2021-05-22 23:23:21 +02:00
|
|
|
import asyncio
|
2021-05-31 22:04:56 +02:00
|
|
|
import http.cookies
|
2021-05-25 18:09:51 +02:00
|
|
|
import ssl
|
2021-05-24 13:10:19 +02:00
|
|
|
from pathlib import Path, PurePath
|
2021-05-31 22:04:56 +02:00
|
|
|
from typing import Any, Dict, List, Optional
|
2021-05-22 23:23:21 +02:00
|
|
|
|
|
|
|
import aiohttp
|
2021-05-25 18:09:51 +02:00
|
|
|
import certifi
|
2021-05-23 23:40:28 +02:00
|
|
|
from aiohttp.client import ClientTimeout
|
2021-05-22 23:23:21 +02:00
|
|
|
|
2021-05-24 13:10:19 +02:00
|
|
|
from ..auth import Authenticator
|
2021-05-23 19:16:42 +02:00
|
|
|
from ..config import Config
|
|
|
|
from ..logging import log
|
|
|
|
from ..utils import fmt_real_path
|
|
|
|
from ..version import NAME, VERSION
|
2021-05-22 23:23:21 +02:00
|
|
|
from .crawler import Crawler, CrawlerSection
|
|
|
|
|
|
|
|
|
2021-05-23 23:40:28 +02:00
|
|
|
class HttpCrawlerSection(CrawlerSection):
|
|
|
|
def http_timeout(self) -> float:
|
|
|
|
return self.s.getfloat("http_timeout", fallback=20)
|
|
|
|
|
|
|
|
|
2021-05-22 23:23:21 +02:00
|
|
|
class HttpCrawler(Crawler):
|
|
|
|
COOKIE_FILE = PurePath(".cookies")
|
|
|
|
|
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
name: str,
|
2021-05-23 23:40:28 +02:00
|
|
|
section: HttpCrawlerSection,
|
2021-05-22 23:23:21 +02:00
|
|
|
config: Config,
|
2021-05-24 13:10:19 +02:00
|
|
|
shared_auth: Optional[Authenticator] = None,
|
2021-05-22 23:23:21 +02:00
|
|
|
) -> None:
|
|
|
|
super().__init__(name, section, config)
|
|
|
|
|
|
|
|
self._authentication_id = 0
|
|
|
|
self._authentication_lock = asyncio.Lock()
|
2021-05-23 19:00:01 +02:00
|
|
|
self._request_count = 0
|
2021-05-23 23:40:28 +02:00
|
|
|
self._http_timeout = section.http_timeout()
|
2021-05-22 23:23:21 +02:00
|
|
|
|
2021-05-24 13:10:19 +02:00
|
|
|
self._cookie_jar_path = self._output_dir.resolve(self.COOKIE_FILE)
|
|
|
|
self._shared_cookie_jar_paths: Optional[List[Path]] = None
|
|
|
|
self._shared_auth = shared_auth
|
|
|
|
|
|
|
|
self._output_dir.register_reserved(self.COOKIE_FILE)
|
|
|
|
|
2021-05-23 11:55:34 +02:00
|
|
|
async def _current_auth_id(self) -> int:
|
|
|
|
"""
|
|
|
|
Returns the id for the current authentication, i.e. an identifier for the last
|
|
|
|
successful call to [authenticate].
|
|
|
|
|
|
|
|
This method must be called before any request that might authenticate is made, so the
|
|
|
|
HttpCrawler can properly track when [authenticate] can return early and when actual
|
|
|
|
authentication is necessary.
|
|
|
|
"""
|
2021-05-22 23:23:21 +02:00
|
|
|
# We acquire the lock here to ensure we wait for any concurrent authenticate to finish.
|
|
|
|
# This should reduce the amount of requests we make: If an authentication is in progress
|
|
|
|
# all future requests wait for authentication to complete.
|
|
|
|
async with self._authentication_lock:
|
2021-05-23 19:00:01 +02:00
|
|
|
self._request_count += 1
|
2021-05-22 23:23:21 +02:00
|
|
|
return self._authentication_id
|
|
|
|
|
2021-05-23 11:55:34 +02:00
|
|
|
async def authenticate(self, caller_auth_id: int) -> None:
|
|
|
|
"""
|
|
|
|
Starts the authentication process. The main work is offloaded to _authenticate, which
|
|
|
|
you should overwrite in a subclass if needed. This method should *NOT* be overwritten.
|
|
|
|
|
|
|
|
The [caller_auth_id] should be the result of a [_current_auth_id] call made *before*
|
|
|
|
the request was made. This ensures that authentication is not performed needlessly.
