2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-03-09 17:17:27 +01:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-08-12 16:10:52 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2018-08-01 16:54:06 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
import abc
|
2018-07-09 08:09:20 +02:00
|
|
|
import collections
|
2020-01-15 16:58:55 +01:00
|
|
|
import html
|
2018-07-09 08:09:20 +02:00
|
|
|
import logging
|
2019-06-29 09:06:55 +02:00
|
|
|
import types
|
|
|
|
import urllib
|
2020-06-16 14:51:47 +02:00
|
|
|
from http import HTTPStatus
|
2021-03-03 21:47:38 +01:00
|
|
|
from inspect import isawaitable
|
2019-06-29 09:06:55 +02:00
|
|
|
from io import BytesIO
|
2021-01-27 13:41:24 +01:00
|
|
|
from typing import (
|
|
|
|
Any,
|
|
|
|
Awaitable,
|
|
|
|
Callable,
|
|
|
|
Dict,
|
|
|
|
Iterable,
|
|
|
|
Iterator,
|
|
|
|
List,
|
2021-03-03 21:47:38 +01:00
|
|
|
Optional,
|
2021-01-27 13:41:24 +01:00
|
|
|
Pattern,
|
|
|
|
Tuple,
|
|
|
|
Union,
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-06-03 11:41:12 +02:00
|
|
|
import jinja2
|
2020-11-27 13:37:55 +01:00
|
|
|
from canonicaljson import iterencode_canonical_json
|
2021-01-27 13:41:24 +01:00
|
|
|
from typing_extensions import Protocol
|
2020-08-18 14:49:59 +02:00
|
|
|
from zope.interface import implementer
|
2014-12-22 11:16:02 +01:00
|
|
|
|
2020-08-18 14:49:59 +02:00
|
|
|
from twisted.internet import defer, interfaces
|
2017-11-23 16:20:52 +01:00
|
|
|
from twisted.python import failure
|
2018-08-15 09:49:59 +02:00
|
|
|
from twisted.web import resource
|
2020-06-03 11:41:12 +02:00
|
|
|
from twisted.web.server import NOT_DONE_YET, Request
|
2020-07-01 15:10:23 +02:00
|
|
|
from twisted.web.static import File, NoRangeStaticProducer
|
2014-08-14 12:37:13 +02:00
|
|
|
from twisted.web.util import redirectTo
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2018-07-09 08:09:20 +02:00
|
|
|
from synapse.api.errors import (
|
|
|
|
CodeMessageException,
|
|
|
|
Codes,
|
2020-01-15 16:58:55 +01:00
|
|
|
RedirectException,
|
2018-07-09 08:09:20 +02:00
|
|
|
SynapseError,
|
|
|
|
UnrecognizedRequestError,
|
|
|
|
)
|
2020-06-03 11:41:12 +02:00
|
|
|
from synapse.http.site import SynapseRequest
|
2019-07-03 16:07:04 +02:00
|
|
|
from synapse.logging.context import preserve_fn
|
2019-09-05 15:46:04 +02:00
|
|
|
from synapse.logging.opentracing import trace_servlet
|
2020-08-07 14:02:55 +02:00
|
|
|
from synapse.util import json_encoder
|
2018-07-09 08:09:20 +02:00
|
|
|
from synapse.util.caches import intern_dict
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2018-05-11 01:17:11 +02:00
|
|
|
HTML_ERROR_TEMPLATE = """<!DOCTYPE html>
|
|
|
|
<html lang=en>
|
|
|
|
<head>
|
|
|
|
<meta charset="utf-8">
|
|
|
|
<title>Error {code}</title>
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>{msg}</p>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
"""
|
|
|
|
|
2018-04-06 14:20:05 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def return_json_error(f: failure.Failure, request: SynapseRequest) -> None:
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Sends a JSON error response to clients."""
|
2018-05-10 12:59:51 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
if f.check(SynapseError):
|
2021-03-03 21:47:38 +01:00
|
|
|
# mypy doesn't understand that f.check asserts the type.
|
|
|
|
exc = f.value # type: SynapseError # type: ignore
|
|
|
|
error_code = exc.code
|
|
|
|
error_dict = exc.error_dict()
|
2018-05-11 01:17:11 +02:00
|
|
|
|
2021-03-03 21:47:38 +01:00
|
|
|
logger.info("%s SynapseError: %s - %s", request, error_code, exc.msg)
|
2020-07-03 20:02:19 +02:00
|
|
|
else:
|
|
|
|
error_code = 500
|
|
|
|
error_dict = {"error": "Internal server error", "errcode": Codes.UNKNOWN}
|
2019-06-20 11:32:02 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
logger.error(
|
|
|
|
"Failed handle request via %r: %r",
|
|
|
|
request.request_metrics.name,
|
|
|
|
request,
|
2021-03-03 21:47:38 +01:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()), # type: ignore
|
2020-07-03 20:02:19 +02:00
|
|
|
)
|
2018-05-11 01:17:11 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
# Only respond with an error response if we haven't already started writing,
|
|
|
|
# otherwise lets just kill the connection
|
|
|
|
if request.startedWriting:
|
|
|
|
if request.transport:
|
|
|
|
try:
|
|
|
|
request.transport.abortConnection()
|
|
|
|
except Exception:
|
|
|
|
# abortConnection throws if the connection is already closed
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
respond_with_json(
|
2021-02-16 23:32:34 +01:00
|
|
|
request,
|
|
|
|
error_code,
|
|
|
|
error_dict,
|
|
|
|
send_cors=True,
|
2020-07-03 20:02:19 +02:00
|
|
|
)
|
2018-05-11 01:17:11 +02:00
|
|
|
|
|
|
|
|
2020-06-03 11:41:12 +02:00
|
|
|
def return_html_error(
|
2021-02-16 23:32:34 +01:00
|
|
|
f: failure.Failure,
|
|
|
|
request: Request,
|
|
|
|
error_template: Union[str, jinja2.Template],
|
2020-06-03 11:41:12 +02:00
|
|
|
) -> None:
|
|
|
|
"""Sends an HTML error page corresponding to the given failure.
