Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(7)

Unified Diff: tools/telemetry/third_party/webpagereplay/httpproxy.py

Issue 1647513002: Delete tools/telemetry. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: tools/telemetry/third_party/webpagereplay/httpproxy.py
diff --git a/tools/telemetry/third_party/webpagereplay/httpproxy.py b/tools/telemetry/third_party/webpagereplay/httpproxy.py
deleted file mode 100644
index 1ba46b040c7514c81a4e09831a940fc4d68a28e9..0000000000000000000000000000000000000000
--- a/tools/telemetry/third_party/webpagereplay/httpproxy.py
+++ /dev/null
@@ -1,437 +0,0 @@
-#!/usr/bin/env python
-# Copyright 2010 Google Inc. All Rights Reserved.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-import BaseHTTPServer
-import certutils
-import collections
-import errno
-import logging
-import socket
-import SocketServer
-import ssl
-import sys
-import time
-import urlparse
-
-import daemonserver
-import httparchive
-import platformsettings
-import proxyshaper
-import sslproxy
-
-def _HandleSSLCertificateError():
- """
- This method is intended to be called from
- BaseHTTPServer.HTTPServer.handle_error().
- """
- exc_type, exc_value, exc_traceback = sys.exc_info()
- if isinstance(exc_value, ssl.SSLError):
- return
-
- raise
-
-
-class HttpProxyError(Exception):
- """Module catch-all error."""
- pass
-
-
-class HttpProxyServerError(HttpProxyError):
- """Raised for errors like 'Address already in use'."""
- pass
-
-
-class HttpArchiveHandler(BaseHTTPServer.BaseHTTPRequestHandler):
- protocol_version = 'HTTP/1.1' # override BaseHTTPServer setting
-
- # Since we do lots of small wfile.write() calls, turn on buffering.
- wbufsize = -1 # override StreamRequestHandler (a base class) setting
-
- def setup(self):
- """Override StreamRequestHandler method."""
- BaseHTTPServer.BaseHTTPRequestHandler.setup(self)
- if self.server.traffic_shaping_up_bps:
- self.rfile = proxyshaper.RateLimitedFile(
- self.server.get_active_request_count, self.rfile,
- self.server.traffic_shaping_up_bps)
- if self.server.traffic_shaping_down_bps:
- self.wfile = proxyshaper.RateLimitedFile(
- self.server.get_active_request_count, self.wfile,
- self.server.traffic_shaping_down_bps)
-
- # Make request handler logging match our logging format.
- def log_request(self, code='-', size='-'):
- pass
-
- def log_error(self, format, *args): # pylint:disable=redefined-builtin
- logging.error(format, *args)
-
- def log_message(self, format, *args): # pylint:disable=redefined-builtin
- logging.info(format, *args)
-
- def read_request_body(self):
- request_body = None
- length = int(self.headers.get('content-length', 0)) or None
- if length:
- request_body = self.rfile.read(length)
- return request_body
-
- def get_header_dict(self):
- return dict(self.headers.items())
-
- def get_archived_http_request(self):
- host = self.headers.get('host')
- if host is None:
- logging.error('Request without host header')
- return None
-
- parsed = urlparse.urlparse(self.path)
- params = ';%s' % parsed.params if parsed.params else ''
- query = '?%s' % parsed.query if parsed.query else ''
- fragment = '#%s' % parsed.fragment if parsed.fragment else ''
- full_path = '%s%s%s%s' % (parsed.path, params, query, fragment)
-
- StubRequest = collections.namedtuple('StubRequest', ('host', 'full_path'))
- request, response = StubRequest(host, full_path), None
-
- self.server.log_url(request, response)
-
- return httparchive.ArchivedHttpRequest(
- self.command,
- host,
- full_path,
- self.read_request_body(),
- self.get_header_dict(),
- self.server.is_ssl)
-
- def send_archived_http_response(self, response):
- try:
- # We need to set the server name before we start the response.
