Skip to content
Snippets Groups Projects
client.py 31.8 KiB
Newer Older
  • Learn to ignore specific revisions
  • Matthew Hodgson's avatar
    Matthew Hodgson committed
    # Copyright 2014-2016 OpenMarket Ltd
    
    # Copyright 2018 New Vector Ltd
    
    matrix.org's avatar
    matrix.org committed
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #     http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    # See the License for the specific language governing permissions and
    # limitations under the License.
    
    Amber Brown's avatar
    Amber Brown committed
    import logging
    
        Dict,
        List,
        Mapping,
        Optional,
        Sequence,
        Tuple,
        Union,
    )
    
    import treq
    
    from canonicaljson import encode_canonical_json
    
    from netaddr import AddrFormatError, IPAddress, IPSet
    
    Amber Brown's avatar
    Amber Brown committed
    from prometheus_client import Counter
    
    from typing_extensions import Protocol
    
    from zope.interface import implementer, provider
    
    Amber Brown's avatar
    Amber Brown committed
    from OpenSSL import SSL
    from OpenSSL.SSL import VERIFY_NONE
    
    from twisted.internet import defer, error as twisted_error, protocol, ssl
    
    from twisted.internet.address import IPv4Address, IPv6Address
    
    from twisted.internet.interfaces import (
    
        IReactorPluggableNameResolver,
    
        IResolutionReceiver,
    
    from twisted.internet.protocol import connectionDone
    
    from twisted.internet.task import Cooperator
    
    from twisted.python.failure import Failure
    from twisted.web._newclient import ResponseDone
    
    from twisted.web.client import (
        Agent,
        HTTPConnectionPool,
        ResponseNeverReceived,
        readBody,
    )
    
    from twisted.web.http import PotentialDataLoss
    
    matrix.org's avatar
    matrix.org committed
    from twisted.web.http_headers import Headers
    
    from twisted.web.iweb import (
        UNKNOWN_LENGTH,
        IAgent,
        IBodyProducer,
        IPolicyForHTTPS,
        IResponse,
    )
    
    from synapse.api.errors import Codes, HttpResponseException, SynapseError
    
    from synapse.http import QuieterFileBodyProducer, RequestTimedOutError, redact_uri
    
    from synapse.http.proxyagent import ProxyAgent
    
    from synapse.http.types import QueryParams
    
    from synapse.logging.context import make_deferred_yieldable
    
    from synapse.logging.opentracing import set_tag, start_active_span, tags
    
    from synapse.util import json_decoder
    
    from synapse.util.async_helpers import timeout_deferred
    
        from synapse.server import HomeServer
    
    matrix.org's avatar
    matrix.org committed
    logger = logging.getLogger(__name__)
    
    
    Amber Brown's avatar
    Amber Brown committed
    outgoing_requests_counter = Counter("synapse_http_client_requests", "", ["method"])
    
    incoming_responses_counter = Counter(
        "synapse_http_client_responses", "", ["method", "code"]
    )
    
    
    # the type of the headers list, to be passed to the t.w.h.Headers.
    # Actually we can mix str and bytes keys, but Mapping treats 'key' as invariant so
    # we simplify.
    RawHeaders = Union[Mapping[str, "RawHeaderValue"], Mapping[bytes, "RawHeaderValue"]]
    
    # the value actually has to be a List, but List is invariant so we can't specify that
    # the entries can either be Lists or bytes.
    RawHeaderValue = Sequence[Union[str, bytes]]
    
    
    def check_against_blacklist(
        ip_address: IPAddress, ip_whitelist: Optional[IPSet], ip_blacklist: IPSet
    ) -> bool:
    
        Compares an IP address to allowed and disallowed IP sets.
    
    
            ip_address: The IP address to check
            ip_whitelist: Allowed IP addresses.
            ip_blacklist: Disallowed IP addresses.
    
        Returns:
            True if the IP address is in the blacklist and not in the whitelist.
    
