You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
407 lines
15 KiB
407 lines
15 KiB
from __future__ import annotations
|
|
|
|
import collections.abc as cabc
|
|
import json
|
|
import typing as t
|
|
|
|
from .encoding import want_bytes
|
|
from .exc import BadPayload
|
|
from .exc import BadSignature
|
|
from .signer import _make_keys_list
|
|
from .signer import Signer
|
|
|
|
if t.TYPE_CHECKING:
|
|
import typing_extensions as te
|
|
|
|
# This should be either be str or bytes. To avoid having to specify the
|
|
# bound type, it falls back to a union if structural matching fails.
|
|
_TSerialized = te.TypeVar(
|
|
"_TSerialized", bound=t.Union[str, bytes], default=t.Union[str, bytes]
|
|
)
|
|
else:
|
|
# Still available at runtime on Python < 3.13, but without the default.
|
|
_TSerialized = t.TypeVar("_TSerialized", bound=t.Union[str, bytes])
|
|
|
|
|
|
class _PDataSerializer(t.Protocol[_TSerialized]):
|
|
def loads(self, payload: _TSerialized, /) -> t.Any: ...
|
|
# A signature with additional arguments is not handled correctly by type
|
|
# checkers right now, so an overload is used below for serializers that
|
|
# don't match this strict protocol.
|
|
def dumps(self, obj: t.Any, /) -> _TSerialized: ...
|
|
|
|
|
|
# Use TypeIs once it's available in typing_extensions or 3.13.
|
|
def is_text_serializer(
|
|
serializer: _PDataSerializer[t.Any],
|
|
) -> te.TypeGuard[_PDataSerializer[str]]:
|
|
"""Checks whether a serializer generates text or binary."""
|
|
return isinstance(serializer.dumps({}), str)
|
|
|
|
|
|
class Serializer(t.Generic[_TSerialized]):
|
|
"""A serializer wraps a :class:`~itsdangerous.signer.Signer` to
|
|
enable serializing and securely signing data other than bytes. It
|
|
can unsign to verify that the data hasn't been changed.
|
|
|
|
The serializer provides :meth:`dumps` and :meth:`loads`, similar to
|
|
:mod:`json`, and by default uses :mod:`json` internally to serialize
|
|
the data to bytes.
|
|
|
|
The secret key should be a random string of ``bytes`` and should not
|
|
be saved to code or version control. Different salts should be used
|
|
to distinguish signing in different contexts. See :doc:`/concepts`
|
|
for information about the security of the secret key and salt.
|
|
|
|
:param secret_key: The secret key to sign and verify with. Can be a
|
|
list of keys, oldest to newest, to support key rotation.
|
|
:param salt: Extra key to combine with ``secret_key`` to distinguish
|
|
signatures in different contexts.
|
|
:param serializer: An object that provides ``dumps`` and ``loads``
|
|
methods for serializing data to a string. Defaults to
|
|
:attr:`default_serializer`, which defaults to :mod:`json`.
|
|
:param serializer_kwargs: Keyword arguments to pass when calling
|
|
``serializer.dumps``.
|
|
:param signer: A ``Signer`` class to instantiate when signing data.
|
|
Defaults to :attr:`default_signer`, which defaults to
|
|
:class:`~itsdangerous.signer.Signer`.
|
|
:param signer_kwargs: Keyword arguments to pass when instantiating
|
|
the ``Signer`` class.
|
|
:param fallback_signers: List of signer parameters to try when
|
|
unsigning with the default signer fails. Each item can be a dict
|
|
of ``signer_kwargs``, a ``Signer`` class, or a tuple of
|
|
``(signer, signer_kwargs)``. Defaults to
|
|
:attr:`default_fallback_signers`.
|
|
|
|
.. versionchanged:: 2.0
|
|
Added support for key rotation by passing a list to
|
|
``secret_key``.
|
|
|
|
.. versionchanged:: 2.0
|
|
Removed the default SHA-512 fallback signer from
|
|
``default_fallback_signers``.
|
|
|
|
.. versionchanged:: 1.1
|
|
Added support for ``fallback_signers`` and configured a default
|
|
SHA-512 fallback. This fallback is for users who used the yanked
|
|
1.0.0 release which defaulted to SHA-512.
|
|
|
|
.. versionchanged:: 0.14
|
|
The ``signer`` and ``signer_kwargs`` parameters were added to
|
|
the constructor.
|
|
"""
|
|
|
|
#: The default serialization module to use to serialize data to a
|
|
#: string internally. The default is :mod:`json`, but can be changed
|
|
#: to any object that provides ``dumps`` and ``loads`` methods.
|
|
default_serializer: _PDataSerializer[t.Any] = json
|
|
|
|
#: The default ``Signer`` class to instantiate when signing data.
|
|
#: The default is :class:`itsdangerous.signer.Signer`.
|
|
default_signer: type[Signer] = Signer
|
|
|
|
#: The default fallback signers to try when unsigning fails.
