2014-11-20 18:41:56 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2018-04-23 01:53:18 +02:00
|
|
|
# Copyright 2018 New Vector Ltd
|
2014-11-20 18:41:56 +01:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2014-12-04 15:22:31 +01:00
|
|
|
from twisted.internet import defer, reactor, protocol
|
2014-11-20 18:41:56 +01:00
|
|
|
from twisted.internet.error import DNSLookupError
|
2015-06-01 11:51:50 +02:00
|
|
|
from twisted.web.client import readBody, HTTPConnectionPool, Agent
|
2014-11-20 18:41:56 +01:00
|
|
|
from twisted.web.http_headers import Headers
|
2014-12-04 15:22:31 +01:00
|
|
|
from twisted.web._newclient import ResponseDone
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2018-04-23 01:53:18 +02:00
|
|
|
from synapse.http import cancelled_to_request_timed_out_error
|
2014-11-20 18:41:56 +01:00
|
|
|
from synapse.http.endpoint import matrix_federation_endpoint
|
2018-04-23 01:53:18 +02:00
|
|
|
import synapse.metrics
|
2018-04-27 13:52:30 +02:00
|
|
|
from synapse.util.async import sleep, add_timeout_to_deferred
|
2017-03-23 11:03:47 +01:00
|
|
|
from synapse.util import logcontext
|
2018-04-23 01:53:18 +02:00
|
|
|
from synapse.util.logcontext import make_deferred_yieldable
|
|
|
|
import synapse.util.retryutils
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2015-08-24 17:17:38 +02:00
|
|
|
from canonicaljson import encode_canonical_json
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
from synapse.api.errors import (
|
2018-01-22 19:11:18 +01:00
|
|
|
SynapseError, Codes, HttpResponseException, FederationDeniedError,
|
2015-02-04 17:28:12 +01:00
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2015-08-24 17:17:38 +02:00
|
|
|
from signedjson.sign import sign_json
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2016-11-30 16:03:00 +01:00
|
|
|
import cgi
|
2015-02-11 15:23:10 +01:00
|
|
|
import simplejson as json
|
2014-11-20 18:41:56 +01:00
|
|
|
import logging
|
2015-11-02 17:49:05 +01:00
|
|
|
import random
|
2015-06-19 11:13:03 +02:00
|
|
|
import sys
|
2014-11-20 18:41:56 +01:00
|
|
|
import urllib
|
2018-04-15 17:15:16 +02:00
|
|
|
from six.moves.urllib import parse as urlparse
|
2018-04-15 21:43:35 +02:00
|
|
|
from six import string_types
|
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2018-05-22 02:47:37 +02:00
|
|
|
from prometheus_client import Counter
|
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
logger = logging.getLogger(__name__)
|
2015-06-19 11:13:03 +02:00
|
|
|
outbound_logger = logging.getLogger("synapse.http.outbound")
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2018-05-23 00:32:57 +02:00
|
|
|
outgoing_requests_counter = Counter("synapse_http_matrixfederationclient_requests",
|
|
|
|
"", ["method"])
|
|
|
|
incoming_responses_counter = Counter("synapse_http_matrixfederationclient_responses",
|
|
|
|
"", ["method", "code"])
|
2015-02-24 20:51:21 +01:00
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2015-11-17 19:26:50 +01:00
|
|
|
MAX_LONG_RETRIES = 10
|
|
|
|
MAX_SHORT_RETRIES = 3
|
2015-11-02 17:49:05 +01:00
|
|
|
|
|
|
|
|
2015-06-01 11:51:50 +02:00
|
|
|
class MatrixFederationEndpointFactory(object):
|
|
|
|
def __init__(self, hs):
|
2015-09-09 13:02:07 +02:00
|
|
|
self.tls_server_context_factory = hs.tls_server_context_factory
|
2015-03-12 17:24:38 +01:00
|
|
|
|
2015-06-01 11:51:50 +02:00
|
|
|
def endpointForURI(self, uri):
|
|
|
|
destination = uri.netloc
|
2015-02-24 20:51:21 +01:00
|
|
|
|
2015-06-01 11:51:50 +02:00
|
|
|
return matrix_federation_endpoint(
|
|
|
|
reactor, destination, timeout=10,
|
2015-09-09 13:02:07 +02:00
|
|
|
ssl_context_factory=self.tls_server_context_factory
|
2015-06-01 11:51:50 +02:00
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
|
|
|
|
class MatrixFederationHttpClient(object):
|
2014-11-20 19:00:10 +01:00
|
|
|
"""HTTP client used to talk to other homeservers over the federation
|
|
|
|
protocol. Send client certificates and signs requests.
