client.py 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254
  1. # SPDX-License-Identifier: AGPL-3.0-or-later
  2. # lint: pylint
  3. # pylint: disable=missing-module-docstring, global-statement
  4. import asyncio
  5. import logging
  6. import threading
  7. import httpcore
  8. import httpx
  9. from httpx_socks import AsyncProxyTransport
  10. from python_socks import (
  11. parse_proxy_url,
  12. ProxyConnectionError,
  13. ProxyTimeoutError,
  14. ProxyError
  15. )
  16. from searx import logger
  17. # Optional uvloop (support Python 3.6)
  18. try:
  19. import uvloop
  20. except ImportError:
  21. pass
  22. else:
  23. uvloop.install()
  24. logger = logger.getChild('searx.network.client')
  25. LOOP = None
  26. SSLCONTEXTS = {}
  27. TRANSPORT_KWARGS = {
  28. # use anyio :
  29. # * https://github.com/encode/httpcore/issues/344
  30. # * https://github.com/encode/httpx/discussions/1511
  31. 'backend': 'anyio',
  32. 'trust_env': False,
  33. }
  34. # pylint: disable=protected-access
  35. async def close_connections_for_url(
  36. connection_pool: httpcore.AsyncConnectionPool, url: httpcore._utils.URL
  37. ):
  38. origin = httpcore._utils.url_to_origin(url)
  39. logger.debug('Drop connections for %r', origin)
  40. connections_to_close = connection_pool._connections_for_origin(origin)
  41. for connection in connections_to_close:
  42. await connection_pool._remove_from_pool(connection)
  43. try:
  44. await connection.aclose()
  45. except httpx.NetworkError as e:
  46. logger.warning('Error closing an existing connection', exc_info=e)
  47. # pylint: enable=protected-access
  48. def get_sslcontexts(proxy_url=None, cert=None, verify=True, trust_env=True, http2=False):
  49. global SSLCONTEXTS
  50. key = (proxy_url, cert, verify, trust_env, http2)
  51. if key not in SSLCONTEXTS:
  52. SSLCONTEXTS[key] = httpx.create_ssl_context(cert, verify, trust_env, http2)
  53. return SSLCONTEXTS[key]
  54. class AsyncHTTPTransportNoHttp(httpx.AsyncHTTPTransport):
  55. """Block HTTP request"""
  56. async def handle_async_request(
  57. self, method, url, headers=None, stream=None, extensions=None
  58. ):
  59. raise httpx.UnsupportedProtocol('HTTP protocol is disabled')
  60. class AsyncProxyTransportFixed(AsyncProxyTransport):
  61. """Fix httpx_socks.AsyncProxyTransport
  62. Map python_socks exceptions to httpx.ProxyError / httpx.ConnectError
  63. Map socket.gaierror to httpx.ConnectError
  64. Note: AsyncProxyTransport inherit from AsyncConnectionPool
  65. """
  66. async def handle_async_request(
  67. self, method, url, headers=None, stream=None, extensions=None
  68. ):
  69. retry = 2
  70. while retry > 0:
  71. retry -= 1
  72. try:
  73. return await super().handle_async_request(
  74. method, url, headers=headers, stream=stream, extensions=extensions
  75. )
  76. except (ProxyConnectionError, ProxyTimeoutError, ProxyError) as e:
  77. raise httpx.ProxyError from e
  78. except OSError as e:
  79. # socket.gaierror when DNS resolution fails
  80. raise httpx.ConnectError from e
  81. except httpx.NetworkError as e:
  82. # httpx.WriteError on HTTP/2 connection leaves a new opened stream
  83. # then each new request creates a new stream and raise the same WriteError
  84. await close_connections_for_url(self, url)
  85. raise e
  86. except httpx.RemoteProtocolError as e:
  87. # in case of httpx.RemoteProtocolError: Server disconnected
  88. await close_connections_for_url(self, url)
  89. logger.warning('httpx.RemoteProtocolError: retry', exc_info=e)
  90. # retry
  91. class AsyncHTTPTransportFixed(httpx.AsyncHTTPTransport):
  92. """Fix httpx.AsyncHTTPTransport"""
  93. async def handle_async_request(
  94. self, method, url, headers=None, stream=None, extensions=None
  95. ):
  96. retry = 2
  97. while retry > 0:
  98. retry -= 1
  99. try:
  100. return await super().handle_async_request(
  101. method, url, headers=headers, stream=stream, extensions=extensions
  102. )
  103. except OSError as e:
  104. # socket.gaierror when DNS resolution fails
  105. raise httpx.ConnectError from e
  106. except httpx.NetworkError as e:
  107. # httpx.WriteError on HTTP/2 connection leaves a new opened stream
