def register_service(json): url = service_regisrty_url + "/mgmt" return post(url, verify=False, pkcs12_filename=pkcs12_filename, pkcs12_password=pkcs12_password, json=json)
def register_service(json): url = urls["service_registry_url"] + "/mgmt" return post(url, verify=False, pkcs12_filename=cert["pkcs12_filename"], pkcs12_password=cert["pkcs12_password"], json=json)
def add_intracloud_authorization(): url = authorization_url + "/mgmt/intracloud" authorization_json = create_authorization_json() return post(url, verify=False, pkcs12_filename=pkcs12_filename, pkcs12_password=pkcs12_password, json=authorization_json)
def create_orchestration_store_entry(): url = orchestration_url + "/mgmt/store" orchestration_json = create_orchestration_json() return post(url, verify=False, pkcs12_filename=pkcs12_filename, pkcs12_password=pkcs12_password, json=orchestration_json)
def create_orchestration_store_entry(consumer, producer): url = urls["orchestration_url"] + "/mgmt/store" orchestration_json = create_orchestration_json(consumer, producer) print(orchestration_json) return post(url, verify=False, pkcs12_filename=cert["pkcs12_filename"], pkcs12_password=cert["pkcs12_password"], json=orchestration_json)
def autenticar(self, url=AUTENTICA_URL, certificate=PKCS12_FILENAME, password=PKCS12_PASSWORD, headers={'Role-Type': 'DEPOSIT'}): return post(AUTENTICA_URL, headers=headers, pkcs12_filename=certificate, pkcs12_password=password, verify=False)
def parse_log(url, regex, log): log.system = platform.system() if re.match(regex, str(log)): payload = log.__dict__ r = requests.post( url, json=payload, pkcs12_filename=KEY_STORE_PATH, pkcs12_password=os.environ['CODE10_SIEM_CERT_CLIENT_KEY_PASS'], verify=CA_CERT_PATH) print(log.timestamp + "\t" + r.text)
def cert_post(url, **kwargs): """ Post request with certificate :param url: url to post :param data: data to post :param headers: optional headers :return: request response """ logger.info(f"POST {url}") kwargs = _add_cert_info(kwargs) response = post(url, **kwargs) logger.info(f"RESPONSE {response.status_code}, {response.reason}") return response
def test_auth(token): id = urllib.parse.unquote_plus(cnf.RESOURCE_ID[1]) assert app.auth(None, id, 'play') == False assert app.auth(None, id, 'publish') == False incorrect_response = { util.generate_random_chars(): util.generate_random_chars() } assert app.auth(incorrect_response, cnf.RESOURCE_ID[1], 'play') == False response = post( url=cnf.INTROSPECT_ENDPOINT, headers={"content-type": "application/json"}, data=json.dumps({'token': urllib.parse.unquote_plus(token)}), pkcs12_filename='../auth-backend/' + config.SERVER_CERTIFICATE, pkcs12_password='', verify=False) assert app.auth(response.json(), id, 'play') == True assert app.auth(response.json(), id, 'publish') == True assert app.auth(response.json(), id, util.generate_random_chars()) == False print('Auth Test Passed!')
