Compare commits
71 Commits
Author | SHA1 | Date | |
---|---|---|---|
d5a8bb3acd | |||
27d27127f6 | |||
5ebdea6d0a | |||
ea31bb9579 | |||
4f30756dc5 | |||
cdc057f851 | |||
574ecade05 | |||
84b9c5f62e | |||
4990de085c | |||
51e51ae4e2 | |||
2de770aed0 | |||
9ab413d583 | |||
aeb93a60e5 | |||
a07118ef9c | |||
514e9255aa | |||
79abdc9cde | |||
038e7a8352 | |||
0387abb4f6 | |||
10e8add9e6 | |||
c004e28c37 | |||
46f05a1022 | |||
b9384150b7 | |||
4296756ae7 | |||
83cf83a67c | |||
7aaa7b9abe | |||
14b90de059 | |||
e9013017fb | |||
6e6ac8bbe7 | |||
7ec56ee52d | |||
b348c872dc | |||
d78093ab53 | |||
c6b8569543 | |||
a1c48beb32 | |||
a88fdf81fa | |||
4993bfdd9b | |||
696f350a44 | |||
409f794835 | |||
92eb011470 | |||
b5ecd1552b | |||
765822a300 | |||
e9a6449505 | |||
df15f0b0d5 | |||
6c7f7e8c8e | |||
dfc1108b41 | |||
4fe57532b0 | |||
d104b0f28d | |||
30106c7e9f | |||
9997985d8c | |||
6057fc0987 | |||
a6dc530ac7 | |||
6a14c04aaa | |||
f9e10ecb2f | |||
b6bfb2eae9 | |||
e6b4594393 | |||
495e9a9785 | |||
cbbd2248f0 | |||
2028cb1362 | |||
7e71115844 | |||
491da61a79 | |||
bbaebbc80d | |||
0dfdf70c45 | |||
0432561b21 | |||
3709cb4d66 | |||
9d0d0b2686 | |||
8c98d35934 | |||
7db38c7eae | |||
9616fb3ddc | |||
f473db29a8 | |||
b39e9b1321 | |||
f3b525d715 | |||
0f3694ba05 |
9
.gitignore
vendored
9
.gitignore
vendored
@ -23,10 +23,13 @@ dist
|
|||||||
.pytest_cache
|
.pytest_cache
|
||||||
venv
|
venv
|
||||||
|
|
||||||
flask_session
|
|
||||||
instance
|
|
||||||
|
|
||||||
.DS_Store
|
.DS_Store
|
||||||
.idea
|
.idea
|
||||||
|
|
||||||
|
instance
|
||||||
|
flask_session
|
||||||
|
|
||||||
|
.scannerwork
|
||||||
|
sonar-project.properties
|
||||||
|
|
||||||
excludes
|
excludes
|
||||||
|
@ -15,4 +15,8 @@
|
|||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
|
include docs/*
|
||||||
|
include docs/source/*
|
||||||
|
include docs/source/_static/*
|
||||||
|
include docs/source/_templates/*
|
||||||
include tests/*
|
include tests/*
|
||||||
|
242
README.rst
242
README.rst
@ -6,21 +6,23 @@ Flask HTTP Digest Authentication
|
|||||||
Description
|
Description
|
||||||
===========
|
===========
|
||||||
|
|
||||||
*Flask-Digest-Auth* is an `HTTP Digest Authentication`_ implementation
|
*Flask-DigestAuth* is an `HTTP Digest Authentication`_ implementation
|
||||||
for Flask_ applications. It authenticates the user for the protected
|
for Flask_ applications. It authenticates the user for the protected
|
||||||
views.
|
views.
|
||||||
|
|
||||||
HTTP Digest Authentication is specified in `RFC 2617`_.
|
HTTP Digest Authentication is specified in `RFC 2617`_.
|
||||||
|
|
||||||
|
Refer to the full `Flask-DigestAuth readthedocs documentation`_.
|
||||||
|
|
||||||
|
|
||||||
Why HTTP Digest Authentication?
|
Why HTTP Digest Authentication?
|
||||||
-------------------------------
|
-------------------------------
|
||||||
|
|
||||||
HTTP Digest Authentication has the advantage that it does not send the
|
*HTTP Digest Authentication* has the advantage that it does not send
|
||||||
actual password to the server, which greatly enhances the security.
|
thee actual password to the server, which greatly enhances the
|
||||||
It uses the challenge-response authentication scheme. The client
|
security. It uses the challenge-response authentication scheme. The
|
||||||
returns the response calculated from the challenge and the password,
|
client returns the response calculated from the challenge and the
|
||||||
but not the original password.
|
password, but not the original password.
|
||||||
|
|
||||||
Log in forms has the advantage of freedom, in the senses of both the
|
Log in forms has the advantage of freedom, in the senses of both the
|
||||||
visual design and the actual implementation. You may implement your
|
visual design and the actual implementation. You may implement your
|
||||||
@ -28,87 +30,61 @@ own challenge-response log in form, but then you are reinventing the
|
|||||||
wheels. If a pretty log in form is not critical to your project, HTTP
|
wheels. If a pretty log in form is not critical to your project, HTTP
|
||||||
Digest Authentication should be a good choice.
|
Digest Authentication should be a good choice.
|
||||||
|
|
||||||
Flask-Digest-Auth works with Flask-Login_. Log in protection can be
|
Flask-DigestAuth works with Flask-Login_. Log in protection can be
|
||||||
separated with the authentication mechanism. You can create protected
|
separated with the authentication mechanism. You can create protected
|
||||||
Flask modules without knowing the actual authentication mechanisms.
|
Flask modules without knowing the actual authentication mechanisms.
|
||||||
|
|
||||||
|
|
||||||
Features
|
|
||||||
--------
|
|
||||||
|
|
||||||
There are a couple of Flask HTTP digest authentication
|
|
||||||
implementations. Flask-Digest-Auth has the following features:
|
|
||||||
|
|
||||||
|
|
||||||
Flask-Login Integration
|
|
||||||
#######################
|
|
||||||
|
|
||||||
Flask-Digest-Auth features Flask-Login integration. The views
|
|
||||||
can be totally independent with the actual authentication mechanism.
|
|
||||||
You can write a Flask module that requires log in, without specify
|
|
||||||
the actual authentication mechanism. The application can specify
|
|
||||||
either HTTP Digest Authentication, or the log in forms, as needed.
|
|
||||||
|
|
||||||
|
|
||||||
Session Integration
|
|
||||||
###################
|
|
||||||
|
|
||||||
Flask-Digest-Auth features session integration. The user log in
|
|
||||||
is remembered in the session. The authentication information is not
|
|
||||||
requested again. This is different to the practice of the HTTP Digest
|
|
||||||
Authentication, but is convenient for the log in accounting.
|
|
||||||
|
|
||||||
|
|
||||||
Log Out Support
|
|
||||||
###############
|
|
||||||
|
|
||||||
Flask-Digest-Auth supports log out. The user will be prompted for
|
|
||||||
new username and password.
|
|
||||||
|
|
||||||
|
|
||||||
Log In Bookkeeping
|
|
||||||
##################
|
|
||||||
|
|
||||||
You can register a callback to run when the user logs in.
|
|
||||||
|
|
||||||
|
|
||||||
.. _HTTP Digest Authentication: https://en.wikipedia.org/wiki/Digest_access_authentication
|
|
||||||
.. _RFC 2617: https://www.rfc-editor.org/rfc/rfc2617
|
|
||||||
.. _Flask: https://flask.palletsprojects.com
|
|
||||||
.. _Flask-Login: https://flask-login.readthedocs.io
|
|
||||||
|
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
============
|
============
|
||||||
|
|
||||||
You can install Flask-Digest-Auth with ``pip``:
|
You can install Flask-DigestAuth with ``pip``:
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
pip install Flask-Digest-Auth
|
pip install Flask-DigestAuth
|
||||||
|
|
||||||
You may also install the latest source from the
|
You may also install the latest source from the
|
||||||
`Flask-Digest-Auth GitHub repository`_.
|
`Flask-DigestAuth GitHub repository`_.
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
git clone git@github.com:imacat/flask-digest-auth.git
|
pip install git+https://github.com/imacat/flask-digestauth.git
|
||||||
cd flask-digest-auth
|
|
||||||
pip install .
|
|
||||||
|
|
||||||
.. _Flask-Digest-Auth GitHub repository: https://github.com/imacat/flask-digest-auth
|
|
||||||
|
|
||||||
|
|
||||||
Flask-Digest-Auth Alone
|
Configuration
|
||||||
=======================
|
=============
|
||||||
|
|
||||||
Flask-Digest-Auth can authenticate the users alone.
|
Flask-DigestAuth takes the configuration ``DIGEST_AUTH_REALM`` as the
|
||||||
|
realm. The default realm is ``Login Required``.
|
||||||
The currently logged-in user can be retrieved at ``g.user``, if any.
|
|
||||||
|
|
||||||
|
|
||||||
Example for Simple Applications with Flask-Digest-Auth Alone
|
Setting the Password
|
||||||
------------------------------------------------------------
|
====================
|
||||||
|
|
||||||
|
The password hash of the HTTP Digest Authentication is composed of the
|
||||||
|
realm, the username, and the password. Example for setting the
|
||||||
|
password:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask_digest_auth import make_password_hash
|
||||||
|
|
||||||
|
user.password = make_password_hash(realm, username, password)
|
||||||
|
|
||||||
|
The username is part of the hash. If the user changes their username,
|
||||||
|
you need to ask their password, to generate and store the new password
|
||||||
|
hash.
|
||||||
|
|
||||||
|
|
||||||
|
Flask-DigestAuth Alone
|
||||||
|
======================
|
||||||
|
|
||||||
|
Flask-DigestAuth can authenticate the users alone.
|
||||||
|
|
||||||
|
|
||||||
|
Simple Applications with Flask-DigestAuth Alone
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
In your ``my_app.py``:
|
In your ``my_app.py``:
|
||||||
|
|
||||||
@ -120,7 +96,7 @@ In your ``my_app.py``:
|
|||||||
app: flask = Flask(__name__)
|
app: flask = Flask(__name__)
|
||||||
... (Configure the Flask application) ...
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
auth: DigestAuth = DigestAuth(realm="Admin")
|
auth: DigestAuth = DigestAuth()
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
@ -143,8 +119,8 @@ In your ``my_app.py``:
|
|||||||
return redirect(request.form.get("next"))
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
|
||||||
Example for Larger Applications with ``create_app()`` with Flask-Digest-Auth Alone
|
Larger Applications with ``create_app()`` with Flask-DigestAuth Alone
|
||||||
----------------------------------------------------------------------------------
|
---------------------------------------------------------------------
|
||||||
|
|
||||||
In your ``my_app/__init__.py``:
|
In your ``my_app/__init__.py``:
|
||||||
|
|
||||||
@ -159,7 +135,6 @@ In your ``my_app/__init__.py``:
|
|||||||
app: flask = Flask(__name__)
|
app: flask = Flask(__name__)
|
||||||
... (Configure the Flask application) ...