|
|
|
|
|
|
|
|
Handles RedirectException and other CodeMessageExceptions (such as SynapseError)
|
2018-05-11 01:17:11 +02:00
|
|
|
|
|
|
|
Args:
|
2020-06-03 11:41:12 +02:00
|
|
|
f: the error to report
|
|
|
|
request: the failing request
|
|
|
|
error_template: the HTML template. Can be either a string (with `{code}`,
|
|
|
|
`{msg}` placeholders), or a jinja2 template
|
2018-05-11 01:17:11 +02:00
|
|
|
"""
|
|
|
|
if f.check(CodeMessageException):
|
2021-03-03 21:47:38 +01:00
|
|
|
# mypy doesn't understand that f.check asserts the type.
|
|
|
|
cme = f.value # type: CodeMessageException # type: ignore
|
2018-05-11 01:17:11 +02:00
|
|
|
code = cme.code
|
|
|
|
msg = cme.msg
|
|
|
|
|
2020-01-15 16:58:55 +01:00
|
|
|
if isinstance(cme, RedirectException):
|
|
|
|
logger.info("%s redirect to %s", request, cme.location)
|
|
|
|
request.setHeader(b"location", cme.location)
|
|
|
|
request.cookies.extend(cme.cookies)
|
|
|
|
elif isinstance(cme, SynapseError):
|
2019-06-20 11:32:02 +02:00
|
|
|
logger.info("%s SynapseError: %s - %s", request, code, msg)
|
2018-05-11 01:17:11 +02:00
|
|
|
else:
|
|
|
|
logger.error(
|
2019-02-25 17:56:41 +01:00
|
|
|
"Failed handle request %r",
|
2018-05-11 01:17:11 +02:00
|
|
|
request,
|
2021-03-03 21:47:38 +01:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()), # type: ignore
|
2018-05-11 01:17:11 +02:00
|
|
|
)
|
|
|
|
else:
|
2020-06-16 14:51:47 +02:00
|
|
|
code = HTTPStatus.INTERNAL_SERVER_ERROR
|
2018-05-11 01:17:11 +02:00
|
|
|
msg = "Internal server error"
|
|
|
|
|
|
|
|
logger.error(
|
2019-02-25 17:56:41 +01:00
|
|
|
"Failed handle request %r",
|
2018-05-11 01:17:11 +02:00
|
|
|
request,
|
2021-03-03 21:47:38 +01:00
|
|
|
exc_info=(f.type, f.value, f.getTracebackObject()), # type: ignore
|
2018-05-11 01:17:11 +02:00
|
|
|
)
|
|
|
|
|
2020-06-03 11:41:12 +02:00
|
|
|
if isinstance(error_template, str):
|
|
|
|
body = error_template.format(code=code, msg=html.escape(msg))
|
|
|
|
else:
|
|
|
|
body = error_template.render(code=code, msg=msg)
|
|
|
|
|
2020-07-01 15:10:23 +02:00
|
|
|
respond_with_html(request, code, body)
|
2018-05-11 01:17:11 +02:00
|
|
|
|
|
|
|
|
2018-08-15 09:49:59 +02:00
|
|
|
def wrap_async_request_handler(h):
|
|
|
|
"""Wraps an async request handler so that it calls request.processing.
|
|
|
|
|
|
|
|
This helps ensure that work done by the request handler after the request is completed
|
|
|
|
is correctly recorded against the request metrics/logs.
|
2018-05-10 12:59:51 +02:00
|
|
|
|
|
|
|
The handler method must have a signature of "handle_foo(self, request)",
|
2018-08-15 09:49:59 +02:00
|
|
|
where "request" must be a SynapseRequest.
|
2015-04-21 17:35:53 +02:00
|
|
|
|
2018-08-15 09:49:59 +02:00
|
|
|
The handler may return a deferred, in which case the completion of the request isn't
|
|
|
|
logged until the deferred completes.
|
2015-04-21 17:07:20 +02:00
|
|
|
"""
|
2019-06-20 11:32:02 +02:00
|
|
|
|
2019-06-29 09:06:55 +02:00
|
|
|
async def wrapped_async_request_handler(self, request):
|
2018-08-15 09:49:59 +02:00
|
|
|
with request.processing():
|
2019-06-29 09:06:55 +02:00
|
|
|
await h(self, request)
|
2016-04-28 11:57:49 +02:00
|
|
|
|
2018-08-15 09:49:59 +02:00
|
|
|
# we need to preserve_fn here, because the synchronous render method won't yield for
|
|
|
|
# us (obviously)
|
|
|
|
return preserve_fn(wrapped_async_request_handler)
|
2015-04-21 17:07:20 +02:00
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-01-27 13:41:24 +01:00
|
|
|
# Type of a callback method for processing requests
|
|
|
|
# it is actually called with a SynapseRequest and a kwargs dict for the params,
|
|
|
|
# but I can't figure out how to represent that.
|
|
|
|
ServletCallback = Callable[
|
|
|
|
..., Union[None, Awaitable[None], Tuple[int, Any], Awaitable[Tuple[int, Any]]]
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
class HttpServer(Protocol):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Interface for registering callbacks on a HTTP server"""
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2021-01-27 13:41:24 +01:00
|
|
|
def register_paths(
|
|
|
|
self,
|
|
|
|
method: str,
|
|
|
|
path_patterns: Iterable[Pattern],
|
|
|
|
callback: ServletCallback,
|
|
|
|
servlet_classname: str,
|
|
|
|
) -> None:
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Register a callback that gets fired if we receive a http request
|
2014-08-12 16:10:52 +02:00
|
|
|
with the given method for a path that matches the given regex.
