Source code for aiosasl.plain

########################################################################
# File name: plain.py
# This file is part of: aiosasl
#
# LICENSE
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as
# published by the Free Software Foundation, either version 3 of the
# License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this program.  If not, see
# <http://www.gnu.org/licenses/>.
#
########################################################################
import logging
import typing

from . import common, statemachine


logger = logging.getLogger(__name__)


[docs]class PLAIN(statemachine.SASLMechanism): """ The password-based ``PLAIN`` SASL mechanism (see :rfc:`4616`). .. warning:: This is generally unsafe over unencrypted connections and should not be used there. Exclusion of the ``PLAIN`` mechanism over unsafe connections is out of scope for :mod:`aiosasl` and needs to be handled by the protocol implementation! `credential_provider` must be coroutine which returns a ``(user, password)`` tuple. """ def __init__(self, credential_provider: common.CredentialProvider): super().__init__() self._credential_provider = credential_provider @classmethod def any_supported( cls, mechanisms: typing.Iterable[str], ) -> typing.Any: if "PLAIN" in mechanisms: return "PLAIN" return None async def authenticate( self, sm: statemachine.SASLStateMachine, mechanism: typing.Any, ) -> None: logger.info("attempting PLAIN mechanism") username, password = await self._credential_provider() encoded_username = username.encode("utf8") encoded_password = password.encode("utf8") if b"\0" in encoded_username or b"\0" in encoded_password: raise ValueError("NUL byte in username or password is disallowed") state, _ = await sm.initiate( mechanism="PLAIN", payload=b"\0" + encoded_username + b"\0" + encoded_password, ) if state != common.SASLState.SUCCESS: raise common.SASLFailure( None, text="SASL protocol violation")