|
1 | 1 | #-*-coding: utf8 -*-
|
2 | 2 |
|
3 | 3 | """
|
4 |
| -urllib2 handler for SAE APIBus Service |
| 4 | +SAE API auth handler for urllib2 and requests |
5 | 5 |
|
6 |
| -Usage: |
| 6 | +urllib2: |
7 | 7 |
|
8 |
| -import urllib2 |
9 |
| -from apibus_handler import APIBusHandler |
10 |
| -opener = urllib2.build_opener(APIBusHandler(ACCESSKEY, SECRETKEY)) |
| 8 | +>>> import urllib2 |
| 9 | +>>> apibus_handler = SaeApibusAuthHandler(ACCESSKEY, SECRETKEY) |
| 10 | +>>> opener = urllib2.build_opener(apibus_handler) |
| 11 | +>>> print opener.open('http://g.sae.sina.com.cn/log/http/2015-06-18/1-access.log').read() |
11 | 12 |
|
12 |
| -Then you can use *opener* to request sae internal service such as segement, |
13 |
| -sms as you want. |
| 13 | +requests: |
| 14 | +
|
| 15 | +>>> import requests |
| 16 | +>>> print requests.get('http://g.sae.sina.com.cn/log/http/2015-06-18/1-access.log?head/0/10|fields/ /1/2/3/4', auth=SaeApibusAuth(ACCESSKEY, SECRETKEY)).content |
14 | 17 | """
|
15 | 18 |
|
16 | 19 | import hmac
|
17 | 20 | import base64
|
18 | 21 | import hashlib
|
19 | 22 | import time
|
| 23 | +import urllib |
20 | 24 | from urllib2 import BaseHandler, Request
|
21 | 25 |
|
22 |
| -_APIBUS_ENDPOINT = 'http://g.apibus.io' |
| 26 | +_APIBUS_URL_PREFIX = 'http://g.sae.sina.com.cn/' |
23 | 27 |
|
24 |
| -class APIBusHandler(BaseHandler): |
| 28 | +class SaeApibusAuthHandler(BaseHandler): |
25 | 29 | # apibus handler must be in front
|
26 | 30 | handler_order = 100
|
27 | 31 |
|
28 | 32 | def __init__(self, accesskey, secretkey):
|
29 | 33 | self.accesskey = accesskey
|
30 | 34 | self.secretkey = secretkey
|
31 | 35 |
|
32 |
| - def _signature(self, headers): |
33 |
| - msg = ''.join([k + v for k, v in headers]) |
34 |
| - h = hmac.new(self.secretkey, msg, hashlib.sha256).digest() |
35 |
| - return base64.b64encode(h) |
36 |
| - |
37 | 36 | def http_request(self, req):
|
38 | 37 | orig_url = req.get_full_url()
|
| 38 | + if not orig_url.startswith(_APIBUS_URL_PREFIX): |
| 39 | + return req |
| 40 | + |
39 | 41 | timestamp = str(int(time.time()))
|
40 | 42 | headers = [
|
41 |
| - ('Fetchurl', orig_url), |
42 |
| - ('Timestamp', timestamp), |
43 |
| - ('Accesskey', self.accesskey), |
| 43 | + ('x-sae-timestamp', timestamp), |
| 44 | + ('x-sae-accesskey', self.accesskey), |
44 | 45 | ]
|
45 |
| - headers.append(('Signature', self._signature(headers))) |
46 |
| - # Create a new request |
47 |
| - _req = Request(_APIBUS_ENDPOINT, req.get_data(), origin_req_host=orig_url) |
48 |
| - _req.headers.update(req.header_items()) |
49 |
| - _req.headers.update(headers) |
50 |
| - _req.timeout = req.timeout |
51 |
| - return _req |
| 46 | + req.headers.update(headers) |
| 47 | + |
| 48 | + method = req.get_method() |
| 49 | + resource = urllib.unquote(req.get_full_url()[len(_APIBUS_URL_PREFIX)-1:]) |
| 50 | + sae_headers = [(k.lower(), v.lower()) for k, v in req.headers.items() if k.lower().startswith('x-sae-')] |
| 51 | + req.add_header('Authorization', _signature(self.secretkey, method, resource, sae_headers)) |
| 52 | + return req |
52 | 53 |
|
53 | 54 | https_request = http_request
|
54 | 55 |
|
| 56 | +try: |
| 57 | + from requests.auth import AuthBase |
| 58 | + |
| 59 | + class SaeApibusAuth(AuthBase): |
| 60 | + """Attaches HTTP Basic Authentication to the given Request object.""" |
| 61 | + def __init__(self, accesskey, secretkey): |
| 62 | + self.accesskey = accesskey |
| 63 | + self.secretkey = secretkey |
| 64 | + |
| 65 | + def __call__(self, r): |
| 66 | + timestamp = str(int(time.time())) |
| 67 | + r.headers['x-sae-timestamp'] = timestamp |
| 68 | + r.headers['x-sae-accesskey'] = self.accesskey |
| 69 | + resource = urllib.unquote(r.url[len(_APIBUS_URL_PREFIX)-1:]) |
| 70 | + #resource = r.url[len(_APIBUS_URL_PREFIX)-1:] |
| 71 | + sae_headers = [(k.lower(), v.lower()) for k, v in r.headers.items() if k.lower().startswith('x-sae-')] |
| 72 | + r.headers['Authorization'] = _signature(self.secretkey, r.method, resource, sae_headers) |
| 73 | + return r |
| 74 | +except ImportError: |
| 75 | + # requests was not present! |
| 76 | + pass |
| 77 | + |
| 78 | +def _signature(secret, method, resource, headers): |
| 79 | + msgToSign = "\n".join([ |
| 80 | + method, resource, |
| 81 | + "\n".join([(k + ":" + v) for k, v in sorted(headers)]), |
| 82 | + ]) |
| 83 | + return "SAEV1_HMAC_SHA256 " + base64.b64encode(hmac.new(secret, msgToSign, hashlib.sha256).digest()) |
| 84 | + |
0 commit comments