crawler.py 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. from flask import escape, json
  2. import requests
  3. import io
  4. import cgi
  5. from ispformat.validator import validate_isp
  6. from .models import ISP
  7. def get_encoding(content_type):
  8. content_type, params = cgi.parse_header(content_type)
  9. if 'charset' in params:
  10. return params['charset'].strip("'\"")
  11. class Crawler(object):
  12. MAX_JSON_SIZE=1*1024*1024
  13. escape=staticmethod(lambda x:x)
  14. def m(self, msg, evt=None):
  15. if not evt:
  16. return u'%s\n'%msg
  17. else:
  18. return u''
  19. def err(self, msg, *args):
  20. return self.m(u'! %s'%msg, *args)
  21. def warn(self, msg):
  22. return self.m(u'@ %s'%msg)
  23. def info(self, msg):
  24. return self.m(u'\u2013 %s'%msg)
  25. def abort(self, msg):
  26. raise NotImplemented
  27. def color(self, color, msg):
  28. return msg
  29. def bold(self, msg):
  30. return msg
  31. def italics(self, msg):
  32. return msg
  33. def nl(self):
  34. return self.m('')
  35. def format_validation_errors(self, errs):
  36. r=[]
  37. for e in errs:
  38. r.append(u' %s: %s'%('.'.join(list(e.schema_path)[1:]), e.message))
  39. return u'\n'.join(r)
  40. def pre_done_cb(self, *args):
  41. pass
  42. def done_cb(self):
  43. pass
  44. def __call__(self, url):
  45. esc=self.escape
  46. yield self.m('Starting the validation process...')
  47. r=None
  48. try:
  49. yield self.m('* Attempting to retreive %s'%self.bold(url))
  50. r=requests.get(url, verify='/etc/ssl/certs/ca-certificates.crt',
  51. headers={'User-Agent': 'FFDN DB validator'},
  52. stream=True, timeout=10)
  53. except requests.exceptions.SSLError as e:
  54. yield self.err('Unable to connect, SSL Error: '+self.color('#dd1144', esc(e)))
  55. except requests.exceptions.ConnectionError as e:
  56. yield self.err('Unable to connect: '+self.color('#dd1144', esc(e)))
  57. except requests.exceptions.Timeout as e:
  58. yield self.err('Connection timeout')
  59. except requests.exceptions.TooManyRedirects as e:
  60. yield self.err('Too many redirects')
  61. except requests.exceptions.RequestException as e:
  62. yield self.err('Internal request exception')
  63. except Exception as e:
  64. yield self.err('Unexpected request exception')
  65. if r is None:
  66. yield self.abort('Connection could not be established, aborting')
  67. return
  68. yield self.info('Connection established')
  69. yield self.info('Response code: '+self.bold(str(r.status_code)+' '+esc(r.reason)))
  70. try:
  71. r.raise_for_status()
  72. except requests.exceptions.HTTPError as e:
  73. yield self.err('Response code indicates an error')
  74. yield self.abort('Invalid response code')
  75. return
  76. yield self.info('Content type: '+self.bold(esc(r.headers.get('content-type', 'not defined'))))
  77. if not r.headers.get('content-type'):
  78. yield self.error('Content-type '+self.bold('MUST')+' be defined')
  79. yield self.abort('The file must have a proper content-type to continue')
  80. elif r.headers.get('content-type').lower() != 'application/json':
  81. yield self.warn('Content-type '+self.italics('SHOULD')+' be application/json')
  82. encoding=get_encoding(r.headers.get('content-type'))
  83. if not encoding:
  84. yield self.warn('Encoding not set. Assuming it\'s unicode, as per RFC4627 section 3')
  85. yield self.info('Content length: %s'%(self.bold(esc(r.headers.get('content-length', 'not set')))))
  86. cl=r.headers.get('content-length')
  87. if not cl:
  88. yield self.warn('No content-length. Note that we will not process a file whose size exceed 1MiB')
  89. elif int(cl) > self.MAX_JSON_SIZE:
  90. yield self.abort('File too big ! File size must be less then 1MiB')
  91. yield self.info('Reading response into memory...')
