mirror of
https://github.com/quay/quay.git
synced 2026-01-26 06:21:37 +03:00
* Convert all Python2 to Python3 syntax. * Removes oauth2lib dependency * Replace mockredis with fakeredis * byte/str conversions * Removes nonexisting __nonzero__ in Python3 * Python3 Dockerfile and related * [PROJQUAY-98] Replace resumablehashlib with rehash * PROJQUAY-123 - replace gpgme with python3-gpg * [PROJQUAY-135] Fix unhashable class error * Update external dependencies for Python 3 - Move github.com/app-registry/appr to github.com/quay/appr - github.com/coderanger/supervisor-stdout - github.com/DevTable/container-cloud-config - Update to latest mockldap with changes applied from coreos/mockldap - Update dependencies in requirements.txt and requirements-dev.txt * Default FLOAT_REPR function to str in json encoder and removes keyword assignment True, False, and str were not keywords in Python2... * [PROJQUAY-165] Replace package `bencode` with `bencode.py` - Bencode is not compatible with Python 3.x and is no longer maintained. Bencode.py appears to be a drop-in replacement/fork that is compatible with Python 3. * Make sure monkey.patch is called before anything else ( * Removes anunidecode dependency and replaces it with text_unidecode * Base64 encode/decode pickle dumps/loads when storing value in DB Base64 encodes/decodes the serialized values when storing them in the DB. Also make sure to return a Python3 string instead of a Bytes when coercing for db, otherwise, Postgres' TEXT field will convert it into a hex representation when storing the value. * Implement __hash__ on Digest class In Python 3, if a class defines __eq__() but not __hash__(), its instances will not be usable as items in hashable collections (e.g sets). * Remove basestring check * Fix expected message in credentials tests * Fix usage of Cryptography.Fernet for Python3 (#219) - Specifically, this addresses the issue where Byte<->String conversions weren't being applied correctly. * Fix utils - tar+stream layer format utils - filelike util * Fix storage tests * Fix endpoint tests * Fix workers tests * Fix docker's empty layer bytes * Fix registry tests * Appr * Enable CI for Python 3.6 * Skip buildman tests Skip buildman tests while it's being rewritten to allow ci to pass. * Install swig for CI * Update expected exception type in redis validation test * Fix gpg signing calls Fix gpg calls for updated gpg wrapper, and add signing tests. * Convert / to // for Python3 integer division * WIP: Update buildman to use asyncio instead of trollius. This dependency is considered deprecated/abandoned and was only used as an implementation/backport of asyncio on Python 2.x This is a work in progress, and is included in the PR just to get the rest of the tests passing. The builder is actually being rewritten. * Target Python 3.8 * Removes unused files - Removes unused files that were added accidentally while rebasing - Small fixes/cleanup - TODO tasks comments * Add TODO to verify rehash backward compat with resumablehashlib * Revert "[PROJQUAY-135] Fix unhashable class error" and implements __hash__ instead. This reverts commit 735e38e3c1d072bf50ea864bc7e119a55d3a8976. Instead, defines __hash__ for encryped fields class, using the parent field's implementation. * Remove some unused files ad imports Co-authored-by: Kenny Lee Sin Cheong <kenny.lee@redhat.com> Co-authored-by: Tom McKay <thomasmckay@redhat.com>
65 lines
2.2 KiB
Python
65 lines
2.2 KiB
Python
import logging
|
|
|
|
from base64 import b64decode
|
|
from flask import request
|
|
|
|
from auth.credentials import validate_credentials
|
|
from auth.validateresult import ValidateResult, AuthKind
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
def has_basic_auth(username):
|
|
"""
|
|
Returns true if a basic auth header exists with a username and password pair that validates
|
|
against the internal authentication system.
|
|
|
|
Returns True on full success and False on any failure (missing header, invalid header, invalid
|
|
credentials, etc).
|
|
"""
|
|
auth_header = request.headers.get("authorization", "")
|
|
result = validate_basic_auth(auth_header)
|
|
return result.has_nonrobot_user and result.context.user.username == username
|
|
|
|
|
|
def validate_basic_auth(auth_header):
|
|
"""
|
|
Validates the specified basic auth header, returning whether its credentials point to a valid
|
|
user or token.
|
|
"""
|
|
if not auth_header:
|
|
return ValidateResult(AuthKind.basic, missing=True)
|
|
|
|
logger.debug("Attempt to process basic auth header")
|
|
|
|
# Parse the basic auth header.
|
|
assert isinstance(auth_header, str)
|
|
credentials, err = _parse_basic_auth_header(auth_header)
|
|
if err is not None:
|
|
logger.debug("Got invalid basic auth header: %s", auth_header)
|
|
return ValidateResult(AuthKind.basic, missing=True)
|
|
|
|
auth_username, auth_password_or_token = credentials
|
|
result, _ = validate_credentials(auth_username, auth_password_or_token)
|
|
return result.with_kind(AuthKind.basic)
|
|
|
|
|
|
def _parse_basic_auth_header(auth):
|
|
"""
|
|
Parses the given basic auth header, returning the credentials found inside.
|
|
"""
|
|
normalized = [part.strip() for part in auth.split(" ") if part]
|
|
if normalized[0].lower() != "basic" or len(normalized) != 2:
|
|
return None, "Invalid basic auth header"
|
|
|
|
try:
|
|
credentials = [part.decode("utf-8") for part in b64decode(normalized[1]).split(b":", 1)]
|
|
except (TypeError, UnicodeDecodeError, ValueError):
|
|
logger.exception("Exception when parsing basic auth header: %s", auth)
|
|
return None, "Could not parse basic auth header"
|
|
|
|
if len(credentials) != 2:
|
|
return None, "Unexpected number of credentials found in basic auth header"
|
|
|
|
return credentials, None
|