|
|
|
|
|
2020-10-23 18:38:40 +02:00
|
|
|
If the regex contains groups these gets passed to the callback via
|
2014-08-12 16:10:52 +02:00
|
|
|
an unpacked tuple.
|
|
|
|
|
|
|
|
Args:
|
2021-01-27 13:41:24 +01:00
|
|
|
method: The HTTP method to listen to.
|
|
|
|
path_patterns: The regex used to match requests.
|
|
|
|
callback: The function to fire if we receive a matched
|
2014-08-12 16:10:52 +02:00
|
|
|
request. The first argument will be the request object and
|
|
|
|
subsequent arguments will be any matched groups from the regex.
|
2021-01-27 13:41:24 +01:00
|
|
|
This should return either tuple of (code, response), or None.
|
|
|
|
servlet_classname (str): The name of the handler to be used in prometheus
|
|
|
|
and opentracing logs.
|
2014-08-12 16:10:52 +02:00
|
|
|
"""
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
class _AsyncResource(resource.Resource, metaclass=abc.ABCMeta):
|
|
|
|
"""Base class for resources that have async handlers.
|
|
|
|
|
|
|
|
Sub classes can either implement `_async_render_<METHOD>` to handle
|
|
|
|
requests by method, or override `_async_render` to handle all requests.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
extract_context: Whether to attempt to extract the opentracing
|
|
|
|
context from the request the servlet is handling.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, extract_context=False):
|
|
|
|
super().__init__()
|
|
|
|
|
|
|
|
self._extract_context = extract_context
|
|
|
|
|
|
|
|
def render(self, request):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""This gets called by twisted every time someone sends us a request."""
|
2020-07-03 20:02:19 +02:00
|
|
|
defer.ensureDeferred(self._async_render_wrapper(request))
|
|
|
|
return NOT_DONE_YET
|
|
|
|
|
|
|
|
@wrap_async_request_handler
|
2020-07-10 20:28:42 +02:00
|
|
|
async def _async_render_wrapper(self, request: SynapseRequest):
|
2020-07-03 20:02:19 +02:00
|
|
|
"""This is a wrapper that delegates to `_async_render` and handles
|
|
|
|
exceptions, return values, metrics, etc.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
request.request_metrics.name = self.__class__.__name__
|
|
|
|
|
|
|
|
with trace_servlet(request, self._extract_context):
|
|
|
|
callback_return = await self._async_render(request)
|
|
|
|
|
|
|
|
if callback_return is not None:
|
|
|
|
code, response = callback_return
|
|
|
|
self._send_response(request, code, response)
|
|
|
|
except Exception:
|
|
|
|
# failure.Failure() fishes the original Failure out
|
|
|
|
# of our stack, and thus gives us a sensible stack
|
|
|
|
# trace.
|
|
|
|
f = failure.Failure()
|
|
|
|
self._send_error_response(f, request)
|
|
|
|
|
2020-07-10 20:28:42 +02:00
|
|
|
async def _async_render(self, request: Request):
|
2020-07-03 20:02:19 +02:00
|
|
|
"""Delegates to `_async_render_<METHOD>` methods, or returns a 400 if
|
2020-10-23 18:38:40 +02:00
|
|
|
no appropriate method exists. Can be overridden in sub classes for
|
2020-07-03 20:02:19 +02:00
|
|
|
different routing.
|
|
|
|
"""
|
2020-08-03 14:45:42 +02:00
|
|
|
# Treat HEAD requests as GET requests.
|
|
|
|
request_method = request.method.decode("ascii")
|
|
|
|
if request_method == "HEAD":
|
|
|
|
request_method = "GET"
|
2020-07-03 20:02:19 +02:00
|
|
|
|
2020-08-03 14:45:42 +02:00
|
|
|
method_handler = getattr(self, "_async_render_%s" % (request_method,), None)
|
2020-07-03 20:02:19 +02:00
|
|
|
if method_handler:
|
|
|
|
raw_callback_return = method_handler(request)
|
|
|
|
|
|
|
|
# Is it synchronous? We'll allow this for now.
|
2021-03-03 21:47:38 +01:00
|
|
|
if isawaitable(raw_callback_return):
|
2020-07-03 20:02:19 +02:00
|
|
|
callback_return = await raw_callback_return
|
|
|
|
else:
|
2020-10-01 14:09:18 +02:00
|
|
|
callback_return = raw_callback_return # type: ignore
|
2020-07-03 20:02:19 +02:00
|
|
|
|
|
|
|
return callback_return
|
|
|
|
|
|
|
|
_unrecognised_request_handler(request)
|
|
|
|
|
|
|
|
@abc.abstractmethod
|
|
|
|
def _send_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
code: int,
|
|
|
|
response_object: Any,
|
2020-07-03 20:02:19 +02:00
|
|
|
) -> None:
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
|
|
|
@abc.abstractmethod
|
|
|
|
def _send_error_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
f: failure.Failure,
|
|
|
|
request: SynapseRequest,
|
2020-07-03 20:02:19 +02:00
|
|
|
) -> None:
|
|
|
|
raise NotImplementedError()
|
|
|
|
|
|
|
|
|
|
|
|
class DirectServeJsonResource(_AsyncResource):
|
|
|
|
"""A resource that will call `self._async_on_<METHOD>` on new requests,
|
|
|
|
formatting responses and errors as JSON.
