2019-08-31 17:52:56 +02:00
|
|
|
import argparse
|
|
|
|
import http.client
|
2012-08-18 00:23:02 +03:00
|
|
|
import json
|
|
|
|
import sys
|
2019-08-31 17:52:56 +02:00
|
|
|
from contextlib import contextmanager
|
|
|
|
from pathlib import Path
|
2020-09-25 13:44:28 +02:00
|
|
|
from typing import Callable, Iterable, Union
|
2020-04-13 20:18:01 +02:00
|
|
|
from urllib.parse import urlparse, urlunparse
|
2012-08-18 00:23:02 +03:00
|
|
|
|
|
|
|
import requests
|
2020-05-23 20:30:25 +02:00
|
|
|
# noinspection PyPackageRequirements
|
|
|
|
import urllib3
|
2021-05-05 14:13:39 +02:00
|
|
|
from . import __version__
|
2021-11-25 01:41:37 +02:00
|
|
|
from .adapters import HTTPieHTTPAdapter
|
|
|
|
from .cli.dicts import HTTPHeadersDict
|
2021-10-06 17:27:07 +02:00
|
|
|
from .encoding import UTF8
|
2021-05-05 14:13:39 +02:00
|
|
|
from .plugins.registry import plugin_manager
|
|
|
|
from .sessions import get_httpie_session
|
|
|
|
from .ssl import AVAILABLE_SSL_VERSION_ARG_MAPPING, HTTPieHTTPSAdapter
|
|
|
|
from .uploads import (
|
2020-09-28 12:16:57 +02:00
|
|
|
compress_request, prepare_request_body,
|
2020-09-25 13:44:28 +02:00
|
|
|
get_multipart_data_and_content_type,
|
|
|
|
)
|
2021-05-05 14:13:39 +02:00
|
|
|
from .utils import get_expired_cookies, repr_dict
|
2019-08-29 10:44:59 +02:00
|
|
|
|
2020-08-15 17:50:00 +02:00
|
|
|
|
2020-05-23 20:30:25 +02:00
|
|
|
urllib3.disable_warnings()
|
2015-02-16 20:36:02 +02:00
|
|
|
|
2021-08-05 21:00:17 +02:00
|
|
|
FORM_CONTENT_TYPE = f'application/x-www-form-urlencoded; charset={UTF8}'
|
2016-07-02 14:18:36 +02:00
|
|
|
JSON_CONTENT_TYPE = 'application/json'
|
2020-04-13 22:12:06 +02:00
|
|
|
JSON_ACCEPT = f'{JSON_CONTENT_TYPE}, */*;q=0.5'
|
2019-08-31 17:52:56 +02:00
|
|
|
DEFAULT_UA = f'HTTPie/{__version__}'
|
2012-08-18 00:23:02 +03:00
|
|
|
|
|
|
|
|
2019-09-03 17:14:39 +02:00
|
|
|
def collect_messages(
|
|
|
|
args: argparse.Namespace,
|
2019-12-02 18:43:16 +02:00
|
|
|
config_dir: Path,
|
2020-09-28 12:16:57 +02:00
|
|
|
request_body_read_callback: Callable[[bytes], None] = None,
|
2019-09-03 17:14:39 +02:00
|
|
|
) -> Iterable[Union[requests.PreparedRequest, requests.Response]]:
|
|
|
|
httpie_session = None
|
|
|
|
httpie_session_headers = None
|
|
|
|
if args.session or args.session_read_only:
|
|
|
|
httpie_session = get_httpie_session(
|
|
|
|
config_dir=config_dir,
|
|
|
|
session_name=args.session or args.session_read_only,
|
|
|
|
host=args.headers.get('Host'),
|
|
|
|
url=args.url,
|
|
|
|
)
|
|
|
|
httpie_session_headers = httpie_session.headers
|
|
|
|
|
|
|
|
request_kwargs = make_request_kwargs(
|
|
|
|
args=args,
|
|
|
|
base_headers=httpie_session_headers,
|
2020-09-28 12:16:57 +02:00
|
|
|
request_body_read_callback=request_body_read_callback
|
2019-09-03 17:14:39 +02:00
|
|
|
)
|
|
|
|
send_kwargs = make_send_kwargs(args)
|
|
|
|
send_kwargs_mergeable_from_env = make_send_kwargs_mergeable_from_env(args)
|
|
|
|
requests_session = build_requests_session(
|
|
|
|
ssl_version=args.ssl_version,
|
2020-05-23 13:26:06 +02:00
|
|
|
ciphers=args.ciphers,
|
2020-05-23 20:19:16 +02:00
|
|
|
verify=bool(send_kwargs_mergeable_from_env['verify'])
|
2019-09-03 17:14:39 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
if httpie_session:
|
|
|
|
httpie_session.update_headers(request_kwargs['headers'])
|
|
|
|
requests_session.cookies = httpie_session.cookies
|
|
|
|
if args.auth_plugin:
