o
    tfi                     @  s*  d Z ddlmZ ddlZddlZddlZddlZddlZddlZddl	Z
ddlZddlmZmZ ddlmZ ddlmZmZmZ ddlmZmZmZmZmZ ddlmZ dd	lmZ d
dlm Z m!Z! d
dl"m#Z# e$dZ%eG dd dZ&dddZ'G dd deZ(G dd de(Z)G dd de)Z*dS )zIdentity Provider interface

This defines the _authentication_ layer of Jupyter Server,
to be used in combination with Authorizer for _authorization_.

.. versionadded:: 2.0
    )annotationsN)asdict	dataclass)Morsel)escapehttputilweb)BoolDictTypeUnicodedefault)LoggingConfigurable)_i18n   )passwd_checkset_password)get_anonymous_usernamez[^A-Za-z0-9]c                   @  sf   e Zd ZU dZded< dZded< dZded< dZded	< dZded
< dZ	ded< dd Z
dd ZdS )UserziObject representing a User

    This or a subclass should be returned from IdentityProvider.get_user
    strusername namedisplay_nameN
str | Noneinitials
avatar_urlcolorc                 C  s   |    d S N)fill_defaultsself r"   e/var/www/html/software/conda/envs/catlas/lib/python3.10/site-packages/jupyter_server/auth/identity.py__post_init__:   s   zUser.__post_init__c                 C  s<   | j sd|  }t|| js| j | _| js| j| _dS dS )zFill out default fields in the identity model

        - Ensures all values are defined
        - Fills out derivative values for name fields fields
        - Fills out null values for optional fields
        z!user.username must not be empty: N)r   
ValueErrorr   r   )r!   msgr"   r"   r#   r   =   s   	
zUser.fill_defaults)__name__
__module____qualname____doc____annotations__r   r   r   r   r   r$   r   r"   r"   r"   r#   r   "   s   
 r   got_usert.Anyreturnc                 C  s   t | tr
t| dS t | trIi }d| vrd| v r| d |d< tjD ]}|| v r.| | ||< q"ztdi |W S  tyH   d|  }t|dw d|  }t|)a  Backward-compatibility for LoginHandler.get_user

    Prior to 2.0, LoginHandler.get_user could return anything truthy.

    Typically, this was either a simple string username,
    or a simple dict.

    Make some effort to allow common patterns to keep working.
    )r   r   r   zUnrecognized user: Nr"   )
isinstancer   r   dict__dataclass_fields__	TypeErrorr%   )r,   kwargsfieldr&   r"   r"   r#   _backward_compat_userQ   s$   







r5   c                   @  s  e Zd ZU dZeddeddZded< ededdZ	e
d	dded
dZded< ededdZededdjddZded< edejdeddZedejdeddZdZeddd Ze
dZded< d_d"d#Zd`d%d&Zdad*d+Zdbd-d.Zdcd0d1Zddd3d4Zded5d6Zdfd8d9Z		dgdhd?d@Z didAdBZ!d_dCdDZ"e#$dEe#j%Z&djdFdGZ'd`dHdIZ(dkdJdKZ)dldMdNZ*dldOdPZ+		dmdndUdVZ,d`dWdXZ-e.dYdZ Z/e.d[d\ Z0e.d]d^ Z1d	S )oIdentityProvideraC  
    Interface for providing identity management and authentication.

    Two principle methods:

    - :meth:`~jupyter_server.auth.IdentityProvider.get_user` returns a :class:`~.User` object
      for successful authentication, or None for no-identity-found.
    - :meth:`~jupyter_server.auth.IdentityProvider.identity_model` turns a :class:`~jupyter_server.auth.User` into a JSONable dict.
      The default is to use :py:meth:`dataclasses.asdict`,
      and usually shouldn't need override.

    Additional methods can customize authentication.

    .. versionadded:: 2.0
    r   TzJName of the cookie to set for persisting login. Default: username-${Host}.confighelpzstr | Unicode[str, str | bytes]cookie_nameziExtra keyword arguments to pass to `set_secure_cookie`. See tornado's set_secure_cookie docs for details.NzSpecify whether login cookie should have the `secure` property (HTTPS-only).Only needed when protocol-detection gives the wrong answer due to proxies.)
allow_noner8   r9   z+bool | Bool[bool | None, bool | int | None]secure_cookieziExtra keyword arguments to pass to `get_secure_cookie`. See tornado's get_secure_cookie docs for details.z<generated>a  Token used for authenticating first-time connections to the server.

