Show More
@@ -1,665 +1,698 | |||
|
1 | 1 | # Copyright 2010, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | 29 | """Improved HTTP/1.1 client library |
|
30 | 30 | |
|
31 | 31 | This library contains an HTTPConnection which is similar to the one in |
|
32 | 32 | httplib, but has several additional features: |
|
33 | 33 | |
|
34 | 34 | * supports keepalives natively |
|
35 | 35 | * uses select() to block for incoming data |
|
36 | 36 | * notices when the server responds early to a request |
|
37 | 37 | * implements ssl inline instead of in a different class |
|
38 | 38 | """ |
|
39 | 39 | |
|
40 | 40 | import cStringIO |
|
41 | 41 | import errno |
|
42 | 42 | import httplib |
|
43 | 43 | import logging |
|
44 | 44 | import rfc822 |
|
45 | 45 | import select |
|
46 | 46 | import socket |
|
47 | 47 | |
|
48 | 48 | import socketutil |
|
49 | 49 | |
|
50 | 50 | logger = logging.getLogger(__name__) |
|
51 | 51 | |
|
52 | 52 | __all__ = ['HTTPConnection', 'HTTPResponse'] |
|
53 | 53 | |
|
54 | 54 | HTTP_VER_1_0 = 'HTTP/1.0' |
|
55 | 55 | HTTP_VER_1_1 = 'HTTP/1.1' |
|
56 | 56 | |
|
57 | 57 | _LEN_CLOSE_IS_END = -1 |
|
58 | 58 | |
|
59 | 59 | OUTGOING_BUFFER_SIZE = 1 << 15 |
|
60 | 60 | INCOMING_BUFFER_SIZE = 1 << 20 |
|
61 | 61 | |
|
62 | 62 | HDR_ACCEPT_ENCODING = 'accept-encoding' |
|
63 | 63 | HDR_CONNECTION_CTRL = 'connection' |
|
64 | 64 | HDR_CONTENT_LENGTH = 'content-length' |
|
65 | 65 | HDR_XFER_ENCODING = 'transfer-encoding' |
|
66 | 66 | |
|
67 | 67 | XFER_ENCODING_CHUNKED = 'chunked' |
|
68 | 68 | |
|
69 | 69 | CONNECTION_CLOSE = 'close' |
|
70 | 70 | |
|
71 | 71 | EOL = '\r\n' |
|
72 | 72 | _END_HEADERS = EOL * 2 |
|
73 | 73 | |
|
74 | 74 | # Based on some searching around, 1 second seems like a reasonable |
|
75 | 75 | # default here. |
|
76 | 76 | TIMEOUT_ASSUME_CONTINUE = 1 |
|
77 | 77 | TIMEOUT_DEFAULT = None |
|
78 | 78 | |
|
79 | 79 | |
|
80 | 80 | class HTTPResponse(object): |
|
81 | 81 | """Response from an HTTP server. |
|
82 | 82 | |
|
83 | 83 | The response will continue to load as available. If you need the |
|
84 | 84 | complete response before continuing, check the .complete() method. |
|
85 | 85 | """ |
|
86 | 86 | def __init__(self, sock, timeout): |
|
87 | 87 | self.sock = sock |
|
88 | 88 | self.raw_response = '' |
|
89 | 89 | self._body = None |
|
90 | 90 | self._headers_len = 0 |
|
91 | 91 | self._content_len = 0 |
|
92 | 92 | self.headers = None |
|
93 | 93 | self.will_close = False |
|
94 | 94 | self.status_line = '' |
|
95 | 95 | self.status = None |
|
96 | 96 | self.http_version = None |
|
97 | 97 | self.reason = None |
|
98 | 98 | self._chunked = False |
|
99 | 99 | self._chunked_done = False |
|
100 | 100 | self._chunked_until_next = 0 |
|
101 | 101 | self._chunked_skip_bytes = 0 |
|
102 | 102 | self._chunked_preloaded_block = None |
|
103 | 103 | |
|
104 | 104 | self._read_location = 0 |
|
105 | 105 | self._eol = EOL |
|
106 | 106 | |
|
107 | 107 | self._timeout = timeout |
|
108 | 108 | |
|
109 | 109 | @property |
|
110 | 110 | def _end_headers(self): |
|
111 | 111 | return self._eol * 2 |
|
112 | 112 | |
|
113 | 113 | def complete(self): |
|
114 | 114 | """Returns true if this response is completely loaded. |
|
115 | ||
|
116 | Note that if this is a connection where complete means the | |
|
117 | socket is closed, this will nearly always return False, even | |
|
118 | in cases where all the data has actually been loaded. | |
|
115 | 119 | """ |
|
116 | 120 | if self._chunked: |
|
117 | 121 | return self._chunked_done |
|
118 | 122 | if self._content_len == _LEN_CLOSE_IS_END: |
|
119 | 123 | return False |
|
120 | 124 | return self._body is not None and len(self._body) >= self._content_len |
|
121 | 125 | |
|
122 | 126 | def readline(self): |
|
123 | 127 | """Read a single line from the response body. |
|
124 | 128 | |
|
125 | 129 | This may block until either a line ending is found or the |
|
126 | 130 | response is complete. |
|
127 | 131 | """ |
|
128 | 132 | eol = self._body.find('\n', self._read_location) |
|
129 | 133 | while eol == -1 and not self.complete(): |
|
130 | 134 | self._select() |
|
131 | 135 | eol = self._body.find('\n', self._read_location) |
|
132 | 136 | if eol != -1: |
|
133 | 137 | eol += 1 |
|
134 | 138 | else: |
|
135 | 139 | eol = len(self._body) |
|
136 | 140 | data = self._body[self._read_location:eol] |
|
137 | 141 | self._read_location = eol |
|
138 | 142 | return data |
|
139 | 143 | |
|
140 | 144 | def read(self, length=None): |
|
141 | 145 | # if length is None, unbounded read |
|
142 | 146 | while (not self.complete() # never select on a finished read |
|
143 | 147 | and (not length # unbounded, so we wait for complete() |
|
144 | 148 | or (self._read_location + length) > len(self._body))): |
|
145 | 149 | self._select() |
|
146 | 150 | if not length: |
|
147 | 151 | length = len(self._body) - self._read_location |
|
148 | 152 | elif len(self._body) < (self._read_location + length): |
|
149 | 153 | length = len(self._body) - self._read_location |
|
150 | 154 | r = self._body[self._read_location:self._read_location + length] |
|
151 | 155 | self._read_location += len(r) |
|
152 | 156 | if self.complete() and self.will_close: |
|
153 | 157 | self.sock.close() |
|
154 | 158 | return r |
|
155 | 159 | |
|
156 | 160 | def _select(self): |
|
157 | 161 | r, _, _ = select.select([self.sock], [], [], self._timeout) |
|
158 | 162 | if not r: |
|
159 | 163 | # socket was not readable. If the response is not complete |
|
160 | 164 | # and we're not a _LEN_CLOSE_IS_END response, raise a timeout. |
|
161 | 165 | # If we are a _LEN_CLOSE_IS_END response and we have no data, |
|
162 | 166 | # raise a timeout. |
|
163 | 167 | if not (self.complete() or |
|
164 | 168 | (self._content_len == _LEN_CLOSE_IS_END and self._body)): |
|
165 | 169 | logger.info('timed out with timeout of %s', self._timeout) |
|
166 | 170 | raise HTTPTimeoutException('timeout reading data') |
|
167 | 171 | logger.info('cl: %r body: %r', self._content_len, self._body) |
|
168 | 172 | try: |
|
169 | 173 | data = self.sock.recv(INCOMING_BUFFER_SIZE) |
|
170 | 174 | except socket.sslerror, e: |
|
171 | 175 | if e.args[0] != socket.SSL_ERROR_WANT_READ: |
|
172 | 176 | raise |
|
173 | 177 | logger.debug('SSL_WANT_READ in _select, should retry later') |
|
174 | 178 | return True |
|
175 | 179 | logger.debug('response read %d data during _select', len(data)) |
|
176 | 180 | if not data: |
|
177 | if not self.headers: | |
|
178 | self._load_response(self._end_headers) | |
|
179 | self._content_len = 0 | |
|
180 | elif self._content_len == _LEN_CLOSE_IS_END: | |
|
181 | if self.headers and self._content_len == _LEN_CLOSE_IS_END: | |
|
181 | 182 | self._content_len = len(self._body) |
|
182 | 183 | return False |
|
183 | 184 | else: |
|
184 | 185 | self._load_response(data) |
|
185 | 186 | return True |
|
186 | 187 | |
|
187 | 188 | def _chunked_parsedata(self, data): |
|
188 | 189 | if self._chunked_preloaded_block: |
|
189 | 190 | data = self._chunked_preloaded_block + data |
|
190 | 191 | self._chunked_preloaded_block = None |
|
191 | 192 | while data: |
|
192 | 193 | logger.debug('looping with %d data remaining', len(data)) |
|
193 | 194 | # Slice out anything we should skip |
|
194 | 195 | if self._chunked_skip_bytes: |
|
195 | 196 | if len(data) <= self._chunked_skip_bytes: |
|
196 | 197 | self._chunked_skip_bytes -= len(data) |
|
197 | 198 | data = '' |
|
198 | 199 | break |
|
199 | 200 | else: |
|
200 | 201 | data = data[self._chunked_skip_bytes:] |
|
201 | 202 | self._chunked_skip_bytes = 0 |
|
202 | 203 | |
|
203 | 204 | # determine how much is until the next chunk |
|
204 | 205 | if self._chunked_until_next: |
|
205 | 206 | amt = self._chunked_until_next |
|
206 | 207 | logger.debug('reading remaining %d of existing chunk', amt) |
|
207 | 208 | self._chunked_until_next = 0 |
|
208 | 209 | body = data |
|
209 | 210 | else: |
|
210 | 211 | try: |
|
211 | 212 | amt, body = data.split(self._eol, 1) |
|
212 | 213 | except ValueError: |
|
213 | 214 | self._chunked_preloaded_block = data |
|
214 | 215 | logger.debug('saving %r as a preloaded block for chunked', |
|
215 | 216 | self._chunked_preloaded_block) |
|
216 | 217 | return |
|
217 | 218 | amt = int(amt, base=16) |
|
218 | 219 | logger.debug('reading chunk of length %d', amt) |
|
219 | 220 | if amt == 0: |
|
220 | 221 | self._chunked_done = True |
