httpie-cli/httpie/sessions.py

260 lines
7.5 KiB
Python
Raw Normal View History

"""
Persistent, JSON-serialized sessions.
"""
import os
import re
from http.cookies import SimpleCookie
2022-02-01 10:14:24 +01:00
from http.cookiejar import Cookie
from pathlib import Path
2022-03-04 12:09:16 +01:00
from typing import Any, Dict, List, Optional, Union
from requests.auth import AuthBase
2022-02-01 10:14:24 +01:00
from requests.cookies import RequestsCookieJar, remove_cookie_by_name
2022-02-01 10:14:24 +01:00
from .context import Environment
from .cli.dicts import HTTPHeadersDict
from .config import BaseConfigDict, DEFAULT_CONFIG_DIR
2022-02-01 10:14:24 +01:00
from .utils import url_as_host
from .plugins.registry import plugin_manager
2022-03-04 12:09:16 +01:00
from .legacy import cookie_format as legacy_cookies
2012-09-17 02:15:00 +02:00
SESSIONS_DIR_NAME = 'sessions'
DEFAULT_SESSIONS_DIR = DEFAULT_CONFIG_DIR / SESSIONS_DIR_NAME
VALID_SESSION_NAME_PATTERN = re.compile('^[a-zA-Z0-9_.-]+$')
# Request headers starting with these prefixes won't be stored in sessions.
# They are specific to each request.
2019-12-03 19:09:09 +01:00
# <https://en.wikipedia.org/wiki/List_of_HTTP_header_fields#Requests>
SESSION_IGNORED_HEADER_PREFIXES = ['Content-', 'If-']
2022-02-01 10:14:24 +01:00
# Cookie related options
KEPT_COOKIE_OPTIONS = ['name', 'expires', 'path', 'value', 'domain', 'secure']
DEFAULT_COOKIE_PATH = '/'
2022-03-04 12:09:16 +01:00
def is_anonymous_session(session_name: str) -> bool:
return os.path.sep in session_name
2022-02-01 10:14:24 +01:00
2022-03-04 12:09:16 +01:00
def session_hostname_to_dirname(hostname: str, session_name: str) -> str:
# host:port => host_port
hostname = hostname.replace(':', '_')
return os.path.join(
SESSIONS_DIR_NAME,
hostname,
f'{session_name}.json'
)
2022-02-01 10:14:24 +01:00
2022-03-04 12:09:16 +01:00
def strip_port(hostname: str) -> str:
return hostname.split(':')[0]
2022-02-01 10:14:24 +01:00
def materialize_cookie(cookie: Cookie) -> Dict[str, Any]:
materialized_cookie = {
option: getattr(cookie, option)
for option in KEPT_COOKIE_OPTIONS
}
if (
cookie._rest.get('is_explicit_none')
and materialized_cookie['domain'] == ''
):
materialized_cookie['domain'] = None
return materialized_cookie
def get_httpie_session(
2022-02-01 10:14:24 +01:00
env: Environment,
config_dir: Path,
session_name: str,
host: Optional[str],
url: str,
2022-02-01 10:14:24 +01:00
*,
refactor_mode: bool = False
) -> 'Session':
2022-02-01 10:14:24 +01:00
bound_hostname = host or url_as_host(url)
if not bound_hostname:
# HACK/FIXME: httpie-unixsocket's URLs have no hostname.
bound_hostname = 'localhost'
if is_anonymous_session(session_name):
path = os.path.expanduser(session_name)
2022-02-01 10:14:24 +01:00
session_id = path
else:
2022-03-04 12:09:16 +01:00
path = config_dir / session_hostname_to_dirname(bound_hostname, session_name)
2022-02-01 10:14:24 +01:00
session_id = session_name
session = Session(
path,
env=env,
session_id=session_id,
2022-03-04 12:09:16 +01:00
bound_host=strip_port(bound_hostname),
2022-02-01 10:14:24 +01:00
refactor_mode=refactor_mode
)
2012-08-19 04:58:14 +02:00
session.load()
return session
class Session(BaseConfigDict):
helpurl = 'https://httpie.io/docs#sessions'
2012-12-01 18:16:00 +01:00
about = 'HTTPie session file'
2022-02-01 10:14:24 +01:00
def __init__(
self,
path: Union[str, Path],
env: Environment,
bound_host: str,
session_id: str,
refactor_mode: bool = False,
):
super().__init__(path=Path(path))
2012-08-19 04:58:14 +02:00
self['headers'] = {}
2022-02-01 10:14:24 +01:00
self['cookies'] = []
2012-12-01 18:16:00 +01:00
self['auth'] = {
'type': None,
2012-12-11 12:54:34 +01:00
'username': None,
'password': None
2012-12-01 18:16:00 +01:00
}
2022-02-01 10:14:24 +01:00
self.env = env
self.cookie_jar = RequestsCookieJar()
self.session_id = session_id
self.bound_host = bound_host
self.refactor_mode = refactor_mode
def pre_process_data(self, data: Dict[str, Any]) -> Dict[str, Any]:
cookies = data.get('cookies')
2022-03-04 12:09:16 +01:00
if cookies:
normalized_cookies = legacy_cookies.pre_process(self, cookies)
2022-02-01 10:14:24 +01:00
else:
normalized_cookies = []
for cookie in normalized_cookies:
domain = cookie.get('domain', '')
2022-03-04 12:09:16 +01:00
if domain is None:
