Blame view

node_modules/request/lib/auth.js 4.66 KB
f7563de62   Palak Handa   first commit
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
  'use strict'
  
  var caseless = require('caseless')
    , uuid = require('uuid')
    , helpers = require('./helpers')
  
  var md5 = helpers.md5
    , toBase64 = helpers.toBase64
  
  
  function Auth (request) {
    // define all public properties here
    this.request = request
    this.hasAuth = false
    this.sentAuth = false
    this.bearerToken = null
    this.user = null
    this.pass = null
  }
  
  Auth.prototype.basic = function (user, pass, sendImmediately) {
    var self = this
    if (typeof user !== 'string' || (pass !== undefined && typeof pass !== 'string')) {
      self.request.emit('error', new Error('auth() received invalid user or password'))
    }
    self.user = user
    self.pass = pass
    self.hasAuth = true
    var header = user + ':' + (pass || '')
    if (sendImmediately || typeof sendImmediately === 'undefined') {
      var authHeader = 'Basic ' + toBase64(header)
      self.sentAuth = true
      return authHeader
    }
  }
  
  Auth.prototype.bearer = function (bearer, sendImmediately) {
    var self = this
    self.bearerToken = bearer
    self.hasAuth = true
    if (sendImmediately || typeof sendImmediately === 'undefined') {
      if (typeof bearer === 'function') {
        bearer = bearer()
      }
      var authHeader = 'Bearer ' + (bearer || '')
      self.sentAuth = true
      return authHeader
    }
  }
  
  Auth.prototype.digest = function (method, path, authHeader) {
    // TODO: More complete implementation of RFC 2617.
    //   - handle challenge.domain
    //   - support qop="auth-int" only
    //   - handle Authentication-Info (not necessarily?)
    //   - check challenge.stale (not necessarily?)
    //   - increase nc (not necessarily?)
    // For reference:
    // http://tools.ietf.org/html/rfc2617#section-3
    // https://github.com/bagder/curl/blob/master/lib/http_digest.c
  
    var self = this
  
    var challenge = {}
    var re = /([a-z0-9_-]+)=(?:"([^"]+)"|([a-z0-9_-]+))/gi
    for (;;) {
      var match = re.exec(authHeader)
      if (!match) {
        break
      }
      challenge[match[1]] = match[2] || match[3]
    }
  
    /**
     * RFC 2617: handle both MD5 and MD5-sess algorithms.
     *
     * If the algorithm directive's value is "MD5" or unspecified, then HA1 is
     *   HA1=MD5(username:realm:password)
     * If the algorithm directive's value is "MD5-sess", then HA1 is
     *   HA1=MD5(MD5(username:realm:password):nonce:cnonce)
     */
    var ha1Compute = function (algorithm, user, realm, pass, nonce, cnonce) {
      var ha1 = md5(user + ':' + realm + ':' + pass)
      if (algorithm && algorithm.toLowerCase() === 'md5-sess') {
        return md5(ha1 + ':' + nonce + ':' + cnonce)
      } else {
        return ha1
      }
    }
  
    var qop = /(^|,)\s*auth\s*($|,)/.test(challenge.qop) && 'auth'
    var nc = qop && '00000001'
    var cnonce = qop && uuid().replace(/-/g, '')
    var ha1 = ha1Compute(challenge.algorithm, self.user, challenge.realm, self.pass, challenge.nonce, cnonce)
    var ha2 = md5(method + ':' + path)
    var digestResponse = qop
      ? md5(ha1 + ':' + challenge.nonce + ':' + nc + ':' + cnonce + ':' + qop + ':' + ha2)
      : md5(ha1 + ':' + challenge.nonce + ':' + ha2)
    var authValues = {
      username: self.user,
      realm: challenge.realm,
      nonce: challenge.nonce,
      uri: path,
      qop: qop,
      response: digestResponse,
      nc: nc,
      cnonce: cnonce,
      algorithm: challenge.algorithm,
      opaque: challenge.opaque
    }
  
    authHeader = []
    for (var k in authValues) {
      if (authValues[k]) {
        if (k === 'qop' || k === 'nc' || k === 'algorithm') {
          authHeader.push(k + '=' + authValues[k])
        } else {
          authHeader.push(k + '="' + authValues[k] + '"')
        }
      }
    }
    authHeader = 'Digest ' + authHeader.join(', ')
    self.sentAuth = true
    return authHeader
  }
  
  Auth.prototype.onRequest = function (user, pass, sendImmediately, bearer) {
    var self = this
      , request = self.request
  
    var authHeader
    if (bearer === undefined && user === undefined) {
      self.request.emit('error', new Error('no auth mechanism defined'))
    } else if (bearer !== undefined) {
      authHeader = self.bearer(bearer, sendImmediately)
    } else {
      authHeader = self.basic(user, pass, sendImmediately)
    }
    if (authHeader) {
      request.setHeader('authorization', authHeader)
    }
  }
  
  Auth.prototype.onResponse = function (response) {
    var self = this
      , request = self.request
  
    if (!self.hasAuth || self.sentAuth) { return null }
  
    var c = caseless(response.headers)
  
    var authHeader = c.get('www-authenticate')
    var authVerb = authHeader && authHeader.split(' ')[0].toLowerCase()
    request.debug('reauth', authVerb)
  
    switch (authVerb) {
      case 'basic':
        return self.basic(self.user, self.pass, true)
  
      case 'bearer':
        return self.bearer(self.bearerToken, true)
  
      case 'digest':
        return self.digest(request.method, request.path, authHeader)
    }
  }
  
  exports.Auth = Auth