o
    ig                     @  sR  d Z ddlmZ ddlZddlZddlZddlZddlZddlZddl	Z	ddl
mZmZ ddlmZ ddlmZmZmZ ddlmZmZmZ ddlmZmZmZmZmZ dd	lmZ dd
lm Z  ddl!m"Z"m#Z# ddl$m%Z% er|ddl&m'Z' ddl(m)Z) e*dZ+eG dd dZ,dddZ-G dd deZ.G dd de.Z/G dd de/Z0dS )zIdentity Provider interface

This defines the _authentication_ layer of Jupyter Server,
to be used in combination with Authorizer for _authorization_.

.. versionadded:: 2.0
    )annotationsN)asdict	dataclass)Morsel)TYPE_CHECKINGAny	Awaitable)escapehttputilweb)BoolDictTypeUnicodedefault)LoggingConfigurable)_i18n   )passwd_checkset_password)get_anonymous_username)JupyterHandler)	ServerAppz[^A-Za-z0-9]c                   @  sf   e Zd ZU dZded< dZded< dZded< dZded	< dZded
< dZ	ded< dd Z
dd ZdS )UserziObject representing a User

    This or a subclass should be returned from IdentityProvider.get_user
    strusername namedisplay_nameN
str | Noneinitials
avatar_urlcolorc                 C  s   |    d S N)fill_defaultsself r'   W/var/www/edux/Edux_v2/venv/lib/python3.10/site-packages/jupyter_server/auth/identity.py__post_init__>   s   zUser.__post_init__c                 C  s<   | j sd|  }t|| js| j | _| js| j| _dS dS )zFill out default fields in the identity model

        - Ensures all values are defined
        - Fills out derivative values for name fields fields
        - Fills out null values for optional fields
        z!user.username must not be empty: N)r   
ValueErrorr   r   )r&   msgr'   r'   r(   r$   A   s   	
zUser.fill_defaults)__name__
__module____qualname____doc____annotations__r   r   r    r!   r"   r)   r$   r'   r'   r'   r(   r   &   s   
 r   got_userr   returnc                 C  s   t | tr
t| dS t | trIi }d| vrd| v r| d |d< tjD ]}|| v r.| | ||< q"ztdi |W S  tyH   d|  }t|dw d|  }t|)a  Backward-compatibility for LoginHandler.get_user

    Prior to 2.0, LoginHandler.get_user could return anything truthy.

    Typically, this was either a simple string username,
    or a simple dict.

    Make some effort to allow common patterns to keep working.
    )r   r   r   zUnrecognized user: Nr'   )
isinstancer   r   dict__dataclass_fields__	TypeErrorr*   )r1   kwargsfieldr+   r'   r'   r(   _backward_compat_userU   s$   







r9   c                   @  s  e Zd ZU dZeddeddZded< ededdZ	e
d	dded
dZded< ededdZededdjddZded< edejdeddZedejdeddZdZeddd Ze
dZded< d^d!d"Zd_d$d%Zd`d)d*Zdad,d-Zdbd/d0Zdcd2d3Zddd4d5Zded7d8Z		dfdgd>d?Z dhd@dAZ!d^dBdCZ"e#$dDe#j%Z&didEdFZ'd_dGdHZ(djdIdJZ)dkdLdMZ*dkdNdOZ+		dldmdTdUZ,d_dVdWZ-e.dXdY Z/e.dZd[ Z0e.d\d] Z1d	S )nIdentityProvideraC  
    Interface for providing identity management and authentication.

    Two principle methods:

    - :meth:`~jupyter_server.auth.IdentityProvider.get_user` returns a :class:`~.User` object
      for successful authentication, or None for no-identity-found.
    - :meth:`~jupyter_server.auth.IdentityProvider.identity_model` turns a :class:`~jupyter_server.auth.User` into a JSONable dict.
      The default is to use :py:meth:`dataclasses.asdict`,
      and usually shouldn't need override.

    Additional methods can customize authentication.

    .. versionadded:: 2.0
    r   TzJName of the cookie to set for persisting login. Default: username-${Host}.confighelpzstr | Unicodecookie_nameziExtra keyword arguments to pass to `set_secure_cookie`. See tornado's set_secure_cookie docs for details.NzSpecify whether login cookie should have the `secure` property (HTTPS-only).Only needed when protocol-detection gives the wrong answer due to proxies.)
allow_noner<   r=   zbool | Boolsecure_cookieziExtra keyword arguments to pass to `get_secure_cookie`. See tornado's get_secure_cookie docs for details.z<generated>a  Token used for authenticating first-time connections to the server.

        The token can be read from the file referenced by JUPYTER_TOKEN_FILE or set directly
        with the JUPYTER_TOKEN environment variable.

        When no password is enabled,
        the default is to generate a new, random token.

        Setting to an empty string disables authentication altogether, which is NOT RECOMMENDED.

        Prior to 2.0: configured as ServerApp.token
        )r=   )r<   tokenz*jupyter_server.auth.login.LoginFormHandlerz'The login handler class to use, if any.)default_valueklassr<   r=   z(jupyter_server.auth.logout.LogoutHandlerz The logout handler class to use.Fc                 C  s   t drd| _t jd S t dr0d| _tt jd }| W  d    S 1 s+w   Y  | js8d| _dS d| _tt 	d
dS )NJUPYTER_TOKENFJUPYTER_TOKEN_FILEr   T   ascii)osgetenvtoken_generatedenvironopenread
need_tokenbinasciihexlifyurandomdecode)r&   
token_filer'   r'   r(   _token_default   s   


 zIdentityProvider._token_defaultrN   handlerr   r2   $User | None | Awaitable[User | None]c                 C  s
   |  |S )zGet the authenticated user for a request

        Must return a :class:`jupyter_server.auth.User`,
        though it may be a subclass.

        Return None if the request is not authenticated.

        _may_ be a coroutine
        )	_get_userr&   rU   r'   r'   r(   get_user   s   

zIdentityProvider.get_userUser | Nonec           	        s   t |ddr
|jS | |}t|tr|I dH }|}| |}t|tr*|I dH }|}|p/|}|durE|durE||krB| || d|_|du rs| |}|	|}|dure| j
d|  | | | jss| |}| || |S )Get the user._jupyter_current_userNTz&Clearing invalid/expired login cookie )getattrr\   get_user_tokenr3   r   get_user_cookieset_login_cookie_token_authenticatedget_cookie_name
get_cookielogwarningclear_login_cookieauth_enabledgenerate_anonymous_user)	r&   rU   _token_user
token_user_cookie_usercookie_useruserr>   cookier'   r'   r(   rW      s4   









zIdentityProvider._get_userrm   r   r4   c                 C  s   t |S )z"Return a User as an Identity model)r   )r&   rm   r'   r'   r(   identity_model  s   zIdentityProvider.identity_modellistc                 C  s4   g }| j r|d| jf | jr|d| jf |S )zwReturn list of additional handlers for this identity provider

        For example, an OAuth callback handler.
        z/loginz/logout)login_availableappendlogin_handler_classlogout_availablelogout_handler_class)r&   handlersr'   r'   r(   get_handlers  s   zIdentityProvider.get_handlersr   c                 C  s$   t |j|j|j|j|jd}|S )zSerialize a user to a string for storage in a cookie

        If overriding in a subclass, make sure to define user_from_cookie as well.

        Default is just the user's username.
        )r   r   r   r    r"   )jsondumpsr   r   r   r    r"   )r&   rm   rn   r'   r'   r(   user_to_cookie%  s   	zIdentityProvider.user_to_cookiecookie_valuec                 C  s0   t |}t|d |d |d |d d|d S )zInverse of user_to_cookier   r   r   r    Nr"   )rx   loadsr   )r&   r{   rm   r'   r'   r(   user_from_cookie8  s   
z!IdentityProvider.user_from_cookiec                 C  s"   | j r| j S tdd|jj S )zReturn the login cookie name

