o
    :Zc                     @   s  d Z ddlZddlZddlZddlZddlZddlZddlmZ ddl	m
Z
 ddlmZmZ ddlmZ ddlmZ edZG d	d
 d
eZG dd deZdd Zdd Zdd Zd"ddZG dd dZddedfddZddedfddZG dd dZG d d! d!eZdS )#ae  
Functions for creating and restoring url-safe signed JSON objects.

The format used looks like this:

>>> signing.dumps("hello")
'ImhlbGxvIg:1QaUZC:YIye-ze3TTx7gtSv422nZA4sgmk'

There are two components here, separated by a ':'. The first component is a
URLsafe base64 encoded JSON of the object passed to dumps(). The second
component is a base64 encoded hmac/SHA1 hash of "$first_component:$secret"

signing.loads(s) checks the signature and returns the deserialized object.
If the signature fails, a BadSignature exception is raised.

>>> signing.loads("ImhlbGxvIg:1QaUZC:YIye-ze3TTx7gtSv422nZA4sgmk")
'hello'
>>> signing.loads("ImhlbGxvIg:1QaUZC:YIye-ze3TTx7gtSv422nZA4sgmk-modified")
...
BadSignature: Signature failed: ImhlbGxvIg:1QaUZC:YIye-ze3TTx7gtSv422nZA4sgmk-modified

You can optionally compress the JSON prior to base64 encoding it to save
space, using the compress=True argument. This checks if compression actually
helps and only applies compression if the result is a shorter string:

>>> signing.dumps(list(range(1, 20)), compress=True)
'.eJwFwcERACAIwLCF-rCiILN47r-GyZVJsNgkxaFxoDgxcOHGxMKD_T7vhAml:1QaUaL:BA0thEZrp4FQVXIXuOvYJtLJSrQ'

The fact that the string is compressed is signalled by the prefixed '.' at the
start of the base64 JSON.

There are 65 url-safe characters: the 64 used by url-safe base64 and the ':'.
These functions make use of all of them.
    N)settings)baseconv)constant_time_comparesalted_hmac)force_bytes)import_stringz^[A-z0-9-_=]*$c                   @      e Zd ZdZdS )BadSignaturezSignature does not match.N__name__
__module____qualname____doc__ r   r   I/var/www/chikooza/env/lib/python3.10/site-packages/django/core/signing.pyr	   4       r	   c                   @   r   )SignatureExpiredz3Signature timestamp is older than required max_age.Nr
   r   r   r   r   r   9   r   r   c                 C   s   t | dS )N   =)base64urlsafe_b64encodestrip)sr   r   r   
b64_encode>      r   c                 C   s    dt |  d  }t| | S )Nr      )lenr   urlsafe_b64decode)r   padr   r   r   
b64_decodeB   s   r   c                 C   s   t t| ||  S N)r   r   digestdecode)saltvaluekeyr   r   r   base64_hmacG   s   r%   %django.core.signing.get_cookie_signerc                 C   s$   t tj}ttj}|d| | dS )Ns   django.http.cookiesr"   )r   r   SIGNING_BACKENDr   
SECRET_KEY)r"   Signerr$   r   r   r   get_cookie_signerK   s   

r+   c                   @   s    e Zd ZdZdd Zdd ZdS )JSONSerializerzW
    Simple wrapper around json to be used in signing.dumps and
    signing.loads.
    c                 C   s   t j|dddS )N),:)
separatorslatin-1)jsondumpsencode)selfobjr   r   r   r2   V      zJSONSerializer.dumpsc                 C   s   t |dS )Nr0   )r1   loadsr!   )r4   datar   r   r   r7   Y   r   zJSONSerializer.loadsN)r   r   r   r   r2   r7   r   r   r   r   r,   Q   s    r,   zdjango.core.signingFc           	      C   sd   |  | }d}|rt|}t|t|d k r|}d}t| }|r)d| }t||d|S )a  
    Return URL-safe, hmac/SHA1 signed base64 compressed JSON string. If key is
    None, use settings.SECRET_KEY instead.

    If compress is True (not the default), check if compressing using zlib can
    save some space. Prepend a '.' to signify compression. This is included
    in the signature, to protect against zip bombs.

    Salt can be used to namespace the hash, so that a signed string is
    only valid for a given namespace. Leaving this at the default
    value or re-using a salt value across different parts of your
    application without good cause is a security risk.

    The serializer is expected to return a bytestring.
    F   T.r'   )r2   zlibcompressr   r   r!   TimestampSignersign)	r5   r$   r"   
serializerr<   r8   is_compressed
compressedbase64dr   r   r   r2   ]   s   
r2   c                 C   s\   t ||dj| |d }|dd dk}|r|dd }t|}|r(t|}| |S )z|
    Reverse of dumps(), raise BadSignature if signature fails.

    The serializer is expected to accept a bytestring.
    r'   )max_ageNr9      .)r=   unsignr3   r   r;   
decompressr7   )r   r$   r"   r?   rC   rB   rF   r8   r   r   r   r7   ~   s   
r7   c                   @   s.   e Zd ZdddZdd Zdd Zd	d
 ZdS )r*   Nr.   c                 C   sH   |pt j| _|| _t| jrtd| |p d| jj| jj	f | _
d S )NzJUnsafe Signer separator: %r (cannot be empty or consist of only A-z0-9-_=)z%s.%s)r   r)   r$   sep_SEP_UNSAFEmatch
ValueError	__class__r   r   r"   )r4   r$   rG   r"   r   r   r   __init__   s   zSigner.__init__c                 C   s   t | jd || jS )Nsigner)r%   r"   r$   r4   r#   r   r   r   	signature   r6   zSigner.signaturec                 C   s   d|| j | |f S Nz%s%s%s)rG   rO   rN   r   r   r   r>      s   zSigner.signc                 C   sJ   | j |vrtd| j  || j d\}}t|| |r|S td| )NzNo "%s" found in valuer9   zSignature "%s" does not match)rG   r	   rsplitr   rO   )r4   signed_valuer#   sigr   r   r   rE      s   
zSigner.unsign)Nr.   N)r   r   r   rL   rO   r>   rE   r   r   r   r   r*      s
    
r*   c                       s2   e Zd Zdd Z fddZd fdd	Z  ZS )	r=   c                 C   s   t jtt S r   )r   base62r3   inttime)r4   r   r   r   	timestamp   r6   zTimestampSigner.timestampc                    s    d|| j |  f }t |S rP   )rG   rW   superr>   rN   rK   r   r   r>      s   zTimestampSigner.signNc                    sn   t  |}|| jd\}}tj|}|dur5t|tj	r#|
 }t | }||kr5td||f |S )zk
        Retrieve original value and check it wasn't signed more
        than max_age seconds ago.
        r9   NzSignature age %s > %s seconds)rX   rE   rQ   rG   r   rT   r!   
isinstancedatetime	timedeltatotal_secondsrV   r   )r4   r#   rC   resultrW   agerY   r   r   rE      s   
zTimestampSigner.unsignr   )r   r   r   rW   r>   rE   __classcell__r   r   rY   r   r=      s    r=   )r&   ) r   r   r[   r1   rerV   r;   django.confr   django.utilsr   django.utils.cryptor   r   django.utils.encodingr   django.utils.module_loadingr   compilerH   	Exceptionr	   r   r   r   r%   r+   r,   r2   r7   r*   r=   r   r   r   r   <module>   s0    #

!