2014-08-12 10:10:52 -04:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-03-09 11:17:27 -05:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2018-08-01 10:54:06 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
import collections
|
2020-01-15 10:58:55 -05:00
|
|
|
import html
|
2018-07-09 02:09:20 -04:00
|
|
|
import logging
|
2019-06-29 03:06:55 -04:00
|
|
|
import types
|
|
|
|
import urllib
|
2020-06-16 08:51:47 -04:00
|
|
|
from http import HTTPStatus
|
2019-06-29 03:06:55 -04:00
|
|
|
from io import BytesIO
|
2020-06-03 05:41:12 -04:00
|
|
|
from typing import Awaitable, Callable, TypeVar, Union
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2020-06-03 05:41:12 -04:00
|
|
|
import jinja2
|
2018-07-09 02:09:20 -04:00
|
|
|
from canonicaljson import encode_canonical_json, encode_pretty_printed_json, json
|
2014-12-22 05:16:02 -05:00
|
|
|
|
2015-04-30 08:33:30 -04:00
|
|
|
from twisted.internet import defer
|
2017-11-23 10:20:52 -05:00
|
|
|
from twisted.python import failure
|
2018-08-15 03:49:59 -04:00
|
|
|
from twisted.web import resource
|
2020-06-03 05:41:12 -04:00
|
|
|
from twisted.web.server import NOT_DONE_YET, Request
|
2020-07-01 09:10:23 -04:00
|
|
|
from twisted.web.static import File, NoRangeStaticProducer
|
2014-08-14 06:37:13 -04:00
|
|
|
from twisted.web.util import redirectTo
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2018-07-09 02:09:20 -04:00
|
|
|
import synapse.events
|
|
|
|
import synapse.metrics
|
|
|
|
from synapse.api.errors import (
|
|
|
|
CodeMessageException,
|
|
|
|
Codes,
|
2020-01-15 10:58:55 -05:00
|
|
|
RedirectException,
|
2018-07-09 02:09:20 -04:00
|
|
|
SynapseError,
|
|
|
|
UnrecognizedRequestError,
|
|
|
|
)
|
2020-06-03 05:41:12 -04:00
|
|
|
from synapse.http.site import SynapseRequest
|
2019-07-03 10:07:04 -04:00
|
|
|
from synapse.logging.context import preserve_fn
|
2019-09-05 09:46:04 -04:00
|
|
|
from synapse.logging.opentracing import trace_servlet
|
2018-07-09 02:09:20 -04:00
|
|
|
from synapse.util.caches import intern_dict
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2018-05-10 19:17:11 -04:00
|
|
|
HTML_ERROR_TEMPLATE = """<!DOCTYPE html>
|
|
|
|
<html lang=en>
|
|
|
|
<head>
|
|
|
|
<meta charset="utf-8">
|
|
|
|
<title>Error {code}</title>
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>{msg}</p>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
"""
|
|
|
|
|
2018-04-06 08:20:05 -04:00
|
|
|
|
2018-05-10 07:10:27 -04:00
|
|
|
def wrap_json_request_handler(h):
|
2018-05-10 06:59:51 -04:00
|
|
|
"""Wraps a request handler method with exception handling.
|
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
Also does the wrapping with request.processing as per wrap_async_request_handler.
|
2015-04-21 11:35:53 -04:00
|
|
|
|
2018-05-09 18:00:11 -04:00
|
|
|
The handler method must have a signature of "handle_foo(self, request)",
|
2018-08-15 03:49:59 -04:00
|
|
|
where "request" must be a SynapseRequest.
|
2015-04-21 11:35:53 -04:00
|
|
|
|
2019-07-02 14:01:28 -04:00
|
|
|
The handler must return a deferred or a coroutine. If the deferred succeeds
|
|
|
|
we assume that a response has been sent. If the deferred fails with a SynapseError we use
|
2015-04-21 11:35:53 -04:00
|
|
|
it to send a JSON response with the appropriate HTTP reponse code. If the
|
|
|
|
deferred fails with any other type of error we send a 500 reponse.