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
Attributes:
|
|
|
|
agent (twisted.web.client.Agent): The twisted Agent used to send the
|
|
|
|
requests.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self, hs):
|
|
|
|
self.hs = hs
|
|
|
|
self.signing_key = hs.config.signing_key[0]
|
|
|
|
self.server_name = hs.hostname
|
2015-05-28 16:34:00 +02:00
|
|
|
pool = HTTPConnectionPool(reactor)
|
2016-12-28 23:49:31 +01:00
|
|
|
pool.maxPersistentPerHost = 5
|
|
|
|
pool.cachedConnectionTimeout = 2 * 60
|
2015-06-01 11:51:50 +02:00
|
|
|
self.agent = Agent.usingEndpointFactory(
|
|
|
|
reactor, MatrixFederationEndpointFactory(hs), pool=pool
|
|
|
|
)
|
2015-02-10 19:17:27 +01:00
|
|
|
self.clock = hs.get_clock()
|
2017-03-23 01:12:21 +01:00
|
|
|
self._store = hs.get_datastore()
|
2015-02-18 17:51:33 +01:00
|
|
|
self.version_string = hs.version_string
|
2015-06-19 11:13:03 +02:00
|
|
|
self._next_id = 1
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2015-06-01 11:51:50 +02:00
|
|
|
def _create_url(self, destination, path_bytes, param_bytes, query_bytes):
|
|
|
|
return urlparse.urlunparse(
|
|
|
|
("matrix", destination, path_bytes, param_bytes, query_bytes, "")
|
|
|
|
)
|
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
@defer.inlineCallbacks
|
2017-03-23 01:27:04 +01:00
|
|
|
def _request(self, destination, method, path,
|
|
|
|
body_callback, headers_dict={}, param_bytes=b"",
|
|
|
|
query_bytes=b"", retry_on_dns_fail=True,
|
2017-03-23 12:10:36 +01:00
|
|
|
timeout=None, long_retries=False,
|
|
|
|
ignore_backoff=False,
|
|
|
|
backoff_on_404=False):
|
2017-03-23 01:27:04 +01:00
|
|
|
""" Creates and sends a request to the given server
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request to.
|
|
|
|
method (str): HTTP method
|
|
|
|
path (str): The HTTP path
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data
|
|
|
|
and try the request anyway.
|
2017-03-23 01:12:21 +01:00
|
|
|
backoff_on_404 (bool): Back off if we get a 404
|
2017-03-13 14:50:16 +01:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: resolves with the http response object on success.
|
|
|
|
|
|
|
|
Fails with ``HTTPRequestException``: if we get an HTTP response
|
2017-03-23 01:12:21 +01:00
|
|
|
code >= 300.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
|
|
|
|
2017-04-21 01:46:54 +02:00
|
|
|
(May also fail with plenty of other Exceptions for things like DNS
|
|
|
|
failures, connection failures, SSL failures.)
|
2014-11-20 18:41:56 +01:00
|
|
|
"""
|
2018-01-22 19:11:18 +01:00
|
|
|
if (
|
|
|
|
self.hs.config.federation_domain_whitelist and
|
|
|
|
destination not in self.hs.config.federation_domain_whitelist
|
|
|
|
):
|
|
|
|
raise FederationDeniedError(destination)
|
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
limiter = yield synapse.util.retryutils.get_retry_limiter(
|
|
|
|
destination,
|
|
|
|
self.clock,
|
|
|
|
self._store,
|
|
|
|
backoff_on_404=backoff_on_404,
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff=ignore_backoff,
|
2017-03-23 01:12:21 +01:00
|
|
|
)
|
|
|
|
|
2017-03-23 01:27:04 +01:00
|
|
|
destination = destination.encode("ascii")
|
|
|
|
path_bytes = path.encode("ascii")
|
2017-03-23 01:12:21 +01:00
|
|
|
with limiter:
|
|
|
|
headers_dict[b"User-Agent"] = [self.version_string]
|
|
|
|
headers_dict[b"Host"] = [destination]
|
2017-03-23 01:27:04 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
