2021-01-18 23:36:50 +00:00
|
|
|
from inspect import isclass
|
2020-09-30 14:44:09 +01:00
|
|
|
from os import environ
|
2021-01-18 23:36:50 +00:00
|
|
|
from pathlib import Path
|
2020-09-30 14:44:09 +01:00
|
|
|
from typing import Any, Union
|
2019-01-02 00:35:25 +00:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
from .utils import load_module_from_file_location, str_to_bool
|
2018-10-03 13:27:59 +01:00
|
|
|
|
2016-12-16 15:07:14 +00:00
|
|
|
|
2018-10-14 01:55:33 +01:00
|
|
|
SANIC_PREFIX = "SANIC_"
|
2018-12-30 10:22:27 +00:00
|
|
|
BASE_LOGO = """
|
|
|
|
|
|
|
|
Sanic
|
|
|
|
Build Fast. Run Fast.
|
|
|
|
|
|
|
|
"""
|
2017-03-29 04:57:58 +01:00
|
|
|
|
2018-12-30 18:37:30 +00:00
|
|
|
DEFAULT_CONFIG = {
|
|
|
|
"REQUEST_MAX_SIZE": 100000000, # 100 megabytes
|
|
|
|
"REQUEST_BUFFER_QUEUE_SIZE": 100,
|
Streaming Server (#1876)
* Streaming request by async for.
* Make all requests streaming and preload body for non-streaming handlers.
* Cleanup of code and avoid mixing streaming responses.
* Async http protocol loop.
* Change of test: don't require early bad request error but only after CRLF-CRLF.
* Add back streaming requests.
* Rewritten request body parser.
* Misc. cleanup, down to 4 failing tests.
* All tests OK.
* Entirely remove request body queue.
* Let black f*ckup the layout
* Better testing error messages on protocol errors.
* Remove StreamBuffer tests because the type is about to be removed.
* Remove tests using the deprecated get_headers function that can no longer be supported. Chunked mode is now autodetected, so do not put content-length header if chunked mode is preferred.
* Major refactoring of HTTP protocol handling (new module http.py added), all requests made streaming. A few compatibility issues and a lot of cleanup to be done remain, 16 tests failing.
* Terminate check_timeouts once connection_task finishes.
* Code cleanup, 14 tests failing.
* Much cleanup, 12 failing...
* Even more cleanup and error checking, 8 failing tests.
* Remove keep-alive header from responses. First of all, it should say timeout=<value> which wasn't the case with existing implementation, and secondly none of the other web servers I tried include this header.
* Everything but CustomServer OK.
* Linter
* Disable custom protocol test
* Remove unnecessary variables, optimise performance.
* A test was missing that body_init/body_push/body_finish are never called. Rewritten using receive_body and case switching to make it fail if bypassed.
* Minor fixes.
* Remove unused code.
* Py 3.8 check for deprecated loop argument.
* Fix a middleware cancellation handling test with py38.
* Linter 'n fixes
* Typing
* Stricter handling of request header size
* More specific error messages on Payload Too Large.
* Init http.response = None
* Messages further tuned.
* Always try to consume request body, plus minor cleanup.
* Add a missing check in case of close_if_idle on a dead connection.
* Avoid error messages on PayloadTooLarge.
* Add test for new API.
* json takes str, not bytes
* Default to no maximum request size for streaming handlers.
* Fix chunked mode crash.
* Header values should be strictly ASCII but both UTF-8 and Latin-1 exist. Use UTF-8B to
cope with all.
* Refactoring and cleanup.
* Unify response header processing of ASGI and asyncio modes.
* Avoid special handling of StreamingHTTPResponse.
* 35 % speedup in HTTP/1.1 response formatting (not so much overall effect).
* Duplicate set-cookie headers were being produced.
* Cleanup processed_headers some more.
* Linting
* Import ordering
* Response middleware ran by async request.respond().
* Need to check if transport is closing to avoid getting stuck in sending loops after peer has disconnected.
* Middleware and error handling refactoring.
* Linter
* Fix tracking of HTTP stage when writing to transport fails.
* Add clarifying comment
* Add a check for request body functions and a test for NotImplementedError.
* Linter and typing
* These must be tuples + hack mypy warnings away.
* New streaming test and minor fixes.
* Constant receive buffer size.
* 256 KiB send and receive buffers.
* Revert "256 KiB send and receive buffers."
This reverts commit abc1e3edb21a5e6925fa4c856657559608a8d65b.
* app.handle_exception already sends the response.
* Improved handling of errors during request.
* An odd hack to avoid an httpx limitation that causes test failures.
* Limit request header size to 8 KiB at most.
