2014-08-12 08:10:52 -06:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 21:26:29 -07:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2014-08-12 08:10:52 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2014-08-12 20:14:34 -06:00
|
|
|
|
2014-08-18 10:18:39 -06:00
|
|
|
from synapse.api.errors import (
|
2015-12-14 06:50:50 -07:00
|
|
|
cs_exception, SynapseError, CodeMessageException, UnrecognizedRequestError, Codes
|
2014-08-18 10:18:39 -06:00
|
|
|
)
|
2015-05-08 12:53:34 -06:00
|
|
|
from synapse.util.logcontext import LoggingContext, PreserveLoggingContext
|
2016-03-23 10:13:05 -06:00
|
|
|
from synapse.util.caches import intern_dict
|
2016-08-19 10:51:08 -06:00
|
|
|
from synapse.util.metrics import Measure
|
2015-02-24 12:51:21 -07:00
|
|
|
import synapse.metrics
|
2015-05-29 05:17:33 -06:00
|
|
|
import synapse.events
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2015-08-24 09:17:38 -06:00
|
|
|
from canonicaljson import (
|
|
|
|
encode_canonical_json, encode_pretty_printed_json
|
2014-12-22 03:16:02 -07:00
|
|
|
)
|
|
|
|
|
2015-04-30 06:33:30 -06:00
|
|
|
from twisted.internet import defer
|
2017-11-23 08:20:52 -07:00
|
|
|
from twisted.python import failure
|
2014-08-12 08:10:52 -06:00
|
|
|
from twisted.web import server, resource
|
|
|
|
from twisted.web.server import NOT_DONE_YET
|
2014-08-14 04:37:13 -06:00
|
|
|
from twisted.web.util import redirectTo
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
import collections
|
|
|
|
import logging
|
2014-12-12 08:05:37 -07:00
|
|
|
import urllib
|
2015-08-24 09:17:38 -06:00
|
|
|
import ujson
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2015-02-24 12:51:21 -07:00
|
|
|
metrics = synapse.metrics.get_metrics_for(__name__)
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
# total number of responses served, split by method/servlet/tag
|
|
|
|
response_count = metrics.register_counter(
|
|
|
|
"response_count",
|
2016-02-03 06:51:25 -07:00
|
|
|
labels=["method", "servlet", "tag"],
|
2018-01-15 10:00:12 -07:00
|
|
|
alternative_names=(
|
|
|
|
# the following are all deprecated aliases for the same metric
|
|
|
|
metrics.name_prefix + x for x in (
|
|
|
|
"_requests",
|
|
|
|
"_response_time:count",
|
|
|
|
"_response_ru_utime:count",
|
|
|
|
"_response_ru_stime:count",
|
|
|
|
"_response_db_txn_count:count",
|
|
|
|
"_response_db_txn_duration:count",
|
|
|
|
)
|
|
|
|
)
|
2015-02-24 12:51:21 -07:00
|
|
|
)
|
2018-01-15 10:00:12 -07:00
|
|
|
|
2015-03-12 10:24:38 -06:00
|
|
|
outgoing_responses_counter = metrics.register_counter(
|
|
|
|
"responses",
|
|
|
|
labels=["method", "code"],
|
2015-02-24 12:51:21 -07:00
|
|
|
)
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
response_timer = metrics.register_counter(
|
|
|
|
"response_time_seconds",
|
|
|
|
labels=["method", "servlet", "tag"],
|
|
|
|
alternative_names=(
|
|
|
|
metrics.name_prefix + "_response_time:total",
|
|
|
|
),
|
2015-03-16 12:31:29 -06:00
|
|
|
)
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
response_ru_utime = metrics.register_counter(
|
|
|
|
"response_ru_utime_seconds", labels=["method", "servlet", "tag"],
|
|
|
|
alternative_names=(
|
|
|
|
metrics.name_prefix + "_response_ru_utime:total",
|
|
|
|
),
|
2015-12-04 07:42:24 -07:00
|
|
|
)