url_bytes = self._create_url(
|
|
|
|
destination, path_bytes, param_bytes, query_bytes
|
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
txn_id = "%s-O-%s" % (method, self._next_id)
|
|
|
|
self._next_id = (self._next_id + 1) % (sys.maxint - 1)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
outbound_logger.info(
|
|
|
|
"{%s} [%s] Sending request: %s %s",
|
|
|
|
txn_id, destination, method, url_bytes
|
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
# XXX: Would be much nicer to retry only at the transaction-layer
|
|
|
|
# (once we have reliable transactions in place)
|
|
|
|
if long_retries:
|
|
|
|
retries_left = MAX_LONG_RETRIES
|
|
|
|
else:
|
|
|
|
retries_left = MAX_SHORT_RETRIES
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
http_url_bytes = urlparse.urlunparse(
|
|
|
|
("", "", path_bytes, param_bytes, query_bytes, "")
|
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
log_result = None
|
|
|
|
try:
|
|
|
|
while True:
|
|
|
|
producer = None
|
|
|
|
if body_callback:
|
|
|
|
producer = body_callback(method, http_url_bytes, headers_dict)
|
|
|
|
|
|
|
|
try:
|
2018-04-23 01:53:18 +02:00
|
|
|
request_deferred = self.agent.request(
|
|
|
|
method,
|
|
|
|
url_bytes,
|
|
|
|
Headers(headers_dict),
|
|
|
|
producer
|
|
|
|
)
|
2018-04-27 13:52:30 +02:00
|
|
|
add_timeout_to_deferred(
|
|
|
|
request_deferred,
|
2018-04-23 01:53:18 +02:00
|
|
|
timeout / 1000. if timeout else 60,
|
2018-04-27 13:52:30 +02:00
|
|
|
cancelled_to_request_timed_out_error,
|
2018-04-23 01:53:18 +02:00
|
|
|
)
|
|
|
|
response = yield make_deferred_yieldable(
|
|
|
|
request_deferred,
|
|
|
|
)
|
2017-03-23 01:12:21 +01:00
|
|
|
|
|
|
|
log_result = "%d %s" % (response.code, response.phrase,)
|
|
|
|
break
|
|
|
|
except Exception as e:
|
|
|
|
if not retry_on_dns_fail and isinstance(e, DNSLookupError):
|
|
|
|
logger.warn(
|
|
|
|
"DNS Lookup failed to %s with %s",
|
|
|
|
destination,
|
|
|
|
e
|
|
|
|
)
|
|
|
|
log_result = "DNS Lookup failed to %s with %s" % (
|
|
|
|
destination, e
|
|
|
|
)
|
|
|
|
raise
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
logger.warn(
|
2017-09-28 14:44:47 +02:00
|
|
|
"{%s} Sending request failed to %s: %s %s: %s",
|
2017-03-23 01:12:21 +01:00
|
|
|
txn_id,
|
|
|
|
destination,
|
2015-06-19 12:45:55 +02:00
|
|
|
method,
|
2015-08-12 18:07:22 +02:00
|
|
|
url_bytes,
|
2017-03-23 01:12:21 +01:00
|
|
|
_flatten_response_never_received(e),
|
2015-06-19 12:45:55 +02:00
|
|
|
)
|
|
|
|
|
2017-09-28 14:44:47 +02:00
|
|
|
log_result = _flatten_response_never_received(e)
|
2015-06-19 11:13:03 +02:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
if retries_left and not timeout:
|
|
|
|
if long_retries:
|
|
|
|
delay = 4 ** (MAX_LONG_RETRIES + 1 - retries_left)
|
|
|
|
delay = min(delay, 60)
|
|
|
|
delay *= random.uniform(0.8, 1.4)
|
|
|
|
else:
|
|
|
|
delay = 0.5 * 2 ** (MAX_SHORT_RETRIES - retries_left)
|
|
|
|
delay = min(delay, 2)
|
|
|
|
delay *= random.uniform(0.8, 1.4)
|
|
|
|
|
|
|
|
yield sleep(delay)
|
|
|
|
retries_left -= 1
|
2015-11-17 19:26:50 +01:00
|
|
|
else:
|
2017-03-23 01:12:21 +01:00
|
|
|
raise
|
|
|
|
finally:
|
|
|
|
outbound_logger.info(
|
|
|
|
"{%s} [%s] Result: %s",
|
|
|
|
txn_id,
|
|
|
|
destination,
|
|
|
|
log_result,
|
|
|
|
)
|
2014-12-10 11:16:09 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
if 200 <= response.code < 300:
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
# :'(
|
|
|
|
# Update transactions table?
|
2017-03-23 11:03:47 +01:00
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
body = yield readBody(response)
|
2017-03-23 01:12:21 +01:00
|
|
|
raise HttpResponseException(
|
|
|
|
response.code, response.phrase, body
|
|
|
|
)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-03-23 01:12:21 +01:00
|
|
|
defer.returnValue(response)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
def sign_request(self, destination, method, url_bytes, headers_dict,
|
|
|
|
content=None):
|
|
|
|
request = {
|
|
|
|
"method": method,
|
|
|
|
"uri": url_bytes,
|
|
|
|
"origin": self.server_name,
|
|
|
|
"destination": destination,
|
|
|
|
}
|
|
|
|
|
|
|
|
if content is not None:
|
|
|
|
request["content"] = content
|
|
|
|
|
|
|
|
request = sign_json(request, self.server_name, self.signing_key)
|
|
|
|
|
|
|
|
auth_headers = []
|
|
|
|
|
|
|
|
for key, sig in request["signatures"][self.server_name].items():
|
|
|
|
auth_headers.append(bytes(
|
|
|
|
"X-Matrix origin=%s,key=\"%s\",sig=\"%s\"" % (
|
|
|
|
self.server_name, key, sig,
|
|
|
|
)
|
|
|
|
))
|
|
|
|
|
|
|
|
headers_dict[b"Authorization"] = auth_headers
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2018-04-06 12:54:09 +02:00
|
|
|
def put_json(self, destination, path, args={}, data={},
|
|
|
|
json_data_callback=None,
|
2017-03-23 12:10:36 +01:00
|
|
|
long_retries=False, timeout=None,
|
|
|
|
ignore_backoff=False,
|
|
|
|
backoff_on_404=False):
|
2014-11-20 18:41:56 +01:00
|
|
|
""" Sends the specifed json data using PUT
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request
|
|
|
|
to.
|
|
|
|
path (str): The HTTP path.
|
2018-04-06 12:54:09 +02:00
|
|
|
args (dict): query params
|
2014-11-20 18:41:56 +01:00
|
|
|
data (dict): A dict containing the data that will be used as
|
|
|
|
the request body. This will be encoded as JSON.
|
|
|
|
json_data_callback (callable): A callable returning the dict to
|
|
|
|
use as the request body.
|
2015-11-17 19:29:29 +01:00
|
|
|
long_retries (bool): A boolean that indicates whether we should
|
|
|
|
retry for a short or long time.
|
2016-09-12 19:17:09 +02:00
|
|
|
timeout(int): How long to try (in ms) the destination for before
|
|
|
|
giving up. None indicates no timeout.
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data
|
|
|
|
and try the request anyway.
|
2017-03-23 01:12:21 +01:00
|
|
|
backoff_on_404 (bool): True if we should count a 404 response as
|
|
|
|
a failure of the server (and should therefore back off future
|
|
|
|
requests)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
Returns:
|
|
|
|
Deferred: Succeeds when we get a 2xx HTTP response. The result
|
2017-04-21 01:46:54 +02:00
|
|
|
will be the decoded JSON body.
|
|
|
|
|
|
|
|
Fails with ``HTTPRequestException`` if we get an HTTP response
|
|
|
|
code >= 300.
|
2017-03-23 01:12:21 +01:00
|
|
|
|
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
2014-11-20 18:41:56 +01:00
|
|
|
"""
|
|
|
|
|
|
|
|
if not json_data_callback:
|
|
|
|
def json_data_callback():
|
|
|
|
return data
|
|
|
|
|
|
|
|
def body_callback(method, url_bytes, headers_dict):
|
|
|
|
json_data = json_data_callback()
|
|
|
|
self.sign_request(
|
|
|
|
destination, method, url_bytes, headers_dict, json_data
|
|
|
|
)
|
|
|
|
producer = _JsonProducer(json_data)
|
|
|
|
return producer
|
|
|
|
|
2017-03-23 01:27:04 +01:00
|
|
|
response = yield self._request(
|
|
|
|
destination,
|
2014-11-20 18:41:56 +01:00
|
|
|
"PUT",
|
2017-03-23 01:27:04 +01:00
|
|
|
path,
|
2014-11-20 18:41:56 +01:00
|
|
|
body_callback=body_callback,
|
|
|
|
headers_dict={"Content-Type": ["application/json"]},
|
2018-04-06 12:54:09 +02:00
|
|
|
query_bytes=encode_query_args(args),
|
2015-11-17 19:26:50 +01:00
|
|
|
long_retries=long_retries,
|
2016-09-12 19:17:09 +02:00
|
|
|
timeout=timeout,
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff=ignore_backoff,
|
2017-03-23 01:12:21 +01:00
|
|
|
backoff_on_404=backoff_on_404,
|
2014-11-20 18:41:56 +01:00
|
|
|
)
|
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
if 200 <= response.code < 300:
|
|
|
|
# We need to update the transactions table to say it was sent?
|
2016-11-30 16:03:00 +01:00
|
|
|
check_content_type_is_json(response.headers)
|
2015-02-04 17:28:12 +01:00
|
|
|
|
2017-03-23 11:03:47 +01:00
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
body = yield readBody(response)
|
2015-02-04 17:28:12 +01:00
|
|
|
defer.returnValue(json.loads(body))
|
2015-01-29 14:44:52 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2016-12-29 01:58:34 +01:00
|
|
|
def post_json(self, destination, path, data={}, long_retries=False,
|
2017-07-18 17:40:21 +02:00
|
|
|
timeout=None, ignore_backoff=False, args={}):
|
2015-01-29 14:44:52 +01:00
|
|
|
""" Sends the specifed json data using POST
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request
|
|
|
|
to.
|
|
|
|
path (str): The HTTP path.
|
|
|
|
data (dict): A dict containing the data that will be used as
|
|
|
|
the request body. This will be encoded as JSON.
|
2015-11-20 18:15:44 +01:00
|
|
|
long_retries (bool): A boolean that indicates whether we should
|
|
|
|
retry for a short or long time.
|
2016-09-12 19:17:09 +02:00
|
|
|
timeout(int): How long to try (in ms) the destination for before
|
|
|
|
giving up. None indicates no timeout.
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data and
|
|
|
|
try the request anyway.
|
2018-04-06 12:54:09 +02:00
|
|
|
args (dict): query params
|
2015-01-29 14:44:52 +01:00
|
|
|
Returns:
|
|
|
|
Deferred: Succeeds when we get a 2xx HTTP response. The result
|
2017-04-21 01:46:54 +02:00
|
|
|
will be the decoded JSON body.
|
|
|
|
|
|
|
|
Fails with ``HTTPRequestException`` if we get an HTTP response
|
|
|
|
code >= 300.
|
2017-03-23 01:12:21 +01:00
|
|
|
|
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
2015-01-29 14:44:52 +01:00
|
|
|
"""
|
|
|
|
|
|
|
|
def body_callback(method, url_bytes, headers_dict):
|
|
|
|
self.sign_request(
|
|
|
|
destination, method, url_bytes, headers_dict, data
|
|
|
|
)
|
2015-01-29 14:58:22 +01:00
|
|
|
return _JsonProducer(data)
|
2015-01-29 14:44:52 +01:00
|
|
|
|
2017-03-23 01:27:04 +01:00
|
|
|
response = yield self._request(
|
|
|
|
destination,
|
2015-01-29 14:44:52 +01:00
|
|
|
"POST",
|
2017-03-23 01:27:04 +01:00
|
|
|
path,
|
2017-07-18 17:40:21 +02:00
|
|
|
query_bytes=encode_query_args(args),
|
2015-01-29 14:44:52 +01:00
|
|
|
body_callback=body_callback,
|
|
|
|
headers_dict={"Content-Type": ["application/json"]},
|
2016-12-29 01:58:34 +01:00
|
|
|
long_retries=long_retries,
|
2016-09-12 19:17:09 +02:00
|
|
|
timeout=timeout,
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff=ignore_backoff,
|
2015-01-29 14:44:52 +01:00
|
|
|
)
|
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
if 200 <= response.code < 300:
|
|
|
|
# We need to update the transactions table to say it was sent?
|
2016-11-30 16:03:00 +01:00
|
|
|
check_content_type_is_json(response.headers)
|
2015-02-04 17:28:12 +01:00
|
|
|
|
2017-03-23 11:03:47 +01:00
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
body = yield readBody(response)
|
2015-01-29 14:44:52 +01:00
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
defer.returnValue(json.loads(body))
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
2015-05-19 15:53:32 +02:00
|
|
|
def get_json(self, destination, path, args={}, retry_on_dns_fail=True,
|
2017-03-23 12:10:36 +01:00
|
|
|
timeout=None, ignore_backoff=False):
|
2014-12-04 15:22:31 +01:00
|
|
|
""" GETs some json from the given host homeserver and path
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request
|
|
|
|
to.
|
|
|
|
path (str): The HTTP path.
|
|
|
|
args (dict): A dictionary used to create query strings, defaults to
|
|
|
|
None.
|
2015-05-22 16:18:04 +02:00
|
|
|
timeout (int): How long to try (in ms) the destination for before
|
|
|
|
giving up. None indicates no timeout and that the request will
|
|
|
|
be retried.
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data
|
|
|
|
and try the request anyway.
|
2014-11-20 18:41:56 +01:00
|
|
|
Returns:
|
2017-04-21 01:46:54 +02:00
|
|
|
Deferred: Succeeds when we get a 2xx HTTP response. The result
|
|
|
|
will be the decoded JSON body.