        """
        if ip_address in ip_blacklist:
            if ip_whitelist is None or ip_address not in ip_whitelist:
                return True
        return False
    
    
    
    def _make_scheduler(
        reactor: IReactorTime,
    ) -> Callable[[Callable[[], object]], IDelayedCall]:
    
        """Makes a schedular suitable for a Cooperator using the given reactor.
    
        (This is effectively just a copy from `twisted.internet.task`)
        """
    
    
        def _scheduler(x: Callable[[], object]) -> IDelayedCall:
    
            return reactor.callLater(_EPSILON, x)
    
        return _scheduler
    
    
    
        """
        A proxy for reactor.nameResolver which only produces non-blacklisted IP
        addresses, preventing DNS rebinding attacks on URL preview.
        """
    
    
        def __init__(
            self,
            reactor: IReactorPluggableNameResolver,
            ip_whitelist: Optional[IPSet],
            ip_blacklist: IPSet,
        ):
    
                reactor: The twisted reactor.
                ip_whitelist: IP addresses to allow.
                ip_blacklist: IP addresses to disallow.
    
            """
            self._reactor = reactor
            self._ip_whitelist = ip_whitelist
            self._ip_blacklist = ip_blacklist
    
    
        def resolveHostName(
            self, recv: IResolutionReceiver, hostname: str, portNumber: int = 0
        ) -> IResolutionReceiver:
    
            def _callback() -> None:
    
                has_bad_ip = False
    
                for address in addresses:
                    # We only expect IPv4 and IPv6 addresses since only A/AAAA lookups
                    # should go through this path.
                    if not isinstance(address, (IPv4Address, IPv6Address)):
                        continue
    
                    ip_address = IPAddress(address.host)
    
    
                    if check_against_blacklist(
                        ip_address, self._ip_whitelist, self._ip_blacklist
                    ):
                        logger.info(
    
    Amber Brown's avatar
    Amber Brown committed
                            "Dropped %s from DNS resolution to %s due to blacklist"
                            % (ip_address, hostname)
    
                        has_bad_ip = True
    
                # if we have a blacklisted IP, we'd like to raise an error to block the
                # request, but all we can really do from here is claim that there were no
                # valid results.
                if not has_bad_ip:
    
                    for address in addresses:
                        recv.addressResolved(address)
                recv.resolutionComplete()
    
            @provider(IResolutionReceiver)
    
            class EndpointReceiver:
    
                @staticmethod
    
                def resolutionBegan(resolutionInProgress: IHostResolution) -> None:
    
                    recv.resolutionBegan(resolutionInProgress)
    
                def addressResolved(address: IAddress) -> None:
    
                    addresses.append(address)
    
                @staticmethod
    
                def resolutionComplete() -> None:
    
    
            self._reactor.nameResolver.resolveHostName(
                EndpointReceiver, hostname, portNumber=portNumber
            )
    
    
    class BlacklistingReactorWrapper:
        """
        A Reactor wrapper which will prevent DNS resolution to blacklisted IP
        addresses, to prevent DNS rebinding.
        """
    
        def __init__(
            self,
            reactor: IReactorPluggableNameResolver,
            ip_whitelist: Optional[IPSet],
            ip_blacklist: IPSet,
        ):
            self._reactor = reactor
    
            # We need to use a DNS resolver which filters out blacklisted IP
            # addresses, to prevent DNS rebinding.
            self._nameResolver = _IPBlacklistingResolver(
                self._reactor, ip_whitelist, ip_blacklist
            )
    
        def __getattr__(self, attr: str) -> Any:
            # Passthrough to the real reactor except for the DNS resolver.
            if attr == "nameResolver":
                return self._nameResolver
            else:
                return getattr(self._reactor, attr)
    
    
    
    class BlacklistingAgentWrapper(Agent):
        """
        An Agent wrapper which will prevent access to IP addresses being accessed
        directly (without an IP address lookup).
        """
    
    
        def __init__(
            self,
            agent: IAgent,
            ip_whitelist: Optional[IPSet] = None,
            ip_blacklist: Optional[IPSet] = None,
        ):
    
                agent: The Agent to wrap.
                ip_whitelist: IP addresses to allow.
                ip_blacklist: IP addresses to disallow.
    
