client.py 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. # SPDX-License-Identifier: AGPL-3.0-or-later
  2. # lint: pylint
  3. # pylint: disable=missing-module-docstring, global-statement
  4. import asyncio
  5. import logging
  6. import random
  7. from ssl import SSLContext
  8. import threading
  9. from typing import Any, Dict
  10. import httpx
  11. from httpx_socks import AsyncProxyTransport
  12. from python_socks import parse_proxy_url, ProxyConnectionError, ProxyTimeoutError, ProxyError
  13. from searx import logger
  14. # Optional uvloop (support Python 3.6)
  15. try:
  16. import uvloop
  17. except ImportError:
  18. pass
  19. else:
  20. uvloop.install()
  21. logger = logger.getChild('searx.network.client')
  22. LOOP = None
  23. SSLCONTEXTS: Dict[Any, SSLContext] = {}
  24. def shuffle_ciphers(ssl_context):
  25. """Shuffle httpx's default ciphers of a SSL context randomly.
  26. From `What Is TLS Fingerprint and How to Bypass It`_
  27. > When implementing TLS fingerprinting, servers can't operate based on a
  28. > locked-in whitelist database of fingerprints. New fingerprints appear
  29. > when web clients or TLS libraries release new versions. So, they have to
  30. > live off a blocklist database instead.
  31. > ...
  32. > It's safe to leave the first three as is but shuffle the remaining ciphers
  33. > and you can bypass the TLS fingerprint check.
  34. .. _What Is TLS Fingerprint and How to Bypass It:
  35. https://www.zenrows.com/blog/what-is-tls-fingerprint#how-to-bypass-tls-fingerprinting
  36. """
  37. c_list = httpx._config.DEFAULT_CIPHERS.split(':') # pylint: disable=protected-access
  38. sc_list, c_list = c_list[:3], c_list[3:]
  39. random.shuffle(c_list)
  40. ssl_context.set_ciphers(":".join(sc_list + c_list))
  41. def get_sslcontexts(proxy_url=None, cert=None, verify=True, trust_env=True, http2=False):
  42. key = (proxy_url, cert, verify, trust_env, http2)
  43. if key not in SSLCONTEXTS:
  44. SSLCONTEXTS[key] = httpx.create_ssl_context(cert, verify, trust_env, http2)
  45. shuffle_ciphers(SSLCONTEXTS[key])
  46. return SSLCONTEXTS[key]
  47. class AsyncHTTPTransportNoHttp(httpx.AsyncHTTPTransport):
  48. """Block HTTP request"""
  49. async def handle_async_request(self, request):
  50. raise httpx.UnsupportedProtocol('HTTP protocol is disabled')
  51. class AsyncProxyTransportFixed(AsyncProxyTransport):
  52. """Fix httpx_socks.AsyncProxyTransport
  53. Map python_socks exceptions to httpx.ProxyError exceptions
  54. """
  55. async def handle_async_request(self, request):
  56. try:
  57. return await super().handle_async_request(request)
  58. except ProxyConnectionError as e:
  59. raise httpx.ProxyError("ProxyConnectionError: " + e.strerror, request=request) from e
  60. except ProxyTimeoutError as e:
  61. raise httpx.ProxyError("ProxyTimeoutError: " + e.args[0], request=request) from e
  62. except ProxyError as e:
  63. raise httpx.ProxyError("ProxyError: " + e.args[0], request=request) from e
  64. def get_transport_for_socks_proxy(verify, http2, local_address, proxy_url, limit, retries):
  65. # support socks5h (requests compatibility):
  66. # https://requests.readthedocs.io/en/master/user/advanced/#socks
  67. # socks5:// hostname is resolved on client side
  68. # socks5h:// hostname is resolved on proxy side
  69. rdns = False
  70. socks5h = 'socks5h://'
  71. if proxy_url.startswith(socks5h):
  72. proxy_url = 'socks5://' + proxy_url[len(socks5h) :]
  73. rdns = True
  74. proxy_type, proxy_host, proxy_port, proxy_username, proxy_password = parse_proxy_url(proxy_url)
  75. verify = get_sslcontexts(proxy_url, None, verify, True, http2) if verify is True else verify
  76. return AsyncProxyTransportFixed(
  77. proxy_type=proxy_type,
  78. proxy_host=proxy_host,
  79. proxy_port=proxy_port,
  80. username=proxy_username,
  81. password=proxy_password,
  82. rdns=rdns,
  83. loop=get_loop(),
  84. verify=verify,
  85. http2=http2,
  86. local_address=local_address,
  87. limits=limit,
  88. retries=retries,
  89. )
  90. def get_transport(verify, http2, local_address, proxy_url, limit, retries):
  91. verify = get_sslcontexts(None, None, verify, True, http2) if verify is True else verify
  92. return httpx.AsyncHTTPTransport(
  93. # pylint: disable=protected-access
  94. verify=verify,
  95. http2=http2,
  96. limits=limit,
  97. proxy=httpx._config.Proxy(proxy_url) if proxy_url else None,
  98. local_address=local_address,
  99. retries=retries,
  100. )
  101. def new_client(
  102. # pylint: disable=too-many-arguments
  103. enable_http,
  104. verify,
  105. enable_http2,
  106. max_connections,
  107. max_keepalive_connections,
  108. keepalive_expiry,
  109. proxies,
  110. local_address,
  111. retries,
  112. max_redirects,
  113. hook_log_response,
  114. ):
  115. limit = httpx.Limits(
  116. max_connections=max_connections,
  117. max_keepalive_connections=max_keepalive_connections,
  118. keepalive_expiry=keepalive_expiry,
  119. )
  120. # See https://www.python-httpx.org/advanced/#routing
  121. mounts = {}
  122. for pattern, proxy_url in proxies.items():
  123. if not enable_http and pattern.startswith('http://'):
  124. continue
  125. if proxy_url.startswith('socks4://') or proxy_url.startswith('socks5://') or proxy_url.startswith('socks5h://'):
  126. mounts[pattern] = get_transport_for_socks_proxy(
  127. verify, enable_http2, local_address, proxy_url, limit, retries
  128. )
  129. else:
  130. mounts[pattern] = get_transport(verify, enable_http2, local_address, proxy_url, limit, retries)
  131. if not enable_http:
  132. mounts['http://'] = AsyncHTTPTransportNoHttp()
  133. transport = get_transport(verify, enable_http2, local_address, None, limit, retries)
  134. event_hooks = None
  135. if hook_log_response:
  136. event_hooks = {'response': [hook_log_response]}
  137. return httpx.AsyncClient(
  138. transport=transport,
  139. mounts=mounts,
  140. max_redirects=max_redirects,
  141. event_hooks=event_hooks,
  142. )
  143. def get_loop():
  144. return LOOP
  145. def init():
  146. # log
  147. for logger_name in (
  148. 'httpx',
  149. 'httpcore.proxy',
  150. 'httpcore.connection',
  151. 'httpcore.http11',
  152. 'httpcore.http2',
  153. 'hpack.hpack',
  154. 'hpack.table',
  155. ):
  156. logging.getLogger(logger_name).setLevel(logging.WARNING)
  157. # loop
  158. def loop_thread():
  159. global LOOP
  160. LOOP = asyncio.new_event_loop()
  161. LOOP.run_forever()
  162. thread = threading.Thread(
  163. target=loop_thread,
  164. name='asyncio_loop',
  165. daemon=True,
  166. )
  167. thread.start()
  168. init()