* Remove unnecessary use of format string.
* Cleanup tests
* Remove artifact
* Fix type checking
* Mark test for skipping
* Cleanup some edge cases
* Add ignore_body flag to safe methods
* Add unit tests for timeout logic
* Add unit tests for timeout logic
* Fix Mock usage in timeout test
* Change logging test to only logger in handler
* Windows py3.8 logging issue with current testing client
* Add test_header_size_exceeded
* Resolve merge conflicts
* Add request middleware to hard exception handling
* Add request middleware to hard exception handling
* Request middleware on exception handlers
* Linting
* Cleanup deprecations
Co-authored-by: L. Kärkkäinen <tronic@users.noreply.github.com>
Co-authored-by: Adam Hopkins <admhpkns@gmail.com>
2021-01-10 22:45:36 +00:00
|
|
|
"REQUEST_BUFFER_SIZE": 65536, # 64 KiB
|
2018-12-30 18:37:30 +00:00
|
|
|
"REQUEST_TIMEOUT": 60, # 60 seconds
|
|
|
|
"RESPONSE_TIMEOUT": 60, # 60 seconds
|
|
|
|
"KEEP_ALIVE": True,
|
|
|
|
"KEEP_ALIVE_TIMEOUT": 5, # 5 seconds
|
2020-03-14 15:57:39 +00:00
|
|
|
"WEBSOCKET_MAX_SIZE": 2 ** 20, # 1 megabyte
|
2018-12-30 18:37:30 +00:00
|
|
|
"WEBSOCKET_MAX_QUEUE": 32,
|
|
|
|
"WEBSOCKET_READ_LIMIT": 2 ** 16,
|
|
|
|
"WEBSOCKET_WRITE_LIMIT": 2 ** 16,
|
2020-08-07 04:37:59 +01:00
|
|
|
"WEBSOCKET_PING_TIMEOUT": 20,
|
|
|
|
"WEBSOCKET_PING_INTERVAL": 20,
|
2018-12-30 18:37:30 +00:00
|
|
|
"GRACEFUL_SHUTDOWN_TIMEOUT": 15.0, # 15 sec
|
|
|
|
"ACCESS_LOG": True,
|
Forwarded headers and otherwise improved proxy handling (#1638)
* Added support for HTTP Forwarded header and combined parsing of other proxy headers.
- Accessible via request.forwarded that tries parse_forwarded and then parse_xforwarded
- parse_forwarded uses the Forwarded header, if config.FORWARDED_SECRET is provided and a matching header field is found
- parse_xforwarded uses X-Real-IP and X-Forwarded-* much alike the existing implementation
- This commit does not change existing request properties that still use the old code and won't make use of Forwarded headers.
* Use req.forwarded in req properties server_name, server_port, scheme and remote_addr.
X-Scheme handling moved to parse_xforwarded.
* Cleanup and fix req.server_port; no longer reports socket port if any forwards headers are used.
* Update docstrings to incidate that forwarded header is used first.
* Remove testing function.
* Fix tests and linting.
- One test removed due to change of semantics - no socket port will be used if any forwarded headers are in effect.
- Other tests augmented with X-Forwarded-For, to allow the header being tested take effect (shouldn't affect old implementation).
* Try to workaround buggy tools complaining about incorrect ordering of imports.
* Cleanup forwarded processing, add comments. secret is now also returned.
* Added tests, fixed quoted string handling, cleanup.
* Further tests for full coverage.
* Try'n make linter happy.
* Add support for multiple Forwarded headers. Unify parse_forwarded parameters with parse_xforwarded.
* Implement multiple headers support for X-Forwarded-For.
- Previously only the first header was used, so this BUGFIX may affect functionality.
* Bugfix for request.server_name: strip port and other parts.
- request.server_name docs claim that it returns the hostname only (no port).
- config.SERVER_NAME may be full URL, so strip scheme, port and path
- HTTP Host and consequently forwarded Host may include port number, so
strip that also for forwarded hosts (previously only done for HTTP Host).
- Possible performance benefit of limiting to one split.
* Fallback to app.url_for and let it handle SERVER_NAME if defined (until a proper solution is implemented).
* Revise previous commit. Only fallback for full URL SERVER_NAMEs; allows host to be defined and proxied information still being used.
* Heil lintnazi.
* Modify testcase not to use underscores in URLs. Use hyphens which the spec allows for.
* Forwarded and Host header parsing improved.
- request.forwarded lowercases hosts, separates host:port into their own fields and lowercases addresses
- forwarded.parse_host helper function added and used for parsing all host-style headers (IPv6 cannot be simply split(":")).
