client.py 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. # SPDX-License-Identifier: AGPL-3.0-or-later
  2. # lint: pylint
  3. # pylint: disable=missing-module-docstring, global-statement
  4. import asyncio
  5. import logging
  6. import threading
  7. import httpcore
  8. import httpx
  9. from httpx_socks import AsyncProxyTransport
  10. from python_socks import (
  11. parse_proxy_url,
  12. ProxyConnectionError,
  13. ProxyTimeoutError,
  14. ProxyError
  15. )
  16. from searx import logger
  17. # Optional uvloop (support Python 3.6)
  18. try:
  19. import uvloop
  20. except ImportError:
  21. pass
  22. else:
  23. uvloop.install()
  24. logger = logger.getChild('searx.http.client')
  25. LOOP = None
  26. SSLCONTEXTS = {}
  27. TRANSPORT_KWARGS = {
  28. 'backend': 'asyncio',
  29. 'trust_env': False,
  30. }
  31. # pylint: disable=protected-access
  32. async def close_connections_for_url(
  33. connection_pool: httpcore.AsyncConnectionPool,
  34. url: httpcore._utils.URL ):
  35. origin = httpcore._utils.url_to_origin(url)
  36. logger.debug('Drop connections for %r', origin)
  37. connections_to_close = connection_pool._connections_for_origin(origin)
  38. for connection in connections_to_close:
  39. await connection_pool._remove_from_pool(connection)
  40. try:
  41. await connection.aclose()
  42. except httpcore.NetworkError as e:
  43. logger.warning('Error closing an existing connection', exc_info=e)
  44. # pylint: enable=protected-access
  45. def get_sslcontexts(proxy_url=None, cert=None, verify=True, trust_env=True, http2=False):
  46. key = (proxy_url, cert, verify, trust_env, http2)
  47. if key not in SSLCONTEXTS:
  48. SSLCONTEXTS[key] = httpx.create_ssl_context(cert, verify, trust_env, http2)
  49. return SSLCONTEXTS[key]
  50. class AsyncHTTPTransportNoHttp(httpcore.AsyncHTTPTransport):
  51. """Block HTTP request"""
  52. async def arequest(self, method, url, headers=None, stream=None, ext=None):
  53. raise httpcore.UnsupportedProtocol("HTTP protocol is disabled")
  54. class AsyncProxyTransportFixed(AsyncProxyTransport):
  55. """Fix httpx_socks.AsyncProxyTransport
  56. Map python_socks exceptions to httpcore.ProxyError
  57. Map socket.gaierror to httpcore.ConnectError
  58. Note: keepalive_expiry is ignored, AsyncProxyTransport should call:
  59. * self._keepalive_sweep()
  60. * self._response_closed(self, connection)
  61. Note: AsyncProxyTransport inherit from AsyncConnectionPool
  62. Note: the API is going to change on httpx 0.18.0
  63. see https://github.com/encode/httpx/pull/1522
  64. """
  65. async def arequest(self, method, url, headers=None, stream=None, ext=None):
  66. retry = 2
  67. while retry > 0:
  68. retry -= 1
  69. try:
  70. return await super().arequest(method, url, headers, stream, ext)
  71. except (ProxyConnectionError, ProxyTimeoutError, ProxyError) as e:
  72. raise httpcore.ProxyError(e)
  73. except OSError as e:
  74. # socket.gaierror when DNS resolution fails
  75. raise httpcore.NetworkError(e)
  76. except httpcore.RemoteProtocolError as e:
  77. # in case of httpcore.RemoteProtocolError: Server disconnected
  78. await close_connections_for_url(self, url)
  79. logger.warning('httpcore.RemoteProtocolError: retry', exc_info=e)
  80. # retry
  81. except (httpcore.NetworkError, httpcore.ProtocolError) as e:
  82. # httpcore.WriteError on HTTP/2 connection leaves a new opened stream
  83. # then each new request creates a new stream and raise the same WriteError
  84. await close_connections_for_url(self, url)
  85. raise e
  86. class AsyncHTTPTransportFixed(httpx.AsyncHTTPTransport):
  87. """Fix httpx.AsyncHTTPTransport"""
  88. async def arequest(self, method, url, headers=None, stream=None, ext=None):
  89. retry = 2
  90. while retry > 0:
  91. retry -= 1
  92. try:
  93. return await super().arequest(method, url, headers, stream, ext)
  94. except OSError as e:
  95. # socket.gaierror when DNS resolution fails
  96. raise httpcore.ConnectError(e)
  97. except httpcore.CloseError as e:
  98. # httpcore.CloseError: [Errno 104] Connection reset by peer
  99. # raised by _keepalive_sweep()
  100. # from https://github.com/encode/httpcore/blob/4b662b5c42378a61e54d673b4c949420102379f5/httpcore/_backends/asyncio.py#L198 # pylint: disable=line-too-long
  101. await close_connections_for_url(self._pool, url)
  102. logger.warning('httpcore.CloseError: retry', exc_info=e)