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2017-04-21 01:46:54 +02:00
|
|
|
Fails with ``HTTPRequestException`` if we get an HTTP response
|
|
|
|
code >= 300.
|
2017-03-23 01:12:21 +01:00
|
|
|
|
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
2014-11-20 18:41:56 +01:00
|
|
|
"""
|
|
|
|
logger.debug("get_json args: %s", args)
|
|
|
|
|
|
|
|
logger.debug("Query bytes: %s Retry DNS: %s", args, retry_on_dns_fail)
|
|
|
|
|
|
|
|
def body_callback(method, url_bytes, headers_dict):
|
|
|
|
self.sign_request(destination, method, url_bytes, headers_dict)
|
|
|
|
return None
|
|
|
|
|
2017-03-23 01:27:04 +01:00
|
|
|
response = yield self._request(
|
|
|
|
destination,
|
2014-11-20 18:41:56 +01:00
|
|
|
"GET",
|
2017-03-23 01:27:04 +01:00
|
|
|
path,
|
2017-07-18 17:40:21 +02:00
|
|
|
query_bytes=encode_query_args(args),
|
2014-11-20 18:41:56 +01:00
|
|
|
body_callback=body_callback,
|
2015-05-19 15:53:32 +02:00
|
|
|
retry_on_dns_fail=retry_on_dns_fail,
|
|
|
|
timeout=timeout,
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff=ignore_backoff,
|
2014-11-20 18:41:56 +01:00
|
|
|
)
|
|
|
|
|
2015-02-04 17:28:12 +01:00
|
|
|
if 200 <= response.code < 300:
|
|
|
|
# We need to update the transactions table to say it was sent?
|
2017-07-18 17:41:44 +02:00
|
|
|
check_content_type_is_json(response.headers)
|
|
|
|
|
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
body = yield readBody(response)
|
|
|
|
|
|
|
|
defer.returnValue(json.loads(body))
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def delete_json(self, destination, path, long_retries=False,
|
|
|
|
timeout=None, ignore_backoff=False, args={}):
|
|
|
|
"""Send a DELETE request to the remote expecting some json response
|
|
|
|
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request
|
|
|
|
to.
|
|
|
|
path (str): The HTTP path.
|
|
|
|
long_retries (bool): A boolean that indicates whether we should
|
|
|
|
retry for a short or long time.
|
|
|
|
timeout(int): How long to try (in ms) the destination for before
|
|
|
|
giving up. None indicates no timeout.
|
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data and
|
|
|
|
try the request anyway.
|
|
|
|
Returns:
|
|
|
|
Deferred: Succeeds when we get a 2xx HTTP response. The result
|
|
|
|
will be the decoded JSON body.
|
|
|
|
|
|
|
|
Fails with ``HTTPRequestException`` if we get an HTTP response
|
|
|
|
code >= 300.
|
|
|
|
|
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
2017-07-18 17:41:44 +02:00
|
|
|
"""
|
|
|
|
|
|
|
|
response = yield self._request(
|
|
|
|
destination,
|
|
|
|
"DELETE",
|
|
|
|
path,
|
|
|
|
query_bytes=encode_query_args(args),
|
|
|
|
headers_dict={"Content-Type": ["application/json"]},
|
|
|
|
long_retries=long_retries,
|
|
|
|
timeout=timeout,
|
|
|
|
ignore_backoff=ignore_backoff,
|
|
|
|
)
|
|
|
|
|
|
|
|
if 200 <= response.code < 300:
|
|
|
|
# We need to update the transactions table to say it was sent?
|
2016-11-30 16:03:00 +01:00
|
|
|
check_content_type_is_json(response.headers)
|
2015-02-04 17:28:12 +01:00
|
|
|
|
2017-03-23 11:03:47 +01:00
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
body = yield readBody(response)
|
2014-11-20 18:41:56 +01:00
|
|
|
|
|
|
|
defer.returnValue(json.loads(body))
|
|
|
|
|
2014-12-04 15:22:31 +01:00
|
|
|
@defer.inlineCallbacks
|
|
|
|
def get_file(self, destination, path, output_stream, args={},
|
2017-03-23 12:10:36 +01:00
|
|
|
retry_on_dns_fail=True, max_size=None,
|
|
|
|
ignore_backoff=False):
|
2014-12-04 15:22:31 +01:00
|
|
|
"""GETs a file from a given homeserver
|
|
|
|
Args:
|
|
|
|
destination (str): The remote server to send the HTTP request to.