- more tests fixed not to use underscores in hosts as those are no longer accepted and lead to the field being rejected
* Fixed typo in docstring.
* Added IPv6 address tests for Host header.
* Fix regex.
* Further tests and stricter forwarded handling.
* Fix merge commit
* Linter
* Linter
* Linter
* Add to avoid re-using the variable. Make a few raw strings non-raw.
* Remove unnecessary or
* Updated docs (work in progress).
* Enable REAL_IP_HEADER parsing irregardless of PROXIES_COUNT setting.
- Also cleanup and added comments
* New defaults for PROXIES_COUNT and REAL_IP_HEADER, updated tests.
* Remove support for PROXIES_COUNT=-1.
* Linter errors.
- This is getting ridiculous: cannot fit an URL on one line, linter requires
splitting the string literal!
* Add support for by=_proxySecret, updated docs, updated tests.
* Forwarded headers' semantics tuning.
- Forwarded host is now preserved in original format
- request.host now returns a forwarded host if available, else the Host header
- Forwarded options are preserved in original order, and later keys override earlier ones
- Forwarded path is automatically URL-unquoted
- Forwarded 'by' and 'for' are omitted if their value is unknown
- Tests modified accordingly
- Cleanup and improved documentation
* Add ASGI test.
* Linter
* Linter #2
2019-09-02 14:50:56 +01:00
|
|
|
"FORWARDED_SECRET": None,
|
|
|
|
"REAL_IP_HEADER": None,
|
|
|
|
"PROXIES_COUNT": None,
|
2019-04-16 14:30:28 +01:00
|
|
|
"FORWARDED_FOR_HEADER": "X-Forwarded-For",
|
2021-01-19 02:25:39 +00:00
|
|
|
"REQUEST_ID_HEADER": "X-Request-ID",
|
2020-09-30 13:11:27 +01:00
|
|
|
"FALLBACK_ERROR_FORMAT": "html",
|
2021-01-05 14:57:35 +00:00
|
|
|
"REGISTER": True,
|
2018-12-30 18:37:30 +00:00
|
|
|
}
|
|
|
|
|
2017-04-12 10:44:47 +01:00
|
|
|
|
2016-12-16 15:07:14 +00:00
|
|
|
class Config(dict):
|
2018-12-30 18:37:30 +00:00
|
|
|
def __init__(self, defaults=None, load_env=True, keep_alive=None):
|
2018-12-30 21:56:02 +00:00
|
|
|
defaults = defaults or {}
|
|
|
|
super().__init__({**DEFAULT_CONFIG, **defaults})
|
2018-12-30 18:37:30 +00:00
|
|
|
|
2018-12-30 10:22:27 +00:00
|
|
|
self.LOGO = BASE_LOGO
|
2018-12-30 18:37:30 +00:00
|
|
|
|
|
|
|
if keep_alive is not None:
|
|
|
|
self.KEEP_ALIVE = keep_alive
|
2016-12-16 15:07:14 +00:00
|
|
|
|
2017-03-22 01:37:46 +00:00
|
|
|
if load_env:
|
2017-09-05 10:05:31 +01:00
|
|
|
prefix = SANIC_PREFIX if load_env is True else load_env
|
2017-09-05 09:58:48 +01:00
|
|
|
self.load_environment_vars(prefix=prefix)
|
2017-03-22 01:37:46 +00:00
|
|
|
|
2016-12-16 15:07:14 +00:00
|
|
|
def __getattr__(self, attr):
|
2016-12-16 17:46:07 +00:00
|
|
|
try:
|
|
|
|
return self[attr]
|
|
|
|
except KeyError as ke:
|
2020-04-06 20:45:25 +01:00
|
|
|
raise AttributeError(f"Config has no '{ke.args[0]}'")
|
2016-12-16 15:07:14 +00:00
|
|
|
|
|
|
|
def __setattr__(self, attr, value):
|
|
|
|
self[attr] = value
|
|
|
|
|
2017-09-05 08:53:33 +01:00
|
|
|
def load_environment_vars(self, prefix=SANIC_PREFIX):
|
2017-04-17 05:39:18 +01:00
|
|
|
"""
|
2017-09-05 08:53:33 +01:00
|
|
|
Looks for prefixed environment variables and applies
|
2021-01-29 14:19:10 +00:00
|
|
|
them to the configuration if present. This is called automatically when
|
|
|
|
Sanic starts up to load environment variables into config.
|
|
|
|
|
|
|
|
It will automatically hyrdate the following types:
|
|
|
|
|
|
|
|
- ``int``
|
|
|
|
- ``float``
|
|
|
|
- ``bool``
|
|
|
|
|
|
|
|
Anything else will be imported as a ``str``.