|
2018-05-10 06:59:51 -04:00
|
|
|
"""
|
|
|
|
|
2019-06-29 03:06:55 -04:00
|
|
|
async def wrapped_request_handler(self, request):
|
2018-05-10 06:59:51 -04:00
|
|
|
try:
|
2019-06-29 03:06:55 -04:00
|
|
|
await h(self, request)
|
2018-08-01 08:47:07 -04:00
|
|
|
except SynapseError as e:
|
2018-05-10 06:59:51 -04:00
|
|
|
code = e.code
|
2019-06-20 05:32:02 -04:00
|
|
|
logger.info("%s SynapseError: %s - %s", request, code, e.msg)
|
2018-09-20 08:44:20 -04:00
|
|
|
|
|
|
|
# Only respond with an error response if we haven't already started
|
|
|
|
# writing, otherwise lets just kill the connection
|
|
|
|
if request.startedWriting:
|
|
|
|
if request.transport:
|
|
|
|
try:
|
|
|
|
request.transport.abortConnection()
|
|
|
|
except Exception:
|
|
|
|
# abortConnection throws if the connection is already closed
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
respond_with_json(
|
2019-06-20 05:32:02 -04:00
|
|
|
request,
|
|
|
|
code,
|
|
|
|
e.error_dict(),
|
|
|
|
send_cors=True,
|
2018-09-20 08:44:20 -04:00
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
|
|
|
)
|
2018-05-10 06:59:51 -04:00
|
|
|
|
|
|
|
except Exception:
|
|
|
|
# failure.Failure() fishes the original Failure out
|
|
|
|
# of our stack, and thus gives us a sensible stack
|
|
|
|
# trace.
|
|
|
|
f = failure.Failure()
|
|
|
|
logger.error(
|
2019-02-18 10:11:04 -05:00
|
|
|
"Failed handle request via %r: %r",
|
|
|
|
request.request_metrics.name,
|
2018-05-10 06:59:51 -04:00
|
|
|
request,
|
2019-02-18 10:11:04 -05:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()),
|
2018-05-10 06:59:51 -04:00
|
|
|
)
|
2018-09-20 08:44:20 -04:00
|
|
|
# Only respond with an error response if we haven't already started
|
|
|
|
# writing, otherwise lets just kill the connection
|
|
|
|
if request.startedWriting:
|
|
|
|
if request.transport:
|
|
|
|
try:
|
|
|
|
request.transport.abortConnection()
|
|
|
|
except Exception:
|
|
|
|
# abortConnection throws if the connection is already closed
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
respond_with_json(
|
|
|
|
request,
|
|
|
|
500,
|
2019-06-20 05:32:02 -04:00
|
|
|
{"error": "Internal server error", "errcode": Codes.UNKNOWN},
|
2018-09-20 08:44:20 -04:00
|
|
|
send_cors=True,
|
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
|
|
|
)
|
2018-05-10 06:59:51 -04:00
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
return wrap_async_request_handler(wrapped_request_handler)
|
2018-05-10 06:59:51 -04:00
|
|
|
|
|
|
|
|
2020-06-03 05:41:12 -04:00
|
|
|
TV = TypeVar("TV")
|
|
|
|
|
|
|
|
|
|
|
|
def wrap_html_request_handler(
|
|
|
|
h: Callable[[TV, SynapseRequest], Awaitable]
|
|
|
|
) -> Callable[[TV, SynapseRequest], Awaitable[None]]:
|
2018-05-10 19:17:11 -04:00
|
|
|
"""Wraps a request handler method with exception handling.
|
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
Also does the wrapping with request.processing as per wrap_async_request_handler.
|
2018-05-10 19:17:11 -04:00
|
|
|
|
|
|
|
The handler method must have a signature of "handle_foo(self, request)",
|
2018-08-15 03:49:59 -04:00
|
|
|
where "request" must be a SynapseRequest.
|
2018-05-10 19:17:11 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-06-29 03:06:55 -04:00
|
|
|
async def wrapped_request_handler(self, request):
|
|
|
|
try:
|
2020-06-03 05:41:12 -04:00
|
|
|
await h(self, request)
|
2019-06-29 03:06:55 -04:00
|
|
|
except Exception:
|
|
|
|
f = failure.Failure()
|
2020-06-03 05:41:12 -04:00
|
|
|
return_html_error(f, request, HTML_ERROR_TEMPLATE)
|
2018-05-10 19:17:11 -04:00
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
return wrap_async_request_handler(wrapped_request_handler)
|
2018-05-10 19:17:11 -04:00
|
|
|
|
|
|
|
|
2020-06-03 05:41:12 -04:00
|
|
|
def return_html_error(
|
|
|
|
f: failure.Failure, request: Request, error_template: Union[str, jinja2.Template],
|
|
|
|
) -> None:
|
|
|
|
"""Sends an HTML error page corresponding to the given failure.
