2014-08-12 10:10:52 -04:00
|
|
|
#
|
2023-11-21 15:29:58 -05:00
|
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
|
|
#
|
|
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Affero General Public License as
|
|
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
|
|
# License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# See the GNU Affero General Public License for more details:
|
|
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
|
|
#
|
|
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
|
|
#
|
|
|
|
# [This file includes modifications made by New Vector Limited]
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
#
|
2018-06-05 13:31:40 -04:00
|
|
|
import re
|
2021-02-26 09:02:06 -05:00
|
|
|
from typing import Union
|
2018-06-05 13:31:40 -04:00
|
|
|
|
2021-02-26 09:02:06 -05:00
|
|
|
from twisted.internet import address, task
|
2019-02-20 06:35:52 -05:00
|
|
|
from twisted.web.client import FileBodyProducer
|
2021-01-12 07:34:16 -05:00
|
|
|
from twisted.web.iweb import IRequest
|
2018-04-22 19:53:18 -04:00
|
|
|
|
|
|
|
from synapse.api.errors import SynapseError
|
|
|
|
|
|
|
|
|
|
|
|
class RequestTimedOutError(SynapseError):
|
|
|
|
"""Exception representing timeout of an outbound request"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2021-12-14 07:00:47 -05:00
|
|
|
def __init__(self, msg: str):
|
2020-09-29 05:29:21 -04:00
|
|
|
super().__init__(504, msg)
|
2018-06-05 13:31:40 -04:00
|
|
|
|
|
|
|
|
2018-09-13 13:45:34 -04:00
|
|
|
ACCESS_TOKEN_RE = re.compile(r"(\?.*access(_|%5[Ff])token=)[^&]*(.*)$")
|
2019-10-03 07:57:26 -04:00
|
|
|
CLIENT_SECRET_RE = re.compile(r"(\?.*client(_|%5[Ff])secret=)[^&]*(.*)$")
|
2018-06-05 13:31:40 -04:00
|
|
|
|
|
|
|
|
2021-12-14 07:00:47 -05:00
|
|
|
def redact_uri(uri: str) -> str:
|
2019-10-03 07:57:26 -04:00
|
|
|
"""Strips sensitive information from the uri replaces with <redacted>"""
|
|
|
|
uri = ACCESS_TOKEN_RE.sub(r"\1<redacted>\3", uri)
|
|
|
|
return CLIENT_SECRET_RE.sub(r"\1<redacted>\3", uri)
|
2019-02-20 06:35:52 -05:00
|
|
|
|
|
|
|
|
|
|
|
class QuieterFileBodyProducer(FileBodyProducer):
|
|
|
|
"""Wrapper for FileBodyProducer that avoids CRITICAL errors when the connection drops.
|
|
|
|
|
|
|
|
Workaround for https://github.com/matrix-org/synapse/issues/4003 /
|
|
|
|
https://twistedmatrix.com/trac/ticket/6528
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2021-12-14 07:00:47 -05:00
|
|
|
def stopProducing(self) -> None:
|
2019-02-20 06:35:52 -05:00
|
|
|
try:
|
|
|
|
FileBodyProducer.stopProducing(self)
|
|
|
|
except task.TaskStopped:
|
|
|
|
pass
|
2021-01-12 07:34:16 -05:00
|
|
|
|
|
|
|
|
2021-02-26 09:02:06 -05:00
|
|
|
def get_request_uri(request: IRequest) -> bytes:
|
|
|
|
"""Return the full URI that was requested by the client"""
|
|
|
|
return b"%s://%s%s" % (
|
|
|
|
b"https" if request.isSecure() else b"http",
|
|
|
|
_get_requested_host(request),
|
|
|
|
# despite its name, "request.uri" is only the path and query-string.
|
|
|
|
request.uri,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _get_requested_host(request: IRequest) -> bytes:
|
|
|
|
hostname = request.getHeader(b"host")
|
|
|
|
if hostname:
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
# no Host header, use the address/port that the request arrived on
|
2021-07-15 06:02:43 -04:00
|
|
|
host: Union[address.IPv4Address, address.IPv6Address] = request.getHost()
|
2021-02-26 09:02:06 -05:00
|
|
|
|
|
|
|
hostname = host.host.encode("ascii")
|
|
|
|
|
|
|
|
if request.isSecure() and host.port == 443:
|
|
|
|
# default port for https
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
if not request.isSecure() and host.port == 80:
|
|
|
|
# default port for http
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
return b"%s:%i" % (
|
|
|
|
hostname,
|
|
|
|
host.port,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-01-12 07:34:16 -05:00
|
|
|
def get_request_user_agent(request: IRequest, default: str = "") -> str:
|
|
|
|
"""Return the last User-Agent header, or the given default."""
|
|
|
|
# There could be raw utf-8 bytes in the User-Agent header.
|
|
|
|
|
|
|
|
# N.B. if you don't do this, the logger explodes cryptically
|
|
|
|
# with maximum recursion trying to log errors about
|
|
|
|
# the charset problem.
|
|
|
|
# c.f. https://github.com/matrix-org/synapse/issues/3471
|
|
|
|
|
|
|
|
h = request.getHeader(b"User-Agent")
|
|
|
|
return h.decode("ascii", "replace") if h else default
|