            """
            self._agent = agent
            self._ip_whitelist = ip_whitelist
            self._ip_blacklist = ip_blacklist
    
    
        def request(
            self,
            method: bytes,
            uri: bytes,
            headers: Optional[Headers] = None,
            bodyProducer: Optional[IBodyProducer] = None,
        ) -> defer.Deferred:
    
    Amber Brown's avatar
    Amber Brown committed
            h = urllib.parse.urlparse(uri.decode("ascii"))
    
    
            try:
                ip_address = IPAddress(h.hostname)
    
            except AddrFormatError:
                # Not an IP
                pass
            else:
    
                if check_against_blacklist(
                    ip_address, self._ip_whitelist, self._ip_blacklist
                ):
    
    Amber Brown's avatar
    Amber Brown committed
                    logger.info("Blocking access to %s due to blacklist" % (ip_address,))
    
                    e = SynapseError(
                        HTTPStatus.FORBIDDEN, "IP address blocked by IP blacklist entry"
                    )
    
                    return defer.fail(Failure(e))
    
            return self._agent.request(
                method, uri, headers=headers, bodyProducer=bodyProducer
            )
    
    class SimpleHttpClient:
    
        A simple, no-frills HTTP client with methods that wrap up common ways of
        using HTTP in Matrix
    
            treq_args: Optional[Dict[str, Any]] = None,
    
            ip_whitelist: Optional[IPSet] = None,
            ip_blacklist: Optional[IPSet] = None,
    
                hs
                treq_args: Extra keyword arguments to be given to treq.request.
                ip_blacklist: The IP addresses that are blacklisted that
    
                    we may not request.
    
                ip_whitelist: The whitelisted IP addresses, that we can
    
                   request if it were otherwise caught in a blacklist.
    
                use_proxy: Whether proxy settings should be discovered and used
                    from conventional environment variables.
    
            self._ip_whitelist = ip_whitelist
            self._ip_blacklist = ip_blacklist
    
            self._extra_treq_args = treq_args or {}
    
            self.clock = hs.get_clock()
    
    
            user_agent = hs.version_string
    
            if hs.config.server.user_agent_suffix:
    
                user_agent = "%s %s" % (
                    user_agent,
    
            self.user_agent = user_agent.encode("ascii")
    
            # We use this for our body producers to ensure that they use the correct
            # reactor.
            self._cooperator = Cooperator(scheduler=_make_scheduler(hs.get_reactor()))
    
    
            if self._ip_blacklist:
                # If we have an IP blacklist, we need to use a DNS resolver which
                # filters out blacklisted IP addresses, to prevent DNS rebinding.
    
                self.reactor: ISynapseReactor = BlacklistingReactorWrapper(
    
                    hs.get_reactor(), self._ip_whitelist, self._ip_blacklist
    
            else:
                self.reactor = hs.get_reactor()
    
    
            # the pusher makes lots of concurrent SSL connections to sygnal, and
    
            # tends to do so in batches, so we need to allow the pool to keep
            # lots of idle connections around.
            pool = HTTPConnectionPool(self.reactor)
    
            # XXX: The justification for using the cache factor here is that larger instances
            # will need both more cache and more connections.
            # Still, this should probably be a separate dial
    
            pool.maxPersistentPerHost = max(int(100 * hs.config.caches.global_factor), 5)
    
            pool.cachedConnectionTimeout = 2 * 60
    
    
                self.reactor,
    
                contextFactory=self.hs.get_http_client_context_factory(),
    
            if self._ip_blacklist:
                # If we have an IP blacklist, we then install the blacklisting Agent
                # which prevents direct access to IP addresses, that are not caught
                # by the DNS resolution.
                self.agent = BlacklistingAgentWrapper(
                    self.agent,
                    ip_whitelist=self._ip_whitelist,
                    ip_blacklist=self._ip_blacklist,
                )
    
        async def request(
            self,
            method: str,
            uri: str,
            data: Optional[bytes] = None,
            headers: Optional[Headers] = None,
        ) -> IResponse:
    
                method: HTTP method to use.
                uri: URI to query.
                data: Data to send in the request body, if applicable.
                headers: Request headers.
    
