123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478 |
- # -*- coding: utf-8 -*-
- # Copyright 2014, 2015 OpenMarket Ltd
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from twisted.internet import defer, reactor, protocol
- from twisted.internet.error import DNSLookupError
- from twisted.web.client import readBody, _AgentBase, _URI
- from twisted.web.http_headers import Headers
- from twisted.web._newclient import ResponseDone
- from synapse.http.endpoint import matrix_federation_endpoint
- from synapse.util.async import sleep
- from synapse.util.logcontext import PreserveLoggingContext
- from syutil.jsonutil import encode_canonical_json
- from synapse.api.errors import (
- SynapseError, Codes, HttpResponseException,
- )
- from syutil.crypto.jsonsign import sign_json
- import simplejson as json
- import logging
- import urllib
- import urlparse
- logger = logging.getLogger(__name__)
- class MatrixFederationHttpAgent(_AgentBase):
- def __init__(self, reactor, pool=None):
- _AgentBase.__init__(self, reactor, pool)
- def request(self, destination, endpoint, method, path, params, query,
- headers, body_producer):
- host = b""
- port = 0
- fragment = b""
- parsed_URI = _URI(b"http", destination, host, port, path, params,
- query, fragment)
- # Set the connection pool key to be the destination.
- key = destination
- return self._requestWithEndpoint(key, endpoint, method, parsed_URI,
- headers, body_producer,
- parsed_URI.originForm)
- class MatrixFederationHttpClient(object):
- """HTTP client used to talk to other homeservers over the federation
- protocol. Send client certificates and signs requests.
- Attributes:
- agent (twisted.web.client.Agent): The twisted Agent used to send the
- requests.
- """
- def __init__(self, hs):
- self.hs = hs
- self.signing_key = hs.config.signing_key[0]
- self.server_name = hs.hostname
- self.agent = MatrixFederationHttpAgent(reactor)
- self.clock = hs.get_clock()
- self.version_string = hs.version_string
- @defer.inlineCallbacks
- def _create_request(self, destination, method, path_bytes,
- body_callback, headers_dict={}, param_bytes=b"",
- query_bytes=b"", retry_on_dns_fail=True):
- """ Creates and sends a request to the given url
- """
- headers_dict[b"User-Agent"] = [self.version_string]
- headers_dict[b"Host"] = [destination]
- url_bytes = urlparse.urlunparse(
- ("", "", path_bytes, param_bytes, query_bytes, "",)
- )
- logger.info("Sending request to %s: %s %s",
- destination, method, url_bytes)
- logger.debug(
- "Types: %s",
- [
- type(destination), type(method), type(path_bytes),
- type(param_bytes),
- type(query_bytes)
- ]
- )
- # XXX: Would be much nicer to retry only at the transaction-layer
- # (once we have reliable transactions in place)
- retries_left = 5
- endpoint = self._getEndpoint(reactor, destination)
- while True:
- producer = None
- if body_callback:
- producer = body_callback(method, url_bytes, headers_dict)
- try:
- with PreserveLoggingContext():
- request_deferred = self.agent.request(
- destination,
- endpoint,
- method,
- path_bytes,
- param_bytes,
- query_bytes,
- Headers(headers_dict),
- producer
- )
- response = yield self.clock.time_bound_deferred(
- request_deferred,
- time_out=60,
- )
- logger.debug("Got response to %s", method)
- break
- except Exception as e:
- if not retry_on_dns_fail and isinstance(e, DNSLookupError):
- logger.warn(
- "DNS Lookup failed to %s with %s",
- destination,
- e
- )
- raise
- logger.warn(
- "Sending request failed to %s: %s %s: %s - %s",
- destination,
- method,
- url_bytes,
- type(e).__name__,
- _flatten_response_never_received(e),
- )
- if retries_left:
- yield sleep(2 ** (5 - retries_left))
- retries_left -= 1
- else:
- raise
- logger.info(
- "Received response %d %s for %s: %s %s",
- response.code,
- response.phrase,
- destination,
- method,
- url_bytes
- )
- if 200 <= response.code < 300:
- pass
- else:
- # :'(
- # Update transactions table?