        Uses IdentityProvider.cookie_name, if defined.
        Default is to generate a string taking host into account to avoid
        collisions for multiple servers on one hostname with different ports.
        -z	username-)r>   _non_alphanumsubrequesthostrX   r'   r'   r(   rb   D  s   z IdentityProvider.get_cookie_nameNonec                 C  s|   i }| | j |dd | j}|du r|jjdk}|r#|dd |d|j | |}|j|| 	|fi | dS )z9Call this on handlers to set the login cookie for successhttponlyTNhttpssecurepath)
updatecookie_options
setdefaultr@   r   protocolbase_urlrb   set_secure_cookierz   )r&   rU   rm   r   r@   r>   r'   r'   r(   r`   P  s   
z!IdentityProvider.set_login_cookie/r   r   domainr   c                 C  sr   t |}tjjtjjdtjdd }t }||dd t	
||d< ||d< |r/||d< |d	|  d
S )a  Deletes the cookie with the given name.

        Tornado's cookie handling currently (Jan 2018) stores cookies in a dict
        keyed by name, so it can only modify one cookie with a given name per
        response. The browser can store multiple cookies with the same name
        but different domains and/or paths. This method lets us clear multiple
        cookies with the same name.

        Due to limitations of the cookie protocol, you must pass the same
        path and domain to clear a cookie as were used when that cookie
        was set (but there is no way to find out on the server side
        which values were used for a given cookie).
        )tzim  )daysr   z""expiresr   r   z
Set-CookieN)r	   
native_strdatetimenowtimezoneutc	timedeltar   setr
   format_timestamp
add_headerOutputString)r&   rU   r   r   r   r   morselr'   r'   r(   _force_clear_cookie`  s   
z$IdentityProvider._force_clear_cookiec                 C  sZ   i }| | j |d|j}| |}|j||d |r)|dkr+| || dS dS dS )z<Clear the login cookie, effectively logging out the session.r   )r   r   N)r   r   r   r   rb   clear_cookier   )r&   rU   r   r   r>   r'   r'   r(   rf   {  s   
z#IdentityProvider.clear_login_cookiec              
   C  s   |j | |fi | j}|sdS | }z| |W S  tyB } z| jjd| dd | jd|  W Y d}~dS d}~ww )z[Get user from a cookie

        Calls user_from_cookie to deserialize cookie value
        Nz)Error unpacking user from cookie: cookie=T)exc_infoz"Error unpacking user from cookie: )	get_secure_cookierb   get_secure_cookie_kwargsrR   r}   	Exceptionrd   debugerror)r&   rU   _user_cookieuser_cookieer'   r'   r(   r_     s    z IdentityProvider.get_user_cookiez(token|bearer)\s+(.+)c                 C  s:   | dd}|s| j|jjdd}|r|d}|S )zGet the user token from a request

        Default:

        - in URL parameters: ?token=<token>
        - in header: Authorization: token <token>
        rA   r   Authorization   )get_argumentauth_header_patmatchr   headersgetgroup)r&   rU   
user_tokenmr'   r'   r(   	get_token  s   
zIdentityProvider.get_tokenc                   s|   |j }|sdS | |}d}||kr| jd|jj d}|r<| |}t|tr/|I dH }|}|du r:| 	|}|S dS )zIdentify the user based on a token in the URL or Authorization header

        Returns:
        - uuid if authenticated
        - None if not
        NFz-Accepting token-authenticated request from %sT)
rA   r   rd   r   r   	remote_ipr_   r3   r   rh   )r&   rU   rA   r   authenticated_userrm   r'   r'   r(   r^     s*   




zIdentityProvider.get_user_tokenc                 C  sT   t  j}t }d|  }}d|d  }d}|jd|  t||||d|S )zGenerate a random anonymous user.

        For use when a single shared token is used,
        but does not identify a user.
        z
Anonymous Ar   Nz5Generating new user for token-authenticated request: )uuiduuid4hexr   rd   infor   )r&   rU   user_idmoonr   r   r    r"   r'   r'   r(   rh     s   
z(IdentityProvider.generate_anonymous_userboolc                 C  s   |  | S )a3  Should the Handler check for CORS origin validation?

        Origin check should be skipped for token-authenticated requests.

        Returns:
        - True, if Handler must check for valid CORS origin.
        - False, if Handler should skip origin check since requests are token-authenticated.
        )is_token_authenticatedrX   r'   r'   r(   should_check_origin  s   	z$IdentityProvider.should_check_originc                 C  s   |j  t|ddS )zReturns True if handler has been token authenticated. Otherwise, False.

        Login with a token is used to signal certain things, such as:

        - permit access to REST API
        - xsrf protection
        - skip origin-checks for scripts
        ra   F)current_userr]   rX   r'   r'   r(   r     s   
z'IdentityProvider.is_token_authenticatedappr   ssl_optionsdict | Nonec                 C  s^   |j s"d}|du r|j| d | js |j| d dS dS | js-|jd dS dS )z~Check the application's security.

        Show messages, or abort if necessary, based on the security configuration.
        z<WARNING: The Jupyter server is listening on all IP addressesNz3 and not using encryption. This is not recommended.zK and not using authentication. This is highly insecure and not recommended.z`All authentication is disabled.  Anyone who can connect to this server will be able to run code.)iprd   re   rg   )r&   r   r   re   r'   r'   r(   validate_security  s   	z"IdentityProvider.validate_securityc                 C  sL   |j ddd}d}| js| jd | |S | jr$| j|kr$| |S |S )_Process login form data

        Return authenticated User if successful, None if not.
        passwordr   r   N6Accepting anonymous login because auth fully disabled!)r   rg   rd   re   rh   rA   user_for_token)r&   rU   typed_passwordrm   r'   r'   r(   process_login_form  s   

z#IdentityProvider.process_login_formc                 C     dS )zIs authentication enabled?

        Should always be True, but may be False in rare, insecure cases
        where requests with no auth are allowed.

        Previously: LoginHandler.get_login_available
        Tr'   r%   r'   r'   r(   rg   !  s   	zIdentityProvider.auth_enabledc                 C     | j S z\Whether a LoginHandler is needed - and therefore whether the login page should be displayed.rg   r%   r'   r'   r(   rq   ,     z IdentityProvider.login_availablec                 C  r   )z"Whether a LogoutHandler is needed.Tr'   r%   r'   r'   r(   rt   1  s   z!IdentityProvider.logout_available)rU   r   r2   rV   rU   r   r2   rZ   )rm   r   r2   r4   )r2   rp   )rm   r   r2   r   )r{   r   r2   rZ   )rU   r   r2   r   )rU   r   rm   r   r2   r   )r   N)
rU   r   r   r   r   r   r   r   r2   r   )rU   r   r2   r   )rU   r   r2   r   )rU   r   r2   r   rU   r   r2   r   r#   r   r   r   r   r2   r   )2r,   r-   r.   r/   r   r   r>   r0   r   r   r   r@   r   tagrA   r   r   RequestHandlerrs   ru   rJ   r   rT   rN   rY   rW   ro   rw   rz   r}   rb   r`   r   rf   r_   recompile
IGNORECASEr   r   r^   rh   r   r   r   r   propertyrg   rq   rt   r'   r'   r'   r(   r:   r   s   
 




-









#





r:   c                      s   e Zd ZdZeddeddZeddeddZeddeddZ	e
d	d
d Zed!ddZed!ddZdd Zd"ddZ	d#d$ fdd Z  ZS )%PasswordIdentityProviderzA password identity provider.r   Ta  
            Hashed password to use for web authentication.

            To generate, type in a python/IPython shell:

                from jupyter_server.auth import passwd; passwd()

            The string should be of the form type:salt:hashed-password.
            r;   Fao  
            Forces users to use a password for the Jupyter server.
            This is useful in a multi user environment, for instance when
            everybody in the LAN can access each other's machine through ssh.

            In such a case, serving on localhost is not secure since
            any user can connect to the Jupyter server via ssh.

            a  
            Allow password to be changed at login for the Jupyter server.

            While logging in with a token, the Jupyter server UI will give the opportunity to
            the user to enter a new password at the same time that will replace
            the token login mechanism.

