2019-12-02 21:46:54 +00:00
|
|
|
import time
|
2022-01-24 04:07:52 +00:00
|
|
|
import typing
|
|
|
|
import typing as _t
|
2019-12-02 21:46:54 +00:00
|
|
|
from datetime import datetime
|
2022-01-24 04:07:52 +00:00
|
|
|
from datetime import timezone
|
2019-12-02 21:46:54 +00:00
|
|
|
|
|
|
|
from .encoding import base64_decode
|
|
|
|
from .encoding import base64_encode
|
|
|
|
from .encoding import bytes_to_int
|
|
|
|
from .encoding import int_to_bytes
|
|
|
|
from .encoding import want_bytes
|
|
|
|
from .exc import BadSignature
|
|
|
|
from .exc import BadTimeSignature
|
|
|
|
from .exc import SignatureExpired
|
|
|
|
from .serializer import Serializer
|
|
|
|
from .signer import Signer
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
_t_str_bytes = _t.Union[str, bytes]
|
|
|
|
_t_opt_str_bytes = _t.Optional[_t_str_bytes]
|
|
|
|
_t_opt_int = _t.Optional[int]
|
|
|
|
|
|
|
|
if _t.TYPE_CHECKING:
|
|
|
|
import typing_extensions as _te
|
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
|
|
|
|
class TimestampSigner(Signer):
|
|
|
|
"""Works like the regular :class:`.Signer` but also records the time
|
|
|
|
of the signing and can be used to expire signatures. The
|
|
|
|
:meth:`unsign` method can raise :exc:`.SignatureExpired` if the
|
|
|
|
unsigning failed because the signature is expired.
|
|
|
|
"""
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def get_timestamp(self) -> int:
|
2019-12-02 21:46:54 +00:00
|
|
|
"""Returns the current timestamp. The function must return an
|
|
|
|
integer.
|
|
|
|
"""
|
|
|
|
return int(time.time())
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def timestamp_to_datetime(self, ts: int) -> datetime:
|
|
|
|
"""Convert the timestamp from :meth:`get_timestamp` into an
|
|
|
|
aware :class`datetime.datetime` in UTC.
|
|
|
|
|
|
|
|
.. versionchanged:: 2.0
|
|
|
|
The timestamp is returned as a timezone-aware ``datetime``
|
|
|
|
in UTC rather than a naive ``datetime`` assumed to be UTC.
|
2019-12-02 21:46:54 +00:00
|
|
|
"""
|
2022-01-24 04:07:52 +00:00
|
|
|
return datetime.fromtimestamp(ts, tz=timezone.utc)
|
2019-12-02 21:46:54 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def sign(self, value: _t_str_bytes) -> bytes:
|
2019-12-02 21:46:54 +00:00
|
|
|
"""Signs the given string and also attaches time information."""
|
|
|
|
value = want_bytes(value)
|
|
|
|
timestamp = base64_encode(int_to_bytes(self.get_timestamp()))
|
|
|
|
sep = want_bytes(self.sep)
|
|
|
|
value = value + sep + timestamp
|
|
|
|
return value + sep + self.get_signature(value)
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
# Ignore overlapping signatures check, return_timestamp is the only
|
|
|
|
# parameter that affects the return type.
|
|
|
|
|
|
|
|
@typing.overload
|
|
|
|
def unsign( # type: ignore
|
|
|
|
self,
|
|
|
|
signed_value: _t_str_bytes,
|
|
|
|
max_age: _t_opt_int = None,
|
|
|
|
return_timestamp: "_te.Literal[False]" = False,
|
|
|
|
) -> bytes:
|
|
|
|
...
|
|
|
|
|
|
|
|
@typing.overload
|
|
|
|
def unsign(
|
|
|
|
self,
|
|
|
|
signed_value: _t_str_bytes,
|
|
|
|
max_age: _t_opt_int = None,
|
|
|
|
return_timestamp: "_te.Literal[True]" = True,
|
|
|
|
) -> _t.Tuple[bytes, datetime]:
|
|
|
|
...
