssl = True
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000117
Senthil Kumaran6c5bd402011-11-01 23:20:31 +0800118__all__ = [
119 # Classes
120 'Request', 'OpenerDirector', 'BaseHandler', 'HTTPDefaultErrorHandler',
121 'HTTPRedirectHandler', 'HTTPCookieProcessor', 'ProxyHandler',
122 'HTTPPasswordMgr', 'HTTPPasswordMgrWithDefaultRealm',
R David Murray4c7f9952015-04-16 16:36:18 -0400123 'HTTPPasswordMgrWithPriorAuth', 'AbstractBasicAuthHandler',
124 'HTTPBasicAuthHandler', 'ProxyBasicAuthHandler', 'AbstractDigestAuthHandler',
125 'HTTPDigestAuthHandler', 'ProxyDigestAuthHandler', 'HTTPHandler',
126 'FileHandler', 'FTPHandler', 'CacheFTPHandler', 'DataHandler',
Senthil Kumaran6c5bd402011-11-01 23:20:31 +0800127 'UnknownHandler', 'HTTPErrorProcessor',
128 # Functions
129 'urlopen', 'install_opener', 'build_opener',
130 'pathname2url', 'url2pathname', 'getproxies',
131 # Legacy interface
132 'urlretrieve', 'urlcleanup', 'URLopener', 'FancyURLopener',
133]
134
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000135# used in User-Agent header sent
Serhiy Storchaka885bdc42016-02-11 13:10:36 +0200136__version__ = '%d.%d' % sys.version_info[:2]
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000137
138_opener = None
Antoine Pitrou803e6d62010-10-13 10:36:15 +0000139def urlopen(url, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT,
Senthil Kumarana5c85b32014-09-19 15:23:30 +0800140 *, cafile=None, capath=None, cadefault=False, context=None):
Raymond Hettinger507343a2015-08-18 00:35:52 -0700141 '''Open the URL url, which can be either a string or a Request object.
142
Martin Panter3c0d0ba2016-08-24 06:33:33 +0000143 *data* must be an object specifying additional data to be sent to
144 the server, or None if no such data is needed. See Request for
145 details.
Raymond Hettinger507343a2015-08-18 00:35:52 -0700146
147 urllib.request module uses HTTP/1.1 and includes a "Connection:close"
148 header in its HTTP requests.
149
150 The optional *timeout* parameter specifies a timeout in seconds for
151 blocking operations like the connection attempt (if not specified, the
152 global default timeout setting will be used). This only works for HTTP,
153 HTTPS and FTP connections.
154
155 If *context* is specified, it must be a ssl.SSLContext instance describing
156 the various SSL options. See HTTPSConnection for more details.
157
158 The optional *cafile* and *capath* parameters specify a set of trusted CA
159 certificates for HTTPS requests. cafile should point to a single file
160 containing a bundle of CA certificates, whereas capath should point to a
161 directory of hashed certificate files. More information can be found in
162 ssl.SSLContext.load_verify_locations().
163
164 The *cadefault* parameter is ignored.
165
Raymond Hettinger507343a2015-08-18 00:35:52 -0700166
Ashwin Ramaswamiff2e1822019-09-13 04:40:08 -0700167 This function always returns an object which can work as a
168 context manager and has the properties url, headers, and status.
169 See urllib.response.addinfourl for more detail on these properties.
Raymond Hettinger507343a2015-08-18 00:35:52 -0700170
Martin Panter29f256902016-06-04 05:06:34 +0000171 For HTTP and HTTPS URLs, this function returns a http.client.HTTPResponse
172 object slightly modified. In addition to the three new methods above, the
173 msg attribute contains the same information as the reason attribute ---
174 the reason phrase returned by the server --- instead of the response
175 headers as it is specified in the documentation for HTTPResponse.
R David Murrayd2367c62016-06-03 20:16:06 -0400176
Martin Panter29f256902016-06-04 05:06:34 +0000177 For FTP, file, and data URLs and requests explicitly handled by legacy
178 URLopener and FancyURLopener classes, this function returns a
179 urllib.response.addinfourl object.
180
181 Note that None may be returned if no handler handles the request (though
Raymond Hettinger507343a2015-08-18 00:35:52 -0700182 the default installed global OpenerDirector uses UnknownHandler to ensure
183 this never happens).
184
185 In addition, if proxy settings are detected (for example, when a *_proxy
186 environment variable like http_proxy is set), ProxyHandler is default
187 installed and makes sure the requests are handled through the proxy.
188
189 '''
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000190 global _opener
Antoine Pitroude9ac6c2012-05-16 21:40:01 +0200191 if cafile or capath or cadefault:
Christian Heimesd0486372016-09-10 23:23:33 +0200192 import warnings
Boštjan Mejak15869582018-11-25 19:32:50 +0100193 warnings.warn("cafile, capath and cadefault are deprecated, use a "
Christian Heimesd0486372016-09-10 23:23:33 +0200194 "custom context instead.", DeprecationWarning, 2)
Senthil Kumarana5c85b32014-09-19 15:23:30 +0800195 if context is not None:
196 raise ValueError(
197 "You can't pass both context and any of cafile, capath, and "
198 "cadefault"
199 )
Antoine Pitrou803e6d62010-10-13 10:36:15 +0000200 if not _have_ssl:
201 raise ValueError('SSL support not available')
Benjamin Petersonb6666972014-12-07 13:46:02 -0500202 context = ssl.create_default_context(ssl.Purpose.SERVER_AUTH,
Christian Heimes67986f92013-11-23 22:43:47 +0100203 cafile=cafile,
204 capath=capath)
Benjamin Petersonb6666972014-12-07 13:46:02 -0500205 https_handler = HTTPSHandler(context=context)
Antoine Pitrou803e6d62010-10-13 10:36:15 +0000206 opener = build_opener(https_handler)
Senthil Kumarana5c85b32014-09-19 15:23:30 +0800207 elif context:
208 https_handler = HTTPSHandler(context=context)
209 opener = build_opener(https_handler)
Antoine Pitrou803e6d62010-10-13 10:36:15 +0000210 elif _opener is None:
211 _opener = opener = build_opener()
212 else:
213 opener = _opener
214 return opener.open(url, data, timeout)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000215
216def install_opener(opener):
217 global _opener
218 _opener = opener
219
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700220_url_tempfiles = []
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000221def urlretrieve(url, filename=None, reporthook=None, data=None):
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700222 """
223 Retrieve a URL into a temporary location on disk.
224
225 Requires a URL argument. If a filename is passed, it is used as
226 the temporary file location. The reporthook argument should be
227 a callable that accepts a block number, a read size, and the
228 total file size of the URL target. The data argument should be
229 valid URL encoded data.
230
231 If a filename is passed and the URL points to a local resource,
232 the result is a copy from local file to new file.
233
234 Returns a tuple containing the path to the newly created
235 data file as well as the resulting HTTPMessage object.
236 """
Cheryl Sabella0250de42018-04-25 16:51:54 -0700237 url_type, path = _splittype(url)
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700238
239 with contextlib.closing(urlopen(url, data)) as fp:
240 headers = fp.info()
241
242 # Just return the local path and the "headers" for file://
243 # URLs. No sense in performing a copy unless requested.
244 if url_type == "file" and not filename:
245 return os.path.normpath(path), headers
246
247 # Handle temporary file setup.
248 if filename:
249 tfp = open(filename, 'wb')
250 else:
251 tfp = tempfile.NamedTemporaryFile(delete=False)
252 filename = tfp.name
253 _url_tempfiles.append(filename)
254
255 with tfp:
256 result = filename, headers
257 bs = 1024*8
258 size = -1
259 read = 0
260 blocknum = 0
261 if "content-length" in headers:
262 size = int(headers["Content-Length"])
263
264 if reporthook:
Gregory P. Smith6b0bdab2012-11-10 13:43:44 -0800265 reporthook(blocknum, bs, size)
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700266
267 while True:
268 block = fp.read(bs)
269 if not block:
270 break
271 read += len(block)
272 tfp.write(block)
273 blocknum += 1
274 if reporthook:
Gregory P. Smith6b0bdab2012-11-10 13:43:44 -0800275 reporthook(blocknum, bs, size)
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700276
277 if size >= 0 and read < size:
278 raise ContentTooShortError(
279 "retrieval incomplete: got only %i out of %i bytes"
280 % (read, size), result)
281
282 return result
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000283
284def urlcleanup():
Robert Collins2fee5c92015-08-04 12:52:06 +1200285 """Clean up temporary files from urlretrieve calls."""
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700286 for temp_file in _url_tempfiles:
287 try:
288 os.unlink(temp_file)
Andrew Svetlov3438fa42012-12-17 23:35:18 +0200289 except OSError:
Senthil Kumarane24f96a2012-03-13 19:29:33 -0700290 pass
291
292 del _url_tempfiles[:]
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000293 global _opener
294 if _opener:
295 _opener = None
296
297# copied from cookielib.py
Antoine Pitroufd036452008-08-19 17:56:33 +0000298_cut_port_re = re.compile(r":\d+$", re.ASCII)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000299def request_host(request):
300 """Return request-host, as defined by RFC 2965.
301
302 Variation from RFC: returned value is lowercased, for convenient
303 comparison.
304
305 """
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000306 url = request.full_url
Georg Brandl13e89462008-07-01 19:56:00 +0000307 host = urlparse(url)[1]
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000308 if host == "":
309 host = request.get_header("Host", "")
310
311 # remove port, if present
312 host = _cut_port_re.sub("", host, 1)
313 return host.lower()
314
315class Request:
316
317 def __init__(self, url, data=None, headers={},
Senthil Kumarande49d642011-10-16 23:54:44 +0800318 origin_req_host=None, unverifiable=False,
319 method=None):
Senthil Kumaran52380922013-04-25 05:45:48 -0700320 self.full_url = url
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000321 self.headers = {}
Andrew Svetlovbff98fe2012-11-27 23:06:19 +0200322 self.unredirected_hdrs = {}
323 self._data = None
324 self.data = data
Senthil Kumaran97f0c6b2009-07-25 04:24:38 +0000325 self._tunnel_host = None
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000326 for key, value in headers.items():
327 self.add_header(key, value)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000328 if origin_req_host is None:
329 origin_req_host = request_host(self)
330 self.origin_req_host = origin_req_host
331 self.unverifiable = unverifiable
Jason R. Coombs7dc4f4b2013-09-08 12:47:07 -0400332 if method:
333 self.method = method
Senthil Kumaran52380922013-04-25 05:45:48 -0700334
335 @property
336 def full_url(self):
Senthil Kumaran83070752013-05-24 09:14:12 -0700337 if self.fragment:
338 return '{}#{}'.format(self._full_url, self.fragment)
Senthil Kumaran52380922013-04-25 05:45:48 -0700339 return self._full_url
340
341 @full_url.setter
342 def full_url(self, url):
343 # unwrap('<URL:type://host/path>') --> 'type://host/path'
Rémi Lapeyre674ee122019-05-27 15:43:45 +0200344 self._full_url = unwrap(url)
Cheryl Sabella0250de42018-04-25 16:51:54 -0700345 self._full_url, self.fragment = _splittag(self._full_url)
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000346 self._parse()
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000347
Senthil Kumaran52380922013-04-25 05:45:48 -0700348 @full_url.deleter
349 def full_url(self):
350 self._full_url = None
351 self.fragment = None
352 self.selector = ''
353
Andrew Svetlovbff98fe2012-11-27 23:06:19 +0200354 @property
355 def data(self):
356 return self._data
357
358 @data.setter
359 def data(self, data):
360 if data != self._data:
361 self._data = data
362 # issue 16464
363 # if we change data we need to remove content-length header
364 # (cause it's most probably calculated for previous value)
365 if self.has_header("Content-length"):
366 self.remove_header("Content-length")
367
368 @data.deleter
369 def data(self):
R David Murray9cc7d452013-03-20 00:10:51 -0400370 self.data = None
Andrew Svetlovbff98fe2012-11-27 23:06:19 +0200371
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000372 def _parse(self):
Cheryl Sabella0250de42018-04-25 16:51:54 -0700373 self.type, rest = _splittype(self._full_url)
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000374 if self.type is None:
R David Murrayd8a46962013-04-03 06:58:34 -0400375 raise ValueError("unknown url type: %r" % self.full_url)
Cheryl Sabella0250de42018-04-25 16:51:54 -0700376 self.host, self.selector = _splithost(rest)
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000377 if self.host:
378 self.host = unquote(self.host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000379
380 def get_method(self):
Senthil Kumarande49d642011-10-16 23:54:44 +0800381 """Return a string indicating the HTTP request method."""
Jason R. Coombsaae6a1d2013-09-08 12:54:33 -0400382 default_method = "POST" if self.data is not None else "GET"
383 return getattr(self, 'method', default_method)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000384
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000385 def get_full_url(self):
Senthil Kumaran52380922013-04-25 05:45:48 -0700386 return self.full_url
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000387
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000388 def set_proxy(self, host, type):
Senthil Kumaran97f0c6b2009-07-25 04:24:38 +0000389 if self.type == 'https' and not self._tunnel_host:
390 self._tunnel_host = self.host
391 else:
392 self.type= type
393 self.selector = self.full_url
394 self.host = host
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000395
396 def has_proxy(self):
397 return self.selector == self.full_url
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000398
399 def add_header(self, key, val):
400 # useful for something like authentication
401 self.headers[key.capitalize()] = val
402
403 def add_unredirected_header(self, key, val):
404 # will not be added to a redirected request
405 self.unredirected_hdrs[key.capitalize()] = val
406
407 def has_header(self, header_name):
408 return (header_name in self.headers or
409 header_name in self.unredirected_hdrs)
410
411 def get_header(self, header_name, default=None):
412 return self.headers.get(
413 header_name,
414 self.unredirected_hdrs.get(header_name, default))
415
Andrew Svetlovbff98fe2012-11-27 23:06:19 +0200416 def remove_header(self, header_name):
417 self.headers.pop(header_name, None)
418 self.unredirected_hdrs.pop(header_name, None)
419
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000420 def header_items(self):
Serhiy Storchakada084702019-03-27 08:02:28 +0200421 hdrs = {**self.unredirected_hdrs, **self.headers}
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000422 return list(hdrs.items())
423
424class OpenerDirector:
425 def __init__(self):
426 client_version = "Python-urllib/%s" % __version__
427 self.addheaders = [('User-agent', client_version)]
R. David Murray25b8cca2010-12-23 19:44:49 +0000428 # self.handlers is retained only for backward compatibility
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000429 self.handlers = []
R. David Murray25b8cca2010-12-23 19:44:49 +0000430 # manage the individual handlers
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000431 self.handle_open = {}
432 self.handle_error = {}
433 self.process_response = {}
434 self.process_request = {}
435
436 def add_handler(self, handler):
437 if not hasattr(handler, "add_parent"):
438 raise TypeError("expected BaseHandler instance, got %r" %
439 type(handler))
440
441 added = False
442 for meth in dir(handler):
443 if meth in ["redirect_request", "do_open", "proxy_open"]:
444 # oops, coincidental match
445 continue
446
447 i = meth.find("_")
448 protocol = meth[:i]
449 condition = meth[i+1:]
450
451 if condition.startswith("error"):
452 j = condition.find("_") + i + 1
453 kind = meth[j+1:]
454 try:
455 kind = int(kind)
456 except ValueError:
457 pass
458 lookup = self.handle_error.get(protocol, {})
459 self.handle_error[protocol] = lookup
460 elif condition == "open":
461 kind = protocol
462 lookup = self.handle_open
463 elif condition == "response":
464 kind = protocol
465 lookup = self.process_response
466 elif condition == "request":
467 kind = protocol
468 lookup = self.process_request
469 else:
470 continue
471
472 handlers = lookup.setdefault(kind, [])
473 if handlers:
474 bisect.insort(handlers, handler)
475 else:
476 handlers.append(handler)
477 added = True
478
479 if added:
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000480 bisect.insort(self.handlers, handler)
481 handler.add_parent(self)
482
483 def close(self):
484 # Only exists for backwards compatibility.