|
|
|
|
# Save auth from CLI to HTTPie session.
|
|
|
|
httpie_session.auth = {
|
|
|
|
'type': args.auth_plugin.auth_type,
|
|
|
|
'raw_auth': args.auth_plugin.raw_auth,
|
|
|
|
}
|
|
|
|
elif httpie_session.auth:
|
|
|
|
# Apply auth from HTTPie session
|
|
|
|
request_kwargs['auth'] = httpie_session.auth
|
|
|
|
|
|
|
|
if args.debug:
|
|
|
|
# TODO: reflect the split between request and send kwargs.
|
|
|
|
dump_request(request_kwargs)
|
|
|
|
|
|
|
|
request = requests.Request(**request_kwargs)
|
|
|
|
prepared_request = requests_session.prepare_request(request)
|
2021-10-31 16:04:39 +02:00
|
|
|
apply_missing_repeated_headers(prepared_request, request.headers)
|
2020-04-13 20:18:01 +02:00
|
|
|
if args.path_as_is:
|
|
|
|
prepared_request.url = ensure_path_as_is(
|
|
|
|
orig_url=args.url,
|
|
|
|
prepped_url=prepared_request.url,
|
|
|
|
)
|
2019-09-04 00:00:03 +02:00
|
|
|
if args.compress and prepared_request.body:
|
2020-09-28 12:16:57 +02:00
|
|
|
compress_request(
|
|
|
|
request=prepared_request,
|
|
|
|
always=args.compress > 1,
|
|
|
|
)
|
2019-09-03 17:14:39 +02:00
|
|
|
response_count = 0
|
2020-06-15 22:28:04 +02:00
|
|
|
expired_cookies = []
|
2019-09-03 17:14:39 +02:00
|
|
|
while prepared_request:
|
|
|
|
yield prepared_request
|
|
|
|
if not args.offline:
|
|
|
|
send_kwargs_merged = requests_session.merge_environment_settings(
|
|
|
|
url=prepared_request.url,
|
|
|
|
**send_kwargs_mergeable_from_env,
|
|
|
|
)
|
|
|
|
with max_headers(args.max_headers):
|
|
|
|
response = requests_session.send(
|
|
|
|
request=prepared_request,
|
|
|
|
**send_kwargs_merged,
|
|
|
|
**send_kwargs,
|
|
|
|
)
|
2020-06-15 23:02:16 +02:00
|
|
|
|
|
|
|
expired_cookies += get_expired_cookies(
|
2021-07-06 21:00:06 +02:00
|
|
|
response.headers.get('Set-Cookie', '')
|
2020-06-15 23:02:16 +02:00
|
|
|
)
|
2020-06-15 22:28:04 +02:00
|
|
|
|
2019-09-03 17:14:39 +02:00
|
|
|
response_count += 1
|
|
|
|
if response.next:
|
|
|
|
if args.max_redirects and response_count == args.max_redirects:
|
|
|
|
raise requests.TooManyRedirects
|
|
|
|
if args.follow:
|
|
|
|
prepared_request = response.next
|
|
|
|
if args.all:
|
|
|
|
yield response
|
|
|
|
continue
|
|
|
|
yield response
|
|
|
|
break
|
|
|
|
|
|
|
|
if httpie_session:
|
|
|
|
if httpie_session.is_new() or not args.session_read_only:
|
|
|
|
httpie_session.cookies = requests_session.cookies
|
2020-06-15 22:28:04 +02:00
|
|
|
httpie_session.remove_cookies(
|
2020-06-15 23:02:16 +02:00
|
|
|
# TODO: take path & domain into account?
|
2020-06-15 22:28:04 +02:00
|
|
|
cookie['name'] for cookie in expired_cookies
|
|
|
|
)
|
2019-09-03 17:14:39 +02:00
|
|
|
httpie_session.save()
|
|
|
|
|
|
|
|
|
2019-08-29 09:39:19 +02:00
|
|
|
# noinspection PyProtectedMember
|
|
|
|
@contextmanager
|
|
|
|
def max_headers(limit):
|
2020-12-23 23:07:27 +02:00
|
|
|
# <https://github.com/httpie/httpie/issues/802>
|
2020-05-23 13:26:06 +02:00
|
|
|
# noinspection PyUnresolvedReferences
|
2019-08-29 09:39:19 +02:00
|
|
|
orig = http.client._MAXHEADERS
|
|
|
|
http.client._MAXHEADERS = limit or float('Inf')
|
|
|
|
try:
|
|
|
|
yield
|
|
|
|
finally:
|
|
|
|
http.client._MAXHEADERS = orig
|
|
|
|
|
|
|
|
|
2019-09-01 11:38:14 +02:00
|
|
|
def build_requests_session(
|
2020-05-23 20:19:16 +02:00
|
|
|
verify: bool,
|
2019-09-03 17:14:39 +02:00
|
|
|
ssl_version: str = None,
|
2020-05-23 13:26:06 +02:00
|
|
|
ciphers: str = None,
|
2019-09-01 11:38:14 +02:00
|
|
|
) -> requests.Session:
|
2015-02-05 16:25:00 +02:00
|
|
|
requests_session = requests.Session()
|
2019-09-01 11:38:14 +02:00
|
|
|
|
|
|
|
# Install our adapter.
|
2021-11-25 01:41:37 +02:00
|
|
|
http_adapter = HTTPieHTTPAdapter()
|
2020-05-23 20:19:16 +02:00
|
|
|
https_adapter = HTTPieHTTPSAdapter(
|
2020-05-23 13:26:06 +02:00
|
|
|
ciphers=ciphers,
|
2020-05-23 20:19:16 +02:00
|
|
|
verify=verify,
|
2019-09-04 00:00:03 +02:00
|
|
|
ssl_version=(
|
2020-05-23 13:26:06 +02:00
|
|
|
AVAILABLE_SSL_VERSION_ARG_MAPPING[ssl_version]
|
2019-09-04 00:00:03 +02:00
|
|
|
if ssl_version else None
|
2020-05-23 20:19:16 +02:00
|
|
|
),
|
|
|
|
)
|
2021-11-25 01:41:37 +02:00
|
|
|
requests_session.mount('http://', http_adapter)
|
2020-05-23 20:19:16 +02:00
|
|
|
requests_session.mount('https://', https_adapter)
