mirror of
https://github.com/GAM-team/GAM.git
synced 2025-05-12 12:17:20 +00:00
185 lines
7.5 KiB
Python
185 lines
7.5 KiB
Python
"""passlib.exc -- exceptions & warnings raised by passlib"""
|
|
#=============================================================================
|
|
# exceptions
|
|
#=============================================================================
|
|
class MissingBackendError(RuntimeError):
|
|
"""Error raised if multi-backend handler has no available backends;
|
|
or if specifically requested backend is not available.
|
|
|
|
:exc:`!MissingBackendError` derives
|
|
from :exc:`RuntimeError`, since it usually indicates
|
|
lack of an external library or OS feature.
|
|
This is primarily raised by handlers which depend on
|
|
external libraries (which is currently just
|
|
:class:`~passlib.hash.bcrypt`).
|
|
"""
|
|
|
|
class PasswordSizeError(ValueError):
|
|
"""Error raised if a password exceeds the maximum size allowed
|
|
by Passlib (4096 characters).
|
|
|
|
Many password hash algorithms take proportionately larger amounts of time and/or
|
|
memory depending on the size of the password provided. This could present
|
|
a potential denial of service (DOS) situation if a maliciously large
|
|
password is provided to an application. Because of this, Passlib enforces
|
|
a maximum size limit, but one which should be *much* larger
|
|
than any legitimate password. :exc:`!PasswordSizeError` derives
|
|
from :exc:`!ValueError`.
|
|
|
|
.. note::
|
|
Applications wishing to use a different limit should set the
|
|
``PASSLIB_MAX_PASSWORD_SIZE`` environmental variable before
|
|
Passlib is loaded. The value can be any large positive integer.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
def __init__(self):
|
|
ValueError.__init__(self, "password exceeds maximum allowed size")
|
|
|
|
# this also prevents a glibc crypt segfault issue, detailed here ...
|
|
# http://www.openwall.com/lists/oss-security/2011/11/15/1
|
|
|
|
#=============================================================================
|
|
# warnings
|
|
#=============================================================================
|
|
class PasslibWarning(UserWarning):
|
|
"""base class for Passlib's user warnings,
|
|
derives from the builtin :exc:`UserWarning`.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
|
|
class PasslibConfigWarning(PasslibWarning):
|
|
"""Warning issued when non-fatal issue is found related to the configuration
|
|
of a :class:`~passlib.context.CryptContext` instance.
|
|
|
|
This occurs primarily in one of two cases:
|
|
|
|
* The CryptContext contains rounds limits which exceed the hard limits
|
|
imposed by the underlying algorithm.
|
|
* An explicit rounds value was provided which exceeds the limits
|
|
imposed by the CryptContext.
|
|
|
|
In both of these cases, the code will perform correctly & securely;
|
|
but the warning is issued as a sign the configuration may need updating.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
|
|
class PasslibHashWarning(PasslibWarning):
|
|
"""Warning issued when non-fatal issue is found with parameters
|
|
or hash string passed to a passlib hash class.
|
|
|
|
This occurs primarily in one of two cases:
|
|
|
|
* A rounds value or other setting was explicitly provided which
|
|
exceeded the handler's limits (and has been clamped
|
|
by the :ref:`relaxed<relaxed-keyword>` flag).
|
|
|
|
* A malformed hash string was encountered which (while parsable)
|
|
should be re-encoded.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
|
|
class PasslibRuntimeWarning(PasslibWarning):
|
|
"""Warning issued when something unexpected happens during runtime.
|
|
|
|
The fact that it's a warning instead of an error means Passlib
|
|
was able to correct for the issue, but that it's anonmalous enough
|
|
that the developers would love to hear under what conditions it occurred.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
|
|
class PasslibSecurityWarning(PasslibWarning):
|
|
"""Special warning issued when Passlib encounters something
|
|
that might affect security.
|
|
|
|
.. versionadded:: 1.6
|
|
"""
|
|
|
|
#=============================================================================
|
|
# error constructors
|
|
#
|
|
# note: these functions are used by the hashes in Passlib to raise common
|
|
# error messages. They are currently just functions which return ValueError,
|
|
# rather than subclasses of ValueError, since the specificity isn't needed
|
|
# yet; and who wants to import a bunch of error classes when catching
|
|
# ValueError will do?
|
|
#=============================================================================
|
|
|
|
def _get_name(handler):
|
|
return handler.name if handler else "<unnamed>"
|
|
|
|
#------------------------------------------------------------------------
|
|
# generic helpers
|
|
#------------------------------------------------------------------------
|
|
def type_name(value):
|
|
"return pretty-printed string containing name of value's type"
|
|
cls = value.__class__
|
|
if cls.__module__ and cls.__module__ not in ["__builtin__", "builtins"]:
|
|
return "%s.%s" % (cls.__module__, cls.__name__)
|
|
elif value is None:
|
|
return 'None'
|
|
else:
|
|
return cls.__name__
|
|
|
|
def ExpectedTypeError(value, expected, param):
|
|
"error message when param was supposed to be one type, but found another"
|
|
# NOTE: value is never displayed, since it may sometimes be a password.
|
|
name = type_name(value)
|
|
return TypeError("%s must be %s, not %s" % (param, expected, name))
|
|
|
|
def ExpectedStringError(value, param):
|
|
"error message when param was supposed to be unicode or bytes"
|
|
return ExpectedTypeError(value, "unicode or bytes", param)
|
|
|
|
#------------------------------------------------------------------------
|
|
# encrypt/verify parameter errors
|
|
#------------------------------------------------------------------------
|
|
def MissingDigestError(handler=None):
|
|
"raised when verify() method gets passed config string instead of hash"
|
|
name = _get_name(handler)
|
|
return ValueError("expected %s hash, got %s config string instead" %
|
|
(name, name))
|
|
|
|
def NullPasswordError(handler=None):
|
|
"raised by OS crypt() supporting hashes, which forbid NULLs in password"
|
|
name = _get_name(handler)
|
|
return ValueError("%s does not allow NULL bytes in password" % name)
|
|
|
|
#------------------------------------------------------------------------
|
|
# errors when parsing hashes
|
|
#------------------------------------------------------------------------
|
|
def InvalidHashError(handler=None):
|
|
"error raised if unrecognized hash provided to handler"
|
|
return ValueError("not a valid %s hash" % _get_name(handler))
|
|
|
|
def MalformedHashError(handler=None, reason=None):
|
|
"error raised if recognized-but-malformed hash provided to handler"
|
|
text = "malformed %s hash" % _get_name(handler)
|
|
if reason:
|
|
text = "%s (%s)" % (text, reason)
|
|
return ValueError(text)
|
|
|
|
def ZeroPaddedRoundsError(handler=None):
|
|
"error raised if hash was recognized but contained zero-padded rounds field"
|
|
return MalformedHashError(handler, "zero-padded rounds")
|
|
|
|
#------------------------------------------------------------------------
|
|
# settings / hash component errors
|
|
#------------------------------------------------------------------------
|
|
def ChecksumSizeError(handler, raw=False):
|
|
"error raised if hash was recognized, but checksum was wrong size"
|
|
# TODO: if handler.use_defaults is set, this came from app-provided value,
|
|
# not from parsing a hash string, might want different error msg.
|
|
checksum_size = handler.checksum_size
|
|
unit = "bytes" if raw else "chars"
|
|
reason = "checksum must be exactly %d %s" % (checksum_size, unit)
|
|
return MalformedHashError(handler, reason)
|
|
|
|
#=============================================================================
|
|
# eof
|
|
#=============================================================================
|