|
221 | 222 | |
|
222 | 223 | # read through end of what we have or the chunk |
|
223 | 224 | self._body += body[:amt] |
|
224 | 225 | if len(body) >= amt: |
|
225 | 226 | data = body[amt:] |
|
226 | 227 | self._chunked_skip_bytes = len(self._eol) |
|
227 | 228 | else: |
|
228 | 229 | self._chunked_until_next = amt - len(body) |
|
229 | 230 | self._chunked_skip_bytes = 0 |
|
230 | 231 | data = '' |
|
231 | 232 | |
|
232 | 233 | def _load_response(self, data): |
|
233 | 234 | if self._chunked: |
|
234 | 235 | self._chunked_parsedata(data) |
|
235 | 236 | return |
|
236 | 237 | elif self._body is not None: |
|
237 | 238 | self._body += data |
|
238 | 239 | return |
|
239 | 240 | |
|
240 | 241 | # We haven't seen end of headers yet |
|
241 | 242 | self.raw_response += data |
|
242 | 243 | # This is a bogus server with bad line endings |
|
243 | 244 | if self._eol not in self.raw_response: |
|
244 | 245 | for bad_eol in ('\n', '\r'): |
|
245 | 246 | if (bad_eol in self.raw_response |
|
246 | 247 | # verify that bad_eol is not the end of the incoming data |
|
247 | 248 | # as this could be a response line that just got |
|
248 | 249 | # split between \r and \n. |
|
249 | 250 | and (self.raw_response.index(bad_eol) < |
|
250 | 251 | (len(self.raw_response) - 1))): |
|
251 | 252 | logger.info('bogus line endings detected, ' |
|
252 | 253 | 'using %r for EOL', bad_eol) |
|
253 | 254 | self._eol = bad_eol |
|
254 | 255 | break |
|
255 | 256 | # exit early if not at end of headers |
|
256 | 257 | if self._end_headers not in self.raw_response or self.headers: |
|
257 | 258 | return |
|
258 | 259 | |
|
259 | 260 | # handle 100-continue response |
|
260 | 261 | hdrs, body = self.raw_response.split(self._end_headers, 1) |
|
261 | 262 | http_ver, status = hdrs.split(' ', 1) |
|
262 | 263 | if status.startswith('100'): |
|
263 | 264 | self.raw_response = body |
|
264 | 265 | logger.debug('continue seen, setting body to %r', body) |
|
265 | 266 | return |
|
266 | 267 | |
|
267 | 268 | # arriving here means we should parse response headers |
|
268 | 269 | # as all headers have arrived completely |
|
269 | 270 | hdrs, body = self.raw_response.split(self._end_headers, 1) |
|
270 | 271 | del self.raw_response |
|
271 | 272 | if self._eol in hdrs: |
|
272 | 273 | self.status_line, hdrs = hdrs.split(self._eol, 1) |
|
273 | 274 | else: |
|
274 | 275 | self.status_line = hdrs |
|
275 | 276 | hdrs = '' |
|
276 | 277 | # TODO HTTP < 1.0 support |
|
277 | 278 | (self.http_version, self.status, |
|
278 | 279 | self.reason) = self.status_line.split(' ', 2) |
|
279 | 280 | self.status = int(self.status) |
|
280 | 281 | if self._eol != EOL: |
|
281 | 282 | hdrs = hdrs.replace(self._eol, '\r\n') |
|
282 | 283 | headers = rfc822.Message(cStringIO.StringIO(hdrs)) |
|
283 | 284 | if HDR_CONTENT_LENGTH in headers: |
|
284 | 285 | self._content_len = int(headers[HDR_CONTENT_LENGTH]) |
|
285 | 286 | if self.http_version == HTTP_VER_1_0: |
|
286 | 287 | self.will_close = True |
|
287 | 288 | elif HDR_CONNECTION_CTRL in headers: |
|
288 | 289 | self.will_close = ( |
|
289 | 290 | headers[HDR_CONNECTION_CTRL].lower() == CONNECTION_CLOSE) |
|
290 | 291 | if self._content_len == 0: |
|
291 | 292 | self._content_len = _LEN_CLOSE_IS_END |
|
292 | 293 | if (HDR_XFER_ENCODING in headers |
|
293 | 294 | and headers[HDR_XFER_ENCODING].lower() == XFER_ENCODING_CHUNKED): |
|
294 | 295 | self._body = '' |
|
295 | 296 | self._chunked_parsedata(body) |
|
296 | 297 | self._chunked = True |
|
297 | 298 | if self._body is None: |
|
298 | 299 | self._body = body |
|
299 | 300 | self.headers = headers |
|
300 | 301 | |
|
301 | 302 | |
|
302 | 303 | class HTTPConnection(object): |
|
303 | 304 | """Connection to a single http server. |
|
304 | 305 | |
|
305 | 306 | Supports 100-continue and keepalives natively. Uses select() for |
|
306 | 307 | non-blocking socket operations. |
|
307 | 308 | """ |
|
308 | 309 | http_version = HTTP_VER_1_1 |
|
309 | 310 | response_class = HTTPResponse |
|
310 | 311 | |
|
311 | 312 | def __init__(self, host, port=None, use_ssl=None, ssl_validator=None, |
|
312 | 313 | timeout=TIMEOUT_DEFAULT, |
|
313 | 314 | continue_timeout=TIMEOUT_ASSUME_CONTINUE, |
|
314 | 315 | proxy_hostport=None, **ssl_opts): |
|
315 | 316 | """Create a new HTTPConnection. |
|
316 | 317 | |
|
317 | 318 | Args: |
|
318 | 319 | host: The host to which we'll connect. |
|
319 | 320 | port: Optional. The port over which we'll connect. Default 80 for |
|
320 | 321 | non-ssl, 443 for ssl. |
|
321 | 322 | use_ssl: Optional. Wether to use ssl. Defaults to False if port is |
|
322 | 323 | not 443, true if port is 443. |
|
323 | 324 | ssl_validator: a function(socket) to validate the ssl cert |
|
324 | 325 | timeout: Optional. Connection timeout, default is TIMEOUT_DEFAULT. |
|
325 | 326 | continue_timeout: Optional. Timeout for waiting on an expected |
|
326 | 327 | "100 Continue" response. Default is TIMEOUT_ASSUME_CONTINUE. |
|
327 | 328 | proxy_hostport: Optional. Tuple of (host, port) to use as an http |
|
328 | 329 | proxy for the connection. Default is to not use a proxy. |
|
329 | 330 | """ |
|
330 | 331 | if port is None and host.count(':') == 1 or ']:' in host: |
|
331 | 332 | host, port = host.rsplit(':', 1) |
|
332 | 333 | port = int(port) |
|
333 | 334 | if '[' in host: |
|
334 | 335 | host = host[1:-1] |
|
335 | 336 | if use_ssl is None and port is None: |
|
336 | 337 | use_ssl = False |
|
337 | 338 | port = 80 |
|
338 | 339 | elif use_ssl is None: |
|
339 | 340 | use_ssl = (port == 443) |
|
340 | 341 | elif port is None: |
|
341 | 342 | port = (use_ssl and 443 or 80) |
|
342 | 343 | self.port = port |
|
343 | 344 | if use_ssl and not socketutil.have_ssl: |
|
344 | 345 | raise Exception('ssl requested but unavailable on this Python') |
|
345 | 346 | self.ssl = use_ssl |
|
346 | 347 | self.ssl_opts = ssl_opts |
|
347 | 348 | self._ssl_validator = ssl_validator |
|
348 | 349 | self.host = host |
|
349 | 350 | self.sock = None |
|
350 | 351 | self._current_response = None |
|
351 | 352 | self._current_response_taken = False |
|
352 | 353 | if proxy_hostport is None: |
|
353 | 354 | self._proxy_host = self._proxy_port = None |
|
354 | 355 | else: |
|
355 | 356 | self._proxy_host, self._proxy_port = proxy_hostport |
|
356 | 357 | |
|
357 | 358 | self.timeout = timeout |
|
358 | 359 | self.continue_timeout = continue_timeout |
|
359 | 360 | |
|
360 | 361 | def _connect(self): |
|
361 | 362 | """Connect to the host and port specified in __init__.""" |
|
362 | 363 | if self.sock: |
|
363 | 364 | return |
|
364 | 365 | if self._proxy_host is not None: |
|
365 | 366 | logger.info('Connecting to http proxy %s:%s', |
|
366 | 367 | self._proxy_host, self._proxy_port) |
|
367 | 368 | sock = socketutil.create_connection((self._proxy_host, |
|
368 | 369 | self._proxy_port)) |
|
369 | 370 | if self.ssl: |
|
370 | 371 | # TODO proxy header support |
|
371 | 372 | data = self.buildheaders('CONNECT', '%s:%d' % (self.host, |
|
372 | 373 | self.port), |
|
373 | 374 | {}, HTTP_VER_1_0) |
|
374 | 375 | sock.send(data) |
|
375 | 376 | sock.setblocking(0) |
|
376 | 377 | r = self.response_class(sock, self.timeout) |
|
377 | 378 | timeout_exc = HTTPTimeoutException( |
|
378 | 379 | 'Timed out waiting for CONNECT response from proxy') |
|
379 | 380 | while not r.complete(): |
|
380 | 381 | try: |
|
381 | 382 | if not r._select(): |
|
382 | 383 | raise timeout_exc |
|
383 | 384 | except HTTPTimeoutException: |
|
384 | 385 | # This raise/except pattern looks goofy, but |
|
385 | 386 | # _select can raise the timeout as well as the |
|
386 | 387 | # loop body. I wish it wasn't this convoluted, |
|
387 | 388 | # but I don't have a better solution |
|
388 | 389 | # immediately handy. |
|
389 | 390 | raise timeout_exc |
|
390 | 391 | if r.status != 200: |
|
391 | 392 | raise HTTPProxyConnectFailedException( |
|
392 | 393 | 'Proxy connection failed: %d %s' % (r.status, |
|
393 | 394 | r.read())) |
|
394 | 395 | logger.info('CONNECT (for SSL) to %s:%s via proxy succeeded.', |
|
395 | 396 | self.host, self.port) |
|
396 | 397 | else: |
|
397 | 398 | sock = socketutil.create_connection((self.host, self.port)) |
|
398 | 399 | if self.ssl: |
|
399 | 400 | logger.debug('wrapping socket for ssl with options %r', |
|
400 | 401 | self.ssl_opts) |
|
401 | 402 | sock = socketutil.wrap_socket(sock, **self.ssl_opts) |