def sign(): url = "https://sandbox.99bill.com:9445/cnp/ind_auth" data = '''<?xml version="1.0" encoding="utf-8" standalone="yes"?> <MasMessage xmlns="http://www.99bill.com/mas_cnp_merchant_interface"> <version>1.0</version><indAuthContent><merchantId>104110045112012</merchantId> <terminalId>00002012</terminalId> <customerId></customerId> <externalRefNumber>20210419000000001002</externalRefNumber> <pan>6239734964680536</pan> <cardHolderName>王五</cardHolderName> <idType>0</idType> <cardHolderId>110101199003075672</cardHolderId> <phoneNO>18888888889</phoneNO></indAuthContent></MasMessage>''' header = {"Content-Type": "text/xml; charset=UTF-8", 'Connection': 'close', "Authorization": "Basic MTA0MTEwMDQ1MTEyMDEyOnZwb3MxMjM="} resp = requests_pkcs12.post(url, headers=header, data=(data).encode('utf-8'), pkcs12_filename='10411004511201123.pfx', pkcs12_password='******', verify=False) print("返回参数:", resp.text) print("状态码:", resp.status_code)
def _post( self, url: str, tokens: dict, cnpj: str, payload: dict, certificate=PKCS12_FILENAME, password=PKCS12_PASSWORD, ): headers = { 'X-CSRF-Token': tokens['xcsrftoken'], 'authorization': tokens['authorization'], 'Cnpj-Representante': cnpj } r = post(url, headers=headers, json=payload, pkcs12_filename=certificate, pkcs12_password=password, verify=False) return r
consumer_name, provider_name).json()["response"][0]["provider"]["address"] proivder_port = test_consumer.start_orchestration_based_on_id( consumer_name, provider_name).json()["response"][0]["provider"]["port"] service_uri_pick_up = test_consumer.start_orchestration_based_on_id( consumer_name, provider_name).json()["response"][0]["serviceUri"] service_uri_place = test_consumer.start_orchestration_based_on_id( consumer_name, provider_name).json()["response"][1]["serviceUri"] service_uri_direction = test_consumer.start_orchestration_based_on_id( consumer_name, provider_name).json()["response"][2]["serviceUri"] url = 'http://' + provider_ip + ":" + str(proivder_port) # TODO flask api direction_json = {'direction': "left"} # print(post(url + service_uri_pick_up, # verify=False, json=json # ).json()) print( post(url + service_uri_direction, verify=False, json=direction_json).json()) while (True): direction_keyboard_input = input("arrowhead input requested. What to do? ") direction_json = {'direction': direction_keyboard_input} print( post(url + service_uri_direction, verify=False, json=direction_json).json())
phone.system = 'phone' phone.value = row['phone_number'] patient.telecom = [phone] patient.birthDate = fd.FHIRDate(row['date_of_birth']) emr = ident.Identifier() emr.system = 'http://clientregistry.org/openmrs' emr.value = row['rec_id'] art = ident.Identifier() art.system = 'http://system1/artnumber' art.value = row['art_number'] nin = ident.Identifier() nin.system = 'http://system1/nationalid' nin.value = row['uganda_nin'] patient.identifier = [emr, art, nin] # print(json.dumps(patient.as_json())) headers = {'Content-Type': 'application/json'} start = time.time() response = post(server, headers=headers, data=json.dumps(patient.as_json()), pkcs12_filename=clientcert, pkcs12_password='', verify=servercert) end = time.time() print(index, response.headers['location'], " | ", round((end - start), 1), "ms") # response.headers['Date'] # print(response.headers) # In[ ]:
# BASE_URL = 'https://ajna.labin.rf08.srf/ajnaapi' if len(sys.argv) < 2: print('Informe CE-Mercante') sys.exit(0) ce_mercante = sys.argv[1] if len(sys.argv) > 2: usuario = sys.argv[2] senha = sys.argv[3] # Login por usuario e senha print('Fazendo login com usuário e senha') payload = {'username': usuario, 'password': senha} print(payload) r = requests.post(BASE_URL + '/api/login', json=payload, verify=False) else: # Login por Certificado print('Fazendo login com certificado') r = requests.get(BASE_URL + '/api/login_certificado', pkcs12_filename='ivan.p12', pkcs12_password='******', verify=False) print(r.status_code) print(r.text) jwt_token = r.json().get('access_token') my_headers = {'Authorization': 'Bearer %s' % jwt_token} # Pesquisar um conhecimento, retornar lista de contêineres e de imagens payload = {
from requests_pkcs12 import post,get import json from base64 import b64encode url = 'https://<HOST>/iot/gateway/rest/measures/<ALTERNATE ID>' certificate_location = '<Location to .P12 file>' password = '******' headers = {'Content-type': 'application/json'} json_data = { "capabilityAlternateId": "100", "sensorAlternateId": "1B", "measures": [{"temperature": "600"}]}; #sample payload data=json.dumps(json_data) # Sending data/timeseries data to the platform. r = post(url, pkcs12_filename=certificate_location, pkcs12_password=password,data=data,headers=headers) print(r.text) # Recieving Data/Timeseries user_name = "USERNAME" password = "******" user_pass = user_name+":"+password basicAuthToken = b64encode(user_pass.encode()).decode("ascii") headers = { 'Authorization' : 'Basic %s' % basicAuthToken } url2 = 'https://<HOST>/iot/core/api/v1/devices/<ID>/measures?skip=0&top=100' r = get(url2, headers=headers) print(r.text) #The recieved string is a son string that can be converted back to son obect and used......