|
|
|
|
|
|
|
|
Handles RedirectException and other CodeMessageExceptions (such as SynapseError)
|
2018-05-10 19:17:11 -04:00
|
|
|
|
|
|
|
Args:
|
2020-06-03 05:41:12 -04:00
|
|
|
f: the error to report
|
|
|
|
request: the failing request
|
|
|
|
error_template: the HTML template. Can be either a string (with `{code}`,
|
|
|
|
`{msg}` placeholders), or a jinja2 template
|
2018-05-10 19:17:11 -04:00
|
|
|
"""
|
|
|
|
if f.check(CodeMessageException):
|
|
|
|
cme = f.value
|
|
|
|
code = cme.code
|
|
|
|
msg = cme.msg
|
|
|
|
|
2020-01-15 10:58:55 -05:00
|
|
|
if isinstance(cme, RedirectException):
|
|
|
|
logger.info("%s redirect to %s", request, cme.location)
|
|
|
|
request.setHeader(b"location", cme.location)
|
|
|
|
request.cookies.extend(cme.cookies)
|
|
|
|
elif isinstance(cme, SynapseError):
|
2019-06-20 05:32:02 -04:00
|
|
|
logger.info("%s SynapseError: %s - %s", request, code, msg)
|
2018-05-10 19:17:11 -04:00
|
|
|
else:
|
|
|
|
logger.error(
|
2019-02-25 11:56:41 -05:00
|
|
|
"Failed handle request %r",
|
2018-05-10 19:17:11 -04:00
|
|
|
request,
|
2019-02-25 11:56:41 -05:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()),
|
2018-05-10 19:17:11 -04:00
|
|
|
)
|
|
|
|
else:
|
2020-06-16 08:51:47 -04:00
|
|
|
code = HTTPStatus.INTERNAL_SERVER_ERROR
|
2018-05-10 19:17:11 -04:00
|
|
|
msg = "Internal server error"
|
|
|
|
|
|
|
|
logger.error(
|
2019-02-25 11:56:41 -05:00
|
|
|
"Failed handle request %r",
|
2018-05-10 19:17:11 -04:00
|
|
|
request,
|
2019-02-25 11:56:41 -05:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()),
|
2018-05-10 19:17:11 -04:00
|
|
|
)
|
|
|
|
|
2020-06-03 05:41:12 -04:00
|
|
|
if isinstance(error_template, str):
|
|
|
|
body = error_template.format(code=code, msg=html.escape(msg))
|
|
|
|
else:
|
|
|
|
body = error_template.render(code=code, msg=msg)
|
|
|
|
|
2020-07-01 09:10:23 -04:00
|
|
|
respond_with_html(request, code, body)
|
2018-05-10 19:17:11 -04:00
|
|
|
|
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
def wrap_async_request_handler(h):
|
|
|
|
"""Wraps an async request handler so that it calls request.processing.
|
|
|
|
|
|
|
|
This helps ensure that work done by the request handler after the request is completed
|
|
|
|
is correctly recorded against the request metrics/logs.
|
2018-05-10 06:59:51 -04:00
|
|
|
|
|
|
|
The handler method must have a signature of "handle_foo(self, request)",
|
2018-08-15 03:49:59 -04:00
|
|
|
where "request" must be a SynapseRequest.
|
2015-04-21 11:35:53 -04:00
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
The handler may return a deferred, in which case the completion of the request isn't
|
|
|
|
logged until the deferred completes.
|
2015-04-21 11:07:20 -04:00
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-06-29 03:06:55 -04:00
|
|
|
async def wrapped_async_request_handler(self, request):
|
2018-08-15 03:49:59 -04:00
|
|
|
with request.processing():
|
2019-06-29 03:06:55 -04:00
|
|
|
await h(self, request)
|
2016-04-28 05:57:49 -04:00
|
|
|
|
2018-08-15 03:49:59 -04:00
|
|
|
# we need to preserve_fn here, because the synchronous render method won't yield for
|
|
|
|
# us (obviously)
|
|
|
|
return preserve_fn(wrapped_async_request_handler)
|
2015-04-21 11:07:20 -04:00
|
|
|
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
class HttpServer(object):
|
|
|
|
""" Interface for registering callbacks on a HTTP server
|
|
|
|
"""
|
|
|
|
|
2015-12-01 12:34:32 -05:00
|
|
|
def register_paths(self, method, path_patterns, callback):
|
2015-03-31 09:40:02 -04:00
|
|
|
""" Register a callback that gets fired if we receive a http request
|
2014-08-12 10:10:52 -04:00
|
|
|
with the given method for a path that matches the given regex.
|
|
|
|
|
2015-03-31 09:40:02 -04:00
|
|
|
If the regex contains groups these gets passed to the calback via
|
2014-08-12 10:10:52 -04:00
|
|
|
an unpacked tuple.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
method (str): The method to listen to.
|
2015-12-01 12:34:32 -05:00
|
|
|
path_patterns (list<SRE_Pattern>): The regex used to match requests.
|
2014-08-12 10:10:52 -04:00
|
|
|
callback (function): The function to fire if we receive a matched
|
|
|
|
request. The first argument will be the request object and
|
|
|
|
subsequent arguments will be any matched groups from the regex.
|
|
|
|
This should return a tuple of (code, response).
|
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2014-08-14 05:18:54 -04:00
|
|
|
class JsonResource(HttpServer, resource.Resource):
|
|
|
|
""" This implements the HttpServer interface and provides JSON support for
|
|
|
|
Resources.