485 pass
486
487 def _call_chain(self, chain, kind, meth_name, *args):
488 # Handlers raise an exception if no one else should try to handle
489 # the request, or return None if they can't but another handler
490 # could. Otherwise, they return the response.
491 handlers = chain.get(kind, ())
492 for handler in handlers:
493 func = getattr(handler, meth_name)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000494 result = func(*args)
495 if result is not None:
496 return result
497
498 def open(self, fullurl, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
499 # accept a URL or a Request object
500 if isinstance(fullurl, str):
501 req = Request(fullurl, data)
502 else:
503 req = fullurl
504 if data is not None:
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000505 req.data = data
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000506
507 req.timeout = timeout
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000508 protocol = req.type
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000509
510 # pre-process request
511 meth_name = protocol+"_request"
512 for processor in self.process_request.get(protocol, []):
513 meth = getattr(processor, meth_name)
514 req = meth(req)
515
Steve Dowerb82e17e2019-05-23 08:45:22 -0700516 sys.audit('urllib.Request', req.full_url, req.data, req.headers, req.get_method())
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000517 response = self._open(req, data)
518
519 # post-process response
520 meth_name = protocol+"_response"
521 for processor in self.process_response.get(protocol, []):
522 meth = getattr(processor, meth_name)
523 response = meth(req, response)
524
525 return response
526
527 def _open(self, req, data=None):
528 result = self._call_chain(self.handle_open, 'default',
529 'default_open', req)
530 if result:
531 return result
532
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000533 protocol = req.type
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000534 result = self._call_chain(self.handle_open, protocol, protocol +
535 '_open', req)
536 if result:
537 return result
538
539 return self._call_chain(self.handle_open, 'unknown',
540 'unknown_open', req)
541
542 def error(self, proto, *args):
543 if proto in ('http', 'https'):
544 # XXX http[s] protocols are special-cased
545 dict = self.handle_error['http'] # https is not different than http
546 proto = args[2] # YUCK!
547 meth_name = 'http_error_%s' % proto
548 http_err = 1
549 orig_args = args
550 else:
551 dict = self.handle_error
552 meth_name = proto + '_error'
553 http_err = 0
554 args = (dict, proto, meth_name) + args
555 result = self._call_chain(*args)
556 if result:
557 return result
558
559 if http_err:
560 args = (dict, 'default', 'http_error_default') + orig_args
561 return self._call_chain(*args)
562
563# XXX probably also want an abstract factory that knows when it makes
564# sense to skip a superclass in favor of a subclass and when it might
565# make sense to include both
566
567def build_opener(*handlers):
568 """Create an opener object from a list of handlers.
569
570 The opener will use several default handlers, including support
Senthil Kumaran1107c5d2009-11-15 06:20:55 +0000571 for HTTP, FTP and when applicable HTTPS.
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000572
573 If any of the handlers passed as arguments are subclasses of the
574 default handlers, the default handlers will not be used.
575 """
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000576 opener = OpenerDirector()
577 default_classes = [ProxyHandler, UnknownHandler, HTTPHandler,
578 HTTPDefaultErrorHandler, HTTPRedirectHandler,
Antoine Pitroudf204be2012-11-24 17:59:08 +0100579 FTPHandler, FileHandler, HTTPErrorProcessor,
580 DataHandler]
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000581 if hasattr(http.client, "HTTPSConnection"):
582 default_classes.append(HTTPSHandler)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000583 skip = set()
584 for klass in default_classes:
585 for check in handlers:
Benjamin Peterson78c85382014-04-01 16:27:30 -0400586 if isinstance(check, type):
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000587 if issubclass(check, klass):
588 skip.add(klass)
589 elif isinstance(check, klass):
590 skip.add(klass)
591 for klass in skip:
592 default_classes.remove(klass)
593
594 for klass in default_classes:
595 opener.add_handler(klass())
596
597 for h in handlers:
Benjamin Peterson5dd3cae2014-04-01 14:20:56 -0400598 if isinstance(h, type):
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000599 h = h()
600 opener.add_handler(h)
601 return opener
602
603class BaseHandler:
604 handler_order = 500
605
606 def add_parent(self, parent):
607 self.parent = parent
608
609 def close(self):
610 # Only exists for backwards compatibility
611 pass
612
613 def __lt__(self, other):
614 if not hasattr(other, "handler_order"):
615 # Try to preserve the old behavior of having custom classes
616 # inserted after default ones (works only for custom user
617 # classes which are not aware of handler_order).
618 return True
619 return self.handler_order < other.handler_order
620
621
622class HTTPErrorProcessor(BaseHandler):
623 """Process HTTP error responses."""
624 handler_order = 1000 # after all other processing
625
626 def http_response(self, request, response):
627 code, msg, hdrs = response.code, response.msg, response.info()
628
629 # According to RFC 2616, "2xx" code indicates that the client's
630 # request was successfully received, understood, and accepted.
631 if not (200 <= code < 300):
632 response = self.parent.error(
633 'http', request, response, code, msg, hdrs)
634
635 return response
636
637 https_response = http_response
638
639class HTTPDefaultErrorHandler(BaseHandler):
640 def http_error_default(self, req, fp, code, msg, hdrs):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000641 raise HTTPError(req.full_url, code, msg, hdrs, fp)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000642
643class HTTPRedirectHandler(BaseHandler):
644 # maximum number of redirections to any single URL
645 # this is needed because of the state that cookies introduce
646 max_repeats = 4
647 # maximum total number of redirections (regardless of URL) before
648 # assuming we're in a loop
649 max_redirections = 10
650
651 def redirect_request(self, req, fp, code, msg, headers, newurl):
652 """Return a Request or None in response to a redirect.
653
654 This is called by the http_error_30x methods when a
655 redirection response is received. If a redirection should
656 take place, return a new Request to allow http_error_30x to
657 perform the redirect. Otherwise, raise HTTPError if no-one
658 else should try to handle this url. Return None if you can't
659 but another Handler might.
660 """
661 m = req.get_method()
662 if (not (code in (301, 302, 303, 307) and m in ("GET", "HEAD")
663 or code in (301, 302, 303) and m == "POST")):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000664 raise HTTPError(req.full_url, code, msg, headers, fp)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000665
666 # Strictly (according to RFC 2616), 301 or 302 in response to
667 # a POST MUST NOT cause a redirection without confirmation
Georg Brandl029986a2008-06-23 11:44:14 +0000668 # from the user (of urllib.request, in this case). In practice,
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000669 # essentially all clients do redirect in this case, so we do
670 # the same.
Martin Pantere6f06092016-05-16 01:14:20 +0000671
672 # Be conciliant with URIs containing a space. This is mainly
673 # redundant with the more complete encoding done in http_error_302(),
674 # but it is kept for compatibility with other callers.
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000675 newurl = newurl.replace(' ', '%20')
Martin Pantere6f06092016-05-16 01:14:20 +0000676
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000677 CONTENT_HEADERS = ("content-length", "content-type")
Jon Dufresne39726282017-05-18 07:35:54 -0700678 newheaders = {k: v for k, v in req.headers.items()
679 if k.lower() not in CONTENT_HEADERS}
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000680 return Request(newurl,
681 headers=newheaders,
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000682 origin_req_host=req.origin_req_host,
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000683 unverifiable=True)
684
685 # Implementation note: To avoid the server sending us into an
686 # infinite loop, the request object needs to track what URLs we
687 # have already seen. Do this by adding a handler-specific
688 # attribute to the Request object.
689 def http_error_302(self, req, fp, code, msg, headers):
690 # Some servers (incorrectly) return multiple Location headers
691 # (so probably same goes for URI). Use first header.
692 if "location" in headers:
693 newurl = headers["location"]
694 elif "uri" in headers:
695 newurl = headers["uri"]
696 else:
697 return
Facundo Batistaf24802c2008-08-17 03:36:03 +0000698
699 # fix a possible malformed URL
700 urlparts = urlparse(newurl)
guido@google.coma119df92011-03-29 11:41:02 -0700701
702 # For security reasons we don't allow redirection to anything other
703 # than http, https or ftp.
704
Senthil Kumaran6497aa32012-01-04 13:46:59 +0800705 if urlparts.scheme not in ('http', 'https', 'ftp', ''):
Senthil Kumaran34d38dc2011-10-20 02:48:01 +0800706 raise HTTPError(
707 newurl, code,
708 "%s - Redirection to url '%s' is not allowed" % (msg, newurl),
709 headers, fp)
guido@google.coma119df92011-03-29 11:41:02 -0700710
Martin Panterce6e0682016-05-16 01:07:13 +0000711 if not urlparts.path and urlparts.netloc:
Facundo Batistaf24802c2008-08-17 03:36:03 +0000712 urlparts = list(urlparts)
713 urlparts[2] = "/"
714 newurl = urlunparse(urlparts)
715
Martin Pantere6f06092016-05-16 01:14:20 +0000716 # http.client.parse_headers() decodes as ISO-8859-1. Recover the
717 # original bytes and percent-encode non-ASCII bytes, and any special
718 # characters such as the space.
719 newurl = quote(
720 newurl, encoding="iso-8859-1", safe=string.punctuation)
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000721 newurl = urljoin(req.full_url, newurl)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000722
723 # XXX Probably want to forget about the state of the current
724 # request, although that might interact poorly with other
725 # handlers that also use handler-specific request attributes
726 new = self.redirect_request(req, fp, code, msg, headers, newurl)
727 if new is None:
728 return
729
730 # loop detection
731 # .redirect_dict has a key url if url was previously visited.
732 if hasattr(req, 'redirect_dict'):
733 visited = new.redirect_dict = req.redirect_dict
734 if (visited.get(newurl, 0) >= self.max_repeats or
735 len(visited) >= self.max_redirections):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000736 raise HTTPError(req.full_url, code,
Georg Brandl13e89462008-07-01 19:56:00 +0000737 self.inf_msg + msg, headers, fp)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000738 else:
739 visited = new.redirect_dict = req.redirect_dict = {}
740 visited[newurl] = visited.get(newurl, 0) + 1
741
742 # Don't close the fp until we are sure that we won't use it
743 # with HTTPError.
744 fp.read()
745 fp.close()
746
Senthil Kumaranfb8cc2f2009-07-19 02:44:19 +0000747 return self.parent.open(new, timeout=req.timeout)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000748
749 http_error_301 = http_error_303 = http_error_307 = http_error_302
750
751 inf_msg = "The HTTP server returned a redirect error that would " \
752 "lead to an infinite loop.\n" \
753 "The last 30x error message was:\n"
754
755
756def _parse_proxy(proxy):
757 """Return (scheme, user, password, host/port) given a URL or an authority.
758
759 If a URL is supplied, it must have an authority (host:port) component.
760 According to RFC 3986, having an authority component means the URL must
Senthil Kumarand8e24f12014-04-14 16:32:20 -0400761 have two slashes after the scheme.
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000762 """
Cheryl Sabella0250de42018-04-25 16:51:54 -0700763 scheme, r_scheme = _splittype(proxy)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000764 if not r_scheme.startswith("/"):
765 # authority
766 scheme = None
767 authority = proxy
768 else:
769 # URL
770 if not r_scheme.startswith("//"):
771 raise ValueError("proxy URL with no authority: %r" % proxy)
772 # We have an authority, so for RFC 3986-compliant URLs (by ss 3.
