Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
F
flaskdav
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
iv
flaskdav
Commits
4d7469c0
Commit
4d7469c0
authored
Dec 03, 2015
by
iv
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adding cookie authentication mechanism + command line argument (argparse).
parent
e3ec46fb
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
80 additions
and
18 deletions
+80
-18
flaskdav.py
flaskdav.py
+77
-17
templates/authorization_page.html
templates/authorization_page.html
+3
-1
No files found.
flaskdav.py
View file @
4d7469c0
...
@@ -21,12 +21,39 @@ URI_BEGINNING_PATH = {
...
@@ -21,12 +21,39 @@ URI_BEGINNING_PATH = {
'devices'
:
'/webdav/devices/'
'devices'
:
'/webdav/devices/'
}
}
def
verify_cookie
(
cookie
):
def
make_cookie_content_to_be_signed
():
return
False
""" cookie content is based on Origin header and User-Agent
(later HMAC'ed) """
origin
=
request
.
headers
.
get
(
'Origin'
)
useragent
=
request
.
headers
.
get
(
'User-Agent'
)
return
str
(
origin
)
+
str
(
useragent
)
def
verify_cookie
(
cookey
):
""" verify that the signature contained in the cookie
corresponds to the informations sent by the app (see
make_cookie_content_to_be_signed) """
is_correct
=
False
debug
(
"verify_cookie: "
+
base64_decode
(
cookey
))
cookie_value
=
request
.
cookies
.
get
(
str
(
cookey
))
if
cookie_value
:
s
=
Signer
(
app
.
secret_key
)
debug
(
"verify_cookie: "
+
cookie_value
+
", "
+
\
s
.
get_signature
(
make_cookie_content_to_be_signed
()))
if
s
.
get_signature
(
make_cookie_content_to_be_signed
())
==
cookie_value
:
is_correct
=
True
return
is_correct
def
is_authorized
(
cookies_list
):
def
is_authorized
(
cookies_list
):
#return any(verify_cookie(cookie) for cookie in cookies_list)
origin
=
request
.
headers
.
get
(
'Origin'
)
return
True
# TODO: accept requests from 127.0.0.1:port and localhost:port?
# accept any port of any local addresses: localhost and 127.0.0.0/8?
if
origin
is
None
:
# request from same origin
return
True
return
verify_cookie
(
base64_encode
(
origin
))
FS_HANDLER
=
utils
.
FilesystemHandler
(
FS_PATH
,
URI_BEGINNING_PATH
[
'webdav'
])
FS_HANDLER
=
utils
.
FilesystemHandler
(
FS_PATH
,
URI_BEGINNING_PATH
[
'webdav'
])
...
@@ -236,16 +263,33 @@ app.add_url_rule(URI_BEGINNING_PATH['webdav'] + '<path:pathname>', view_func=Web
...
@@ -236,16 +263,33 @@ app.add_url_rule(URI_BEGINNING_PATH['webdav'] + '<path:pathname>', view_func=Web
@
app
.
route
(
URI_BEGINNING_PATH
[
'authorization'
],
methods
=
[
'GET'
,
'POST'
])
@
app
.
route
(
URI_BEGINNING_PATH
[
'authorization'
],
methods
=
[
'GET'
,
'POST'
])
def
authorize
():
def
authorize
():
""" authorization page
GET: returns page where the user can authorize an app to access the
filesystem via the webdav server
POST: set a cookie
"""
origin
=
request
.
headers
.
get
(
'Origin'
)
origin
=
request
.
headers
.
get
(
'Origin'
)
if
request
.
method
==
'POST'
:
if
request
.
method
==
'POST'
:
response
=
make_response
(
render_template
(
'authorization_page_cookie_set.html'
,
headers
=
headers
,
origin
=
origin
,
back_url
=
back_url
))
response
=
make_response
()
response
.
set_cookie
(
'mycookie'
,
value
=
''
,
max_age
=
None
,
expires
=
None
,
path
=
'/'
,
s
=
Signer
(
app
.
secret_key
)
domain
=
None
,
secure
=
None
,
httponly
=
False
)
key
=
base64_encode
(
str
(
origin
))
back
=
request
.