|
|
default_fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
] = []
|
|
|
|
# Serializer[str] if no data serializer is provided, or if it returns str.
|
|
@t.overload
|
|
def __init__(
|
|
self: Serializer[str],
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None = b"itsdangerous",
|
|
serializer: None | _PDataSerializer[str] = None,
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
): ...
|
|
|
|
# Serializer[bytes] with a bytes data serializer positional argument.
|
|
@t.overload
|
|
def __init__(
|
|
self: Serializer[bytes],
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None,
|
|
serializer: _PDataSerializer[bytes],
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
): ...
|
|
|
|
# Serializer[bytes] with a bytes data serializer keyword argument.
|
|
@t.overload
|
|
def __init__(
|
|
self: Serializer[bytes],
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None = b"itsdangerous",
|
|
*,
|
|
serializer: _PDataSerializer[bytes],
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
): ...
|
|
|
|
# Fall back with a positional argument. If the strict signature of
|
|
# _PDataSerializer doesn't match, fall back to a union, requiring the user
|
|
# to specify the type.
|
|
@t.overload
|
|
def __init__(
|
|
self,
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None,
|
|
serializer: t.Any,
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
): ...
|
|
|
|
# Fall back with a keyword argument.
|
|
@t.overload
|
|
def __init__(
|
|
self,
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None = b"itsdangerous",
|
|
*,
|
|
serializer: t.Any,
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
): ...
|
|
|
|
def __init__(
|
|
self,
|
|
secret_key: str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes],
|
|
salt: str | bytes | None = b"itsdangerous",
|
|
serializer: t.Any | None = None,
|
|
serializer_kwargs: dict[str, t.Any] | None = None,
|
|
signer: type[Signer] | None = None,
|
|
signer_kwargs: dict[str, t.Any] | None = None,
|
|
fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
]
|
|
| None = None,
|
|
):
|
|
#: The list of secret keys to try for verifying signatures, from
|
|
#: oldest to newest. The newest (last) key is used for signing.
|
|
#:
|
|
#: This allows a key rotation system to keep a list of allowed
|
|
#: keys and remove expired ones.
|
|
self.secret_keys: list[bytes] = _make_keys_list(secret_key)
|
|
|
|
if salt is not None:
|
|
salt = want_bytes(salt)
|
|
# if salt is None then the signer's default is used
|
|
|
|
self.salt = salt
|
|
|
|
if serializer is None:
|
|
serializer = self.default_serializer
|
|
|
|
self.serializer: _PDataSerializer[_TSerialized] = serializer
|
|
self.is_text_serializer: bool = is_text_serializer(serializer)
|
|
|
|
if signer is None:
|
|
signer = self.default_signer
|
|
|
|
self.signer: type[Signer] = signer
|
|
self.signer_kwargs: dict[str, t.Any] = signer_kwargs or {}
|
|
|
|
if fallback_signers is None:
|
|
fallback_signers = list(self.default_fallback_signers)
|
|
|
|
self.fallback_signers: list[
|
|
dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]
|
|
] = fallback_signers
|
|
self.serializer_kwargs: dict[str, t.Any] = serializer_kwargs or {}
|
|
|
|
@property
|
|
def secret_key(self) -> bytes:
|
|
"""The newest (last) entry in the :attr:`secret_keys` list. This
|
|
is for compatibility from before key rotation support was added.
|
|
"""
|
|
return self.secret_keys[-1]
|
|
|
|
def load_payload(
|
|
self, payload: bytes, serializer: _PDataSerializer[t.Any] | None = None
|
|
) -> t.Any:
|
|
"""Loads the encoded object. This function raises
|
|
:class:`.BadPayload` if the payload is not valid. The
|
|
``serializer`` parameter can be used to override the serializer
|
|
stored on the class. The encoded ``payload`` should always be
|
|
bytes.
|
|
"""
|
|
if serializer is None:
|
|
use_serializer = self.serializer
|
|
is_text = self.is_text_serializer
|
|
else:
|
|
use_serializer = serializer
|
|
is_text = is_text_serializer(serializer)
|
|
|
|
try:
|
|
if is_text:
|
|
return use_serializer.loads(payload.decode("utf-8")) # type: ignore[arg-type]
|
|
|
|
return use_serializer.loads(payload) # type: ignore[arg-type]
|
|
except Exception as e:
|
|
raise BadPayload(
|
|
"Could not load the payload because an exception"
|
|
" occurred on unserializing the data.",
|
|
original_error=e,
|
|
) from e
|
|
|
|
def dump_payload(self, obj: t.Any) -> bytes:
|
|
"""Dumps the encoded object. The return value is always bytes.
|
|
If the internal serializer returns text, the value will be
|
|
encoded as UTF-8.
|
|
"""
|
|
return want_bytes(self.serializer.dumps(obj, **self.serializer_kwargs))
|
|
|
|
def make_signer(self, salt: str | bytes | None = None) -> Signer:
|
|
"""Creates a new instance of the signer to be used. The default
|
|
implementation uses the :class:`.Signer` base class.
