about summary refs log tree commit diff
path: root/.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py
diff options
context:
space:
mode:
Diffstat (limited to '.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py')
-rw-r--r--.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py194
1 files changed, 194 insertions, 0 deletions
diff --git a/.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py b/.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py
new file mode 100644
index 00000000..2dac5a3b
--- /dev/null
+++ b/.venv/lib/python3.12/site-packages/msrest/pipeline/requests.py
@@ -0,0 +1,194 @@
+# --------------------------------------------------------------------------
+#
+# Copyright (c) Microsoft Corporation. All rights reserved.
+#
+# The MIT License (MIT)
+#
+# Permission is hereby granted, free of charge, to any person obtaining a copy
+# of this software and associated documentation files (the ""Software""), to
+# deal in the Software without restriction, including without limitation the
+# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
+# sell copies of the Software, and to permit persons to whom the Software is
+# furnished to do so, subject to the following conditions:
+#
+# The above copyright notice and this permission notice shall be included in
+# all copies or substantial portions of the Software.
+#
+# THE SOFTWARE IS PROVIDED *AS IS*, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
+# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
+# IN THE SOFTWARE.
+#
+# --------------------------------------------------------------------------
+"""
+This module is the requests implementation of Pipeline ABC
+"""
+from __future__ import absolute_import  # we have a "requests" module that conflicts with "requests" on Py2.7
+import contextlib
+import logging
+import threading
+from typing import TYPE_CHECKING, List, Callable, Iterator, Any, Union, Dict, Optional  # pylint: disable=unused-import
+import warnings
+
+from oauthlib import oauth2
+import requests
+from requests.models import CONTENT_CHUNK_SIZE
+
+from urllib3 import Retry  # Needs requests 2.16 at least to be safe
+
+from ..exceptions import (
+    TokenExpiredError,
+    ClientRequestError,
+    raise_with_traceback
+)
+from ..universal_http import ClientRequest
+from ..universal_http.requests import BasicRequestsHTTPSender
+from . import HTTPSender, HTTPPolicy, Response, Request
+
+
+_LOGGER = logging.getLogger(__name__)
+
+
+class RequestsCredentialsPolicy(HTTPPolicy):
+    """Implementation of request-oauthlib except and retry logic.
+    """
+    def __init__(self, credentials):
+        super(RequestsCredentialsPolicy, self).__init__()
+        self._creds = credentials
+
+    def send(self, request, **kwargs):
+        session = request.context.session
+        try:
+            self._creds.signed_session(session)
+        except TypeError: # Credentials does not support session injection
+            _LOGGER.warning("Your credentials class does not support session injection. Performance will not be at the maximum.")
+            request.context.session = session = self._creds.signed_session()
+
+        try:
+            try:
+                return self.next.send(request, **kwargs)
+            except (oauth2.rfc6749.errors.InvalidGrantError,
+                    oauth2.rfc6749.errors.TokenExpiredError) as err:
+                error = "Token expired or is invalid. Attempting to refresh."
+                _LOGGER.warning(error)
+
+            try:
+                try:
+                    self._creds.refresh_session(session)
+                except TypeError: # Credentials does not support session injection
+                    _LOGGER.warning("Your credentials class does not support session injection. Performance will not be at the maximum.")
+                    request.context.session = session = self._creds.refresh_session()
+
+                return self.next.send(request, **kwargs)
+            except (oauth2.rfc6749.errors.InvalidGrantError,
+                    oauth2.rfc6749.errors.TokenExpiredError) as err:
+                msg = "Token expired or is invalid."
+                raise_with_traceback(TokenExpiredError, msg, err)
+
+        except (requests.RequestException,
+                oauth2.rfc6749.errors.OAuth2Error) as err:
+            msg = "Error occurred in request."
+            raise_with_traceback(ClientRequestError, msg, err)
+
+class RequestsPatchSession(HTTPPolicy):
+    """Implements request level configuration
+    that are actually to be done at the session level.
+
+    This is highly deprecated, and is totally legacy.
+    The pipeline structure allows way better design for this.
+    """
+    _protocols = ['http://', 'https://']
+
+    def send(self, request, **kwargs):
+        """Patch the current session with Request level operation config.
+
+        This is deprecated, we shouldn't patch the session with
+        arguments at the Request, and "config" should be used.
+        """
+        session = request.context.session
+
+        old_max_redirects = None
+        if 'max_redirects' in kwargs:
+            warnings.warn("max_redirects in operation kwargs is deprecated, use config.redirect_policy instead",
+                          DeprecationWarning)
+            old_max_redirects = session.max_redirects
+            session.max_redirects = int(kwargs['max_redirects'])
+
+        old_trust_env = None
+        if 'use_env_proxies' in kwargs:
+            warnings.warn("use_env_proxies in operation kwargs is deprecated, use config.proxies instead",
+                          DeprecationWarning)
+            old_trust_env = session.trust_env
+            session.trust_env = bool(kwargs['use_env_proxies'])
+
+        old_retries = {}
+        if 'retries' in kwargs:
+            warnings.warn("retries in operation kwargs is deprecated, use config.retry_policy instead",
+                          DeprecationWarning)
+            max_retries = kwargs['retries']
+            for protocol in self._protocols:
+                old_retries[protocol] = session.adapters[protocol].max_retries
+                session.adapters[protocol].max_retries = max_retries
+
+        try:
+            return self.next.send(request, **kwargs)
+        finally:
+            if old_max_redirects:
+                session.max_redirects = old_max_redirects
+
+            if old_trust_env:
+                session.trust_env = old_trust_env
+
+            if old_retries:
+                for protocol in self._protocols:
+                    session.adapters[protocol].max_retries = old_retries[protocol]
+
+class RequestsContext(object):
+    def __init__(self, session):
+        self.session = session
+
+
+class PipelineRequestsHTTPSender(HTTPSender):
+    """Implements a basic Pipeline, that supports universal HTTP lib "requests" driver.
+    """
+
+    def __init__(self, universal_http_requests_driver=None):
+        # type: (Optional[BasicRequestsHTTPSender]) -> None
+        self.driver = universal_http_requests_driver or BasicRequestsHTTPSender()
+
+    def __enter__(self):
+        # type: () -> PipelineRequestsHTTPSender
+        self.driver.__enter__()
+        return self
+
+    def __exit__(self, *exc_details):  # pylint: disable=arguments-differ
+        self.driver.__exit__(*exc_details)
+
+    def close(self):
+        self.__exit__()
+
+    def build_context(self):
+        # type: () -> RequestsContext
+        return RequestsContext(
+            session=self.driver.session,
+        )
+
+    def send(self, request, **kwargs):
+        # type: (Request[ClientRequest], Any) -> Response
+        """Send request object according to configuration.
+
+        :param Request request: The request object to be sent.
+        """
+        if request.context is None:  # Should not happen, but make mypy happy and does not hurt
+            request.context = self.build_context()
+
+        if request.context.session is not self.driver.session:
+            kwargs['session'] = request.context.session
+
+        return Response(
+            request,
+            self.driver.send(request.http_request, **kwargs)
+        )