|
|
|
|
"""
|
2021-05-22 23:23:21 +02:00
|
|
|
async with self._authentication_lock:
|
2021-05-24 16:22:11 +02:00
|
|
|
log.explain_topic("Authenticating")
|
2021-05-22 23:37:34 +02:00
|
|
|
# Another thread successfully called authenticate in-between
|
|
|
|
# We do not want to perform auth again, so we return here. We can
|
|
|
|
# assume the other thread suceeded as authenticate will throw an error
|
|
|
|
# if it failed and aborts the crawl process.
|
2021-05-23 11:55:34 +02:00
|
|
|
if caller_auth_id != self._authentication_id:
|
2021-05-24 16:22:11 +02:00
|
|
|
log.explain(
|
|
|
|
"Authentication skipped due to auth id mismatch."
|
|
|
|
"A previous authentication beat us to the race."
|
|
|
|
)
|
2021-05-22 23:23:21 +02:00
|
|
|
return
|
2021-05-24 16:22:11 +02:00
|
|
|
log.explain("Calling crawler-specific authenticate")
|
2021-05-22 23:23:21 +02:00
|
|
|
await self._authenticate()
|
|
|
|
self._authentication_id += 1
|
2021-05-22 23:30:32 +02:00
|
|
|
# Saving the cookies after the first auth ensures we won't need to re-authenticate
|
|
|
|
# on the next run, should this one be aborted or crash
|
2021-05-24 13:10:19 +02:00
|
|
|
self._save_cookies()
|
2021-05-22 23:23:21 +02:00
|
|
|
|
|
|
|
async def _authenticate(self) -> None:
|
|
|
|
"""
|
|
|
|
Performs authentication. This method must only return normally if authentication suceeded.
|
2021-05-22 23:37:34 +02:00
|
|
|
In all other cases it must either retry internally or throw a terminal exception.
|
2021-05-22 23:23:21 +02:00
|
|
|
"""
|
|
|
|
raise RuntimeError("_authenticate() was called but crawler doesn't provide an implementation")
|
|
|
|
|
2021-05-24 13:10:19 +02:00
|
|
|
def share_cookies(self, shared: Dict[Authenticator, List[Path]]) -> None:
|
|
|
|
if not self._shared_auth:
|
|
|
|
return
|
|
|
|
|
|
|
|
if self._shared_auth in shared:
|
|
|
|
self._shared_cookie_jar_paths = shared[self._shared_auth]
|
|
|
|
else:
|
|
|
|
self._shared_cookie_jar_paths = []
|
|
|
|
shared[self._shared_auth] = self._shared_cookie_jar_paths
|
|
|
|
|
|
|
|
self._shared_cookie_jar_paths.append(self._cookie_jar_path)
|
|
|
|
|
2021-05-31 22:04:56 +02:00
|
|
|
def _load_cookies_from_file(self, path: Path) -> None:
|
|
|
|
jar: Any = http.cookies.SimpleCookie()
|
|
|
|
with open(path) as f:
|
|
|
|
for i, line in enumerate(f):
|
|
|
|
# Names of headers are case insensitive
|
|
|
|
if line[:11].lower() == "set-cookie:":
|
|
|
|
jar.load(line[11:])
|
|
|
|
else:
|
|
|
|
log.explain(f"Line {i} doesn't start with 'Set-Cookie:', ignoring it")
|
|
|
|
self._cookie_jar.update_cookies(jar)
|
|
|
|
|
|
|
|
def _save_cookies_to_file(self, path: Path) -> None:
|
|
|
|
jar: Any = http.cookies.SimpleCookie()
|
|
|
|
for morsel in self._cookie_jar:
|
|
|
|
jar[morsel.key] = morsel
|
|
|
|
with open(path, "w") as f:
|
|
|
|
f.write(jar.output(sep="\n"))
|
|
|
|
f.write("\n") # A trailing newline is just common courtesy
|
|
|
|
|
2021-05-24 13:10:19 +02:00
|
|
|
def _load_cookies(self) -> None:
|
|
|
|
log.explain_topic("Loading cookies")
|
2021-05-24 16:53:50 +02:00
|
|
|
|
2021-05-24 13:10:19 +02:00
|
|
|
cookie_jar_path: Optional[Path] = None
|
|
|
|
|
|
|
|
if self._shared_cookie_jar_paths is None:
|
|
|
|
log.explain("Not sharing any cookies")
|
|
|
|
cookie_jar_path = self._cookie_jar_path
|
|
|
|
else:
|
|
|
|
log.explain("Sharing cookies")
|
|
|
|
max_mtime: Optional[float] = None
|
|
|
|
for path in self._shared_cookie_jar_paths:
|
|
|
|
if not path.is_file():
|
|
|
|
log.explain(f"{fmt_real_path(path)} is not a file")
|
|
|
|
continue
|
|
|
|
mtime = path.stat().st_mtime
|
|
|
|
if max_mtime is None or mtime > max_mtime:
|
|
|
|
log.explain(f"{fmt_real_path(path)} has newest mtime so far")
|
|
|
|
max_mtime = mtime
|
|
|
|
cookie_jar_path = path
|
|
|
|
else:
|
|
|
|
log.explain(f"{fmt_real_path(path)} has older mtime")
|
|
|
|
|
|
|
|
if cookie_jar_path is None:
|
|
|
|
log.explain("Couldn't find a suitable cookie file")
|
|
|
|
return
|
|
|
|
|
|
|
|
log.explain(f"Loading cookies from {fmt_real_path(cookie_jar_path)}")
|
|
|
|
try:
|
2021-05-31 22:04:56 +02:00
|
|
|
self._load_cookies_from_file(cookie_jar_path)
|
2021-05-24 13:10:19 +02:00
|
|
|
except Exception as e:
|
|
|
|
log.explain("Failed to load cookies")
|
|
|
|
log.explain(str(e))
|
|
|
|
|
|
|
|
def _save_cookies(self) -> None:
|
2021-05-22 23:30:32 +02:00
|
|
|
log.explain_topic("Saving cookies")
|
|
|
|
|
|
|
|
try:
|
2021-05-24 13:10:19 +02:00
|
|
|
log.explain(f"Saving cookies to {fmt_real_path(self._cookie_jar_path)}")
|
2021-05-31 22:04:56 +02:00
|
|
|
self._save_cookies_to_file(self._cookie_jar_path)
|
2021-05-24 13:10:19 +02:00
|
|
|
except Exception as e:
|
2021-05-23 11:30:16 +02:00
|
|
|
log.warn(f"Failed to save cookies to {fmt_real_path(self._cookie_jar_path)}")
|
2021-05-24 13:10:19 +02:00
|
|
|
log.warn(str(e))
|
2021-05-22 23:30:32 +02:00
|
|
|
|
2021-05-22 23:23:21 +02:00
|
|
|
async def run(self) -> None:
|
2021-05-23 19:00:01 +02:00
|
|
|
self._request_count = 0
|
2021-05-24 16:53:50 +02:00
|
|
|
self._cookie_jar = aiohttp.CookieJar()
|
2021-05-24 13:10:19 +02:00
|
|
|
self._load_cookies()
|
2021-05-22 23:23:21 +02:00
|
|
|
|
|
|
|
async with aiohttp.ClientSession(
|
|
|
|
headers={"User-Agent": f"{NAME}/{VERSION}"},
|
2021-05-24 16:53:50 +02:00
|
|
|
cookie_jar=self._cookie_jar,
|
2021-05-25 18:09:51 +02:00
|
|
|
connector=aiohttp.TCPConnector(ssl=ssl.create_default_context(cafile=certifi.where())),
|
2021-05-24 18:32:18 +02:00
|
|
|
timeout=ClientTimeout(
|
|
|
|
# 30 minutes. No download in the history of downloads was longer than 30 minutes.
|
|
|
|
# This is enough to transfer a 600 MB file over a 3 Mib/s connection.
|
|
|
|
# Allowing an arbitrary value could be annoying for overnight batch jobs
|
|
|
|
total=15 * 60,
|
|
|
|
connect=self._http_timeout,
|
|
|
|
sock_connect=self._http_timeout,
|
|
|
|
sock_read=self._http_timeout,
|
|
|
|
)
|
2021-05-22 23:23:21 +02:00
|
|
|
) as session:
|
|
|
|
self.session = session
|
|
|
|
try:
|
|
|
|
await super().run()
|
|
|
|
finally:
|
|
|
|
del self.session
|
2021-05-23 19:00:01 +02:00
|
|
|
log.explain_topic(f"Total amount of HTTP requests: {self._request_count}")
|
2021-05-22 23:23:21 +02:00
|
|
|
|
2021-05-22 23:30:32 +02:00
|
|
|
# They are saved in authenticate, but a final save won't hurt
|
2021-05-24 13:10:19 +02:00
|
|
|
self._save_cookies()
|