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
auth.realm = app.config["REALM"]
|
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
@ -196,23 +171,29 @@ In your ``my_app/views.py``:
|
|||||||
app.register_blueprint(bp)
|
app.register_blueprint(bp)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Flask-Login Integration
|
Flask-Login Integration
|
||||||
=======================
|
=======================
|
||||||
|
|
||||||
Flask-Digest-Auth can work with Flask-Login. You can write a Flask
|
Flask-DigestAuth works with Flask-Login_. You can write a Flask
|
||||||
module that requires log in, without specifying the authentication
|
module that requires log in, without specifying how to log in. The
|
||||||
mechanism. The Flask application can specify the actual
|
application can use either HTTP Digest Authentication, or the log in
|
||||||
authentication mechanism as it sees fit.
|
forms, as needed.
|
||||||
|
|
||||||
|
To use Flask-Login with Flask-DigestAuth,
|
||||||
``login_manager.init_app(app)`` must be called before
|
``login_manager.init_app(app)`` must be called before
|
||||||
``auth.init_app(app)``.
|
``auth.init_app(app)``.
|
||||||
|
|
||||||
The currently logged-in user can be retrieved at
|
The currently logged-in user can be retrieved at
|
||||||
``flask_login.current_user``, if any.
|
``flask_login.current_user``, if any.
|
||||||
|
|
||||||
|
The views only depend on Flask-Login, but not the Flask-DigestAuth.
|
||||||
|
You can change the actual authentication mechanism without changing
|
||||||
|
the views.
|
||||||
|
|
||||||
Example for Simple Applications with Flask-Login Integration
|
|
||||||
------------------------------------------------------------
|
Simple Applications with Flask-Login Integration
|
||||||
|
------------------------------------------------
|
||||||
|
|
||||||
In your ``my_app.py``:
|
In your ``my_app.py``:
|
||||||
|
|
||||||
@ -232,7 +213,7 @@ In your ``my_app.py``:
|
|||||||
def load_user(user_id: str) -> t.Optional[User]:
|
def load_user(user_id: str) -> t.Optional[User]:
|
||||||
... (Load the user with the username) ...
|
... (Load the user with the username) ...
|
||||||
|
|
||||||
auth: DigestAuth = DigestAuth(realm="Admin")
|
auth: DigestAuth = DigestAuth()
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
@ -252,8 +233,8 @@ In your ``my_app.py``:
|
|||||||
return redirect(request.form.get("next"))
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
|
||||||
Example for Larger Applications with ``create_app()`` with Flask-Login Integration
|
Larger Applications with ``create_app()`` with Flask-Login Integration
|
||||||
----------------------------------------------------------------------------------
|
----------------------------------------------------------------------
|
||||||
|
|
||||||
In your ``my_app/__init__.py``:
|
In your ``my_app/__init__.py``:
|
||||||
|
|
||||||
@ -276,7 +257,6 @@ In your ``my_app/__init__.py``:
|
|||||||
def load_user(user_id: str) -> t.Optional[User]:
|
def load_user(user_id: str) -> t.Optional[User]:
|
||||||
... (Load the user with the username) ...
|
... (Load the user with the username) ...
|
||||||
|
|
||||||
auth.realm = app.config["REALM"]
|
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
@ -315,35 +295,17 @@ authentication mechanism. You can change the actual authentication
|
|||||||
mechanism without changing the views.
|
mechanism without changing the views.
|
||||||
|
|
||||||
|
|
||||||
Setting the Password Hash
|
Session Integration
|
||||||
=========================
|
===================
|
||||||
|
|
||||||
The password hash of the HTTP Digest Authentication is composed of the
|
Flask-DigestAuth features session integration. The user log in
|
||||||
realm, the username, and the password. Example for setting the
|
is remembered in the session. The authentication information is not
|
||||||
password:
|
requested again. This is different to the practice of the HTTP Digest
|
||||||
|
Authentication, but is convenient for the log in accounting.
|
||||||
::
|
|
||||||
|
|
||||||
from flask_digest_auth import make_password_hash
|
|
||||||
|
|
||||||
user.password = make_password_hash(realm, username, password)
|
|
||||||
|
|
||||||
The username is part of the hash. If the user changes their username,
|
|
||||||
you need to ask their password, to generate and store the new password
|
|
||||||
hash.
|
|
||||||
|
|
||||||
|
|
||||||
Log Out
|
|
||||||
=======
|
|
||||||
|
|
||||||
Call ``auth.logout()`` when the user wants to log out.
|
|
||||||
Besides the usual log out routine, ``auth.logout()`` actually causes
|
|
||||||
the next browser automatic authentication to fail, forcing the browser
|
|
||||||
to ask the user for the username and password again.
|
|
||||||
|
|
||||||
|
|
||||||
Log In Bookkeeping
|
Log In Bookkeeping
|
||||||
=================#
|
==================
|
||||||
|
|
||||||
You can register a callback to run when the user logs in, for ex.,
|
You can register a callback to run when the user logs in, for ex.,
|
||||||
logging the log in event, adding the log in counter, etc.
|
logging the log in event, adding the log in counter, etc.
|
||||||
@ -355,14 +317,26 @@ logging the log in event, adding the log in counter, etc.
|
|||||||
user.visits = user.visits + 1
|
user.visits = user.visits + 1
|
||||||
|
|
||||||
|
|
||||||
Writing Tests
|
Log Out
|
||||||
=============
|
=======
|
||||||
|
|
||||||
You can write tests with our test client that handles HTTP Digest
|
Flask-DigestAuth supports log out. The user will be prompted for the
|
||||||
Authentication. Example for a unittest testcase:
|
new username and password.
|
||||||
|
|
||||||
|
|
||||||
|
Test Client
|
||||||
|
===========
|
||||||
|
|
||||||
|
Flask-DigestAuth comes with a test client that supports HTTP digest
|
||||||
|
authentication.
|
||||||
|
|
||||||
|
|
||||||
|
A unittest Test Case
|
||||||
|
--------------------
|
||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
|
from flask import Flask
|
||||||
from flask_digest_auth import Client
|
from flask_digest_auth import Client
|
||||||
from flask_testing import TestCase
|
from flask_testing import TestCase
|
||||||
from my_app import create_app
|
from my_app import create_app
|
||||||
@ -371,8 +345,9 @@ Authentication. Example for a unittest testcase:
|
|||||||
|
|
||||||
def create_app(self):
|
def create_app(self):
|
||||||
app: Flask = create_app({
|
app: Flask = create_app({
|
||||||
|
"TESTING": True,
|
||||||
"SECRET_KEY": token_urlsafe(32),
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
"TESTING": True
|
"DIGEST_AUTH_REALM": "admin",
|
||||||
})
|
})
|
||||||
app.test_client_class = Client
|
app.test_client_class = Client
|
||||||
return app
|
return app
|
||||||
@ -381,14 +356,47 @@ Authentication. Example for a unittest testcase:
|
|||||||
response = self.client.get("/admin")
|
response = self.client.get("/admin")
|
||||||
self.assertEqual(response.status_code, 401)
|
self.assertEqual(response.status_code, 401)
|
||||||
response = self.client.get(
|
response = self.client.get(
|
||||||
"/admin", digest_auth=("my_name", "my_pass"))
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
|
|
||||||
|
A pytest Test
|
||||||
|
-------------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
from flask import Flask
|
||||||
|
from flask_digest_auth import Client
|
||||||
|
from my_app import create_app
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def app():
|
||||||
|
app: Flask = create_app({
|
||||||
|
"TESTING": True,
|
||||||
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
|
"DIGEST_AUTH_REALM": "admin",
|
||||||
|
})
|
||||||
|
app.test_client_class = Client
|
||||||
|
yield app
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def client(app):
|
||||||
|
return app.test_client()
|
||||||
|
|
||||||
|
def test_admin(app: Flask, client: Client):
|
||||||
|
with app.app_context():
|
||||||
|
response = client.get("/admin")
|
||||||
|
assert response.status_code == 401
|
||||||
|
response = client.get(
|
||||||
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
|
assert response.status_code == 200
|
||||||
|
|
||||||
|
|
||||||
Copyright
|
Copyright
|
||||||
=========
|
=========
|
||||||
|
|
||||||
Copyright (c) 2022 imacat.
|
Copyright (c) 2022-2023 imacat.
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
you may not use this file except in compliance with the License.
|
you may not use this file except in compliance with the License.
|
||||||
@ -402,9 +410,17 @@ Copyright
|
|||||||
See the License for the specific language governing permissions and
|
See the License for the specific language governing permissions and
|
||||||
limitations under the License.
|
limitations under the License.
|
||||||
|
|
||||||
|
|
||||||
Authors
|
Authors
|
||||||
=======
|
=======
|
||||||
|
|
||||||
| imacat
|
| imacat
|
||||||
| imacat@mail.imacat.idv.tw
|
| imacat@mail.imacat.idv.tw
|
||||||
| 2022/11/23
|
| 2022/11/23
|
||||||
|
|
||||||
|
.. _HTTP Digest Authentication: https://en.wikipedia.org/wiki/Digest_access_authentication
|
||||||
|
.. _RFC 2617: https://www.rfc-editor.org/rfc/rfc2617
|
||||||
|
.. _Flask: https://flask.palletsprojects.com
|
||||||
|
.. _Flask-DigestAuth GitHub repository: https://github.com/imacat/flask-digestauth
|
||||||
|
.. _Flask-DigestAuth readthedocs documentation: https://flask-digestauth.readthedocs.io
|
||||||
|
.. _Flask-Login: https://flask-login.readthedocs.io
|
||||||
|
20
docs/Makefile
Normal file
20
docs/Makefile
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
# Minimal makefile for Sphinx documentation
|
||||||
|
#
|
||||||
|
|
||||||
|
# You can set these variables from the command line, and also
|
||||||
|
# from the environment for the first two.
|
||||||
|
SPHINXOPTS ?=
|
||||||
|
SPHINXBUILD ?= sphinx-build
|
||||||
|
SOURCEDIR = source
|
||||||
|
BUILDDIR = build
|
||||||
|
|
||||||
|
# Put it first so that "make" without argument is like "make help".
|
||||||
|
help:
|
||||||
|
@$(SPHINXBUILD) -M help "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O)
|
||||||
|
|
||||||
|
.PHONY: help Makefile
|
||||||
|
|
||||||
|
# Catch-all target: route all unknown targets to Sphinx using the new
|
||||||
|
# "make mode" option. $(O) is meant as a shortcut for $(SPHINXOPTS).
|
||||||
|
%: Makefile
|
||||||
|
@$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)" $(SPHINXOPTS) $(O)
|
35
docs/make.bat
Normal file
35
docs/make.bat
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
@ECHO OFF
|
||||||
|
|
||||||
|
pushd %~dp0
|
||||||
|
|
||||||
|
REM Command file for Sphinx documentation
|
||||||
|
|
||||||
|
if "%SPHINXBUILD%" == "" (
|
||||||
|
set SPHINXBUILD=sphinx-build
|
||||||
|
)
|
||||||
|
set SOURCEDIR=source
|
||||||
|
set BUILDDIR=build
|
||||||
|
|
||||||
|
%SPHINXBUILD% >NUL 2>NUL
|
||||||
|
if errorlevel 9009 (
|
||||||
|
echo.
|
||||||
|
echo.The 'sphinx-build' command was not found. Make sure you have Sphinx
|
||||||
|
echo.installed, then set the SPHINXBUILD environment variable to point
|
||||||
|
echo.to the full path of the 'sphinx-build' executable. Alternatively you
|
||||||
|
echo.may add the Sphinx directory to PATH.
|
||||||
|
echo.
|
||||||
|
echo.If you don't have Sphinx installed, grab it from
|
||||||
|
echo.https://www.sphinx-doc.org/
|
||||||
|
exit /b 1
|
||||||
|
)
|
||||||
|
|
||||||
|
if "%1" == "" goto help
|
||||||
|
|
||||||
|
%SPHINXBUILD% -M %1 %SOURCEDIR% %BUILDDIR% %SPHINXOPTS% %O%
|
||||||
|
goto end
|
||||||
|
|
||||||
|
:help
|
||||||
|
%SPHINXBUILD% -M help %SOURCEDIR% %BUILDDIR% %SPHINXOPTS% %O%
|
||||||
|
|
||||||
|
:end
|
||||||
|
popd
|
1
docs/requirements.txt
Normal file
1
docs/requirements.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
flask
|
0
docs/source/_static/.keep
Normal file
0
docs/source/_static/.keep
Normal file
0
docs/source/_templates/.keep
Normal file
0
docs/source/_templates/.keep
Normal file
32
docs/source/conf.py
Normal file
32
docs/source/conf.py
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# Configuration file for the Sphinx documentation builder.
|
||||||
|
#
|
||||||
|
# For the full list of built-in configuration values, see the documentation:
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
sys.path.insert(0, os.path.abspath('../../src/'))
|
||||||
|
|
||||||
|
# -- Project information -----------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#project-information
|
||||||
|
|
||||||
|
project = 'Flask-DigestAuth'
|
||||||
|
copyright = '2022-2023, imacat'
|
||||||
|
author = 'imacat'
|
||||||
|
release = '0.5.0'
|
||||||
|
|
||||||
|
# -- General configuration ---------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#general-configuration
|
||||||
|
|
||||||
|
extensions = ["sphinx.ext.autodoc"]
|
||||||
|
|
||||||
|
templates_path = ['_templates']
|
||||||
|
exclude_patterns = []
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# -- Options for HTML output -------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#options-for-html-output
|
||||||
|
|
||||||
|
html_theme = 'sphinx_rtd_theme'
|
||||||
|
html_static_path = ['_static']
|
268
docs/source/examples.rst
Normal file
268
docs/source/examples.rst
Normal file
@ -0,0 +1,268 @@
|
|||||||
|
Examples
|
||||||
|
========
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-alone-simple:
|
||||||
|
|
||||||
|
Simple Applications with Flask-DigestAuth Alone
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
In your ``my_app.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask import Flask, request, redirect
|
||||||
|
from flask_digest_auth import DigestAuth
|
||||||
|
|
||||||
|
app: flask = Flask(__name__)
|
||||||
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
|
auth: DigestAuth = DigestAuth()
|
||||||
|
auth.init_app(app)
|
||||||
|
|
||||||
|
@auth.register_get_password
|
||||||
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
|
... (Load the password hash) ...
|
||||||
|
|
||||||
|
@auth.register_get_user
|
||||||
|
def get_user(username: str) -> t.Optional[t.Any]:
|
||||||
|
... (Load the user) ...
|
||||||
|
|
||||||
|
@app.get("/admin")
|
||||||
|
@auth.login_required
|
||||||
|
def admin():
|
||||||
|
return f"Hello, {g.user.username}!"
|
||||||
|
|
||||||
|
@app.post("/logout")
|
||||||
|
@auth.login_required
|
||||||
|
def logout():
|
||||||
|
auth.logout()
|
||||||
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-alone-large:
|
||||||
|
|
||||||
|
Larger Applications with ``create_app()`` with Flask-DigestAuth Alone
|
||||||
|
---------------------------------------------------------------------
|
||||||
|
|
||||||
|
In your ``my_app/__init__.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask import Flask
|
||||||
|
from flask_digest_auth import DigestAuth
|
||||||
|
|
||||||
|
auth: DigestAuth = DigestAuth()
|
||||||
|
|
||||||
|
def create_app(test_config = None) -> Flask:
|
||||||
|
app: flask = Flask(__name__)
|
||||||
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
|
auth.init_app(app)
|
||||||
|
|
||||||
|
@auth.register_get_password
|
||||||
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
|
... (Load the password hash) ...
|
||||||
|
|
||||||
|
@auth.register_get_user
|
||||||
|
def get_user(username: str) -> t.Optional[t.Any]:
|
||||||
|
... (Load the user) ...
|
||||||
|
|
||||||
|
return app
|
||||||
|
|
||||||
|
In your ``my_app/views.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from my_app import auth
|
||||||
|
from flask import Flask, Blueprint, request, redirect
|
||||||
|
|
||||||
|
bp = Blueprint("admin", __name__, url_prefix="/admin")
|
||||||
|
|
||||||
|
@bp.get("/admin")
|
||||||
|
@auth.login_required
|
||||||
|
def admin():
|
||||||
|
return f"Hello, {g.user.username}!"
|
||||||
|
|
||||||
|
@app.post("/logout")
|
||||||
|
@auth.login_required
|
||||||
|
def logout():
|
||||||
|
auth.logout()
|
||||||
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
def init_app(app: Flask) -> None:
|
||||||
|
app.register_blueprint(bp)
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-flask-login-simple:
|
||||||
|
|
||||||
|
Simple Applications with Flask-Login Integration
|
||||||
|
------------------------------------------------
|
||||||
|
|
||||||
|
In your ``my_app.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
import flask_login
|
||||||
|
from flask import Flask, request, redirect
|
||||||
|
from flask_digest_auth import DigestAuth
|
||||||
|
|
||||||
|
app: flask = Flask(__name__)
|
||||||
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
|
login_manager: flask_login.LoginManager = flask_login.LoginManager()
|
||||||
|
login_manager.init_app(app)
|
||||||
|
|
||||||
|
@login_manager.user_loader
|
||||||
|
def load_user(user_id: str) -> t.Optional[User]:
|
||||||
|
... (Load the user with the username) ...
|
||||||
|
|
||||||
|
auth: DigestAuth = DigestAuth()
|
||||||
|
auth.init_app(app)
|
||||||
|
|
||||||
|
@auth.register_get_password
|
||||||
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
|
... (Load the password hash) ...
|
||||||
|
|
||||||
|
@app.get("/admin")
|
||||||
|
@flask_login.login_required
|
||||||
|
def admin():
|
||||||
|
return f"Hello, {flask_login.current_user.get_id()}!"
|
||||||
|
|
||||||
|
@app.post("/logout")
|
||||||
|
@flask_login.login_required
|
||||||
|
def logout():
|
||||||
|
auth.logout()
|
||||||
|
# Do not call flask_login.logout_user()
|
||||||
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-flask-login-large:
|
||||||
|
|
||||||
|
Larger Applications with ``create_app()`` with Flask-Login Integration
|
||||||
|
----------------------------------------------------------------------
|
||||||
|
|
||||||
|
In your ``my_app/__init__.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask import Flask
|
||||||
|
from flask_digest_auth import DigestAuth
|
||||||
|
from flask_login import LoginManager
|
||||||
|
|
||||||
|
auth: DigestAuth = DigestAuth()
|
||||||
|
|
||||||
|
def create_app(test_config = None) -> Flask:
|
||||||
|
app: flask = Flask(__name__)
|
||||||
|
... (Configure the Flask application) ...
|
||||||
|
|
||||||
|
login_manager: LoginManager = LoginManager()
|
||||||
|
login_manager.init_app(app)
|
||||||
|
|
||||||
|
@login_manager.user_loader
|
||||||
|
def load_user(user_id: str) -> t.Optional[User]:
|
||||||
|
... (Load the user with the username) ...
|
||||||
|
|
||||||
|
auth.init_app(app)
|
||||||
|
|
||||||
|
@auth.register_get_password
|
||||||
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
|
... (Load the password hash) ...
|
||||||
|
|
||||||
|
return app
|
||||||
|
|
||||||
|
In your ``my_app/views.py``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
import flask_login
|
||||||
|
from flask import Flask, Blueprint, request, redirect
|
||||||
|
from my_app import auth
|
||||||
|
|
||||||
|
bp = Blueprint("admin", __name__, url_prefix="/admin")
|
||||||
|
|
||||||
|
@bp.get("/admin")
|
||||||
|
@flask_login.login_required
|
||||||
|
def admin():
|
||||||
|
return f"Hello, {flask_login.current_user.get_id()}!"
|
||||||
|
|
||||||
|
@app.post("/logout")
|
||||||
|
@flask_login.login_required
|
||||||
|
def logout():
|
||||||
|
auth.logout()
|
||||||
|
# Do not call flask_login.logout_user()
|
||||||
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
|
def init_app(app: Flask) -> None:
|
||||||
|
app.register_blueprint(bp)
|
||||||
|
|
||||||
|
The views only depend on Flask-Login, but not the actual
|
||||||
|
authentication mechanism. You can change the actual authentication
|
||||||
|
mechanism without changing the views.
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-unittest:
|
||||||
|
|
||||||
|
A unittest Test Case
|
||||||
|
--------------------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask import Flask
|
||||||
|
from flask_digest_auth import Client
|
||||||
|
from flask_testing import TestCase
|
||||||
|
from my_app import create_app
|
||||||
|
|
||||||
|
class MyTestCase(TestCase):
|
||||||
|
|
||||||
|
def create_app(self):
|
||||||
|
app: Flask = create_app({
|
||||||
|
"TESTING": True,
|
||||||
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
|
"DIGEST_AUTH_REALM": "admin",
|
||||||
|
})
|
||||||
|
app.test_client_class = Client
|
||||||
|
return app
|
||||||
|
|
||||||
|
def test_admin(self):
|
||||||
|
response = self.client.get("/admin")
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
response = self.client.get(
|
||||||
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
.. _example-pytest:
|
||||||
|
|
||||||
|
A pytest Test
|
||||||
|
-------------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
import pytest
|
||||||
|
from flask import Flask
|
||||||
|
from flask_digest_auth import Client
|
||||||
|
from my_app import create_app
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def app():
|
||||||
|
app: Flask = create_app({
|
||||||
|
"TESTING": True,
|
||||||
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
|
"DIGEST_AUTH_REALM": "admin",
|
||||||
|
})
|
||||||
|
app.test_client_class = Client
|
||||||
|
yield app
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def client(app):
|
||||||
|
return app.test_client()
|
||||||
|
|
||||||
|
def test_admin(app: Flask, client: Client):
|
||||||
|
with app.app_context():
|
||||||
|
response = client.get("/admin")
|
||||||
|
assert response.status_code == 401
|
||||||
|
response = client.get(
|
||||||
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
|
assert response.status_code == 200
|
37
docs/source/flask_digest_auth.rst
Normal file
37
docs/source/flask_digest_auth.rst
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
flask\_digest\_auth package
|
||||||
|
===========================
|
||||||
|
|
||||||
|
Submodules
|
||||||
|
----------
|
||||||
|
|
||||||
|
flask\_digest\_auth.algo module
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
.. automodule:: flask_digest_auth.algo
|
||||||
|
:members:
|
||||||
|
:undoc-members:
|
||||||
|
:show-inheritance:
|
||||||
|
|
||||||
|
flask\_digest\_auth.auth module
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
.. automodule:: flask_digest_auth.auth
|
||||||
|
:members:
|
||||||
|
:undoc-members:
|
||||||
|
:show-inheritance:
|
||||||
|
|
||||||
|
flask\_digest\_auth.test module
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
.. automodule:: flask_digest_auth.test
|
||||||
|
:members:
|
||||||
|
:undoc-members:
|
||||||
|
:show-inheritance:
|
||||||
|
|
||||||
|
Module contents
|
||||||
|
---------------
|
||||||
|
|
||||||
|
.. automodule:: flask_digest_auth
|
||||||
|
:members:
|
||||||
|
:undoc-members:
|
||||||
|
:show-inheritance:
|
34
docs/source/index.rst
Normal file
34
docs/source/index.rst
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
.. Flask-DigestAuth documentation master file, created by
|
||||||
|
sphinx-quickstart on Wed Dec 7 09:40:48 2022.