|
|
"""
|
|
if salt is None:
|
|
salt = self.salt
|
|
|
|
return self.signer(self.secret_keys, salt=salt, **self.signer_kwargs)
|
|
|
|
def iter_unsigners(self, salt: str | bytes | None = None) -> cabc.Iterator[Signer]:
|
|
"""Iterates over all signers to be tried for unsigning. Starts
|
|
with the configured signer, then constructs each signer
|
|
specified in ``fallback_signers``.
|
|
"""
|
|
if salt is None:
|
|
salt = self.salt
|
|
|
|
yield self.make_signer(salt)
|
|
|
|
for fallback in self.fallback_signers:
|
|
if isinstance(fallback, dict):
|
|
kwargs = fallback
|
|
fallback = self.signer
|
|
elif isinstance(fallback, tuple):
|
|
fallback, kwargs = fallback
|
|
else:
|
|
kwargs = self.signer_kwargs
|
|
|
|
for secret_key in self.secret_keys:
|
|
yield fallback(secret_key, salt=salt, **kwargs)
|
|
|
|
def dumps(self, obj: t.Any, salt: str | bytes | None = None) -> _TSerialized:
|
|
"""Returns a signed string serialized with the internal
|
|
serializer. The return value can be either a byte or unicode
|
|
string depending on the format of the internal serializer.
|
|
"""
|
|
payload = want_bytes(self.dump_payload(obj))
|
|
rv = self.make_signer(salt).sign(payload)
|
|
|
|
if self.is_text_serializer:
|
|
return rv.decode("utf-8") # type: ignore[return-value]
|
|
|
|
return rv # type: ignore[return-value]
|
|
|
|
def dump(self, obj: t.Any, f: t.IO[t.Any], salt: str | bytes | None = None) -> None:
|
|
"""Like :meth:`dumps` but dumps into a file. The file handle has
|
|
to be compatible with what the internal serializer expects.
|
|
"""
|
|
f.write(self.dumps(obj, salt))
|
|
|
|
def loads(
|
|
self, s: str | bytes, salt: str | bytes | None = None, **kwargs: t.Any
|
|
) -> t.Any:
|
|
"""Reverse of :meth:`dumps`. Raises :exc:`.BadSignature` if the
|
|
signature validation fails.
|
|
"""
|
|
s = want_bytes(s)
|
|
last_exception = None
|
|
|
|
for signer in self.iter_unsigners(salt):
|
|
try:
|
|
return self.load_payload(signer.unsign(s))
|
|
except BadSignature as err:
|
|
last_exception = err
|
|
|
|
raise t.cast(BadSignature, last_exception)
|
|
|
|
def load(self, f: t.IO[t.Any], salt: str | bytes | None = None) -> t.Any:
|
|
"""Like :meth:`loads` but loads from a file."""
|
|
return self.loads(f.read(), salt)
|
|
|
|
def loads_unsafe(
|
|
self, s: str | bytes, salt: str | bytes | None = None
|
|
) -> tuple[bool, t.Any]:
|
|
"""Like :meth:`loads` but without verifying the signature. This
|
|
is potentially very dangerous to use depending on how your
|
|
serializer works. The return value is ``(signature_valid,
|
|
payload)`` instead of just the payload. The first item will be a
|
|
boolean that indicates if the signature is valid. This function
|
|
never fails.
|
|
|
|
Use it for debugging only and if you know that your serializer
|
|
module is not exploitable (for example, do not use it with a
|
|
pickle serializer).
|
|
|
|
.. versionadded:: 0.15
|
|
"""
|
|
return self._loads_unsafe_impl(s, salt)
|
|
|
|
def _loads_unsafe_impl(
|
|
self,
|
|
s: str | bytes,
|
|
salt: str | bytes | None,
|
|
load_kwargs: dict[str, t.Any] | None = None,
|
|
load_payload_kwargs: dict[str, t.Any] | None = None,
|
|
) -> tuple[bool, t.Any]:
|
|
"""Low level helper function to implement :meth:`loads_unsafe`
|
|
in serializer subclasses.
|
|
"""
|
|
if load_kwargs is None:
|
|
load_kwargs = {}
|
|
|
|
try:
|
|
return True, self.loads(s, salt=salt, **load_kwargs)
|
|
except BadSignature as e:
|
|
if e.payload is None:
|
|
return False, None
|
|
|
|
if load_payload_kwargs is None:
|
|
load_payload_kwargs = {}
|
|
|
|
try:
|
|
return (
|
|
False,
|
|
self.load_payload(e.payload, **load_payload_kwargs),
|
|
)
|
|
except BadPayload:
|
|
return False, None
|
|
|
|
def load_unsafe(
|
|
self, f: t.IO[t.Any], salt: str | bytes | None = None
|
|
) -> tuple[bool, t.Any]:
|
|
"""Like :meth:`loads_unsafe` but loads from a file.
|
|
|
|
.. versionadded:: 0.15
|
|
"""
|
|
return self.loads_unsafe(f.read(), salt=salt)
|