|
|
|
|
|
|
|
|
def unsign(
|
|
|
|
self,
|
|
|
|
signed_value: _t_str_bytes,
|
|
|
|
max_age: _t_opt_int = None,
|
|
|
|
return_timestamp: bool = False,
|
|
|
|
) -> _t.Union[_t.Tuple[bytes, datetime], bytes]:
|
2019-12-02 21:46:54 +00:00
|
|
|
"""Works like the regular :meth:`.Signer.unsign` but can also
|
|
|
|
validate the time. See the base docstring of the class for
|
|
|
|
the general behavior. If ``return_timestamp`` is ``True`` the
|
2022-01-24 04:07:52 +00:00
|
|
|
timestamp of the signature will be returned as an aware
|
2019-12-02 21:46:54 +00:00
|
|
|
:class:`datetime.datetime` object in UTC.
|
2022-01-24 04:07:52 +00:00
|
|
|
|
|
|
|
.. versionchanged:: 2.0
|
|
|
|
The timestamp is returned as a timezone-aware ``datetime``
|
|
|
|
in UTC rather than a naive ``datetime`` assumed to be UTC.
|
2019-12-02 21:46:54 +00:00
|
|
|
"""
|
|
|
|
try:
|
2022-01-24 04:07:52 +00:00
|
|
|
result = super().unsign(signed_value)
|
2019-12-02 21:46:54 +00:00
|
|
|
sig_error = None
|
|
|
|
except BadSignature as e:
|
|
|
|
sig_error = e
|
|
|
|
result = e.payload or b""
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
sep = want_bytes(self.sep)
|
|
|
|
|
|
|
|
# If there is no timestamp in the result there is something
|
|
|
|
# seriously wrong. In case there was a signature error, we raise
|
|
|
|
# that one directly, otherwise we have a weird situation in
|
|
|
|
# which we shouldn't have come except someone uses a time-based
|
|
|
|
# serializer on non-timestamp data, so catch that.
|
|
|
|
if sep not in result:
|
|
|
|
if sig_error:
|
|
|
|
raise sig_error
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
raise BadTimeSignature("timestamp missing", payload=result)
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
value, ts_bytes = result.rsplit(sep, 1)
|
|
|
|
ts_int: _t_opt_int = None
|
|
|
|
ts_dt: _t.Optional[datetime] = None
|
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
try:
|
2022-01-24 04:07:52 +00:00
|
|
|
ts_int = bytes_to_int(base64_decode(ts_bytes))
|
2019-12-02 21:46:54 +00:00
|
|
|
except Exception:
|
2022-01-24 04:07:52 +00:00
|
|
|
pass
|
2019-12-02 21:46:54 +00:00
|
|
|
|
|
|
|
# Signature is *not* okay. Raise a proper error now that we have
|
|
|
|
# split the value and the timestamp.
|
|
|
|
if sig_error is not None:
|
2022-01-24 04:07:52 +00:00
|
|
|
if ts_int is not None:
|
|
|
|
ts_dt = self.timestamp_to_datetime(ts_int)
|
|
|
|
|
|
|
|
raise BadTimeSignature(str(sig_error), payload=value, date_signed=ts_dt)
|
2019-12-02 21:46:54 +00:00
|
|
|
|
|
|
|
# Signature was okay but the timestamp is actually not there or
|
|
|
|
# malformed. Should not happen, but we handle it anyway.
|
2022-01-24 04:07:52 +00:00
|
|
|
if ts_int is None:
|
2019-12-02 21:46:54 +00:00
|
|
|
raise BadTimeSignature("Malformed timestamp", payload=value)
|
|
|
|
|
|
|
|
# Check timestamp is not older than max_age
|
|
|
|
if max_age is not None:
|
2022-01-24 04:07:52 +00:00
|
|
|
age = self.get_timestamp() - ts_int
|
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
if age > max_age:
|
|
|
|
raise SignatureExpired(
|
2022-01-24 04:07:52 +00:00
|
|
|
f"Signature age {age} > {max_age} seconds",
|
2019-12-02 21:46:54 +00:00
|
|
|
payload=value,
|
2022-01-24 04:07:52 +00:00
|
|
|
date_signed=self.timestamp_to_datetime(ts_int),
|
|
|
|
)
|
|
|
|
|
|
|
|
if age < 0:
|
|
|
|
raise SignatureExpired(
|
|
|
|
f"Signature age {age} < 0 seconds",
|
|
|
|
payload=value,
|
|
|
|
date_signed=self.timestamp_to_datetime(ts_int),
|
2019-12-02 21:46:54 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
if return_timestamp:
|
2022-01-24 04:07:52 +00:00
|
|
|
return value, self.timestamp_to_datetime(ts_int)
|
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
return value
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def validate(self, signed_value: _t_str_bytes, max_age: _t_opt_int = None) -> bool:
|
2019-12-02 21:46:54 +00:00
|
|
|
"""Only validates the given signed value. Returns ``True`` if
|
|
|
|
the signature exists and is valid."""