|
402 | 403 | if self._ssl_validator: |
|
403 | 404 | self._ssl_validator(sock) |
|
404 | 405 | sock.setblocking(0) |
|
405 | 406 | self.sock = sock |
|
406 | 407 | |
|
407 | 408 | def buildheaders(self, method, path, headers, http_ver): |
|
408 | 409 | if self.ssl and self.port == 443 or self.port == 80: |
|
409 | 410 | # default port for protocol, so leave it out |
|
410 | 411 | hdrhost = self.host |
|
411 | 412 | else: |
|
412 | 413 | # include nonstandard port in header |
|
413 | 414 | if ':' in self.host: # must be IPv6 |
|
414 | 415 | hdrhost = '[%s]:%d' % (self.host, self.port) |
|
415 | 416 | else: |
|
416 | 417 | hdrhost = '%s:%d' % (self.host, self.port) |
|
417 | 418 | if self._proxy_host and not self.ssl: |
|
418 | 419 | # When talking to a regular http proxy we must send the |
|
419 | 420 | # full URI, but in all other cases we must not (although |
|
420 | 421 | # technically RFC 2616 says servers must accept our |
|
421 | 422 | # request if we screw up, experimentally few do that |
|
422 | 423 | # correctly.) |
|
423 | 424 | assert path[0] == '/', 'path must start with a /' |
|
424 | 425 | path = 'http://%s%s' % (hdrhost, path) |
|
425 | 426 | outgoing = ['%s %s %s%s' % (method, path, http_ver, EOL)] |
|
426 | 427 | headers['host'] = ('Host', hdrhost) |
|
427 | 428 | headers[HDR_ACCEPT_ENCODING] = (HDR_ACCEPT_ENCODING, 'identity') |
|
428 | 429 | for hdr, val in headers.itervalues(): |
|
429 | 430 | outgoing.append('%s: %s%s' % (hdr, val, EOL)) |
|
430 | 431 | outgoing.append(EOL) |
|
431 | 432 | return ''.join(outgoing) |
|
432 | 433 | |
|
433 | 434 | def close(self): |
|
434 | 435 | """Close the connection to the server. |
|
435 | 436 | |
|
436 | 437 | This is a no-op if the connection is already closed. The |
|
437 | 438 | connection may automatically close if requessted by the server |
|
438 | 439 | or required by the nature of a response. |
|
439 | 440 | """ |
|
440 | 441 | if self.sock is None: |
|
441 | 442 | return |
|
442 | 443 | self.sock.close() |
|
443 | 444 | self.sock = None |
|
444 | 445 | logger.info('closed connection to %s on %s', self.host, self.port) |
|
445 | 446 | |
|
446 | 447 | def busy(self): |
|
447 | 448 | """Returns True if this connection object is currently in use. |
|
448 | 449 | |
|
449 | 450 | If a response is still pending, this will return True, even if |
|
450 | 451 | the request has finished sending. In the future, |
|
451 | 452 | HTTPConnection may transparently juggle multiple connections |
|
452 | 453 | to the server, in which case this will be useful to detect if |
|
453 | 454 | any of those connections is ready for use. |
|
454 | 455 | """ |
|
455 | 456 | cr = self._current_response |
|
456 | 457 | if cr is not None: |
|
457 | 458 | if self._current_response_taken: |
|
458 | 459 | if cr.will_close: |
|
459 | 460 | self.sock = None |
|
460 | 461 | self._current_response = None |
|
461 | 462 | return False |
|
462 | 463 | elif cr.complete(): |
|
463 | 464 | self._current_response = None |
|
464 | 465 | return False |
|
465 | 466 | return True |
|
466 | 467 | return False |
|
467 | 468 | |
|
468 | 469 | def request(self, method, path, body=None, headers={}, |
|
469 | 470 | expect_continue=False): |
|
470 | 471 | """Send a request to the server. |
|
471 | 472 | |
|
472 | 473 | For increased flexibility, this does not return the response |
|
473 | 474 | object. Future versions of HTTPConnection that juggle multiple |
|
474 | 475 | sockets will be able to send (for example) 5 requests all at |
|
475 | 476 | once, and then let the requests arrive as data is |
|
476 | 477 | available. Use the `getresponse()` method to retrieve the |
|
477 | 478 | response. |
|
478 | 479 | """ |
|
479 | 480 | if self.busy(): |
|
480 | 481 | raise httplib.CannotSendRequest( |
|
481 | 482 | 'Can not send another request before ' |
|
482 | 483 | 'current response is read!') |
|
483 | 484 | self._current_response_taken = False |
|
484 | 485 | |
|
485 | 486 | logger.info('sending %s request for %s to %s on port %s', |
|
486 | 487 | method, path, self.host, self.port) |
|
487 | 488 | hdrs = dict((k.lower(), (k, v)) for k, v in headers.iteritems()) |
|
488 | 489 | if hdrs.get('expect', ('', ''))[1].lower() == '100-continue': |
|
489 | 490 | expect_continue = True |
|
490 | 491 | elif expect_continue: |
|
491 | 492 | hdrs['expect'] = ('Expect', '100-Continue') |
|
492 | 493 | |
|
493 | 494 | chunked = False |
|
494 | 495 | if body and HDR_CONTENT_LENGTH not in hdrs: |
|
495 | 496 | if getattr(body, '__len__', False): |
|
496 | 497 | hdrs[HDR_CONTENT_LENGTH] = (HDR_CONTENT_LENGTH, len(body)) |
|
497 | 498 | elif getattr(body, 'read', False): |
|
498 | 499 | hdrs[HDR_XFER_ENCODING] = (HDR_XFER_ENCODING, |
|
499 | 500 | XFER_ENCODING_CHUNKED) |
|
500 | 501 | chunked = True |
|
501 | 502 | else: |
|
502 | 503 | raise BadRequestData('body has no __len__() nor read()') |
|
503 | 504 | |
|
504 | 505 | self._connect() |
|
505 | 506 | outgoing_headers = self.buildheaders( |
|
506 | 507 | method, path, hdrs, self.http_version) |
|
507 | 508 | response = None |
|
508 | 509 | first = True |
|
509 | 510 | |
|
510 | 511 | def reconnect(where): |
|
511 | 512 | logger.info('reconnecting during %s', where) |
|
512 | 513 | self.close() |
|
513 | 514 | self._connect() |
|
514 | 515 | |
|
515 | 516 | while ((outgoing_headers or body) |
|
516 | 517 | and not (response and response.complete())): |
|
517 | 518 | select_timeout = self.timeout |
|
518 | 519 | out = outgoing_headers or body |
|
519 | 520 | blocking_on_continue = False |
|
520 | 521 | if expect_continue and not outgoing_headers and not ( |
|
521 | 522 | response and response.headers): |
|
522 | 523 | logger.info( |
|
523 | 524 | 'waiting up to %s seconds for' |
|
524 | 525 | ' continue response from server', |
|
525 | 526 | self.continue_timeout) |
|
526 | 527 | select_timeout = self.continue_timeout |
|
527 | 528 | blocking_on_continue = True |
|
528 | 529 | out = False |
|
529 | 530 | if out: |
|
530 | 531 | w = [self.sock] |
|
531 | 532 | else: |
|
532 | 533 | w = [] |
|
533 | 534 | r, w, x = select.select([self.sock], w, [], select_timeout) |
|
534 | 535 | # if we were expecting a 100 continue and it's been long |
|
535 | 536 | # enough, just go ahead and assume it's ok. This is the |
|
536 | 537 | # recommended behavior from the RFC. |
|
537 | 538 | if r == w == x == []: |
|
538 | 539 | if blocking_on_continue: |
|
539 | 540 | expect_continue = False |
|
540 | 541 | logger.info('no response to continue expectation from ' |
|
541 | 542 | 'server, optimistically sending request body') |
|
542 | 543 | else: |
|
543 | 544 | raise HTTPTimeoutException('timeout sending data') |
|
544 | 545 | # TODO exceptional conditions with select? (what are those be?) |
|
545 | 546 | # TODO if the response is loading, must we finish sending at all? |
|
546 | 547 | # |
|
547 | 548 | # Certainly not if it's going to close the connection and/or |
|
548 | 549 | # the response is already done...I think. |
|
549 | 550 | was_first = first |
|
550 | 551 | |
|
551 | 552 | # incoming data |
|
552 | 553 | if r: |
|
553 | 554 | try: |
|
554 | 555 | try: |
|
555 | 556 | data = r[0].recv(INCOMING_BUFFER_SIZE) |
|
556 | 557 | except socket.sslerror, e: |
|
557 | 558 | if e.args[0] != socket.SSL_ERROR_WANT_READ: |
|
558 | 559 | raise |
|
559 | 560 | logger.debug( |
|
560 | 561 | 'SSL_WANT_READ while sending data, retrying...') |
|
561 | 562 | continue |
|
562 | 563 | if not data: |
|
563 | 564 | logger.info('socket appears closed in read') |
|
564 |
|
|
|
565 |
|
|
|
565 | self.sock = None | |
|
566 | self._current_response = None | |
|
567 | # This if/elif ladder is a bit subtle, | |
|
568 | # comments in each branch should help. | |
|
569 | if response is not None and ( | |
|
570 | response.complete() or | |
|
571 | response._content_len == _LEN_CLOSE_IS_END): | |
|
572 | # Server responded completely and then | |
|
573 | # closed the socket. We should just shut | |
|
574 | # things down and let the caller get their | |
|
575 | # response. | |
|
576 | logger.info('Got an early response, ' | |
|
577 | 'aborting remaining request.') | |
|
578 | break | |
|
579 | elif was_first and response is None: | |
|
580 | # Most likely a keepalive that got killed | |
|
581 | # on the server's end. Commonly happens | |
|
582 | # after getting a really large response | |
|