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
response_ru_stime = metrics.register_counter(
|
|
|
|
"response_ru_stime_seconds", labels=["method", "servlet", "tag"],
|
|
|
|
alternative_names=(
|
|
|
|
metrics.name_prefix + "_response_ru_stime:total",
|
|
|
|
),
|
2015-12-04 07:42:24 -07:00
|
|
|
)
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
response_db_txn_count = metrics.register_counter(
|
|
|
|
"response_db_txn_count", labels=["method", "servlet", "tag"],
|
|
|
|
alternative_names=(
|
|
|
|
metrics.name_prefix + "_response_db_txn_count:total",
|
|
|
|
),
|
2015-12-07 10:56:11 -07:00
|
|
|
)
|
|
|
|
|
2018-01-11 11:17:54 -07:00
|
|
|
# seconds spent waiting for db txns, excluding scheduling time, when processing
|
|
|
|
# this request
|
2018-01-15 10:00:12 -07:00
|
|
|
response_db_txn_duration = metrics.register_counter(
|
|
|
|
"response_db_txn_duration_seconds", labels=["method", "servlet", "tag"],
|
|
|
|
alternative_names=(
|
|
|
|
metrics.name_prefix + "_response_db_txn_duration:total",
|
|
|
|
),
|
2015-12-07 10:56:11 -07:00
|
|
|
)
|
|
|
|
|
2018-01-11 17:27:14 -07:00
|
|
|
# seconds spent waiting for a db connection, when processing this request
|
|
|
|
response_db_sched_duration = metrics.register_counter(
|
|
|
|
"response_db_sched_duration_seconds", labels=["method", "servlet", "tag"]
|
|
|
|
)
|
2015-12-07 10:56:11 -07:00
|
|
|
|
2015-04-21 09:07:20 -06:00
|
|
|
_next_request_id = 0
|
|
|
|
|
|
|
|
|
2016-08-22 03:44:45 -06:00
|
|
|
def request_handler(include_metrics=False):
|
2016-04-28 03:57:49 -06:00
|
|
|
"""Decorator for ``wrap_request_handler``"""
|
2016-08-22 03:44:45 -06:00
|
|
|
return lambda request_handler: wrap_request_handler(request_handler, include_metrics)
|
2016-04-28 03:57:49 -06:00
|
|
|
|
|
|
|
|
2016-08-22 03:44:45 -06:00
|
|
|
def wrap_request_handler(request_handler, include_metrics=False):
|
2015-04-21 09:07:20 -06:00
|
|
|
"""Wraps a method that acts as a request handler with the necessary logging
|
|
|
|
and exception handling.
|
2015-04-21 09:35:53 -06:00
|
|
|
|
|
|
|
The method must have a signature of "handle_foo(self, request)". The
|
|
|
|
argument "self" must have "version_string" and "clock" attributes. The
|
|
|
|
argument "request" must be a twisted HTTP request.
|
|
|
|
|
|
|
|
The method must return a deferred. If the deferred succeeds we assume that
|
|
|
|
a response has been sent. If the deferred fails with a SynapseError we use
|
|
|
|
it to send a JSON response with the appropriate HTTP reponse code. If the
|
|
|
|
deferred fails with any other type of error we send a 500 reponse.
|
|
|
|
|
|
|
|
We insert a unique request-id into the logging context for this request and
|
|
|
|
log the response and duration for this request.
|
2015-04-21 09:07:20 -06:00
|
|
|
"""
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def wrapped_request_handler(self, request):
|
|
|
|
global _next_request_id
|
|
|
|
request_id = "%s-%s" % (request.method, _next_request_id)
|
|
|
|
_next_request_id += 1
|
2016-04-28 03:57:49 -06:00
|
|
|
|
2015-04-21 09:07:20 -06:00
|
|
|
with LoggingContext(request_id) as request_context:
|
2016-08-19 11:49:37 -06:00
|
|
|
with Measure(self.clock, "wrapped_request_handler"):
|
2016-08-22 03:44:45 -06:00
|
|
|
request_metrics = RequestMetrics()
