crawler.py 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369
  1. import io
  2. import cgi
  3. import pytz
  4. from datetime import datetime, timedelta
  5. from werkzeug.http import parse_date
  6. from flask import escape, json
  7. import requests
  8. from ispformat.validator import validate_isp
  9. from .models import ISP
  10. from . import app
  11. def get_encoding(content_type):
  12. content_type, params = cgi.parse_header(content_type)
  13. if 'charset' in params:
  14. return params['charset'].strip("'\"")
  15. class Crawler(object):
  16. MAX_JSON_SIZE=1*1024*1024
  17. escape=staticmethod(lambda x: unicode(str(x), 'utf8') if type(x) != unicode else x)
  18. def __init__(self):
  19. self.success=False
  20. self.modified=True
  21. self.jdict={}
  22. self.cache_info=None
  23. self.jdict_max_age=self.config('DEFAULT_CACHE_TIME')
  24. def m(self, msg, evt=None):
  25. if not evt:
  26. return u'%s\n'%msg
  27. else:
  28. return u''
  29. def err(self, msg, *args):
  30. return self.m(u'! %s'%msg, *args)
  31. def warn(self, msg):
  32. return self.m(u'@ %s'%msg)
  33. def info(self, msg):
  34. return self.m(u'\u2013 %s'%msg)
  35. def abort(self, msg):
  36. raise NotImplemented
  37. def color(self, color, msg):
  38. return msg
  39. def bold(self, msg):
  40. return msg
  41. def italics(self, msg):
  42. return msg
  43. def nl(self):
  44. return self.m('')
  45. def format_validation_errors(self, errs):
  46. r=[]
  47. for e in errs:
  48. r.append(u' %s: %s'%('.'.join(list(e.schema_path)[1:]), e.message))
  49. return u'\n'.join(r)
  50. def pre_done_cb(self, *args):
  51. pass
  52. def done_cb(self):
  53. pass
  54. def config(self, name):
  55. return app.config.get('CRAWLER_'+name)
  56. def parse_cache_control(self, _cachectl):
  57. cachectl={}
  58. for cc in _cachectl.split(','):
  59. cc=cc.strip()
  60. if not cc:
  61. continue
  62. cc=cc.split('=')
  63. if cc[0] not in ('max-age', 's-maxage'):
  64. continue
  65. try:
  66. cachectl[cc[0]]=cc[1]
  67. except IndexError:
  68. cachectl[cc[0]]=True
  69. return cachectl
  70. def __call__(self, url, cache_info={}):
  71. esc=self.escape
  72. yield self.m('Starting the validation process...')
  73. r=None
  74. try:
  75. yield self.m('* Attempting to retreive %s'%self.bold(url))
  76. headers={'User-Agent': 'FFDN DB validator'}
  77. if cache_info.get('etag'):
  78. headers['If-None-Match'] = cache_info['etag']
  79. if cache_info.get('last-modified'):
  80. headers['If-Modified-Since'] = cache_info['last-modified']
  81. r=requests.get(url, verify='/etc/ssl/certs/ca-certificates.crt',
  82. headers=headers, stream=True, timeout=10)
  83. except requests.exceptions.SSLError as e:
  84. yield self.err('Unable to connect, SSL Error: '+self.color('#dd1144', esc(e)))
  85. except requests.exceptions.ConnectionError as e:
  86. yield self.err('Unable to connect: '+self.color('#dd1144', esc(e)))
  87. except requests.exceptions.Timeout as e:
  88. yield self.err('Connection timeout')
  89. except requests.exceptions.TooManyRedirects as e:
  90. yield self.err('Too many redirects')
  91. except requests.exceptions.RequestException as e:
  92. yield self.err('Internal request exception')
  93. # except Exception as e:
  94. # yield self.err('Unexpected request exception')
  95. if r is None:
  96. yield self.abort('Connection could not be established, aborting')
  97. return
  98. yield self.info('Connection established')
  99. yield self.info('Response code: '+self.bold(str(r.status_code)+' '+esc(r.reason)))
  100. try:
  101. r.raise_for_status()
  102. except requests.exceptions.HTTPError as e:
  103. yield self.err('Response code indicates an error')
  104. yield self.abort('Invalid response code')
  105. return
  106. _cachecontrol=r.headers.get('cache-control')
  107. cachecontrol=self.parse_cache_control(_cachecontrol) if _cachecontrol else None
  108. max_age=None
  109. if cachecontrol:
  110. try:
  111. _maxage=cachecontrol.get('max-age')
  112. _maxage=cachecontrol.get('s-maxage', _maxage) # s-maxage takes precedence
  113. max_age=int(_maxage)
  114. except ValueError:
  115. yield self.warn('Invalid max-age '+esc(_maxage))
  116. yield self.info('Cache control: '+self.bold(esc(
  117. ', '.join([k+'='+v if type(v) != bool else k for k, v in cachecontrol.iteritems()]))
  118. ))
  119. _expires=r.headers.get('expires')
  120. expires=parse_date(_expires)
  121. if expires:
  122. _now=r.headers.get('date')
  123. if _now: # use server date when possible
  124. now=parse_date(_now)
  125. else:
  126. now=datetime.utcnow()
  127. if expires > now:
  128. expires=(expires-now).total_seconds()
  129. yield self.info('Expires: '+self.bold(esc(_expires)))
  130. else:
  131. yield self.warn('Invalid Expires header. Expiry date must be in the future.')