583 | # from the server. | |
|
584 | logger.info( | |
|
585 | 'Connection appeared closed in read on first' | |
|
586 | ' request loop iteration, will retry.') | |
|
587 | reconnect('read') | |
|
588 | continue | |
|
589 | else: | |
|
590 | # We didn't just send the first data hunk, | |
|
591 | # and either have a partial response or no | |
|
592 | # response at all. There's really nothing | |
|
593 | # meaningful we can do here. | |
|
594 | raise HTTPStateError( | |
|
595 | 'Connection appears closed after ' | |
|
596 | 'some request data was written, but the ' | |
|
597 | 'response was missing or incomplete!') | |
|
598 | logger.debug('read %d bytes in request()', len(data)) | |
|
566 | 599 | if response is None: |
|
567 | 600 | response = self.response_class(r[0], self.timeout) |
|
568 | 601 | response._load_response(data) |
|
569 | if (response._content_len == _LEN_CLOSE_IS_END | |
|
570 | and len(data) == 0): | |
|
571 | response._content_len = len(response._body) | |
|
572 | if response.complete(): | |
|
573 | w = [] | |
|
574 | response.will_close = True | |
|
602 | # Jump to the next select() call so we load more | |
|
603 | # data if the server is still sending us content. | |
|
604 | continue | |
|
575 | 605 | except socket.error, e: |
|
576 | 606 | if e[0] != errno.EPIPE and not was_first: |
|
577 | 607 | raise |
|
578 | 608 | if (response._content_len |
|
579 | 609 | and response._content_len != _LEN_CLOSE_IS_END): |
|
580 | 610 | outgoing_headers = sent_data + outgoing_headers |
|
581 | 611 | reconnect('read') |
|
582 | 612 | |
|
583 | 613 | # outgoing data |
|
584 | 614 | if w and out: |
|
585 | 615 | try: |
|
586 | 616 | if getattr(out, 'read', False): |
|
587 | 617 | data = out.read(OUTGOING_BUFFER_SIZE) |
|
588 | 618 | if not data: |
|
589 | 619 | continue |
|
590 | 620 | if len(data) < OUTGOING_BUFFER_SIZE: |
|
591 | 621 | if chunked: |
|
592 | 622 | body = '0' + EOL + EOL |
|
593 | 623 | else: |
|
594 | 624 | body = None |
|
595 | 625 | if chunked: |
|
596 | 626 | out = hex(len(data))[2:] + EOL + data + EOL |
|
597 | 627 | else: |
|
598 | 628 | out = data |
|
599 | 629 | amt = w[0].send(out) |
|
600 | 630 | except socket.error, e: |
|
601 | 631 | if e[0] == socket.SSL_ERROR_WANT_WRITE and self.ssl: |
|
602 | 632 | # This means that SSL hasn't flushed its buffer into |
|
603 | 633 | # the socket yet. |
|
604 | 634 | # TODO: find a way to block on ssl flushing its buffer |
|
605 | 635 | # similar to selecting on a raw socket. |
|
606 | 636 | continue |
|
607 | 637 | elif (e[0] not in (errno.ECONNRESET, errno.EPIPE) |
|
608 | 638 | and not first): |
|
609 | 639 | raise |
|
610 | 640 | reconnect('write') |
|
611 | 641 | amt = self.sock.send(out) |
|
612 | 642 | logger.debug('sent %d', amt) |
|
613 | 643 | first = False |
|
614 | 644 | # stash data we think we sent in case the socket breaks |
|
615 | 645 | # when we read from it |
|
616 | 646 | if was_first: |
|
617 | 647 | sent_data = out[:amt] |
|
618 | 648 | if out is body: |
|
619 | 649 | body = out[amt:] |
|
620 | 650 | else: |
|
621 | 651 | outgoing_headers = out[amt:] |
|
622 | 652 | |
|
623 | 653 | # close if the server response said to or responded before eating |
|
624 | 654 | # the whole request |
|
625 | 655 | if response is None: |
|
626 | 656 | response = self.response_class(self.sock, self.timeout) |
|
627 | 657 | complete = response.complete() |
|
628 | 658 | data_left = bool(outgoing_headers or body) |
|
629 | 659 | if data_left: |
|
630 | 660 | logger.info('stopped sending request early, ' |
|
631 | 661 | 'will close the socket to be safe.') |
|
632 | 662 | response.will_close = True |
|
633 | 663 | if response.will_close: |
|
634 | 664 | # The socket will be closed by the response, so we disown |
|
635 | 665 | # the socket |
|
636 | 666 | self.sock = None |
|
637 | 667 | self._current_response = response |
|
638 | 668 | |
|
639 | 669 | def getresponse(self): |
|
640 | 670 | if self._current_response is None: |
|
641 | 671 | raise httplib.ResponseNotReady() |
|
642 | 672 | r = self._current_response |
|
643 | 673 | while r.headers is None: |
|
644 | 674 | r._select() |
|
645 | 675 | if r.will_close: |
|
646 | 676 | self.sock = None |
|
647 | 677 | self._current_response = None |
|
648 | 678 | elif r.complete(): |
|
649 | 679 | self._current_response = None |
|
650 | 680 | else: |
|
651 | 681 | self._current_response_taken = True |
|
652 | 682 | return r |
|
653 | 683 | |
|
654 | 684 | |
|
655 | 685 | class HTTPTimeoutException(httplib.HTTPException): |
|
656 | 686 | """A timeout occurred while waiting on the server.""" |
|
657 | 687 | |
|
658 | 688 | |
|
659 | 689 | class BadRequestData(httplib.HTTPException): |
|
660 | 690 | """Request body object has neither __len__ nor read.""" |
|
661 | 691 | |
|
662 | 692 | |
|
663 | 693 | class HTTPProxyConnectFailedException(httplib.HTTPException): |
|
664 | 694 | """Connecting to the HTTP proxy failed.""" |
|
695 | ||
|
696 | class HTTPStateError(httplib.HTTPException): | |
|
697 | """Invalid internal state encountered.""" | |
|
665 | 698 | # no-check-code |
@@ -1,356 +1,386 | |||
|
1 | 1 | # Copyright 2010, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | import socket | |
|
29 | 30 | import unittest |
|
30 | 31 | |
|
31 | 32 | import http |
|
32 | 33 | |
|
33 | 34 | # relative import to ease embedding the library |
|
34 | 35 | import util |
|
35 | 36 | |
|
36 | 37 | |
|
37 | 38 | class SimpleHttpTest(util.HttpTestBase, unittest.TestCase): |
|
38 | 39 | |
|
39 | 40 | def _run_simple_test(self, host, server_data, expected_req, expected_data): |
|
40 | 41 | con = http.HTTPConnection(host) |
|
41 | 42 | con._connect() |
|
42 |
con.sock.data |
|
|
43 | con.sock.data = server_data | |
|
43 | 44 | con.request('GET', '/') |
|
44 | 45 | |
|
45 | 46 | self.assertStringEqual(expected_req, con.sock.sent) |
|
46 | 47 | self.assertEqual(expected_data, con.getresponse().read()) |
|
47 | 48 | |
|
48 | 49 | def test_broken_data_obj(self): |
|
49 | 50 | con = http.HTTPConnection('1.2.3.4:80') |
|
50 | 51 | con._connect() |
|
51 | 52 | self.assertRaises(http.BadRequestData, |
|
52 | 53 | con.request, 'POST', '/', body=1) |
|
53 | 54 | |
|
54 | 55 | def test_no_keepalive_http_1_0(self): |
|
55 | 56 | expected_request_one = """GET /remote/.hg/requires HTTP/1.1 |
|
56 | 57 | Host: localhost:9999 |
|
57 | 58 | range: bytes=0- |
|
58 | 59 | accept-encoding: identity |
|
59 | 60 | accept: application/mercurial-0.1 |
|
60 | 61 | user-agent: mercurial/proto-1.0 |
|
61 | 62 | |
|
62 | 63 | """.replace('\n', '\r\n') |
|
63 | 64 | expected_response_headers = """HTTP/1.0 200 OK |
|
64 | 65 | Server: SimpleHTTP/0.6 Python/2.6.1 |
|
65 | 66 | Date: Sun, 01 May 2011 13:56:57 GMT |
|
66 | 67 | Content-type: application/octet-stream |
|
67 | 68 | Content-Length: 33 |
|
68 | 69 | Last-Modified: Sun, 01 May 2011 13:56:56 GMT |
|
69 | 70 | |
|
70 | 71 | """.replace('\n', '\r\n') |
|
71 | 72 | expected_response_body = """revlogv1 |
|
72 | 73 | store |
|
73 | 74 | fncache |
|
74 | 75 | dotencode |
|
75 | 76 | """ |
|
76 | 77 | con = http.HTTPConnection('localhost:9999') |
|
77 | 78 | con._connect() |
|
78 | 79 | con.sock.data = [expected_response_headers, expected_response_body] |
|
79 | 80 | con.request('GET', '/remote/.hg/requires', |
|
80 | 81 | headers={'accept-encoding': 'identity', |
|
81 | 82 | 'range': 'bytes=0-', |
|
82 | 83 | 'accept': 'application/mercurial-0.1', |
|
83 | 84 | 'user-agent': 'mercurial/proto-1.0', |
|
84 | 85 | }) |
|
85 | 86 | self.assertStringEqual(expected_request_one, con.sock.sent) |
|
86 | 87 | self.assertEqual(con.sock.closed, False) |
|
87 | 88 | self.assertNotEqual(con.sock.data, []) |
|
88 | 89 | self.assert_(con.busy()) |
|
89 | 90 | resp = con.getresponse() |
|
90 | 91 | self.assertStringEqual(resp.read(), expected_response_body) |
|
91 | 92 | self.failIf(con.busy()) |
|
92 | 93 | self.assertEqual(con.sock, None) |
|
93 | 94 | self.assertEqual(resp.sock.data, []) |
|
94 | 95 | self.assert_(resp.sock.closed) |
|
95 | 96 | |
|
96 | 97 | def test_multiline_header(self): |
|
97 | 98 | con = http.HTTPConnection('1.2.3.4:80') |
|
98 | 99 | con._connect() |
|
99 | 100 | con.sock.data = ['HTTP/1.1 200 OK\r\n', |
|
100 | 101 | 'Server: BogusServer 1.0\r\n', |
|
101 | 102 | 'Multiline: Value\r\n', |
|
102 | 103 | ' Rest of value\r\n', |
|
103 | 104 | 'Content-Length: 10\r\n', |
|
104 | 105 | '\r\n' |