|
|
|
|
try:
|
|
|
|
self.unsign(signed_value, max_age=max_age)
|
|
|
|
return True
|
|
|
|
except BadSignature:
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
|
|
class TimedSerializer(Serializer):
|
|
|
|
"""Uses :class:`TimestampSigner` instead of the default
|
|
|
|
:class:`.Signer`.
|
|
|
|
"""
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
default_signer: _t.Type[TimestampSigner] = TimestampSigner
|
|
|
|
|
|
|
|
def iter_unsigners(
|
|
|
|
self, salt: _t_opt_str_bytes = None
|
|
|
|
) -> _t.Iterator[TimestampSigner]:
|
|
|
|
return _t.cast("_t.Iterator[TimestampSigner]", super().iter_unsigners(salt))
|
|
|
|
|
|
|
|
# TODO: Signature is incompatible because parameters were added
|
|
|
|
# before salt.
|
2019-12-02 21:46:54 +00:00
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
def loads( # type: ignore
|
|
|
|
self,
|
|
|
|
s: _t_str_bytes,
|
|
|
|
max_age: _t_opt_int = None,
|
|
|
|
return_timestamp: bool = False,
|
|
|
|
salt: _t_opt_str_bytes = None,
|
|
|
|
) -> _t.Any:
|
2019-12-02 21:46:54 +00:00
|
|
|
"""Reverse of :meth:`dumps`, raises :exc:`.BadSignature` if the
|
|
|
|
signature validation fails. If a ``max_age`` is provided it will
|
|
|
|
ensure the signature is not older than that time in seconds. In
|
|
|
|
case the signature is outdated, :exc:`.SignatureExpired` is
|
|
|
|
raised. All arguments are forwarded to the signer's
|
|
|
|
:meth:`~TimestampSigner.unsign` method.
|
|
|
|
"""
|
|
|
|
s = want_bytes(s)
|
|
|
|
last_exception = None
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
for signer in self.iter_unsigners(salt):
|
|
|
|
try:
|
2022-01-24 04:07:52 +00:00
|
|
|
base64d, timestamp = signer.unsign(
|
|
|
|
s, max_age=max_age, return_timestamp=True
|
|
|
|
)
|
2019-12-02 21:46:54 +00:00
|
|
|
payload = self.load_payload(base64d)
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
if return_timestamp:
|
|
|
|
return payload, timestamp
|
2022-01-24 04:07:52 +00:00
|
|
|
|
2019-12-02 21:46:54 +00:00
|
|
|
return payload
|
|
|
|
except SignatureExpired:
|
2022-01-24 04:07:52 +00:00
|
|
|
# The signature was unsigned successfully but was
|
|
|
|
# expired. Do not try the next signer.
|
2019-12-02 21:46:54 +00:00
|
|
|
raise
|
|
|
|
except BadSignature as err:
|
|
|
|
last_exception = err
|
|
|
|
|
2022-01-24 04:07:52 +00:00
|
|
|
raise _t.cast(BadSignature, last_exception)
|
|
|
|
|
|
|
|
def loads_unsafe( # type: ignore
|
|
|
|
self,
|
|
|
|
s: _t_str_bytes,
|
|
|
|
max_age: _t_opt_int = None,
|
|
|
|
salt: _t_opt_str_bytes = None,
|
|
|
|
) -> _t.Tuple[bool, _t.Any]:
|
|
|
|
return self._loads_unsafe_impl(s, salt, load_kwargs={"max_age": max_age})
|