        The token can be read from the file referenced by JUPYTER_TOKEN_FILE or set directly
        with the JUPYTER_TOKEN environment variable.

        When no password is enabled,
        the default is to generate a new, random token.

        Setting to an empty string disables authentication altogether, which is NOT RECOMMENDED.

        Prior to 2.0: configured as ServerApp.token
        )r9   )r8   tokenz*jupyter_server.auth.login.LoginFormHandlerz'The login handler class to use, if any.)default_valueklassr8   r9   z(jupyter_server.auth.logout.LogoutHandlerz The logout handler class to use.Fc                 C  s   t drd| _t jd S t dr0d| _tt jd }| W  d    S 1 s+w   Y  | js8d| _dS d| _tt 	d
dS )NZJUPYTER_TOKENFZJUPYTER_TOKEN_FILEr   T   ascii)osgetenvtoken_generatedenvironopenread
need_tokenbinasciihexlifyurandomdecode)r!   Z
token_filer"   r"   r#   _token_default   s   


 zIdentityProvider._token_defaultz%bool | Bool[bool, t.Union[bool, int]]rH   handlerweb.RequestHandlerr.   &User | None | t.Awaitable[User | None]c                 C  s
   |  |S )zGet the authenticated user for a request

        Must return a :class:`jupyter_server.auth.User`,
        though it may be a subclass.

        Return None if the request is not authenticated.

        _may_ be a coroutine
        )	_get_userr!   rN   r"   r"   r#   get_user   s   

zIdentityProvider.get_userUser | Nonec           	        s   t |ddrtt|jS | |}t|tjr|I dH }|}| |}t|tjr0|I dH }|}|p5|}|durK|durK||krH| 	|| d|_
|du ry| |}||}|durk| jd|  | | | jsy| |}| 	|| |S )Get the user._jupyter_current_userNTz&Clearing invalid/expired login cookie )getattrtcastr   rV   get_user_tokenr/   	Awaitableget_user_cookieset_login_cookie_token_authenticatedget_cookie_nameZ
get_cookielogwarningclear_login_cookieauth_enabledgenerate_anonymous_user)	r!   rN   Z_token_userZ
token_userZ_cookie_userZcookie_useruserr:   cookier"   r"   r#   rQ      s4   







zIdentityProvider._get_userre   r   dict[str, t.Any]c                 C  s   t |S )z"Return a User as an Identity model)r   )r!   re   r"   r"   r#   identity_model  s   zIdentityProvider.identity_modellist[tuple[str, object]]c                 C  s4   g }| j r|d| jf | jr|d| jf |S )zwReturn list of additional handlers for this identity provider

        For example, an OAuth callback handler.
        z/loginz/logout)login_availableappendlogin_handler_classlogout_availablelogout_handler_class)r!   handlersr"   r"   r#   get_handlers  s   zIdentityProvider.get_handlersr   c                 C  s$   t |j|j|j|j|jd}|S )zSerialize a user to a string for storage in a cookie

        If overriding in a subclass, make sure to define user_from_cookie as well.

        Default is just the user's username.
        )r   r   r   r   r   )jsondumpsr   r   r   r   r   )r!   re   rf   r"   r"   r#   user_to_cookie!  s   	zIdentityProvider.user_to_cookiecookie_valuec                 C  s0   t |}t|d |d |d |d d|d S )zInverse of user_to_cookier   r   r   r   Nr   )rq   loadsr   )r!   rt   re   r"   r"   r#   user_from_cookie4  s   
z!IdentityProvider.user_from_cookiec                 C  s"   | j r| j S tdd|jj S )zReturn the login cookie name

        Uses IdentityProvider.cookie_name, if defined.
        Default is to generate a string taking host into account to avoid
        collisions for multiple servers on one hostname with different ports.
        -z	username-)r:   _non_alphanumsubrequesthostrR   r"   r"   r#   r_   @  s   z IdentityProvider.get_cookie_nameNonec                 C  s|   i }| | j |dd | j}|du r|jjdk}|r#|dd |d|j | |}|j|| 	|fi | dS )z9Call this on handlers to set the login cookie for successhttponlyTNhttpssecurepath)
updatecookie_options
setdefaultr<   rz   protocolbase_urlr_   Zset_secure_cookiers   )r!   rN   re   r   r<   r:   r"   r"   r#   r]   L  s   
z!IdentityProvider.set_login_cookie/r   r   domainr   c                 C  sr   t |}tjjtjjdtjdd }t }||dd t	
||d< ||d< |r/||d< |d	|  d
S )a  Deletes the cookie with the given name.

        Tornado's cookie handling currently (Jan 2018) stores cookies in a dict
        keyed by name, so it can only modify one cookie with a given name per
        response. The browser can store multiple cookies with the same name
        but different domains and/or paths. This method lets us clear multiple
        cookies with the same name.

        Due to limitations of the cookie protocol, you must pass the same
        path and domain to clear a cookie as were used when that cookie
        was set (but there is no way to find out on the server side
        which values were used for a given cookie).
        )tzim  )daysr   z""expiresr   r   z
Set-CookieN)r   Z
native_strdatetimenowtimezoneutc	timedeltar   setr   Zformat_timestamp
add_headerOutputString)r!   rN   r   r   r   r   morselr"   r"   r#   _force_clear_cookie\  s   
z$IdentityProvider._force_clear_cookiec                 C  sZ   i }| | j |d|j}| |}|j||d |r)|dkr+| || dS dS dS )z<Clear the login cookie, effectively logging out the session.r   )r   r   N)r   r   r   r   r_   Zclear_cookier   )r!   rN   r   r   r:   r"   r"   r#   rb   w  s   
z#IdentityProvider.clear_login_cookiec              
   C  s   |j | |fi | j}|sdS | }z| |W S  tyB } z| jjd| dd | jd|  W Y d}~dS d}~ww )z[Get user from a cookie

        Calls user_from_cookie to deserialize cookie value
        Nz)Error unpacking user from cookie: cookie=T)exc_infoz"Error unpacking user from cookie: )	Zget_secure_cookier_   get_secure_cookie_kwargsrL   rv   	Exceptionr`   debugerror)r!   rN   Z_user_cookieZuser_cookieer"   r"   r#   r\     s    z IdentityProvider.get_user_cookiez(token|bearer)\s+(.+)c                 C  s:   | dd}|s| j|jjdd}|r|d}|S )zGet the user token from a request

        Default:

        - in URL parameters: ?token=<token>
        - in header: Authorization: token <token>
        r=   r   Authorization   )get_argumentauth_header_patmatchrz   headersgetgroup)r!   rN   
user_tokenmr"   r"   r#   	get_token  s   
zIdentityProvider.get_tokenc                   s   t d|j}|sdS | |}d}||kr"| jd|jj d}|rA| |}t	|t j
r4|I dH }|}|du r?| |}|S dS )zIdentify the user based on a token in the URL or Authorization header

        Returns:
        - uuid if authenticated
        - None if not
        r   NFz-Accepting token-authenticated request from %sT)rX   rY   r=   r   r`   r   rz   Z	remote_ipr\   r/   r[   rd   )r!   rN   r=   r   authenticated_userre   r"   r"   r#   rZ     s*   



zIdentityProvider.get_user_tokenc                 C  sT   t  j}t }d|  }}d|d  }d}|jd|  t||||d|S )zGenerate a random anonymous user.

        For use when a single shared token is used,
        but does not identify a user.
        z
Anonymous Ar   Nz5Generating new user for token-authenticated request: )uuiduuid4hexr   r`   r   r   )r!   rN   Zuser_idmoonr   r   r   r   r"   r"   r#   rd     s   
z(IdentityProvider.generate_anonymous_userboolc                 C  s   |  | S )a3  Should the Handler check for CORS origin validation?

        Origin check should be skipped for token-authenticated requests.

        Returns:
        - True, if Handler must check for valid CORS origin.
        - False, if Handler should skip origin check since requests are token-authenticated.
        )is_token_authenticatedrR   r"   r"   r#   should_check_origin  s   	z$IdentityProvider.should_check_originc                 C  s   |j  t|ddS )zReturns True if handler has been token authenticated. Otherwise, False.

        Login with a token is used to signal certain things, such as:

        - permit access to REST API
        - xsrf protection
        - skip origin-checks for scripts
        r^   F)current_userrW   rR   r"   r"   r#   r     s   
z'IdentityProvider.is_token_authenticatedappr-   ssl_optionsdict[str, t.Any] | Nonec                 C  s^   |j s"d}|du r|j| d | js |j| d dS dS | js-|jd dS dS )z~Check the application's security.

        Show messages, or abort if necessary, based on the security configuration.
        z<WARNING: The Jupyter server is listening on all IP addressesNz3 and not using encryption. This is not recommended.zK and not using authentication. This is highly insecure and not recommended.z`All authentication is disabled.  Anyone who can connect to this server will be able to run code.)ipr`   ra   rc   )r!   r   r   ra   r"   r"   r#   validate_security  s   	z"IdentityProvider.validate_securityc                 C  sT   |j ddd}d}| js| jd | |S | jr(| j|kr(tt| 	|S |S )_Process login form data

        Return authenticated User if successful, None if not.
        passwordr   r   N6Accepting anonymous login because auth fully disabled!)
r   rc   r`   ra   rd   r=   rX   rY   r   Zuser_for_token)r!   rN   typed_passwordre   r"   r"   r#   process_login_form  s   
z#IdentityProvider.process_login_formc                 C     dS )zIs authentication enabled?

        Should always be True, but may be False in rare, insecure cases
        where requests with no auth are allowed.

        Previously: LoginHandler.get_login_available
        Tr"   r    r"   r"   r#   rc     s   	zIdentityProvider.auth_enabledc                 C     | j S z\Whether a LoginHandler is needed - and therefore whether the login page should be displayed.rc   r    r"   r"   r#   rj   *     z IdentityProvider.login_availablec                 C  r   )z"Whether a LogoutHandler is needed.Tr"   r    r"   r"   r#   rm   /  s   z!IdentityProvider.logout_available)rN   rO   r.   rP   rN   rO   r.   rT   )re   r   r.   rg   )r.   ri   )re   r   r.   r   )rt   r   r.   rT   )rN   rO   r.   r   )rN   rO   re   r   r.   r|   )r   N)
rN   rO   r   r   r   r   r   r   r.   r|   )rN   rO   r.   r|   )rN   rO   r.   r   )rN   rO   r.   r   rN   rO   r.   r   r   r   r-   r   r   r.   r|   )2r'   r(   r)   r*   r   r   r:   r+   r
   r   r	   r<   r   tagr=   r   r   ZRequestHandlerrl   rn   rD   r   rM   rH   rS   rQ   rh   rp   rs   rv   r_   r]   r   rb   r\   recompile
IGNORECASEr   r   rZ   rd   r   r   r   r   propertyrc   rj   rm   r"   r"   r"   r#   r6   n   s   
 




-









#





r6   c                      s   e Zd ZdZeddeddZeddeddZeddeddZ	e
d	d
d Zed!ddZed!ddZdd Zd"ddZ	d#d$ fdd Z  ZS )%PasswordIdentityProviderzA password identity provider.r   Ta  
            Hashed password to use for web authentication.

            To generate, type in a python/IPython shell:

                from jupyter_server.auth import passwd; passwd()

            The string should be of the form type:salt:hashed-password.
            r7   Fao  
            Forces users to use a password for the Jupyter server.
            This is useful in a multi user environment, for instance when
            everybody in the LAN can access each other's machine through ssh.

            In such a case, serving on localhost is not secure since
            any user can connect to the Jupyter server via ssh.

            a  
            Allow password to be changed at login for the Jupyter server.

            While logging in with a token, the Jupyter server UI will give the opportunity to
            the user to enter a new password at the same time that will replace
            the token login mechanism.