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2018-03-09 13:05:41 -05:00
|
|
|
Register callbacks via register_paths()
|
2015-04-01 10:13:14 -04:00
|
|
|
|
|
|
|
Callbacks can return a tuple of status code and a dict in which case the
|
|
|
|
the dict will automatically be sent to the client as a JSON object.
|
|
|
|
|
|
|
|
The JsonResource is primarily intended for returning JSON, but callbacks
|
|
|
|
may send something other than JSON, they may do so by using the methods
|
|
|
|
on the request object and instead returning None.
|
2014-08-12 10:10:52 -04:00
|
|
|
"""
|
|
|
|
|
|
|
|
isLeaf = True
|
|
|
|
|
2019-07-24 08:07:35 -04:00
|
|
|
_PathEntry = collections.namedtuple(
|
|
|
|
"_PathEntry", ["pattern", "callback", "servlet_classname"]
|
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2015-05-29 07:17:33 -04:00
|
|
|
def __init__(self, hs, canonical_json=True):
|
2014-08-12 10:10:52 -04:00
|
|
|
resource.Resource.__init__(self)
|
|
|
|
|
2015-05-29 07:17:33 -04:00
|
|
|
self.canonical_json = canonical_json
|
2015-02-09 08:46:22 -05:00
|
|
|
self.clock = hs.get_clock()
|
2014-08-12 10:10:52 -04:00
|
|
|
self.path_regexs = {}
|
2015-03-13 20:12:20 -04:00
|
|
|
self.hs = hs
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2019-09-05 09:46:04 -04:00
|
|
|
def register_paths(
|
|
|
|
self, method, path_patterns, callback, servlet_classname, trace=True
|
|
|
|
):
|
2019-07-24 08:07:35 -04:00
|
|
|
"""
|
|
|
|
Registers a request handler against a regular expression. Later request URLs are
|
|
|
|
checked against these regular expressions in order to identify an appropriate
|
|
|
|
handler for that request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
method (str): GET, POST etc
|
|
|
|
|
|
|
|
path_patterns (Iterable[str]): A list of regular expressions to which
|
|
|
|
the request URLs are compared.
|
|
|
|
|
|
|
|
callback (function): The handler for the request. Usually a Servlet
|
|
|
|
|
|
|
|
servlet_classname (str): The name of the handler to be used in prometheus
|
|
|
|
and opentracing logs.
|
2019-09-05 09:46:04 -04:00
|
|
|
|
|
|
|
trace (bool): Whether we should start a span to trace the servlet.
|
2019-07-24 08:07:35 -04:00
|
|
|
"""
|
2018-08-01 10:54:06 -04:00
|
|
|
method = method.encode("utf-8") # method is bytes on py3
|
2019-09-05 09:46:04 -04:00
|
|
|
|
|
|
|
if trace:
|
|
|
|
# We don't extract the context from the servlet because we can't
|
|
|
|
# trust the sender
|
|
|
|
callback = trace_servlet(servlet_classname)(callback)
|
|
|
|
|
2015-12-01 12:34:32 -05:00
|
|
|
for path_pattern in path_patterns:
|
2016-07-21 10:56:57 -04:00
|
|
|
logger.debug("Registering for %s %s", method, path_pattern.pattern)
|
2015-12-01 12:34:32 -05:00
|
|
|
self.path_regexs.setdefault(method, []).append(
|
2019-07-24 08:07:35 -04:00
|
|
|
self._PathEntry(path_pattern, callback, servlet_classname)
|
2015-12-01 12:34:32 -05:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
def render(self, request):
|
2015-03-31 09:40:02 -04:00
|
|
|
""" This gets called by twisted every time someone sends us a request.
|
2014-08-12 10:10:52 -04:00
|
|
|
"""
|
2019-06-29 03:06:55 -04:00
|
|
|
defer.ensureDeferred(self._async_render(request))
|
2018-08-15 03:49:59 -04:00
|
|
|
return NOT_DONE_YET
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2018-05-10 07:10:27 -04:00
|
|
|
@wrap_json_request_handler
|
2019-06-29 03:06:55 -04:00
|
|
|
async def _async_render(self, request):
|
2015-03-31 13:25:10 -04:00
|
|
|
""" This gets called from render() every time someone sends us a request.
|
2014-08-12 10:10:52 -04:00
|
|
|
This checks if anyone has registered a callback for that method and
|
|
|
|
path.