            Returns:
                Response object, once the headers have been read.
    
            Raises:
                RequestTimedOutError if the request times out before the headers are read
    
    
    Amber Brown's avatar
    Amber Brown committed
            outgoing_requests_counter.labels(method).inc()
    
            # log request but strip `access_token` (AS requests for example include this)
    
            logger.debug("Sending request %s %s", method, redact_uri(uri))
    
            with start_active_span(
                "outgoing-client-request",
                tags={
                    tags.SPAN_KIND: tags.SPAN_KIND_RPC_CLIENT,
                    tags.HTTP_METHOD: method,
                    tags.HTTP_URL: uri,
                },
                finish_on_close=True,
            ):
                try:
                    body_producer = None
                    if data is not None:
    
                        body_producer = QuieterFileBodyProducer(
    
                            BytesIO(data),
                            cooperator=self._cooperator,
    
                    request_deferred: defer.Deferred = treq.request(
    
                        method,
                        uri,
                        agent=self.agent,
                        data=body_producer,
                        headers=headers,
    
                        # Avoid buffering the body in treq since we do not reuse
                        # response bodies.
                        unbuffered=True,
    
                        **self._extra_treq_args,
    
                    # we use our own timeout mechanism rather than treq's as a workaround
                    # for https://twistedmatrix.com/trac/ticket/9534.
    
                        request_deferred,
                        60,
                        self.hs.get_reactor(),
    
    
                    # turn timeouts into RequestTimedOutErrors
                    request_deferred.addErrback(_timeout_to_request_timed_out_error)
    
    
                    response = await make_deferred_yieldable(request_deferred)
    
    
                    incoming_responses_counter.labels(method, response.code).inc()
                    logger.info(
                        "Received response to %s %s: %s",
                        method,
                        redact_uri(uri),
                        response.code,
                    )
                    return response
                except Exception as e:
                    incoming_responses_counter.labels(method, "ERR").inc()
                    logger.info(
                        "Error sending request to  %s %s: %s %s",
                        method,
                        redact_uri(uri),
                        type(e).__name__,
                        e.args[0],
                    )
                    set_tag(tags.ERROR, True)
                    set_tag("error_reason", e.args[0])
                    raise
    
        async def post_urlencoded_get_json(
            self,
            uri: str,
    
            args: Optional[Mapping[str, Union[str, List[str]]]] = None,
    
            headers: Optional[RawHeaders] = None,
        ) -> Any:
    
                uri: uri to query
                args: parameters to be url-encoded in the body
                headers: a map from header name to a list of values for that header
    
                RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
    
                HttpResponseException: On a non-2xx HTTP response.
    
                ValueError: if the response was not JSON
    
            # TODO: Do we ever want to log message contents?
    
            logger.debug("post_urlencoded_get_json args: %s", args)
    
            query_bytes = encode_query_args(args)
    
            actual_headers = {
                b"Content-Type": [b"application/x-www-form-urlencoded"],
                b"User-Agent": [self.user_agent],
    
                b"Accept": [b"application/json"],
    
                actual_headers.update(headers)  # type: ignore
    
            response = await self.request(
    
                "POST", uri, headers=Headers(actual_headers), data=query_bytes
    
            body = await make_deferred_yieldable(readBody(response))
    
            if 200 <= response.code < 300:
    
                return json_decoder.decode(body.decode("utf-8"))
    
                raise HttpResponseException(
                    response.code, response.phrase.decode("ascii", errors="replace"), body
                )
    
        async def post_json_get_json(
            self, uri: str, post_json: Any, headers: Optional[RawHeaders] = None
        ) -> Any:
    
                uri: URI to query.
                post_json: request body, to be encoded as json
                headers: a map from header name to a list of values for that header
    
                RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
    
                HttpResponseException: On a non-2xx HTTP response.
    