|
||||||
|
You can adapt this file completely to your liking, but it should at least
|
||||||
|
contain the root `toctree` directive.
|
||||||
|
|
||||||
|
Welcome to Flask-DigestAuth's documentation!
|
||||||
|
============================================
|
||||||
|
|
||||||
|
*Flask-DigestAuth* is an `HTTP Digest Authentication`_ implementation
|
||||||
|
for Flask_ applications. It authenticates the user for the protected
|
||||||
|
views.
|
||||||
|
|
||||||
|
HTTP Digest Authentication is specified in `RFC 2617`_.
|
||||||
|
|
||||||
|
.. toctree::
|
||||||
|
:maxdepth: 2
|
||||||
|
:caption: Contents:
|
||||||
|
|
||||||
|
intro
|
||||||
|
flask_digest_auth
|
||||||
|
examples
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Indices and tables
|
||||||
|
==================
|
||||||
|
|
||||||
|
* :ref:`genindex`
|
||||||
|
* :ref:`modindex`
|
||||||
|
* :ref:`search`
|
||||||
|
|
||||||
|
.. _HTTP Digest Authentication: https://en.wikipedia.org/wiki/Digest_access_authentication
|
||||||
|
.. _RFC 2617: https://www.rfc-editor.org/rfc/rfc2617
|
||||||
|
.. _Flask: https://flask.palletsprojects.com
|
155
docs/source/intro.rst
Normal file
155
docs/source/intro.rst
Normal file
@ -0,0 +1,155 @@
|
|||||||
|
Introduction
|
||||||
|
============
|
||||||
|
|
||||||
|
|
||||||
|
*Flask-DigestAuth* is an `HTTP Digest Authentication`_ implementation
|
||||||
|
for Flask_ applications. It authenticates the user for the protected
|
||||||
|
views.
|
||||||
|
|
||||||
|
HTTP Digest Authentication is specified in `RFC 2617`_.
|
||||||
|
|
||||||
|
|
||||||
|
Why HTTP Digest Authentication?
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
*HTTP Digest Authentication* has the advantage that it does not send
|
||||||
|
the actual password to the server, which greatly enhances the
|
||||||
|
security. It uses the challenge-response authentication scheme. The
|
||||||
|
client returns the response calculated from the challenge and the
|
||||||
|
password, but not the original password.
|
||||||
|
|
||||||
|
Log in forms has the advantage of freedom, in the senses of both the
|
||||||
|
visual design and the actual implementation. You may implement your
|
||||||
|
own challenge-response log in form, but then you are reinventing the
|
||||||
|
wheels. If a pretty log in form is not critical to your project, HTTP
|
||||||
|
Digest Authentication should be a good choice.
|
||||||
|
|
||||||
|
Flask-DigestAuth works with Flask-Login_. Log in protection can be
|
||||||
|
separated with the authentication mechanism. You can create protected
|
||||||
|
Flask modules without knowing the actual authentication mechanisms.
|
||||||
|
|
||||||
|
|
||||||
|
Installation
|
||||||
|
------------
|
||||||
|
|
||||||
|
You can install Flask-DigestAuth with ``pip``:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
pip install Flask-DigestAuth
|
||||||
|
|
||||||
|
You may also install the latest source from the
|
||||||
|
`Flask-DigestAuth GitHub repository`_.
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
pip install git+https://github.com/imacat/flask-digestauth.git
|
||||||
|
|
||||||
|
|
||||||
|
Configuration
|
||||||
|
-------------
|
||||||
|
|
||||||
|
Flask-DigestAuth takes the configuration ``DIGEST_AUTH_REALM`` as the
|
||||||
|
realm. The default realm is ``Login Required``.
|
||||||
|
|
||||||
|
|
||||||
|
Setting the Password
|
||||||
|
--------------------
|
||||||
|
|
||||||
|
The password hash of the HTTP Digest Authentication is composed of the
|
||||||
|
realm, the username, and the password. Example for setting the
|
||||||
|
password:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
from flask_digest_auth import make_password_hash
|
||||||
|
|
||||||
|
user.password = make_password_hash(realm, username, password)
|
||||||
|
|
||||||
|
The username is part of the hash. If the user changes their username,
|
||||||
|
you need to ask their password, to generate and store the new password
|
||||||
|
hash.
|
||||||
|
|
||||||
|
See :func:`flask_digest_auth.algo.make_password_hash`.
|
||||||
|
|
||||||
|
|
||||||
|
Flask-DigestAuth Alone
|
||||||
|
----------------------
|
||||||
|
|
||||||
|
Flask-DigestAuth can authenticate the users alone.
|
||||||
|
|
||||||
|
See :ref:`example-alone-simple` and :ref:`example-alone-large`.
|
||||||
|
|
||||||
|
|
||||||
|
Flask-Login Integration
|
||||||
|
-----------------------
|
||||||
|
|
||||||
|
Flask-DigestAuth works with Flask-Login_. You can write a Flask
|
||||||
|
module that requires log in, without specifying how to log in. The
|
||||||
|
application can use either HTTP Digest Authentication, or the log in
|
||||||
|
forms, as needed.
|
||||||
|
|
||||||
|
To use Flask-Login with Flask-DigestAuth,
|
||||||
|
``login_manager.init_app(app)`` must be called before
|
||||||
|
``auth.init_app(app)``.
|
||||||
|
|
||||||
|
The currently logged-in user can be retrieved at
|
||||||
|
``flask_login.current_user``, if any.
|
||||||
|
|
||||||
|
See :ref:`example-flask-login-simple` and
|
||||||
|
:ref:`example-flask-login-large`.
|
||||||
|
|
||||||
|
The views only depend on Flask-Login, but not the Flask-DigestAuth.
|
||||||
|
You can change the actual authentication mechanism without changing
|
||||||
|
the views.
|
||||||
|
|
||||||
|
|
||||||
|
Session Integration
|
||||||
|
-------------------
|
||||||
|
|
||||||
|
Flask-DigestAuth features session integration. The user log in
|
||||||
|
is remembered in the session. The authentication information is not
|
||||||
|
requested again. This is different to the practice of the HTTP Digest
|
||||||
|
Authentication, but is convenient for the log in accounting.
|
||||||
|
|
||||||
|
|
||||||
|
Log In Bookkeeping
|
||||||
|
------------------
|
||||||
|
|
||||||
|
You can register a callback to run when the user logs in, for ex.,
|
||||||
|
logging the log in event, adding the log in counter, etc.
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@auth.register_on_login
|
||||||
|
def on_login(user: User) -> None:
|
||||||
|
user.visits = user.visits + 1
|
||||||
|
|
||||||
|
See :meth:`flask_digest_auth.auth.DigestAuth.register_on_login`.
|
||||||
|
|
||||||
|
|
||||||
|
Log Out
|
||||||
|
-------
|
||||||
|
|
||||||
|
Flask-DigestAuth supports log out. The user will be prompted for the
|
||||||
|
new username and password.
|
||||||
|
|
||||||
|
See :meth:`flask_digest_auth.auth.DigestAuth.logout`.
|
||||||
|
|
||||||
|
|
||||||
|
Test Client
|
||||||
|
-----------
|
||||||
|
|
||||||
|
Flask-DigestAuth comes with a test client that supports HTTP digest
|
||||||
|
authentication.
|
||||||
|
|
||||||
|
See :class:`flask_digest_auth.test.Client`.
|
||||||
|
|
||||||
|
Also see :ref:`example-unittest` and :ref:`example-pytest`.
|
||||||
|
|
||||||
|
|
||||||
|
.. _HTTP Digest Authentication: https://en.wikipedia.org/wiki/Digest_access_authentication
|
||||||
|
.. _RFC 2617: https://www.rfc-editor.org/rfc/rfc2617
|
||||||
|
.. _Flask: https://flask.palletsprojects.com
|
||||||
|
.. _Flask-Login: https://flask-login.readthedocs.io
|
||||||
|
.. _Flask-DigestAuth GitHub repository: https://github.com/imacat/flask-digestauth
|
7
docs/source/modules.rst
Normal file
7
docs/source/modules.rst
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
src
|
||||||
|
===
|
||||||
|
|
||||||
|
.. toctree::
|
||||||
|
:maxdepth: 4
|
||||||
|
|
||||||
|
flask_digest_auth
|
10
setup.cfg
10
setup.cfg
@ -1,7 +1,7 @@
|
|||||||
# The Flask HTTP Digest Authentication Project.
|
# The Flask HTTP Digest Authentication Project.
|
||||||
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/11/23
|
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/11/23
|
||||||
|
|
||||||
# Copyright (c) 2022 imacat.
|
# Copyright (c) 2022-2023 imacat.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -16,16 +16,16 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
[metadata]
|
[metadata]
|
||||||
name = flask-digest-auth
|
name = Flask-DigestAuth
|
||||||
version = 0.2.0
|
version = 0.5.0
|
||||||
author = imacat
|
author = imacat
|
||||||
author_email = imacat@mail.imacat.idv.tw
|
author_email = imacat@mail.imacat.idv.tw
|
||||||
description = The Flask HTTP Digest Authentication project.
|
description = The Flask HTTP Digest Authentication project.
|
||||||
long_description = file: README.rst
|
long_description = file: README.rst
|
||||||
long_description_content_type = text/x-rst
|
long_description_content_type = text/x-rst
|
||||||
url = https://github.com/imacat/flask-digest-auth
|
url = https://github.com/imacat/flask-digestauth
|
||||||
project_urls =
|
project_urls =
|
||||||
Bug Tracker = https://github.com/imacat/flask-digest-auth/issues
|
Bug Tracker = https://github.com/imacat/flask-digestauth/issues
|
||||||
classifiers =
|
classifiers =
|
||||||
Programming Language :: Python :: 3
|
Programming Language :: Python :: 3
|
||||||
License :: OSI Approved :: Apache Software License
|
License :: OSI Approved :: Apache Software License
|
||||||
|
@ -23,11 +23,16 @@ from __future__ import annotations
|
|||||||
import typing as t
|
import typing as t
|
||||||
from hashlib import md5
|
from hashlib import md5
|
||||||
|
|
||||||
from flask_digest_auth.exception import UnauthorizedException
|
|
||||||
|
|
||||||
|
|
||||||
def make_password_hash(realm: str, username: str, password: str) -> str:
|
def make_password_hash(realm: str, username: str, password: str) -> str:
|
||||||
"""Calculates the password hash for the HTTP digest authentication.
|
"""Calculates the password hash for the HTTP digest authentication.
|
||||||
|
Use this function to set the password for the user.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
user.password = make_password_hash(realm, username, password)
|
||||||
|
|
||||||
:param realm: The realm.
|
:param realm: The realm.
|
||||||
:param username: The username.
|
:param username: The username.
|
||||||
@ -49,67 +54,53 @@ def calc_response(
|
|||||||
:param uri: The request URI.
|
:param uri: The request URI.
|
||||||
:param password_hash: The password hash for the HTTP digest authentication.
|
:param password_hash: The password hash for the HTTP digest authentication.
|
||||||
:param nonce: The nonce.
|
:param nonce: The nonce.
|
||||||
:param qop: the quality of protection.
|
:param qop: The quality of protection, either ``auth`` or ``auth-int``.
|
||||||
:param algorithm: The algorithm, either "MD5" or "MD5-sess".
|
:param algorithm: The algorithm, either ``MD5`` or ``MD5-sess``.
|
||||||
:param cnonce: The client nonce, which must exists when qop exists or
|
:param cnonce: The client nonce, which must exists when qop exists or
|
||||||
algorithm="MD5-sess".