- is_chunked = response.is_chunked()
- has_content_length = response.get_header('content-length') is not None
- self.server_version = response.get_header('server', 'WebPageReplay')
- self.sys_version = ''
-
- if response.version == 10:
- self.protocol_version = 'HTTP/1.0'
-
- # If we don't have chunked encoding and there is no content length,
- # we need to manually compute the content-length.
- if not is_chunked and not has_content_length:
- content_length = sum(len(c) for c in response.response_data)
- response.headers.append(('content-length', str(content_length)))
-
- is_replay = not self.server.http_archive_fetch.is_record_mode
- if is_replay and self.server.traffic_shaping_delay_ms:
- logging.debug('Using round trip delay: %sms',
- self.server.traffic_shaping_delay_ms)
- time.sleep(self.server.traffic_shaping_delay_ms / 1000.0)
- if is_replay and self.server.use_delays:
- logging.debug('Using delays (ms): %s', response.delays)
- time.sleep(response.delays['headers'] / 1000.0)
- delays = response.delays['data']
- else:
- delays = [0] * len(response.response_data)
- self.send_response(response.status, response.reason)
- # TODO(mbelshe): This is lame - each write is a packet!
- for header, value in response.headers:
- if header in ('last-modified', 'expires'):
- self.send_header(header, response.update_date(value))
- elif header not in ('date', 'server'):
- self.send_header(header, value)
- self.end_headers()
-
- for chunk, delay in zip(response.response_data, delays):
- if delay:
- self.wfile.flush()
- time.sleep(delay / 1000.0)
- if is_chunked:
- # Write chunk length (hex) and data (e.g. "A\r\nTESSELATED\r\n").
- self.wfile.write('%x\r\n%s\r\n' % (len(chunk), chunk))
- else:
- self.wfile.write(chunk)
- if is_chunked:
- self.wfile.write('0\r\n\r\n') # write final, zero-length chunk.
- self.wfile.flush()
-
- # TODO(mbelshe): This connection close doesn't seem to work.
- if response.version == 10:
- self.close_connection = 1
-
- except Exception, e:
- logging.error('Error sending response for %s%s: %s',
- self.headers['host'], self.path, e)
-
- def handle_one_request(self):
- """Handle a single HTTP request.
-
- This method overrides a method from BaseHTTPRequestHandler. When this
- method returns, it must leave self.close_connection in the correct state.
- If this method raises an exception, the state of self.close_connection
- doesn't matter.
- """
- try:
- self.raw_requestline = self.rfile.readline(65537)
- self.do_parse_and_handle_one_request()
- except socket.timeout, e:
- # A read or a write timed out. Discard this connection
- self.log_error('Request timed out: %r', e)
- self.close_connection = 1
- return
- except ssl.SSLError:
- # There is insufficient information passed up the stack from OpenSSL to
- # determine the true cause of the SSL error. This almost always happens
- # because the client refuses to accept the self-signed certs of
- # WebPageReplay.
- self.close_connection = 1
- return
- except socket.error, e:
- # Connection reset errors happen all the time due to the browser closing
- # without terminating the connection properly. They can be safely
- # ignored.
- if e[0] == errno.ECONNRESET:
- self.close_connection = 1
- return
- raise
-
-
- def do_parse_and_handle_one_request(self):
- start_time = time.time()
- self.server.num_active_requests += 1
- request = None
- try:
- if len(self.raw_requestline) > 65536:
- self.requestline = ''
- self.request_version = ''
- self.command = ''
- self.send_error(414)
- self.close_connection = 0
- return
- if not self.raw_requestline:
- # This indicates that the socket has been closed by the client.
- self.close_connection = 1
- return
-
- # self.parse_request() sets self.close_connection. There is no need to
- # set the property after the method is executed, unless custom behavior
- # is desired.
- if not self.parse_request():
- # An error code has been sent, just exit.