|
2019-09-01 11:38:14 +02:00
|
|
|
|
|
|
|
# Install adapters from plugins.
|
|
|
|
for plugin_cls in plugin_manager.get_transport_plugins():
|
|
|
|
transport_plugin = plugin_cls()
|
|
|
|
requests_session.mount(
|
|
|
|
prefix=transport_plugin.prefix,
|
|
|
|
adapter=transport_plugin.get_adapter(),
|
|
|
|
)
|
|
|
|
|
2015-02-05 16:25:00 +02:00
|
|
|
return requests_session
|
|
|
|
|
|
|
|
|
2019-08-31 17:52:56 +02:00
|
|
|
def dump_request(kwargs: dict):
|
2019-08-31 18:00:03 +02:00
|
|
|
sys.stderr.write(
|
|
|
|
f'\n>>> requests.request(**{repr_dict(kwargs)})\n\n')
|
2014-05-08 14:27:50 +03:00
|
|
|
|
|
|
|
|
2021-11-25 01:41:37 +02:00
|
|
|
def finalize_headers(headers: HTTPHeadersDict) -> HTTPHeadersDict:
|
|
|
|
final_headers = HTTPHeadersDict()
|
2016-08-13 22:40:01 +02:00
|
|
|
for name, value in headers.items():
|
|
|
|
if value is not None:
|
2019-12-03 20:09:09 +02:00
|
|
|
# “leading or trailing LWS MAY be removed without
|
|
|
|
# changing the semantics of the field value”
|
|
|
|
# <https://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html>
|
2016-08-13 22:40:01 +02:00
|
|
|
# Also, requests raises `InvalidHeader` for leading spaces.
|
|
|
|
value = value.strip()
|
|
|
|
if isinstance(value, str):
|
2020-12-23 23:07:27 +02:00
|
|
|
# See <https://github.com/httpie/httpie/issues/212>
|
2021-08-05 20:58:43 +02:00
|
|
|
value = value.encode()
|
2021-10-31 16:04:39 +02:00
|
|
|
final_headers.add(name, value)
|
2016-08-13 22:40:01 +02:00
|
|
|
return final_headers
|
2014-04-26 19:16:30 +03:00
|
|
|
|
|
|
|
|
2021-10-31 16:04:39 +02:00
|
|
|
def apply_missing_repeated_headers(
|
|
|
|
prepared_request: requests.PreparedRequest,
|
2021-11-25 01:41:37 +02:00
|
|
|
original_headers: HTTPHeadersDict
|
2021-10-31 16:04:39 +02:00
|
|
|
) -> None:
|
|
|
|
"""Update the given `prepared_request`'s headers with the original
|
|
|
|
ones. This allows the requests to be prepared as usual, and then later
|
|
|
|
merged with headers that are specified multiple times."""
|
|
|
|
|
2021-11-25 01:41:37 +02:00
|
|
|
new_headers = HTTPHeadersDict(prepared_request.headers)
|
2021-10-31 16:04:39 +02:00
|
|
|
for prepared_name, prepared_value in prepared_request.headers.items():
|
|
|
|
if prepared_name not in original_headers:
|
|
|
|
continue
|
|
|
|
|
|
|
|
original_keys, original_values = zip(*filter(
|
|
|
|
lambda item: item[0].casefold() == prepared_name.casefold(),
|
|
|
|
original_headers.items()
|
|
|
|
))
|
|
|
|
|
|
|
|
if prepared_value not in original_values:
|
|
|
|
# If the current value is not among the initial values
|
|
|
|
# set for this field, then it means that this field got
|
|
|
|
# overridden on the way, and we should preserve it.
|
|
|
|
continue
|
|
|
|
|
|
|
|
new_headers.popone(prepared_name)
|
|
|
|
new_headers.update(zip(original_keys, original_values))
|
|
|
|
|
|
|
|
prepared_request.headers = new_headers
|
|
|
|
|
|
|
|
|
2021-11-25 01:41:37 +02:00
|
|
|
def make_default_headers(args: argparse.Namespace) -> HTTPHeadersDict:
|
|
|
|
default_headers = HTTPHeadersDict({
|
2012-12-17 19:02:27 +03:00
|
|
|
'User-Agent': DEFAULT_UA
|
2018-02-22 13:52:57 +02:00
|
|
|
})
|
2012-08-19 00:03:31 +03:00
|
|
|
|
2012-08-18 00:23:02 +03:00
|
|
|
auto_json = args.data and not args.form
|
|
|
|
if args.json or auto_json:
|
2016-07-02 14:18:36 +02:00
|
|
|
default_headers['Accept'] = JSON_ACCEPT
|
2013-04-02 17:07:14 +03:00
|
|
|
if args.json or (auto_json and args.data):
|
2016-07-02 14:18:36 +02:00
|
|
|
default_headers['Content-Type'] = JSON_CONTENT_TYPE
|
2012-08-18 00:23:02 +03:00
|
|
|
|
2012-08-19 00:03:31 +03:00
|
|
|
elif args.form and not args.files:
|
2012-09-07 13:48:59 +03:00
|
|
|
# If sending files, `requests` will set
|
|
|
|
# the `Content-Type` for us.
|
2016-07-02 14:18:36 +02:00
|
|
|
default_headers['Content-Type'] = FORM_CONTENT_TYPE
|
2014-05-08 14:27:50 +03:00
|
|
|
return default_headers
|
|
|
|
|
|
|
|
|
2019-09-03 17:14:39 +02:00
|
|
|
def make_send_kwargs(args: argparse.Namespace) -> dict:
|
2021-06-28 09:05:24 +02:00
|
|
|
return {
|
2019-09-03 17:14:39 +02:00
|
|
|
'timeout': args.timeout or None,
|
|
|
|
'allow_redirects': False,
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
def make_send_kwargs_mergeable_from_env(args: argparse.Namespace) -> dict:
|
|
|
|
cert = None
|
|
|
|
if args.cert:
|
|
|
|
cert = args.cert
|
|
|
|
if args.cert_key:
|
|
|
|
cert = cert, args.cert_key
|
2021-06-28 09:05:24 +02:00
|
|
|
return {
|
2019-09-03 17:14:39 +02:00
|
|
|
'proxies': {p.key: p.value for p in args.proxy},
|
|
|
|
'stream': True,
|
|
|
|
'verify': {
|
|
|
|
'yes': True,
|
|
|
|
'true': True,
|
|
|
|
'no': False,
|
|
|
|
'false': False,
|
|
|
|
}.get(args.verify.lower(), args.verify),
|
|
|
|
'cert': cert,
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
def make_request_kwargs(
|
2019-09-01 21:15:39 +02:00
|
|
|
args: argparse.Namespace,
|
2021-11-25 01:41:37 +02:00
|
|
|
base_headers: HTTPHeadersDict = None,
|
2020-09-28 12:16:57 +02:00
|
|
|
request_body_read_callback=lambda chunk: chunk
|
2019-09-01 21:15:39 +02:00
|
|
|
) -> dict:
|
2014-05-08 14:27:50 +03:00
|
|
|
"""
|
2019-09-03 17:14:39 +02:00
|
|
|
Translate our `args` into `requests.Request` keyword arguments.
|
2014-05-08 14:27:50 +03:00
|
|
|
|
|
|
|
"""
|
2020-08-15 17:50:00 +02:00
|
|
|
files = args.files
|
2014-05-08 14:27:50 +03:00
|
|
|
# Serialize JSON data, if needed.
|
|
|
|
data = args.data
|
|
|
|
auto_json = data and not args.form
|
2015-04-11 03:11:22 +02:00
|
|
|
if (args.json or auto_json) and isinstance(data, dict):
|
2014-05-08 14:27:50 +03:00
|
|
|
if data:
|
|
|
|
data = json.dumps(data)
|
|
|
|
else:
|
|
|
|
# We need to set data to an empty string to prevent requests
|
|
|
|
# from assigning an empty list to `response.request.data`.
|
|
|
|
data = ''