|
algorithm is ``MD5-sess``.
|
||||||
:param nc: The request counter, which must exists when qop exists.
|
:param nc: The request counter, which must exists when qop exists.
|
||||||
:param body: The request body, which must exists when qop="auth-int".
|
:param body: The request body, which must exists when qop is ``auth-int``.
|
||||||
:return: The response value.
|
:return: The response value.
|
||||||
:raise UnauthorizedException: When the cnonce is missing with the MD5-sess
|
:raise AssertionError: When cnonce is missing with algorithm is
|
||||||
algorithm, when the body is missing with the auth-int qop, or when the
|
``MD5-sess``, when body is missing with qop is ``auth-int``, or when
|
||||||
cnonce or nc is missing with the auth or auth-int qop.
|
cnonce or nc is missing with qop exits.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def calc_ha1() -> str:
|
def calc_ha1() -> str:
|
||||||
"""Calculates and returns the first hash.
|
"""Calculates and returns the first hash.
|
||||||
|
|
||||||
:return: The first hash.
|
:return: The first hash.
|
||||||
:raise UnauthorizedException: When the cnonce is missing with the MD5-sess
|
:raise AssertionError: When cnonce is missing with
|
||||||
algorithm.
|
algorithm is ``MD5-sess``.
|
||||||
"""
|
"""
|
||||||
if algorithm is None or algorithm == "MD5":
|
|
||||||
return password_hash
|
|
||||||
if algorithm == "MD5-sess":
|
if algorithm == "MD5-sess":
|
||||||
if cnonce is None:
|
assert cnonce is not None,\
|
||||||
raise UnauthorizedException(
|
f"Missing \"cnonce\" with algorithm=\"{algorithm}\""
|
||||||
f"Missing \"cnonce\" with algorithm=\"{algorithm}\"")
|
|
||||||
return md5(f"{password_hash}:{nonce}:{cnonce}".encode("utf8")) \
|
return md5(f"{password_hash}:{nonce}:{cnonce}".encode("utf8")) \
|
||||||
.hexdigest()
|
.hexdigest()
|
||||||
raise UnauthorizedException(
|
# algorithm is None or algorithm == "MD5"
|
||||||
f"Unsupported algorithm=\"{algorithm}\"")
|
return password_hash
|
||||||
|
|
||||||
def calc_ha2() -> str:
|
def calc_ha2() -> str:
|
||||||
"""Calculates the second hash.
|
"""Calculates the second hash.
|
||||||
|
|
||||||
:return: The second hash.
|
:return: The second hash.
|
||||||
:raise UnauthorizedException: When the body is missing with
|
:raise AssertionError: When body is missing with qop is ``auth-int``.
|
||||||
qop="auth-int".
|
|
||||||
"""
|
"""
|
||||||
if qop is None or qop == "auth":
|
|
||||||
return md5(f"{method}:{uri}".encode("utf8")).hexdigest()
|
|
||||||
if qop == "auth-int":
|
if qop == "auth-int":
|
||||||
if body is None:
|
assert body is not None, f"Missing \"body\" with qop=\"{qop}\""
|
||||||
raise UnauthorizedException(
|
|
||||||
f"Missing \"body\" with qop=\"{qop}\"")
|
|
||||||
return md5(
|
return md5(
|
||||||
f"{method}:{uri}:{md5(body).hexdigest()}".encode("utf8")) \
|
f"{method}:{uri}:{md5(body).hexdigest()}".encode("utf8")) \
|
||||||
.hexdigest()
|
.hexdigest()
|
||||||
raise UnauthorizedException(f"Unsupported qop=\"{qop}\"")
|
# qop is None or qop == "auth"
|
||||||
|
return md5(f"{method}:{uri}".encode("utf8")).hexdigest()
|
||||||
|
|
||||||
ha1: str = calc_ha1()
|
ha1: str = calc_ha1()
|
||||||
ha2: str = calc_ha2()
|
ha2: str = calc_ha2()
|
||||||
if qop is None:
|
|
||||||
return md5(f"{ha1}:{nonce}:{ha2}".encode("utf8")).hexdigest()
|
|
||||||
if qop == "auth" or qop == "auth-int":
|
if qop == "auth" or qop == "auth-int":
|
||||||
if cnonce is None:
|
assert cnonce is not None, f"Missing \"cnonce\" with the qop=\"{qop}\""
|
||||||
raise UnauthorizedException(
|
assert nc is not None, f"Missing \"nc\" with the qop=\"{qop}\""
|
||||||
f"Missing \"cnonce\" with the qop=\"{qop}\"")
|
|
||||||
if nc is None:
|
|
||||||
raise UnauthorizedException(
|
|
||||||
f"Missing \"nc\" with the qop=\"{qop}\"")
|
|
||||||
return md5(f"{ha1}:{nonce}:{nc}:{cnonce}:{qop}:{ha2}".encode("utf8"))\
|
return md5(f"{ha1}:{nonce}:{nc}:{cnonce}:{qop}:{ha2}".encode("utf8"))\
|
||||||
.hexdigest()
|
.hexdigest()
|
||||||
if cnonce is None:
|
# qop is None
|
||||||
raise UnauthorizedException(
|
return md5(f"{ha1}:{nonce}:{ha2}".encode("utf8")).hexdigest()
|
||||||
f"Unsupported qop=\"{qop}\"")
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
# The Flask HTTP Digest Authentication Project.
|
# The Flask HTTP Digest Authentication Project.
|
||||||
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/10/22
|
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/10/22
|
||||||
|
|
||||||
# Copyright (c) 2022 imacat.
|
# Copyright (c) 2022-2023 imacat.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -16,67 +16,23 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
"""The HTTP Digest Authentication.
|
"""The HTTP Digest Authentication.
|
||||||
See RFC 2617 HTTP Authentication: Basic and Digest Access Authentication
|
See `RFC 2617`_ HTTP Authentication: Basic and Digest Access Authentication
|
||||||
|
|
||||||
|
.. _RFC 2617: https://www.rfc-editor.org/rfc/rfc2617
|
||||||
"""
|
"""
|
||||||
from __future__ import annotations
|
from __future__ import annotations
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
import typing as t
|
import typing as t
|
||||||
from functools import wraps
|
from functools import wraps
|
||||||
from random import random
|
from secrets import token_urlsafe, randbits
|
||||||
from secrets import token_urlsafe
|
|
||||||
|
|
||||||
from flask import g, request, Response, session, abort, Flask, Request
|
from flask import g, request, Response, session, abort, Flask, Request, \
|
||||||
|
current_app
|
||||||
from itsdangerous import URLSafeTimedSerializer, BadData
|
from itsdangerous import URLSafeTimedSerializer, BadData
|
||||||
from werkzeug.datastructures import Authorization
|
from werkzeug.datastructures import Authorization
|
||||||
|
|
||||||
from flask_digest_auth.algo import calc_response
|
from flask_digest_auth.algo import calc_response
|
||||||
from flask_digest_auth.exception import UnauthorizedException
|
|
||||||
|
|
||||||
|
|
||||||
class BasePasswordHashGetter:
|
|
||||||
"""The base password hash getter."""
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def __call__(username: str) -> t.Optional[str]:
|
|
||||||
"""Returns the password hash of a user.
|
|
||||||
|
|
||||||
:param username: The username.
|
|
||||||
:return: The password hash, or None if the user does not exist.
|
|
||||||
:raise UnboundLocalError: When the password hash getter function is
|
|
||||||
not registered yet.
|
|
||||||
"""
|
|
||||||
raise UnboundLocalError("The function to return the password hash"
|
|
||||||
" was not registered yet.")
|
|
||||||
|
|
||||||
|
|
||||||
class BaseUserGetter:
|
|
||||||
"""The base user getter."""
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def __call__(username: str) -> t.Optional[t.Any]:
|
|
||||||
"""Returns a user.
|
|
||||||
|
|
||||||
:param username: The username.
|
|
||||||
:return: The user, or None if the user does not exist.
|
|
||||||
:raise UnboundLocalError: When the user getter function is not
|
|
||||||
registered yet.
|
|
||||||
"""
|
|
||||||
raise UnboundLocalError("The function to return the user"
|
|
||||||
" was not registered yet.")
|
|
||||||
|
|
||||||
|
|
||||||
class BaseOnLogInCallback:
|
|
||||||
"""The base callback when the user logs in."""
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def __call__(user: t.Any) -> None:
|
|
||||||
"""Runs the callback when the user logs in.
|
|
||||||
|
|
||||||
:param user: The logged-in user.
|
|
||||||
:return: None.
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class DigestAuth:
|
class DigestAuth:
|
||||||
@ -87,30 +43,83 @@ class DigestAuth:
|
|||||||
|
|
||||||
:param realm: The realm.
|
:param realm: The realm.
|
||||||
"""
|
"""
|
||||||
self.secret_key: str = token_urlsafe(32)
|
self.__serializer: URLSafeTimedSerializer \
|
||||||
self.serializer: URLSafeTimedSerializer \
|
= URLSafeTimedSerializer(token_urlsafe(32))
|
||||||
= URLSafeTimedSerializer(self.secret_key)
|
"""The serializer to generate and validate the nonce and opaque."""
|
||||||
self.realm: str = "" if realm is None else realm
|
self.realm: str = "Login Required" if realm is None else realm
|
||||||
self.algorithm: t.Optional[str] = None
|
"""The realm. Default is "Login Required"."""
|
||||||
|
self.algorithm: t.Optional[t.Literal["MD5", "MD5-sess"]] = None
|
||||||
|
"""The algorithm, either None, ``MD5``, or ``MD5-sess``. Default is
|
||||||
|
None."""
|
||||||
self.use_opaque: bool = True
|
self.use_opaque: bool = True
|
||||||
self.domain: t.List[str] = []
|
"""Whether to use an opaque. Default is True."""
|
||||||
self.qop: t.List[str] = ["auth", "auth-int"]
|
self.__domain: t.List[str] = []
|
||||||
self.app: t.Optional[Flask] = None
|
"""A list of directories that this username and password applies to.
|
||||||
|
Default is empty."""
|
||||||
|
self.__qop: t.List[t.Literal["auth", "auth-int"]] \
|
||||||
|
= ["auth", "auth-int"]
|
||||||
|
"""A list of supported quality of protection supported, either
|
||||||
|
``qop``, ``auth-int``, both, or empty. Default is both."""
|
||||||
self.__get_password_hash: BasePasswordHashGetter \
|
self.__get_password_hash: BasePasswordHashGetter \
|
||||||
= BasePasswordHashGetter()
|
= BasePasswordHashGetter()
|
||||||
|
"""The callback to return the password hash."""
|
||||||
self.__get_user: BaseUserGetter = BaseUserGetter()
|
self.__get_user: BaseUserGetter = BaseUserGetter()
|
||||||
|
"""The callback to return the user."""
|
||||||
self.__on_login: BaseOnLogInCallback = BaseOnLogInCallback()
|
self.__on_login: BaseOnLogInCallback = BaseOnLogInCallback()
|
||||||
|
"""The callback to run when the user logs in."""
|
||||||
|
|
||||||
def login_required(self, view) -> t.Callable:
|
def login_required(self, view) -> t.Callable:
|
||||||
"""The view decorator for HTTP digest authentication.
|
"""The view decorator for the HTTP digest authentication.
|
||||||
|
|
||||||
:param view:
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@app.get("/admin")
|
||||||
|
@auth.login_required
|
||||||
|
def admin():
|
||||||
|
return f"Hello, {g.user.username}!"
|
||||||
|
|
||||||
|
The logged-in user can be retrieved at ``g.user``.