773 # and 3.3.), path is empty or starts with '/'
774 end = r_scheme.find("/", 2)
775 if end == -1:
776 end = None
777 authority = r_scheme[2:end]
Cheryl Sabella0250de42018-04-25 16:51:54 -0700778 userinfo, hostport = _splituser(authority)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000779 if userinfo is not None:
Cheryl Sabella0250de42018-04-25 16:51:54 -0700780 user, password = _splitpasswd(userinfo)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000781 else:
782 user = password = None
783 return scheme, user, password, hostport
784
785class ProxyHandler(BaseHandler):
786 # Proxies must be in front
787 handler_order = 100
788
789 def __init__(self, proxies=None):
790 if proxies is None:
791 proxies = getproxies()
792 assert hasattr(proxies, 'keys'), "proxies must be a mapping"
793 self.proxies = proxies
794 for type, url in proxies.items():
795 setattr(self, '%s_open' % type,
Georg Brandlfcbdbf22012-06-24 19:56:31 +0200796 lambda r, proxy=url, type=type, meth=self.proxy_open:
797 meth(r, proxy, type))
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000798
799 def proxy_open(self, req, proxy, type):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +0000800 orig_type = req.type
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000801 proxy_type, user, password, hostport = _parse_proxy(proxy)
802 if proxy_type is None:
803 proxy_type = orig_type
Senthil Kumaran7bb04972009-10-11 04:58:55 +0000804
805 if req.host and proxy_bypass(req.host):
806 return None
807
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000808 if user and password:
Georg Brandl13e89462008-07-01 19:56:00 +0000809 user_pass = '%s:%s' % (unquote(user),
810 unquote(password))
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000811 creds = base64.b64encode(user_pass.encode()).decode("ascii")
812 req.add_header('Proxy-authorization', 'Basic ' + creds)
Georg Brandl13e89462008-07-01 19:56:00 +0000813 hostport = unquote(hostport)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000814 req.set_proxy(hostport, proxy_type)
Senthil Kumaran97f0c6b2009-07-25 04:24:38 +0000815 if orig_type == proxy_type or orig_type == 'https':
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000816 # let other handlers take care of it
817 return None
818 else:
819 # need to start over, because the other handlers don't
820 # grok the proxy's URL type
821 # e.g. if we have a constructor arg proxies like so:
822 # {'http': 'ftp://proxy.example.com'}, we may end up turning
823 # a request for http://acme.example.com/a into one for
824 # ftp://proxy.example.com/a
Senthil Kumaranfb8cc2f2009-07-19 02:44:19 +0000825 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000826
827class HTTPPasswordMgr:
828
829 def __init__(self):
830 self.passwd = {}
831
832 def add_password(self, realm, uri, user, passwd):
833 # uri could be a single URI or a sequence
834 if isinstance(uri, str):
835 uri = [uri]
Senthil Kumaran34d38dc2011-10-20 02:48:01 +0800836 if realm not in self.passwd:
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000837 self.passwd[realm] = {}
838 for default_port in True, False:
839 reduced_uri = tuple(
Jon Dufresne39726282017-05-18 07:35:54 -0700840 self.reduce_uri(u, default_port) for u in uri)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000841 self.passwd[realm][reduced_uri] = (user, passwd)
842
843 def find_user_password(self, realm, authuri):
844 domains = self.passwd.get(realm, {})
845 for default_port in True, False:
846 reduced_authuri = self.reduce_uri(authuri, default_port)
847 for uris, authinfo in domains.items():
848 for uri in uris:
849 if self.is_suburi(uri, reduced_authuri):
850 return authinfo
851 return None, None
852
853 def reduce_uri(self, uri, default_port=True):
854 """Accept authority or URI and extract only the authority and path."""
855 # note HTTP URLs do not have a userinfo component
Georg Brandl13e89462008-07-01 19:56:00 +0000856 parts = urlsplit(uri)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000857 if parts[1]:
858 # URI
859 scheme = parts[0]
860 authority = parts[1]
861 path = parts[2] or '/'
862 else:
863 # host or host:port
864 scheme = None
865 authority = uri
866 path = '/'
Cheryl Sabella0250de42018-04-25 16:51:54 -0700867 host, port = _splitport(authority)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000868 if default_port and port is None and scheme is not None:
869 dport = {"http": 80,
870 "https": 443,
871 }.get(scheme)
872 if dport is not None:
873 authority = "%s:%d" % (host, dport)
874 return authority, path
875
876 def is_suburi(self, base, test):
877 """Check if test is below base in a URI tree
878
879 Both args must be URIs in reduced form.
880 """
881 if base == test:
882 return True
883 if base[0] != test[0]:
884 return False
885 common = posixpath.commonprefix((base[1], test[1]))
886 if len(common) == len(base[1]):
887 return True
888 return False
889
890
891class HTTPPasswordMgrWithDefaultRealm(HTTPPasswordMgr):
892
893 def find_user_password(self, realm, authuri):
894 user, password = HTTPPasswordMgr.find_user_password(self, realm,
895 authuri)
896 if user is not None:
897 return user, password
898 return HTTPPasswordMgr.find_user_password(self, None, authuri)
899
900
R David Murray4c7f9952015-04-16 16:36:18 -0400901class HTTPPasswordMgrWithPriorAuth(HTTPPasswordMgrWithDefaultRealm):
902
903 def __init__(self, *args, **kwargs):
904 self.authenticated = {}
905 super().__init__(*args, **kwargs)
906
907 def add_password(self, realm, uri, user, passwd, is_authenticated=False):
908 self.update_authenticated(uri, is_authenticated)
909 # Add a default for prior auth requests
910 if realm is not None:
911 super().add_password(None, uri, user, passwd)
912 super().add_password(realm, uri, user, passwd)
913
914 def update_authenticated(self, uri, is_authenticated=False):
915 # uri could be a single URI or a sequence
916 if isinstance(uri, str):
917 uri = [uri]
918
919 for default_port in True, False:
920 for u in uri:
921 reduced_uri = self.reduce_uri(u, default_port)
922 self.authenticated[reduced_uri] = is_authenticated
923
924 def is_authenticated(self, authuri):
925 for default_port in True, False:
926 reduced_authuri = self.reduce_uri(authuri, default_port)
927 for uri in self.authenticated:
928 if self.is_suburi(uri, reduced_authuri):
929 return self.authenticated[uri]
930
931
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000932class AbstractBasicAuthHandler:
933
934 # XXX this allows for multiple auth-schemes, but will stupidly pick
935 # the last one with a realm specified.
936
937 # allow for double- and single-quoted realm values
938 # (single quotes are a violation of the RFC, but appear in the wild)
939 rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
Senthil Kumaran34f3fcc2012-05-15 22:30:25 +0800940 'realm=(["\']?)([^"\']*)\\2', re.I)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000941
942 # XXX could pre-emptively send auth info already accepted (RFC 2617,
943 # end of section 2, and section 1.2 immediately after "credentials"
944 # production).
945
946 def __init__(self, password_mgr=None):
947 if password_mgr is None:
948 password_mgr = HTTPPasswordMgr()
949 self.passwd = password_mgr
950 self.add_password = self.passwd.add_password
Senthil Kumaran67a62a42010-08-19 17:50:31 +0000951
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000952 def http_error_auth_reqed(self, authreq, host, req, headers):
953 # host may be an authority (without userinfo) or a URL with an
954 # authority
955 # XXX could be multiple headers
956 authreq = headers.get(authreq, None)
Senthil Kumaranf4998ac2010-06-01 12:53:48 +0000957
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000958 if authreq:
Senthil Kumaran4de00a22011-05-11 21:17:57 +0800959 scheme = authreq.split()[0]
Senthil Kumaran1a129c82011-10-20 02:50:13 +0800960 if scheme.lower() != 'basic':
Senthil Kumaran4de00a22011-05-11 21:17:57 +0800961 raise ValueError("AbstractBasicAuthHandler does not"
962 " support the following scheme: '%s'" %
963 scheme)
964 else:
965 mo = AbstractBasicAuthHandler.rx.search(authreq)
966 if mo:
967 scheme, quote, realm = mo.groups()
Senthil Kumaran92a5bf02012-05-16 00:03:29 +0800968 if quote not in ['"',"'"]:
969 warnings.warn("Basic Auth Realm was unquoted",
970 UserWarning, 2)
Senthil Kumaran4de00a22011-05-11 21:17:57 +0800971 if scheme.lower() == 'basic':
Senthil Kumaran78373762014-08-20 07:53:58 +0530972 return self.retry_http_basic_auth(host, req, realm)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000973
974 def retry_http_basic_auth(self, host, req, realm):
975 user, pw = self.passwd.find_user_password(realm, host)
976 if pw is not None:
977 raw = "%s:%s" % (user, pw)
978 auth = "Basic " + base64.b64encode(raw.encode()).decode("ascii")
Senthil Kumaran78373762014-08-20 07:53:58 +0530979 if req.get_header(self.auth_header, None) == auth:
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000980 return None
Senthil Kumaranca2fc9e2010-02-24 16:53:16 +0000981 req.add_unredirected_header(self.auth_header, auth)
Senthil Kumaranfb8cc2f2009-07-19 02:44:19 +0000982 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton1afc1692008-06-18 20:49:58 +0000983 else:
984 return None
985
R David Murray4c7f9952015-04-16 16:36:18 -0400986 def http_request(self, req):
987 if (not hasattr(self.passwd, 'is_authenticated') or
988 not self.passwd.is_authenticated(req.full_url)):
989 return req
990
991 if not req.has_header('Authorization'):
992 user, passwd = self.passwd.find_user_password(None, req.full_url)
993 credentials = '{0}:{1}'.format(user, passwd).encode()
994 auth_str = base64.standard_b64encode(credentials).decode()
995 req.add_unredirected_header('Authorization',
996 'Basic {}'.format(auth_str.strip()))
997 return req
998
999 def http_response(self, req, response):
1000 if hasattr(self.passwd, 'is_authenticated'):
1001 if 200 <= response.code < 300:
1002 self.passwd.update_authenticated(req.full_url, True)
1003 else:
1004 self.passwd.update_authenticated(req.full_url, False)
1005 return response
1006
1007 https_request = http_request
1008 https_response = http_response
1009
1010
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001011
1012class HTTPBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
1013
1014 auth_header = 'Authorization'
1015
1016 def http_error_401(self, req, fp, code, msg, headers):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001017 url = req.full_url
Senthil Kumaran67a62a42010-08-19 17:50:31 +00001018 response = self.http_error_auth_reqed('www-authenticate',
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001019 url, req, headers)
Senthil Kumaran67a62a42010-08-19 17:50:31 +00001020 return response
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001021
1022
1023class ProxyBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
1024
1025 auth_header = 'Proxy-authorization'
1026
1027 def http_error_407(self, req, fp, code, msg, headers):
1028 # http_error_auth_reqed requires that there is no userinfo component in
Georg Brandl029986a2008-06-23 11:44:14 +00001029 # authority. Assume there isn't one, since urllib.request does not (and
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001030 # should not, RFC 3986 s. 3.2.1) support requests for URLs containing
1031 # userinfo.
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001032 authority = req.host
Senthil Kumaran67a62a42010-08-19 17:50:31 +00001033 response = self.http_error_auth_reqed('proxy-authenticate',
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001034 authority, req, headers)
Senthil Kumaran67a62a42010-08-19 17:50:31 +00001035 return response
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001036
1037
Senthil Kumaran6c5bd402011-11-01 23:20:31 +08001038# Return n random bytes.
1039_randombytes = os.urandom
1040
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001041
1042class AbstractDigestAuthHandler:
1043 # Digest authentication is specified in RFC 2617.
1044
1045 # XXX The client does not inspect the Authentication-Info header
1046 # in a successful response.
1047
1048 # XXX It should be possible to test this implementation against
1049 # a mock server that just generates a static set of challenges.
1050
1051 # XXX qop="auth-int" supports is shaky
1052
1053 def __init__(self, passwd=None):
1054 if passwd is None:
1055 passwd = HTTPPasswordMgr()
1056 self.passwd = passwd
1057 self.add_password = self.passwd.add_password
1058 self.retried = 0
1059 self.nonce_count = 0
Senthil Kumaran4c7eaee2009-11-15 08:43:45 +00001060 self.last_nonce = None
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001061
1062 def reset_retry_count(self):
1063 self.retried = 0
1064
1065 def http_error_auth_reqed(self, auth_header, host, req, headers):
1066 authreq = headers.get(auth_header, None)
1067 if self.retried > 5:
1068 # Don't fail endlessly - if we failed once, we'll probably
1069 # fail a second time. Hm. Unless the Password Manager is
1070 # prompting for the information. Crap. This isn't great
1071 # but it's better than the current 'repeat until recursion
1072 # depth exceeded' approach <wink>
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001073 raise HTTPError(req.full_url, 401, "digest auth failed",
Georg Brandl13e89462008-07-01 19:56:00 +00001074 headers, None)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001075 else:
1076 self.retried += 1
1077 if authreq:
1078 scheme = authreq.split()[0]
1079 if scheme.lower() == 'digest':
1080 return self.retry_http_digest_auth(req, authreq)
Senthil Kumaran1a129c82011-10-20 02:50:13 +08001081 elif scheme.lower() != 'basic':
Senthil Kumaran4de00a22011-05-11 21:17:57 +08001082 raise ValueError("AbstractDigestAuthHandler does not support"
1083 " the following scheme: '%s'" % scheme)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001084
1085 def retry_http_digest_auth(self, req, auth):
1086 token, challenge = auth.split(' ', 1)
1087 chal = parse_keqv_list(filter(None, parse_http_list(challenge)))
1088 auth = self.get_authorization(req, chal)
1089 if auth:
1090 auth_val = 'Digest %s' % auth
1091 if req.headers.get(self.auth_header, None) == auth_val:
1092 return None
1093 req.add_unredirected_header(self.auth_header, auth_val)
Senthil Kumaranfb8cc2f2009-07-19 02:44:19 +00001094 resp = self.parent.open(req, timeout=req.timeout)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001095 return resp
1096
1097 def get_cnonce(self, nonce):
1098 # The cnonce-value is an opaque
1099 # quoted string value provided by the client and used by both client
1100 # and server to avoid chosen plaintext attacks, to provide mutual
1101 # authentication, and to provide some message integrity protection.
1102 # This isn't a fabulous effort, but it's probably Good Enough.
1103 s = "%s:%s:%s:" % (self.nonce_count, nonce, time.ctime())
Senthil Kumaran6c5bd402011-11-01 23:20:31 +08001104 b = s.encode("ascii") + _randombytes(8)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001105 dig = hashlib.sha1(b).hexdigest()
1106 return dig[:16]
1107
1108 def get_authorization(self, req, chal):
1109 try:
1110 realm = chal['realm']
1111 nonce = chal['nonce']
1112 qop = chal.get('qop')
1113 algorithm = chal.get('algorithm', 'MD5')
1114 # mod_digest doesn't send an opaque, even though it isn't
1115 # supposed to be optional
1116 opaque = chal.get('opaque', None)
1117 except KeyError:
1118 return None
1119
1120 H, KD = self.get_algorithm_impls(algorithm)
1121 if H is None:
1122 return None
1123
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001124 user, pw = self.passwd.find_user_password(realm, req.full_url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001125 if user is None:
1126 return None
1127
1128 # XXX not implemented yet
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001129 if req.data is not None:
1130 entdig = self.get_entity_digest(req.data, chal)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001131 else:
1132 entdig = None
1133
1134 A1 = "%s:%s:%s" % (user, realm, pw)
1135 A2 = "%s:%s" % (req.get_method(),
1136 # XXX selector: what about proxies and full urls
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001137 req.selector)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001138 if qop == 'auth':
Senthil Kumaran4c7eaee2009-11-15 08:43:45 +00001139 if nonce == self.last_nonce:
1140 self.nonce_count += 1
1141 else:
1142 self.nonce_count = 1
1143 self.last_nonce = nonce
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001144 ncvalue = '%08x' % self.nonce_count
1145 cnonce = self.get_cnonce(nonce)
1146 noncebit = "%s:%s:%s:%s:%s" % (nonce, ncvalue, cnonce, qop, H(A2))
1147 respdig = KD(H(A1), noncebit)
1148 elif qop is None:
1149 respdig = KD(H(A1), "%s:%s" % (nonce, H(A2)))
1150 else:
1151 # XXX handle auth-int.