|
|
|
|
path (str): The HTTP path to GET.
|
|
|
|
output_stream (file): File to write the response body to.
|
|
|
|
args (dict): Optional dictionary used to create the query string.
|
2017-03-23 12:10:36 +01:00
|
|
|
ignore_backoff (bool): true to ignore the historical backoff data
|
|
|
|
and try the request anyway.
|
2014-12-04 15:22:31 +01:00
|
|
|
Returns:
|
2017-03-13 14:50:16 +01:00
|
|
|
Deferred: resolves with an (int,dict) tuple of the file length and
|
|
|
|
a dict of the response headers.
|
|
|
|
|
|
|
|
Fails with ``HTTPRequestException`` if we get an HTTP response code
|
|
|
|
>= 300
|
2017-03-23 01:12:21 +01:00
|
|
|
|
|
|
|
Fails with ``NotRetryingDestination`` if we are not yet ready
|
|
|
|
to retry this server.
|
2018-01-22 19:11:18 +01:00
|
|
|
|
|
|
|
Fails with ``FederationDeniedError`` if this destination
|
|
|
|
is not on our federation whitelist
|
2014-12-04 15:22:31 +01:00
|
|
|
"""
|
|
|
|
|
|
|
|
encoded_args = {}
|
|
|
|
for k, vs in args.items():
|
2018-04-15 21:43:35 +02:00
|
|
|
if isinstance(vs, string_types):
|
2014-12-04 15:22:31 +01:00
|
|
|
vs = [vs]
|
|
|
|
encoded_args[k] = [v.encode("UTF-8") for v in vs]
|
|
|
|
|
|
|
|
query_bytes = urllib.urlencode(encoded_args, True)
|
2017-03-13 14:50:16 +01:00
|
|
|
logger.debug("Query bytes: %s Retry DNS: %s", query_bytes, retry_on_dns_fail)
|
2014-12-04 15:22:31 +01:00
|
|
|
|
|
|
|
def body_callback(method, url_bytes, headers_dict):
|
|
|
|
self.sign_request(destination, method, url_bytes, headers_dict)
|
|
|
|
return None
|
|
|
|
|
2017-03-23 01:27:04 +01:00
|
|
|
response = yield self._request(
|
|
|
|
destination,
|
2014-12-04 15:22:31 +01:00
|
|
|
"GET",
|
2017-03-23 01:27:04 +01:00
|
|
|
path,
|
2014-12-04 15:22:31 +01:00
|
|
|
query_bytes=query_bytes,
|
|
|
|
body_callback=body_callback,
|
2017-03-23 12:10:36 +01:00
|
|
|
retry_on_dns_fail=retry_on_dns_fail,
|
|
|
|
ignore_backoff=ignore_backoff,
|
2014-12-04 15:22:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
headers = dict(response.headers.getAllRawHeaders())
|
|
|
|
|
2014-12-11 15:19:32 +01:00
|
|
|
try:
|
2017-03-23 11:03:47 +01:00
|
|
|
with logcontext.PreserveLoggingContext():
|
|
|
|
length = yield _readBodyToFile(
|
|
|
|
response, output_stream, max_size
|
|
|
|
)
|
2017-10-23 16:52:32 +02:00
|
|
|
except Exception:
|
2014-12-11 15:19:32 +01:00
|
|
|
logger.exception("Failed to download body")
|
|
|
|
raise
|
2014-12-04 15:22:31 +01:00
|
|
|
|
|
|
|
defer.returnValue((length, headers))
|
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
|
2014-12-04 15:22:31 +01:00
|
|
|
class _ReadBodyToFileProtocol(protocol.Protocol):
|
2014-12-11 15:19:32 +01:00
|
|
|
def __init__(self, stream, deferred, max_size):
|
2014-12-04 15:22:31 +01:00
|
|
|
self.stream = stream
|
|
|
|
self.deferred = deferred
|
|
|
|
self.length = 0
|
2014-12-11 15:19:32 +01:00
|
|
|
self.max_size = max_size
|
2014-12-04 15:22:31 +01:00
|
|
|
|
|
|
|
def dataReceived(self, data):
|
|
|
|
self.stream.write(data)
|
|
|
|
self.length += len(data)
|
2014-12-11 15:19:32 +01:00
|
|
|
if self.max_size is not None and self.length >= self.max_size:
|
|
|
|
self.deferred.errback(SynapseError(
|
|
|
|
502,
|