|
||||||
|
|
||||||
|
:param view: The view.
|
||||||
:return: The login-protected view.
|
:return: The login-protected view.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
class NoLogInException(Exception):
|
class NoLogInException(Exception):
|
||||||
"""The exception thrown when the user is not authorized."""
|
"""The exception thrown when the user is not authorized."""
|
||||||
|
|
||||||
|
def get_logged_in_user() -> t.Any:
|
||||||
|
"""Returns the currently logged-in user.
|
||||||
|
|
||||||
|
:return: The currently logged-in user.
|
||||||
|
:raise NoLogInException: When the user is not logged in.
|
||||||
|
"""
|
||||||
|
if "user" not in session:
|
||||||
|
raise NoLogInException
|
||||||
|
user: t.Optional[t.Any] = self.__get_user(session["user"])
|
||||||
|
if user is None:
|
||||||
|
del session["user"]
|
||||||
|
raise NoLogInException
|
||||||
|
return user
|
||||||
|
|
||||||
|
def auth_user(state: AuthState) -> t.Any:
|
||||||
|
"""Authenticates a user.
|
||||||
|
|
||||||
|
:param state: The authentication state.
|
||||||
|
:return: The user.
|
||||||
|
:raise UnauthorizedException: When the authentication fails.
|
||||||
|
"""
|
||||||
|
authorization: Authorization = request.authorization
|
||||||
|
if authorization is None:
|
||||||
|
raise UnauthorizedException
|
||||||
|
if authorization.type != "digest":
|
||||||
|
raise UnauthorizedException(
|
||||||
|
"Not an HTTP digest authorization")
|
||||||
|
self.__authenticate(state)
|
||||||
|
session["user"] = authorization.username
|
||||||
|
return self.__get_user(authorization.username)
|
||||||
|
|
||||||
@wraps(view)
|
@wraps(view)
|
||||||
def login_required_view(*args, **kwargs) -> t.Any:
|
def login_required_view(*args, **kwargs) -> t.Any:
|
||||||
"""The login-protected view.
|
"""The login-protected view.
|
||||||
@ -120,27 +129,15 @@ class DigestAuth:
|
|||||||
:return: The response.
|
:return: The response.
|
||||||
"""
|
"""
|
||||||
try:
|
try:
|
||||||
if "user" not in session:
|
g.user = get_logged_in_user()
|
||||||
raise NoLogInException
|
|
||||||
user: t.Optional[t.Any] = self.__get_user(session["user"])
|
|
||||||
if user is None:
|
|
||||||
raise NoLogInException
|
|
||||||
g.user = user
|
|
||||||
return view(*args, **kwargs)
|
return view(*args, **kwargs)
|
||||||
except NoLogInException:
|
except NoLogInException:
|
||||||
|
pass
|
||||||
|
|
||||||
state: AuthState = AuthState()
|
state: AuthState = AuthState()
|
||||||
authorization: Authorization = request.authorization
|
|
||||||
try:
|
try:
|
||||||
if authorization is None:
|
g.user = auth_user(state)
|
||||||
raise UnauthorizedException
|
self.__on_login(g.user)
|
||||||
if authorization.type != "digest":
|
|
||||||
raise UnauthorizedException(
|
|
||||||
"Not an HTTP digest authorization")
|
|
||||||
self.authenticate(state)
|
|
||||||
session["user"] = authorization.username
|
|
||||||
user = self.__get_user(authorization.username)
|
|
||||||
g.user = user
|
|
||||||
self.__on_login(user)
|
|
||||||
return view(*args, **kwargs)
|
return view(*args, **kwargs)
|
||||||
except UnauthorizedException as e:
|
except UnauthorizedException as e:
|
||||||
if len(e.args) > 0:
|
if len(e.args) > 0:
|
||||||
@ -148,12 +145,12 @@ class DigestAuth:
|
|||||||
response: Response = Response()
|
response: Response = Response()
|
||||||
response.status = 401
|
response.status = 401
|
||||||
response.headers["WWW-Authenticate"] \
|
response.headers["WWW-Authenticate"] \
|
||||||
= self.make_response_header(state)
|
= self.__make_response_header(state)
|
||||||
abort(response)
|
abort(response)
|
||||||
|
|
||||||
return login_required_view
|
return login_required_view
|
||||||
|
|
||||||
def authenticate(self, state: AuthState) -> None:
|
def __authenticate(self, state: AuthState) -> None:
|
||||||
"""Authenticate a user.
|
"""Authenticate a user.
|
||||||
|
|
||||||
:param state: The authorization state.
|
:param state: The authorization state.
|
||||||
@ -169,7 +166,7 @@ class DigestAuth:
|
|||||||
raise UnauthorizedException(
|
raise UnauthorizedException(
|
||||||
"Missing \"opaque\" in the Authorization header")
|
"Missing \"opaque\" in the Authorization header")
|
||||||
try:
|
try:
|
||||||
self.serializer.loads(
|
self.__serializer.loads(
|
||||||
authorization.opaque, salt="opaque", max_age=1800)
|
authorization.opaque, salt="opaque", max_age=1800)
|
||||||
except BadData:
|
except BadData:
|
||||||
raise UnauthorizedException("Invalid opaque")
|
raise UnauthorizedException("Invalid opaque")
|
||||||
@ -190,7 +187,7 @@ class DigestAuth:
|
|||||||
state.stale = False
|
state.stale = False
|
||||||
raise UnauthorizedException("Incorrect response value")
|
raise UnauthorizedException("Incorrect response value")
|
||||||
try:
|
try:
|
||||||
self.serializer.loads(
|
self.__serializer.loads(
|
||||||
authorization.nonce,
|
authorization.nonce,
|
||||||
salt="nonce" if authorization.opaque is None
|
salt="nonce" if authorization.opaque is None
|
||||||
else f"nonce-{authorization.opaque}")
|
else f"nonce-{authorization.opaque}")
|
||||||
@ -198,21 +195,32 @@ class DigestAuth:
|
|||||||
state.stale = True
|
state.stale = True
|
||||||
raise UnauthorizedException("Invalid nonce")
|
raise UnauthorizedException("Invalid nonce")
|
||||||
|
|
||||||
def make_response_header(self, state: AuthState) -> str:
|
def __make_response_header(self, state: AuthState) -> str:
|
||||||
"""Composes and returns the WWW-Authenticate response header.
|
"""Composes and returns the ``WWW-Authenticate`` response header.
|
||||||
|
|
||||||
:param state: The authorization state.
|
:param state: The authorization state.
|
||||||
:return: The WWW-Authenticate response header.
|
:return: The ``WWW-Authenticate`` response header.
|
||||||
"""
|
"""
|
||||||
opaque: t.Optional[str] = None if not self.use_opaque else \
|
|
||||||
(state.opaque if state.opaque is not None
|
def get_opaque() -> t.Optional[str]:
|
||||||
else self.serializer.dumps(random(), salt="opaque"))
|
"""Returns the opaque value.
|
||||||
nonce: str = self.serializer.dumps(
|
|
||||||
random(), salt="nonce" if opaque is None else f"nonce-{opaque}")
|
:return: The opaque value.
|
||||||
|
"""
|
||||||
|
if not self.use_opaque:
|
||||||
|
return None
|
||||||
|
if state.opaque is not None:
|
||||||
|
return state.opaque
|
||||||
|
return self.__serializer.dumps(randbits(32), salt="opaque")
|
||||||
|
|
||||||
|
opaque: t.Optional[str] = get_opaque()
|
||||||
|
nonce: str = self.__serializer.dumps(
|
||||||
|
randbits(32),
|
||||||
|
salt="nonce" if opaque is None else f"nonce-{opaque}")
|
||||||
|
|
||||||
header: str = f"Digest realm=\"{self.realm}\""
|
header: str = f"Digest realm=\"{self.realm}\""
|
||||||
if len(self.domain) > 0:
|
if len(self.__domain) > 0:
|
||||||
domain_list: str = ",".join(self.domain)
|
domain_list: str = ",".join(self.__domain)
|
||||||
header += f", domain=\"{domain_list}\""
|
header += f", domain=\"{domain_list}\""
|
||||||
header += f", nonce=\"{nonce}\""
|
header += f", nonce=\"{nonce}\""
|
||||||
if opaque is not None:
|
if opaque is not None:
|
||||||
@ -221,14 +229,23 @@ class DigestAuth:
|
|||||||
header += f", stale=TRUE" if state.stale else f", stale=FALSE"
|
header += f", stale=TRUE" if state.stale else f", stale=FALSE"
|
||||||
if self.algorithm is not None:
|
if self.algorithm is not None:
|
||||||
header += f", algorithm=\"{self.algorithm}\""
|
header += f", algorithm=\"{self.algorithm}\""
|
||||||
if len(self.qop) > 0:
|
if len(self.__qop) > 0:
|
||||||
qop_list: str = ",".join(self.qop)
|
qop_list: str = ",".join(self.__qop)
|
||||||
header += f", qop=\"{qop_list}\""
|
header += f", qop=\"{qop_list}\""
|
||||||
return header
|
return header
|
||||||
|
|
||||||
def register_get_password(self, func: t.Callable[[str], t.Optional[str]])\
|
def register_get_password(self, func: t.Callable[[str], t.Optional[str]])\
|
||||||
-> None:
|
-> None:
|
||||||
"""Registers the callback to obtain the password hash.
|
"""The decorator to register the callback to obtain the password hash.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@auth.register_get_password
|
||||||
|
def get_password_hash(username: str) -> Optional[str]:
|
||||||
|
user = User.query.filter(User.username == username).first()
|
||||||
|
return None if user is None else user.password
|
||||||
|
|
||||||
:param func: The callback that given the username, returns the password
|
:param func: The callback that given the username, returns the password
|
||||||
hash, or None if the user does not exist.
|
hash, or None if the user does not exist.
|
||||||
@ -251,7 +268,15 @@ class DigestAuth:
|
|||||||
|
|
||||||
def register_get_user(self, func: t.Callable[[str], t.Optional[t.Any]])\
|
def register_get_user(self, func: t.Callable[[str], t.Optional[t.Any]])\
|
||||||
-> None:
|
-> None:
|
||||||
"""Registers the callback to obtain the user.
|
"""The decorator to register the callback to obtain the user.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@auth.register_get_user
|
||||||
|
def get_user(username: str) -> Optional[User]:
|
||||||
|
return User.query.filter(User.username == username).first()
|
||||||
|
|
||||||
:param func: The callback that given the username, returns the user,
|
:param func: The callback that given the username, returns the user,
|
||||||
or None if the user does not exist.
|
or None if the user does not exist.
|
||||||
@ -273,7 +298,15 @@ class DigestAuth:
|
|||||||
self.__get_user = UserGetter()
|
self.__get_user = UserGetter()
|
||||||
|
|
||||||
def register_on_login(self, func: t.Callable[[t.Any], None]) -> None:
|
def register_on_login(self, func: t.Callable[[t.Any], None]) -> None:
|
||||||
"""Registers the callback when the user logs in.
|
"""The decorator to register the callback to run when the user logs in.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@auth.register_on_login
|
||||||
|
def on_login(user: User) -> None:
|
||||||
|
user.visits = user.visits + 1
|
||||||
|
|
||||||
:param func: The callback given the logged-in user.
|
:param func: The callback given the logged-in user.
|
||||||
:return: None.
|
:return: None.
|
||||||
@ -294,13 +327,24 @@ class DigestAuth:
|
|||||||
self.__on_login = OnLogInCallback()
|
self.__on_login = OnLogInCallback()
|
||||||
|
|
||||||
def init_app(self, app: Flask) -> None:
|
def init_app(self, app: Flask) -> None:
|
||||||
"""Initializes the Flask application.
