client.py 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. # SPDX-License-Identifier: AGPL-3.0-or-later
  2. # lint: pylint
  3. # pylint: disable=missing-module-docstring, global-statement
  4. import asyncio
  5. import logging
  6. import threading
  7. import httpcore
  8. import httpx
  9. from httpx_socks import AsyncProxyTransport
  10. from python_socks import (
  11. parse_proxy_url,
  12. ProxyConnectionError,
  13. ProxyTimeoutError,
  14. ProxyError
  15. )
  16. from searx import logger
  17. # Optional uvloop (support Python 3.6)
  18. try:
  19. import uvloop
  20. except ImportError:
  21. pass
  22. else:
  23. uvloop.install()
  24. logger = logger.getChild('searx.network.client')
  25. LOOP = None
  26. SSLCONTEXTS = {}
  27. TRANSPORT_KWARGS = {
  28. # use anyio :
  29. # * https://github.com/encode/httpcore/issues/344
  30. # * https://github.com/encode/httpx/discussions/1511
  31. 'backend': 'anyio',
  32. 'trust_env': False,
  33. }
  34. # pylint: disable=protected-access
  35. async def close_connections_for_url(
  36. connection_pool: httpcore.AsyncConnectionPool, url: httpcore._utils.URL
  37. ):
  38. origin = httpcore._utils.url_to_origin(url)
  39. logger.debug('Drop connections for %r', origin)
  40. connections_to_close = connection_pool._connections_for_origin(origin)
  41. for connection in connections_to_close:
  42. await connection_pool._remove_from_pool(connection)
  43. try:
  44. await connection.aclose()
  45. except httpx.NetworkError as e:
  46. logger.warning('Error closing an existing connection', exc_info=e)
  47. # pylint: enable=protected-access
  48. def get_sslcontexts(proxy_url=None, cert=None, verify=True, trust_env=True, http2=False):
  49. key = (proxy_url, cert, verify, trust_env, http2)
  50. if key not in SSLCONTEXTS:
  51. SSLCONTEXTS[key] = httpx.create_ssl_context(cert, verify, trust_env, http2)
  52. return SSLCONTEXTS[key]
  53. class AsyncHTTPTransportNoHttp(httpx.AsyncHTTPTransport):
  54. """Block HTTP request"""
  55. async def handle_async_request(
  56. self, method, url, headers=None, stream=None, extensions=None
  57. ):
  58. raise httpx.UnsupportedProtocol('HTTP protocol is disabled')
  59. class AsyncProxyTransportFixed(AsyncProxyTransport):
  60. """Fix httpx_socks.AsyncProxyTransport
  61. Map python_socks exceptions to httpx.ProxyError / httpx.ConnectError
  62. Map socket.gaierror to httpx.ConnectError
  63. Note: AsyncProxyTransport inherit from AsyncConnectionPool
  64. """
  65. async def handle_async_request(
  66. self, method, url, headers=None, stream=None, extensions=None
  67. ):
  68. retry = 2
  69. while retry > 0:
  70. retry -= 1
  71. try:
  72. return await super().handle_async_request(
  73. method, url, headers=headers, stream=stream, extensions=extensions
  74. )
  75. except (ProxyConnectionError, ProxyTimeoutError, ProxyError) as e:
  76. raise httpx.ProxyError from e
  77. except OSError as e:
  78. # socket.gaierror when DNS resolution fails
  79. raise httpx.ConnectError from e
  80. except httpx.NetworkError as e:
  81. # httpx.WriteError on HTTP/2 connection leaves a new opened stream
  82. # then each new request creates a new stream and raise the same WriteError
  83. await close_connections_for_url(self, url)
  84. raise e
  85. except httpx.RemoteProtocolError as e:
  86. # in case of httpx.RemoteProtocolError: Server disconnected
  87. await close_connections_for_url(self, url)
  88. logger.warning('httpx.RemoteProtocolError: retry', exc_info=e)
  89. # retry
  90. class AsyncHTTPTransportFixed(httpx.AsyncHTTPTransport):
  91. """Fix httpx.AsyncHTTPTransport"""
  92. async def handle_async_request(
  93. self, method, url, headers=None, stream=None, extensions=None
  94. ):
  95. retry = 2
  96. while retry > 0:
  97. retry -= 1
  98. try:
  99. return await super().handle_async_request(
  100. method, url, headers=headers, stream=stream, extensions=extensions
  101. )
  102. except OSError as e:
  103. # socket.gaierror when DNS resolution fails
  104. raise httpx.ConnectError from e
  105. except httpx.NetworkError as e:
  106. # httpx.WriteError on HTTP/2 connection leaves a new opened stream
  107. # then each new request creates a new stream and raise the same WriteError
  108. await close_connections_for_url(self._pool, url)
  109. raise e
  110. except httpx.RemoteProtocolError as e:
  111. # in case of httpx.RemoteProtocolError: Server disconnected
  112. await close_connections_for_url(self._pool, url)
  113. logger.warning('httpx.RemoteProtocolError: retry', exc_info=e)
  114. # retry
  115. def get_transport_for_socks_proxy(verify, http2, local_address, proxy_url, limit, retries):
  116. # support socks5h (requests compatibility):
  117. # https://requests.readthedocs.io/en/master/user/advanced/#socks
  118. # socks5:// hostname is resolved on client side
  119. # socks5h:// hostname is resolved on proxy side
  120. rdns = False
  121. socks5h = 'socks5h://'
  122. if proxy_url.startswith(socks5h):
  123. proxy_url = 'socks5://' + proxy_url[len(socks5h):]
  124. rdns = True
  125. proxy_type, proxy_host, proxy_port, proxy_username, proxy_password = parse_proxy_url(proxy_url)
  126. verify = get_sslcontexts(proxy_url, None, True, False, http2) if verify is True else verify
  127. return AsyncProxyTransportFixed(
  128. proxy_type=proxy_type, proxy_host=proxy_host, proxy_port=proxy_port,
  129. username=proxy_username, password=proxy_password,
  130. rdns=rdns,
  131. loop=get_loop(),
  132. verify=verify,
  133. http2=http2,
  134. local_address=local_address,
  135. max_connections=limit.max_connections,
  136. max_keepalive_connections=limit.max_keepalive_connections,
  137. keepalive_expiry=limit.keepalive_expiry,
  138. retries=retries,
  139. **TRANSPORT_KWARGS
  140. )
  141. def get_transport(verify, http2, local_address, proxy_url, limit, retries):
  142. verify = get_sslcontexts(None, None, True, False, http2) if verify is True else verify
  143. return AsyncHTTPTransportFixed(
  144. # pylint: disable=protected-access
  145. verify=verify,
  146. http2=http2,
  147. local_address=local_address,
  148. proxy=httpx._config.Proxy(proxy_url) if proxy_url else None,
  149. limits=limit,
  150. retries=retries,
  151. **TRANSPORT_KWARGS
  152. )
  153. def new_client(
  154. # pylint: disable=too-many-arguments
  155. enable_http, verify, enable_http2,
  156. max_connections, max_keepalive_connections, keepalive_expiry,
  157. proxies, local_address, retries, max_redirects, hook_log_response ):
  158. limit = httpx.Limits(
  159. max_connections=max_connections,
  160. max_keepalive_connections=max_keepalive_connections,
  161. keepalive_expiry=keepalive_expiry
  162. )
  163. # See https://www.python-httpx.org/advanced/#routing
  164. mounts = {}
  165. for pattern, proxy_url in proxies.items():
  166. if not enable_http and pattern.startswith('http://'):
  167. continue
  168. if (proxy_url.startswith('socks4://')
  169. or proxy_url.startswith('socks5://')
  170. or proxy_url.startswith('socks5h://')
  171. ):
  172. mounts[pattern] = get_transport_for_socks_proxy(
  173. verify, enable_http2, local_address, proxy_url, limit, retries
  174. )
  175. else:
  176. mounts[pattern] = get_transport(
  177. verify, enable_http2, local_address, proxy_url, limit, retries
  178. )
  179. if not enable_http:
  180. mounts['http://'] = AsyncHTTPTransportNoHttp()
  181. transport = get_transport(verify, enable_http2, local_address, None, limit, retries)
  182. event_hooks = None
  183. if hook_log_response:
  184. event_hooks = {'response': [ hook_log_response ]}
  185. return httpx.AsyncClient(
  186. transport=transport,
  187. mounts=mounts,
  188. max_redirects=max_redirects,
  189. event_hooks=event_hooks,
  190. )
  191. def get_loop():
  192. return LOOP
  193. def init():
  194. # log
  195. for logger_name in ('hpack.hpack', 'hpack.table', 'httpx._client'):
  196. logging.getLogger(logger_name).setLevel(logging.WARNING)
  197. # loop
  198. def loop_thread():
  199. global LOOP
  200. LOOP = asyncio.new_event_loop()
  201. LOOP.run_forever()
  202. thread = threading.Thread(
  203. target=loop_thread,
  204. name='asyncio_loop',
  205. daemon=True,
  206. )
  207. thread.start()
  208. init()