- return
-
- try:
- response = None
- request = self.get_archived_http_request()
-
- if request is None:
- self.send_error(500)
- return
- response = self.server.custom_handlers.handle(request)
- if not response:
- response = self.server.http_archive_fetch(request)
- if response:
- self.send_archived_http_response(response)
- else:
- self.send_error(404)
- finally:
- self.wfile.flush() # Actually send the response if not already done.
- finally:
- request_time_ms = (time.time() - start_time) * 1000.0
- self.server.total_request_time += request_time_ms
- if request:
- if response:
- logging.debug('Served: %s (%dms)', request, request_time_ms)
- else:
- logging.warning('Failed to find response for: %s (%dms)',
- request, request_time_ms)
- self.server.num_active_requests -= 1
-
- def send_error(self, status, body=None):
- """Override the default send error with a version that doesn't unnecessarily
- close the connection.
- """
- response = httparchive.create_response(status, body=body)
- self.send_archived_http_response(response)
-
-
-class HttpProxyServer(SocketServer.ThreadingMixIn,
- BaseHTTPServer.HTTPServer,
- daemonserver.DaemonServer):
- HANDLER = HttpArchiveHandler
-
- # Increase the request queue size. The default value, 5, is set in
- # SocketServer.TCPServer (the parent of BaseHTTPServer.HTTPServer).
- # Since we're intercepting many domains through this single server,
- # it is quite possible to get more than 5 concurrent requests.
- request_queue_size = 256
-
- # The number of simultaneous connections that the HTTP server supports. This
- # is primarily limited by system limits such as RLIMIT_NOFILE.
- connection_limit = 500
-
- # Allow sockets to be reused. See
- # http://svn.python.org/projects/python/trunk/Lib/SocketServer.py for more
- # details.
- allow_reuse_address = True
-
- # Don't prevent python from exiting when there is thread activity.
- daemon_threads = True
-
- def __init__(self, http_archive_fetch, custom_handlers, rules,
- host='localhost', port=80, use_delays=False, is_ssl=False,
- protocol='HTTP',
- down_bandwidth='0', up_bandwidth='0', delay_ms='0'):
- """Start HTTP server.
-
- Args:
- rules: a rule_parser Rules.
- host: a host string (name or IP) for the web proxy.
- port: a port string (e.g. '80') for the web proxy.
- use_delays: if True, add response data delays during replay.
- is_ssl: True iff proxy is using SSL.
- up_bandwidth: Upload bandwidth
- down_bandwidth: Download bandwidth
- Bandwidths measured in [K|M]{bit/s|Byte/s}. '0' means unlimited.
- delay_ms: Propagation delay in milliseconds. '0' means no delay.
- """
- if platformsettings.SupportsFdLimitControl():
- # BaseHTTPServer opens a new thread and two fds for each connection.
- # Check that the process can open at least 1000 fds.
- soft_limit, hard_limit = platformsettings.GetFdLimit()
- # Add some wiggle room since there are probably fds not associated with
- # connections.
- wiggle_room = 100
- desired_limit = 2 * HttpProxyServer.connection_limit + wiggle_room
- if soft_limit < desired_limit:
- assert desired_limit <= hard_limit, (
- 'The hard limit for number of open files per process is %s which '
- 'is lower than the desired limit of %s.' %
- (hard_limit, desired_limit))
- platformsettings.AdjustFdLimit(desired_limit, hard_limit)
-
- try:
- BaseHTTPServer.HTTPServer.__init__(self, (host, port), self.HANDLER)
- except Exception, e:
- raise HttpProxyServerError('Could not start HTTPServer on port %d: %s' %
- (port, e))
- self.http_archive_fetch = http_archive_fetch
- self.custom_handlers = custom_handlers
- self.use_delays = use_delays
- self.is_ssl = is_ssl
- self.traffic_shaping_down_bps = proxyshaper.GetBitsPerSecond(down_bandwidth)
- self.traffic_shaping_up_bps = proxyshaper.GetBitsPerSecond(up_bandwidth)
- self.traffic_shaping_delay_ms = int(delay_ms)
- self.num_active_requests = 0
- self.num_active_connections = 0
- self.total_request_time = 0
- self.protocol = protocol
- self.log_url = rules.Find('log_url')
-
- # Note: This message may be scraped. Do not change it.
