2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-04-22 17:53:18 -06:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 08:10:52 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2018-06-05 11:31:40 -06:00
|
|
|
import re
|
2021-02-26 07:02:06 -07:00
|
|
|
from typing import Union
|
2018-06-05 11:31:40 -06:00
|
|
|
|
2021-02-26 07:02:06 -07:00
|
|
|
from twisted.internet import address, task
|
2019-02-20 04:35:52 -07:00
|
|
|
from twisted.web.client import FileBodyProducer
|
2021-01-12 05:34:16 -07:00
|
|
|
from twisted.web.iweb import IRequest
|
2018-04-22 17:53:18 -06:00
|
|
|
|
|
|
|
from synapse.api.errors import SynapseError
|
|
|
|
|
|
|
|
|
|
|
|
class RequestTimedOutError(SynapseError):
|
|
|
|
"""Exception representing timeout of an outbound request"""
|
2019-06-20 03:32:02 -06:00
|
|
|
|
2021-12-14 05:00:47 -07:00
|
|
|
def __init__(self, msg: str):
|
2020-09-29 03:29:21 -06:00
|
|
|
super().__init__(504, msg)
|
2018-06-05 11:31:40 -06:00
|
|
|
|
|
|
|
|
2018-09-13 11:45:34 -06:00
|
|
|
ACCESS_TOKEN_RE = re.compile(r"(\?.*access(_|%5[Ff])token=)[^&]*(.*)$")
|
2019-10-03 05:57:26 -06:00
|
|
|
CLIENT_SECRET_RE = re.compile(r"(\?.*client(_|%5[Ff])secret=)[^&]*(.*)$")
|
2018-06-05 11:31:40 -06:00
|
|
|
|
|
|
|
|
2021-12-14 05:00:47 -07:00
|
|
|
def redact_uri(uri: str) -> str:
|
2019-10-03 05:57:26 -06:00
|
|
|
"""Strips sensitive information from the uri replaces with <redacted>"""
|
|
|
|
uri = ACCESS_TOKEN_RE.sub(r"\1<redacted>\3", uri)
|
|
|
|
return CLIENT_SECRET_RE.sub(r"\1<redacted>\3", uri)
|
2019-02-20 04:35:52 -07:00
|
|
|
|
|
|
|
|
|
|
|
class QuieterFileBodyProducer(FileBodyProducer):
|
|
|
|
"""Wrapper for FileBodyProducer that avoids CRITICAL errors when the connection drops.
|
|
|
|
|
|
|
|
Workaround for https://github.com/matrix-org/synapse/issues/4003 /
|
|
|
|
https://twistedmatrix.com/trac/ticket/6528
|
|
|
|
"""
|
2019-06-20 03:32:02 -06:00
|
|
|
|
2021-12-14 05:00:47 -07:00
|
|
|
def stopProducing(self) -> None:
|
2019-02-20 04:35:52 -07:00
|
|
|
try:
|
|
|
|
FileBodyProducer.stopProducing(self)
|
|
|
|
except task.TaskStopped:
|
|
|
|
pass
|
2021-01-12 05:34:16 -07:00
|
|
|
|
|
|
|
|
2021-02-26 07:02:06 -07:00
|
|
|
def get_request_uri(request: IRequest) -> bytes:
|
|
|
|
"""Return the full URI that was requested by the client"""
|
|
|
|
return b"%s://%s%s" % (
|
|
|
|
b"https" if request.isSecure() else b"http",
|
|
|
|
_get_requested_host(request),
|
|
|
|
# despite its name, "request.uri" is only the path and query-string.
|
|
|
|
request.uri,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _get_requested_host(request: IRequest) -> bytes:
|
|
|
|
hostname = request.getHeader(b"host")
|
|
|
|
if hostname:
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
# no Host header, use the address/port that the request arrived on
|
2021-07-15 04:02:43 -06:00
|
|
|
host: Union[address.IPv4Address, address.IPv6Address] = request.getHost()
|
2021-02-26 07:02:06 -07:00
|
|
|
|
|
|
|
hostname = host.host.encode("ascii")
|
|
|
|
|
|
|
|
if request.isSecure() and host.port == 443:
|
|
|
|
# default port for https
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
if not request.isSecure() and host.port == 80:
|
|
|
|
# default port for http
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
return b"%s:%i" % (
|
|
|
|
hostname,
|
|
|
|
host.port,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-01-12 05:34:16 -07:00
|
|
|
def get_request_user_agent(request: IRequest, default: str = "") -> str:
|
|
|
|
"""Return the last User-Agent header, or the given default."""
|
|
|
|
# There could be raw utf-8 bytes in the User-Agent header.
|
|
|
|
|
|
|
|
# N.B. if you don't do this, the logger explodes cryptically
|
|
|
|
# with maximum recursion trying to log errors about
|
|
|
|
# the charset problem.
|
|
|
|
# c.f. https://github.com/matrix-org/synapse/issues/3471
|
|
|
|
|
|
|
|
h = request.getHeader(b"User-Agent")
|
|
|
|
return h.decode("ascii", "replace") if h else default
|