Georg Brandl13e89462008-07-01 19:56:00 +00001152 raise URLError("qop '%s' is not supported." % qop)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001153
1154 # XXX should the partial digests be encoded too?
1155
1156 base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001157 'response="%s"' % (user, realm, nonce, req.selector,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001158 respdig)
1159 if opaque:
1160 base += ', opaque="%s"' % opaque
1161 if entdig:
1162 base += ', digest="%s"' % entdig
1163 base += ', algorithm="%s"' % algorithm
1164 if qop:
1165 base += ', qop=auth, nc=%s, cnonce="%s"' % (ncvalue, cnonce)
1166 return base
1167
1168 def get_algorithm_impls(self, algorithm):
1169 # lambdas assume digest modules are imported at the top level
1170 if algorithm == 'MD5':
1171 H = lambda x: hashlib.md5(x.encode("ascii")).hexdigest()
1172 elif algorithm == 'SHA':
1173 H = lambda x: hashlib.sha1(x.encode("ascii")).hexdigest()
1174 # XXX MD5-sess
Berker Peksage88dd1c2016-03-06 16:16:40 +02001175 else:
1176 raise ValueError("Unsupported digest authentication "
1177 "algorithm %r" % algorithm)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001178 KD = lambda s, d: H("%s:%s" % (s, d))
1179 return H, KD
1180
1181 def get_entity_digest(self, data, chal):
1182 # XXX not implemented yet
1183 return None
1184
1185
1186class HTTPDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1187 """An authentication protocol defined by RFC 2069
1188
1189 Digest authentication improves on basic authentication because it
1190 does not transmit passwords in the clear.
1191 """
1192
1193 auth_header = 'Authorization'
1194 handler_order = 490 # before Basic auth
1195
1196 def http_error_401(self, req, fp, code, msg, headers):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001197 host = urlparse(req.full_url)[1]
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001198 retry = self.http_error_auth_reqed('www-authenticate',
1199 host, req, headers)
1200 self.reset_retry_count()
1201 return retry
1202
1203
1204class ProxyDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1205
1206 auth_header = 'Proxy-Authorization'
1207 handler_order = 490 # before Basic auth
1208
1209 def http_error_407(self, req, fp, code, msg, headers):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001210 host = req.host
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001211 retry = self.http_error_auth_reqed('proxy-authenticate',
1212 host, req, headers)
1213 self.reset_retry_count()
1214 return retry
1215
1216class AbstractHTTPHandler(BaseHandler):
1217
1218 def __init__(self, debuglevel=0):
1219 self._debuglevel = debuglevel
1220
1221 def set_http_debuglevel(self, level):
1222 self._debuglevel = level
1223
Martin Panter3c0d0ba2016-08-24 06:33:33 +00001224 def _get_content_length(self, request):
1225 return http.client.HTTPConnection._get_content_length(
1226 request.data,
1227 request.get_method())
1228
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001229 def do_request_(self, request):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001230 host = request.host
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001231 if not host:
Georg Brandl13e89462008-07-01 19:56:00 +00001232 raise URLError('no host given')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001233
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001234 if request.data is not None: # POST
1235 data = request.data
Senthil Kumaran29333122011-02-11 11:25:47 +00001236 if isinstance(data, str):
Martin Panter3c0d0ba2016-08-24 06:33:33 +00001237 msg = "POST data should be bytes, an iterable of bytes, " \
1238 "or a file object. It cannot be of type str."
Senthil Kumaran6b3434a2012-03-15 18:11:16 -07001239 raise TypeError(msg)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001240 if not request.has_header('Content-type'):
1241 request.add_unredirected_header(
1242 'Content-type',
1243 'application/x-www-form-urlencoded')
Martin Panter3c0d0ba2016-08-24 06:33:33 +00001244 if (not request.has_header('Content-length')
1245 and not request.has_header('Transfer-encoding')):
1246 content_length = self._get_content_length(request)
1247 if content_length is not None:
1248 request.add_unredirected_header(
1249 'Content-length', str(content_length))
Senthil Kumaran7bc0d872010-12-19 10:49:52 +00001250 else:
1251 request.add_unredirected_header(
Martin Panter3c0d0ba2016-08-24 06:33:33 +00001252 'Transfer-encoding', 'chunked')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001253
Facundo Batista72dc1ea2008-08-16 14:44:32 +00001254 sel_host = host
1255 if request.has_proxy():
Cheryl Sabella0250de42018-04-25 16:51:54 -07001256 scheme, sel = _splittype(request.selector)
1257 sel_host, sel_path = _splithost(sel)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001258 if not request.has_header('Host'):
Facundo Batista72dc1ea2008-08-16 14:44:32 +00001259 request.add_unredirected_header('Host', sel_host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001260 for name, value in self.parent.addheaders:
1261 name = name.capitalize()
1262 if not request.has_header(name):
1263 request.add_unredirected_header(name, value)
1264
1265 return request
1266
Antoine Pitrou803e6d62010-10-13 10:36:15 +00001267 def do_open(self, http_class, req, **http_conn_args):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001268 """Return an HTTPResponse object for the request, using http_class.
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001269
1270 http_class must implement the HTTPConnection API from http.client.
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001271 """
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001272 host = req.host
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001273 if not host:
Georg Brandl13e89462008-07-01 19:56:00 +00001274 raise URLError('no host given')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001275
Antoine Pitrou803e6d62010-10-13 10:36:15 +00001276 # will parse host:port
1277 h = http_class(host, timeout=req.timeout, **http_conn_args)
Senthil Kumaran9642eed2016-05-13 01:32:42 -07001278 h.set_debuglevel(self._debuglevel)
Senthil Kumaran42ef4b12010-09-27 01:26:03 +00001279
1280 headers = dict(req.unredirected_hdrs)
Serhiy Storchaka3f2e6f12018-02-26 16:50:11 +02001281 headers.update({k: v for k, v in req.headers.items()
1282 if k not in headers})
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001283
1284 # TODO(jhylton): Should this be redesigned to handle
1285 # persistent connections?
1286
1287 # We want to make an HTTP/1.1 request, but the addinfourl
1288 # class isn't prepared to deal with a persistent connection.
1289 # It will try to read all remaining data from the socket,
1290 # which will block while the server waits for the next request.
1291 # So make sure the connection gets closed after the (only)
1292 # request.
1293 headers["Connection"] = "close"
Jon Dufresne39726282017-05-18 07:35:54 -07001294 headers = {name.title(): val for name, val in headers.items()}
Senthil Kumaran97f0c6b2009-07-25 04:24:38 +00001295
1296 if req._tunnel_host:
Senthil Kumaran47fff872009-12-20 07:10:31 +00001297 tunnel_headers = {}
1298 proxy_auth_hdr = "Proxy-Authorization"
1299 if proxy_auth_hdr in headers:
1300 tunnel_headers[proxy_auth_hdr] = headers[proxy_auth_hdr]
1301 # Proxy-Authorization should not be sent to origin
1302 # server.
1303 del headers[proxy_auth_hdr]
1304 h.set_tunnel(req._tunnel_host, headers=tunnel_headers)
Senthil Kumaran97f0c6b2009-07-25 04:24:38 +00001305
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001306 try:
Serhiy Storchakaf54c3502014-09-06 21:41:39 +03001307 try:
Martin Panter3c0d0ba2016-08-24 06:33:33 +00001308 h.request(req.get_method(), req.selector, req.data, headers,
1309 encode_chunked=req.has_header('Transfer-encoding'))
Serhiy Storchakaf54c3502014-09-06 21:41:39 +03001310 except OSError as err: # timeout error
1311 raise URLError(err)
Senthil Kumaran45686b42011-07-27 09:31:03 +08001312 r = h.getresponse()
Serhiy Storchakaf54c3502014-09-06 21:41:39 +03001313 except:
1314 h.close()
1315 raise
1316
1317 # If the server does not send us a 'Connection: close' header,
1318 # HTTPConnection assumes the socket should be left open. Manually
1319 # mark the socket to be closed when this response object goes away.
1320 if h.sock:
1321 h.sock.close()
1322 h.sock = None
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001323
Senthil Kumaran26430412011-04-13 07:01:19 +08001324 r.url = req.get_full_url()
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001325 # This line replaces the .msg attribute of the HTTPResponse
1326 # with .headers, because urllib clients expect the response to
1327 # have the reason in .msg. It would be good to mark this
1328 # attribute is deprecated and get then to use info() or
1329 # .headers.
1330 r.msg = r.reason
1331 return r
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001332
1333
1334class HTTPHandler(AbstractHTTPHandler):
1335
1336 def http_open(self, req):
1337 return self.do_open(http.client.HTTPConnection, req)
1338
1339 http_request = AbstractHTTPHandler.do_request_
1340
1341if hasattr(http.client, 'HTTPSConnection'):
Antoine Pitrou803e6d62010-10-13 10:36:15 +00001342
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001343 class HTTPSHandler(AbstractHTTPHandler):
1344
Antoine Pitrou803e6d62010-10-13 10:36:15 +00001345 def __init__(self, debuglevel=0, context=None, check_hostname=None):
1346 AbstractHTTPHandler.__init__(self, debuglevel)
1347 self._context = context
1348 self._check_hostname = check_hostname
1349
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001350 def https_open(self, req):
Antoine Pitrou803e6d62010-10-13 10:36:15 +00001351 return self.do_open(http.client.HTTPSConnection, req,
1352 context=self._context, check_hostname=self._check_hostname)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001353
1354 https_request = AbstractHTTPHandler.do_request_
1355
Senthil Kumaran4c875a92011-11-01 23:57:57 +08001356 __all__.append('HTTPSHandler')
Senthil Kumaran0d54eb92011-11-01 23:49:46 +08001357
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001358class HTTPCookieProcessor(BaseHandler):
1359 def __init__(self, cookiejar=None):
1360 import http.cookiejar
1361 if cookiejar is None:
1362 cookiejar = http.cookiejar.CookieJar()
1363 self.cookiejar = cookiejar
1364
1365 def http_request(self, request):
1366 self.cookiejar.add_cookie_header(request)
1367 return request
1368
1369 def http_response(self, request, response):
1370 self.cookiejar.extract_cookies(response, request)
1371 return response
1372
1373 https_request = http_request
1374 https_response = http_response
1375
1376class UnknownHandler(BaseHandler):
1377 def unknown_open(self, req):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001378 type = req.type
Georg Brandl13e89462008-07-01 19:56:00 +00001379 raise URLError('unknown url type: %s' % type)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001380
1381def parse_keqv_list(l):
1382 """Parse list of key=value strings where keys are not duplicated."""
1383 parsed = {}
1384 for elt in l:
1385 k, v = elt.split('=', 1)
1386 if v[0] == '"' and v[-1] == '"':
1387 v = v[1:-1]
1388 parsed[k] = v
1389 return parsed
1390
1391def parse_http_list(s):
1392 """Parse lists as described by RFC 2068 Section 2.
1393
1394 In particular, parse comma-separated lists where the elements of
1395 the list may include quoted-strings. A quoted-string could
1396 contain a comma. A non-quoted string could have quotes in the
1397 middle. Neither commas nor quotes count if they are escaped.