|
|
|
|
"""
|
|
|
|
|
2020-12-10 13:42:55 +01:00
|
|
|
def __init__(self, canonical_json=False, extract_context=False):
|
|
|
|
super().__init__(extract_context)
|
|
|
|
self.canonical_json = canonical_json
|
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def _send_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
request: Request,
|
|
|
|
code: int,
|
|
|
|
response_object: Any,
|
2020-07-03 20:02:19 +02:00
|
|
|
):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Implements _AsyncResource._send_response"""
|
2020-07-03 20:02:19 +02:00
|
|
|
# TODO: Only enable CORS for the requests that need it.
|
|
|
|
respond_with_json(
|
|
|
|
request,
|
|
|
|
code,
|
|
|
|
response_object,
|
|
|
|
send_cors=True,
|
|
|
|
canonical_json=self.canonical_json,
|
|
|
|
)
|
|
|
|
|
|
|
|
def _send_error_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
f: failure.Failure,
|
|
|
|
request: SynapseRequest,
|
2020-07-03 20:02:19 +02:00
|
|
|
) -> None:
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Implements _AsyncResource._send_error_response"""
|
2020-07-03 20:02:19 +02:00
|
|
|
return_json_error(f, request)
|
|
|
|
|
|
|
|
|
|
|
|
class JsonResource(DirectServeJsonResource):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""This implements the HttpServer interface and provides JSON support for
|
2014-08-14 11:18:54 +02:00
|
|
|
Resources.
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2018-03-09 19:05:41 +01:00
|
|
|
Register callbacks via register_paths()
|
2015-04-01 16:13:14 +02:00
|
|
|
|
|
|
|
Callbacks can return a tuple of status code and a dict in which case the
|
|
|
|
the dict will automatically be sent to the client as a JSON object.
|
|
|
|
|
|
|
|
The JsonResource is primarily intended for returning JSON, but callbacks
|
|
|
|
may send something other than JSON, they may do so by using the methods
|
|
|
|
on the request object and instead returning None.
|
2014-08-12 16:10:52 +02:00
|
|
|
"""
|
|
|
|
|
|
|
|
isLeaf = True
|
|
|
|
|
2019-07-24 14:07:35 +02:00
|
|
|
_PathEntry = collections.namedtuple(
|
|
|
|
"_PathEntry", ["pattern", "callback", "servlet_classname"]
|
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def __init__(self, hs, canonical_json=True, extract_context=False):
|
2020-12-10 13:42:55 +01:00
|
|
|
super().__init__(canonical_json, extract_context)
|
2015-02-09 14:46:22 +01:00
|
|
|
self.clock = hs.get_clock()
|
2014-08-12 16:10:52 +02:00
|
|
|
self.path_regexs = {}
|
2015-03-14 01:12:20 +01:00
|
|
|
self.hs = hs
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def register_paths(self, method, path_patterns, callback, servlet_classname):
|
2019-07-24 14:07:35 +02:00
|
|
|
"""
|
|
|
|
Registers a request handler against a regular expression. Later request URLs are
|
|
|
|
checked against these regular expressions in order to identify an appropriate
|
|
|
|
handler for that request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
method (str): GET, POST etc
|
|
|
|
|
|
|
|
path_patterns (Iterable[str]): A list of regular expressions to which
|
|
|
|
the request URLs are compared.
|
|
|
|
|
|
|
|
callback (function): The handler for the request. Usually a Servlet
|
|
|
|
|
|
|
|
servlet_classname (str): The name of the handler to be used in prometheus
|
|
|
|
and opentracing logs.
|
|
|
|
"""
|
2018-08-01 16:54:06 +02:00
|
|
|
method = method.encode("utf-8") # method is bytes on py3
|
2019-09-05 15:46:04 +02:00
|
|
|
|
2015-12-01 18:34:32 +01:00
|
|
|
for path_pattern in path_patterns:
|
2016-07-21 16:56:57 +02:00
|
|
|
logger.debug("Registering for %s %s", method, path_pattern.pattern)
|
2015-12-01 18:34:32 +01:00
|
|
|
self.path_regexs.setdefault(method, []).append(
|
2019-07-24 14:07:35 +02:00
|
|
|
self._PathEntry(path_pattern, callback, servlet_classname)
|
2015-12-01 18:34:32 +01:00
|
|
|
)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def _get_handler_for_request(
|
|
|
|
self, request: SynapseRequest
|
2021-01-27 13:41:24 +01:00
|
|
|
) -> Tuple[ServletCallback, str, Dict[str, str]]:
|
2020-07-03 20:02:19 +02:00
|
|
|
"""Finds a callback method to handle the given request.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A tuple of the callback to use, the name of the servlet, and the
|
|
|
|
key word arguments to pass to the callback
|
2014-08-12 16:10:52 +02:00
|
|
|
"""
|
2021-03-03 21:47:38 +01:00
|
|
|
# At this point the path must be bytes.
|
|
|
|
request_path_bytes = request.path # type: bytes # type: ignore
|
|
|
|
request_path = request_path_bytes.decode("ascii")
|
2020-08-03 14:45:42 +02:00
|
|
|
# Treat HEAD requests as GET requests.
|
|
|
|
request_method = request.method
|
|
|
|
if request_method == b"HEAD":
|
|
|
|
request_method = b"GET"
|
2020-07-03 20:02:19 +02:00
|
|
|
|
|
|
|
# Loop through all the registered callbacks to check if the method
|
|
|
|
# and path regex match
|
2020-08-03 14:45:42 +02:00
|
|
|
for path_entry in self.path_regexs.get(request_method, []):
|
2020-07-03 20:02:19 +02:00
|
|
|
m = path_entry.pattern.match(request_path)
|
|
|
|
if m:
|
|
|
|
# We found a match!
|
|
|
|
return path_entry.callback, path_entry.servlet_classname, m.groupdict()
|
|
|
|
|
|
|
|
# Huh. No one wanted to handle that? Fiiiiiine. Send 400.
|
|
|
|
return _unrecognised_request_handler, "unrecognised_request_handler", {}
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2019-06-29 09:06:55 +02:00
|
|
|
async def _async_render(self, request):
|
2019-07-24 14:07:35 +02:00
|
|
|
callback, servlet_classname, group_dict = self._get_handler_for_request(request)
|
2016-02-04 11:15:56 +01:00
|
|
|
|
2020-10-23 18:38:40 +02:00
|
|
|
# Make sure we have an appropriate name for this handler in prometheus
|
2020-07-03 20:02:19 +02:00
|
|
|
# (rather than the default of JsonResource).
|
2018-05-10 00:49:29 +02:00
|
|
|
request.request_metrics.name = servlet_classname
|
2016-08-19 19:40:31 +02:00
|
|
|
|
2018-03-09 17:17:27 +01:00
|
|
|
# Now trigger the callback. If it returns a response, we send it
|
|
|
|
# here. If it throws an exception, that is handled by the wrapper
|
|
|
|
# installed by @request_handler.
|
2019-06-20 11:32:02 +02:00
|
|
|
kwargs = intern_dict(
|
|
|
|
{
|
2019-06-29 09:06:55 +02:00
|
|
|
name: urllib.parse.unquote(value) if value else value
|
2019-06-20 11:32:02 +02:00
|
|
|
for name, value in group_dict.items()
|
|
|
|
}
|
|
|
|
)
|
2018-01-09 19:27:35 +01:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
raw_callback_return = callback(request, **kwargs)
|
2019-06-29 09:06:55 +02:00
|
|
|
|
|
|
|
# Is it synchronous? We'll allow this for now.
|
2020-07-03 20:02:19 +02:00
|
|
|
if isinstance(raw_callback_return, (defer.Deferred, types.CoroutineType)):
|
|
|
|
callback_return = await raw_callback_return
|
|
|
|
else:
|
2020-10-01 14:09:18 +02:00
|
|
|
callback_return = raw_callback_return # type: ignore
|
2019-06-29 09:06:55 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
return callback_return
|
2018-01-09 19:27:35 +01:00
|
|
|
|
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
class DirectServeHtmlResource(_AsyncResource):
|
|
|
|
"""A resource that will call `self._async_on_<METHOD>` on new requests,
|
|
|
|
formatting responses and errors as HTML.
|
|
|
|
"""
|
2016-08-19 19:40:31 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
# The error template to use for this resource
|
|
|
|
ERROR_TEMPLATE = HTML_ERROR_TEMPLATE
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
def _send_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
request: SynapseRequest,
|
|
|
|
code: int,
|
|
|
|
response_object: Any,
|
2019-06-20 11:32:02 +02:00
|
|
|
):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Implements _AsyncResource._send_response"""
|
2020-07-03 20:02:19 +02:00
|
|
|
# We expect to get bytes for us to write
|
|
|
|
assert isinstance(response_object, bytes)
|
|
|
|
html_bytes = response_object
|
2019-06-29 09:06:55 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
respond_with_html_bytes(request, 200, html_bytes)
|
2019-07-02 20:01:28 +02:00
|
|
|
|
2020-07-03 20:02:19 +02:00
|
|
|
def _send_error_response(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
f: failure.Failure,
|
|
|
|
request: SynapseRequest,
|
2020-07-03 20:02:19 +02:00
|
|
|
) -> None:
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Implements _AsyncResource._send_error_response"""
|
2020-07-03 20:02:19 +02:00
|
|
|
return_html_error(f, request, self.ERROR_TEMPLATE)
|
2019-06-29 09:06:55 +02:00
|
|
|
|
|
|
|
|
2020-07-01 15:10:23 +02:00
|
|
|
class StaticResource(File):
|
|
|
|
"""
|
|
|
|
A resource that represents a plain non-interpreted file or directory.
|
|
|
|
|
|
|
|
Differs from the File resource by adding clickjacking protection.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def render_GET(self, request: Request):
|
|
|
|
set_clickjacking_protection_headers(request)
|
|
|
|
return super().render_GET(request)
|
|
|
|
|
|
|
|
|
2018-03-09 17:17:27 +01:00
|
|
|
def _unrecognised_request_handler(request):
|
2018-03-09 19:05:41 +01:00
|
|
|
"""Request handler for unrecognised requests
|
|
|
|
|
|
|
|
This is a request handler suitable for return from
|
|
|
|
_get_handler_for_request. It actually just raises an
|
|
|
|
UnrecognizedRequestError.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request (twisted.web.http.Request):
|
|
|
|
"""
|
2018-03-09 17:17:27 +01:00
|
|
|
raise UnrecognizedRequestError()
|
|
|
|
|
|
|
|
|
2014-08-14 12:37:13 +02:00
|
|
|
class RootRedirect(resource.Resource):
|
|
|
|
"""Redirects the root '/' path to another path."""