|
105 | 106 | '1234567890' |
|
106 | 107 | ] |
|
107 | 108 | con.request('GET', '/') |
|
108 | 109 | |
|
109 | 110 | expected_req = ('GET / HTTP/1.1\r\n' |
|
110 | 111 | 'Host: 1.2.3.4\r\n' |
|
111 | 112 | 'accept-encoding: identity\r\n\r\n') |
|
112 | 113 | |
|
113 | 114 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
114 | 115 | self.assertEqual(expected_req, con.sock.sent) |
|
115 | 116 | resp = con.getresponse() |
|
116 | 117 | self.assertEqual('1234567890', resp.read()) |
|
117 | 118 | self.assertEqual(['Value\n Rest of value'], |
|
118 | 119 | resp.headers.getheaders('multiline')) |
|
119 | 120 | # Socket should not be closed |
|
120 | 121 | self.assertEqual(resp.sock.closed, False) |
|
121 | 122 | self.assertEqual(con.sock.closed, False) |
|
122 | 123 | |
|
123 | 124 | def testSimpleRequest(self): |
|
124 | 125 | con = http.HTTPConnection('1.2.3.4:80') |
|
125 | 126 | con._connect() |
|
126 | 127 | con.sock.data = ['HTTP/1.1 200 OK\r\n', |
|
127 | 128 | 'Server: BogusServer 1.0\r\n', |
|
128 | 129 | 'MultiHeader: Value\r\n' |
|
129 | 130 | 'MultiHeader: Other Value\r\n' |
|
130 | 131 | 'MultiHeader: One More!\r\n' |
|
131 | 132 | 'Content-Length: 10\r\n', |
|
132 | 133 | '\r\n' |
|
133 | 134 | '1234567890' |
|
134 | 135 | ] |
|
135 | 136 | con.request('GET', '/') |
|
136 | 137 | |
|
137 | 138 | expected_req = ('GET / HTTP/1.1\r\n' |
|
138 | 139 | 'Host: 1.2.3.4\r\n' |
|
139 | 140 | 'accept-encoding: identity\r\n\r\n') |
|
140 | 141 | |
|
141 | 142 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
142 | 143 | self.assertEqual(expected_req, con.sock.sent) |
|
143 | 144 | resp = con.getresponse() |
|
144 | 145 | self.assertEqual('1234567890', resp.read()) |
|
145 | 146 | self.assertEqual(['Value', 'Other Value', 'One More!'], |
|
146 | 147 | resp.headers.getheaders('multiheader')) |
|
147 | 148 | self.assertEqual(['BogusServer 1.0'], |
|
148 | 149 | resp.headers.getheaders('server')) |
|
149 | 150 | |
|
150 | 151 | def testHeaderlessResponse(self): |
|
151 | 152 | con = http.HTTPConnection('1.2.3.4', use_ssl=False) |
|
152 | 153 | con._connect() |
|
153 | 154 | con.sock.data = ['HTTP/1.1 200 OK\r\n', |
|
154 | 155 | '\r\n' |
|
155 | 156 | '1234567890' |
|
156 | 157 | ] |
|
157 | 158 | con.request('GET', '/') |
|
158 | 159 | |
|
159 | 160 | expected_req = ('GET / HTTP/1.1\r\n' |
|
160 | 161 | 'Host: 1.2.3.4\r\n' |
|
161 | 162 | 'accept-encoding: identity\r\n\r\n') |
|
162 | 163 | |
|
163 | 164 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
164 | 165 | self.assertEqual(expected_req, con.sock.sent) |
|
165 | 166 | resp = con.getresponse() |
|
166 | 167 | self.assertEqual('1234567890', resp.read()) |
|
167 | 168 | self.assertEqual({}, dict(resp.headers)) |
|
168 | 169 | self.assertEqual(resp.status, 200) |
|
169 | 170 | |
|
170 | 171 | def testReadline(self): |
|
171 | 172 | con = http.HTTPConnection('1.2.3.4') |
|
172 | 173 | con._connect() |
|
173 | 174 | # make sure it trickles in one byte at a time |
|
174 | 175 | # so that we touch all the cases in readline |
|
175 | 176 | con.sock.data = list(''.join( |
|
176 | 177 | ['HTTP/1.1 200 OK\r\n', |
|
177 | 178 | 'Server: BogusServer 1.0\r\n', |
|
178 | 179 | 'Connection: Close\r\n', |
|
179 | 180 | '\r\n' |
|
180 | 181 | '1\n2\nabcdefg\n4\n5'])) |
|
181 | 182 | |
|
182 | 183 | expected_req = ('GET / HTTP/1.1\r\n' |
|
183 | 184 | 'Host: 1.2.3.4\r\n' |
|
184 | 185 | 'accept-encoding: identity\r\n\r\n') |
|
185 | 186 | |
|
186 | 187 | con.request('GET', '/') |
|
187 | 188 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
188 | 189 | self.assertEqual(expected_req, con.sock.sent) |
|
189 | 190 | r = con.getresponse() |
|
190 | 191 | for expected in ['1\n', '2\n', 'abcdefg\n', '4\n', '5']: |
|
191 | 192 | actual = r.readline() |
|
192 | 193 | self.assertEqual(expected, actual, |
|
193 | 194 | 'Expected %r, got %r' % (expected, actual)) |
|
194 | 195 | |
|
195 | 196 | def testIPv6(self): |
|
196 | 197 | self._run_simple_test('[::1]:8221', |
|
197 | 198 | ['HTTP/1.1 200 OK\r\n', |
|
198 | 199 | 'Server: BogusServer 1.0\r\n', |
|
199 | 200 | 'Content-Length: 10', |
|
200 | 201 | '\r\n\r\n' |
|
201 | 202 | '1234567890'], |
|
202 | 203 | ('GET / HTTP/1.1\r\n' |
|
203 | 204 | 'Host: [::1]:8221\r\n' |
|
204 | 205 | 'accept-encoding: identity\r\n\r\n'), |
|
205 | 206 | '1234567890') |
|
206 | 207 | self._run_simple_test('::2', |
|
207 | 208 | ['HTTP/1.1 200 OK\r\n', |
|
208 | 209 | 'Server: BogusServer 1.0\r\n', |
|
209 | 210 | 'Content-Length: 10', |
|
210 | 211 | '\r\n\r\n' |
|
211 | 212 | '1234567890'], |
|
212 | 213 | ('GET / HTTP/1.1\r\n' |
|
213 | 214 | 'Host: ::2\r\n' |
|
214 | 215 | 'accept-encoding: identity\r\n\r\n'), |
|
215 | 216 | '1234567890') |
|
216 | 217 | self._run_simple_test('[::3]:443', |
|
217 | 218 | ['HTTP/1.1 200 OK\r\n', |
|
218 | 219 | 'Server: BogusServer 1.0\r\n', |
|
219 | 220 | 'Content-Length: 10', |
|
220 | 221 | '\r\n\r\n' |
|
221 | 222 | '1234567890'], |
|
222 | 223 | ('GET / HTTP/1.1\r\n' |
|
223 | 224 | 'Host: ::3\r\n' |
|
224 | 225 | 'accept-encoding: identity\r\n\r\n'), |
|
225 | 226 | '1234567890') |
|
226 | 227 | |
|
227 | 228 | def testEarlyContinueResponse(self): |
|
228 | 229 | con = http.HTTPConnection('1.2.3.4:80') |
|
229 | 230 | con._connect() |
|
230 | 231 | sock = con.sock |
|
231 | 232 | sock.data = ['HTTP/1.1 403 Forbidden\r\n', |
|
232 | 233 | 'Server: BogusServer 1.0\r\n', |
|
233 | 234 | 'Content-Length: 18', |
|
234 | 235 | '\r\n\r\n' |
|
235 | 236 | "You can't do that."] |
|
236 | 237 | expected_req = self.doPost(con, expect_body=False) |
|
237 | 238 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
238 | 239 | self.assertStringEqual(expected_req, sock.sent) |
|
239 | 240 | self.assertEqual("You can't do that.", con.getresponse().read()) |
|
240 | 241 | self.assertEqual(sock.closed, True) |
|
241 | 242 | |
|
242 | 243 | def testDeniedAfterContinueTimeoutExpires(self): |
|
243 | 244 | con = http.HTTPConnection('1.2.3.4:80') |
|
244 | 245 | con._connect() |
|
245 | 246 | sock = con.sock |
|
246 | 247 | sock.data = ['HTTP/1.1 403 Forbidden\r\n', |
|
247 | 248 | 'Server: BogusServer 1.0\r\n', |
|
248 | 249 | 'Content-Length: 18\r\n', |
|
249 | 250 | 'Connection: close', |
|
250 | 251 | '\r\n\r\n' |
|
251 | 252 | "You can't do that."] |
|
252 | 253 | sock.read_wait_sentinel = 'Dear server, send response!' |
|
253 | 254 | sock.close_on_empty = True |
|
254 | 255 | # send enough data out that we'll chunk it into multiple |
|
255 | 256 | # blocks and the socket will close before we can send the |
|
256 | 257 | # whole request. |
|
257 | 258 | post_body = ('This is some POST data\n' * 1024 * 32 + |
|
258 | 259 | 'Dear server, send response!\n' + |
|
259 | 260 | 'This is some POST data\n' * 1024 * 32) |
|
260 | 261 | expected_req = self.doPost(con, expect_body=False, |
|
261 | 262 | body_to_send=post_body) |
|
262 | 263 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
263 | 264 | self.assert_('POST data\n' in sock.sent) |
|
264 | 265 | self.assert_('Dear server, send response!\n' in sock.sent) |
|
265 | 266 | # We expect not all of our data was sent. |
|
266 | 267 | self.assertNotEqual(sock.sent, expected_req) |
|
267 | 268 | self.assertEqual("You can't do that.", con.getresponse().read()) |
|
268 | 269 | self.assertEqual(sock.closed, True) |
|
269 | 270 | |
|
270 | 271 | def testPostData(self): |
|
271 | 272 | con = http.HTTPConnection('1.2.3.4:80') |
|
272 | 273 | con._connect() |
|
273 | 274 | sock = con.sock |
|
274 | 275 | sock.read_wait_sentinel = 'POST data' |
|
275 | 276 | sock.early_data = ['HTTP/1.1 100 Co', 'ntinue\r\n\r\n'] |
|
276 | 277 | sock.data = ['HTTP/1.1 200 OK\r\n', |
|
277 | 278 | 'Server: BogusServer 1.0\r\n', |
|
278 | 279 | 'Content-Length: 16', |
|
279 | 280 | '\r\n\r\n', |
|
280 | 281 | "You can do that."] |
|
281 | 282 | expected_req = self.doPost(con, expect_body=True) |
|
282 | 283 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
283 | 284 | self.assertEqual(expected_req, sock.sent) |
|
284 | 285 | self.assertEqual("You can do that.", con.getresponse().read()) |
|
285 | 286 | self.assertEqual(sock.closed, False) |
|
286 | 287 | |
|
287 | 288 | def testServerWithoutContinue(self): |
|
288 | 289 | con = http.HTTPConnection('1.2.3.4:80') |
|
289 | 290 | con._connect() |
|
290 | 291 | sock = con.sock |
|
291 | 292 | sock.read_wait_sentinel = 'POST data' |
|