|
2018-01-09 11:27:35 -07:00
|
|
|
# we start the request metrics timer here with an initial stab
|
|
|
|
# at the servlet name. For most requests that name will be
|
|
|
|
# JsonResource (or a subclass), and JsonResource._async_render
|
|
|
|
# will update it once it picks a servlet.
|
2016-08-22 03:44:45 -06:00
|
|
|
request_metrics.start(self.clock, name=self.__class__.__name__)
|
2016-08-19 11:49:37 -06:00
|
|
|
|
|
|
|
request_context.request = request_id
|
|
|
|
with request.processing():
|
2016-04-28 03:57:49 -06:00
|
|
|
try:
|
2016-08-19 11:49:37 -06:00
|
|
|
with PreserveLoggingContext(request_context):
|
2016-08-22 03:44:45 -06:00
|
|
|
if include_metrics:
|
|
|
|
yield request_handler(self, request, request_metrics)
|
|
|
|
else:
|
|
|
|
yield request_handler(self, request)
|
2016-08-19 11:49:37 -06:00
|
|
|
except CodeMessageException as e:
|
|
|
|
code = e.code
|
|
|
|
if isinstance(e, SynapseError):
|
|
|
|
logger.info(
|
|
|
|
"%s SynapseError: %s - %s", request, code, e.msg
|
2016-04-28 05:25:48 -06:00
|
|
|
)
|
2016-08-19 11:49:37 -06:00
|
|
|
else:
|
|
|
|
logger.exception(e)
|
|
|
|
outgoing_responses_counter.inc(request.method, str(code))
|
|
|
|
respond_with_json(
|
|
|
|
request, code, cs_exception(e), send_cors=True,
|
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
|
|
|
version_string=self.version_string,
|
|
|
|
)
|
2017-10-23 08:52:32 -06:00
|
|
|
except Exception:
|
2017-11-23 08:20:52 -07:00
|
|
|
# failure.Failure() fishes the original Failure out
|
|
|
|
# of our stack, and thus gives us a sensible stack
|
|
|
|
# trace.
|
|
|
|
f = failure.Failure()
|
|
|
|
logger.error(
|
|
|
|
"Failed handle request %s.%s on %r: %r: %s",
|
2016-08-19 11:49:37 -06:00
|
|
|
request_handler.__module__,
|
|
|
|
request_handler.__name__,
|
|
|
|
self,
|
2017-11-23 08:20:52 -07:00
|
|
|
request,
|
|
|
|
f.getTraceback().rstrip(),
|
2016-08-19 11:49:37 -06:00
|
|
|
)
|
|
|
|
respond_with_json(
|
|
|
|
request,
|
|
|
|
500,
|
|
|
|
{
|
|
|
|
"error": "Internal server error",
|
|
|
|
"errcode": Codes.UNKNOWN,
|
|
|
|
},
|
2017-07-10 08:44:15 -06:00
|
|
|
send_cors=True,
|
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
|
|
|
version_string=self.version_string,
|
2016-08-19 11:49:37 -06:00
|
|
|
)
|
|
|
|
finally:
|
|
|
|
try:
|
2016-08-22 03:44:45 -06:00
|
|
|
request_metrics.stop(
|
2016-08-22 03:49:31 -06:00
|
|
|
self.clock, request
|
2016-08-22 03:44:45 -06:00
|
|
|
)
|
2016-08-22 03:49:31 -06:00
|
|
|
except Exception as e:
|
|
|
|
logger.warn("Failed to stop metrics: %r", e)
|
2015-04-21 09:07:20 -06:00
|
|
|
return wrapped_request_handler
|
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
class HttpServer(object):
|
|
|
|
""" Interface for registering callbacks on a HTTP server
|
|
|
|
"""
|
|
|
|
|
2015-12-01 10:34:32 -07:00
|
|
|
def register_paths(self, method, path_patterns, callback):
|
2015-03-31 07:40:02 -06:00
|
|
|
""" Register a callback that gets fired if we receive a http request
|
2014-08-12 08:10:52 -06:00
|
|
|
with the given method for a path that matches the given regex.
|
|
|
|
|
2015-03-31 07:40:02 -06:00
|
|
|
If the regex contains groups these gets passed to the calback via
|
2014-08-12 08:10:52 -06:00
|
|
|
an unpacked tuple.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
method (str): The method to listen to.
|
2015-12-01 10:34:32 -07:00
|
|
|
path_patterns (list<SRE_Pattern>): The regex used to match requests.
|
2014-08-12 08:10:52 -06:00
|
|
|
callback (function): The function to fire if we receive a matched
|
|
|
|
request. The first argument will be the request object and
|
|
|
|
subsequent arguments will be any matched groups from the regex.
|
|
|
|
This should return a tuple of (code, response).