|
|
|
|
"""
|
2019-07-24 08:07:35 -04:00
|
|
|
callback, servlet_classname, group_dict = self._get_handler_for_request(request)
|
2016-02-04 05:15:56 -05:00
|
|
|
|
2019-07-24 08:07:35 -04:00
|
|
|
# Make sure we have a name for this handler in prometheus.
|
2018-05-09 18:49:29 -04:00
|
|
|
request.request_metrics.name = servlet_classname
|
2016-08-19 13:40:31 -04:00
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
# Now trigger the callback. If it returns a response, we send it
|
|
|
|
# here. If it throws an exception, that is handled by the wrapper
|
|
|
|
# installed by @request_handler.
|
2019-06-20 05:32:02 -04:00
|
|
|
kwargs = intern_dict(
|
|
|
|
{
|
2019-06-29 03:06:55 -04:00
|
|
|
name: urllib.parse.unquote(value) if value else value
|
2019-06-20 05:32:02 -04:00
|
|
|
for name, value in group_dict.items()
|
|
|
|
}
|
|
|
|
)
|
2018-01-09 13:27:35 -05:00
|
|
|
|
2019-06-29 03:06:55 -04:00
|
|
|
callback_return = callback(request, **kwargs)
|
|
|
|
|
|
|
|
# Is it synchronous? We'll allow this for now.
|
|
|
|
if isinstance(callback_return, (defer.Deferred, types.CoroutineType)):
|
|
|
|
callback_return = await callback_return
|
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
if callback_return is not None:
|
|
|
|
code, response = callback_return
|
|
|
|
self._send_response(request, code, response)
|
2018-01-09 13:27:35 -05:00
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
def _get_handler_for_request(self, request):
|
|
|
|
"""Finds a callback method to handle the given request
|
2018-01-09 13:27:35 -05:00
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request):
|
2016-08-19 13:40:31 -04:00
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
Returns:
|
2019-07-24 08:07:35 -04:00
|
|
|
Tuple[Callable, str, dict[unicode, unicode]]: callback method, the
|
|
|
|
label to use for that method in prometheus metrics, and the
|
2018-08-01 10:54:06 -04:00
|
|
|
dict mapping keys to path components as specified in the
|
|
|
|
handler's path match regexp.
|
2018-03-09 13:05:41 -05:00
|
|
|
|
|
|
|
The callback will normally be a method registered via
|
|
|
|
register_paths, so will return (possibly via Deferred) either
|
|
|
|
None, or a tuple of (http code, response body).
|
2018-03-09 11:17:27 -05:00
|
|
|
"""
|
2020-02-19 05:38:20 -05:00
|
|
|
request_path = request.path.decode("ascii")
|
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
# Loop through all the registered callbacks to check if the method
|
|
|
|
# and path regex match
|
|
|
|
for path_entry in self.path_regexs.get(request.method, []):
|
2020-02-19 05:38:20 -05:00
|
|
|
m = path_entry.pattern.match(request_path)
|
2018-03-09 11:17:27 -05:00
|
|
|
if m:
|
|
|
|
# We found a match!
|
2019-07-24 08:07:35 -04:00
|
|
|
return path_entry.callback, path_entry.servlet_classname, m.groupdict()
|
2015-04-21 11:07:20 -04:00
|
|
|
|
|
|
|
# Huh. No one wanted to handle that? Fiiiiiine. Send 400.
|
2019-07-24 08:07:35 -04:00
|
|
|
return _unrecognised_request_handler, "unrecognised_request_handler", {}
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
def _send_response(
|
|
|
|
self, request, code, response_json_object, response_code_message=None
|
|
|
|
):
|
2014-08-12 10:10:52 -04:00
|
|
|
# TODO: Only enable CORS for the requests that need it.
|
2015-02-18 11:51:33 -05:00
|
|
|
respond_with_json(
|
2019-06-20 05:32:02 -04:00
|
|
|
request,
|
|
|
|
code,
|
|
|
|
response_json_object,
|
2015-02-18 11:51:33 -05:00
|
|
|
send_cors=True,
|
|
|
|
response_code_message=response_code_message,
|
2015-04-21 11:07:20 -04:00
|
|
|
pretty_print=_request_user_agent_is_curl(request),
|
2015-05-29 07:17:33 -04:00
|
|
|
canonical_json=self.canonical_json,
|
2015-02-18 11:51:33 -05:00
|
|
|
)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
|
2019-06-29 03:06:55 -04:00
|
|
|
class DirectServeResource(resource.Resource):
|
|
|
|
def render(self, request):
|
|
|
|
"""
|
|
|
|
Render the request, using an asynchronous render handler if it exists.