|
"""Initializes the Flask application. The DigestAuth instance will
|
||||||
|
be stored in ``app.extensions["digest_auth"]``.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
app: flask = Flask(__name__)
|
||||||
|
auth: DigestAuth = DigestAuth()
|
||||||
|
auth.realm = "My Admin"
|
||||||
|
auth.init_app(app)
|
||||||
|
|
||||||
:param app: The Flask application.
|
:param app: The Flask application.
|
||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
app.digest_auth = self
|
app.extensions["digest_auth"] = self
|
||||||
self.app = app
|
if "DIGEST_AUTH_REALM" in app.config:
|
||||||
|
self.realm = app.config["DIGEST_AUTH_REALM"]
|
||||||
|
|
||||||
if hasattr(app, "login_manager"):
|
if hasattr(app, "login_manager"):
|
||||||
from flask_login import LoginManager, login_user
|
from flask_login import LoginManager, login_user
|
||||||
@ -313,10 +357,13 @@ class DigestAuth:
|
|||||||
|
|
||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
|
state: AuthState = getattr(request, "_digest_auth_state") \
|
||||||
|
if hasattr(request, "_digest_auth_state") \
|
||||||
|
else AuthState()
|
||||||
response: Response = Response()
|
response: Response = Response()
|
||||||
response.status = 401
|
response.status = 401
|
||||||
response.headers["WWW-Authenticate"] \
|
response.headers["WWW-Authenticate"] \
|
||||||
= self.make_response_header(g.digest_auth_state)
|
= self.__make_response_header(state)
|
||||||
abort(response)
|
abort(response)
|
||||||
|
|
||||||
@login_manager.request_loader
|
@login_manager.request_loader
|
||||||
@ -327,7 +374,7 @@ class DigestAuth:
|
|||||||
:return: The authenticated user, or None if the
|
:return: The authenticated user, or None if the
|
||||||
authentication fails
|
authentication fails
|
||||||
"""
|
"""
|
||||||
g.digest_auth_state = AuthState()
|
request._digest_auth_state = AuthState()
|
||||||
authorization: Authorization = req.authorization
|
authorization: Authorization = req.authorization
|
||||||
try:
|
try:
|
||||||
if authorization is None:
|
if authorization is None:
|
||||||
@ -335,9 +382,8 @@ class DigestAuth:
|
|||||||
if authorization.type != "digest":
|
if authorization.type != "digest":
|
||||||
raise UnauthorizedException(
|
raise UnauthorizedException(
|
||||||
"Not an HTTP digest authorization")
|
"Not an HTTP digest authorization")
|
||||||
self.authenticate(g.digest_auth_state)
|
self.__authenticate(request._digest_auth_state)
|
||||||
user = login_manager.user_callback(
|
user = login_manager.user_callback(authorization.username)
|
||||||
authorization.username)
|
|
||||||
login_user(user)
|
login_user(user)
|
||||||
self.__on_login(user)
|
self.__on_login(user)
|
||||||
return user
|
return user
|
||||||
@ -351,12 +397,22 @@ class DigestAuth:
|
|||||||
This actually causes the next authentication to fail, which forces
|
This actually causes the next authentication to fail, which forces
|
||||||
the browser to ask the user for the username and password again.
|
the browser to ask the user for the username and password again.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@app.post("/logout")
|
||||||
|
@auth.login_required
|
||||||
|
def logout():
|
||||||
|
auth.logout()
|
||||||
|
return redirect(request.form.get("next"))
|
||||||
|
|
||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
if "user" in session:
|
if "user" in session:
|
||||||
del session["user"]
|
del session["user"]
|
||||||
try:
|
try:
|
||||||
if hasattr(self.app, "login_manager"):
|
if hasattr(current_app, "login_manager"):
|
||||||
from flask_login import logout_user
|
from flask_login import logout_user
|
||||||
logout_user()
|
logout_user()
|
||||||
except ModuleNotFoundError:
|
except ModuleNotFoundError:
|
||||||
@ -365,9 +421,76 @@ class DigestAuth:
|
|||||||
|
|
||||||
|
|
||||||
class AuthState:
|
class AuthState:
|
||||||
"""The authorization state."""
|
"""The authentication state. It keeps the status in the earlier
|
||||||
|
authentication stage, so that the latter response stage knows how to
|
||||||
|
response.
|
||||||
|
"""
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
"""Constructs the authorization state."""
|
"""Constructs the authorization state."""
|
||||||
self.opaque: t.Optional[str] = None
|
self.opaque: t.Optional[str] = None
|
||||||
|
"""The opaque value specified by the client, if valid."""
|
||||||
self.stale: t.Optional[bool] = None
|
self.stale: t.Optional[bool] = None
|
||||||
|
"""The stale value, if there is a previous log in attempt."""
|
||||||
|
|
||||||
|
|
||||||
|
class UnauthorizedException(Exception):
|
||||||
|
"""The exception thrown when the authentication fails."""
|
||||||
|
|
||||||
|
|
||||||
|
class BasePasswordHashGetter:
|
||||||
|
"""The base callback that given the username, returns the password hash,
|
||||||
|
or None if the user does not exist. The default is to raise an
|
||||||
|
:class:`UnboundLocalError` if the callback is not registered yet.
|
||||||
|
|
||||||
|
See :meth:`flask_digest_auth.auth.DigestAuth.register_get_password`
|
||||||
|
"""
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __call__(username: str) -> t.Optional[str]:
|
||||||
|
"""Returns the password hash of a user.
|
||||||
|
|
||||||
|
:param username: The username.
|
||||||
|
:return: The password hash, or None if the user does not exist.
|
||||||
|
:raise UnboundLocalError: When the password hash getter function is
|
||||||
|
not registered yet.
|
||||||
|
"""
|
||||||
|
raise UnboundLocalError("The function to return the password hash"
|
||||||
|
" was not registered yet.")
|
||||||
|
|
||||||
|
|
||||||
|
class BaseUserGetter:
|
||||||
|
"""The base callback that given the username, returns the user, or None if
|
||||||
|
the user does not exist. The default is to raise an
|
||||||
|
:class:`UnboundLocalError` if the callback is not registered yet.
|
||||||
|
|
||||||
|
See :meth:`flask_digest_auth.auth.DigestAuth.register_get_user`
|
||||||
|
"""
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __call__(username: str) -> t.Optional[t.Any]:
|
||||||
|
"""Returns a user.
|
||||||
|
|
||||||
|
:param username: The username.
|
||||||
|
:return: The user, or None if the user does not exist.
|
||||||
|
:raise UnboundLocalError: When the user getter function is not
|
||||||
|
registered yet.
|
||||||
|
"""
|
||||||
|
raise UnboundLocalError("The function to return the user"
|
||||||
|
" was not registered yet.")
|
||||||
|
|
||||||
|
|
||||||
|
class BaseOnLogInCallback:
|
||||||
|
"""The base callback to run when the user logs in, given the logged-in
|
||||||
|
user. The default does nothing.
|
||||||
|
|
||||||
|
See :meth:`flask_digest_auth.auth.DigestAuth.register_on_login`
|
||||||
|
"""
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __call__(user: t.Any) -> None:
|
||||||
|
"""Runs the callback when the user logs in.
|
||||||
|
|
||||||
|
:param user: The logged-in user.
|
||||||
|
:return: None.
|
||||||
|
"""
|
||||||
|
@ -1,25 +0,0 @@
|
|||||||
# The Flask HTTP Digest Authentication Project.
|
|
||||||
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/11/3
|
|
||||||
|
|
||||||
# Copyright (c) 2022 imacat.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
"""The exception.
|
|
||||||
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class UnauthorizedException(Exception):
|
|
||||||
"""The exception thrown when the authentication is failed."""
|
|
||||||
pass
|
|
@ -29,15 +29,67 @@ from flask_digest_auth.algo import calc_response, make_password_hash
|
|||||||
|
|
||||||
|
|
||||||
class Client(WerkzeugClient):
|
class Client(WerkzeugClient):
|
||||||
"""The test client with HTTP digest authentication enabled."""
|
"""The test client with HTTP digest authentication enabled.
|
||||||
|
|
||||||
|
:Example:
|
||||||
|
|
||||||
|
For unittest_:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
class MyTestCase(flask_testing.TestCase):
|
||||||
|
|
||||||
|
def create_app(self):
|
||||||
|
app: Flask = create_app({
|
||||||
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
|
"TESTING": True
|
||||||
|
})
|
||||||
|
app.test_client_class = Client
|
||||||
|
return app
|
||||||
|
|
||||||
|
def test_admin(self):
|
||||||
|
response = self.client.get("/admin")
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
response = self.client.get(
|
||||||
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
|
For pytest_:
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def app():
|
||||||
|
app: Flask = create_app({
|
||||||
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
|
"TESTING": True
|
||||||
|
})
|
||||||
|
app.test_client_class = Client
|
||||||
|
yield app
|
||||||
|
|
||||||
|
@pytest.fixture()
|
||||||
|
def client(app):
|
||||||
|
return app.test_client()
|
||||||
|
|
||||||
|
def test_admin(app: Flask, client: Client):
|
||||||
|
with app.app_context():
|
||||||
|
response = client.get("/admin")
|
||||||
|
assert response.status_code == 401
|
||||||
|
response = client.get(
|
||||||
|
"/admin", digest_auth=(USERNAME, PASSWORD))
|
||||||
|
assert response.status_code == 200
|
||||||
|
|
||||||
|
.. _unittest: https://docs.python.org/3/library/unittest.html
|
||||||
|
.. _pytest: https://pytest.org
|
||||||
|
"""
|
||||||
|
|
||||||
def open(self, *args, digest_auth: t.Optional[t.Tuple[str, str]] = None,
|
def open(self, *args, digest_auth: t.Optional[t.Tuple[str, str]] = None,
|
||||||
**kwargs) -> TestResponse:
|
**kwargs) -> TestResponse:
|
||||||
"""Opens a request.
|
"""Opens a request.
|
||||||
|
|
||||||
:param args: The arguments.
|
:param args: The arguments.
|
||||||
:param digest_auth: The username and password for the HTTP digest
|
:param digest_auth: The (*username*, *password*) tuple for the HTTP
|
||||||
authentication.
|
digest authentication.
|
||||||
:param kwargs: The keyword arguments.
|
:param kwargs: The keyword arguments.
|
||||||
:return: The response.
|
:return: The response.
|
||||||
"""
|
"""
|
||||||
@ -59,15 +111,14 @@ class Client(WerkzeugClient):
|
|||||||
username: str, password: str) -> Authorization:
|
username: str, password: str) -> Authorization:
|
||||||
"""Composes and returns the request authorization.
|
"""Composes and returns the request authorization.
|
||||||
|
|
||||||
:param www_authenticate: The WWW-Authenticate response.
|
:param www_authenticate: The ``WWW-Authenticate`` response.
|
||||||
:param uri: The request URI.
|
:param uri: The request URI.
|
||||||
:param username: The username.
|
:param username: The username.
|
||||||
:param password: The password.
|
:param password: The password.
|
||||||
:return: The request authorization.
|
:return: The request authorization.
