Newer
Older

Silas S. Brown
committed
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
#!/usr/bin/env python
program_name = "Web Adjuster v0.1684 (c) 2012-13 Silas S. Brown"
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import sys,os
if '--html-options' in sys.argv: # for updating the website
tornado=False
inDL = 0
print "<h3>Options for "+program_name[:program_name.index("(c)")].strip()+"</h3>"
def heading(h):
global inDL
if inDL: print "</dl>"
print "<h4>"+h+"</h4>"
print "<dl>"
inDL = 1
def define(name,default=None,help="",multiple=False):
if default or default==False:
if type(default)==type(""): default=default.replace(",",", ").replace(" "," ")
else: default=repr(default)
default=" (default "+default+")"
else: default=""
def amp(h): return h.replace('&','&').replace('<','<').replace('>','>')
help = amp(help)
for ttify in ["option=\"value\"","option='value'","\"\"\"","--"]: help=help.replace(ttify,"<nobr><tt>"+ttify+"</tt></nobr>")
print "<dt><tt>--"+name+"</tt>"+amp(default)+"</dt><dd>"+help.replace(" - ","---")+"</dd>"
def getfqdn(): return "is the machine's domain name" # default is ...
else:
import tornado
from tornado.httpclient import AsyncHTTPClient
from tornado.ioloop import IOLoop
from tornado import web
from tornado.web import Application, RequestHandler, asynchronous
import tornado.options
from tornado.options import define,options
from socket import getfqdn
def heading(h): pass
heading("General options")
define("config",help="Name of the configuration file to read, if any. The process's working directory will be set to that of the configuration file so that relative pathnames can be used inside it. Any option that would otherwise have to be set on the command line may be placed in this file as an option=\"value\" or option='value' line (without any double-hyphen prefix). Multi-line values are possible if you quote them in \"\"\"...\"\"\", and you can use standard \\ escapes. You can also set config= in the configuration file itself to import another configuration file (for example if you have per-machine settings and global settings). If you want there to be a default configuration file without having to set it on the command line every time, an alternative option is to set the ADJUSTER_CFG environment variable.")
heading("Network listening and security settings")
define("port",default=28080,help="The port to listen on. Setting this to 80 will make it the main Web server on the machine (which will likely require root access on Unix).")
define("user",help="The user name to run as, instead of root. This is for Unix machines where port is less than 1024 (e.g. port=80) - you can run as root to open the privileged port, and then drop privileges. Not needed if you are running as an ordinary user.")
define("address",default="",help="The address to listen on. If unset, will listen on all IP addresses of the machine. You could for example set this to localhost if you want only connections from the local machine to be received, which might be useful in conjunction with real_proxy.")
define("password",help="The password. If this is set, nobody can connect without specifying ?p= followed by this password. It will then be sent to them as a cookie so they don't have to enter it every time. Notes: (1) If wildcard_dns is False and you have multiple domains in host_suffix, then the password cookie will have to be set on a per-domain basis. (2) On a shared server you probably don't want to specify this on the command line where it can be seen by process-viewing tools; use a configuration file instead.")
define("password_domain",help="The domain entry in host_suffix to which the password applies. For use when wildcard_dns is False and you have several domains in host_suffix, and only one of them (perhaps the one with an empty default_site) is to be password-protected, with the others public. If this option is used then prominentNotice (if set) will not apply to the passworded domain.") # on the assumption that those who know the password understand what the tool is
define("auth_error",default="Authentication error",help="What to say when password protection is in use and a correct password has not been entered. HTML markup is allowed in this message. As a special case, if this begins with http:// then it is assumed to be the address of a Web site to which the browser should be redirected; if it is set to http:// and nothing else, the request will be passed to the server specified by own_server (if set).") # TODO: basic password form? or would that encourage guessing
define("open_proxy",default=False,help="Whether or not to allow running with no password. Off by default as a safeguard against accidentally starting an open proxy.")
define("real_proxy",default=False,help="Whether or not to accept requests in real HTTP 'proxy' format with original domains. Warning: this bypasses the password and implies open_proxy. Off by default.")
define("via",default=True,help="Whether or not to update the Via: and X-Forwarded-For: HTTP headers when forwarding requests") # (Via is "must" in RFC 2616)
define("robots",default=False,help="Whether or not to pass on requests for /robots.txt. If this is False then all robots will be asked not to crawl the site; if True then the original site's robots settings will be mirrored. The default of False is recommended.")
heading("DNS and website settings")
define("host_suffix",default=getfqdn(),help="The last part of the domain name. For example, if the user wishes to change www.example.com and should do so by visiting www.example.com.adjuster.example.org, then host_suffix is adjuster.example.org. If you do not have a wildcard domain then you can still adjust one site by setting wildcard_dns to False, host_suffix to your non-wildcard domain, and default_site to the site you wish to adjust. If you have more than one non-wildcard domain, you can set wildcard_dns to False, host_suffix to all your domains separated by slash (/), and default_site to the sites these correspond to, again separated by slash (/). If wildcard_dns is False and default_site is empty (or if it's a /-separated list and one of its items is empty), then the corresponding host_suffix gives a URL box and sets its domain in a cookie (and adds a link at the bottom of pages to clear this and return to the URL box), but this should be done only as a last resort: you can browse only one domain at a time at that host_suffix (links and HTTP redirects to other domains will leave the adjuster), and the sites you visit at that host_suffix might be able to see some of each other's cookies etc (leaking privacy) although the URL box page will try to clear site cookies.")
define("default_site",help="The site to fetch from if nothing is specified before host_suffix. If this is omitted then the user is given a URL box when that happens.")
define("own_server",help="Where to find your own web server. This can be something like localhost:1234 or 192.168.0.2:1234. If it is set, then any request that does not match host_suffix will be passed to that server to deal with, unless real_proxy is in effect. You can use this option as a quick way to put your existing server on the same public port if you don't want to go via nginx or whatever. Note: the password option will NOT password-protect your own_server.")
define("ownServer_if_not_root",default=True,help="When trying to access an empty default_site, if the path requested is not / then redirect to own_server (if set) instead of providing a URL box. If this is False then the URL box will be provided no matter what path was requested.") # TODO: "ownServer even if root" option, i.e. option to make host_suffix by itself go to own_server? Or make ownServer_if_not_root permanent? The logic that deals with off-site Location: redirects assumes the URL box will normally be at / (TODO document this?)
define('search_sites',multiple=True,help="Comma-separated list of search sites to be made available when the URL box is displayed (if default_site is empty). Each item in the list should be a URL (which will be prepended to the search query), then a space, then a short description of the site. The first item on the list is used by default; the user can specify other items by making the first word of their query equal to the first word of the short description. Additionally, if some of the letters of that first word are in parentheses, the user may specify just those letters. So for example if you have an entry http://search.example.com?q= (e)xample, and the user types 'example test' or 'e test', it will use http://search.example.com?q=test")
define("wildcard_dns",default=True,help="Set this to False if you do NOT have a wildcard domain and want to process only default_site. Setting this to False does not actually prevent other sites from being processed (for example, a user could override their local DNS resolver to make up for your lack of wildcard domain); if you want to really prevent other sites from being processed then you could also set own_server to deal with unrecognised domains. Setting wildcard_dns to False does stop the automatic re-writing of links to sites other than default_site. Leave it set to True to have ALL sites' links rewritten on the assumption that you have a wildcard domain.") # will then say "(default True)"
heading("General adjustment options")
define("default_cookies",help="Semicolon-separated list of name=value cookies to send to all remote sites, for example to set preferences. Any cookies that the browser itself sends will take priority over cookies in this list. Note that these cookies are sent to ALL sites. You can set a cookie only on a specific browser by putting (browser-string) before the cookie name, e.g. (iPad)x=y will set x=y only if 'iPad' occurs in the browser string (to match more than one browser-string keyword, you have to specify the cookie multiple times).") # TODO: site-specific option
# TODO: sets of adjustments can be switched on and off at a /__settings URL ? or leave it to the injected JS
define("headAppend",help="Code to append to the HEAD section of every HTML document that has a BODY. Use for example to add your own stylesheet links and scripts. Not added to documents that lack a BODY such as framesets.")
define("headAppendCSS",help="URL of a stylesheet for headAppend. This option automatically generates the LINK REL=... markup for it, and also tries to delete the string '!important' from other stylesheets, to emulate setting this stylesheet as a user CSS.")
define("cssName",help="A name for the stylesheet specified in headAppendCSS, such as \"High Contrast\". If cssName is set, then the headAppendCSS stylesheet will be marked as \"alternate\", with Javascript links at the bottom of the page for browsers that lack their own CSS switching options. If cssName is not set (default) then any stylesheet specified in headAppendCSS will be always on.") # TODO: non-Javascript fallback for the switcher
define("cssNameReload",multiple=True,default="IEMobile 6,Opera Mini,rekonq",help="List of (old) browsers that require alternate code for the cssName option, which is slower as it involves reloading the page on CSS switches. Use this if the CSS switcher provided by cssName does nothing on your browser.") # Opera Mini sometimes worked and sometimes didn't; maybe there were regressions at their proxy. JS switcher needs network traffic anyway on Opera Mini so we almost might as well use the non-JS version
define("headAppendRuby",default=False,help="Convenience option which appends CSS and Javascript code to the HEAD that tries to ensure simple RUBY markup displays legibly across all modern browsers; this might be useful if you used Annotator Generator to make the htmlFilter program.")
define("bodyAppend",help="Code to append to the BODY section of every HTML document that has one. Use for example to add a script that needs to be run after the rest of the body has been read, or to add a footer explaining how the page has been modified. See also prominentNotice.") # TODO: note that it will go at the bottom of IFRAMEs also, and suggest using something similar to prominentNotice's iframe-detection code?
define("bodyAppendGoesAfter",help="If this is set to some text or HTML code that appears verbatim in the body section, the code in bodyAppend will be inserted after the last instance of this text (case sensitive) instead of at the end of the body. Use for example if a site styles its pages such that the end of the body is not a legible place for a footer.") # (e.g. it would overprint some position=fixed stuff)
define("bodyPrepend",help="Code to place at the start of the BODY section of every HTML document that has one.") # May be a useful place to put some scripts. For example, a script that changes a low-vision stylesheet according to screen size might be better in the BODY than in the HEAD, because some Webkit-based browsers do not make screen size available when processing the HEAD of the starting page. # but sometimes it still goes wrong on Chromium startup; probably a race condition; might be worth re-running the script at end of page load just to make sure
define("prominentNotice",help="Text to add as a brief prominent notice to processed sites (may include HTML). If the browser has sufficient Javascript support, this will float relative to the browser window and will contain an 'acknowledge' button to hide it (for the current site in the current browsing session). Use prominentNotice if you need to add important information about how the page has been modified.")
define("delete",multiple=True,help="Comma-separated list of regular expressions to delete from HTML documents. Can be used to delete selected items of Javascript and other code if it is causing trouble for your browser. Will also delete from the text of pages; use with caution.")
define("delete_doctype",default=False,help="Delete the DOCTYPE declarations from HTML pages. This option is needed to get some old Webkit browsers to apply multiple CSS files consistently.")
define("deleteOmit",multiple=True,default="iPhone,iPad,Android,Macintosh",help="A list of browsers that do not need the delete and delete-doctype options to be applied. If any of these strings occur in the user-agent then these options are disabled for that request, on the assumption that these browsers are capable enough to cope with the \"problem\" code.")
define("codeChanges",help="Several lines of text specifying changes that are to be made to all HTML and Javascript code files on certain sites; use as a last resort for fixing a site's scripts. This option is best set in the configuration file and surrounded by r\"\"\"...\"\"\". The first line is a URL prefix, the second is a string of code to search for, and the third is a string to replace it with. Further groups of URL/search/replace lines may follow; blank lines and lines starting with # are ignored.")
define("viewsource",default=False,help="Provide a \"view source\" option. If set, you can see a page's pre-adjustment source code, plus client and server headers, by adding \".viewsource\" to the end of a URL (after any query parameters etc)")
define("htmlonly_mode",default=True,help="Provide a checkbox allowing the user to see pages in \"HTML-only mode\", stripping out most images, scripts and CSS; this might be a useful fallback for very slow connections if a site's pages bring in many external files and the browser cannot pipeline its requests. The checkbox is displayed by the URL box, not at the bottom of every page.") # if no pipeline, a slow UPLINK can be a problem, especially if many cookies have to be sent with each request for a js/css/gif/etc.
# (and if wildcard_dns=False and we're domain multiplexing, our domain can accumulate a lot of cookies, causing requests to take more uplink bandwidth, TODO: do something about this?)
# Above says "most" not "all" because some stripping not finished (see TODO comments) and because some scripts/CSS added by Web Adjuster itself are not stripped
heading("External processing options")
define("htmlFilter",help="External program to run to filter every HTML document. This can be any shell command; its standard input will get the HTML (or the plain text if htmlText is set), and it should send the new version to standard output. Multiple copies of the program might be run at the same time to serve concurrent requests. UTF-8 character encoding is used.")
define("htmlFilterName",help="A name for the task performed by htmlFilter. If this is set, the user will be able to switch it on and off from the browser via a cookie and some Javascript links at the bottom of HTML pages.") # TODO: non-Javascript fallback for the switcher
define("htmlJson",default=False,help="Try to detect HTML strings in JSON responses and feed them to htmlFilter. This can help when using htmlFilter with some AJAX-driven sites. IMPORTANT: Unless you also set the 'separator' option, the external program must preserve all newline characters, because multiple HTML strings in the same JSON response will be given to it separated by newlines, and the newlines of the output determine which fragment to put back where. (If you combine htmlJson with htmlText, the external program will see text in HTML in JSON as well as text in HTML, but it won't see text in HTML in JSON in HTML.)")
define("htmlText",default=False,help="Causes the HTML to be parsed, and only the text parts (not the markup) will be sent to htmlFilter. Useful to save doing HTML parsing in the external program. The external program is still allowed to include HTML markup in its output. IMPORTANT: Unless you also set the 'separator' option, the external program must preserve all newline characters, because multiple text strings will be given to it separated by newlines, and the newlines of the output determine which modified string to put back where.")
define("separator",help="If you are using htmlFilter with htmlJson and/or htmlText, you can set separator to any text string to be used as a separator between multiple items of data when passing them to the external program. By default, newlines are used for this, but you can set it to any other character or sequence of characters that cannot be added or removed by the program. (It does not matter if a website's text happens to use the separator characters.) If you set separator, not only will it be used as a separator BETWEEN items of data but also it will be added before the first and after the last item, thus allowing you to use an external program that outputs extra text before the first and after the last item. The extra text will be discarded. If however you do not set separator then the external program should not add anything extra before/after the document.")
define("leaveTags",multiple=True,default="script,style,title,textarea,option",help="When using htmlFilter with htmlText, you can set a comma-separated list of HTML tag names whose enclosed text should NOT be sent to the external program for modification. For this to work, the website must properly close these tags and must not nest them. (This list is also used for character-set rendering.)") # not including 'option' can break pages that need character-set rendering
heading("Server control options")
define("background",default=False,help="If True, fork to the background as soon as the server has started (Unix only). You might want to enable this if you will be running it from crontab, to avoid long-running cron processes.")
define("restart",default=False,help="If True, try to terminate any other process listening on our port number before we start (Unix only). Useful if Web Adjuster is running in the background and you want to quickly restart it with new options. Note that no check is made to make sure the other process is a copy of Web Adjuster; whatever it is, if it has our port open, it is asked to stop.")
define("stop",default=False,help="Like 'restart', but don't replace the other process after stopping it. This option can be used to stop a background server (if it's configured with the same port number) without starting a new one. Unix only.")
define("install",default=False,help="Try to install the program in the current user's Unix crontab as an @reboot entry, unless it's already there. The arguments of the cron entry will be the same as the command line, with no directory changes (so make sure you are in the home directory before doing this). The program will continue to run normally after the installation attempt. (If you are on Cygwin then you might need to run cron-config also.)")
define("watchdog",default=0,help="(Linux only) Ping the system's watchdog every this number of seconds. This means the watchdog can reboot the system if for any reason Web Adjuster stops functioning, provided that no other program is pinging the watchdog. The default value of 0 means do not ping the watchdog.") # This option might not be suitable for a system whose watchdog cannot be set to wait a few extra seconds for a very complex page to be parsed (the worst case is where the program is just about to ping the watchdog when it gets a high-CPU request; the allowed delay time is the difference between the ping interval and the watchdog's \"heartbeat\" timeout, and this difference can be maximised by setting the ping interval to 1 although this does mean Adjuster will wake every second). But see watchdogWait.
define("watchdogWait",default=0,help="When the watchdog option is set, wait this number of seconds before stopping the watchdog pings. This causes the watchdog pings to be sent from a separate thread and therefore not stopped when the main thread is busy; they are stopped only when the main thread has not responded for watchdogWait seconds. This can be used to work around the limitations of a hardware watchdog that cannot be set to wait that long.") # such as the Raspberry Pi's Broadcom chip which defaults to 10 seconds and has max 15; you could say watchdog=5 and watchdogWait=60
define("browser",help="The Web browser command to run. If this is set, Web Adjuster will run the specified command (which is assumed to be a web browser), and will exit when this browser exits. This is useful in conjunction with --real_proxy to have a personal proxy run with the browser. You still need to set the browser to use the proxy; this can sometimes be done via browser command line or environment variables.")
heading("Media conversion options")
define("bitrate",default=0,help="Audio bitrate for MP3 files, or 0 to leave them unchanged. If this is set to anything other than 0 then the 'lame' program must be present. Bitrate is normally a multiple of 8. If your mobile device has a slow link, try 16 for speech.")
define("askBitrate",default=False,help="If True, instead of recoding MP3 files unconditionally, try to add links to \"lo-fi\" versions immediately after each original link so you have a choice.")
define("pdftotext",default=False,help="If True, add links to run PDF files through the 'pdftotext' program (which must be present if this is set). A text link will be added just after any PDF link that is found, so that you have a choice of downloading PDF or text; note that pdftotext does not always manage to extract all text. The htmlJson setting will also be applied to the PDF link finder, and see also the guessCMS option.")
define("epubtotext",default=False,help="If True, add links to run EPUB files through Calibre's 'ebook-convert' program (which must be present), to produce a text-only option. A text link will be added just after any EPUB link that is found, so that you have a choice of downloading EPUB or text. The htmlJson setting will also be applied to the EPUB link finder, and see also the guessCMS option.")
# pdftotext and epubtotext both use temporary files, which are created in the system default temp directory unless overridden by environment variables TMPDIR, TEMP or TMP, TODO: do we want an override for NamedTemporaryFile's dir= option ourselves? (/dev/shm might make more sense on some Flash-based systems, although filling the RAM and writing to swap might do more damage than writing files in /tmp if it gets big; also hopefully some OS's won't actually write anything if the file has been deleted before the buffer needed to be flushed (TODO: check this))
define("epubtozip",default=False,help="If True, add links to download EPUB files renamed to ZIP, as a convenience for platforms that don't have EPUB readers but can open them as ZIP archives and display the XHTML files they contain. The htmlJson setting will also be applied to the EPUB link finder, and see also the guessCMS option.") # TODO: option to cache the epub file and serve its component files individually, so other transforms can be applied and for platforms without ZIP capabilities
define("guessCMS",default=False,help="If True, then the pdftotext, epubtotext and epubtozip options attempt to guess if a link is pointing to a PDF or EPUB file via a Content Management System (i.e. the URL does not end in .pdf or .epub, but contains something like ?format=PDF)")
define("pdfepubkeep",default=200,help="Number of seconds to keep any generated text files from PDF and EPUB. If this is 0, the files will be deleted immediately, but that might be undesirable: if a mobile phone browser has a timeout that takes effect before ebook-convert has finished (this can sometimes be the case with Opera Mini for example), it might be best to allow the user to wait a short time and re-submit the request, this time getting a cached response.") # Opera Mini's opera:config can set the loading timeout to longer, default is 30 seconds
heading("Character rendering options")
# TODO: option to add a switch at top of page ?
define("render",default=False,help="Whether to enable the character-set renderer. This functionality requires the Python Imaging Library and suitable fonts. The settings of htmlJson and leaveTags will also be applied to the renderer. Text from computed Javascript writes might not be rendered as images.") # ("computed" as in not straight from a JSON document. TODO: could write a piece of JS that goes through the DOM finding them? ditto any JS alterations that haven't been through htmlFilter, although you'd have to mark the ones that have and this could be filter-dependent)
define("renderFont",help="The font file to use for the character-set renderer (if enabled). This should be a font containing all the characters you want to render, and it should be in .TTF, .OTF or other Freetype-supported format (.PCF is sometimes possible if you set renderSize correctly, e.g. 16 for wenquanyi_12pt.pcf)") # TODO: different fonts for different Unicode ranges? (might be hard to auto-detect missing characters)
define("renderInvert",default=False,help="If True, the character-set renderer (if enabled) will use a black background. Useful when you are also adding a stylesheet with a dark background.")
define("renderSize",default=20,help="The height (in pixels) to use for the character-set renderer if it is enabled.")
define("renderPath",default="/@_",help="The location on every adjusted website to put the character-set renderer's images, if enabled. This must be made up of URL-safe characters starting with a / and should be a short path that is unlikely to occur on normal websites.")
define("renderFormat",default="png",help="The file format of the images to be created by the character-set renderer if it is enabled, for example 'png' or 'jpeg'.")
define("renderRange",multiple=True,help="The lowest and highest Unicode values to be given to the character-set renderer if it is enabled. For example 3000:A6FF for most Chinese characters. Multiple ranges are allowed. Any characters NOT in one of the ranges will be passed to the browser to render. If the character-set renderer is enabled without renderRange being set, then ALL text will be rendered to images.")
define("renderOmit",multiple=True,default="iPhone,iPad,Android,Macintosh",help="A list of browsers that do not need the character-set renderer. If any of these strings occur in the user-agent then the character set renderer is turned off even if it is otherwise enabled. The assumption is that these browsers can always do their own character-set rendering.")
define("renderCheck",help="If renderOmit does not apply to the browser, it might still be possible to check for native character-set support via Javascript. renderCheck can be set to the Unicode value of a character to be checked (try 802F for complete Chinese support); if the browser reports its width differently from known unprintable characters, we assume it won't need our renderer.") # 802F shouldn't create false positives in environments that support only GB2312, only Big5, only SJIS or only KSC instead of all Chinese. It does have GB+ and Big5+ codes (and also demonstrates that we want a hex number). If browser's "unprintable character" glyph happens to be the same width as renderCheck anyway then we could have a false negative, but that's better than a false positive and the user can still switch it off manually if renderName is left set.
define("renderNChar",default=1,help="The maximum number of characters per image to be given to the character-set renderer if it is enabled. Keeping this low means the browser cache is more likely to be able to re-use images, but some browsers might struggle if there are too many separate images. Don't worry about Unicode \"combining diacritic\" codes: any found after a character that is to be rendered will be included with it without counting toward the renderNChar limit and without needing to be in renderRange.")
define("renderWidth",default=0,help="The maximum pixel width of a 'word' when using the character-set renderer. If you are rendering a language that uses space to separate words, but are using only one or two characters per image, then the browser might split some words in the middle. Setting renderWidth to some value other than 0 can help to prevent this: any word narrower than renderWidth will be enclosed in a <nobr> element. (This will however be ineffective if your stylesheet overrides the behaviour of <nobr>.) You should probably not set renderWidth if you intend to render languages that do not separate words with spaces.")
define("renderDebug",default=False,help="If the character-set renderer is having problems, try to insert comments in the HTML source to indicate why. The resulting HTML is not guaranteed to be well-formed, but it might help you debug a misbehaving htmlFilter. This option may also insert comments in bad HTML before the htmlFilter stage even when the renderer is turned off.")
define("renderName",default="Fonts",help="A name for a switch that allows the user to toggle character set rendering on and off from the browser (via a cookie and Javascript links at the bottom of HTML pages); if set to the empty string then no switch is displayed. At any rate none is displayed when renderOmit applies.") # TODO: non-Javascript fallback for the switcher
heading("Dynamic DNS options")
define("dynamic_dns_api",help="URL (http or https) that will cause one of your dynamic DNS entries to be updated to a new IP address. If this is set, it will be used to automatically update the domains listed in host_suffix. The URL should contain two instances of %s; the first will be substituted with the domain name and the second with its new IP address.")
define("ddns_api_user",help="The user name to supply to the dynamic_dns_api URL (Basic authentication over HTTP or HTTPS)")
define("ddns_api_pwd",help="The password to supply to the dynamic_dns_api URL (Basic authentication over HTTP or HTTPS). Best not placed on the command line on a shared machine where it can be seen by process-viewing tools; use a configuration file instead.")
define("ip_query_url",help="URL that will return your current public IP address, as a line of text with no markup added. Used for the dynamic_dns_api option. You can set up a URL by placing a CGI script on a server outside your network and having it do: echo Content-type: text/plain;echo;echo $REMOTE_ADDR")
define("ip_check_interval",default=8000,help="Number of seconds between checks of ip_query_url for the dynamic_dns_api option")
define("ip_force_interval",default=7*24*3600,help="Number of seconds before dynamic_dns_api (if set) is forced to update even if there was no IP change. This is to let the Dynamic DNS system know that we are still around. Set to 0 to disable forced updates (a forced update will occur on server startup anyway), otherwise an update will occur on the next ip_check_interval after ip_force_interval has elapsed.")
define("ip_change_command",help="An optional shell command to run (in a separate thread) whenever your IP changes. Use instead of, or in addition to, dynamic_dns_api. The new IP address will be appended to this command.")
heading("Speedup options")
define("useLXML",default=False,help="Use the LXML library for parsing HTML documents. This is usually faster, but it can fail if your system does not have a good installation of LXML and its dependencies, or if the websites you visit are badly broken. Use of LXML libraries may also result in more changes to all HTML markup, although this should be harmless.")
define("renderBlocks",default=False,help="Treat all characters rendered by the character-set renderer as \"blocks\" that are guaranteed to have the same dimensions (true for example if you are using the renderer for Chinese characters only). This is faster than checking words individually, but it may produce incorrect HEIGHT and WIDTH attributes if given a range of characters whose dimensions do differ.") # TODO: blocksRange option for if want to render some that do and some that don't? (but profile it: PIL's getsize just might turn out to be quicker than the high-level range-check code)
define("fasterServer",help="Address:port of another instance of Web Adjuster to which we forward all traffic whenever it is available. When the other instance is not available, traffic will be handled by this one. Use for example if you have a slower always-on machine and a faster not-always-on machine and you want the slower machine to delegate to the faster machine when available. See also ipTrustReal.")
define("ipTrustReal",help="IP address of a machine that we trust, for example a machine that is using us as fasterServer. Any traffic coming from this machine with an X-Real-Ip header will be logged as though it originated at the value of its X-Real-Ip header.") # (TODO: multiple IPs option?)
# THIS MUST BE THE LAST SECTION because it continues into
# the note below about Tornado logging options. (The order
# of define()s affects the HTML order only; --help will be
# sorted alphabetically by Tornado.)
heading("Logging options")
define("renderLog",default=False,help="Whether or not to log requests for character-set renderer images. Note that this can generate a LOT of log entries on some pages.")
define("logUnsupported",default=False,help="Whether or not to log attempts at requests using unsupported HTTP methods. Note that this can sometimes generate nearly as many log entries as renderLog if some browser (or malware) tries to do WebDAV PROPFIND requests on each of the images.")
define("ipNoLog",multiple=True,help="A comma-separated list of IP addresses which can use the adjuster without being logged. If your network has a \"friendly probing\" service then you might want to use this to stop it filling up the logs. (Any tracebacks it causes will still be logged however.)")
define("squashLogs",default=True,help="Try to remove some duplicate information from consecutive log entries, to make logs easier to check. You might want to set this to False if you plan to use automatic search tools on the logs.") # (word 'some' is important as not all duplicate info is guaranteed to be removed)
define("whois",default=False,help="Try to log the Internet service provider for each IP address in the logs. Requires the 'whois' program. The extra information is written as separate log entries when it becomes available, and not for recent duplicate IPs or IPs that do not submit valid requests.")
define("errorHTML",default="Adjuster error has been logged",help="What to say when an uncaught exception (due to a misconfiguration or programming error) has been logged. HTML markup is allowed in this message.")
define("logDebug",default=False,help="Write debugging messages (to standard error if in the foreground, or to the logs if in the background). Use as an alternative to --logging=debug if you don't also want debug messages from other Tornado modules.")
# and continuing into the note below:
if not tornado:
print "</dl>"
print "Tornado-provided logging options are not listed above because they might vary across Tornado versions; run <tt>python adjuster.py --help</tt> to see a full list of the ones available on your setup. They typically include <tt>log_file_max_size</tt>, <tt>log_file_num_backups</tt>, <tt>log_file_prefix</tt> and <tt>log_to_stderr</tt>." # and --logging=debug but that may generate a lot of entries from curl_httpclient
raise SystemExit
import time,os,commands,string,urllib,urlparse,re,socket,logging,subprocess,threading,json,base64
from HTMLParser import HTMLParser,HTMLParseError
try: # can we page the help text?
import pydoc,cStringIO ; pydoc.pager # ensure present
old_top = tornado.options.print_help
def new_top():
dat = cStringIO.StringIO() ; old_top(dat)
pydoc.pager(dat.getvalue())
tornado.options.print_help = new_top
except: pass
def hostSuffix(n=0):
if options.host_suffix:
return options.host_suffix.split("/")[n]
return ""
def defaultSite(n=0):
if options.default_site:
return options.default_site.split("/")[n]
return ""
def convert_to_real_host(requested_host,cookie_host=None):
# Converts the host name requested by the user into the
# actual host that we should request, or returns "" if
# we should display the URL entry box etc.
# Returns -1 if we should pass to options.own_server.
if requested_host:
port=":"+str(options.port)
orig_requested_host = requested_host
if requested_host.endswith(port): requested_host=requested_host[:-len(port)]
n=0
for h in options.host_suffix.split("/"):
if requested_host.endswith("."+h): return redot(requested_host[:-len(h)-1])
if requested_host == h:
d = defaultSite(n)
if d: return d
elif cookie_host==h: return 0 # special type of (false) value to tell the code that we're handling this request ourselves but possibly via ownServer_if_not_root
else: return cookie_host
n += 1
if options.real_proxy: return orig_requested_host
if options.own_server: return -1
else: return defaultSite()
def convert_to_via_host(requested_host):
if requested_host:
port=":"+str(options.port)
orig_requested_host = requested_host
if requested_host.endswith(port): requested_host=requested_host[:-len(port)]
if options.port==80: port=""
for h in options.host_suffix.split("/"):
if (requested_host == h and options.default_site) or requested_host.endswith("."+h): return h+port
if options.wildcard_dns and not '/' in options.host_suffix: return options.host_suffix+port
return "somewhere" # ?
def convert_to_requested_host(real_host,cookie_host=None):
# Converts the actual host name into the host name that
# the user should request to get it through us
if not real_host: return ""
if options.port==80: port=""
else: port=":"+str(options.port)
if options.default_site:
n=0
for i in options.default_site.split("/"):
if not i: i=cookie_host
if real_host == i:
return hostSuffix(n)+port
n += 1
if not options.wildcard_dns: return real_host # leave the proxy
else: return dedot(real_host)+"."+hostSuffix()+port
# RFC 2109: A Set-Cookie from request-host y.x.foo.com for Domain=.foo.com would be rejected, because H is y.x and contains a dot.
# That means (especially if a password is set) we'd better make sure our domain-rewrites don't contain dots. If requested with dot, relocate to without dot.
def dedot(domain):
# - means . but -- is a real - (OK as 2 dots can't come together and a - can't come immediately after a dot in domain names, so --- = -., ---- = --, ----- = --. etc)
return domain.replace("-","--").replace(".","-")
def redot(domain): return domain.replace("--","@MINUS@").replace("-",".").replace("@MINUS","-")
def changeConfigDirectory(fname):
fdir,ffile = os.path.split(fname)
def tryDir(d):
d2 = d
if d2 and not d2.endswith(os.sep): d2 += os.sep
if os.path.isfile(d2+fname):
if d: os.chdir(d)
if fdir: os.chdir(fdir)
return True # found it
if tryDir("") or not (os.sep in sys.argv[0] or (os.sep=='\\' and '/' in sys.argv[0])): return ffile
if os.sep=="\\" and '/' in sys.argv[0] and os.path.isfile(sys.argv[0].replace('/','\\')): sys.argv[0]=sys.argv[0].replace('/','\\') # hack for some Windows Python builds accepting slash in command line but reporting os.sep as backslash
if tryDir(sys.argv[0][:sys.argv[0].rfind(os.sep)]):
return ffile
return fname
def readOptions():
tornado.options.parse_command_line()
configsDone = set()
if not options.config: options.config=os.environ.get("ADJUSTER_CFG","") # must do HERE rather than setting default= above, or options.config=None below might not work
while options.config and (options.config,os.getcwd()) not in configsDone:
# sys.stderr.write("Reading config from "+options.config+"\n")
config = options.config ; options.config=None # allow it to be overridden on the next file
oldDir = os.getcwd()
config2 = changeConfigDirectory(config)
try: open(config2)
except:
sys.stderr.write("Cannot open configuration file %s (current directory is %s)\n" % (config2,os.getcwd()))
sys.exit(1)
tornado.options.parse_config_file(config2)
configsDone.add((config,oldDir))
tornado.options.parse_command_line() # need to do this again to ensure logging is set up for the *current* directory (after any chdir's while reading config files)
if type(options.leaveTags)==type(""): options.leaveTags=options.leaveTags.split(',')
create_inRenderRange_function(options.renderRange)
if type(options.renderOmit)==type(""): options.renderOmit=options.renderOmit.split(',')
if type(options.deleteOmit)==type(""): options.deleteOmit=options.deleteOmit.split(',')
if type(options.cssName)==type(""): options.cssName=options.cssName.replace('"',""") # for embedding in JS
if type(options.cssNameReload)==type(""): options.cssNameReload=options.cssNameReload.split(',')
if type(options.search_sites)==type(""): options.search_sites=options.search_sites.split(',')
if type(options.ipNoLog)==type(""): options.ipNoLog=options.ipNoLog.split(',')
if type(options.delete)==type(""): options.delete=options.delete.split(',')
global codeChanges ; codeChanges = []
if options.codeChanges:
ccLines = [x for x in options.codeChanges.split("\n") if x and not x.startswith("#")]
while ccLines:
if len(ccLines)<3:
sys.stderr.write("codeChanges must be a multiple of 3 lines (see --help)\n")
sys.exit(1)
codeChanges.append(tuple(ccLines[:3]))
ccLines = ccLines[3:]
if options.real_proxy: options.open_proxy=True
if not options.password and not options.open_proxy:
stderr.write("Please set a password, or use --open_proxy.\n(Try --help for help)\n")
sys.exit(1)
if options.install:
current_crontab = commands.getoutput("crontab -l 2>/dev/null")
new_cmd = "@reboot python "+" ".join(sys.argv) # TODO: crontab-friendly quoting of special characters
if not new_cmd in current_crontab.replace("\r","\n").split("\n"):
sys.stderr.write("Adding to crontab: "+new_cmd+"\n")
if not current_crontab.endswith("\n"): current_crontab += "\n"
os.popen("crontab -","w").write(current_crontab+new_cmd+"\n")
if options.restart or options.stop:
pidFound = stopOther()
if options.stop:
if not pidFound: sys.stderr.write("Could not find which PID to stop (maybe nothing was running?)\n")
sys.exit(0)
elif pidFound: time.sleep(0.5) # give it time to stop
def main():
readOptions()
handlers = [
(r"/(.*)", RequestForwarder, {})
]
if options.real_proxy: handlers.append((r"(.*)", RequestForwarder, {})) # doesn't have to start with /
application = Application(handlers,log_function=accessLog,gzip=True)
# tornado.web.Application.__init__(self, transforms=[ChunkedTransferEncoding], gzip=True)
if not hasattr(application,"listen"):
sys.stderr.write("Your version of Tornado is too old. Please install version 2.x.\n")
sys.exit(1)
if options.useLXML: check_LXML()
if fork_before_listen and options.background:
sys.stderr.write("%s\nLicensed under the Apache License, Version 2.0\nChild will listen on port %d\n(can't report errors here as this system needs early fork)\n" % (program_name,options.port)) # (need some other way of checking it really started)
unixfork()
try: application.listen(options.port,options.address)
except:
if options.browser:
# there's probably another adjuster instance, in which case we probably want to let the browser open a new window and let our listen() fail
dropPrivileges()
runBrowser()
raise
if options.watchdog:
watchdog = open("/dev/watchdog", 'w')
dropPrivileges()
sys.stderr.write("%s\nLicensed under the Apache License, Version 2.0\nListening on port %d\n" % (program_name,options.port))
if options.watchdog:
sys.stderr.write("Writing /dev/watchdog every %d seconds\n" % options.watchdog)
if options.watchdogWait: sys.stderr.write("(abort if unresponsive for %d seconds)\n" % options.watchdogWait)
if options.background and not fork_before_listen:
unixfork()
if options.browser: IOLoop.instance().add_callback(runBrowser)
if options.watchdog: WatchdogPings(watchdog)
if options.fasterServer: IOLoop.instance().add_callback(checkServer)
if options.ip_query_url and (options.dynamic_dns_api or options.ip_change_command): Dynamic_DNS_updater()
try:
import signal
signal.signal(signal.SIGTERM, stopServer)
except: pass # signal not supported on this platform?