  92. b=io.BytesIO()
  93. for d in r.iter_content(requests.models.CONTENT_CHUNK_SIZE):
  94. b.write(d)
  95. if b.tell() > self.MAX_JSON_SIZE:
  96. yield self.abort('File too big ! File size must be less then 1MiB')
  97. return
  98. r._content=b.getvalue()
  99. del b
  100. yield self.info('Successfully read %d bytes'%len(r.content))
  101. yield self.nl()+self.m('* Parsing the JSON file')
  102. if not encoding:
  103. charset=requests.utils.guess_json_utf(r.content)
  104. if not charset:
  105. yield self.err('Unable to guess unicode charset')
  106. yield self.abort('The file MUST be unicode-encoded when no explicit charset is in the content-type')
  107. return
  108. yield self.info('Guessed charset: '+self.bold(charset))
  109. try:
  110. txt=r.content.decode(encoding or charset)
  111. yield self.info('Successfully decoded file as %s'%esc(encoding or charset))
  112. except LookupError as e:
  113. yield self.err('Invalid/unknown charset: %s'%esc(e))
  114. yield self.abort('Charset error, Cannot continue')
  115. return
  116. except UnicodeDecodeError as e:
  117. yield self.err('Unicode decode error: %s'%e)
  118. yield self.abort('Charset error, cannot continue')
  119. return
  120. except Exception:
  121. yield self.abort('Unexpected charset error')
  122. return
  123. jdict=None
  124. try:
  125. jdict=json.loads(txt)
  126. except ValueError as e:
  127. yield self.err('Error while parsing JSON: %s'%esc(e))
  128. except Exception as e:
  129. yield self.err('Unexpected error while parsing JSON: %s'%esc(e))
  130. if not jdict:
  131. yield self.abort('Could not parse JSON')
  132. return
  133. yield self.info('JSON parsed successfully')
  134. yield self.nl()+self.m('* Validating the JSON against the schema')
  135. v=list(validate_isp(jdict))
  136. if v:
  137. yield self.err('Validation errors:')+self.format_validation_errors(v)
  138. yield self.abort('Your JSON file does not follow the schema, please fix it')
  139. return
  140. else:
  141. yield self.info('Done. No errors encountered \o')
  142. ret=self.pre_done_cb(jdict)
  143. if ret:
  144. yield ret
  145. return
  146. yield (self.nl()+self.m('== '+self.color('forestgreen', 'All good ! You can click on Confirm now'))+
  147. self.m(json.dumps({'passed': 1}), 'control'))
  148. self.jdict=jdict
  149. self.done_cb()
  150. class PrettyValidator(Crawler):
  151. def __init__(self, session=None, *args, **kwargs):
  152. super(PrettyValidator, self).__init__(*args, **kwargs)
  153. self.session=session
  154. self.escape=escape
  155. def m(self, msg, evt=None):
  156. return u'%sdata: %s\n\n'%(u'event: %s\n'%evt if evt else '', msg)
  157. def err(self, msg, *args):
  158. return self.m(u'<strong style="color: crimson">!</strong> %s'%msg, *args)
  159. def warn(self, msg):
  160. return self.m(u'<strong style="color: dodgerblue">@</strong> %s'%msg)
  161. def info(self, msg):
  162. return self.m(u'&ndash; %s'%msg)
  163. def abort(self, msg):
  164. return (self.m(u'<br />== <span style="color: crimson">%s</span>'%msg)+
  165. self.m(json.dumps({'closed': 1}), 'control'))
  166. def bold(self, msg):
  167. return u'<strong>%s</strong>'%msg
  168. def italics(self, msg):
  169. return u'<em>%s</em>'%msg
  170. def color(self, color, msg):
  171. return u'<span style="color: %s">%s</span>'%(color, msg)
  172. def format_validation_errors(self, errs):
  173. lns=super(PrettyValidator, self).format_validation_errors(errs)
  174. buf=u''
  175. for l in lns.split('\n'):
  176. buf+=self.m(self.escape(l))
  177. return buf
  178. def done_cb(self):
  179. self.session['form_json']['validated']=True
  180. self.session['form_json']['jdict']=self.jdict
  181. self.session.save()
  182. class WebValidator(PrettyValidator):
  183. def pre_done_cb(self, jdict):
  184. # check name uniqueness
  185. where = (ISP.name == jdict['name'])
  186. if 'shortname' in jdict and jdict['shortname']:
  187. where |= (ISP.shortname == jdict.get('shortname'))
  188. if ISP.query.filter(where).count() > 0:
  189. ret = self.nl()
  190. ret += self.err('An ISP named "%s" already exist in our database'%self.escape(
  191. jdict['name']+(' ('+jdict['shortname']+')' if jdict.get('shortname') else '')
  192. ))
  193. ret += self.abort('The name of your ISP must be unique')
  194. return ret
  195. class TextValidator(Crawler):
  196. def abort(self, msg):
  197. res=u'FATAL ERROR: %s\n'%msg
  198. pad=u'='*(len(res)-1)+'\n'
  199. return self.m(pad+res+pad)