                ValueError: if the response was not JSON
    
            json_str = encode_canonical_json(post_json)
    
            logger.debug("HTTP POST %s -> %s", json_str, uri)
    
            actual_headers = {
                b"Content-Type": [b"application/json"],
                b"User-Agent": [self.user_agent],
    
                b"Accept": [b"application/json"],
    
                actual_headers.update(headers)  # type: ignore
    
            response = await self.request(
    
                "POST", uri, headers=Headers(actual_headers), data=json_str
    
            body = await make_deferred_yieldable(readBody(response))
    
            if 200 <= response.code < 300:
    
                return json_decoder.decode(body.decode("utf-8"))
    
                raise HttpResponseException(
                    response.code, response.phrase.decode("ascii", errors="replace"), body
                )
    
            self,
            uri: str,
            args: Optional[QueryParams] = None,
            headers: Optional[RawHeaders] = None,
    
        ) -> Any:
            """Gets some json from the given URI.
    
                uri: The URI to request, not including query parameters
                args: A dictionary used to create query string
                headers: a map from header name to a list of values for that header
    
                Succeeds when we get a 2xx HTTP response, with the HTTP body as JSON.
    
                RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
    
                HttpResponseException On a non-2xx HTTP response.
    
                ValueError: if the response was not JSON
    
            actual_headers = {b"Accept": [b"application/json"]}
            if headers:
    
                actual_headers.update(headers)  # type: ignore
    
            body = await self.get_raw(uri, args, headers=actual_headers)
    
            return json_decoder.decode(body.decode("utf-8"))
    
        async def put_json(
            self,
            uri: str,
            json_body: Any,
    
            args: Optional[QueryParams] = None,
    
            headers: Optional[RawHeaders] = None,
    
        ) -> Any:
            """Puts some json to the given URI.
    
                uri: The URI to request, not including query parameters
                json_body: The JSON to put in the HTTP body,
                args: A dictionary used to create query strings
                headers: a map from header name to a list of values for that header
    
                Succeeds when we get a 2xx HTTP response, with the HTTP body as JSON.
    
                 RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
    
                HttpResponseException On a non-2xx HTTP response.
    
                ValueError: if the response was not JSON
    
            if args:
                query_str = urllib.parse.urlencode(args, True)
                uri = "%s?%s" % (uri, query_str)
    
            actual_headers = {
                b"Content-Type": [b"application/json"],
                b"User-Agent": [self.user_agent],
    
                b"Accept": [b"application/json"],
    
                actual_headers.update(headers)  # type: ignore
    
            response = await self.request(
    
                "PUT", uri, headers=Headers(actual_headers), data=json_str
    
            body = await make_deferred_yieldable(readBody(response))
    
            if 200 <= response.code < 300:
    
                return json_decoder.decode(body.decode("utf-8"))
    
                raise HttpResponseException(
                    response.code, response.phrase.decode("ascii", errors="replace"), body
                )
    
            self,
            uri: str,
            args: Optional[QueryParams] = None,
            headers: Optional[RawHeaders] = None,
    
        ) -> bytes:
            """Gets raw text from the given URI.
    
                uri: The URI to request, not including query parameters
                args: A dictionary used to create query strings
                headers: a map from header name to a list of values for that header
    
                Succeeds when we get a 2xx HTTP response, with the
    
                RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
    
                HttpResponseException on a non-2xx HTTP response.
    
            if args:
                query_str = urllib.parse.urlencode(args, True)
                uri = "%s?%s" % (uri, query_str)
    
            actual_headers = {b"User-Agent": [self.user_agent]}
    
                actual_headers.update(headers)  # type: ignore
    
            response = await self.request("GET", uri, headers=Headers(actual_headers))
    
            body = await make_deferred_yieldable(readBody(response))
    
                raise HttpResponseException(
                    response.code, response.phrase.decode("ascii", errors="replace"), body
                )
    
        # XXX: FIXME: This is horribly copy-pasted from matrixfederationclient.
        # The two should be factored out.
    
    
        async def get_file(
            self,
            url: str,
            output_stream: BinaryIO,
            max_size: Optional[int] = None,
            headers: Optional[RawHeaders] = None,
    
            is_allowed_content_type: Optional[Callable[[str], bool]] = None,
    
        ) -> Tuple[int, Dict[bytes, List[bytes]], str, int]:
    
                url: The URL to GET
                output_stream: File to write the response body to.
                headers: A map from header name to a list of values for that header
    
                is_allowed_content_type: A predicate to determine whether the
                    content type of the file we're downloading is allowed. If set and
                    it evaluates to False when called with the content type, the
                    request will be terminated before completing the download by
                    raising SynapseError.
    