|
||||||
"""
|
"""
|
||||||
qop: t.Optional[t.Literal["auth", "auth-int"]] = None
|
qop: t.Optional[t.Literal["auth", "auth-int"]] = None
|
||||||
if www_authenticate.qop is not None:
|
if www_authenticate.qop is not None and "auth" in www_authenticate.qop:
|
||||||
if "auth" in www_authenticate.qop:
|
|
||||||
qop = "auth"
|
qop = "auth"
|
||||||
|
|
||||||
cnonce: t.Optional[str] = None
|
cnonce: t.Optional[str] = None
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
# The Flask HTTP Digest Authentication Project.
|
# The Flask HTTP Digest Authentication Project.
|
||||||
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/10/22
|
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/10/22
|
||||||
|
|
||||||
# Copyright (c) 2022 imacat.
|
# Copyright (c) 2022-2023 imacat.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -35,14 +35,15 @@ _PASSWORD: str = "Circle Of Life"
|
|||||||
class User:
|
class User:
|
||||||
"""A dummy user"""
|
"""A dummy user"""
|
||||||
|
|
||||||
def __init__(self, username: str, password_hash: str):
|
def __init__(self, username: str, password: str):
|
||||||
"""Constructs a dummy user.
|
"""Constructs a dummy user.
|
||||||
|
|
||||||
:param username: The username.
|
:param username: The username.
|
||||||
:param password_hash: The password hash.
|
:param password: The clear-text password.
|
||||||
"""
|
"""
|
||||||
self.username: str = username
|
self.username: str = username
|
||||||
self.password_hash: str = password_hash
|
self.password_hash: str = make_password_hash(
|
||||||
|
_REALM, username, password)
|
||||||
self.visits: int = 0
|
self.visits: int = 0
|
||||||
|
|
||||||
|
|
||||||
@ -56,16 +57,16 @@ class AuthenticationTestCase(TestCase):
|
|||||||
"""
|
"""
|
||||||
app: Flask = Flask(__name__)
|
app: Flask = Flask(__name__)
|
||||||
app.config.from_mapping({
|
app.config.from_mapping({
|
||||||
|
"TESTING": True,
|
||||||
"SECRET_KEY": token_urlsafe(32),
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
"TESTING": True
|
"DIGEST_AUTH_REALM": _REALM,
|
||||||
})
|
})
|
||||||
app.test_client_class = Client
|
app.test_client_class = Client
|
||||||
|
|
||||||
auth: DigestAuth = DigestAuth(realm=_REALM)
|
auth: DigestAuth = DigestAuth()
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
user_db: t.Dict[str, User] \
|
self.user: User = User(_USERNAME, _PASSWORD)
|
||||||
= {_USERNAME: User(
|
user_db: t.Dict[str, User] = {_USERNAME: self.user}
|
||||||
_USERNAME, make_password_hash(_REALM, _USERNAME, _PASSWORD))}
|
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
def get_password_hash(username: str) -> t.Optional[str]:
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
@ -141,7 +142,7 @@ class AuthenticationTestCase(TestCase):
|
|||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
self.assertEqual(response.data.decode("UTF-8"),
|
self.assertEqual(response.data.decode("UTF-8"),
|
||||||
f"Hello, {_USERNAME}! #2")
|
f"Hello, {_USERNAME}! #2")
|
||||||
self.assertEqual(g.user.visits, 1)
|
self.assertEqual(self.user.visits, 1)
|
||||||
|
|
||||||
def test_stale_opaque(self) -> None:
|
def test_stale_opaque(self) -> None:
|
||||||
"""Tests the stale and opaque value.
|
"""Tests the stale and opaque value.
|
||||||
@ -218,4 +219,4 @@ class AuthenticationTestCase(TestCase):
|
|||||||
|
|
||||||
response = self.client.get(admin_uri)
|
response = self.client.get(admin_uri)
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
self.assertEqual(g.user.visits, 2)
|
self.assertEqual(self.user.visits, 2)
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
# The Flask HTTP Digest Authentication Project.
|
# The Flask HTTP Digest Authentication Project.
|
||||||
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/11/23
|
# Author: imacat@mail.imacat.idv.tw (imacat), 2022/11/23
|
||||||
|
|
||||||
# Copyright (c) 2022 imacat.
|
# Copyright (c) 2022-2023 imacat.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@ -21,7 +21,6 @@
|
|||||||
import typing as t
|
import typing as t
|
||||||
from secrets import token_urlsafe
|
from secrets import token_urlsafe
|
||||||
|
|
||||||
import flask_login
|
|
||||||
from flask import Response, Flask, g, redirect, request
|
from flask import Response, Flask, g, redirect, request
|
||||||
from flask_testing import TestCase
|
from flask_testing import TestCase
|
||||||
from werkzeug.datastructures import WWWAuthenticate, Authorization
|
from werkzeug.datastructures import WWWAuthenticate, Authorization
|
||||||
@ -36,16 +35,16 @@ _PASSWORD: str = "Circle Of Life"
|
|||||||
class User:
|
class User:
|
||||||
"""A dummy user."""
|
"""A dummy user."""
|
||||||
|
|
||||||
def __init__(self, username: str, password_hash: str):
|
def __init__(self, username: str, password: str):
|
||||||
"""Constructs a dummy user.
|
"""Constructs a dummy user.
|
||||||
|
|
||||||
:param username: The username.
|
:param username: The username.
|
||||||
:param password_hash: The password hash.
|
:param password: The clear-text password.
|
||||||
"""
|
"""
|
||||||
self.username: str = username
|
self.username: str = username
|
||||||
self.password_hash: str = password_hash
|
self.password_hash: str = make_password_hash(
|
||||||
|
_REALM, username, password)
|
||||||
self.visits: int = 0
|
self.visits: int = 0
|
||||||
self.is_authenticated: bool = True
|
|
||||||
self.is_active: bool = True
|
self.is_active: bool = True
|
||||||
self.is_anonymous: bool = False
|
self.is_anonymous: bool = False
|
||||||
|
|
||||||
@ -57,6 +56,16 @@ class User:
|
|||||||
"""
|
"""
|
||||||
return self.username
|
return self.username
|
||||||
|
|
||||||
|
@property
|
||||||
|
def is_authenticated(self) -> bool:
|
||||||
|
"""Returns whether the user is authenticated.
|
||||||
|
This is required by Flask-Login.
|
||||||
|
This should return self.is_active.
|
||||||
|
|
||||||
|
:return: True if the user is active, or False otherwise.
|
||||||
|
"""
|
||||||
|
return self.is_active
|
||||||
|
|
||||||
|
|
||||||
class FlaskLoginTestCase(TestCase):
|
class FlaskLoginTestCase(TestCase):
|
||||||
"""The test case with the Flask-Login integration."""
|
"""The test case with the Flask-Login integration."""
|
||||||
@ -68,8 +77,9 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
"""
|
"""
|
||||||
app: Flask = Flask(__name__)
|
app: Flask = Flask(__name__)
|
||||||
app.config.from_mapping({
|
app.config.from_mapping({
|
||||||
|
"TESTING": True,
|
||||||
"SECRET_KEY": token_urlsafe(32),
|
"SECRET_KEY": token_urlsafe(32),
|
||||||
"TESTING": True
|
"DIGEST_AUTH_REALM": _REALM,
|
||||||
})
|
})
|
||||||
app.test_client_class = Client
|
app.test_client_class = Client
|
||||||
|
|
||||||
@ -83,12 +93,11 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
login_manager: flask_login.LoginManager = flask_login.LoginManager()
|
login_manager: flask_login.LoginManager = flask_login.LoginManager()
|
||||||
login_manager.init_app(app)
|
login_manager.init_app(app)
|
||||||
|
|
||||||
auth: DigestAuth = DigestAuth(realm=_REALM)
|
auth: DigestAuth = DigestAuth()
|
||||||
auth.init_app(app)
|
auth.init_app(app)
|
||||||
|
|
||||||
user_db: t.Dict[str, User] \
|
self.user: User = User(_USERNAME, _PASSWORD)
|
||||||
= {_USERNAME: User(
|
user_db: t.Dict[str, User] = {_USERNAME: self.user}
|
||||||
_USERNAME, make_password_hash(_REALM, _USERNAME, _PASSWORD))}
|
|
||||||
|
|
||||||
@auth.register_get_password
|
@auth.register_get_password
|
||||||
def get_password_hash(username: str) -> t.Optional[str]:
|
def get_password_hash(username: str) -> t.Optional[str]:
|
||||||
@ -154,7 +163,7 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
if not self.has_flask_login:
|
if not self.has_flask_login:
|
||||||
self.skipTest("Skipped testing Flask-Login integration without it.")
|
self.skipTest("Skipped without Flask-Login.")
|
||||||
|
|
||||||
response: Response = self.client.get(self.app.url_for("admin-1"))
|
response: Response = self.client.get(self.app.url_for("admin-1"))
|
||||||
self.assertEqual(response.status_code, 401)
|
self.assertEqual(response.status_code, 401)
|
||||||
@ -167,7 +176,7 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
self.assertEqual(response.data.decode("UTF-8"),
|
self.assertEqual(response.data.decode("UTF-8"),
|
||||||
f"Hello, {_USERNAME}! #2")
|
f"Hello, {_USERNAME}! #2")
|
||||||
self.assertEqual(flask_login.current_user.visits, 1)
|
self.assertEqual(self.user.visits, 1)
|
||||||
|
|
||||||
def test_stale_opaque(self) -> None:
|
def test_stale_opaque(self) -> None:
|
||||||
"""Tests the stale and opaque value.
|
"""Tests the stale and opaque value.
|
||||||
@ -175,7 +184,7 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
if not self.has_flask_login:
|
if not self.has_flask_login:
|
||||||
self.skipTest("Skipped testing Flask-Login integration without it.")
|
self.skipTest("Skipped without Flask-Login.")
|
||||||
|
|
||||||
admin_uri: str = self.app.url_for("admin-1")
|
admin_uri: str = self.app.url_for("admin-1")
|
||||||
response: Response
|
response: Response
|
||||||
@ -222,6 +231,9 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
|
|
||||||
:return: None.
|
:return: None.
|
||||||
"""
|
"""
|
||||||
|
if not self.has_flask_login:
|
||||||
|
self.skipTest("Skipped without Flask-Login.")
|
||||||
|
|
||||||
admin_uri: str = self.app.url_for("admin-1")
|
admin_uri: str = self.app.url_for("admin-1")
|
||||||
logout_uri: str = self.app.url_for("logout")
|
logout_uri: str = self.app.url_for("logout")
|
||||||
response: Response
|
response: Response
|
||||||
@ -253,4 +265,35 @@ class FlaskLoginTestCase(TestCase):
|
|||||||
|
|
||||||
response = self.client.get(admin_uri)
|
response = self.client.get(admin_uri)
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
self.assertEqual(flask_login.current_user.visits, 2)
|
self.assertEqual(self.user.visits, 2)
|
||||||
|
|
||||||
|
def test_disabled(self) -> None:
|
||||||
|
"""Tests the disabled user.
|
||||||
|
|
||||||
|
:return: None.
|
||||||
|
"""
|
||||||
|
if not self.has_flask_login:
|
||||||
|
self.skipTest("Skipped without Flask-Login.")
|
||||||
|
|
||||||
|
response: Response
|
||||||
|
|
||||||
|
self.user.is_active = False
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"))
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"),
|
||||||
|
digest_auth=(_USERNAME, _PASSWORD))
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
|
||||||
|
self.user.is_active = True
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"),
|
||||||
|
digest_auth=(_USERNAME, _PASSWORD))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
|
self.user.is_active = False
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"))
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
response = self.client.get(self.app.url_for("admin-1"),
|
||||||
|
digest_auth=(_USERNAME, _PASSWORD))
|
||||||
|
self.assertEqual(response.status_code, 401)
|
||||||
|
Reference in New Issue
Block a user