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2014-08-14 03:18:54 -06:00
|
|
|
class JsonResource(HttpServer, resource.Resource):
|
|
|
|
""" This implements the HttpServer interface and provides JSON support for
|
|
|
|
Resources.
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
Register callbacks via register_path()
|
2015-04-01 08:13:14 -06:00
|
|
|
|
|
|
|
Callbacks can return a tuple of status code and a dict in which case the
|
|
|
|
the dict will automatically be sent to the client as a JSON object.
|
|
|
|
|
|
|
|
The JsonResource is primarily intended for returning JSON, but callbacks
|
|
|
|
may send something other than JSON, they may do so by using the methods
|
|
|
|
on the request object and instead returning None.
|
2014-08-12 08:10:52 -06:00
|
|
|
"""
|
|
|
|
|
|
|
|
isLeaf = True
|
|
|
|
|
|
|
|
_PathEntry = collections.namedtuple("_PathEntry", ["pattern", "callback"])
|
|
|
|
|
2015-05-29 05:17:33 -06:00
|
|
|
def __init__(self, hs, canonical_json=True):
|
2014-08-12 08:10:52 -06:00
|
|
|
resource.Resource.__init__(self)
|
|
|
|
|
2015-05-29 05:17:33 -06:00
|
|
|
self.canonical_json = canonical_json
|
2015-02-09 06:46:22 -07:00
|
|
|
self.clock = hs.get_clock()
|
2014-08-12 08:10:52 -06:00
|
|
|
self.path_regexs = {}
|
2015-02-18 09:51:33 -07:00
|
|
|
self.version_string = hs.version_string
|
2015-03-13 18:12:20 -06:00
|
|
|
self.hs = hs
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2015-12-01 10:34:32 -07:00
|
|
|
def register_paths(self, method, path_patterns, callback):
|
|
|
|
for path_pattern in path_patterns:
|
2016-07-21 08:56:57 -06:00
|
|
|
logger.debug("Registering for %s %s", method, path_pattern.pattern)
|
2015-12-01 10:34:32 -07:00
|
|
|
self.path_regexs.setdefault(method, []).append(
|
|
|
|
self._PathEntry(path_pattern, callback)
|
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
def render(self, request):
|
2015-03-31 07:40:02 -06:00
|
|
|
""" This gets called by twisted every time someone sends us a request.
|
2014-08-12 08:10:52 -06:00
|
|
|
"""
|
2015-04-21 09:07:20 -06:00
|
|
|
self._async_render(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
return server.NOT_DONE_YET
|
|
|
|
|
2016-04-28 05:31:26 -06:00
|
|
|
# Disable metric reporting because _async_render does its own metrics.
|
|
|
|
# It does its own metric reporting because _async_render dispatches to
|
|
|
|
# a callback and it's the class name of that callback we want to report
|
|
|
|
# against rather than the JsonResource itself.
|
2016-08-22 03:44:45 -06:00
|
|
|
@request_handler(include_metrics=True)
|
2014-08-12 08:10:52 -06:00
|
|
|
@defer.inlineCallbacks
|
2016-08-22 03:44:45 -06:00
|
|
|
def _async_render(self, request, request_metrics):
|
2015-03-31 11:25:10 -06:00
|
|
|
""" This gets called from render() every time someone sends us a request.
|
2014-08-12 08:10:52 -06:00
|
|
|
This checks if anyone has registered a callback for that method and
|
|
|
|
path.