                A tuple of the file length, dict of the response
    
                headers, absolute URI of the response and HTTP response code.
    
                RequestTimedOutError: if there is a timeout before the response headers
    
                   are received. Note there is currently no timeout on reading the response
                   body.
    
                SynapseError: if the response is not a 2xx, the remote file is too large, or
                   another exception happens during the download.
    
            actual_headers = {b"User-Agent": [self.user_agent]}
    
                actual_headers.update(headers)  # type: ignore
    
            response = await self.request("GET", url, headers=Headers(actual_headers))
    
            resp_headers = dict(response.headers.getAllRawHeaders())
    
                logger.warning("Got %d when downloading %s" % (response.code, url))
    
                raise SynapseError(
                    HTTPStatus.BAD_GATEWAY, "Got error %d" % (response.code,), Codes.UNKNOWN
                )
    
            if is_allowed_content_type and b"Content-Type" in resp_headers:
                content_type = resp_headers[b"Content-Type"][0].decode("ascii")
                if not is_allowed_content_type(content_type):
                    raise SynapseError(
                        HTTPStatus.BAD_GATEWAY,
                        (
                            "Requested file's content type not allowed for this operation: %s"
                            % content_type
                        ),
                    )
    
    
            # TODO: if our Content-Type is HTML or something, just read the first
            # N bytes into RAM rather than saving it all to disk only to read it
            # straight back in again
    
            try:
    
                d = read_body_with_max_size(response, output_stream, max_size)
    
                # Ensure that the body is not read forever.
                d = timeout_deferred(d, 30, self.hs.get_reactor())
    
                length = await make_deferred_yieldable(d)
    
            except BodyExceededMaxSize:
    
                    "Requested file is too large > %r bytes" % (max_size,),
                    Codes.TOO_LARGE,
    
            except defer.TimeoutError:
                raise SynapseError(
                    HTTPStatus.BAD_GATEWAY,
                    "Requested file took too long to download",
                    Codes.TOO_LARGE,
                )
    
            except Exception as e:
    
                raise SynapseError(
                    HTTPStatus.BAD_GATEWAY, ("Failed to download remote body: %s" % e)
                ) from e
    
            return (
                length,
                resp_headers,
                response.request.absoluteURI.decode("ascii"),
                response.code,
    
    def _timeout_to_request_timed_out_error(f: Failure) -> Failure:
    
        if f.check(twisted_error.TimeoutError, twisted_error.ConnectingCancelledError):
            # The TCP connection has its own timeout (set by the 'connectTimeout' param
            # on the Agent), which raises twisted_error.TimeoutError exception.
            raise RequestTimedOutError("Timeout connecting to remote server")
        elif f.check(defer.TimeoutError, ResponseNeverReceived):
            # this one means that we hit our overall timeout on the request
            raise RequestTimedOutError("Timeout waiting for response from remote server")
    
        return f
    
    
    
    class ByteWriteable(Protocol):
        """The type of object which must be passed into read_body_with_max_size.
    
        Typically this is a file object.
        """
    
        def write(self, data: bytes) -> int:
            pass
    
    
    
    class BodyExceededMaxSize(Exception):
        """The maximum allowed size of the HTTP body was exceeded."""
    