|
|
|
|
|
|
|
|
# Finalize headers.
|
2019-09-01 11:38:14 +02:00
|
|
|
headers = make_default_headers(args)
|
2014-05-08 14:27:50 +03:00
|
|
|
if base_headers:
|
|
|
|
headers.update(base_headers)
|
|
|
|
headers.update(args.headers)
|
2020-09-28 16:40:16 +02:00
|
|
|
if args.offline and args.chunked and 'Transfer-Encoding' not in headers:
|
|
|
|
# When online, we let requests set the header instead to be able more
|
|
|
|
# easily verify chunking is taking place.
|
|
|
|
headers['Transfer-Encoding'] = 'chunked'
|
2016-08-13 22:40:01 +02:00
|
|
|
headers = finalize_headers(headers)
|
2012-08-18 00:23:02 +03:00
|
|
|
|
2020-09-25 14:44:22 +02:00
|
|
|
if (args.form and files) or args.multipart:
|
2020-08-19 10:22:42 +02:00
|
|
|
data, headers['Content-Type'] = get_multipart_data_and_content_type(
|
2020-09-28 12:16:57 +02:00
|
|
|
data=args.multipart_data,
|
2020-08-19 10:22:42 +02:00
|
|
|
boundary=args.boundary,
|
|
|
|
content_type=args.headers.get('Content-Type'),
|
|
|
|
)
|
2020-08-15 17:50:00 +02:00
|
|
|
|
2021-06-28 09:05:24 +02:00
|
|
|
return {
|
2012-08-18 00:23:02 +03:00
|
|
|
'method': args.method.lower(),
|
|
|
|
'url': args.url,
|
2014-05-08 14:27:50 +03:00
|
|
|
'headers': headers,
|
2020-09-28 12:16:57 +02:00
|
|
|
'data': prepare_request_body(
|
|
|
|
body=data,
|
|
|
|
body_read_callback=request_body_read_callback,
|
|
|
|
chunked=args.chunked,
|
2020-09-28 16:22:34 +02:00
|
|
|
offline=args.offline,
|
|
|
|
content_length_header_value=headers.get('Content-Length'),
|
2020-09-28 12:16:57 +02:00
|
|
|
),
|
2016-11-23 23:01:58 +02:00
|
|
|
'auth': args.auth,
|
2020-09-28 12:16:57 +02:00
|
|
|
'params': args.params.items(),
|
2012-08-18 00:23:02 +03:00
|
|
|
}
|
|
|
|
|
2020-04-13 20:18:01 +02:00
|
|
|
|
|
|
|
def ensure_path_as_is(orig_url: str, prepped_url: str) -> str:
|
|
|
|
"""
|
|
|
|
Handle `--path-as-is` by replacing the path component of the prepared
|
|
|
|
URL with the path component from the original URL. Other parts stay
|
|
|
|
untouched because other (welcome) processing on the URL might have
|
|
|
|
taken place.
|
|
|
|
|
2020-12-23 23:07:27 +02:00
|
|
|
<https://github.com/httpie/httpie/issues/895>
|
2020-04-13 20:18:01 +02:00
|
|
|
|
|
|
|
|
|
|
|
<https://ec.haxx.se/http/http-basics#path-as-is>
|
|
|
|
<https://curl.haxx.se/libcurl/c/CURLOPT_PATH_AS_IS.html>
|
|
|
|
|
|
|
|
>>> ensure_path_as_is('http://foo/../', 'http://foo/?foo=bar')
|
|
|
|
'http://foo/../?foo=bar'
|
|
|
|
|
|
|
|
"""
|
|
|
|
parsed_orig, parsed_prepped = urlparse(orig_url), urlparse(prepped_url)
|
|
|
|
final_dict = {
|
|
|
|
# noinspection PyProtectedMember
|
|
|
|
**parsed_prepped._asdict(),
|
|
|
|
'path': parsed_orig.path,
|
|
|
|
}
|
2021-06-28 09:05:24 +02:00
|
|
|
return urlunparse(tuple(final_dict.values()))
|