- logging.warning(
- '%s server started on %s:%d' % (self.protocol, self.server_address[0],
- self.server_address[1]))
-
- def cleanup(self):
- try:
- self.shutdown()
- self.server_close()
- except KeyboardInterrupt:
- pass
- logging.info('Stopped %s server. Total time processing requests: %dms',
- self.protocol, self.total_request_time)
-
- def get_active_request_count(self):
- return self.num_active_requests
-
- def get_request(self):
- self.num_active_connections += 1
- if self.num_active_connections >= HttpProxyServer.connection_limit:
- logging.error(
- 'Number of active connections (%s) surpasses the '
- 'supported limit of %s.' %
- (self.num_active_connections, HttpProxyServer.connection_limit))
- return BaseHTTPServer.HTTPServer.get_request(self)
-
- def close_request(self, request):
- BaseHTTPServer.HTTPServer.close_request(self, request)
- self.num_active_connections -= 1
-
-
-class HttpsProxyServer(HttpProxyServer):
- """SSL server that generates certs for each host."""
-
- def __init__(self, http_archive_fetch, custom_handlers, rules,
- https_root_ca_cert_path, **kwargs):
- self.ca_cert_path = https_root_ca_cert_path
- self.HANDLER = sslproxy.wrap_handler(HttpArchiveHandler)
- HttpProxyServer.__init__(self, http_archive_fetch, custom_handlers, rules,
- is_ssl=True, protocol='HTTPS', **kwargs)
- with open(self.ca_cert_path, 'r') as cert_file:
- self._ca_cert_str = cert_file.read()
- self._host_to_cert_map = {}
- self._server_cert_to_cert_map = {}
-
- def cleanup(self):
- try:
- self.shutdown()
- self.server_close()
- except KeyboardInterrupt:
- pass
-
- def get_certificate(self, host):
- if host in self._host_to_cert_map:
- return self._host_to_cert_map[host]
-
- server_cert = self.http_archive_fetch.http_archive.get_server_cert(host)
- if server_cert in self._server_cert_to_cert_map:
- cert = self._server_cert_to_cert_map[server_cert]
- self._host_to_cert_map[host] = cert
- return cert
-
- cert = certutils.generate_cert(self._ca_cert_str, server_cert, host)
- self._server_cert_to_cert_map[server_cert] = cert
- self._host_to_cert_map[host] = cert
- return cert
-
- def handle_error(self, request, client_address):
- _HandleSSLCertificateError()
-
-
-class SingleCertHttpsProxyServer(HttpProxyServer):
- """SSL server."""
-
- def __init__(self, http_archive_fetch, custom_handlers, rules,
- https_root_ca_cert_path, **kwargs):
- HttpProxyServer.__init__(self, http_archive_fetch, custom_handlers, rules,
- is_ssl=True, protocol='HTTPS', **kwargs)
- self.socket = ssl.wrap_socket(
- self.socket, certfile=https_root_ca_cert_path, server_side=True,
- do_handshake_on_connect=False)
- # Ancestor class, DaemonServer, calls serve_forever() during its __init__.
-
- def handle_error(self, request, client_address):
- _HandleSSLCertificateError()
-
-
-class HttpToHttpsProxyServer(HttpProxyServer):
- """Listens for HTTP requests but sends them to the target as HTTPS requests"""
-
- def __init__(self, http_archive_fetch, custom_handlers, rules, **kwargs):
- HttpProxyServer.__init__(self, http_archive_fetch, custom_handlers, rules,
- is_ssl=True, protocol='HTTP-to-HTTPS', **kwargs)
-
- def handle_error(self, request, client_address):
- _HandleSSLCertificateError()

Powered by Google App Engine
This is Rietveld 408576698