|
|
|
|
"""
|
2015-04-21 09:07:20 -06:00
|
|
|
if request.method == "OPTIONS":
|
|
|
|
self._send_response(request, 200, {})
|
|
|
|
return
|
2016-02-04 03:15:56 -07:00
|
|
|
|
2016-08-19 11:40:31 -06:00
|
|
|
# Loop through all the registered callbacks to check if the method
|
|
|
|
# and path regex match
|
|
|
|
for path_entry in self.path_regexs.get(request.method, []):
|
|
|
|
m = path_entry.pattern.match(request.path)
|
|
|
|
if not m:
|
|
|
|
continue
|
|
|
|
|
2018-01-09 11:27:35 -07:00
|
|
|
# We found a match! First update the metrics object to indicate
|
|
|
|
# which servlet is handling the request.
|
2016-08-19 11:40:31 -06:00
|
|
|
|
|
|
|
callback = path_entry.callback
|
|
|
|
|
2018-01-09 11:27:35 -07:00
|
|
|
servlet_instance = getattr(callback, "__self__", None)
|
|
|
|
if servlet_instance is not None:
|
|
|
|
servlet_classname = servlet_instance.__class__.__name__
|
|
|
|
else:
|
|
|
|
servlet_classname = "%r" % callback
|
|
|
|
|
|
|
|
request_metrics.name = servlet_classname
|
|
|
|
|
|
|
|
# Now trigger the callback. If it returns a response, we send it
|
|
|
|
# here. If it throws an exception, that is handled by the wrapper
|
|
|
|
# installed by @request_handler.
|
|
|
|
|
2016-08-19 11:40:31 -06:00
|
|
|
kwargs = intern_dict({
|
|
|
|
name: urllib.unquote(value).decode("UTF-8") if value else value
|
|
|
|
for name, value in m.groupdict().items()
|
|
|
|
})
|
|
|
|
|
|
|
|
callback_return = yield callback(request, **kwargs)
|
|
|
|
if callback_return is not None:
|
|
|
|
code, response = callback_return
|
|
|
|
self._send_response(request, code, response)
|
|
|
|
|
|
|
|
return
|
2015-04-21 09:07:20 -06:00
|
|
|
|
|
|
|
# Huh. No one wanted to handle that? Fiiiiiine. Send 400.
|
2018-01-09 11:27:35 -07:00
|
|
|
request_metrics.name = self.__class__.__name__ + ".UnrecognizedRequest"
|
2015-04-21 09:07:20 -06:00
|
|
|
raise UnrecognizedRequestError()
|
2014-08-12 08:10:52 -06:00
|
|
|
|
2014-09-03 02:37:44 -06:00
|
|
|
def _send_response(self, request, code, response_json_object,
|
|
|
|
response_code_message=None):
|
2015-02-24 12:51:21 -07:00
|
|
|
outgoing_responses_counter.inc(request.method, str(code))
|
|
|
|
|
2014-08-12 08:10:52 -06:00
|
|
|
# TODO: Only enable CORS for the requests that need it.
|
2015-02-18 09:51:33 -07:00
|
|
|
respond_with_json(
|
|
|
|
request, code, response_json_object,
|
|
|
|
send_cors=True,
|
|
|
|
response_code_message=response_code_message,
|
2015-04-21 09:07:20 -06:00
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
2015-02-18 09:51:33 -07:00
|
|
|
version_string=self.version_string,
|
2015-05-29 05:17:33 -06:00
|
|
|
canonical_json=self.canonical_json,
|
2015-02-18 09:51:33 -07:00
|
|
|
)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
|
2016-04-28 03:57:49 -06:00
|
|
|
class RequestMetrics(object):
|
2016-08-22 03:44:45 -06:00
|
|
|
def start(self, clock, name):
|
2016-04-28 03:57:49 -06:00
|
|
|
self.start = clock.time_msec()
|
|
|
|
self.start_context = LoggingContext.current_context()
|
2016-08-22 03:44:45 -06:00
|
|
|
self.name = name
|
2016-04-28 03:57:49 -06:00
|
|
|
|
2016-08-22 03:44:45 -06:00
|
|
|
def stop(self, clock, request):
|