  108. # then each new request creates a new stream and raise the same WriteError
  109. await close_connections_for_url(self._pool, url)
  110. raise e
  111. except httpx.RemoteProtocolError as e:
  112. # in case of httpx.RemoteProtocolError: Server disconnected
  113. await close_connections_for_url(self._pool, url)
  114. logger.warning('httpx.RemoteProtocolError: retry', exc_info=e)
  115. # retry
  116. def get_transport_for_socks_proxy(verify, http2, local_address, proxy_url, limit, retries):
  117. global TRANSPORT_KWARGS
  118. # support socks5h (requests compatibility):
  119. # https://requests.readthedocs.io/en/master/user/advanced/#socks
  120. # socks5:// hostname is resolved on client side
  121. # socks5h:// hostname is resolved on proxy side
  122. rdns = False
  123. socks5h = 'socks5h://'
  124. if proxy_url.startswith(socks5h):
  125. proxy_url = 'socks5://' + proxy_url[len(socks5h):]
  126. rdns = True
  127. proxy_type, proxy_host, proxy_port, proxy_username, proxy_password = parse_proxy_url(proxy_url)
  128. verify = get_sslcontexts(proxy_url, None, True, False, http2) if verify is True else verify
  129. return AsyncProxyTransportFixed(
  130. proxy_type=proxy_type, proxy_host=proxy_host, proxy_port=proxy_port,
  131. username=proxy_username, password=proxy_password,
  132. rdns=rdns,
  133. loop=get_loop(),
  134. verify=verify,
  135. http2=http2,
  136. local_address=local_address,
  137. max_connections=limit.max_connections,
  138. max_keepalive_connections=limit.max_keepalive_connections,
  139. keepalive_expiry=limit.keepalive_expiry,
  140. retries=retries,
  141. **TRANSPORT_KWARGS
  142. )
  143. def get_transport(verify, http2, local_address, proxy_url, limit, retries):
  144. global TRANSPORT_KWARGS
  145. verify = get_sslcontexts(None, None, True, False, http2) if verify is True else verify
  146. return AsyncHTTPTransportFixed(
  147. # pylint: disable=protected-access
  148. verify=verify,
  149. http2=http2,
  150. local_address=local_address,
  151. proxy=httpx._config.Proxy(proxy_url) if proxy_url else None,
  152. limits=limit,
  153. retries=retries,
  154. **TRANSPORT_KWARGS
  155. )
  156. def new_client(
  157. # pylint: disable=too-many-arguments
  158. enable_http, verify, enable_http2,
  159. max_connections, max_keepalive_connections, keepalive_expiry,
  160. proxies, local_address, retries, max_redirects, hook_log_response ):
  161. limit = httpx.Limits(
  162. max_connections=max_connections,
  163. max_keepalive_connections=max_keepalive_connections,
  164. keepalive_expiry=keepalive_expiry
  165. )
  166. # See https://www.python-httpx.org/advanced/#routing
  167. mounts = {}
  168. for pattern, proxy_url in proxies.items():
  169. if not enable_http and pattern.startswith('http://'):
  170. continue
  171. if (proxy_url.startswith('socks4://')
  172. or proxy_url.startswith('socks5://')
  173. or proxy_url.startswith('socks5h://')
  174. ):
  175. mounts[pattern] = get_transport_for_socks_proxy(
  176. verify, enable_http2, local_address, proxy_url, limit, retries
  177. )
  178. else:
  179. mounts[pattern] = get_transport(
  180. verify, enable_http2, local_address, proxy_url, limit, retries
  181. )
  182. if not enable_http:
  183. mounts['http://'] = AsyncHTTPTransportNoHttp()
  184. transport = get_transport(verify, enable_http2, local_address, None, limit, retries)
  185. event_hooks = None
  186. if hook_log_response:
  187. event_hooks = {'response': [ hook_log_response ]}
  188. return httpx.AsyncClient(
  189. transport=transport,
  190. mounts=mounts,
  191. max_redirects=max_redirects,
  192. event_hooks=event_hooks,
  193. )
  194. def get_loop():
  195. global LOOP
  196. return LOOP
  197. def init():
  198. # log
  199. for logger_name in ('hpack.hpack', 'hpack.table', 'httpx._client'):
  200. logging.getLogger(logger_name).setLevel(logging.WARNING)
  201. # loop
  202. def loop_thread():
  203. global LOOP
  204. LOOP = asyncio.new_event_loop()
  205. LOOP.run_forever()
  206. thread = threading.Thread(
  207. target=loop_thread,
  208. name='asyncio_loop',
  209. daemon=True,
  210. )
  211. thread.start()
  212. init()