|
|
|
|
"""
|
2019-07-02 14:01:28 -04:00
|
|
|
async_render_callback_name = "_async_render_" + request.method.decode("ascii")
|
2019-06-29 03:06:55 -04:00
|
|
|
|
2019-07-02 14:01:28 -04:00
|
|
|
# Try and get the async renderer
|
|
|
|
callback = getattr(self, async_render_callback_name, None)
|
2019-06-29 03:06:55 -04:00
|
|
|
|
2019-07-02 14:01:28 -04:00
|
|
|
# No async renderer for this request method.
|
|
|
|
if not callback:
|
|
|
|
return super().render(request)
|
|
|
|
|
2019-10-11 06:22:36 -04:00
|
|
|
resp = trace_servlet(self.__class__.__name__)(callback)(request)
|
2019-07-02 14:01:28 -04:00
|
|
|
|
|
|
|
# If it's a coroutine, turn it into a Deferred
|
|
|
|
if isinstance(resp, types.CoroutineType):
|
|
|
|
defer.ensureDeferred(resp)
|
|
|
|
|
|
|
|
return NOT_DONE_YET
|
2019-06-29 03:06:55 -04:00
|
|
|
|
|
|
|
|
2020-07-01 09:10:23 -04:00
|
|
|
class StaticResource(File):
|
|
|
|
"""
|
|
|
|
A resource that represents a plain non-interpreted file or directory.
|
|
|
|
|
|
|
|
Differs from the File resource by adding clickjacking protection.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def render_GET(self, request: Request):
|
|
|
|
set_clickjacking_protection_headers(request)
|
|
|
|
return super().render_GET(request)
|
|
|
|
|
|
|
|
|
2018-03-09 11:17:27 -05:00
|
|
|
def _options_handler(request):
|
2018-03-09 13:05:41 -05:00
|
|
|
"""Request handler for OPTIONS requests
|
|
|
|
|
|
|
|
This is a request handler suitable for return from
|
|
|
|
_get_handler_for_request. It returns a 200 and an empty body.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request):
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
Tuple[int, dict]: http code, response body.
|
|
|
|
"""
|
2018-03-09 11:19:18 -05:00
|
|
|
return 200, {}
|
2018-03-09 11:17:27 -05:00
|
|
|
|
|
|
|
|
|
|
|
def _unrecognised_request_handler(request):
|
2018-03-09 13:05:41 -05:00
|
|
|
"""Request handler for unrecognised requests
|
|
|
|
|
|
|
|
This is a request handler suitable for return from
|
|
|
|
_get_handler_for_request. It actually just raises an
|
|
|
|
UnrecognizedRequestError.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request):
|
|
|
|
"""
|
2018-03-09 11:17:27 -05:00
|
|
|
raise UnrecognizedRequestError()
|
|
|
|
|
|
|
|
|
2014-08-14 06:37:13 -04:00
|
|
|
class RootRedirect(resource.Resource):
|
|
|
|
"""Redirects the root '/' path to another path."""
|
|
|
|
|
|
|
|
def __init__(self, path):
|
|
|
|
resource.Resource.__init__(self)
|
|
|
|
self.url = path
|
|
|
|
|
|
|
|
def render_GET(self, request):
|
2019-06-20 05:32:02 -04:00
|
|
|
return redirectTo(self.url.encode("ascii"), request)
|
2014-08-14 06:37:13 -04:00
|
|
|
|
|
|
|
def getChild(self, name, request):
|
|
|
|
if len(name) == 0:
|
|
|
|
return self # select ourselves as the child to render
|
|
|
|
return resource.Resource.getChild(self, name, request)
|
|
|
|
|
|
|
|
|
2020-05-22 09:30:07 -04:00
|
|
|
class OptionsResource(resource.Resource):
|
|
|
|
"""Responds to OPTION requests for itself and all children."""
|
|
|
|
|
|
|
|
def render_OPTIONS(self, request):
|
|
|
|
code, response_json_object = _options_handler(request)
|
|
|
|
|
|
|
|
return respond_with_json(
|
2020-05-22 12:42:39 -04:00
|
|
|
request, code, response_json_object, send_cors=True, canonical_json=False,
|
2020-05-22 09:30:07 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
def getChildWithDefault(self, path, request):
|
|
|
|
if request.method == b"OPTIONS":
|
|
|
|
return self # select ourselves as the child to render
|
|
|
|
return resource.Resource.getChildWithDefault(self, path, request)
|
|
|
|
|
|
|
|
|
|
|
|
class RootOptionsRedirectResource(OptionsResource, RootRedirect):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
def respond_with_json(
|
|
|
|
request,
|
|
|
|
code,
|
|
|
|
json_object,
|
|
|
|
send_cors=False,
|
|
|
|
response_code_message=None,
|
|
|
|
pretty_print=False,
|
|
|
|
canonical_json=True,
|
|
|
|
):