  132. expires=None
  133. elif _expires and not expires:
  134. yield self.warn('Invalid Expires header %r'%esc(_expires))
  135. if not max_age and not expires:
  136. yield self.warn('No valid expiration time provided ! Please provide it either '
  137. 'with a Cache-Control or Expires header.')
  138. max_age=self.config('DEFAULT_CACHE_TIME')
  139. yield self.info('Using default expiration time of %d seconds'%(max_age))
  140. self.jdict_max_age = max_age if max_age else expires
  141. self.jdict_max_age = min(
  142. self.config('MAX_CACHE_TIME'),
  143. max(self.config('MIN_CACHE_TIME'), self.jdict_max_age)
  144. )
  145. yield self.info('Next update will be in %s'%(timedelta(seconds=self.jdict_max_age)))
  146. etag=r.headers.get('etag')
  147. last_modified=r.headers.get('last-modified')
  148. if not etag and not last_modified:
  149. yield self.warn('Please, provide at an ETag or Last-Modified header for '
  150. 'conditional requests')
  151. self.cache_info={}
  152. if etag:
  153. self.cache_info['etag']=etag
  154. if last_modified:
  155. self.cache_info['last-modified']=last_modified
  156. if cache_info and r.status_code == 304: # not modified
  157. self.m('== '+self.color('forestgreen', 'Response not modified. All good !'))
  158. self.modified=False
  159. self.success=True
  160. self.done_cb()
  161. return
  162. yield self.info('Content type: '+self.bold(esc(r.headers.get('content-type', 'not defined'))))
  163. if not r.headers.get('content-type'):
  164. yield self.err('Content-type '+self.bold('MUST')+' be defined')
  165. yield self.abort('The file must have a proper content-type to continue')
  166. return
  167. elif r.headers.get('content-type').lower() != 'application/json':
  168. yield self.warn('Content-type '+self.italics('SHOULD')+' be application/json')
  169. encoding=get_encoding(r.headers.get('content-type'))
  170. if not encoding:
  171. yield self.warn('Encoding not set. Assuming it\'s unicode, as per RFC4627 section 3')
  172. yield self.info('Content length: %s'%(self.bold(esc(r.headers.get('content-length', 'not set')))))
  173. cl=r.headers.get('content-length')
  174. if not cl:
  175. yield self.warn('No content-length. Note that we will not process a file whose size exceed 1MiB')
  176. elif int(cl) > self.MAX_JSON_SIZE:
  177. yield self.abort('File too big ! File size must be less then 1MiB')
  178. return
  179. yield self.info('Reading response into memory...')