  103. # retry
  104. except httpcore.RemoteProtocolError as e:
  105. # in case of httpcore.RemoteProtocolError: Server disconnected
  106. await close_connections_for_url(self._pool, url)
  107. logger.warning('httpcore.RemoteProtocolError: retry', exc_info=e)
  108. # retry
  109. except (httpcore.ProtocolError, httpcore.NetworkError) as e:
  110. await close_connections_for_url(self._pool, url)
  111. raise e
  112. def get_transport_for_socks_proxy(verify, http2, local_address, proxy_url, limit, retries):
  113. # support socks5h (requests compatibility):
  114. # https://requests.readthedocs.io/en/master/user/advanced/#socks
  115. # socks5:// hostname is resolved on client side
  116. # socks5h:// hostname is resolved on proxy side
  117. rdns = False
  118. socks5h = 'socks5h://'
  119. if proxy_url.startswith(socks5h):
  120. proxy_url = 'socks5://' + proxy_url[len(socks5h):]
  121. rdns = True
  122. proxy_type, proxy_host, proxy_port, proxy_username, proxy_password = parse_proxy_url(proxy_url)
  123. verify = get_sslcontexts(proxy_url, None, True, False, http2) if verify is True else verify
  124. return AsyncProxyTransportFixed(
  125. proxy_type=proxy_type, proxy_host=proxy_host, proxy_port=proxy_port,
  126. username=proxy_username, password=proxy_password,
  127. rdns=rdns,
  128. loop=get_loop(),
  129. verify=verify,
  130. http2=http2,
  131. local_address=local_address,
  132. max_connections=limit.max_connections,
  133. max_keepalive_connections=limit.max_keepalive_connections,
  134. keepalive_expiry=limit.keepalive_expiry,
  135. retries=retries,
  136. **TRANSPORT_KWARGS
  137. )
  138. def get_transport(verify, http2, local_address, proxy_url, limit, retries):
  139. verify = get_sslcontexts(None, None, True, False, http2) if verify is True else verify
  140. return AsyncHTTPTransportFixed(
  141. # pylint: disable=protected-access
  142. verify=verify,
  143. http2=http2,
  144. local_address=local_address,
  145. proxy=httpx._config.Proxy(proxy_url) if proxy_url else None,
  146. limits=limit,
  147. retries=retries,
  148. **TRANSPORT_KWARGS
  149. )
  150. def iter_proxies(proxies):
  151. # https://www.python-httpx.org/compatibility/#proxy-keys
  152. if isinstance(proxies, str):
  153. yield 'all://', proxies
  154. elif isinstance(proxies, dict):
  155. for pattern, proxy_url in proxies.items():
  156. yield pattern, proxy_url
  157. def new_client(
  158. # pylint: disable=too-many-arguments
  159. enable_http, verify, enable_http2,
  160. max_connections, max_keepalive_connections, keepalive_expiry,
  161. proxies, local_address, retries, max_redirects, hook_log_response ):
  162. limit = httpx.Limits(
  163. max_connections=max_connections,
  164. max_keepalive_connections=max_keepalive_connections,
  165. keepalive_expiry=keepalive_expiry
  166. )
  167. # See https://www.python-httpx.org/advanced/#routing
  168. mounts = {}
  169. for pattern, proxy_url in iter_proxies(proxies):
  170. if not enable_http and (pattern == 'http' or pattern.startswith('http://')):
  171. continue
  172. if (proxy_url.startswith('socks4://')
  173. or proxy_url.startswith('socks5://')
  174. or proxy_url.startswith('socks5h://')
  175. ):
  176. mounts[pattern] = get_transport_for_socks_proxy(
  177. verify, enable_http2, local_address, proxy_url, limit, retries
  178. )
  179. else:
  180. mounts[pattern] = get_transport(
  181. verify, enable_http2, local_address, proxy_url, limit, retries
  182. )
  183. if not enable_http:
  184. mounts['http://'] = AsyncHTTPTransportNoHttp()
  185. transport = get_transport(verify, enable_http2, local_address, None, limit, retries)
  186. event_hooks = None
  187. if hook_log_response:
  188. event_hooks = {'response': [ hook_log_response ]}
  189. return httpx.AsyncClient(
  190. transport=transport,
  191. mounts=mounts,
  192. max_redirects=max_redirects,
  193. event_hooks=event_hooks,
  194. )
  195. def get_loop():
  196. return LOOP
  197. def init():
  198. # log
  199. for logger_name in ('hpack.hpack', 'hpack.table', 'httpx._client'):
  200. logging.getLogger(logger_name).setLevel(logging.WARNING)
  201. # loop
  202. def loop_thread():
  203. global LOOP
  204. LOOP = asyncio.new_event_loop()
  205. LOOP.run_forever()
  206. thread = threading.Thread(
  207. target=loop_thread,
  208. name='asyncio_loop',
  209. daemon=True,
  210. )
  211. thread.start()
  212. init()