- body = yield readBody(response)
- raise HttpResponseException(
- response.code, response.phrase, body
- )
- defer.returnValue(response)
- def sign_request(self, destination, method, url_bytes, headers_dict,
- content=None):
- request = {
- "method": method,
- "uri": url_bytes,
- "origin": self.server_name,
- "destination": destination,
- }
- if content is not None:
- request["content"] = content
- request = sign_json(request, self.server_name, self.signing_key)
- auth_headers = []
- for key, sig in request["signatures"][self.server_name].items():
- auth_headers.append(bytes(
- "X-Matrix origin=%s,key=\"%s\",sig=\"%s\"" % (
- self.server_name, key, sig,
- )
- ))
- headers_dict[b"Authorization"] = auth_headers
- @defer.inlineCallbacks
- def put_json(self, destination, path, data={}, json_data_callback=None):
- """ Sends the specifed json data using PUT
- Args:
- destination (str): The remote server to send the HTTP request
- to.
- path (str): The HTTP path.
- data (dict): A dict containing the data that will be used as
- the request body. This will be encoded as JSON.
- json_data_callback (callable): A callable returning the dict to
- use as the request body.
- Returns:
- Deferred: Succeeds when we get a 2xx HTTP response. The result
- will be the decoded JSON body. On a 4xx or 5xx error response a
- CodeMessageException is raised.
- """
- if not json_data_callback:
- def json_data_callback():
- return data
- def body_callback(method, url_bytes, headers_dict):
- json_data = json_data_callback()
- self.sign_request(
- destination, method, url_bytes, headers_dict, json_data
- )
- producer = _JsonProducer(json_data)
- return producer
- response = yield self._create_request(
- destination.encode("ascii"),
- "PUT",
- path.encode("ascii"),
- body_callback=body_callback,
- headers_dict={"Content-Type": ["application/json"]},
- )
- if 200 <= response.code < 300:
- # We need to update the transactions table to say it was sent?
- c_type = response.headers.getRawHeaders("Content-Type")
- if "application/json" not in c_type:
- raise RuntimeError(
- "Content-Type not application/json"
- )
- logger.debug("Getting resp body")
- body = yield readBody(response)
- logger.debug("Got resp body")
- defer.returnValue(json.loads(body))
- @defer.inlineCallbacks
- def post_json(self, destination, path, data={}):
- """ Sends the specifed json data using POST
- Args:
- destination (str): The remote server to send the HTTP request
- to.
- path (str): The HTTP path.
- data (dict): A dict containing the data that will be used as
- the request body. This will be encoded as JSON.
- Returns:
- Deferred: Succeeds when we get a 2xx HTTP response. The result
- will be the decoded JSON body. On a 4xx or 5xx error response a
- CodeMessageException is raised.
- """
- def body_callback(method, url_bytes, headers_dict):
- self.sign_request(
- destination, method, url_bytes, headers_dict, data
- )
- return _JsonProducer(data)
- response = yield self._create_request(
- destination.encode("ascii"),
- "POST",
- path.encode("ascii"),
- body_callback=body_callback,
- headers_dict={"Content-Type": ["application/json"]},
- )
- if 200 <= response.code < 300:
- # We need to update the transactions table to say it was sent?
- c_type = response.headers.getRawHeaders("Content-Type")
- if "application/json" not in c_type:
- raise RuntimeError(
- "Content-Type not application/json"
- )
- logger.debug("Getting resp body")
- body = yield readBody(response)
- logger.debug("Got resp body")
- defer.returnValue(json.loads(body))
- @defer.inlineCallbacks
- def get_json(self, destination, path, args={}, retry_on_dns_fail=True):
- """ GETs some json from the given host homeserver and path
- Args:
- destination (str): The remote server to send the HTTP request
- to.
- path (str): The HTTP path.
- args (dict): A dictionary used to create query strings, defaults to
- None.
- Returns:
- Deferred: Succeeds when we get *any* HTTP response.
- The result of the deferred is a tuple of `(code, response)`,
- where `response` is a dict representing the decoded JSON body.