1398 Only double-quotes count, not single-quotes.
1399 """
1400 res = []
1401 part = ''
1402
1403 escape = quote = False
1404 for cur in s:
1405 if escape:
1406 part += cur
1407 escape = False
1408 continue
1409 if quote:
1410 if cur == '\\':
1411 escape = True
1412 continue
1413 elif cur == '"':
1414 quote = False
1415 part += cur
1416 continue
1417
1418 if cur == ',':
1419 res.append(part)
1420 part = ''
1421 continue
1422
1423 if cur == '"':
1424 quote = True
1425
1426 part += cur
1427
1428 # append last part
1429 if part:
1430 res.append(part)
1431
1432 return [part.strip() for part in res]
1433
1434class FileHandler(BaseHandler):
1435 # Use local file or FTP depending on form of URL
1436 def file_open(self, req):
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001437 url = req.selector
Senthil Kumaran2ef16322010-07-11 03:12:43 +00001438 if url[:2] == '//' and url[2:3] != '/' and (req.host and
1439 req.host != 'localhost'):
Senthil Kumaranbc07ac52014-07-22 00:15:20 -07001440 if not req.host in self.get_names():
Senthil Kumaran383c32d2010-10-14 11:57:35 +00001441 raise URLError("file:// scheme is supported only on localhost")
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001442 else:
1443 return self.open_local_file(req)
1444
1445 # names for the localhost
1446 names = None
1447 def get_names(self):
1448 if FileHandler.names is None:
1449 try:
Senthil Kumaran99b2c8f2009-12-27 10:13:39 +00001450 FileHandler.names = tuple(
1451 socket.gethostbyname_ex('localhost')[2] +
1452 socket.gethostbyname_ex(socket.gethostname())[2])
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001453 except socket.gaierror:
1454 FileHandler.names = (socket.gethostbyname('localhost'),)
1455 return FileHandler.names
1456
1457 # not entirely sure what the rules are here
1458 def open_local_file(self, req):
1459 import email.utils
1460 import mimetypes
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001461 host = req.host
Senthil Kumaran06f5a532010-05-08 05:12:05 +00001462 filename = req.selector
1463 localfile = url2pathname(filename)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001464 try:
1465 stats = os.stat(localfile)
1466 size = stats.st_size
1467 modified = email.utils.formatdate(stats.st_mtime, usegmt=True)
Senthil Kumaran06f5a532010-05-08 05:12:05 +00001468 mtype = mimetypes.guess_type(filename)[0]
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001469 headers = email.message_from_string(
1470 'Content-type: %s\nContent-length: %d\nLast-modified: %s\n' %
1471 (mtype or 'text/plain', size, modified))
1472 if host:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001473 host, port = _splitport(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001474 if not host or \
1475 (not port and _safe_gethostbyname(host) in self.get_names()):
Senthil Kumaran06f5a532010-05-08 05:12:05 +00001476 if host:
1477 origurl = 'file://' + host + filename
1478 else:
1479 origurl = 'file://' + filename
1480 return addinfourl(open(localfile, 'rb'), headers, origurl)
Senthil Kumaran3ebef362012-10-21 18:31:25 -07001481 except OSError as exp:
Senthil Kumaran3ebef362012-10-21 18:31:25 -07001482 raise URLError(exp)
Georg Brandl13e89462008-07-01 19:56:00 +00001483 raise URLError('file not on local host')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001484
1485def _safe_gethostbyname(host):
1486 try:
1487 return socket.gethostbyname(host)
1488 except socket.gaierror:
1489 return None
1490
1491class FTPHandler(BaseHandler):
1492 def ftp_open(self, req):
1493 import ftplib
1494 import mimetypes
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001495 host = req.host
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001496 if not host:
Georg Brandl13e89462008-07-01 19:56:00 +00001497 raise URLError('ftp error: no host given')
Cheryl Sabella0250de42018-04-25 16:51:54 -07001498 host, port = _splitport(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001499 if port is None:
1500 port = ftplib.FTP_PORT
1501 else:
1502 port = int(port)
1503
1504 # username/password handling
Cheryl Sabella0250de42018-04-25 16:51:54 -07001505 user, host = _splituser(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001506 if user:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001507 user, passwd = _splitpasswd(user)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001508 else:
1509 passwd = None
Georg Brandl13e89462008-07-01 19:56:00 +00001510 host = unquote(host)
Senthil Kumarandaa29d02010-11-18 15:36:41 +00001511 user = user or ''
1512 passwd = passwd or ''
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001513
1514 try:
1515 host = socket.gethostbyname(host)
Andrew Svetlov0832af62012-12-18 23:10:48 +02001516 except OSError as msg:
Georg Brandl13e89462008-07-01 19:56:00 +00001517 raise URLError(msg)
Cheryl Sabella0250de42018-04-25 16:51:54 -07001518 path, attrs = _splitattr(req.selector)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001519 dirs = path.split('/')
Georg Brandl13e89462008-07-01 19:56:00 +00001520 dirs = list(map(unquote, dirs))
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001521 dirs, file = dirs[:-1], dirs[-1]
1522 if dirs and not dirs[0]:
1523 dirs = dirs[1:]
1524 try:
1525 fw = self.connect_ftp(user, passwd, host, port, dirs, req.timeout)
1526 type = file and 'I' or 'D'
1527 for attr in attrs:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001528 attr, value = _splitvalue(attr)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001529 if attr.lower() == 'type' and \
1530 value in ('a', 'A', 'i', 'I', 'd', 'D'):
1531 type = value.upper()
1532 fp, retrlen = fw.retrfile(file, type)
1533 headers = ""
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001534 mtype = mimetypes.guess_type(req.full_url)[0]
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001535 if mtype:
1536 headers += "Content-type: %s\n" % mtype
1537 if retrlen is not None and retrlen >= 0:
1538 headers += "Content-length: %d\n" % retrlen
1539 headers = email.message_from_string(headers)
Jeremy Hylton6c5e28c2009-03-31 14:35:53 +00001540 return addinfourl(fp, headers, req.full_url)
Senthil Kumaran3ebef362012-10-21 18:31:25 -07001541 except ftplib.all_errors as exp:
1542 exc = URLError('ftp error: %r' % exp)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001543 raise exc.with_traceback(sys.exc_info()[2])
1544
1545 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02001546 return ftpwrapper(user, passwd, host, port, dirs, timeout,
1547 persistent=False)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001548
1549class CacheFTPHandler(FTPHandler):
1550 # XXX would be nice to have pluggable cache strategies
1551 # XXX this stuff is definitely not thread safe
1552 def __init__(self):
1553 self.cache = {}
1554 self.timeout = {}
1555 self.soonest = 0
1556 self.delay = 60
1557 self.max_conns = 16
1558
1559 def setTimeout(self, t):
1560 self.delay = t
1561
1562 def setMaxConns(self, m):
1563 self.max_conns = m
1564
1565 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1566 key = user, host, port, '/'.join(dirs), timeout
1567 if key in self.cache:
1568 self.timeout[key] = time.time() + self.delay
1569 else:
1570 self.cache[key] = ftpwrapper(user, passwd, host, port,
1571 dirs, timeout)
1572 self.timeout[key] = time.time() + self.delay
1573 self.check_cache()
1574 return self.cache[key]
1575
1576 def check_cache(self):
1577 # first check for old ones
1578 t = time.time()
1579 if self.soonest <= t:
1580 for k, v in list(self.timeout.items()):
1581 if v < t:
1582 self.cache[k].close()
1583 del self.cache[k]
1584 del self.timeout[k]
1585 self.soonest = min(list(self.timeout.values()))
1586
1587 # then check the size
1588 if len(self.cache) == self.max_conns:
1589 for k, v in list(self.timeout.items()):
1590 if v == self.soonest:
1591 del self.cache[k]
1592 del self.timeout[k]
1593 break
1594 self.soonest = min(list(self.timeout.values()))
1595
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02001596 def clear_cache(self):
1597 for conn in self.cache.values():
1598 conn.close()
1599 self.cache.clear()
1600 self.timeout.clear()
1601
Antoine Pitroudf204be2012-11-24 17:59:08 +01001602class DataHandler(BaseHandler):
1603 def data_open(self, req):
1604 # data URLs as specified in RFC 2397.
1605 #
1606 # ignores POSTed data
1607 #
1608 # syntax:
1609 # dataurl := "data:" [ mediatype ] [ ";base64" ] "," data
1610 # mediatype := [ type "/" subtype ] *( ";" parameter )
1611 # data := *urlchar
1612 # parameter := attribute "=" value
1613 url = req.full_url
1614
1615 scheme, data = url.split(":",1)
1616 mediatype, data = data.split(",",1)
1617
1618 # even base64 encoded data URLs might be quoted so unquote in any case:
1619 data = unquote_to_bytes(data)
1620 if mediatype.endswith(";base64"):
1621 data = base64.decodebytes(data)
1622 mediatype = mediatype[:-7]
1623
1624 if not mediatype:
1625 mediatype = "text/plain;charset=US-ASCII"
1626
1627 headers = email.message_from_string("Content-type: %s\nContent-length: %d\n" %
1628 (mediatype, len(data)))
1629
1630 return addinfourl(io.BytesIO(data), headers, url)
1631
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02001632
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001633# Code move from the old urllib module
1634
1635MAXFTPCACHE = 10 # Trim the ftp cache beyond this size
1636
1637# Helper for non-unix systems
Ronald Oussoren94f25282010-05-05 19:11:21 +00001638if os.name == 'nt':
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001639 from nturl2path import url2pathname, pathname2url
1640else:
1641 def url2pathname(pathname):
1642 """OS-specific conversion from a relative URL of the 'file' scheme
1643 to a file system path; not recommended for general use."""
Georg Brandl13e89462008-07-01 19:56:00 +00001644 return unquote(pathname)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001645
1646 def pathname2url(pathname):
1647 """OS-specific conversion from a file system path to a relative URL
1648 of the 'file' scheme; not recommended for general use."""
Georg Brandl13e89462008-07-01 19:56:00 +00001649 return quote(pathname)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001650
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001651
1652ftpcache = {}
Senthil Kumarana2a9ddd2017-04-08 23:27:25 -07001653
1654
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001655class URLopener:
1656 """Class to open URLs.
1657 This is a class rather than just a subroutine because we may need
1658 more than one set of global protocol-specific options.
1659 Note -- this is a base class for those who don't want the
1660 automatic handling of errors type 302 (relocated) and 401
1661 (authorization needed)."""
1662
1663 __tempfiles = None
1664
1665 version = "Python-urllib/%s" % __version__
1666
1667 # Constructor
1668 def __init__(self, proxies=None, **x509):
Georg Brandlfcbdbf22012-06-24 19:56:31 +02001669 msg = "%(class)s style of invoking requests is deprecated. " \
Senthil Kumaran38b968b92012-03-14 13:43:53 -07001670 "Use newer urlopen functions/methods" % {'class': self.__class__.__name__}
1671 warnings.warn(msg, DeprecationWarning, stacklevel=3)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001672 if proxies is None:
1673 proxies = getproxies()
1674 assert hasattr(proxies, 'keys'), "proxies must be a mapping"
1675 self.proxies = proxies
1676 self.key_file = x509.get('key_file')
1677 self.cert_file = x509.get('cert_file')
Raymond Hettingerb7f3c942016-09-09 16:44:53 -07001678 self.addheaders = [('User-Agent', self.version), ('Accept', '*/*')]
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001679 self.__tempfiles = []
1680 self.__unlink = os.unlink # See cleanup()
1681 self.tempcache = None
1682 # Undocumented feature: if you assign {} to tempcache,
1683 # it is used to cache files retrieved with
1684 # self.retrieve(). This is not enabled by default
1685 # since it does not work for changing documents (and I
1686 # haven't got the logic to check expiration headers
1687 # yet).
1688 self.ftpcache = ftpcache
1689 # Undocumented feature: you can use a different
1690 # ftp cache by assigning to the .ftpcache member;
1691 # in case you want logically independent URL openers
1692 # XXX This is not threadsafe. Bah.
1693
1694 def __del__(self):
1695 self.close()
1696
1697 def close(self):
1698 self.cleanup()
1699
1700 def cleanup(self):
1701 # This code sometimes runs when the rest of this module
1702 # has already been deleted, so it can't use any globals
1703 # or import anything.
1704 if self.__tempfiles:
1705 for file in self.__tempfiles:
1706 try:
1707 self.__unlink(file)
1708 except OSError:
1709 pass
1710 del self.__tempfiles[:]
1711 if self.tempcache:
1712 self.tempcache.clear()
1713
1714 def addheader(self, *args):
1715 """Add a header to be used by the HTTP interface only
1716 e.g. u.addheader('Accept', 'sound/basic')"""
1717 self.addheaders.append(args)
1718
1719 # External interface
1720 def open(self, fullurl, data=None):
1721 """Use URLopener().open(file) instead of open(file, 'r')."""
Rémi Lapeyre674ee122019-05-27 15:43:45 +02001722 fullurl = unwrap(_to_bytes(fullurl))
Senthil Kumaran734f0592010-02-20 22:19:04 +00001723 fullurl = quote(fullurl, safe="%/:=&?~#+!$,;'@()*[]|")
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001724 if self.tempcache and fullurl in self.tempcache:
1725 filename, headers = self.tempcache[fullurl]
1726 fp = open(filename, 'rb')
Georg Brandl13e89462008-07-01 19:56:00 +00001727 return addinfourl(fp, headers, fullurl)
Cheryl Sabella0250de42018-04-25 16:51:54 -07001728 urltype, url = _splittype(fullurl)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001729 if not urltype:
1730 urltype = 'file'
1731 if urltype in self.proxies:
1732 proxy = self.proxies[urltype]
Cheryl Sabella0250de42018-04-25 16:51:54 -07001733 urltype, proxyhost = _splittype(proxy)
1734 host, selector = _splithost(proxyhost)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001735 url = (host, fullurl) # Signal special case to open_*()
1736 else:
1737 proxy = None
1738 name = 'open_' + urltype
1739 self.type = urltype
1740 name = name.replace('-', '_')
Victor Stinner0c2b6a32019-05-22 22:15:01 +02001741 if not hasattr(self, name) or name == 'open_local_file':
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001742 if proxy:
1743 return self.open_unknown_proxy(proxy, fullurl, data)
1744 else:
1745 return self.open_unknown(fullurl, data)
1746 try:
1747 if data is None:
1748 return getattr(self, name)(url)
1749 else:
1750 return getattr(self, name)(url, data)
Senthil Kumaranf5776862012-10-21 13:30:02 -07001751 except (HTTPError, URLError):
Antoine Pitrou6b4883d2011-10-12 02:54:14 +02001752 raise
Andrew Svetlov0832af62012-12-18 23:10:48 +02001753 except OSError as msg:
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001754 raise OSError('socket error', msg).with_traceback(sys.exc_info()[2])
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001755
1756 def open_unknown(self, fullurl, data=None):
1757 """Overridable interface to open unknown URL type."""
Cheryl Sabella0250de42018-04-25 16:51:54 -07001758 type, url = _splittype(fullurl)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001759 raise OSError('url error', 'unknown url type', type)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001760
1761 def open_unknown_proxy(self, proxy, fullurl, data=None):
1762 """Overridable interface to open unknown URL type."""
Cheryl Sabella0250de42018-04-25 16:51:54 -07001763 type, url = _splittype(fullurl)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001764 raise OSError('url error', 'invalid proxy for %s' % type, proxy)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001765
1766 # External interface
1767 def retrieve(self, url, filename=None, reporthook=None, data=None):
1768 """retrieve(url) returns (filename, headers) for a local object
1769 or (tempfilename, headers) for a remote object."""