|
|
|
"Requested file is too large > %r bytes" % (self.max_size,),
|
|
|
|
Codes.TOO_LARGE,
|
|
|
|
))
|
|
|
|
self.deferred = defer.Deferred()
|
|
|
|
self.transport.loseConnection()
|
2014-12-04 15:22:31 +01:00
|
|
|
|
|
|
|
def connectionLost(self, reason):
|
|
|
|
if reason.check(ResponseDone):
|
|
|
|
self.deferred.callback(self.length)
|
|
|
|
else:
|
|
|
|
self.deferred.errback(reason)
|
|
|
|
|
|
|
|
|
2014-12-11 15:19:32 +01:00
|
|
|
def _readBodyToFile(response, stream, max_size):
|
2014-12-04 15:22:31 +01:00
|
|
|
d = defer.Deferred()
|
2014-12-11 15:19:32 +01:00
|
|
|
response.deliverBody(_ReadBodyToFileProtocol(stream, d, max_size))
|
2014-12-04 15:22:31 +01:00
|
|
|
return d
|
|
|
|
|
|
|
|
|
2014-11-20 18:41:56 +01:00
|
|
|
class _JsonProducer(object):
|
|
|
|
""" Used by the twisted http client to create the HTTP body from json
|
|
|
|
"""
|
|
|
|
def __init__(self, jsn):
|
|
|
|
self.reset(jsn)
|
|
|
|
|
|
|
|
def reset(self, jsn):
|
|
|
|
self.body = encode_canonical_json(jsn)
|
|
|
|
self.length = len(self.body)
|
|
|
|
|
|
|
|
def startProducing(self, consumer):
|
|
|
|
consumer.write(self.body)
|
|
|
|
return defer.succeed(None)
|
|
|
|
|
|
|
|
def pauseProducing(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def stopProducing(self):
|
2014-11-20 19:00:10 +01:00
|
|
|
pass
|
2015-02-18 11:50:10 +01:00
|
|
|
|
2015-11-17 17:57:06 +01:00
|
|
|
def resumeProducing(self):
|
|
|
|
pass
|
|
|
|
|
2015-02-18 11:50:10 +01:00
|
|
|
|
|
|
|
def _flatten_response_never_received(e):
|
|
|
|
if hasattr(e, "reasons"):
|
2017-09-28 14:44:47 +02:00
|
|
|
reasons = ", ".join(
|
2015-02-18 11:50:10 +01:00
|
|
|
_flatten_response_never_received(f.value)
|
|
|
|
for f in e.reasons
|
|
|
|
)
|
2017-09-28 14:44:47 +02:00
|
|
|
|
|
|
|
return "%s:[%s]" % (type(e).__name__, reasons)
|
2015-02-18 11:50:10 +01:00
|
|
|
else:
|
2017-09-28 14:44:47 +02:00
|
|
|
return repr(e)
|
2016-11-30 16:03:00 +01:00
|
|
|
|
|
|
|
|
|
|
|
def check_content_type_is_json(headers):
|
|
|
|
"""
|
|
|
|
Check that a set of HTTP headers have a Content-Type header, and that it
|
|
|
|
is application/json.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
headers (twisted.web.http_headers.Headers): headers to check
|
|
|
|
|
|
|
|
Raises:
|
|
|
|
RuntimeError if the
|
|
|
|
|
|
|
|
"""
|
2018-04-15 21:43:35 +02:00
|
|
|
c_type = headers.getRawHeaders(b"Content-Type")
|
2016-11-30 16:03:00 +01:00
|
|
|
if c_type is None:
|
|
|
|
raise RuntimeError(
|
|
|
|
"No Content-Type header"
|
|
|
|
)
|
|
|
|
|
|
|
|
c_type = c_type[0] # only the first header
|
|
|
|
val, options = cgi.parse_header(c_type)
|
|
|
|
if val != "application/json":
|
|
|
|
raise RuntimeError(
|
|
|
|
"Content-Type not application/json: was '%s'" % c_type
|
|
|
|
)
|
2017-07-18 17:40:21 +02:00
|
|
|
|
|
|
|
|
|
|
|
def encode_query_args(args):
|
|
|
|
encoded_args = {}
|
|
|
|
for k, vs in args.items():
|
2018-04-15 21:43:35 +02:00
|
|
|
if isinstance(vs, string_types):
|
2017-07-18 17:40:21 +02:00
|
|
|
vs = [vs]
|
|
|
|
encoded_args[k] = [v.encode("UTF-8") for v in vs]
|
|
|
|
|
|
|
|
query_bytes = urllib.urlencode(encoded_args, True)
|
|
|
|
|
|
|
|
return query_bytes
|