|
|
|
|
|
|
|
|
def __init__(self, path):
|
|
|
|
resource.Resource.__init__(self)
|
|
|
|
self.url = path
|
|
|
|
|
|
|
|
def render_GET(self, request):
|
2019-06-20 11:32:02 +02:00
|
|
|
return redirectTo(self.url.encode("ascii"), request)
|
2014-08-14 12:37:13 +02:00
|
|
|
|
|
|
|
def getChild(self, name, request):
|
|
|
|
if len(name) == 0:
|
|
|
|
return self # select ourselves as the child to render
|
|
|
|
return resource.Resource.getChild(self, name, request)
|
|
|
|
|
|
|
|
|
2020-05-22 15:30:07 +02:00
|
|
|
class OptionsResource(resource.Resource):
|
|
|
|
"""Responds to OPTION requests for itself and all children."""
|
|
|
|
|
|
|
|
def render_OPTIONS(self, request):
|
2020-07-24 13:08:07 +02:00
|
|
|
request.setResponseCode(204)
|
|
|
|
request.setHeader(b"Content-Length", b"0")
|
2020-05-22 15:30:07 +02:00
|
|
|
|
2020-07-24 13:08:07 +02:00
|
|
|
set_cors_headers(request)
|
|
|
|
|
|
|
|
return b""
|
2020-05-22 15:30:07 +02:00
|
|
|
|
|
|
|
def getChildWithDefault(self, path, request):
|
|
|
|
if request.method == b"OPTIONS":
|
|
|
|
return self # select ourselves as the child to render
|
|
|
|
return resource.Resource.getChildWithDefault(self, path, request)
|
|
|
|
|
|
|
|
|
|
|
|
class RootOptionsRedirectResource(OptionsResource, RootRedirect):
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2020-08-19 14:07:57 +02:00
|
|
|
@implementer(interfaces.IPushProducer)
|
2020-08-18 14:49:59 +02:00
|
|
|
class _ByteProducer:
|
|
|
|
"""
|
|
|
|
Iteratively write bytes to the request.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# The minimum number of bytes for each chunk. Note that the last chunk will
|
|
|
|
# usually be smaller than this.
|
|
|
|
min_chunk_size = 1024
|
|
|
|
|
|
|
|
def __init__(
|
2021-02-16 23:32:34 +01:00
|
|
|
self,
|
|
|
|
request: Request,
|
|
|
|
iterator: Iterator[bytes],
|
2020-08-18 14:49:59 +02:00
|
|
|
):
|
2021-03-03 21:47:38 +01:00
|
|
|
self._request = request # type: Optional[Request]
|
2020-08-18 14:49:59 +02:00
|
|
|
self._iterator = iterator
|
2020-08-19 14:07:57 +02:00
|
|
|
self._paused = False
|
2020-08-18 14:49:59 +02:00
|
|
|
|
2020-08-19 14:07:57 +02:00
|
|
|
# Register the producer and start producing data.
|
|
|
|
self._request.registerProducer(self, True)
|
|
|
|
self.resumeProducing()
|
2020-08-18 14:49:59 +02:00
|
|
|
|
|
|
|
def _send_data(self, data: List[bytes]) -> None:
|
|
|
|
"""
|
2020-08-19 14:07:57 +02:00
|
|
|
Send a list of bytes as a chunk of a response.
|
2020-08-18 14:49:59 +02:00
|
|
|
"""
|
2021-03-03 21:47:38 +01:00
|
|
|
if not data or not self._request:
|
2020-08-18 14:49:59 +02:00
|
|
|
return
|
|
|
|
self._request.write(b"".join(data))
|
|
|
|
|
2020-08-19 14:07:57 +02:00
|
|
|
def pauseProducing(self) -> None:
|
|
|
|
self._paused = True
|
|
|
|
|
2020-08-18 14:49:59 +02:00
|
|
|
def resumeProducing(self) -> None:
|
|
|
|
# We've stopped producing in the meantime (note that this might be
|
|
|
|
# re-entrant after calling write).
|
|
|
|
if not self._request:
|
|
|
|
return
|
|
|
|
|
2020-08-19 14:07:57 +02:00
|
|
|
self._paused = False
|
|
|
|
|
|
|
|
# Write until there's backpressure telling us to stop.
|
|
|
|
while not self._paused:
|
|
|
|
# Get the next chunk and write it to the request.
|
|
|
|
#
|
|
|
|
# The output of the JSON encoder is buffered and coalesced until
|
|
|
|
# min_chunk_size is reached. This is because JSON encoders produce
|
|
|
|
# very small output per iteration and the Request object converts
|
|
|
|
# each call to write() to a separate chunk. Without this there would
|
|
|
|
# be an explosion in bytes written (e.g. b"{" becoming "1\r\n{\r\n").
|
|
|
|
#
|
|
|
|
# Note that buffer stores a list of bytes (instead of appending to
|
|
|
|
# bytes) to hopefully avoid many allocations.
|
|
|
|
buffer = []
|
|
|
|
buffered_bytes = 0
|
|
|
|
while buffered_bytes < self.min_chunk_size:
|
|
|
|
try:
|
|
|
|
data = next(self._iterator)
|
|
|
|
buffer.append(data)
|
|
|
|
buffered_bytes += len(data)
|
|
|
|
except StopIteration:
|
|
|
|
# The entire JSON object has been serialized, write any
|
|
|
|
# remaining data, finalize the producer and the request, and
|
|
|
|
# clean-up any references.
|
|
|
|
self._send_data(buffer)
|
|
|
|
self._request.unregisterProducer()
|
|
|
|
self._request.finish()
|
|
|
|
self.stopProducing()
|
|
|
|
return
|
|
|
|
|
|
|
|
self._send_data(buffer)
|
2020-08-18 14:49:59 +02:00
|
|
|
|
|
|
|
def stopProducing(self) -> None:
|
2020-08-19 14:07:57 +02:00
|
|
|
# Clear a circular reference.
|
2020-08-18 14:49:59 +02:00
|
|
|
self._request = None
|
|
|
|
|
|
|
|
|
|
|
|
def _encode_json_bytes(json_object: Any) -> Iterator[bytes]:
|
|
|
|
"""
|
|
|
|
Encode an object into JSON. Returns an iterator of bytes.