Rémi Lapeyre674ee122019-05-27 15:43:45 +02001770 url = unwrap(_to_bytes(url))
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001771 if self.tempcache and url in self.tempcache:
1772 return self.tempcache[url]
Cheryl Sabella0250de42018-04-25 16:51:54 -07001773 type, url1 = _splittype(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001774 if filename is None and (not type or type == 'file'):
1775 try:
1776 fp = self.open_local_file(url1)
1777 hdrs = fp.info()
Philip Jenveycb134d72009-12-03 02:45:01 +00001778 fp.close()
Xtreakc661b302019-05-19 19:10:06 +05301779 return url2pathname(_splithost(url1)[1]), hdrs
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001780 except OSError as msg:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001781 pass
1782 fp = self.open(url, data)
Benjamin Peterson5f28b7b2009-03-26 21:49:58 +00001783 try:
1784 headers = fp.info()
1785 if filename:
1786 tfp = open(filename, 'wb')
1787 else:
Xtreakc661b302019-05-19 19:10:06 +05301788 garbage, path = _splittype(url)
1789 garbage, path = _splithost(path or "")
1790 path, garbage = _splitquery(path or "")
1791 path, garbage = _splitattr(path or "")
Benjamin Peterson5f28b7b2009-03-26 21:49:58 +00001792 suffix = os.path.splitext(path)[1]
1793 (fd, filename) = tempfile.mkstemp(suffix)
1794 self.__tempfiles.append(filename)
1795 tfp = os.fdopen(fd, 'wb')
1796 try:
1797 result = filename, headers
1798 if self.tempcache is not None:
1799 self.tempcache[url] = result
1800 bs = 1024*8
1801 size = -1
1802 read = 0
1803 blocknum = 0
Senthil Kumarance260142011-11-01 01:35:17 +08001804 if "content-length" in headers:
1805 size = int(headers["Content-Length"])
Benjamin Peterson5f28b7b2009-03-26 21:49:58 +00001806 if reporthook:
Benjamin Peterson5f28b7b2009-03-26 21:49:58 +00001807 reporthook(blocknum, bs, size)
1808 while 1:
1809 block = fp.read(bs)
1810 if not block:
1811 break
1812 read += len(block)
1813 tfp.write(block)
1814 blocknum += 1
1815 if reporthook:
1816 reporthook(blocknum, bs, size)
1817 finally:
1818 tfp.close()
1819 finally:
1820 fp.close()
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001821
1822 # raise exception if actual size does not match content-length header
1823 if size >= 0 and read < size:
Georg Brandl13e89462008-07-01 19:56:00 +00001824 raise ContentTooShortError(
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001825 "retrieval incomplete: got only %i out of %i bytes"
1826 % (read, size), result)
1827
1828 return result
1829
1830 # Each method named open_<type> knows how to open that type of URL
1831
1832 def _open_generic_http(self, connection_factory, url, data):
1833 """Make an HTTP connection using connection_class.
1834
1835 This is an internal method that should be called from
1836 open_http() or open_https().
1837
1838 Arguments:
1839 - connection_factory should take a host name and return an
1840 HTTPConnection instance.
1841 - url is the url to retrieval or a host, relative-path pair.
1842 - data is payload for a POST request or None.
1843 """
1844
1845 user_passwd = None
1846 proxy_passwd= None
1847 if isinstance(url, str):
Cheryl Sabella0250de42018-04-25 16:51:54 -07001848 host, selector = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001849 if host:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001850 user_passwd, host = _splituser(host)
Georg Brandl13e89462008-07-01 19:56:00 +00001851 host = unquote(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001852 realhost = host
1853 else:
1854 host, selector = url
1855 # check whether the proxy contains authorization information
Cheryl Sabella0250de42018-04-25 16:51:54 -07001856 proxy_passwd, host = _splituser(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001857 # now we proceed with the url we want to obtain
Cheryl Sabella0250de42018-04-25 16:51:54 -07001858 urltype, rest = _splittype(selector)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001859 url = rest
1860 user_passwd = None
1861 if urltype.lower() != 'http':
1862 realhost = None
1863 else:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001864 realhost, rest = _splithost(rest)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001865 if realhost:
Cheryl Sabella0250de42018-04-25 16:51:54 -07001866 user_passwd, realhost = _splituser(realhost)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001867 if user_passwd:
1868 selector = "%s://%s%s" % (urltype, realhost, rest)
1869 if proxy_bypass(realhost):
1870 host = realhost
1871
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001872 if not host: raise OSError('http error', 'no host given')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001873
1874 if proxy_passwd:
Senthil Kumaranc5c5a142012-01-14 19:09:04 +08001875 proxy_passwd = unquote(proxy_passwd)
Senthil Kumaran5626eec2010-08-04 17:46:23 +00001876 proxy_auth = base64.b64encode(proxy_passwd.encode()).decode('ascii')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001877 else:
1878 proxy_auth = None
1879
1880 if user_passwd:
Senthil Kumaranc5c5a142012-01-14 19:09:04 +08001881 user_passwd = unquote(user_passwd)
Senthil Kumaran5626eec2010-08-04 17:46:23 +00001882 auth = base64.b64encode(user_passwd.encode()).decode('ascii')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001883 else:
1884 auth = None
1885 http_conn = connection_factory(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001886 headers = {}
1887 if proxy_auth:
1888 headers["Proxy-Authorization"] = "Basic %s" % proxy_auth
1889 if auth:
1890 headers["Authorization"] = "Basic %s" % auth
1891 if realhost:
1892 headers["Host"] = realhost
Senthil Kumarand91ffca2011-03-19 17:25:27 +08001893
1894 # Add Connection:close as we don't support persistent connections yet.
1895 # This helps in closing the socket and avoiding ResourceWarning
1896
1897 headers["Connection"] = "close"
1898
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001899 for header, value in self.addheaders:
1900 headers[header] = value
1901
1902 if data is not None:
1903 headers["Content-Type"] = "application/x-www-form-urlencoded"
1904 http_conn.request("POST", selector, data, headers)
1905 else:
1906 http_conn.request("GET", selector, headers=headers)
1907
1908 try:
1909 response = http_conn.getresponse()
1910 except http.client.BadStatusLine:
1911 # something went wrong with the HTTP status line
Georg Brandl13e89462008-07-01 19:56:00 +00001912 raise URLError("http protocol error: bad status line")
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001913
1914 # According to RFC 2616, "2xx" code indicates that the client's
1915 # request was successfully received, understood, and accepted.
1916 if 200 <= response.status < 300:
Antoine Pitroub353c122009-02-11 00:39:14 +00001917 return addinfourl(response, response.msg, "http:" + url,
Georg Brandl13e89462008-07-01 19:56:00 +00001918 response.status)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001919 else:
1920 return self.http_error(
1921 url, response.fp,
1922 response.status, response.reason, response.msg, data)
1923
1924 def open_http(self, url, data=None):
1925 """Use HTTP protocol."""
1926 return self._open_generic_http(http.client.HTTPConnection, url, data)
1927
1928 def http_error(self, url, fp, errcode, errmsg, headers, data=None):
1929 """Handle http errors.
1930
1931 Derived class can override this, or provide specific handlers
1932 named http_error_DDD where DDD is the 3-digit error code."""
1933 # First check if there's a specific handler for this error
1934 name = 'http_error_%d' % errcode
1935 if hasattr(self, name):
1936 method = getattr(self, name)
1937 if data is None:
1938 result = method(url, fp, errcode, errmsg, headers)
1939 else:
1940 result = method(url, fp, errcode, errmsg, headers, data)
1941 if result: return result
1942 return self.http_error_default(url, fp, errcode, errmsg, headers)
1943
1944 def http_error_default(self, url, fp, errcode, errmsg, headers):
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02001945 """Default error handler: close the connection and raise OSError."""
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001946 fp.close()
Georg Brandl13e89462008-07-01 19:56:00 +00001947 raise HTTPError(url, errcode, errmsg, headers, None)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001948
1949 if _have_ssl:
1950 def _https_connection(self, host):
1951 return http.client.HTTPSConnection(host,
1952 key_file=self.key_file,
1953 cert_file=self.cert_file)
1954
1955 def open_https(self, url, data=None):
1956 """Use HTTPS protocol."""
1957 return self._open_generic_http(self._https_connection, url, data)
1958
1959 def open_file(self, url):
1960 """Use local file or FTP depending on form of URL."""
1961 if not isinstance(url, str):
Senthil Kumaran3ebef362012-10-21 18:31:25 -07001962 raise URLError('file error: proxy support for file protocol currently not implemented')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001963 if url[:2] == '//' and url[2:3] != '/' and url[2:12].lower() != 'localhost/':
Senthil Kumaran383c32d2010-10-14 11:57:35 +00001964 raise ValueError("file:// scheme is supported only on localhost")
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001965 else:
1966 return self.open_local_file(url)
1967
1968 def open_local_file(self, url):
1969 """Use local file."""
Senthil Kumaran6c5bd402011-11-01 23:20:31 +08001970 import email.utils
1971 import mimetypes
Cheryl Sabella0250de42018-04-25 16:51:54 -07001972 host, file = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001973 localname = url2pathname(file)
1974 try:
1975 stats = os.stat(localname)
1976 except OSError as e:
Senthil Kumaranf5776862012-10-21 13:30:02 -07001977 raise URLError(e.strerror, e.filename)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001978 size = stats.st_size
1979 modified = email.utils.formatdate(stats.st_mtime, usegmt=True)
1980 mtype = mimetypes.guess_type(url)[0]
1981 headers = email.message_from_string(
1982 'Content-Type: %s\nContent-Length: %d\nLast-modified: %s\n' %
1983 (mtype or 'text/plain', size, modified))
1984 if not host:
1985 urlfile = file
1986 if file[:1] == '/':
1987 urlfile = 'file://' + file
Georg Brandl13e89462008-07-01 19:56:00 +00001988 return addinfourl(open(localname, 'rb'), headers, urlfile)
Cheryl Sabella0250de42018-04-25 16:51:54 -07001989 host, port = _splitport(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001990 if (not port
Senthil Kumaran40d80782012-10-22 09:43:04 -07001991 and socket.gethostbyname(host) in ((localhost(),) + thishost())):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001992 urlfile = file
1993 if file[:1] == '/':
1994 urlfile = 'file://' + file
Senthil Kumaran3800ea92012-01-21 11:52:48 +08001995 elif file[:2] == './':
1996 raise ValueError("local file url may start with / or file:. Unknown url of type: %s" % url)
Georg Brandl13e89462008-07-01 19:56:00 +00001997 return addinfourl(open(localname, 'rb'), headers, urlfile)
Senthil Kumaran3ebef362012-10-21 18:31:25 -07001998 raise URLError('local file error: not on local host')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00001999
2000 def open_ftp(self, url):
2001 """Use FTP protocol."""
2002 if not isinstance(url, str):
Senthil Kumaran3ebef362012-10-21 18:31:25 -07002003 raise URLError('ftp error: proxy support for ftp protocol currently not implemented')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002004 import mimetypes
Cheryl Sabella0250de42018-04-25 16:51:54 -07002005 host, path = _splithost(url)
Senthil Kumaran3ebef362012-10-21 18:31:25 -07002006 if not host: raise URLError('ftp error: no host given')
Cheryl Sabella0250de42018-04-25 16:51:54 -07002007 host, port = _splitport(host)
2008 user, host = _splituser(host)
2009 if user: user, passwd = _splitpasswd(user)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002010 else: passwd = None
Georg Brandl13e89462008-07-01 19:56:00 +00002011 host = unquote(host)
2012 user = unquote(user or '')
2013 passwd = unquote(passwd or '')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002014 host = socket.gethostbyname(host)
2015 if not port:
2016 import ftplib
2017 port = ftplib.FTP_PORT
2018 else:
2019 port = int(port)
Cheryl Sabella0250de42018-04-25 16:51:54 -07002020 path, attrs = _splitattr(path)
Georg Brandl13e89462008-07-01 19:56:00 +00002021 path = unquote(path)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002022 dirs = path.split('/')
2023 dirs, file = dirs[:-1], dirs[-1]
2024 if dirs and not dirs[0]: dirs = dirs[1:]
2025 if dirs and not dirs[0]: dirs[0] = '/'
2026 key = user, host, port, '/'.join(dirs)
2027 # XXX thread unsafe!
2028 if len(self.ftpcache) > MAXFTPCACHE:
2029 # Prune the cache, rather arbitrarily
Benjamin Peterson3c2dca62014-06-07 15:08:04 -07002030 for k in list(self.ftpcache):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002031 if k != key:
2032 v = self.ftpcache[k]
2033 del self.ftpcache[k]
2034 v.close()
2035 try:
Senthil Kumaran34d38dc2011-10-20 02:48:01 +08002036 if key not in self.ftpcache:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002037 self.ftpcache[key] = \
2038 ftpwrapper(user, passwd, host, port, dirs)
2039 if not file: type = 'D'
2040 else: type = 'I'
2041 for attr in attrs:
Cheryl Sabella0250de42018-04-25 16:51:54 -07002042 attr, value = _splitvalue(attr)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002043 if attr.lower() == 'type' and \
2044 value in ('a', 'A', 'i', 'I', 'd', 'D'):
2045 type = value.upper()
2046 (fp, retrlen) = self.ftpcache[key].retrfile(file, type)
2047 mtype = mimetypes.guess_type("ftp:" + url)[0]
2048 headers = ""
2049 if mtype:
2050 headers += "Content-Type: %s\n" % mtype
2051 if retrlen is not None and retrlen >= 0:
2052 headers += "Content-Length: %d\n" % retrlen
2053 headers = email.message_from_string(headers)
Georg Brandl13e89462008-07-01 19:56:00 +00002054 return addinfourl(fp, headers, "ftp:" + url)
Senthil Kumaran3ebef362012-10-21 18:31:25 -07002055 except ftperrors() as exp:
2056 raise URLError('ftp error %r' % exp).with_traceback(sys.exc_info()[2])
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002057
2058 def open_data(self, url, data=None):
2059 """Use "data" URL."""
2060 if not isinstance(url, str):
Senthil Kumaran3ebef362012-10-21 18:31:25 -07002061 raise URLError('data error: proxy support for data protocol currently not implemented')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002062 # ignore POSTed data
2063 #
2064 # syntax of data URLs:
2065 # dataurl := "data:" [ mediatype ] [ ";base64" ] "," data
2066 # mediatype := [ type "/" subtype ] *( ";" parameter )
2067 # data := *urlchar
2068 # parameter := attribute "=" value
2069 try:
2070 [type, data] = url.split(',', 1)
2071 except ValueError:
Andrew Svetlovf7a17b42012-12-25 16:47:37 +02002072 raise OSError('data error', 'bad data URL')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002073 if not type:
2074 type = 'text/plain;charset=US-ASCII'
2075 semi = type.rfind(';')
2076 if semi >= 0 and '=' not in type[semi:]:
2077 encoding = type[semi+1:]
2078 type = type[:semi]
2079 else:
2080 encoding = ''
2081 msg = []
Senthil Kumaranf6c456d2010-05-01 08:29:18 +00002082 msg.append('Date: %s'%time.strftime('%a, %d %b %Y %H:%M:%S GMT',
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002083 time.gmtime(time.time())))
2084 msg.append('Content-type: %s' % type)
2085 if encoding == 'base64':
Georg Brandl706824f2009-06-04 09:42:55 +00002086 # XXX is this encoding/decoding ok?
Marc-André Lemburg8f36af72011-02-25 15:42:01 +00002087 data = base64.decodebytes(data.encode('ascii')).decode('latin-1')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002088 else:
Georg Brandl13e89462008-07-01 19:56:00 +00002089 data = unquote(data)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002090 msg.append('Content-Length: %d' % len(data))
2091 msg.append('')
2092 msg.append(data)
2093 msg = '\n'.join(msg)
Georg Brandl13e89462008-07-01 19:56:00 +00002094 headers = email.message_from_string(msg)
2095 f = io.StringIO(msg)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002096 #f.fileno = None # needed for addinfourl
Georg Brandl13e89462008-07-01 19:56:00 +00002097 return addinfourl(f, headers, url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002098
2099
2100class FancyURLopener(URLopener):
2101 """Derived class with handlers for errors we can handle (perhaps)."""
2102
2103 def __init__(self, *args, **kwargs):
2104 URLopener.__init__(self, *args, **kwargs)
2105 self.auth_cache = {}
2106 self.tries = 0
2107 self.maxtries = 10
2108
2109 def http_error_default(self, url, fp, errcode, errmsg, headers):
2110 """Default error handling -- don't raise an exception."""
Georg Brandl13e89462008-07-01 19:56:00 +00002111 return addinfourl(fp, headers, "http:" + url, errcode)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002112
2113 def http_error_302(self, url, fp, errcode, errmsg, headers, data=None):
2114 """Error 302 -- relocated (temporarily)."""
2115 self.tries += 1
Martin Pantera0370222016-02-04 06:01:35 +00002116 try:
2117 if self.maxtries and self.tries >= self.maxtries:
2118 if hasattr(self, "http_error_500"):
2119 meth = self.http_error_500
2120 else:
2121 meth = self.http_error_default
2122 return meth(url, fp, 500,
2123 "Internal Server Error: Redirect Recursion",
2124 headers)
2125 result = self.redirect_internal(url, fp, errcode, errmsg,
2126 headers, data)
2127 return result
2128 finally:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002129 self.tries = 0
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002130
2131 def redirect_internal(self, url, fp, errcode, errmsg, headers, data):
2132 if 'location' in headers:
2133 newurl = headers['location']
2134 elif 'uri' in headers:
2135 newurl = headers['uri']
2136 else:
2137 return
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002138 fp.close()
guido@google.coma119df92011-03-29 11:41:02 -07002139
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002140 # In case the server sent a relative URL, join with original:
Georg Brandl13e89462008-07-01 19:56:00 +00002141 newurl = urljoin(self.type + ":" + url, newurl)
guido@google.coma119df92011-03-29 11:41:02 -07002142
2143 urlparts = urlparse(newurl)
2144
2145 # For security reasons, we don't allow redirection to anything other
2146 # than http, https and ftp.
2147
2148 # We are using newer HTTPError with older redirect_internal method
2149 # This older method will get deprecated in 3.3
2150
Senthil Kumaran6497aa32012-01-04 13:46:59 +08002151 if urlparts.scheme not in ('http', 'https', 'ftp', ''):
guido@google.coma119df92011-03-29 11:41:02 -07002152 raise HTTPError(newurl, errcode,
2153 errmsg +
2154 " Redirection to url '%s' is not allowed." % newurl,
2155 headers, fp)
2156
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002157 return self.open(newurl)
2158
2159 def http_error_301(self, url, fp, errcode, errmsg, headers, data=None):
2160 """Error 301 -- also relocated (permanently)."""
2161 return self.http_error_302(url, fp, errcode, errmsg, headers, data)
2162
2163 def http_error_303(self, url, fp, errcode, errmsg, headers, data=None):
2164 """Error 303 -- also relocated (essentially identical to 302)."""
2165 return self.http_error_302(url, fp, errcode, errmsg, headers, data)
2166
2167 def http_error_307(self, url, fp, errcode, errmsg, headers, data=None):
2168 """Error 307 -- relocated, but turn POST into error."""
2169 if data is None:
2170 return self.http_error_302(url, fp, errcode, errmsg, headers, data)
2171 else:
2172 return self.http_error_default(url, fp, errcode, errmsg, headers)
2173
Senthil Kumaran80f1b052010-06-18 15:08:18 +00002174 def http_error_401(self, url, fp, errcode, errmsg, headers, data=None,
2175 retry=False):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002176 """Error 401 -- authentication required.
2177 This function supports Basic authentication only."""
Senthil Kumaran34d38dc2011-10-20 02:48:01 +08002178 if 'www-authenticate' not in headers:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002179 URLopener.http_error_default(self, url, fp,
2180 errcode, errmsg, headers)
2181 stuff = headers['www-authenticate']
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002182 match = re.match('[ \t]*([^ \t]+)[ \t]+realm="([^"]*)"', stuff)
2183 if not match:
2184 URLopener.http_error_default(self, url, fp,
2185 errcode, errmsg, headers)
2186 scheme, realm = match.groups()
2187 if scheme.lower() != 'basic':
2188 URLopener.http_error_default(self, url, fp,
2189 errcode, errmsg, headers)
Senthil Kumaran80f1b052010-06-18 15:08:18 +00002190 if not retry:
2191 URLopener.http_error_default(self, url, fp, errcode, errmsg,
2192 headers)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002193 name = 'retry_' + self.type + '_basic_auth'
2194 if data is None:
2195 return getattr(self,name)(url, realm)
2196 else:
2197 return getattr(self,name)(url, realm, data)
2198
Senthil Kumaran80f1b052010-06-18 15:08:18 +00002199 def http_error_407(self, url, fp, errcode, errmsg, headers, data=None,
2200 retry=False):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002201 """Error 407 -- proxy authentication required.
2202 This function supports Basic authentication only."""
Senthil Kumaran34d38dc2011-10-20 02:48:01 +08002203 if 'proxy-authenticate' not in headers:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002204 URLopener.http_error_default(self, url, fp,
2205 errcode, errmsg, headers)
2206 stuff = headers['proxy-authenticate']
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002207 match = re.match('[ \t]*([^ \t]+)[ \t]+realm="([^"]*)"', stuff)
2208 if not match:
2209 URLopener.http_error_default(self, url, fp,
2210 errcode, errmsg, headers)
2211 scheme, realm = match.groups()
2212 if scheme.lower() != 'basic':
2213 URLopener.http_error_default(self, url, fp,
2214 errcode, errmsg, headers)
Senthil Kumaran80f1b052010-06-18 15:08:18 +00002215 if not retry:
2216 URLopener.http_error_default(self, url, fp, errcode, errmsg,
2217 headers)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002218 name = 'retry_proxy_' + self.type + '_basic_auth'
2219 if data is None:
2220 return getattr(self,name)(url, realm)
2221 else:
2222 return getattr(self,name)(url, realm, data)
2223
2224 def retry_proxy_http_basic_auth(self, url, realm, data=None):
Cheryl Sabella0250de42018-04-25 16:51:54 -07002225 host, selector = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002226 newurl = 'http://' + host + selector
2227 proxy = self.proxies['http']
Cheryl Sabella0250de42018-04-25 16:51:54 -07002228 urltype, proxyhost = _splittype(proxy)
2229 proxyhost, proxyselector = _splithost(proxyhost)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002230 i = proxyhost.find('@') + 1
2231 proxyhost = proxyhost[i:]
2232 user, passwd = self.get_user_passwd(proxyhost, realm, i)
2233 if not (user or passwd): return None
Georg Brandl13e89462008-07-01 19:56:00 +00002234 proxyhost = "%s:%s@%s" % (quote(user, safe=''),
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002235 quote(passwd, safe=''), proxyhost)
2236 self.proxies['http'] = 'http://' + proxyhost + proxyselector
2237 if data is None:
2238 return self.open(newurl)
2239 else:
2240 return self.open(newurl, data)
2241
2242 def retry_proxy_https_basic_auth(self, url, realm, data=None):
Cheryl Sabella0250de42018-04-25 16:51:54 -07002243 host, selector = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002244 newurl = 'https://' + host + selector
2245 proxy = self.proxies['https']
Cheryl Sabella0250de42018-04-25 16:51:54 -07002246 urltype, proxyhost = _splittype(proxy)
2247 proxyhost, proxyselector = _splithost(proxyhost)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002248 i = proxyhost.find('@') + 1
2249 proxyhost = proxyhost[i:]
2250 user, passwd = self.get_user_passwd(proxyhost, realm, i)
2251 if not (user or passwd): return None
Georg Brandl13e89462008-07-01 19:56:00 +00002252 proxyhost = "%s:%s@%s" % (quote(user, safe=''),
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002253 quote(passwd, safe=''), proxyhost)
2254 self.proxies['https'] = 'https://' + proxyhost + proxyselector
2255 if data is None:
2256 return self.open(newurl)
2257 else:
2258 return self.open(newurl, data)
2259
2260 def retry_http_basic_auth(self, url, realm, data=None):
Cheryl Sabella0250de42018-04-25 16:51:54 -07002261 host, selector = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002262 i = host.find('@') + 1
2263 host = host[i:]
2264 user, passwd = self.get_user_passwd(host, realm, i)
2265 if not (user or passwd): return None
Georg Brandl13e89462008-07-01 19:56:00 +00002266 host = "%s:%s@%s" % (quote(user, safe=''),
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002267 quote(passwd, safe=''), host)
2268 newurl = 'http://' + host + selector
2269 if data is None:
2270 return self.open(newurl)
2271 else:
2272 return self.open(newurl, data)
2273
2274 def retry_https_basic_auth(self, url, realm, data=None):
Cheryl Sabella0250de42018-04-25 16:51:54 -07002275 host, selector = _splithost(url)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002276 i = host.find('@') + 1
2277 host = host[i:]
2278 user, passwd = self.get_user_passwd(host, realm, i)
2279 if not (user or passwd): return None
Georg Brandl13e89462008-07-01 19:56:00 +00002280 host = "%s:%s@%s" % (quote(user, safe=''),
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002281 quote(passwd, safe=''), host)
2282 newurl = 'https://' + host + selector
2283 if data is None:
2284 return self.open(newurl)
2285 else:
2286 return self.open(newurl, data)
2287
Florent Xicluna757445b2010-05-17 17:24:07 +00002288 def get_user_passwd(self, host, realm, clear_cache=0):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002289 key = realm + '@' + host.lower()
2290 if key in self.auth_cache:
2291 if clear_cache:
2292 del self.auth_cache[key]
2293 else:
2294 return self.auth_cache[key]
2295 user, passwd = self.prompt_user_passwd(host, realm)
2296 if user or passwd: self.auth_cache[key] = (user, passwd)
2297 return user, passwd
2298
2299 def prompt_user_passwd(self, host, realm):
2300 """Override this in a GUI environment!"""
2301 import getpass
2302 try:
2303 user = input("Enter username for %s at %s: " % (realm, host))
2304 passwd = getpass.getpass("Enter password for %s in %s at %s: " %
2305 (user, realm, host))
2306 return user, passwd
2307 except KeyboardInterrupt:
2308 print()
2309 return None, None
2310
2311
2312# Utility functions
2313
2314_localhost = None
2315def localhost():
2316 """Return the IP address of the magic hostname 'localhost'."""
2317 global _localhost
2318 if _localhost is None:
2319 _localhost = socket.gethostbyname('localhost')
2320 return _localhost
2321
2322_thishost = None
2323def thishost():
Senthil Kumaran99b2c8f2009-12-27 10:13:39 +00002324 """Return the IP addresses of the current host."""
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002325 global _thishost
2326 if _thishost is None:
Senthil Kumarandcdadfe2013-06-01 11:12:17 -07002327 try:
2328 _thishost = tuple(socket.gethostbyname_ex(socket.gethostname())[2])
2329 except socket.gaierror:
2330 _thishost = tuple(socket.gethostbyname_ex('localhost')[2])
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002331 return _thishost
2332
2333_ftperrors = None
2334def ftperrors():
2335 """Return the set of errors raised by the FTP class."""
2336 global _ftperrors
2337 if _ftperrors is None:
2338 import ftplib
2339 _ftperrors = ftplib.all_errors
2340 return _ftperrors
2341
2342_noheaders = None
2343def noheaders():
Georg Brandl13e89462008-07-01 19:56:00 +00002344 """Return an empty email Message object."""
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002345 global _noheaders
2346 if _noheaders is None:
Georg Brandl13e89462008-07-01 19:56:00 +00002347 _noheaders = email.message_from_string("")
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002348 return _noheaders
2349
2350
2351# Utility classes
2352
2353class ftpwrapper:
2354 """Class used by open_ftp() for cache of open FTP connections."""
2355
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02002356 def __init__(self, user, passwd, host, port, dirs, timeout=None,
2357 persistent=True):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002358 self.user = user
2359 self.passwd = passwd
2360 self.host = host
2361 self.port = port
2362 self.dirs = dirs
2363 self.timeout = timeout
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02002364 self.refcount = 0
2365 self.keepalive = persistent
Victor Stinnerab73e652015-04-07 12:49:27 +02002366 try:
2367 self.init()
2368 except:
2369 self.close()
2370 raise
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002371
2372 def init(self):
2373 import ftplib
2374 self.busy = 0
2375 self.ftp = ftplib.FTP()
2376 self.ftp.connect(self.host, self.port, self.timeout)
2377 self.ftp.login(self.user, self.passwd)
Senthil Kumarancaa00fe2013-06-02 11:59:47 -07002378 _target = '/'.join(self.dirs)
2379 self.ftp.cwd(_target)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002380
2381 def retrfile(self, file, type):
2382 import ftplib
2383 self.endtransfer()
2384 if type in ('d', 'D'): cmd = 'TYPE A'; isdir = 1
2385 else: cmd = 'TYPE ' + type; isdir = 0
2386 try:
2387 self.ftp.voidcmd(cmd)
2388 except ftplib.all_errors:
2389 self.init()
2390 self.ftp.voidcmd(cmd)
2391 conn = None
2392 if file and not isdir:
2393 # Try to retrieve as a file
2394 try:
2395 cmd = 'RETR ' + file
Senthil Kumaran2024acd2011-03-24 11:46:19 +08002396 conn, retrlen = self.ftp.ntransfercmd(cmd)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002397 except ftplib.error_perm as reason:
2398 if str(reason)[:3] != '550':
Benjamin Peterson901a2782013-05-12 19:01:52 -05002399 raise URLError('ftp error: %r' % reason).with_traceback(
Georg Brandl13e89462008-07-01 19:56:00 +00002400 sys.exc_info()[2])
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002401 if not conn:
2402 # Set transfer mode to ASCII!
