Skip to content

Commit d65d0ca

Browse files
committed
Fix username and password encoding in URL
This is a Node.js bug, but it's better to fix this in Got. In the future we may use a different HTTP client, which doesn't support these properties in URL. Fixes #1169 Fixes #1317
1 parent eda69ff commit d65d0ca

File tree

3 files changed

+33
-13
lines changed

3 files changed

+33
-13
lines changed

source/core/index.ts

+6-1
Original file line numberDiff line numberDiff line change
@@ -1042,7 +1042,7 @@ export default class Request extends Duplex implements RequestEvents<Request> {
10421042

10431043
private async _makeRequest(): Promise<void> {
10441044
const {options} = this;
1045-
const {headers} = options;
1045+
const {headers, username, password} = options;
10461046
const cookieJar = options.cookieJar as PromiseCookieJar | undefined;
10471047

10481048
for (const key in headers) {
@@ -1058,6 +1058,11 @@ export default class Request extends Duplex implements RequestEvents<Request> {
10581058
headers['accept-encoding'] = supportsBrotli ? 'gzip, deflate, br' : 'gzip, deflate';
10591059
}
10601060

1061+
if (username || password) {
1062+
const credentials = Buffer.from(`${username}:${password}`).toString('base64');
1063+
headers.authorization = `Basic ${credentials}`;
1064+
}
1065+
10611066
// Set cookies
10621067
if (cookieJar) {
10631068
const cookieString: string = await cookieJar.getCookieString(options.url!.toString());

source/core/options.ts

+11-12
Original file line numberDiff line numberDiff line change
@@ -1608,44 +1608,43 @@ export default class Options {
16081608
get username(): string {
16091609
const url = this._internals.url as URL;
16101610

1611-
if (url) {
1612-
return url.username;
1613-
}
1611+
const value = url ? url.username : this._internals.username;
16141612

1615-
return this._internals.username;
1613+
return decodeURIComponent(value);
16161614
}
16171615

16181616
set username(value: string) {
16191617
assert.string(value);
16201618

16211619
const url = this._internals.url as URL;
1620+
const fixedValue = encodeURIComponent(value);
16221621

16231622
if (url) {
1624-
url.username = value;
1623+
url.username = fixedValue;
16251624
} else {
1626-
this._internals.username = value;
1625+
this._internals.username = fixedValue;
16271626
}
16281627
}
16291628

16301629
get password(): string {
16311630
const url = this._internals.url as URL;
16321631

1633-
if (url) {
1634-
return url.password;
1635-
}
1632+
const value = url ? url.password : this._internals.password;
16361633

1637-
return this._internals.password;
1634+
return decodeURIComponent(value);
16381635
}
16391636

16401637
set password(value: string) {
16411638
assert.string(value);
16421639

16431640
const url = this._internals.url as URL;
16441641

1642+
const fixedValue = encodeURIComponent(value);
1643+
16451644
if (url) {
1646-
url.password = value;
1645+
url.password = fixedValue;
16471646
} else {
1648-
this._internals.password = value;
1647+
this._internals.password = fixedValue;
16491648
}
16501649
}
16511650

test/headers.ts

+16
Original file line numberDiff line numberDiff line change
@@ -260,3 +260,19 @@ test('strip port in host header if implicit standard port & protocol (HTTPS)', a
260260
const body = await got('https://httpbin.org/headers').json<{headers: Headers}>();
261261
t.is(body.headers.Host, 'httpbin.org');
262262
});
263+
264+
test('correctly encodes authorization header', withServer, async (t, server, got) => {
265+
server.get('/', echoHeaders);
266+
267+
const {authorization} = await got('', {username: 'test@'}).json();
268+
269+
t.is(authorization, `Basic ${Buffer.from('test@:').toString('base64')}`);
270+
});
271+
272+
test('url passes if credentials contain special characters', withServer, async (t, server, got) => {
273+
server.get('/', echoHeaders);
274+
275+
const {authorization} = await got('', {password: 't$es%t'}).json();
276+
277+
t.is(authorization, `Basic ${Buffer.from(':t$es%t').toString('base64')}`);
278+
});

0 commit comments

Comments
 (0)