|
2017-04-17 05:39:18 +01:00
|
|
|
"""
|
2020-09-30 14:44:09 +01:00
|
|
|
for k, v in environ.items():
|
2017-09-05 08:53:33 +01:00
|
|
|
if k.startswith(prefix):
|
|
|
|
_, config_key = k.split(prefix, 1)
|
2017-06-27 05:26:34 +01:00
|
|
|
try:
|
|
|
|
self[config_key] = int(v)
|
|
|
|
except ValueError:
|
|
|
|
try:
|
2017-06-27 04:58:31 +01:00
|
|
|
self[config_key] = float(v)
|
2017-06-27 05:26:34 +01:00
|
|
|
except ValueError:
|
2019-01-01 22:58:59 +00:00
|
|
|
try:
|
2020-09-30 14:44:09 +01:00
|
|
|
self[config_key] = str_to_bool(v)
|
2019-01-01 22:58:59 +00:00
|
|
|
except ValueError:
|
2018-12-30 18:37:30 +00:00
|
|
|
self[config_key] = v
|
2019-04-02 14:22:26 +01:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
def update_config(self, config: Union[bytes, str, dict, Any]):
|
2021-01-18 23:36:50 +00:00
|
|
|
"""
|
|
|
|
Update app.config.
|
2020-09-30 14:44:09 +01:00
|
|
|
|
2021-01-29 14:19:10 +00:00
|
|
|
.. note::
|
|
|
|
|
|
|
|
Only upper case settings are considered
|
2020-09-30 14:44:09 +01:00
|
|
|
|
|
|
|
You can upload app config by providing path to py file
|
|
|
|
holding settings.
|
|
|
|
|
2021-01-18 23:36:50 +00:00
|
|
|
.. code-block:: python
|
2021-01-18 11:21:37 +00:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
# /some/py/file
|
|
|
|
A = 1
|
|
|
|
B = 2
|
|
|
|
|
2021-01-18 23:36:50 +00:00
|
|
|
.. code-block:: python
|
|
|
|
|
|
|
|
config.update_config("${some}/py/file")
|
2020-09-30 14:44:09 +01:00
|
|
|
|
|
|
|
Yes you can put environment variable here, but they must be provided
|
2021-02-21 19:29:41 +00:00
|
|
|
in format: ``${some_env_var}``, and mark that ``$some_env_var`` is
|
|
|
|
treated as plain string.
|
2020-09-30 14:44:09 +01:00
|
|
|
|
|
|
|
You can upload app config by providing dict holding settings.
|
|
|
|
|
2021-01-18 23:36:50 +00:00
|
|
|
.. code-block:: python
|
2021-01-18 11:21:37 +00:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
d = {"A": 1, "B": 2}
|
|
|
|
config.update_config(d)
|
|
|
|
|
|
|
|
You can upload app config by providing any object holding settings,
|
|
|
|
but in such case config.__dict__ will be used as dict holding settings.
|
|
|
|
|
2021-01-18 23:36:50 +00:00
|
|
|
.. code-block:: python
|
2021-01-18 11:21:37 +00:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
class C:
|
|
|
|
A = 1
|
|
|
|
B = 2
|
|
|
|
|
2021-01-18 23:36:50 +00:00
|
|
|
config.update_config(C)
|
2021-01-29 14:19:10 +00:00
|
|
|
|
2021-02-21 19:29:41 +00:00
|
|
|
`See user guide
|
|
|
|
<https://sanicframework.org/guide/deployment/configuration.html>`__
|
2021-01-18 23:36:50 +00:00
|
|
|
"""
|
|
|
|
|
|
|
|
if isinstance(config, (bytes, str, Path)):
|
2020-09-30 14:44:09 +01:00
|
|
|
config = load_module_from_file_location(location=config)
|
|
|
|
|
|
|
|
if not isinstance(config, dict):
|
2021-01-18 23:36:50 +00:00
|
|
|
cfg = {}
|
|
|
|
if not isclass(config):
|
|
|
|
cfg.update(
|
|
|
|
{
|
|
|
|
key: getattr(config, key)
|
|
|
|
for key in config.__class__.__dict__.keys()
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
config = dict(config.__dict__)
|
|
|
|
config.update(cfg)
|
2020-09-30 14:44:09 +01:00
|
|
|
|
|
|
|
config = dict(filter(lambda i: i[0].isupper(), config.items()))
|
2019-04-02 14:22:26 +01:00
|
|
|
|
2020-09-30 14:44:09 +01:00
|
|
|
self.update(config)
|
2021-01-18 23:36:50 +00:00
|
|
|
|
|
|
|
load = update_config
|