2022-02-01 10:14:24 +01:00
# domain = None means explicitly lack of cookie, though
2022-03-04 12:09:16 +01:00
# requests requires domain to be a string so we'll cast it
2022-02-01 10:14:24 +01:00
# manually.
cookie['domain'] = ''
cookie['rest'] = {'is_explicit_none': True}
self.cookie_jar.set(**cookie)
return data
def post_process_data(self, data: Dict[str, Any]) -> Dict[str, Any]:
cookies = data.get('cookies')
normalized_cookies = [
materialize_cookie(cookie)
for cookie in self.cookie_jar
]
2022-03-04 12:09:16 +01:00
data['cookies'] = legacy_cookies.post_process(
normalized_cookies,
original_type=type(cookies)
)
2022-02-01 10:14:24 +01:00
return data
def update_headers(self, request_headers: HTTPHeadersDict):
"""
Update the session headers with the request ones while ignoring
certain name prefixes.
"""
2019-09-01 21:15:39 +02:00
headers = self.headers
for name, value in request_headers.copy().items():
if value is None:
continue # Ignore explicitly unset headers
2022-02-01 10:14:24 +01:00
original_value = value
if type(value) is not str:
value = value.decode()
if name.lower() == 'user-agent' and value.startswith('HTTPie/'):
continue
if name.lower() == 'cookie':
for cookie_name, morsel in SimpleCookie(value).items():
2022-02-01 10:14:24 +01:00
if not morsel['path']:
morsel['path'] = DEFAULT_COOKIE_PATH
self.cookie_jar.set(cookie_name, morsel)
all_cookie_headers = request_headers.getall(name)
if len(all_cookie_headers) > 1:
all_cookie_headers.remove(original_value)
else:
request_headers.popall(name)
continue
for prefix in SESSION_IGNORED_HEADER_PREFIXES:
if name.lower().startswith(prefix.lower()):
break
else:
2019-09-01 21:15:39 +02:00
headers[name] = value
self['headers'] = dict(headers)
@property
def headers(self) -> HTTPHeadersDict:
return HTTPHeadersDict(self['headers'])
@property
def cookies(self) -> RequestsCookieJar:
2022-02-01 10:14:24 +01:00
self.cookie_jar.clear_expired_cookies()
return self.cookie_jar
@cookies.setter
def cookies(self, jar: RequestsCookieJar):
2022-02-01 10:14:24 +01:00
self.cookie_jar = jar
2022-03-04 12:09:16 +01:00
def remove_cookies(self, cookies: List[Dict[str, str]]):
2022-02-01 10:14:24 +01:00
for cookie in cookies:
remove_cookie_by_name(
self.cookie_jar,
cookie['name'],
domain=cookie.get('domain', None),
path=cookie.get('path', None)
)
@property
def auth(self) -> Optional[AuthBase]:
auth = self.get('auth', None)
2012-12-01 18:16:00 +01:00
if not auth or not auth['type']:
2012-12-11 12:54:34 +01:00
return
plugin = plugin_manager.get_auth_plugin(auth['type'])()
credentials = {'username': None, 'password': None}
try:
# New style
plugin.raw_auth = auth['raw_auth']
except KeyError:
# Old style
credentials = {
'username': auth['username'],
'password': auth['password'],
}
else:
if plugin.auth_parse:
from .cli.argtypes import parse_auth
parsed = parse_auth(plugin.raw_auth)
credentials = {
'username': parsed.key,
'password': parsed.value,
}
return plugin.get_auth(**credentials)
@auth.setter
def auth(self, auth: dict):
2019-08-30 09:56:50 +02:00
assert {'type', 'raw_auth'} == auth.keys()
2013-09-21 23:46:15 +02:00
self['auth'] = auth
2022-03-04 12:09:16 +01:00
@property
def is_anonymous(self):
return is_anonymous_session(self.session_id)