|
|
|
|
"""
|
|
|
|
for chunk in json_encoder.iterencode(json_object):
|
|
|
|
yield chunk.encode("utf-8")
|
|
|
|
|
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
def respond_with_json(
|
2020-07-10 20:28:42 +02:00
|
|
|
request: Request,
|
|
|
|
code: int,
|
|
|
|
json_object: Any,
|
|
|
|
send_cors: bool = False,
|
|
|
|
canonical_json: bool = True,
|
2019-06-20 11:32:02 +02:00
|
|
|
):
|
2020-07-10 20:28:42 +02:00
|
|
|
"""Sends encoded JSON in response to the given request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request: The http request to respond to.
|
|
|
|
code: The HTTP response code.
|
|
|
|
json_object: The object to serialize to JSON.
|
|
|
|
send_cors: Whether to send Cross-Origin Resource Sharing headers
|
|
|
|
https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
canonical_json: Whether to use the canonicaljson algorithm when encoding
|
|
|
|
the JSON bytes.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
twisted.web.server.NOT_DONE_YET if the request is still active.
|
|
|
|
"""
|
2018-01-16 18:58:16 +01:00
|
|
|
# could alternatively use request.notifyFinish() and flip a flag when
|
|
|
|
# the Deferred fires, but since the flag is RIGHT THERE it seems like
|
|
|
|
# a waste.
|
|
|
|
if request._disconnected:
|
2019-10-31 11:23:24 +01:00
|
|
|
logger.warning(
|
2019-06-20 11:32:02 +02:00
|
|
|
"Not sending response to request %s, already disconnected.", request
|
|
|
|
)
|
2020-07-10 20:28:42 +02:00
|
|
|
return None
|
2018-01-16 18:58:16 +01:00
|
|
|
|
2020-11-27 13:37:55 +01:00
|
|
|
if canonical_json:
|
|
|
|
encoder = iterencode_canonical_json
|
2014-12-02 16:09:51 +01:00
|
|
|
else:
|
2020-11-27 13:37:55 +01:00
|
|
|
encoder = _encode_json_bytes
|
2020-08-18 14:49:59 +02:00
|
|
|
|
|
|
|
request.setResponseCode(code)
|
|
|
|
request.setHeader(b"Content-Type", b"application/json")
|
|
|
|
request.setHeader(b"Cache-Control", b"no-cache, no-store, must-revalidate")
|
|
|
|
|
|
|
|
if send_cors:
|
|
|
|
set_cors_headers(request)
|
2014-12-02 16:09:51 +01:00
|
|
|
|
2020-08-19 14:07:57 +02:00
|
|
|
_ByteProducer(request, encoder(json_object))
|
2020-08-18 14:49:59 +02:00
|
|
|
return NOT_DONE_YET
|
2014-12-02 16:09:51 +01:00
|
|
|
|
|
|
|
|
2019-06-20 11:32:02 +02:00
|
|
|
def respond_with_json_bytes(
|
2021-02-16 23:32:34 +01:00
|
|
|
request: Request,
|
|
|
|
code: int,
|
|
|
|
json_bytes: bytes,
|
|
|
|
send_cors: bool = False,
|
2019-06-20 11:32:02 +02:00
|
|
|
):
|
2014-08-12 16:10:52 +02:00
|
|
|
"""Sends encoded JSON in response to the given request.
|
|
|
|
|
|
|
|
Args:
|
2020-07-10 20:28:42 +02:00
|
|
|
request: The http request to respond to.
|
|
|
|
code: The HTTP response code.
|
|
|
|
json_bytes: The json bytes to use as the response body.
|
|
|
|
send_cors: Whether to send Cross-Origin Resource Sharing headers
|
2020-07-01 15:10:23 +02:00
|
|
|
https://fetch.spec.whatwg.org/#http-cors-protocol
|
2020-07-10 20:28:42 +02:00
|
|
|
|
2014-08-12 16:10:52 +02:00
|
|
|
Returns:
|
2020-07-10 20:28:42 +02:00
|
|
|
twisted.web.server.NOT_DONE_YET if the request is still active.
|
|
|
|
"""
|
2020-10-06 11:03:39 +02:00
|
|
|
if request._disconnected:
|
|
|
|
logger.warning(
|
|
|
|
"Not sending response to request %s, already disconnected.", request
|
|
|
|
)
|
|
|
|
return
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-07-10 20:28:42 +02:00
|
|
|
request.setResponseCode(code)
|
2014-08-12 16:10:52 +02:00
|
|
|
request.setHeader(b"Content-Type", b"application/json")
|
2015-01-06 14:21:39 +01:00
|
|
|
request.setHeader(b"Content-Length", b"%d" % (len(json_bytes),))
|
2018-03-21 18:46:26 +01:00
|
|
|
request.setHeader(b"Cache-Control", b"no-cache, no-store, must-revalidate")
|
2014-08-12 16:10:52 +02:00
|
|
|
|
|
|
|
if send_cors:
|
2016-11-02 12:29:25 +01:00
|
|
|
set_cors_headers(request)
|
2014-08-12 16:10:52 +02:00
|
|
|
|
2020-07-22 01:24:56 +02:00
|
|
|
# note that this is zero-copy (the bytesio shares a copy-on-write buffer with
|
|
|
|
# the original `bytes`).
|
2018-08-14 17:13:17 +02:00
|
|
|
bytes_io = BytesIO(json_bytes)
|
|
|
|
|
|
|
|
producer = NoRangeStaticProducer(request, bytes_io)
|
|
|
|
producer.start()
|
2014-08-12 16:10:52 +02:00
|
|
|
return NOT_DONE_YET
|
2015-04-21 17:07:20 +02:00
|
|
|
|
|
|
|
|
2020-07-10 20:28:42 +02:00
|
|
|
def set_cors_headers(request: Request):
|
|
|
|
"""Set the CORS headers so that javascript running in a web browsers can
|
2016-11-02 12:29:25 +01:00
|
|
|
use this API
|
|
|
|
|
|
|
|
Args:
|
2020-07-10 20:28:42 +02:00
|
|
|
request: The http request to add CORS to.