292 | 293 | sock.data = ['HTTP/1.1 200 OK\r\n', |
|
293 | 294 | 'Server: BogusServer 1.0\r\n', |
|
294 | 295 | 'Content-Length: 16', |
|
295 | 296 | '\r\n\r\n', |
|
296 | 297 | "You can do that."] |
|
297 | 298 | expected_req = self.doPost(con, expect_body=True) |
|
298 | 299 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
299 | 300 | self.assertEqual(expected_req, sock.sent) |
|
300 | 301 | self.assertEqual("You can do that.", con.getresponse().read()) |
|
301 | 302 | self.assertEqual(sock.closed, False) |
|
302 | 303 | |
|
303 | 304 | def testServerWithSlowContinue(self): |
|
304 | 305 | con = http.HTTPConnection('1.2.3.4:80') |
|
305 | 306 | con._connect() |
|
306 | 307 | sock = con.sock |
|
307 | 308 | sock.read_wait_sentinel = 'POST data' |
|
308 | 309 | sock.data = ['HTTP/1.1 100 ', 'Continue\r\n\r\n', |
|
309 | 310 | 'HTTP/1.1 200 OK\r\n', |
|
310 | 311 | 'Server: BogusServer 1.0\r\n', |
|
311 | 312 | 'Content-Length: 16', |
|
312 | 313 | '\r\n\r\n', |
|
313 | 314 | "You can do that."] |
|
314 | 315 | expected_req = self.doPost(con, expect_body=True) |
|
315 | 316 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
316 | 317 | self.assertEqual(expected_req, sock.sent) |
|
317 | 318 | resp = con.getresponse() |
|
318 | 319 | self.assertEqual("You can do that.", resp.read()) |
|
319 | 320 | self.assertEqual(200, resp.status) |
|
320 | 321 | self.assertEqual(sock.closed, False) |
|
321 | 322 | |
|
322 | 323 | def testSlowConnection(self): |
|
323 | 324 | con = http.HTTPConnection('1.2.3.4:80') |
|
324 | 325 | con._connect() |
|
325 | 326 | # simulate one byte arriving at a time, to check for various |
|
326 | 327 | # corner cases |
|
327 | 328 | con.sock.data = list('HTTP/1.1 200 OK\r\n' |
|
328 | 329 | 'Server: BogusServer 1.0\r\n' |
|
329 | 330 | 'Content-Length: 10' |
|
330 | 331 | '\r\n\r\n' |
|
331 | 332 | '1234567890') |
|
332 | 333 | con.request('GET', '/') |
|
333 | 334 | |
|
334 | 335 | expected_req = ('GET / HTTP/1.1\r\n' |
|
335 | 336 | 'Host: 1.2.3.4\r\n' |
|
336 | 337 | 'accept-encoding: identity\r\n\r\n') |
|
337 | 338 | |
|
338 | 339 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
339 | 340 | self.assertEqual(expected_req, con.sock.sent) |
|
340 | 341 | self.assertEqual('1234567890', con.getresponse().read()) |
|
341 | 342 | |
|
342 | 343 | def testTimeout(self): |
|
343 | 344 | con = http.HTTPConnection('1.2.3.4:80') |
|
344 | 345 | con._connect() |
|
345 | 346 | con.sock.data = [] |
|
346 | 347 | con.request('GET', '/') |
|
347 | 348 | self.assertRaises(http.HTTPTimeoutException, |
|
348 | 349 | con.getresponse) |
|
349 | 350 | |
|
350 | 351 | expected_req = ('GET / HTTP/1.1\r\n' |
|
351 | 352 | 'Host: 1.2.3.4\r\n' |
|
352 | 353 | 'accept-encoding: identity\r\n\r\n') |
|
353 | 354 | |
|
354 | 355 | self.assertEqual(('1.2.3.4', 80), con.sock.sa) |
|
355 | 356 | self.assertEqual(expected_req, con.sock.sent) |
|
357 | ||
|
358 | def test_conn_keep_alive_but_server_close_anyway(self): | |
|
359 | sockets = [] | |
|
360 | def closingsocket(*args, **kwargs): | |
|
361 | s = util.MockSocket(*args, **kwargs) | |
|
362 | sockets.append(s) | |
|
363 | s.data = ['HTTP/1.1 200 OK\r\n', | |
|
364 | 'Server: BogusServer 1.0\r\n', | |
|
365 | 'Connection: Keep-Alive\r\n', | |
|
366 | 'Content-Length: 16', | |
|
367 | '\r\n\r\n', | |
|
368 | 'You can do that.'] | |
|
369 | s.close_on_empty = True | |
|
370 | return s | |
|
371 | ||
|
372 | socket.socket = closingsocket | |
|
373 | con = http.HTTPConnection('1.2.3.4:80') | |
|
374 | con._connect() | |
|
375 | con.request('GET', '/') | |
|
376 | r1 = con.getresponse() | |
|
377 | r1.read() | |
|
378 | self.assertFalse(con.sock.closed) | |
|
379 | self.assert_(con.sock.remote_closed) | |
|
380 | con.request('GET', '/') | |
|
381 | self.assertEqual(2, len(sockets)) | |
|
382 | ||
|
383 | def test_no_response_raises_response_not_ready(self): | |
|
384 | con = http.HTTPConnection('foo') | |
|
385 | self.assertRaises(http.httplib.ResponseNotReady, con.getresponse) | |
|
356 | 386 | # no-check-code |
@@ -1,137 +1,137 | |||
|
1 | 1 | # Copyright 2010, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | 29 | import cStringIO |
|
30 | 30 | import unittest |
|
31 | 31 | |
|
32 | 32 | import http |
|
33 | 33 | |
|
34 | 34 | # relative import to ease embedding the library |
|
35 | 35 | import util |
|
36 | 36 | |
|
37 | 37 | |
|
38 | 38 | def chunkedblock(x, eol='\r\n'): |
|
39 | 39 | r"""Make a chunked transfer-encoding block. |
|
40 | 40 | |
|
41 | 41 | >>> chunkedblock('hi') |
|
42 | 42 | '2\r\nhi\r\n' |
|
43 | 43 | >>> chunkedblock('hi' * 10) |
|
44 | 44 | '14\r\nhihihihihihihihihihi\r\n' |
|
45 | 45 | >>> chunkedblock('hi', eol='\n') |
|
46 | 46 | '2\nhi\n' |
|
47 | 47 | """ |
|
48 | 48 | return ''.join((hex(len(x))[2:], eol, x, eol)) |
|
49 | 49 | |
|
50 | 50 | |
|
51 | 51 | class ChunkedTransferTest(util.HttpTestBase, unittest.TestCase): |
|
52 | 52 | def testChunkedUpload(self): |
|
53 | 53 | con = http.HTTPConnection('1.2.3.4:80') |
|
54 | 54 | con._connect() |
|
55 | 55 | sock = con.sock |
|
56 |
sock.read_wait_sentinel = ' |
|
|
56 | sock.read_wait_sentinel = '0\r\n\r\n' | |
|
57 | 57 | sock.data = ['HTTP/1.1 200 OK\r\n', |
|
58 | 58 | 'Server: BogusServer 1.0\r\n', |
|
59 | 59 | 'Content-Length: 6', |
|
60 | 60 | '\r\n\r\n', |
|
61 | 61 | "Thanks"] |
|
62 | 62 | |
|
63 | 63 | zz = 'zz\n' |
|
64 | 64 | con.request('POST', '/', body=cStringIO.StringIO( |
|
65 | 65 | (zz * (0x8010 / 3)) + 'end-of-body')) |
|
66 | 66 | expected_req = ('POST / HTTP/1.1\r\n' |
|
67 | 67 | 'transfer-encoding: chunked\r\n' |
|
68 | 68 | 'Host: 1.2.3.4\r\n' |
|
69 | 69 | 'accept-encoding: identity\r\n\r\n') |
|
70 | 70 | expected_req += chunkedblock('zz\n' * (0x8000 / 3) + 'zz') |
|
71 | 71 | expected_req += chunkedblock( |
|
72 | 72 | '\n' + 'zz\n' * ((0x1b - len('end-of-body')) / 3) + 'end-of-body') |
|
73 | 73 | expected_req += '0\r\n\r\n' |
|
74 | 74 | self.assertEqual(('1.2.3.4', 80), sock.sa) |
|
75 | 75 | self.assertStringEqual(expected_req, sock.sent) |
|
76 | 76 | self.assertEqual("Thanks", con.getresponse().read()) |
|
77 | 77 | self.assertEqual(sock.closed, False) |
|
78 | 78 | |
|
79 | 79 | def testChunkedDownload(self): |
|
80 | 80 | con = http.HTTPConnection('1.2.3.4:80') |
|
81 | 81 | con._connect() |
|
82 | 82 | sock = con.sock |
|
83 | 83 | sock.data = ['HTTP/1.1 200 OK\r\n', |
|
84 | 84 | 'Server: BogusServer 1.0\r\n', |
|
85 | 85 | 'transfer-encoding: chunked', |
|
86 | 86 | '\r\n\r\n', |
|
87 | 87 | chunkedblock('hi '), |
|
88 | 88 | chunkedblock('there'), |
|
89 | 89 | chunkedblock(''), |
|
90 | 90 | ] |
|
91 | 91 | con.request('GET', '/') |
|
92 | 92 | self.assertStringEqual('hi there', con.getresponse().read()) |
|
93 | 93 | |
|
94 | 94 | def testChunkedDownloadBadEOL(self): |
|
95 | 95 | con = http.HTTPConnection('1.2.3.4:80') |
|
96 | 96 | con._connect() |
|
97 | 97 | sock = con.sock |
|
98 | 98 | sock.data = ['HTTP/1.1 200 OK\n', |
|
99 | 99 | 'Server: BogusServer 1.0\n', |
|
100 | 100 | 'transfer-encoding: chunked', |
|
101 | 101 | '\n\n', |
|
102 | 102 | chunkedblock('hi ', eol='\n'), |
|
103 | 103 | chunkedblock('there', eol='\n'), |
|
104 | 104 | chunkedblock('', eol='\n'), |
|
105 | 105 | ] |
|
106 | 106 | con.request('GET', '/') |
|
107 | 107 | self.assertStringEqual('hi there', con.getresponse().read()) |
|
108 | 108 | |
|
109 | 109 | def testChunkedDownloadPartialChunkBadEOL(self): |
|
110 | 110 | con = http.HTTPConnection('1.2.3.4:80') |
|
111 | 111 | con._connect() |
|
112 | 112 | sock = con.sock |
|
113 | 113 | sock.data = ['HTTP/1.1 200 OK\n', |
|
114 | 114 | 'Server: BogusServer 1.0\n', |
|
115 | 115 | 'transfer-encoding: chunked', |
|
116 | 116 | '\n\n', |
|
117 | 117 | chunkedblock('hi ', eol='\n'), |
|
118 | 118 | ] + list(chunkedblock('there\n' * 5, eol='\n')) + [ |
|
119 | 119 | chunkedblock('', eol='\n')] |
|
120 | 120 | con.request('GET', '/') |
|
121 | 121 | self.assertStringEqual('hi there\nthere\nthere\nthere\nthere\n', |
|
122 | 122 | con.getresponse().read()) |
|
123 | 123 | |
|
124 | 124 | def testChunkedDownloadPartialChunk(self): |
|
125 | 125 | con = http.HTTPConnection('1.2.3.4:80') |
|
126 | 126 | con._connect() |
|
127 | 127 | sock = con.sock |
|
128 | 128 | sock.data = ['HTTP/1.1 200 OK\r\n', |
|
129 | 129 | 'Server: BogusServer 1.0\r\n', |
|
130 | 130 | 'transfer-encoding: chunked', |
|
131 | 131 | '\r\n\r\n', |
|
