mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-27 02:24:18 +00:00
114 lines
3.1 KiB
Python
114 lines
3.1 KiB
Python
|
import binascii
|
||
|
import contrib.md5crypt as md5crypt
|
||
|
import http
|
||
|
|
||
|
|
||
|
class NullProxyAuth():
|
||
|
"""
|
||
|
No proxy auth at all (returns empty challange headers)
|
||
|
"""
|
||
|
def __init__(self, password_manager):
|
||
|
self.password_manager = password_manager
|
||
|
|
||
|
def clean(self, headers):
|
||
|
"""
|
||
|
Clean up authentication headers, so they're not passed upstream.
|
||
|
"""
|
||
|
pass
|
||
|
|
||
|
def authenticate(self, headers):
|
||
|
"""
|
||
|
Tests that the user is allowed to use the proxy
|
||
|
"""
|
||
|
return True
|
||
|
|
||
|
def auth_challenge_headers(self):
|
||
|
"""
|
||
|
Returns a dictionary containing the headers require to challenge the user
|
||
|
"""
|
||
|
return {}
|
||
|
|
||
|
|
||
|
class BasicProxyAuth(NullProxyAuth):
|
||
|
CHALLENGE_HEADER = 'Proxy-Authenticate'
|
||
|
AUTH_HEADER = 'Proxy-Authorization'
|
||
|
def __init__(self, password_manager, realm):
|
||
|
NullProxyAuth.__init__(self, password_manager)
|
||
|
self.realm = realm
|
||
|
|
||
|
def clean(self, headers):
|
||
|
del headers[self.AUTH_HEADER]
|
||
|
|
||
|
def authenticate(self, headers):
|
||
|
auth_value = headers.get(self.AUTH_HEADER, [])
|
||
|
if not auth_value:
|
||
|
return False
|
||
|
parts = http.parse_http_basic_auth(auth_value[0])
|
||
|
if not parts:
|
||
|
return False
|
||
|
scheme, username, password = parts
|
||
|
if scheme.lower()!='basic':
|
||
|
return False
|
||
|
if not self.password_manager.test(username, password):
|
||
|
return False
|
||
|
self.username = username
|
||
|
return True
|
||
|
|
||
|
def auth_challenge_headers(self):
|
||
|
return {self.CHALLENGE_HEADER:'Basic realm="%s"'%self.realm}
|
||
|
|
||
|
|
||
|
class PassMan():
|
||
|
def test(self, username, password_token):
|
||
|
return False
|
||
|
|
||
|
|
||
|
class PassManNonAnon:
|
||
|
"""
|
||
|
Ensure the user specifies a username, accept any password.
|
||
|
"""
|
||
|
def test(self, username, password_token):
|
||
|
if username:
|
||
|
return True
|
||
|
return False
|
||
|
|
||
|
|
||
|
class PassManHtpasswd:
|
||
|
"""
|
||
|
Read usernames and passwords from an htpasswd file
|
||
|
"""
|
||
|
def __init__(self, fp):
|
||
|
"""
|
||
|
Raises ValueError if htpasswd file is invalid.
|
||
|
"""
|
||
|
self.usernames = {}
|
||
|
for l in fp:
|
||
|
l = l.strip().split(':')
|
||
|
if len(l) != 2:
|
||
|
raise ValueError("Invalid htpasswd file.")
|
||
|
parts = l[1].split('$')
|
||
|
if len(parts) != 4:
|
||
|
raise ValueError("Invalid htpasswd file.")
|
||
|
self.usernames[l[0]] = dict(
|
||
|
token = l[1],
|
||
|
dummy = parts[0],
|
||
|
magic = parts[1],
|
||
|
salt = parts[2],
|
||
|
hashed_password = parts[3]
|
||
|
)
|
||
|
|
||
|
def test(self, username, password_token):
|
||
|
ui = self.usernames.get(username)
|
||
|
if not ui:
|
||
|
return False
|
||
|
expected = md5crypt.md5crypt(password_token, ui["salt"], '$'+ui["magic"]+'$')
|
||
|
return expected==ui["token"]
|
||
|
|
||
|
|
||
|
class PassManSingleUser:
|
||
|
def __init__(self, username, password):
|
||
|
self.username, self.password = username, password
|
||
|
|
||
|
def test(self, username, password_token):
|
||
|
return self.username==username and self.password==password_token
|