  180. b=io.BytesIO()
  181. for d in r.iter_content(requests.models.CONTENT_CHUNK_SIZE):
  182. b.write(d)
  183. if b.tell() > self.MAX_JSON_SIZE:
  184. yield self.abort('File too big ! File size must be less then 1MiB')
  185. return
  186. r._content=b.getvalue()
  187. del b
  188. yield self.info('Successfully read %d bytes'%len(r.content))
  189. yield self.nl()+self.m('* Parsing the JSON file')
  190. if not encoding:
  191. charset=requests.utils.guess_json_utf(r.content)
  192. if not charset:
  193. yield self.err('Unable to guess unicode charset')
  194. yield self.abort('The file MUST be unicode-encoded when no explicit charset is in the content-type')
  195. return
  196. yield self.info('Guessed charset: '+self.bold(charset))
  197. try:
  198. txt=r.content.decode(encoding or charset)
  199. yield self.info('Successfully decoded file as %s'%esc(encoding or charset))
  200. except LookupError as e:
  201. yield self.err('Invalid/unknown charset: %s'%esc(e))
  202. yield self.abort('Charset error, Cannot continue')
  203. return
  204. except UnicodeDecodeError as e:
  205. yield self.err('Unicode decode error: %s'%e)
  206. yield self.abort('Charset error, cannot continue')
  207. return
  208. except Exception:
  209. yield self.abort('Unexpected charset error')
  210. return
  211. jdict=None
  212. try:
  213. jdict=json.loads(txt)
  214. except ValueError as e:
  215. yield self.err('Error while parsing JSON: %s'%esc(e))
  216. except Exception as e:
  217. yield self.err('Unexpected error while parsing JSON: %s'%esc(e))
  218. if not jdict:
  219. yield self.abort('Could not parse JSON')
  220. return
  221. yield self.info('JSON parsed successfully')
  222. yield self.nl()+self.m('* Validating the JSON against the schema')
  223. v=list(validate_isp(jdict))
  224. if v:
  225. yield self.err('Validation errors:')+self.format_validation_errors(v)
  226. yield self.abort('Your JSON file does not follow the schema, please fix it')
  227. return
  228. else:
  229. yield self.info('Done. No errors encountered \o')
  230. ret=self.pre_done_cb(jdict)
  231. if ret:
  232. yield ret
  233. return
  234. yield (self.nl()+self.m('== '+self.color('forestgreen', 'All good ! You can click on Confirm now'))+
  235. self.m(json.dumps({'passed': 1}), 'control'))
  236. self.jdict=jdict
  237. self.success=True
  238. self.done_cb()
  239. class PrettyValidator(Crawler):
  240. def __init__(self, session=None, sesskey=None, *args, **kwargs):
  241. super(PrettyValidator, self).__init__(*args, **kwargs)
  242. self.session=session
  243. self.sesskey=sesskey
  244. self.escape=lambda x: escape(unicode(str(x), 'utf8') if type(x) != unicode else x)
  245. def m(self, msg, evt=None):
  246. return u'%sdata: %s\n\n'%(u'event: %s\n'%evt if evt else '', msg)
  247. def err(self, msg, *args):
  248. return self.m(u'<strong style="color: crimson">!</strong> %s'%msg, *args)
  249. def warn(self, msg):
  250. return self.m(u'<strong style="color: dodgerblue">@</strong> %s'%msg)
  251. def info(self, msg):
  252. return self.m(u'&ndash; %s'%msg)
  253. def abort(self, msg):
  254. return (self.m(u'<br />== <span style="color: crimson">%s</span>'%msg)+
  255. self.m(json.dumps({'closed': 1}), 'control'))
  256. def bold(self, msg):
  257. return u'<strong>%s</strong>'%msg
  258. def italics(self, msg):
  259. return u'<em>%s</em>'%msg
  260. def color(self, color, msg):
  261. return u'<span style="color: %s">%s</span>'%(color, msg)
  262. def format_validation_errors(self, errs):
  263. lns=super(PrettyValidator, self).format_validation_errors(errs)
  264. buf=u''
  265. for l in lns.split('\n'):
  266. buf+=self.m(self.escape(l))
  267. return buf
  268. def done_cb(self):
  269. self.session[self.sesskey]['validated']=True
  270. self.session[self.sesskey]['jdict']=self.jdict
  271. self.session[self.sesskey]['cache_info']=self.cache_info
  272. self.session[self.sesskey]['last_update']=datetime.now()
  273. self.session[self.sesskey]['next_update']=datetime.now()+timedelta(seconds=self.jdict_max_age)
  274. self.session.save()
  275. class WebValidator(PrettyValidator):
  276. def pre_done_cb(self, jdict):
  277. # check name uniqueness
  278. where = (ISP.name == jdict['name'])
  279. if 'shortname' in jdict and jdict['shortname']:
  280. where |= (ISP.shortname == jdict.get('shortname'))
  281. if ISP.query.filter(where).count() > 0:
  282. ret = self.nl()
  283. ret += self.err('An ISP named "%s" already exist in our database'%self.escape(
  284. jdict['name']+(' ('+jdict['shortname']+')' if jdict.get('shortname') else '')
  285. ))
  286. ret += self.abort('The name of your ISP must be unique')
  287. return ret
  288. class TextValidator(Crawler):
  289. def abort(self, msg):
  290. res=u'FATAL ERROR: %s\n'%msg
  291. pad=u'='*(len(res)-1)+'\n'
  292. return self.m(pad+res+pad)