def post(self, url: str, json: dict) -> dict: return self._handle_response( post(url, json=json, headers=self._headers, **self._cert_args))
"username": inputUsername, "password": userPassword, "email": f"{inputUsername}[email protected]", "subject_dn":f"CN={inputUsername},O={inputOrganization}", "ca_name": "Issuing_CA", "token_type": "P12" } # If this triggers ssl error, try with no password protection on p12 as mentioned here: http://docs.python-requests.org/en/master/user/advanced/ # Get trusted Management CA for admin operations mgtCaUrl = "{}/ejbca/publicweb/webdist/certdist?cmd=cacert&issuer=CN%3DManagementCA%2COU%3DWP923%2CO%3DDRIVER+PROJECT&level=0".format(inputEjbcaPubBaseUrl) response = requests_pkcs12.get(mgtCaUrl, allow_redirects=False) mgtCaCertPath = os.path.join(tmpDir, 'mgt-ca-crt.pem') open(mgtCaCertPath, 'w').write(response.text) response = requests_pkcs12.post(eesApiUrl, headers=headers, json=userDataJson, verify=mgtCaCertPath, pkcs12_filename=superadminP12Path, pkcs12_password=superadminPass) if response.status_code != 200: raise RuntimeError(f"User registration failed. Server response: {response.text}") # Request certificate certEnrollApiUrl = '%s/ejbca/ejbca-rest-api/v1/certificate/enrollkeystore' % inputEjbcaAdminBaseUrl certReqJson = { "username":inputUsername, "password":userPassword, "key_alg":"RSA", "key_spec":"2048" } response = requests_pkcs12.post(certEnrollApiUrl, headers=headers, json=certReqJson, verify=mgtCaCertPath, pkcs12_filename=superadminP12Path, pkcs12_password=superadminPass) if response.status_code != 200: raise RuntimeError(f"Certificate enrollment failed. Server response: {response.text}")
url = "https://nfe.fazenda.sp.gov.br/ws/nfestatusservico4.asmx" body = """<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:nfes="http://www.portalfiscal.inf.br/nfe/wsdl/NFeStatusServico4"> <soap:Header/> <soap:Body> <nfes:nfeDadosMsg> <consStatServ xmlns="http://www.portalfiscal.inf.br/nfe" versao="4.00"><tpAmb>1</tpAmb><cUF>35</cUF><xServ>STATUS</xServ></consStatServ></nfes:nfeDadosMsg> </soap:Body> </soap:Envelope>""" tamanhobody = len(body) headers = { 'content-type': 'text/xml; charset=utf-8', 'Content-Length': str(tamanhobody) } #caminho absoluto ou relativo para certificado modelo PFX e senha do certificado certificado = 'C:\\caminho\\do\\certificado.pfx' senha = b'senhaaqui' response = requests_pkcs12.post(url, data=body, headers=headers, pkcs12_filename=certificado, pkcs12_password=senha, verify=False) print(response.content) print(response.status_code)