args
.
get
(
'back_url'
)
debug
(
back
)
# TODO add checkbox to reset private key and invalidate all previous authorizations
response
.
set_cookie
(
key
,
value
=
s
.
get_signature
(
make_cookie_content_to_be_signed
()),
max_age
=
None
,
expires
=
None
,
path
=
'/'
,
domain
=
None
,
secure
=
True
,
httponly
=
True
)
if
back
:
response
.
status
=
'301'
# moved permanently
response
.
headers
[
'Location'
]
=
back
# what if not? use referer? send bad request error? just do nothing?
else
:
else
:
headers
=
request
.
headers
headers
=
request
.
headers
back_url
=
request
.
args
.
get
(
'back_url'
)
response
=
make_response
(
render_template
(
'authorization_page.html'
,
response
=
make_response
(
render_template
(
'authorization_page.html'
,
headers
=
headers
,
origin
=
origin
,
back_url
=
back_url
))
origin
=
origin
,
back_url
=
request
.
args
.
get
(
'back_url'
)
))
return
response
return
response
@
app
.
route
(
URI_BEGINNING_PATH
[
'system'
])
@
app
.
route
(
URI_BEGINNING_PATH
[
'system'
])
...
@@ -260,11 +304,27 @@ def links():
...
@@ -260,11 +304,27 @@ def links():
return
'TODO: nice set of links to useful local pages: %s <br> + HOWTO'
%
the_links
return
'TODO: nice set of links to useful local pages: %s <br> + HOWTO'
%
the_links
if
__name__
==
'__main__'
:
if
__name__
==
'__main__'
:
from
OpenSSL
import
SSL
context
=
SSL
.
Context
(
SSL
.
TLSv1_2_METHOD
)
import
argparse
# TODO set strong ciphers with context.set_cipher_list()
parser
=
argparse
.
ArgumentParser
(
description
=
'Run a local webdav/HTTP server.'
)
# TODO give path to key/cert using command line parameters
parser
.
add_argument
(
'-d'
,
'--debug'
,
action
=
'store_true'
,
context
.
use_privatekey_file
(
'ssl.key'
)
help
=
'Run flask app in debug mode (not recommended for use in production).'
)
context
.
use_certificate_file
(
'ssl.cert'
)
https
=
parser
.
add_argument_group
(
'HTTPS'
,
'Arguments required for HTTPS support.'
)
https
.
add_argument
(
'--key'
,
type
=
str
,
action
=
'store'
,
default
=
None
,
app
.
run
(
ssl_context
=
context
)
help
=
'SSL/TLS private key. Required for HTTPS support.'
)
https
.
add_argument
(
'--cert'
,
type
=
str
,
action
=
'store'
,
default
=
None
,
help
=
'SSL/TLS certificate. Required for HTTPS support.'
)
args
=
parser
.
parse_args
()
app
.
debug
=
args
.
debug
context
=
None
if
args
.
key
and
args
.
cert
and
os
.
path
.
isfile
(
args
.
key
)
and
os
.
path
.
isfile
(
args
.
cert
):
from
OpenSSL
import
SSL
context
=
SSL
.
Context
(
SSL
.
TLSv1_2_METHOD
)
# TODO set strong ciphers with context.set_cipher_list()
context
.
use_privatekey_file
(
'ssl.key'
)
context
.
use_certificate_file
(
'ssl.cert'
)
app
.
secret_key
=
os
.
urandom
(
24
)
app
.
run
(
host
=
"localhost"
,
ssl_context
=
context
)
templates/authorization_page.html
View file @
4d7469c0
<div>
Headers: {{ headers }}
</div>
<div>
Headers: {{ headers }}
</div>
<div>
Allow origin: {{ origin }} ?
</div>
<div>
Allow origin: {{ origin }} ?
</div>
<div>
You will then be redirected to {{ back_url }} .
</div>
<div>
You will then be redirected to {{ back_url }} .
</div>
<form
action=
""
method=
"post"
>
<button
name=
"mybutton"
value=
"val"
>
OK
</button>
</form>
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment