2007-09-28 01:01:34 +08:00
|
|
|
from threading import Lock
|
|
|
|
from pprint import pformat
|
|
|
|
try:
|
|
|
|
from cStringIO import StringIO
|
|
|
|
except ImportError:
|
|
|
|
from StringIO import StringIO
|
|
|
|
|
2007-12-02 10:22:19 +08:00
|
|
|
from django import http
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.core import signals
|
2008-07-21 15:57:10 +08:00
|
|
|
from django.core.handlers import base
|
|
|
|
from django.core.urlresolvers import set_script_prefix
|
2006-05-02 09:31:56 +08:00
|
|
|
from django.utils import datastructures
|
2009-03-08 17:58:40 +08:00
|
|
|
from django.utils.encoding import force_unicode, iri_to_uri
|
2005-07-18 14:30:26 +08:00
|
|
|
|
2005-09-13 11:21:44 +08:00
|
|
|
# See http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
|
2005-07-23 02:12:05 +08:00
|
|
|
STATUS_CODE_TEXT = {
|
2005-09-13 11:21:44 +08:00
|
|
|
100: 'CONTINUE',
|
|
|
|
101: 'SWITCHING PROTOCOLS',
|
2005-07-23 02:12:05 +08:00
|
|
|
200: 'OK',
|
2005-09-13 11:21:44 +08:00
|
|
|
201: 'CREATED',
|
|
|
|
202: 'ACCEPTED',
|
|
|
|
203: 'NON-AUTHORITATIVE INFORMATION',
|
|
|
|
204: 'NO CONTENT',
|
|
|
|
205: 'RESET CONTENT',
|
|
|
|
206: 'PARTIAL CONTENT',
|
|
|
|
300: 'MULTIPLE CHOICES',
|
|
|
|
301: 'MOVED PERMANENTLY',
|
|
|
|
302: 'FOUND',
|
|
|
|
303: 'SEE OTHER',
|
|
|
|
304: 'NOT MODIFIED',
|
|
|
|
305: 'USE PROXY',
|
|
|
|
306: 'RESERVED',
|
|
|
|
307: 'TEMPORARY REDIRECT',
|
|
|
|
400: 'BAD REQUEST',
|
|
|
|
401: 'UNAUTHORIZED',
|
|
|
|
402: 'PAYMENT REQUIRED',
|
|
|
|
403: 'FORBIDDEN',
|
2005-07-23 02:12:05 +08:00
|
|
|
404: 'NOT FOUND',
|
2005-09-13 11:21:44 +08:00
|
|
|
405: 'METHOD NOT ALLOWED',
|
|
|
|
406: 'NOT ACCEPTABLE',
|
|
|
|
407: 'PROXY AUTHENTICATION REQUIRED',
|
|
|
|
408: 'REQUEST TIMEOUT',
|
|
|
|
409: 'CONFLICT',
|
|
|
|
410: 'GONE',
|
|
|
|
411: 'LENGTH REQUIRED',
|
|
|
|
412: 'PRECONDITION FAILED',
|
|
|
|
413: 'REQUEST ENTITY TOO LARGE',
|
|
|
|
414: 'REQUEST-URI TOO LONG',
|
|
|
|
415: 'UNSUPPORTED MEDIA TYPE',
|
|
|
|
416: 'REQUESTED RANGE NOT SATISFIABLE',
|
|
|
|
417: 'EXPECTATION FAILED',
|
2005-07-23 02:12:05 +08:00
|
|
|
500: 'INTERNAL SERVER ERROR',
|
2005-09-13 11:21:44 +08:00
|
|
|
501: 'NOT IMPLEMENTED',
|
|
|
|
502: 'BAD GATEWAY',
|
|
|
|
503: 'SERVICE UNAVAILABLE',
|
|
|
|
504: 'GATEWAY TIMEOUT',
|
|
|
|
505: 'HTTP VERSION NOT SUPPORTED',
|
2005-07-23 02:12:05 +08:00
|
|
|
}
|
|
|
|
|
2006-09-23 21:53:02 +08:00
|
|
|
def safe_copyfileobj(fsrc, fdst, length=16*1024, size=0):
|
|
|
|
"""
|
|
|
|
A version of shutil.copyfileobj that will not read more than 'size' bytes.
|
|
|
|
This makes it safe from clients sending more than CONTENT_LENGTH bytes of
|
|
|
|
data in the body.
|
|
|
|
"""
|
|
|
|
if not size:
|
2006-11-30 06:51:24 +08:00
|
|
|
return
|
2006-09-23 21:53:02 +08:00
|
|
|
while size > 0:
|
|
|
|
buf = fsrc.read(min(length, size))
|
|
|
|
if not buf:
|
|
|
|
break
|
|
|
|
fdst.write(buf)
|
|
|
|
size -= len(buf)
|
|
|
|
|
2006-05-02 09:31:56 +08:00
|
|
|
class WSGIRequest(http.HttpRequest):
|
2005-07-18 14:30:26 +08:00
|
|
|
def __init__(self, environ):
|
2008-07-21 15:57:10 +08:00
|
|
|
script_name = base.get_script_name(environ)
|
2008-07-22 06:13:56 +08:00
|
|
|
path_info = force_unicode(environ.get('PATH_INFO', u'/'))
|
2008-08-26 10:42:39 +08:00
|
|
|
if not path_info or path_info == script_name:
|
2008-07-22 06:13:56 +08:00
|
|
|
# Sometimes PATH_INFO exists, but is empty (e.g. accessing
|
|
|
|
# the SCRIPT_NAME URL without a trailing slash). We really need to
|
|
|
|
# operate as if they'd requested '/'. Not amazingly nice to force
|
|
|
|
# the path like this, but should be harmless.
|
2008-08-26 10:42:39 +08:00
|
|
|
#
|
|
|
|
# (The comparison of path_info to script_name is to work around an
|
|
|
|
# apparent bug in flup 1.0.1. Se Django ticket #8490).
|
2008-07-22 06:13:56 +08:00
|
|
|
path_info = u'/'
|
2005-07-18 14:30:26 +08:00
|
|
|
self.environ = environ
|
2008-07-21 15:57:10 +08:00
|
|
|
self.path_info = path_info
|
|
|
|
self.path = '%s%s' % (script_name, path_info)
|
2006-09-28 09:56:02 +08:00
|
|
|
self.META = environ
|
2008-07-21 15:57:10 +08:00
|
|
|
self.META['PATH_INFO'] = path_info
|
|
|
|
self.META['SCRIPT_NAME'] = script_name
|
2006-06-20 11:48:31 +08:00
|
|
|
self.method = environ['REQUEST_METHOD'].upper()
|
2008-08-31 03:56:14 +08:00
|
|
|
self._post_parse_error = False
|
2005-07-18 14:30:26 +08:00
|
|
|
|
|
|
|
def __repr__(self):
|
2006-09-25 15:25:12 +08:00
|
|
|
# Since this is called as part of error handling, we need to be very
|
|
|
|
# robust against potentially malformed input.
|
|
|
|
try:
|
|
|
|
get = pformat(self.GET)
|
|
|
|
except:
|
|
|
|
get = '<could not parse>'
|
2008-08-31 03:56:14 +08:00
|
|
|
if self._post_parse_error:
|
2006-09-25 15:25:12 +08:00
|
|
|
post = '<could not parse>'
|
2008-08-31 03:56:14 +08:00
|
|
|
else:
|
|
|
|
try:
|
|
|
|
post = pformat(self.POST)
|
|
|
|
except:
|
|
|
|
post = '<could not parse>'
|
2006-09-25 15:25:12 +08:00
|
|
|
try:
|
|
|
|
cookies = pformat(self.COOKIES)
|
|
|
|
except:
|
|
|
|
cookies = '<could not parse>'
|
|
|
|
try:
|
|
|
|
meta = pformat(self.META)
|
|
|
|
except:
|
|
|
|
meta = '<could not parse>'
|
2006-07-20 13:04:45 +08:00
|
|
|
return '<WSGIRequest\nGET:%s,\nPOST:%s,\nCOOKIES:%s,\nMETA:%s>' % \
|
2006-09-25 15:25:12 +08:00
|
|
|
(get, post, cookies, meta)
|
2005-07-18 14:30:26 +08:00
|
|
|
|
|
|
|
def get_full_path(self):
|
2009-03-08 17:58:40 +08:00
|
|
|
# RFC 3986 requires query string arguments to be in the ASCII range.
|
|
|
|
# Rather than crash if this doesn't happen, we encode defensively.
|
|
|
|
return '%s%s' % (self.path, self.environ.get('QUERY_STRING', '') and ('?' + iri_to_uri(self.environ.get('QUERY_STRING', ''))) or '')
|
2005-07-18 14:30:26 +08:00
|
|
|
|
2006-07-22 00:20:22 +08:00
|
|
|
def is_secure(self):
|
2007-09-28 00:57:55 +08:00
|
|
|
return 'wsgi.url_scheme' in self.environ \
|
|
|
|
and self.environ['wsgi.url_scheme'] == 'https'
|
2006-07-22 00:20:22 +08:00
|
|
|
|
2005-07-18 14:30:26 +08:00
|
|
|
def _load_post_and_files(self):
|
|
|
|
# Populates self._post and self._files
|
2006-06-20 12:34:13 +08:00
|
|
|
if self.method == 'POST':
|
2005-07-18 14:30:26 +08:00
|
|
|
if self.environ.get('CONTENT_TYPE', '').startswith('multipart'):
|
2008-07-01 23:10:51 +08:00
|
|
|
self._raw_post_data = ''
|
2008-08-31 03:56:14 +08:00
|
|
|
try:
|
|
|
|
self._post, self._files = self.parse_file_upload(self.META, self.environ['wsgi.input'])
|
|
|
|
except:
|
|
|
|
# An error occured while parsing POST data. Since when
|
|
|
|
# formatting the error the request handler might access
|
|
|
|
# self.POST, set self._post and self._file to prevent
|
|
|
|
# attempts to parse POST data again.
|
|
|
|
self._post = http.QueryDict('')
|
|
|
|
self._files = datastructures.MultiValueDict()
|
|
|
|
# Mark that an error occured. This allows self.__repr__ to
|
|
|
|
# be explicit about it instead of simply representing an
|
|
|
|
# empty POST
|
|
|
|
self._post_parse_error = True
|
|
|
|
raise
|
2005-07-18 14:30:26 +08:00
|
|
|
else:
|
Merged Unicode branch into trunk (r4952:5608). This should be fully
backwards compatible for all practical purposes.
Fixed #2391, #2489, #2996, #3322, #3344, #3370, #3406, #3432, #3454, #3492, #3582, #3690, #3878, #3891, #3937, #4039, #4141, #4227, #4286, #4291, #4300, #4452, #4702
git-svn-id: http://code.djangoproject.com/svn/django/trunk@5609 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2007-07-04 20:11:04 +08:00
|
|
|
self._post, self._files = http.QueryDict(self.raw_post_data, encoding=self._encoding), datastructures.MultiValueDict()
|
2005-07-18 14:30:26 +08:00
|
|
|
else:
|
Merged Unicode branch into trunk (r4952:5608). This should be fully
backwards compatible for all practical purposes.
Fixed #2391, #2489, #2996, #3322, #3344, #3370, #3406, #3432, #3454, #3492, #3582, #3690, #3878, #3891, #3937, #4039, #4141, #4227, #4286, #4291, #4300, #4452, #4702
git-svn-id: http://code.djangoproject.com/svn/django/trunk@5609 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2007-07-04 20:11:04 +08:00
|
|
|
self._post, self._files = http.QueryDict('', encoding=self._encoding), datastructures.MultiValueDict()
|
2005-07-18 14:30:26 +08:00
|
|
|
|
|
|
|
def _get_request(self):
|
|
|
|
if not hasattr(self, '_request'):
|
2006-05-02 09:31:56 +08:00
|
|
|
self._request = datastructures.MergeDict(self.POST, self.GET)
|
2005-07-18 14:30:26 +08:00
|
|
|
return self._request
|
|
|
|
|
|
|
|
def _get_get(self):
|
|
|
|
if not hasattr(self, '_get'):
|
2005-11-27 02:41:29 +08:00
|
|
|
# The WSGI spec says 'QUERY_STRING' may be absent.
|
Merged Unicode branch into trunk (r4952:5608). This should be fully
backwards compatible for all practical purposes.
Fixed #2391, #2489, #2996, #3322, #3344, #3370, #3406, #3432, #3454, #3492, #3582, #3690, #3878, #3891, #3937, #4039, #4141, #4227, #4286, #4291, #4300, #4452, #4702
git-svn-id: http://code.djangoproject.com/svn/django/trunk@5609 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2007-07-04 20:11:04 +08:00
|
|
|
self._get = http.QueryDict(self.environ.get('QUERY_STRING', ''), encoding=self._encoding)
|
2005-07-18 14:30:26 +08:00
|
|
|
return self._get
|
|
|
|
|
|
|
|
def _set_get(self, get):
|
|
|
|
self._get = get
|
|
|
|
|
|
|
|
def _get_post(self):
|
|
|
|
if not hasattr(self, '_post'):
|
|
|
|
self._load_post_and_files()
|
|
|
|
return self._post
|
|
|
|
|
|
|
|
def _set_post(self, post):
|
|
|
|
self._post = post
|
|
|
|
|
|
|
|
def _get_cookies(self):
|
|
|
|
if not hasattr(self, '_cookies'):
|
2006-05-02 09:31:56 +08:00
|
|
|
self._cookies = http.parse_cookie(self.environ.get('HTTP_COOKIE', ''))
|
2005-07-18 14:30:26 +08:00
|
|
|
return self._cookies
|
|
|
|
|
|
|
|
def _set_cookies(self, cookies):
|
|
|
|
self._cookies = cookies
|
|
|
|
|
|
|
|
def _get_files(self):
|
|
|
|
if not hasattr(self, '_files'):
|
|
|
|
self._load_post_and_files()
|
|
|
|
return self._files
|
|
|
|
|
2005-08-11 06:12:05 +08:00
|
|
|
def _get_raw_post_data(self):
|
|
|
|
try:
|
|
|
|
return self._raw_post_data
|
|
|
|
except AttributeError:
|
2006-09-23 21:53:02 +08:00
|
|
|
buf = StringIO()
|
2006-11-27 07:52:12 +08:00
|
|
|
try:
|
|
|
|
# CONTENT_LENGTH might be absent if POST doesn't have content at all (lighttpd)
|
|
|
|
content_length = int(self.environ.get('CONTENT_LENGTH', 0))
|
2008-08-24 02:08:28 +08:00
|
|
|
except (ValueError, TypeError):
|
|
|
|
# If CONTENT_LENGTH was empty string or not an integer, don't
|
|
|
|
# error out. We've also seen None passed in here (against all
|
|
|
|
# specs, but see ticket #8259), so we handle TypeError as well.
|
2006-11-27 07:52:12 +08:00
|
|
|
content_length = 0
|
2007-10-22 07:52:08 +08:00
|
|
|
if content_length > 0:
|
|
|
|
safe_copyfileobj(self.environ['wsgi.input'], buf,
|
|
|
|
size=content_length)
|
2006-09-23 21:53:02 +08:00
|
|
|
self._raw_post_data = buf.getvalue()
|
|
|
|
buf.close()
|
2005-08-11 06:12:05 +08:00
|
|
|
return self._raw_post_data
|
|
|
|
|
2005-07-18 14:30:26 +08:00
|
|
|
GET = property(_get_get, _set_get)
|
|
|
|
POST = property(_get_post, _set_post)
|
|
|
|
COOKIES = property(_get_cookies, _set_cookies)
|
|
|
|
FILES = property(_get_files)
|
|
|
|
REQUEST = property(_get_request)
|
2005-08-11 06:12:05 +08:00
|
|
|
raw_post_data = property(_get_raw_post_data)
|
2005-07-18 14:30:26 +08:00
|
|
|
|
2008-07-21 15:57:10 +08:00
|
|
|
class WSGIHandler(base.BaseHandler):
|
2007-08-12 18:24:05 +08:00
|
|
|
initLock = Lock()
|
2007-10-20 15:42:34 +08:00
|
|
|
request_class = WSGIRequest
|
2007-08-12 18:24:05 +08:00
|
|
|
|
2005-07-18 14:30:26 +08:00
|
|
|
def __call__(self, environ, start_response):
|
|
|
|
from django.conf import settings
|
|
|
|
|
|
|
|
# Set up middleware if needed. We couldn't do this earlier, because
|
|
|
|
# settings weren't available.
|
|
|
|
if self._request_middleware is None:
|
2007-08-12 18:24:05 +08:00
|
|
|
self.initLock.acquire()
|
|
|
|
# Check that middleware is still uninitialised.
|
|
|
|
if self._request_middleware is None:
|
|
|
|
self.load_middleware()
|
|
|
|
self.initLock.release()
|
2005-07-18 14:30:26 +08:00
|
|
|
|
2008-07-21 15:57:10 +08:00
|
|
|
set_script_prefix(base.get_script_name(environ))
|
2008-08-06 23:32:46 +08:00
|
|
|
signals.request_started.send(sender=self.__class__)
|
2005-07-18 14:30:26 +08:00
|
|
|
try:
|
2007-10-20 15:42:34 +08:00
|
|
|
try:
|
|
|
|
request = self.request_class(environ)
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
response = http.HttpResponseBadRequest()
|
|
|
|
else:
|
|
|
|
response = self.get_response(request)
|
2006-05-02 09:31:56 +08:00
|
|
|
|
2007-10-20 15:42:34 +08:00
|
|
|
# Apply response middleware
|
|
|
|
for middleware_method in self._response_middleware:
|
|
|
|
response = middleware_method(request, response)
|
2007-11-11 11:55:44 +08:00
|
|
|
response = self.apply_response_fixes(request, response)
|
2006-05-02 09:31:56 +08:00
|
|
|
finally:
|
2008-08-06 23:32:46 +08:00
|
|
|
signals.request_finished.send(sender=self.__class__)
|
2006-02-20 12:36:17 +08:00
|
|
|
|
2005-07-23 02:12:05 +08:00
|
|
|
try:
|
|
|
|
status_text = STATUS_CODE_TEXT[response.status_code]
|
|
|
|
except KeyError:
|
|
|
|
status_text = 'UNKNOWN STATUS CODE'
|
|
|
|
status = '%s %s' % (response.status_code, status_text)
|
2007-09-15 06:33:56 +08:00
|
|
|
response_headers = [(str(k), str(v)) for k, v in response.items()]
|
2005-08-16 06:47:41 +08:00
|
|
|
for c in response.cookies.values():
|
Merged Unicode branch into trunk (r4952:5608). This should be fully
backwards compatible for all practical purposes.
Fixed #2391, #2489, #2996, #3322, #3344, #3370, #3406, #3432, #3454, #3492, #3582, #3690, #3878, #3891, #3937, #4039, #4141, #4227, #4286, #4291, #4300, #4452, #4702
git-svn-id: http://code.djangoproject.com/svn/django/trunk@5609 bcc190cf-cafb-0310-a4f2-bffc1f526a37
2007-07-04 20:11:04 +08:00
|
|
|
response_headers.append(('Set-Cookie', str(c.output(header=''))))
|
2005-08-16 06:47:41 +08:00
|
|
|
start_response(status, response_headers)
|
2006-09-22 20:32:00 +08:00
|
|
|
return response
|
2007-11-11 11:55:44 +08:00
|
|
|
|