- """
- logger.debug("get_json args: %s", args)
- encoded_args = {}
- for k, vs in args.items():
- if isinstance(vs, basestring):
- vs = [vs]
- encoded_args[k] = [v.encode("UTF-8") for v in vs]
- query_bytes = urllib.urlencode(encoded_args, True)
- logger.debug("Query bytes: %s Retry DNS: %s", args, retry_on_dns_fail)
- def body_callback(method, url_bytes, headers_dict):
- self.sign_request(destination, method, url_bytes, headers_dict)
- return None
- response = yield self._create_request(
- destination.encode("ascii"),
- "GET",
- path.encode("ascii"),
- query_bytes=query_bytes,
- body_callback=body_callback,
- retry_on_dns_fail=retry_on_dns_fail
- )
- if 200 <= response.code < 300:
- # We need to update the transactions table to say it was sent?
- c_type = response.headers.getRawHeaders("Content-Type")
- if "application/json" not in c_type:
- raise RuntimeError(
- "Content-Type not application/json"
- )
- logger.debug("Getting resp body")
- body = yield readBody(response)
- logger.debug("Got resp body")
- defer.returnValue(json.loads(body))
- @defer.inlineCallbacks
- def get_file(self, destination, path, output_stream, args={},
- retry_on_dns_fail=True, max_size=None):
- """GETs a file from a given homeserver
- Args:
- destination (str): The remote server to send the HTTP request to.
- path (str): The HTTP path to GET.
- output_stream (file): File to write the response body to.
- args (dict): Optional dictionary used to create the query string.
- Returns:
- A (int,dict) tuple of the file length and a dict of the response
- headers.
- """
- encoded_args = {}
- for k, vs in args.items():
- if isinstance(vs, basestring):
- vs = [vs]
- encoded_args[k] = [v.encode("UTF-8") for v in vs]
- query_bytes = urllib.urlencode(encoded_args, True)
- logger.debug("Query bytes: %s Retry DNS: %s", args, retry_on_dns_fail)
- def body_callback(method, url_bytes, headers_dict):
- self.sign_request(destination, method, url_bytes, headers_dict)
- return None
- response = yield self._create_request(
- destination.encode("ascii"),
- "GET",
- path.encode("ascii"),
- query_bytes=query_bytes,
- body_callback=body_callback,
- retry_on_dns_fail=retry_on_dns_fail
- )
- headers = dict(response.headers.getAllRawHeaders())
- try:
- length = yield _readBodyToFile(response, output_stream, max_size)
- except:
- logger.exception("Failed to download body")
- raise
- defer.returnValue((length, headers))
- def _getEndpoint(self, reactor, destination):
- return matrix_federation_endpoint(
- reactor, destination, timeout=10,
- ssl_context_factory=self.hs.tls_context_factory
- )
- class _ReadBodyToFileProtocol(protocol.Protocol):
- def __init__(self, stream, deferred, max_size):
- self.stream = stream
- self.deferred = deferred
- self.length = 0
- self.max_size = max_size
- def dataReceived(self, data):
- self.stream.write(data)
- self.length += len(data)
- if self.max_size is not None and self.length >= self.max_size:
- self.deferred.errback(SynapseError(
- 502,
- "Requested file is too large > %r bytes" % (self.max_size,),
- Codes.TOO_LARGE,
- ))
- self.deferred = defer.Deferred()
- self.transport.loseConnection()
- def connectionLost(self, reason):
- if reason.check(ResponseDone):
- self.deferred.callback(self.length)
- else:
- self.deferred.errback(reason)
- def _readBodyToFile(response, stream, max_size):
- d = defer.Deferred()
- response.deliverBody(_ReadBodyToFileProtocol(stream, d, max_size))
- return d
- class _JsonProducer(object):
- """ Used by the twisted http client to create the HTTP body from json
- """
- def __init__(self, jsn):
- self.reset(jsn)
- def reset(self, jsn):
- self.body = encode_canonical_json(jsn)
- self.length = len(self.body)
- def startProducing(self, consumer):
- consumer.write(self.body)
- return defer.succeed(None)
- def pauseProducing(self):
- pass
- def stopProducing(self):
- pass
- def _flatten_response_never_received(e):
- if hasattr(e, "reasons"):
- return ", ".join(
- _flatten_response_never_received(f.value)
- for f in e.reasons
- )
- else:
- return "%s: %s" % (type(e).__name__, e.message,)
|