|
2018-01-16 12:58:16 -05:00
|
|
|
# could alternatively use request.notifyFinish() and flip a flag when
|
|
|
|
# the Deferred fires, but since the flag is RIGHT THERE it seems like
|
|
|
|
# a waste.
|
|
|
|
if request._disconnected:
|
2019-10-31 06:23:24 -04:00
|
|
|
logger.warning(
|
2019-06-20 05:32:02 -04:00
|
|
|
"Not sending response to request %s, already disconnected.", request
|
|
|
|
)
|
2018-01-16 12:58:16 -05:00
|
|
|
return
|
|
|
|
|
2015-04-21 11:07:20 -04:00
|
|
|
if pretty_print:
|
2018-08-14 11:13:17 -04:00
|
|
|
json_bytes = encode_pretty_printed_json(json_object) + b"\n"
|
2014-12-02 10:09:51 -05:00
|
|
|
else:
|
2015-08-24 11:17:38 -04:00
|
|
|
if canonical_json or synapse.events.USE_FROZEN_DICTS:
|
2018-08-01 10:54:06 -04:00
|
|
|
# canonicaljson already encodes to bytes
|
2015-05-29 07:17:33 -04:00
|
|
|
json_bytes = encode_canonical_json(json_object)
|
|
|
|
else:
|
2018-08-01 10:54:06 -04:00
|
|
|
json_bytes = json.dumps(json_object).encode("utf-8")
|
2014-12-02 10:09:51 -05:00
|
|
|
|
2015-02-18 11:51:33 -05:00
|
|
|
return respond_with_json_bytes(
|
2019-06-20 05:32:02 -04:00
|
|
|
request,
|
|
|
|
code,
|
|
|
|
json_bytes,
|
2015-02-18 11:51:33 -05:00
|
|
|
send_cors=send_cors,
|
|
|
|
response_code_message=response_code_message,
|
|
|
|
)
|
2014-12-02 10:09:51 -05:00
|
|
|
|
|
|
|
|
2019-06-20 05:32:02 -04:00
|
|
|
def respond_with_json_bytes(
|
|
|
|
request, code, json_bytes, send_cors=False, response_code_message=None
|
|
|
|
):
|
2014-08-12 10:10:52 -04:00
|
|
|
"""Sends encoded JSON in response to the given request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request): The http request to respond to.
|
|
|
|
code (int): The HTTP response code.
|
|
|
|
json_bytes (bytes): The json bytes to use as the response body.
|
|
|
|
send_cors (bool): Whether to send Cross-Origin Resource Sharing headers
|
2020-07-01 09:10:23 -04:00
|
|
|
https://fetch.spec.whatwg.org/#http-cors-protocol
|
2014-08-12 10:10:52 -04:00
|
|
|
Returns:
|
|
|
|
twisted.web.server.NOT_DONE_YET"""
|
|
|
|
|
2014-09-03 04:37:44 -04:00
|
|
|
request.setResponseCode(code, message=response_code_message)
|
2014-08-12 10:10:52 -04:00
|
|
|
request.setHeader(b"Content-Type", b"application/json")
|
2015-01-06 08:21:39 -05:00
|
|
|
request.setHeader(b"Content-Length", b"%d" % (len(json_bytes),))
|
2018-03-21 13:46:26 -04:00
|
|
|
request.setHeader(b"Cache-Control", b"no-cache, no-store, must-revalidate")
|
2014-08-12 10:10:52 -04:00
|
|
|
|
|
|
|
if send_cors:
|
2016-11-02 07:29:25 -04:00
|
|
|
set_cors_headers(request)
|
2014-08-12 10:10:52 -04:00
|
|
|
|
2018-08-14 11:13:17 -04:00
|
|
|
# todo: we can almost certainly avoid this copy and encode the json straight into
|
|
|
|
# the bytesIO, but it would involve faffing around with string->bytes wrappers.
|
|
|
|
bytes_io = BytesIO(json_bytes)
|
|
|
|
|
|
|
|
producer = NoRangeStaticProducer(request, bytes_io)
|
|
|
|
producer.start()
|
2014-08-12 10:10:52 -04:00
|
|
|
return NOT_DONE_YET
|
2015-04-21 11:07:20 -04:00
|
|
|
|
|
|
|
|
2016-11-02 07:29:25 -04:00
|
|
|
def set_cors_headers(request):
|
|
|
|
"""Set the CORs headers so that javascript running in a web browsers can
|
|
|
|
use this API
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request): The http request to add CORs to.