132 | 132 | chunkedblock('hi '), |
|
133 | 133 | ] + list(chunkedblock('there\n' * 5)) + [chunkedblock('')] |
|
134 | 134 | con.request('GET', '/') |
|
135 | 135 | self.assertStringEqual('hi there\nthere\nthere\nthere\nthere\n', |
|
136 | 136 | con.getresponse().read()) |
|
137 | 137 | # no-check-code |
@@ -1,132 +1,135 | |||
|
1 | 1 | # Copyright 2010, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | 29 | import unittest |
|
30 | 30 | import socket |
|
31 | 31 | |
|
32 | 32 | import http |
|
33 | 33 | |
|
34 | 34 | # relative import to ease embedding the library |
|
35 | 35 | import util |
|
36 | 36 | |
|
37 | 37 | |
|
38 | 38 | def make_preloaded_socket(data): |
|
39 | 39 | """Make a socket pre-loaded with data so it can be read during connect. |
|
40 | 40 | |
|
41 | 41 | Useful for https proxy tests because we have to read from the |
|
42 | 42 | socket during _connect rather than later on. |
|
43 | 43 | """ |
|
44 | 44 | def s(*args, **kwargs): |
|
45 | 45 | sock = util.MockSocket(*args, **kwargs) |
|
46 | sock.data = data[:] | |
|
46 | sock.early_data = data[:] | |
|
47 | 47 | return sock |
|
48 | 48 | return s |
|
49 | 49 | |
|
50 | 50 | |
|
51 | 51 | class ProxyHttpTest(util.HttpTestBase, unittest.TestCase): |
|
52 | 52 | |
|
53 | 53 | def _run_simple_test(self, host, server_data, expected_req, expected_data): |
|
54 | 54 | con = http.HTTPConnection(host) |
|
55 | 55 | con._connect() |
|
56 | 56 | con.sock.data = server_data |
|
57 | 57 | con.request('GET', '/') |
|
58 | 58 | |
|
59 | 59 | self.assertEqual(expected_req, con.sock.sent) |
|
60 | 60 | self.assertEqual(expected_data, con.getresponse().read()) |
|
61 | 61 | |
|
62 | 62 | def testSimpleRequest(self): |
|
63 | 63 | con = http.HTTPConnection('1.2.3.4:80', |
|
64 | 64 | proxy_hostport=('magicproxy', 4242)) |
|
65 | 65 | con._connect() |
|
66 | 66 | con.sock.data = ['HTTP/1.1 200 OK\r\n', |
|
67 | 67 | 'Server: BogusServer 1.0\r\n', |
|
68 | 68 | 'MultiHeader: Value\r\n' |
|
69 | 69 | 'MultiHeader: Other Value\r\n' |
|
70 | 70 | 'MultiHeader: One More!\r\n' |
|
71 | 71 | 'Content-Length: 10\r\n', |
|
72 | 72 | '\r\n' |
|
73 | 73 | '1234567890' |
|
74 | 74 | ] |
|
75 | 75 | con.request('GET', '/') |
|
76 | 76 | |
|
77 | 77 | expected_req = ('GET http://1.2.3.4/ HTTP/1.1\r\n' |
|
78 | 78 | 'Host: 1.2.3.4\r\n' |
|
79 | 79 | 'accept-encoding: identity\r\n\r\n') |
|
80 | 80 | |
|
81 | 81 | self.assertEqual(('127.0.0.42', 4242), con.sock.sa) |
|
82 | 82 | self.assertStringEqual(expected_req, con.sock.sent) |
|
83 | 83 | resp = con.getresponse() |
|
84 | 84 | self.assertEqual('1234567890', resp.read()) |
|
85 | 85 | self.assertEqual(['Value', 'Other Value', 'One More!'], |
|
86 | 86 | resp.headers.getheaders('multiheader')) |
|
87 | 87 | self.assertEqual(['BogusServer 1.0'], |
|
88 | 88 | resp.headers.getheaders('server')) |
|
89 | 89 | |
|
90 | 90 | def testSSLRequest(self): |
|
91 | 91 | con = http.HTTPConnection('1.2.3.4:443', |
|
92 | 92 | proxy_hostport=('magicproxy', 4242)) |
|
93 | 93 | socket.socket = make_preloaded_socket( |
|
94 | 94 | ['HTTP/1.1 200 OK\r\n', |
|
95 | 95 | 'Server: BogusServer 1.0\r\n', |
|
96 | 96 | 'Content-Length: 10\r\n', |
|
97 | 97 | '\r\n' |
|
98 | 98 | '1234567890']) |
|
99 | 99 | con._connect() |
|
100 |
con.sock.data |
|
|
101 |
|
|
|
102 |
|
|
|
103 |
|
|
|
104 |
|
|
|
105 |
|
|
|
100 | con.sock.data = ['HTTP/1.1 200 OK\r\n', | |
|
101 | 'Server: BogusServer 1.0\r\n', | |
|
102 | 'Content-Length: 10\r\n', | |
|
103 | '\r\n' | |
|
104 | '1234567890' | |
|
105 | ] | |
|
106 | connect_sent = con.sock.sent | |
|
107 | con.sock.sent = '' | |
|
106 | 108 | con.request('GET', '/') |
|
107 | 109 | |
|
108 |
expected_ |
|
|
109 | 'Host: 1.2.3.4\r\n' | |
|
110 | 'accept-encoding: identity\r\n' | |
|
111 | '\r\n' | |
|
112 |
|
|
|
113 | 'Host: 1.2.3.4\r\n' | |
|
114 | 'accept-encoding: identity\r\n\r\n') | |
|
110 | expected_connect = ('CONNECT 1.2.3.4:443 HTTP/1.0\r\n' | |
|
111 | 'Host: 1.2.3.4\r\n' | |
|
112 | 'accept-encoding: identity\r\n' | |
|
113 | '\r\n') | |
|
114 | expected_request = ('GET / HTTP/1.1\r\n' | |
|
115 | 'Host: 1.2.3.4\r\n' | |
|
116 | 'accept-encoding: identity\r\n\r\n') | |
|
115 | 117 | |
|
116 | 118 | self.assertEqual(('127.0.0.42', 4242), con.sock.sa) |
|
117 |
self.assertStringEqual(expected_ |
|
|
119 | self.assertStringEqual(expected_connect, connect_sent) | |
|
120 | self.assertStringEqual(expected_request, con.sock.sent) | |
|
118 | 121 | resp = con.getresponse() |
|
119 | 122 | self.assertEqual(resp.status, 200) |
|
120 | 123 | self.assertEqual('1234567890', resp.read()) |
|
121 | 124 | self.assertEqual(['BogusServer 1.0'], |
|
122 | 125 | resp.headers.getheaders('server')) |
|
123 | 126 | |
|
124 | 127 | def testSSLProxyFailure(self): |
|
125 | 128 | con = http.HTTPConnection('1.2.3.4:443', |
|
126 | 129 | proxy_hostport=('magicproxy', 4242)) |
|
127 | 130 | socket.socket = make_preloaded_socket( |
|
128 | 131 | ['HTTP/1.1 407 Proxy Authentication Required\r\n\r\n']) |
|
129 | 132 | self.assertRaises(http.HTTPProxyConnectFailedException, con._connect) |
|
130 | 133 | self.assertRaises(http.HTTPProxyConnectFailedException, |
|
131 | 134 | con.request, 'GET', '/') |
|
132 | 135 | # no-check-code |
@@ -1,94 +1,93 | |||
|
1 | 1 | # Copyright 2011, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | 29 | import unittest |
|
30 | 30 | |
|
31 | 31 | import http |
|
32 | 32 | |
|
33 | 33 | # relative import to ease embedding the library |
|
34 | 34 | import util |
|
35 | 35 | |
|
36 | 36 | |
|
37 | 37 | |
|
38 | 38 | class HttpSslTest(util.HttpTestBase, unittest.TestCase): |
|
39 | 39 | def testSslRereadRequired(self): |
|
40 | 40 | con = http.HTTPConnection('1.2.3.4:443') |
|
41 | 41 | con._connect() |
|
42 | 42 | # extend the list instead of assign because of how |
|
43 | 43 | # MockSSLSocket works. |
|
44 |
con.sock.data |
|
|
45 |
|
|
|
46 |
|
|
|
47 |
|
|
|
48 |
|
|
|
49 |
|
|
|
50 |
|
|
|
51 |
|
|
|
52 |
|
|
|
44 | con.sock.data = ['HTTP/1.1 200 OK\r\n', | |
|
45 | 'Server: BogusServer 1.0\r\n', | |
|
46 | 'MultiHeader: Value\r\n' | |
|
47 | 'MultiHeader: Other Value\r\n' | |
|
48 | 'MultiHeader: One More!\r\n' | |
|
49 | 'Content-Length: 10\r\n', | |
|
50 | '\r\n' | |
|
51 | '1234567890' | |
|
52 | ] | |
|
53 | 53 | con.request('GET', '/') |
|
54 | 54 | |
|
55 | 55 | expected_req = ('GET / HTTP/1.1\r\n' |
|
56 | 56 | 'Host: 1.2.3.4\r\n' |
|
57 | 57 | 'accept-encoding: identity\r\n\r\n') |
|
58 | 58 | |
|
59 | 59 | self.assertEqual(('1.2.3.4', 443), con.sock.sa) |
|
60 | 60 | self.assertEqual(expected_req, con.sock.sent) |
|
61 | 61 | resp = con.getresponse() |
|
62 | 62 | self.assertEqual('1234567890', resp.read()) |
|
63 | 63 | self.assertEqual(['Value', 'Other Value', 'One More!'], |
|
64 | 64 | resp.headers.getheaders('multiheader')) |
|
65 | 65 | self.assertEqual(['BogusServer 1.0'], |
|
66 | 66 | resp.headers.getheaders('server')) |
|
67 | 67 | |
|
68 | 68 | def testSslRereadInEarlyResponse(self): |
|
69 | 69 | con = http.HTTPConnection('1.2.3.4:443') |
|
70 | 70 | con._connect() |
|
71 | # extend the list instead of assign because of how | |
|
72 | # MockSSLSocket works. | |
|
73 | con.sock.early_data.extend(['HTTP/1.1 200 OK\r\n', | |
|
74 |
|
|
|
75 |
|
|
|
76 |
|
|
|
77 |
|
|
|
78 |
|
|
|
79 |
|
|
|
80 | '1234567890' | |
|
81 | ]) | |
|
71 | con.sock.early_data = ['HTTP/1.1 200 OK\r\n', | |
|
72 | 'Server: BogusServer 1.0\r\n', | |
|
73 | 'MultiHeader: Value\r\n' | |
|
74 | 'MultiHeader: Other Value\r\n' | |
|
75 | 'MultiHeader: One More!\r\n' | |
|
76 | 'Content-Length: 10\r\n', | |
|
77 | '\r\n' | |
|
78 | '1234567890' | |
|
79 | ] | |
|
82 | 80 | |
|
83 | 81 | expected_req = self.doPost(con, False) |
|
84 | 82 | self.assertEqual(None, con.sock, |
|
85 | 83 | 'Connection should have disowned socket') |
|
86 | 84 | |
|
87 | 85 | resp = con.getresponse() |
|
88 | 86 | self.assertEqual(('1.2.3.4', 443), resp.sock.sa) |
|
89 | 87 | self.assertEqual(expected_req, resp.sock.sent) |
|
90 | 88 | self.assertEqual('1234567890', resp.read()) |
|
91 | 89 | self.assertEqual(['Value', 'Other Value', 'One More!'], |
|
92 | 90 | resp.headers.getheaders('multiheader')) |
|
93 | 91 | self.assertEqual(['BogusServer 1.0'], |
|
94 | 92 | resp.headers.getheaders('server')) |
|
93 | # no-check-code |
@@ -1,190 +1,195 | |||
|
1 | 1 | # Copyright 2010, Google Inc. |
|
2 | 2 | # All rights reserved. |
