2016-01-06 23:26:29 -05:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-04-22 19:53:18 -04:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 10:10:52 -04:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2018-06-05 13:31:40 -04:00
|
|
|
import re
|
2021-02-26 09:02:06 -05:00
|
|
|
from typing import Union
|
2018-06-05 13:31:40 -04:00
|
|
|
|
2021-02-26 09:02:06 -05:00
|
|
|
from twisted.internet import address, task
|
2019-02-20 06:35:52 -05:00
|
|
|
from twisted.web.client import FileBodyProducer
|
2021-01-12 07:34:16 -05:00
|
|
|
from twisted.web.iweb import IRequest
|
2018-04-22 19:53:18 -04:00
|
|
|
|
|
|
|
from synapse.api.errors import SynapseError
|
|
|
|
|
|
|
|
|
|
|
|
class RequestTimedOutError(SynapseError):
|
|
|
|
"""Exception representing timeout of an outbound request"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2020-09-29 05:29:21 -04:00
|
|
|
def __init__(self, msg):
|
|
|
|
super().__init__(504, msg)
|
2018-06-05 13:31:40 -04:00
|
|
|
|
|
|
|
|
2018-09-13 13:45:34 -04:00
|
|
|
ACCESS_TOKEN_RE = re.compile(r"(\?.*access(_|%5[Ff])token=)[^&]*(.*)$")
|
2019-10-03 07:57:26 -04:00
|
|
|
CLIENT_SECRET_RE = re.compile(r"(\?.*client(_|%5[Ff])secret=)[^&]*(.*)$")
|
2018-06-05 13:31:40 -04:00
|
|
|
|
|
|
|
|
|
|
|
def redact_uri(uri):
|
2019-10-03 07:57:26 -04:00
|
|
|
"""Strips sensitive information from the uri replaces with <redacted>"""
|
|
|
|
uri = ACCESS_TOKEN_RE.sub(r"\1<redacted>\3", uri)
|
|
|
|
return CLIENT_SECRET_RE.sub(r"\1<redacted>\3", uri)
|
2019-02-20 06:35:52 -05:00
|
|
|
|
|
|
|
|
|
|
|
class QuieterFileBodyProducer(FileBodyProducer):
|
|
|
|
"""Wrapper for FileBodyProducer that avoids CRITICAL errors when the connection drops.
|
|
|
|
|
|
|
|
Workaround for https://github.com/matrix-org/synapse/issues/4003 /
|
|
|
|
https://twistedmatrix.com/trac/ticket/6528
|
|
|
|
"""
|
2019-06-20 05:32:02 -04:00
|
|
|
|
2019-02-20 06:35:52 -05:00
|
|
|
def stopProducing(self):
|
|
|
|
try:
|
|
|
|
FileBodyProducer.stopProducing(self)
|
|
|
|
except task.TaskStopped:
|
|
|
|
pass
|
2021-01-12 07:34:16 -05:00
|
|
|
|
|
|
|
|
2021-02-26 09:02:06 -05:00
|
|
|
def get_request_uri(request: IRequest) -> bytes:
|
|
|
|
"""Return the full URI that was requested by the client"""
|
|
|
|
return b"%s://%s%s" % (
|
|
|
|
b"https" if request.isSecure() else b"http",
|
|
|
|
_get_requested_host(request),
|
|
|
|
# despite its name, "request.uri" is only the path and query-string.
|
|
|
|
request.uri,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _get_requested_host(request: IRequest) -> bytes:
|
|
|
|
hostname = request.getHeader(b"host")
|
|
|
|
if hostname:
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
# no Host header, use the address/port that the request arrived on
|
2021-07-15 06:02:43 -04:00
|
|
|
host: Union[address.IPv4Address, address.IPv6Address] = request.getHost()
|
2021-02-26 09:02:06 -05:00
|
|
|
|
|
|
|
hostname = host.host.encode("ascii")
|
|
|
|
|
|
|
|
if request.isSecure() and host.port == 443:
|
|
|
|
# default port for https
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
if not request.isSecure() and host.port == 80:
|
|
|
|
# default port for http
|
|
|
|
return hostname
|
|
|
|
|
|
|
|
return b"%s:%i" % (
|
|
|
|
hostname,
|
|
|
|
host.port,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-01-12 07:34:16 -05:00
|
|
|
def get_request_user_agent(request: IRequest, default: str = "") -> str:
|
|
|
|
"""Return the last User-Agent header, or the given default."""
|
|
|
|
# There could be raw utf-8 bytes in the User-Agent header.
|
|
|
|
|
|
|
|
# N.B. if you don't do this, the logger explodes cryptically
|
|
|
|
# with maximum recursion trying to log errors about
|
|
|
|
# the charset problem.
|
|
|
|
# c.f. https://github.com/matrix-org/synapse/issues/3471
|
|
|
|
|
|
|
|
h = request.getHeader(b"User-Agent")
|
|
|
|
return h.decode("ascii", "replace") if h else default
|