|
|
|
|
"""
|
2018-11-07 09:37:43 -05:00
|
|
|
request.setHeader(b"Access-Control-Allow-Origin", b"*")
|
2016-11-02 07:29:25 -04:00
|
|
|
request.setHeader(
|
2018-11-07 09:37:43 -05:00
|
|
|
b"Access-Control-Allow-Methods", b"GET, POST, PUT, DELETE, OPTIONS"
|
2016-11-02 07:29:25 -04:00
|
|
|
)
|
|
|
|
request.setHeader(
|
2018-11-07 09:37:43 -05:00
|
|
|
b"Access-Control-Allow-Headers",
|
2019-06-20 05:32:02 -04:00
|
|
|
b"Origin, X-Requested-With, Content-Type, Accept, Authorization",
|
2016-11-02 07:29:25 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-07-01 09:10:23 -04:00
|
|
|
def respond_with_html(request: Request, code: int, html: str):
|
|
|
|
"""
|
|
|
|
Wraps `respond_with_html_bytes` by first encoding HTML from a str to UTF-8 bytes.
|
|
|
|
"""
|
|
|
|
respond_with_html_bytes(request, code, html.encode("utf-8"))
|
|
|
|
|
|
|
|
|
|
|
|
def respond_with_html_bytes(request: Request, code: int, html_bytes: bytes):
|
|
|
|
"""
|
|
|
|
Sends HTML (encoded as UTF-8 bytes) as the response to the given request.
|
|
|
|
|
|
|
|
Note that this adds clickjacking protection headers and finishes the request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request: The http request to respond to.
|
|
|
|
code: The HTTP response code.
|
|
|
|
html_bytes: The HTML bytes to use as the response body.
|
|
|
|
"""
|
|
|
|
# could alternatively use request.notifyFinish() and flip a flag when
|
|
|
|
# the Deferred fires, but since the flag is RIGHT THERE it seems like
|
|
|
|
# a waste.
|
|
|
|
if request._disconnected:
|
|
|
|
logger.warning(
|
|
|
|
"Not sending response to request %s, already disconnected.", request
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
|
|
|
request.setResponseCode(code)
|
|
|
|
request.setHeader(b"Content-Type", b"text/html; charset=utf-8")
|
|
|
|
request.setHeader(b"Content-Length", b"%d" % (len(html_bytes),))
|
|
|
|
|
|
|
|
# Ensure this content cannot be embedded.
|
|
|
|
set_clickjacking_protection_headers(request)
|
|
|
|
|
|
|
|
request.write(html_bytes)
|
|
|
|
finish_request(request)
|
|
|
|
|
|
|
|
|
|
|
|
def set_clickjacking_protection_headers(request: Request):
|
|
|
|
"""
|
|
|
|
Set headers to guard against clickjacking of embedded content.
|
|
|
|
|
|
|
|
This sets the X-Frame-Options and Content-Security-Policy headers which instructs
|
|
|
|
browsers to not allow the HTML of the response to be embedded onto another
|
|
|
|
page.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request: The http request to add the headers to.
|
|
|
|
"""
|
|
|
|
request.setHeader(b"X-Frame-Options", b"DENY")
|
|
|
|
request.setHeader(b"Content-Security-Policy", b"frame-ancestors 'none';")
|
|
|
|
|
|
|
|
|
2016-02-12 08:46:59 -05:00
|
|
|
def finish_request(request):
|
|
|
|
""" Finish writing the response to the request.
|
|
|
|
|
|
|
|
Twisted throws a RuntimeException if the connection closed before the
|
|
|
|
response was written but doesn't provide a convenient or reliable way to
|
|
|
|
determine if the connection was closed. So we catch and log the RuntimeException
|
|
|
|
|
|
|
|
You might think that ``request.notifyFinish`` could be used to tell if the
|
|
|
|
request was finished. However the deferred it returns won't fire if the
|
|
|
|
connection was already closed, meaning we'd have to have called the method
|
|
|
|
right at the start of the request. By the time we want to write the response
|
|
|
|
it will already be too late.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
request.finish()
|
|
|
|
except RuntimeError as e:
|
|
|
|
logger.info("Connection disconnected before response was written: %r", e)
|
|
|
|
|
|
|
|
|
2015-04-21 11:07:20 -04:00
|
|
|
def _request_user_agent_is_curl(request):
|
2019-06-20 05:32:02 -04:00
|
|
|
user_agents = request.requestHeaders.getRawHeaders(b"User-Agent", default=[])
|
2015-04-21 11:07:20 -04:00
|
|
|
for user_agent in user_agents:
|
2018-04-28 17:56:59 -04:00
|
|
|
if b"curl" in user_agent:
|
2015-04-21 11:07:20 -04:00
|
|
|
return True
|
|
|
|
return False
|