            This can be set to False to prevent changing password from the UI/API.
            rH   c                 C  s   t | j S r   )r   hashed_passwordr    r"   r"   r#   _need_token_defaulth     z,PasswordIdentityProvider._need_token_defaultr.   r   c                 C  r   r   r   r    r"   r"   r#   rj   l  r   z(PasswordIdentityProvider.login_availablec                 C  s   t | jp| jS )z"Return whether any auth is enabled)r   r   r=   r    r"   r"   r#   rc   q  s   z%PasswordIdentityProvider.auth_enabledc                 C  s   t | j|S )z1Check password against our stored hashed password)r   r   )r!   r   r"   r"   r#   r   v  r   z%PasswordIdentityProvider.passwd_checkrN   rO   rT   c                 C  s   |j ddd}|j ddd}d}| js| jd | |S | |r*|s*| |S | jr\| j|kr\| |}|r\| jr\|j	dd}t
j|d}t||d	| _| jtd
|  |S )r   r   r   r   new_passwordNr   
config_dirzjupyter_server_config.json)config_filezWrote hashed password to )r   rc   r`   ra   rd   r   r=   allow_password_changesettingsr   rB   r   joinr   r   infor   )r!   rN   r   r   re   r   r   r"   r"   r#   r   z  s    



z+PasswordIdentityProvider.process_login_formNr   r-   r   r   r|   c                   s`   t  || | jr,| js.| jtd | jtd | jtd td dS dS dS )zHandle security validation.>Jupyter servers are configured to only be run with a password.1Hint: run the following command to set a password)	$ python -m jupyter_server.auth passwordr   N)	superr   password_requiredr   r`   criticalr   sysexitr!   r   r   	__class__r"   r#   r     s   z*PasswordIdentityProvider.validate_securityr.   r   r   r   r   )r'   r(   r)   r*   r   r   r   r	   r   r   r   r   r   rj   rc   r   r   r   __classcell__r"   r"   r   r#   r   5  sB    

r   c                   @  s|   e Zd ZdZe Zeddd Zeddd Ze	dd	 Z
dddZe	d ddZd!ddZd!ddZ	d"d#ddZdS )$LegacyIdentityProviderzLegacy IdentityProvider for use with custom LoginHandlers

    Login configuration has moved from LoginHandler to IdentityProvider
    in Jupyter Server 2.0.
    r   c                 C  s   | j | jdS )N)r=   r   )r=   r   r    r"   r"   r#   _default_settings  s   z(LegacyIdentityProvider._default_settingsrl   c                 C  s   ddl m} |S )Nr   )LegacyLoginHandler)loginr   )r!   r   r"   r"   r#   _default_login_handler_class  s   z3LegacyIdentityProvider._default_login_handler_classc                 C  r   r   )rj   r    r"   r"   r#   rc     s   z#LegacyIdentityProvider.auth_enabledrN   rO   r.   rT   c                 C  s    | j |}|du rdS t|S )rU   N)rl   rS   r5   )r!   rN   re   r"   r"   r#   rS     s   zLegacyIdentityProvider.get_userr   c                 C  s   t | j| jS r   )r   rl   Zget_login_availabler   r    r"   r"   r#   rj     s
   z&LegacyIdentityProvider.login_availablec                 C     t | j|S )zWhether we should check origin.)r   rl   r   rR   r"   r"   r#   r        z*LegacyIdentityProvider.should_check_originc                 C  r   )z#Whether we are token authenticated.)r   rl   r   rR   r"   r"   r#   r     r   z-LegacyIdentityProvider.is_token_authenticatedNr   r-   r   r   r|   c                 C  sX   | j r#| js#| jtd | jtd | jtd td | j|| dS )zValidate security.r   r   r   r   N)	r   r   r`   r   r   r   r   rl   r   r   r"   r"   r#   r     s   
z(LegacyIdentityProvider.validate_securityr   r   r   r   r   )r'   r(   r)   r*   r
   r   r   r   r   r   rc   rS   rj   r   r   r   r"   r"   r"   r#   r     s     





r   )r,   r-   r.   r   )+r*   
__future__r   rI   r   rq   rB   r   r   typingrX   r   dataclassesr   r   http.cookiesr   tornador   r   r   Z	traitletsr	   r
   r   r   r   Ztraitlets.configr   Zjupyter_server.transutilsr   securityr   r   utilsr   r   rx   r   r5   r6   r   r   r"   r"   r"   r#   <module>   s8    

.   Jm