    
    
    class _DiscardBodyWithMaxSizeProtocol(protocol.Protocol):
        """A protocol which immediately errors upon receiving data."""
    
    
        transport: Optional[ITCPTransport] = None
    
        def __init__(self, deferred: defer.Deferred):
            self.deferred = deferred
    
    
        def _maybe_fail(self) -> None:
    
            """
            Report a max size exceed error and disconnect the first time this is called.
            """
            if not self.deferred.called:
                self.deferred.errback(BodyExceededMaxSize())
                # Close the connection (forcefully) since all the data will get
                # discarded anyway.
    
                assert self.transport is not None
    
                self.transport.abortConnection()
    
        def dataReceived(self, data: bytes) -> None:
            self._maybe_fail()
    
    
        def connectionLost(self, reason: Failure = connectionDone) -> None:
    
    class _ReadBodyWithMaxSizeProtocol(protocol.Protocol):
    
        """A protocol which reads body to a stream, erroring if the body exceeds a maximum size."""
    
    
        transport: Optional[ITCPTransport] = None
    
            self, stream: ByteWriteable, deferred: defer.Deferred, max_size: Optional[int]
    
            self.stream = stream
            self.deferred = deferred
            self.length = 0
            self.max_size = max_size
    
    
        def dataReceived(self, data: bytes) -> None:
    
            # If the deferred was called, bail early.
            if self.deferred.called:
                return
    
    
            try:
                self.stream.write(data)
            except Exception:
                self.deferred.errback()
                return
    
    
            # The first time the maximum size is exceeded, error and cancel the
            # connection. dataReceived might be called again if data was received
            # in the meantime.
    
            if self.max_size is not None and self.length >= self.max_size:
    
                self.deferred.errback(BodyExceededMaxSize())
    
                # Close the connection (forcefully) since all the data will get
                # discarded anyway.
    
                assert self.transport is not None
    
                self.transport.abortConnection()
    
        def connectionLost(self, reason: Failure = connectionDone) -> None:
    
            # If the maximum size was already exceeded, there's nothing to do.
            if self.deferred.called:
                return
    
    
            if reason.check(ResponseDone):
                self.deferred.callback(self.length)
    
            elif reason.check(PotentialDataLoss):
                # stolen from https://github.com/twisted/treq/pull/49/files
                # http://twistedmatrix.com/trac/ticket/4840
                self.deferred.callback(self.length)
    
    def read_body_with_max_size(
    
        response: IResponse, stream: ByteWriteable, max_size: Optional[int]
    
    ) -> "defer.Deferred[int]":
    
        """
        Read a HTTP response body to a file-object. Optionally enforcing a maximum file size.
    
        If the maximum file size is reached, the returned Deferred will resolve to a
        Failure with a BodyExceededMaxSize exception.
    
    
        Args:
            response: The HTTP response to read from.
            stream: The file-object to write to.
            max_size: The maximum file size to allow.
    
        Returns:
            A Deferred which resolves to the length of the read body.
        """
    
        d: "defer.Deferred[int]" = defer.Deferred()
    
        # If the Content-Length header gives a size larger than the maximum allowed
        # size, do not bother downloading the body.
        if max_size is not None and response.length != UNKNOWN_LENGTH:
            if response.length > max_size:
    
                response.deliverBody(_DiscardBodyWithMaxSizeProtocol(d))
                return d
    
        response.deliverBody(_ReadBodyWithMaxSizeProtocol(stream, d, max_size))
    
    Matthew Hodgson's avatar
    Matthew Hodgson committed
    
    
    def encode_query_args(args: Optional[QueryParams]) -> bytes:
    
        """
        Encodes a map of query arguments to bytes which can be appended to a URL.
    
    David Baker's avatar
    David Baker committed
    
    
        Args:
            args: The query arguments, a mapping of string to string or list of strings.
    
        Returns:
            The query arguments encoded as bytes.
        """
        if args is None:
            return b""
    
        query_str = urllib.parse.urlencode(args, True)
    
    David Baker's avatar
    David Baker committed
    
    
        return query_str.encode("utf8")
    
    @implementer(IPolicyForHTTPS)
    
    class InsecureInterceptableContextFactory(ssl.ContextFactory):
    
        Factory for PyOpenSSL SSL contexts which accepts any certificate for any domain.
    
        Do not use this since it allows an attacker to intercept your communications.
    
        def __init__(self) -> None:
    
            self._context = SSL.Context(SSL.SSLv23_METHOD)
    
            self._context.set_verify(VERIFY_NONE, lambda *_: False)
    
        def getContext(self, hostname=None, port=None):
    
        def creatorForNetloc(self, hostname: bytes, port: int):