2016-04-28 03:57:49 -06:00
|
|
|
context = LoggingContext.current_context()
|
|
|
|
|
|
|
|
tag = ""
|
|
|
|
if context:
|
|
|
|
tag = context.tag
|
|
|
|
|
2016-04-28 08:29:46 -06:00
|
|
|
if context != self.start_context:
|
2016-04-28 03:57:49 -06:00
|
|
|
logger.warn(
|
|
|
|
"Context have unexpectedly changed %r, %r",
|
|
|
|
context, self.start_context
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
2018-01-15 10:00:12 -07:00
|
|
|
response_count.inc(request.method, self.name, tag)
|
2016-04-28 03:57:49 -06:00
|
|
|
|
|
|
|
response_timer.inc_by(
|
2016-04-28 08:10:14 -06:00
|
|
|
clock.time_msec() - self.start, request.method,
|
2016-08-22 03:44:45 -06:00
|
|
|
self.name, tag
|
2016-04-28 03:57:49 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
ru_utime, ru_stime = context.get_resource_usage()
|
|
|
|
|
|
|
|
response_ru_utime.inc_by(
|
2016-08-22 03:44:45 -06:00
|
|
|
ru_utime, request.method, self.name, tag
|
2016-04-28 03:57:49 -06:00
|
|
|
)
|
|
|
|
response_ru_stime.inc_by(
|
2016-08-22 03:44:45 -06:00
|
|
|
ru_stime, request.method, self.name, tag
|
2016-04-28 03:57:49 -06:00
|
|
|
)
|
|
|
|
response_db_txn_count.inc_by(
|
2016-08-22 03:44:45 -06:00
|
|
|
context.db_txn_count, request.method, self.name, tag
|
2016-04-28 03:57:49 -06:00
|
|
|
)
|
|
|
|
response_db_txn_duration.inc_by(
|
2018-01-11 11:17:54 -07:00
|
|
|
context.db_txn_duration_ms / 1000., request.method, self.name, tag
|
2016-04-28 03:57:49 -06:00
|
|
|
)
|
2018-01-11 17:27:14 -07:00
|
|
|
response_db_sched_duration.inc_by(
|
|
|
|
context.db_sched_duration_ms / 1000., request.method, self.name, tag
|
|
|
|
)
|
2016-04-28 03:57:49 -06:00
|
|
|
|
|
|
|
|
2014-08-14 04:37:13 -06:00
|
|
|
class RootRedirect(resource.Resource):
|
|
|
|
"""Redirects the root '/' path to another path."""
|
|
|
|
|
|
|
|
def __init__(self, path):
|
|
|
|
resource.Resource.__init__(self)
|
|
|
|
self.url = path
|
|
|
|
|
|
|
|
def render_GET(self, request):
|
|
|
|
return redirectTo(self.url, request)
|
|
|
|
|
|
|
|
def getChild(self, name, request):
|
|
|
|
if len(name) == 0:
|
|
|
|
return self # select ourselves as the child to render
|
|
|
|
return resource.Resource.getChild(self, name, request)
|
|
|
|
|
|
|
|
|
2014-12-02 08:09:51 -07:00
|
|
|
def respond_with_json(request, code, json_object, send_cors=False,
|
2015-02-18 09:51:33 -07:00
|
|
|
response_code_message=None, pretty_print=False,
|
2015-05-29 05:17:33 -06:00
|
|
|
version_string="", canonical_json=True):
|
2018-01-16 10:58:16 -07:00
|
|
|
# could alternatively use request.notifyFinish() and flip a flag when
|
|
|
|
# the Deferred fires, but since the flag is RIGHT THERE it seems like
|
|
|
|
# a waste.
|
|
|
|
if request._disconnected:
|
|
|
|
logger.warn(
|
|
|
|
"Not sending response to request %s, already disconnected.",
|
|
|
|
request)
|
|
|
|
return
|
|
|
|
|
2015-04-21 09:07:20 -06:00
|
|
|
if pretty_print:
|
|
|
|
json_bytes = encode_pretty_printed_json(json_object) + "\n"
|
2014-12-02 08:09:51 -07:00
|
|
|
else:
|
2015-08-24 09:17:38 -06:00
|
|
|
if canonical_json or synapse.events.USE_FROZEN_DICTS:
|
2015-05-29 05:17:33 -06:00
|
|
|
json_bytes = encode_canonical_json(json_object)
|
|
|
|
else:
|
2015-08-24 09:17:38 -06:00
|
|
|
# ujson doesn't like frozen_dicts.
|
|
|
|
json_bytes = ujson.dumps(json_object, ensure_ascii=False)
|
2014-12-02 08:09:51 -07:00
|
|
|
|
2015-02-18 09:51:33 -07:00
|
|
|
return respond_with_json_bytes(
|
|
|
|
request, code, json_bytes,
|
|
|
|
send_cors=send_cors,
|
|
|
|
response_code_message=response_code_message,
|
|
|
|
version_string=version_string
|
|
|
|
)
|
2014-12-02 08:09:51 -07:00
|
|
|
|
|
|
|
|
2014-09-03 02:37:44 -06:00
|
|
|
def respond_with_json_bytes(request, code, json_bytes, send_cors=False,
|
2015-02-18 09:51:33 -07:00
|
|
|
version_string="", response_code_message=None):
|
2014-08-12 08:10:52 -06:00
|
|
|
"""Sends encoded JSON in response to the given request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request): The http request to respond to.
|
|
|
|
code (int): The HTTP response code.
|
|
|
|
json_bytes (bytes): The json bytes to use as the response body.
|
|
|
|
send_cors (bool): Whether to send Cross-Origin Resource Sharing headers
|
|
|
|
http://www.w3.org/TR/cors/
|
|
|
|
Returns:
|
|
|
|
twisted.web.server.NOT_DONE_YET"""
|
|
|
|
|
2014-09-03 02:37:44 -06:00
|
|
|
request.setResponseCode(code, message=response_code_message)
|
2014-08-12 08:10:52 -06:00
|
|
|
request.setHeader(b"Content-Type", b"application/json")
|
2015-02-18 09:51:33 -07:00
|
|
|
request.setHeader(b"Server", version_string)
|
2015-01-06 06:21:39 -07:00
|
|
|
request.setHeader(b"Content-Length", b"%d" % (len(json_bytes),))
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
if send_cors:
|
2016-11-02 05:29:25 -06:00
|
|
|
set_cors_headers(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
|
|
|
|
request.write(json_bytes)
|
2016-02-12 06:46:59 -07:00
|
|
|
finish_request(request)
|
2014-08-12 08:10:52 -06:00
|
|
|
return NOT_DONE_YET
|
2015-04-21 09:07:20 -06:00
|
|
|
|
|
|
|
|
2016-11-02 05:29:25 -06:00
|
|
|
def set_cors_headers(request):
|
|
|
|
"""Set the CORs headers so that javascript running in a web browsers can
|
|
|
|
use this API
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request): The http request to add CORs to.
|
|
|
|
"""
|
|
|
|
request.setHeader("Access-Control-Allow-Origin", "*")
|
|
|
|
request.setHeader(
|
|
|
|
"Access-Control-Allow-Methods", "GET, POST, PUT, DELETE, OPTIONS"
|
|
|
|
)
|
|
|
|
request.setHeader(
|
|
|
|
"Access-Control-Allow-Headers",
|
2017-06-16 03:17:10 -06:00
|
|
|
"Origin, X-Requested-With, Content-Type, Accept, Authorization"
|
2016-11-02 05:29:25 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2016-02-12 06:46:59 -07:00
|
|
|
def finish_request(request):
|
|
|
|
""" Finish writing the response to the request.
|
|
|
|
|
|
|
|
Twisted throws a RuntimeException if the connection closed before the
|
|
|
|
response was written but doesn't provide a convenient or reliable way to
|
|
|
|
determine if the connection was closed. So we catch and log the RuntimeException
|
|
|
|
|
|
|
|
You might think that ``request.notifyFinish`` could be used to tell if the
|
|
|
|
request was finished. However the deferred it returns won't fire if the
|
|
|
|
connection was already closed, meaning we'd have to have called the method
|
|
|
|
right at the start of the request. By the time we want to write the response
|
|
|
|
it will already be too late.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
request.finish()
|
|
|
|
except RuntimeError as e:
|
|
|
|
logger.info("Connection disconnected before response was written: %r", e)
|
|
|
|
|
|
|
|
|
2015-04-21 09:07:20 -06:00
|
|
|
def _request_user_agent_is_curl(request):
|
|
|
|
user_agents = request.requestHeaders.getRawHeaders(
|
|
|
|
"User-Agent", default=[]
|
|
|
|
)
|
|
|
|
for user_agent in user_agents:
|
|
|
|
if "curl" in user_agent:
|
|
|
|
return True
|
|
|
|
return False
|