            This can be set to False to prevent changing password from the UI/API.
            rN   c                 C  s   t | j S r#   )r   hashed_passwordr%   r'   r'   r(   _need_token_defaultj     z,PasswordIdentityProvider._need_token_defaultr2   r   c                 C  r   r   r   r%   r'   r'   r(   rq   n  r   z(PasswordIdentityProvider.login_availablec                 C  s   t | jp| jS )z"Return whether any auth is enabled)r   r   rA   r%   r'   r'   r(   rg   s  s   z%PasswordIdentityProvider.auth_enabledc                 C  s   t | j|S )z1Check password against our stored hashed password)r   r   )r&   r   r'   r'   r(   r   x  r   z%PasswordIdentityProvider.passwd_checkrU   r   rZ   c                 C  s   |j ddd}|j ddd}d}| js| jd | |S | |r*|s*| |S | jr\| j|kr\| |}|r\| jr\|j	dd}t
j|d}t||d	| _| jtd
|  |S )r   r   r   r   new_passwordNr   
config_dirzjupyter_server_config.json)config_filezWrote hashed password to )r   rg   rd   re   rh   r   rA   allow_password_changesettingsr   rH   r   joinr   r   r   r   )r&   rU   r   r   rm   r   r   r'   r'   r(   r   |  s    



z+PasswordIdentityProvider.process_login_formNr   r   r   r   r   c                   s`   t  || | jr,| js.| jtd | jtd | jtd td dS dS dS )zHandle security validation.>Jupyter servers are configured to only be run with a password.1Hint: run the following command to set a password)	$ python -m jupyter_server.auth passwordr   N)	superr   password_requiredr   rd   criticalr   sysexitr&   r   r   	__class__r'   r(   r     s   z*PasswordIdentityProvider.validate_security)r2   r   r   r#   r   )r,   r-   r.   r/   r   r   r   r   r   r   r   r   r   rq   rg   r   r   r   __classcell__r'   r'   r   r(   r   7  sB    

r   c                   @  sz   e Zd ZdZe Zeddd Zeddd Ze	dd	 Z
dddZe	dd Zd ddZd ddZ	d!d"ddZdS )#LegacyIdentityProviderzLegacy IdentityProvider for use with custom LoginHandlers

    Login configuration has moved from LoginHandler to IdentityProvider
    in Jupyter Server 2.0.
    r   c                 C  s   | j | jdS )N)rA   r   )rA   r   r%   r'   r'   r(   _default_settings  s   z(LegacyIdentityProvider._default_settingsrs   c                 C  s   ddl m} |S )Nr   )LegacyLoginHandler)loginr   )r&   r   r'   r'   r(   _default_login_handler_class  s   z3LegacyIdentityProvider._default_login_handler_classc                 C  r   r#   )rq   r%   r'   r'   r(   rg     s   z#LegacyIdentityProvider.auth_enabledrU   r   r2   rZ   c                 C  s    | j |}|du rdS t|S )r[   N)rs   rY   r9   )r&   rU   rm   r'   r'   r(   rY     s   zLegacyIdentityProvider.get_userc                 C  s   | j | jS r#   )rs   get_login_availabler   r%   r'   r'   r(   rq     s   z&LegacyIdentityProvider.login_availabler   c                 C     | j |S )zWhether we should check origin.)rs   r   rX   r'   r'   r(   r     r   z*LegacyIdentityProvider.should_check_originc                 C  r   )z#Whether we are token authenticated.)rs   r   rX   r'   r'   r(   r     r   z-LegacyIdentityProvider.is_token_authenticatedNr   r   r   r   r   c                 C  sT   | j r#| js#| jtd | jtd | jtd td | j||S )zValidate security.r   r   r   r   )	r   r   rd   r   r   r   r   rs   r   r   r'   r'   r(   r     s   
z(LegacyIdentityProvider.validate_securityr   r   r#   r   )r,   r-   r.   r/   r   r   r   r   r   r   rg   rY   rq   r   r   r   r'   r'   r'   r(   r     s     






r   )r1   r   r2   r   )1r/   
__future__r   rO   r   rx   rH   r   r   r   dataclassesr   r   http.cookiesr   typingr   r   r   tornador	   r
   r   	traitletsr   r   r   r   r   traitlets.configr   jupyter_server.transutilsr   securityr   r   utilsr   jupyter_server.base.handlersr   jupyter_server.serverappr   r   r   r   r9   r:   r   r   r'   r'   r'   r(   <module>   s>    

.   Hm