2403 self.ftp.voidcmd('TYPE A')
2404 # Try a directory listing. Verify that directory exists.
2405 if file:
2406 pwd = self.ftp.pwd()
2407 try:
2408 try:
2409 self.ftp.cwd(file)
2410 except ftplib.error_perm as reason:
Benjamin Peterson901a2782013-05-12 19:01:52 -05002411 raise URLError('ftp error: %r' % reason) from reason
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002412 finally:
2413 self.ftp.cwd(pwd)
2414 cmd = 'LIST ' + file
2415 else:
2416 cmd = 'LIST'
Senthil Kumaran2024acd2011-03-24 11:46:19 +08002417 conn, retrlen = self.ftp.ntransfercmd(cmd)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002418 self.busy = 1
Senthil Kumaran2024acd2011-03-24 11:46:19 +08002419
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02002420 ftpobj = addclosehook(conn.makefile('rb'), self.file_close)
2421 self.refcount += 1
Senthil Kumaran2024acd2011-03-24 11:46:19 +08002422 conn.close()
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002423 # Pass back both a suitably decorated object and a retrieval length
Senthil Kumaran2024acd2011-03-24 11:46:19 +08002424 return (ftpobj, retrlen)
2425
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002426 def endtransfer(self):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002427 self.busy = 0
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002428
2429 def close(self):
Nadeem Vawda08f5f7a2011-07-23 14:03:00 +02002430 self.keepalive = False
2431 if self.refcount <= 0:
2432 self.real_close()
2433
2434 def file_close(self):
2435 self.endtransfer()
2436 self.refcount -= 1
2437 if self.refcount <= 0 and not self.keepalive:
2438 self.real_close()
2439
2440 def real_close(self):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002441 self.endtransfer()
2442 try:
2443 self.ftp.close()
2444 except ftperrors():
2445 pass
2446
2447# Proxy handling
2448def getproxies_environment():
2449 """Return a dictionary of scheme -> proxy server URL mappings.
2450
2451 Scan the environment for variables named <scheme>_proxy;
2452 this seems to be the standard convention. If you need a
2453 different way, you can pass a proxies dictionary to the
2454 [Fancy]URLopener constructor.
2455
2456 """
2457 proxies = {}
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002458 # in order to prefer lowercase variables, process environment in
2459 # two passes: first matches any, second pass matches lowercase only
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002460 for name, value in os.environ.items():
2461 name = name.lower()
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002462 if value and name[-6:] == '_proxy':
2463 proxies[name[:-6]] = value
Senthil Kumaran4cbb23f2016-07-30 23:24:16 -07002464 # CVE-2016-1000110 - If we are running as CGI script, forget HTTP_PROXY
2465 # (non-all-lowercase) as it may be set from the web server by a "Proxy:"
2466 # header from the client
Senthil Kumaran17742f22016-07-30 23:39:06 -07002467 # If "proxy" is lowercase, it will still be used thanks to the next block
Senthil Kumaran4cbb23f2016-07-30 23:24:16 -07002468 if 'REQUEST_METHOD' in os.environ:
2469 proxies.pop('http', None)
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002470 for name, value in os.environ.items():
2471 if name[-6:] == '_proxy':
2472 name = name.lower()
2473 if value:
2474 proxies[name[:-6]] = value
2475 else:
2476 proxies.pop(name[:-6], None)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002477 return proxies
2478
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002479def proxy_bypass_environment(host, proxies=None):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002480 """Test if proxies should not be used for a particular host.
2481
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002482 Checks the proxy dict for the value of no_proxy, which should
2483 be a list of comma separated DNS suffixes, or '*' for all hosts.
2484
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002485 """
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002486 if proxies is None:
2487 proxies = getproxies_environment()
2488 # don't bypass, if no_proxy isn't specified
2489 try:
2490 no_proxy = proxies['no']
2491 except KeyError:
2492 return 0
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002493 # '*' is special case for always bypass
2494 if no_proxy == '*':
2495 return 1
2496 # strip port off host
Cheryl Sabella0250de42018-04-25 16:51:54 -07002497 hostonly, port = _splitport(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002498 # check if the host ends with any of the DNS suffixes
Senthil Kumaran89976f12011-08-06 12:27:40 +08002499 no_proxy_list = [proxy.strip() for proxy in no_proxy.split(',')]
2500 for name in no_proxy_list:
Martin Panteraa279822016-04-30 01:03:40 +00002501 if name:
Xiang Zhang959ff7f2017-01-09 11:47:55 +08002502 name = name.lstrip('.') # ignore leading dots
Martin Panteraa279822016-04-30 01:03:40 +00002503 name = re.escape(name)
2504 pattern = r'(.+\.)?%s$' % name
2505 if (re.match(pattern, hostonly, re.I)
2506 or re.match(pattern, host, re.I)):
2507 return 1
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002508 # otherwise, don't bypass
2509 return 0
2510
2511
Ronald Oussorene72e1612011-03-14 18:15:25 -04002512# This code tests an OSX specific data structure but is testable on all
2513# platforms
2514def _proxy_bypass_macosx_sysconf(host, proxy_settings):
2515 """
2516 Return True iff this host shouldn't be accessed using a proxy
2517
2518 This function uses the MacOSX framework SystemConfiguration
2519 to fetch the proxy information.
2520
2521 proxy_settings come from _scproxy._get_proxy_settings or get mocked ie:
2522 { 'exclude_simple': bool,
2523 'exceptions': ['foo.bar', '*.bar.com', '127.0.0.1', '10.1', '10.0/16']
2524 }
2525 """
Ronald Oussorene72e1612011-03-14 18:15:25 -04002526 from fnmatch import fnmatch
2527
Cheryl Sabella0250de42018-04-25 16:51:54 -07002528 hostonly, port = _splitport(host)
Ronald Oussorene72e1612011-03-14 18:15:25 -04002529
2530 def ip2num(ipAddr):
2531 parts = ipAddr.split('.')
2532 parts = list(map(int, parts))
2533 if len(parts) != 4:
2534 parts = (parts + [0, 0, 0, 0])[:4]
2535 return (parts[0] << 24) | (parts[1] << 16) | (parts[2] << 8) | parts[3]
2536
2537 # Check for simple host names:
2538 if '.' not in host:
2539 if proxy_settings['exclude_simple']:
2540 return True
2541
2542 hostIP = None
2543
2544 for value in proxy_settings.get('exceptions', ()):
2545 # Items in the list are strings like these: *.local, 169.254/16
2546 if not value: continue
2547
2548 m = re.match(r"(\d+(?:\.\d+)*)(/\d+)?", value)
2549 if m is not None:
2550 if hostIP is None:
2551 try:
2552 hostIP = socket.gethostbyname(hostonly)
2553 hostIP = ip2num(hostIP)
Andrew Svetlov0832af62012-12-18 23:10:48 +02002554 except OSError:
Ronald Oussorene72e1612011-03-14 18:15:25 -04002555 continue
2556
2557 base = ip2num(m.group(1))
2558 mask = m.group(2)
2559 if mask is None:
2560 mask = 8 * (m.group(1).count('.') + 1)
2561 else:
2562 mask = int(mask[1:])
2563 mask = 32 - mask
2564
2565 if (hostIP >> mask) == (base >> mask):
2566 return True
2567
2568 elif fnmatch(host, value):
2569 return True
2570
2571 return False
2572
2573
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002574if sys.platform == 'darwin':
Ronald Oussoren84151202010-04-18 20:46:11 +00002575 from _scproxy import _get_proxy_settings, _get_proxies
2576
2577 def proxy_bypass_macosx_sysconf(host):
Ronald Oussoren84151202010-04-18 20:46:11 +00002578 proxy_settings = _get_proxy_settings()
Ronald Oussorene72e1612011-03-14 18:15:25 -04002579 return _proxy_bypass_macosx_sysconf(host, proxy_settings)
Ronald Oussoren84151202010-04-18 20:46:11 +00002580
2581 def getproxies_macosx_sysconf():
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002582 """Return a dictionary of scheme -> proxy server URL mappings.
2583
Ronald Oussoren84151202010-04-18 20:46:11 +00002584 This function uses the MacOSX framework SystemConfiguration
2585 to fetch the proxy information.
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002586 """
Ronald Oussoren84151202010-04-18 20:46:11 +00002587 return _get_proxies()
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002588
Ronald Oussoren84151202010-04-18 20:46:11 +00002589
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002590
2591 def proxy_bypass(host):
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002592 """Return True, if host should be bypassed.
2593
2594 Checks proxy settings gathered from the environment, if specified,
2595 or from the MacOSX framework SystemConfiguration.
2596
2597 """
2598 proxies = getproxies_environment()
2599 if proxies:
2600 return proxy_bypass_environment(host, proxies)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002601 else:
Ronald Oussoren84151202010-04-18 20:46:11 +00002602 return proxy_bypass_macosx_sysconf(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002603
2604 def getproxies():
Ronald Oussoren84151202010-04-18 20:46:11 +00002605 return getproxies_environment() or getproxies_macosx_sysconf()
2606
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002607
2608elif os.name == 'nt':
2609 def getproxies_registry():
2610 """Return a dictionary of scheme -> proxy server URL mappings.
2611
2612 Win32 uses the registry to store proxies.
2613
2614 """
2615 proxies = {}
2616 try:
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002617 import winreg
Brett Cannoncd171c82013-07-04 17:43:24 -04002618 except ImportError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002619 # Std module, so should be around - but you never know!
2620 return proxies
2621 try:
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002622 internetSettings = winreg.OpenKey(winreg.HKEY_CURRENT_USER,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002623 r'Software\Microsoft\Windows\CurrentVersion\Internet Settings')
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002624 proxyEnable = winreg.QueryValueEx(internetSettings,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002625 'ProxyEnable')[0]
2626 if proxyEnable:
2627 # Returned as Unicode but problems if not converted to ASCII
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002628 proxyServer = str(winreg.QueryValueEx(internetSettings,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002629 'ProxyServer')[0])
2630 if '=' in proxyServer:
2631 # Per-protocol settings
2632 for p in proxyServer.split(';'):
2633 protocol, address = p.split('=', 1)
2634 # See if address has a type:// prefix
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002635 if not re.match('^([^/:]+)://', address):
2636 address = '%s://%s' % (protocol, address)
2637 proxies[protocol] = address
2638 else:
2639 # Use one setting for all protocols
2640 if proxyServer[:5] == 'http:':
2641 proxies['http'] = proxyServer
2642 else:
2643 proxies['http'] = 'http://%s' % proxyServer
Senthil Kumaran04f31b82010-07-14 20:10:52 +00002644 proxies['https'] = 'https://%s' % proxyServer
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002645 proxies['ftp'] = 'ftp://%s' % proxyServer
2646 internetSettings.Close()
Andrew Svetlov2606a6f2012-12-19 14:33:35 +02002647 except (OSError, ValueError, TypeError):
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002648 # Either registry key not found etc, or the value in an
2649 # unexpected format.
2650 # proxies already set up to be empty so nothing to do
2651 pass
2652 return proxies
2653
2654 def getproxies():
2655 """Return a dictionary of scheme -> proxy server URL mappings.
2656
2657 Returns settings gathered from the environment, if specified,
2658 or the registry.
2659
2660 """
2661 return getproxies_environment() or getproxies_registry()
2662
2663 def proxy_bypass_registry(host):
2664 try:
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002665 import winreg
Brett Cannoncd171c82013-07-04 17:43:24 -04002666 except ImportError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002667 # Std modules, so should be around - but you never know!
2668 return 0
2669 try:
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002670 internetSettings = winreg.OpenKey(winreg.HKEY_CURRENT_USER,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002671 r'Software\Microsoft\Windows\CurrentVersion\Internet Settings')
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002672 proxyEnable = winreg.QueryValueEx(internetSettings,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002673 'ProxyEnable')[0]
Georg Brandl4ed72ac2009-04-01 04:28:33 +00002674 proxyOverride = str(winreg.QueryValueEx(internetSettings,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002675 'ProxyOverride')[0])
2676 # ^^^^ Returned as Unicode but problems if not converted to ASCII
Andrew Svetlov2606a6f2012-12-19 14:33:35 +02002677 except OSError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002678 return 0
2679 if not proxyEnable or not proxyOverride:
2680 return 0
2681 # try to make a host list from name and IP address.
Cheryl Sabella0250de42018-04-25 16:51:54 -07002682 rawHost, port = _splitport(host)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002683 host = [rawHost]
2684 try:
2685 addr = socket.gethostbyname(rawHost)
2686 if addr != rawHost:
2687 host.append(addr)
Andrew Svetlov0832af62012-12-18 23:10:48 +02002688 except OSError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002689 pass
2690 try:
2691 fqdn = socket.getfqdn(rawHost)
2692 if fqdn != rawHost:
2693 host.append(fqdn)
Andrew Svetlov0832af62012-12-18 23:10:48 +02002694 except OSError:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002695 pass
2696 # make a check value list from the registry entry: replace the
2697 # '<local>' string by the localhost entry and the corresponding
2698 # canonical entry.
2699 proxyOverride = proxyOverride.split(';')
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002700 # now check if we match one of the registry values.
2701 for test in proxyOverride:
Senthil Kumaran49476062009-05-01 06:00:23 +00002702 if test == '<local>':
2703 if '.' not in rawHost:
2704 return 1
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002705 test = test.replace(".", r"\.") # mask dots
2706 test = test.replace("*", r".*") # change glob sequence
2707 test = test.replace("?", r".") # change glob char
2708 for val in host:
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002709 if re.match(test, val, re.I):
2710 return 1
2711 return 0
2712
2713 def proxy_bypass(host):
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002714 """Return True, if host should be bypassed.
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002715
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002716 Checks proxy settings gathered from the environment, if specified,
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002717 or the registry.
2718
2719 """
Senthil Kumarana7c0ff22016-04-25 08:16:23 -07002720 proxies = getproxies_environment()
2721 if proxies:
2722 return proxy_bypass_environment(host, proxies)
Jeremy Hylton1afc1692008-06-18 20:49:58 +00002723 else:
2724 return proxy_bypass_registry(host)
2725
2726else:
2727 # By default use environment variables
2728 getproxies = getproxies_environment
2729 proxy_bypass = proxy_bypass_environment