|
2016-11-02 12:29:25 +01:00
|
|
|
"""
|
2018-11-07 15:37:43 +01:00
|
|
|
request.setHeader(b"Access-Control-Allow-Origin", b"*")
|
2016-11-02 12:29:25 +01:00
|
|
|
request.setHeader(
|
2020-08-03 14:45:42 +02:00
|
|
|
b"Access-Control-Allow-Methods", b"GET, HEAD, POST, PUT, DELETE, OPTIONS"
|
2016-11-02 12:29:25 +01:00
|
|
|
)
|
|
|
|
request.setHeader(
|
2018-11-07 15:37:43 +01:00
|
|
|
b"Access-Control-Allow-Headers",
|
2021-06-23 12:25:03 +02:00
|
|
|
b"X-Requested-With, Content-Type, Authorization, Date",
|
2016-11-02 12:29:25 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-07-01 15:10:23 +02:00
|
|
|
def respond_with_html(request: Request, code: int, html: str):
|
|
|
|
"""
|
|
|
|
Wraps `respond_with_html_bytes` by first encoding HTML from a str to UTF-8 bytes.
|
|
|
|
"""
|
|
|
|
respond_with_html_bytes(request, code, html.encode("utf-8"))
|
|
|
|
|
|
|
|
|
|
|
|
def respond_with_html_bytes(request: Request, code: int, html_bytes: bytes):
|
|
|
|
"""
|
|
|
|
Sends HTML (encoded as UTF-8 bytes) as the response to the given request.
|
|
|
|
|
|
|
|
Note that this adds clickjacking protection headers and finishes the request.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request: The http request to respond to.
|
|
|
|
code: The HTTP response code.
|
|
|
|
html_bytes: The HTML bytes to use as the response body.
|
|
|
|
"""
|
|
|
|
# could alternatively use request.notifyFinish() and flip a flag when
|
|
|
|
# the Deferred fires, but since the flag is RIGHT THERE it seems like
|
|
|
|
# a waste.
|
|
|
|
if request._disconnected:
|
|
|
|
logger.warning(
|
|
|
|
"Not sending response to request %s, already disconnected.", request
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
|
|
|
request.setResponseCode(code)
|
|
|
|
request.setHeader(b"Content-Type", b"text/html; charset=utf-8")
|
|
|
|
request.setHeader(b"Content-Length", b"%d" % (len(html_bytes),))
|
|
|
|
|
|
|
|
# Ensure this content cannot be embedded.
|
|
|
|
set_clickjacking_protection_headers(request)
|
|
|
|
|
|
|
|
request.write(html_bytes)
|
|
|
|
finish_request(request)
|
|
|
|
|
|
|
|
|
|
|
|
def set_clickjacking_protection_headers(request: Request):
|
|
|
|
"""
|
|
|
|
Set headers to guard against clickjacking of embedded content.
|
|
|
|
|
|
|
|
This sets the X-Frame-Options and Content-Security-Policy headers which instructs
|
|
|
|
browsers to not allow the HTML of the response to be embedded onto another
|
|
|
|
page.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
request: The http request to add the headers to.
|
|
|
|
"""
|
|
|
|
request.setHeader(b"X-Frame-Options", b"DENY")
|
|
|
|
request.setHeader(b"Content-Security-Policy", b"frame-ancestors 'none';")
|
|
|
|
|
|
|
|
|
2021-02-01 14:15:51 +01:00
|
|
|
def respond_with_redirect(request: Request, url: bytes) -> None:
|
|
|
|
"""Write a 302 response to the request, if it is still alive."""
|
|
|
|
logger.debug("Redirect to %s", url.decode("utf-8"))
|
|
|
|
request.redirect(url)
|
|
|
|
finish_request(request)
|
|
|
|
|
|
|
|
|
2020-07-10 20:28:42 +02:00
|
|
|
def finish_request(request: Request):
|
2021-02-16 23:32:34 +01:00
|
|
|
"""Finish writing the response to the request.
|
2016-02-12 14:46:59 +01:00
|
|
|
|
|
|
|
Twisted throws a RuntimeException if the connection closed before the
|
|
|
|
response was written but doesn't provide a convenient or reliable way to
|
|
|
|
determine if the connection was closed. So we catch and log the RuntimeException
|
|
|
|
|
|
|
|
You might think that ``request.notifyFinish`` could be used to tell if the
|
|
|
|
request was finished. However the deferred it returns won't fire if the
|
|
|
|
connection was already closed, meaning we'd have to have called the method
|
|
|
|
right at the start of the request. By the time we want to write the response
|
|
|
|
it will already be too late.
|
|
|
|
"""
|
|
|
|
try:
|
|
|
|
request.finish()
|
|
|
|
except RuntimeError as e:
|
|
|
|
logger.info("Connection disconnected before response was written: %r", e)
|