|
3 | 3 | # |
|
4 | 4 | # Redistribution and use in source and binary forms, with or without |
|
5 | 5 | # modification, are permitted provided that the following conditions are |
|
6 | 6 | # met: |
|
7 | 7 | # |
|
8 | 8 | # * Redistributions of source code must retain the above copyright |
|
9 | 9 | # notice, this list of conditions and the following disclaimer. |
|
10 | 10 | # * Redistributions in binary form must reproduce the above |
|
11 | 11 | # copyright notice, this list of conditions and the following disclaimer |
|
12 | 12 | # in the documentation and/or other materials provided with the |
|
13 | 13 | # distribution. |
|
14 | 14 | # * Neither the name of Google Inc. nor the names of its |
|
15 | 15 | # contributors may be used to endorse or promote products derived from |
|
16 | 16 | # this software without specific prior written permission. |
|
17 | 17 | |
|
18 | 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
19 | 19 | # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
20 | 20 | # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
21 | 21 | # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
22 | 22 | # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
23 | 23 | # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
24 | 24 | # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
25 | 25 | # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
26 | 26 | # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
27 | 27 | # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
28 | 28 | # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
29 | 29 | import difflib |
|
30 | 30 | import socket |
|
31 | 31 | |
|
32 | 32 | import http |
|
33 | 33 | |
|
34 | 34 | |
|
35 | 35 | class MockSocket(object): |
|
36 | 36 | """Mock non-blocking socket object. |
|
37 | 37 | |
|
38 | 38 | This is ONLY capable of mocking a nonblocking socket. |
|
39 | 39 | |
|
40 | 40 | Attributes: |
|
41 | 41 | early_data: data to always send as soon as end of headers is seen |
|
42 | 42 | data: a list of strings to return on recv(), with the |
|
43 | 43 | assumption that the socket would block between each |
|
44 | 44 | string in the list. |
|
45 | 45 | read_wait_sentinel: data that must be written to the socket before |
|
46 | 46 | beginning the response. |
|
47 | 47 | close_on_empty: If true, close the socket when it runs out of data |
|
48 | 48 | for the client. |
|
49 | 49 | """ |
|
50 | 50 | def __init__(self, af, socktype, proto): |
|
51 | 51 | self.af = af |
|
52 | 52 | self.socktype = socktype |
|
53 | 53 | self.proto = proto |
|
54 | 54 | |
|
55 | 55 | self.early_data = [] |
|
56 | 56 | self.data = [] |
|
57 | 57 | self.remote_closed = self.closed = False |
|
58 | 58 | self.close_on_empty = False |
|
59 | 59 | self.sent = '' |
|
60 | 60 | self.read_wait_sentinel = http._END_HEADERS |
|
61 | 61 | |
|
62 | 62 | def close(self): |
|
63 | 63 | self.closed = True |
|
64 | 64 | |
|
65 | 65 | def connect(self, sa): |
|
66 | 66 | self.sa = sa |
|
67 | 67 | |
|
68 | 68 | def setblocking(self, timeout): |
|
69 | 69 | assert timeout == 0 |
|
70 | 70 | |
|
71 | 71 | def recv(self, amt=-1): |
|
72 | 72 | if self.early_data: |
|
73 | 73 | datalist = self.early_data |
|
74 | 74 | elif not self.data: |
|
75 | 75 | return '' |
|
76 | 76 | else: |
|
77 | 77 | datalist = self.data |
|
78 | 78 | if amt == -1: |
|
79 | 79 | return datalist.pop(0) |
|
80 | 80 | data = datalist.pop(0) |
|
81 | 81 | if len(data) > amt: |
|
82 | 82 | datalist.insert(0, data[amt:]) |
|
83 | 83 | if not self.data and not self.early_data and self.close_on_empty: |
|
84 | 84 | self.remote_closed = True |
|
85 | 85 | return data[:amt] |
|
86 | 86 | |
|
87 | 87 | @property |
|
88 | 88 | def ready_for_read(self): |
|
89 | 89 | return ((self.early_data and http._END_HEADERS in self.sent) |
|
90 | 90 | or (self.read_wait_sentinel in self.sent and self.data) |
|
91 | or self.closed) | |
|
91 | or self.closed or self.remote_closed) | |
|
92 | 92 | |
|
93 | 93 | def send(self, data): |
|
94 | 94 | # this is a horrible mock, but nothing needs us to raise the |
|
95 | 95 | # correct exception yet |
|
96 | 96 | assert not self.closed, 'attempted to write to a closed socket' |
|
97 | 97 | assert not self.remote_closed, ('attempted to write to a' |
|
98 | 98 | ' socket closed by the server') |
|
99 | 99 | if len(data) > 8192: |
|
100 | 100 | data = data[:8192] |
|
101 | 101 | self.sent += data |
|
102 | 102 | return len(data) |
|
103 | 103 | |
|
104 | 104 | |
|
105 | 105 | def mockselect(r, w, x, timeout=0): |
|
106 | 106 | """Simple mock for select() |
|
107 | 107 | """ |
|
108 | 108 | readable = filter(lambda s: s.ready_for_read, r) |
|
109 | 109 | return readable, w[:], [] |
|
110 | 110 | |
|
111 | 111 | |
|
112 | 112 | class MockSSLSocket(object): |
|
113 | 113 | def __init__(self, sock): |
|
114 | 114 | self._sock = sock |
|
115 | 115 | self._fail_recv = True |
|
116 | 116 | |
|
117 | 117 | def __getattr__(self, key): |
|
118 | 118 | return getattr(self._sock, key) |
|
119 | 119 | |
|
120 | def __setattr__(self, key, value): | |
|
121 | if key not in ('_sock', '_fail_recv'): | |
|
122 | return setattr(self._sock, key, value) | |
|
123 | return object.__setattr__(self, key, value) | |
|
124 | ||
|
120 | 125 | def recv(self, amt=-1): |
|
121 | 126 | try: |
|
122 | 127 | if self._fail_recv: |
|
123 | 128 | raise socket.sslerror(socket.SSL_ERROR_WANT_READ) |
|
124 | 129 | return self._sock.recv(amt=amt) |
|
125 | 130 | finally: |
|
126 | 131 | self._fail_recv = not self._fail_recv |
|
127 | 132 | |
|
128 | 133 | |
|
129 | 134 | def mocksslwrap(sock, keyfile=None, certfile=None, |
|
130 | 135 | server_side=False, cert_reqs=http.socketutil.CERT_NONE, |
|
131 | 136 | ssl_version=http.socketutil.PROTOCOL_SSLv23, ca_certs=None, |
|
132 | 137 | do_handshake_on_connect=True, |
|
133 | 138 | suppress_ragged_eofs=True): |
|
134 | 139 | return MockSSLSocket(sock) |
|
135 | 140 | |
|
136 | 141 | |
|
137 | 142 | def mockgetaddrinfo(host, port, unused, streamtype): |
|
138 | 143 | assert unused == 0 |
|
139 | 144 | assert streamtype == socket.SOCK_STREAM |
|
140 | 145 | if host.count('.') != 3: |
|
141 | 146 | host = '127.0.0.42' |
|
142 | 147 | return [(socket.AF_INET, socket.SOCK_STREAM, socket.IPPROTO_TCP, '', |
|
143 | 148 | (host, port))] |
|
144 | 149 | |
|
145 | 150 | |
|
146 | 151 | class HttpTestBase(object): |
|
147 | 152 | def setUp(self): |
|
148 | 153 | self.orig_socket = socket.socket |
|
149 | 154 | socket.socket = MockSocket |
|
150 | 155 | |
|
151 | 156 | self.orig_getaddrinfo = socket.getaddrinfo |
|
152 | 157 | socket.getaddrinfo = mockgetaddrinfo |
|
153 | 158 | |
|
154 | 159 | self.orig_select = http.select.select |
|
155 | 160 | http.select.select = mockselect |
|
156 | 161 | |
|
157 | 162 | self.orig_sslwrap = http.socketutil.wrap_socket |
|
158 | 163 | http.socketutil.wrap_socket = mocksslwrap |
|
159 | 164 | |
|
160 | 165 | def tearDown(self): |
|
161 | 166 | socket.socket = self.orig_socket |
|
162 | 167 | http.select.select = self.orig_select |
|
163 | 168 | http.socketutil.wrap_socket = self.orig_sslwrap |
|
164 | 169 | socket.getaddrinfo = self.orig_getaddrinfo |
|
165 | 170 | |
|
166 | 171 | def assertStringEqual(self, l, r): |
|
167 | 172 | try: |
|
168 | 173 | self.assertEqual(l, r, ('failed string equality check, ' |
|
169 | 174 | 'see stdout for details')) |
|
170 | 175 | except: |
|
171 | 176 | add_nl = lambda li: map(lambda x: x + '\n', li) |
|
172 | 177 | print 'failed expectation:' |
|
173 | 178 | print ''.join(difflib.unified_diff( |
|
174 | 179 | add_nl(l.splitlines()), add_nl(r.splitlines()), |
|
175 | 180 | fromfile='expected', tofile='got')) |
|
176 | 181 | raise |
|
177 | 182 | |
|
178 | 183 | def doPost(self, con, expect_body, body_to_send='This is some POST data'): |
|
179 | 184 | con.request('POST', '/', body=body_to_send, |
|
180 | 185 | expect_continue=True) |
|
181 | 186 | expected_req = ('POST / HTTP/1.1\r\n' |
|
182 | 187 | 'Host: 1.2.3.4\r\n' |
|
183 | 188 | 'content-length: %d\r\n' |
|
184 | 189 | 'Expect: 100-Continue\r\n' |
|
185 | 190 | 'accept-encoding: identity\r\n\r\n' % |
|
186 | 191 | len(body_to_send)) |
|
187 | 192 | if expect_body: |
|
188 | 193 | expected_req += body_to_send |
|
189 | 194 | return expected_req |
|
190 | 195 | # no-check-code |
General Comments 0
You need to be logged in to leave comments.
Login now