if options.background: logging.info("Server starting")
IOLoop.instance().start()
# gets here after stopServer (e.g. got SIGTERM from a --stop, or options.browser and the browser finished)
if options.background: logging.info("Server shutdown")
if options.watchdog:
watchdog.write('V') # this MIGHT be clean exit, IF the watchdog supports it (not all of them do, so it might not be advisable to use the watchdog option if you plan to stop the server without restarting it)
watchdog.close()
if not options.background:
sys.stderr.write("Adjuster shutdown\n")
def dropPrivileges():
if options.user and not os.getuid():
# need to drop privileges
import pwd
os.setuid(pwd.getpwnam(options.user)[2])
fork_before_listen = not 'linux' in sys.platform
def unixfork():
if os.fork(): sys.exit()
os.setsid()
if os.fork(): sys.exit()
devnull = os.open("/dev/null", os.O_RDWR)
for fd in range(3): os.dup2(devnull,fd) # commenting out this line will let you see stderr after the fork (TODO debug option?)
def stopOther():
import commands,signal
out = commands.getoutput("lsof -iTCP:"+str(options.port)+" -sTCP:LISTEN")
if out.startswith("lsof: unsupported"):
# lsof 4.81 has -sTCP:LISTEN but lsof 4.78 does not. However, not including -sTCP:LISTEN can cause lsof to make unnecessary hostname queries for established connections. So fall back only if have to.
out = commands.getoutput("lsof -iTCP:"+str(options.port)+" -Ts") # -Ts ensures will say LISTEN on the pid that's listening
lines = filter(lambda x:"LISTEN" in x,out.split("\n")[1:])
elif out.find("not found")>-1 and not commands.getoutput("which lsof 2>/dev/null"):
sys.stderr.write("stopOther: no 'lsof' command on this system\n")
return False
else: lines = out.split("\n")[1:]
for line in lines:
try: pid=int(line.split()[1])
except:
sys.stderr.write("stopOther: Can't make sense of lsof output\n")
break
if not pid==os.getpid():
if options.stop: other="the"
else: other="other"
try:
os.kill(pid,signal.SIGTERM)
sys.stderr.write("Stopped %s process at PID %d\n" % (other,pid))
except: sys.stderr.write("Failed to stop %s process at PID %d\n" % (other,pid))
return True # (a pid was found, whether or not the stop was successful) (don't continue - there should be only one pid, and continuing might get duplicate listings for IPv4 and IPv6)
the_supported_methods = ("GET", "HEAD", "POST", "PUT", "DELETE", "PATCH", "OPTIONS", "CONNECT")
# Don't support PROPFIND (from WebDAV) unless be careful about how to handle image requests with it
# TODO: image requests with OPTIONS ?
class BrowserLogger:
def __init__(self):
# Do NOT read options here - they haven't been read yet
self.lastBrowser = self.lastDate = None
self.lastIp = self.lastMethodStuff = None
self.whoisLogger = WhoisLogger()
def __call__(self,req):
if req.request.remote_ip in options.ipNoLog: return
try: ch = req.cookie_host()
except: ch = None # shouldn't happen
req=req.request
try:
if req.suppress_logging: return
except: pass
if req.method not in the_supported_methods and not options.logUnsupported: return
if req.method=="CONNECT" or req.uri.startswith("http://"): host="" # URI will have everything
else: host=convert_to_real_host(req.host,ch)
if host==-1: host=req.host # for own_server (but this shouldn't happen as it was turned into a CONNECT; we don't mind not logging own_server because it should do so itself)
elif host: host="http://"+host
# elif host==0: host="http://"+ch # e.g. adjusting one of the ownServer_if_not_root pages (TODO: uncomment this?)
else: host=""
browser = req.headers.get('User-Agent',None)
if browser:
browser='"'+browser+'"'
if options.squashLogs and browser==self.lastBrowser: browser = ""
else:
self.lastBrowser = browser
browser=" "+browser
else: self.lastBrowser,browser = None," -"
if options.squashLogs:
# Time will already be included in Tornado logging format (a format we don't want to override, especially as it has 'start of log string syntax highlighting' on some platforms), so don't add it here. Just add the date if different.
t = time.strftime("[%d/%b/%Y] ")
if t==self.lastDate: t=""
else: self.lastDate = t
if req.remote_ip == self.lastIp:
ip=""
else:
self.lastIp = req.remote_ip
ip=req.remote_ip+" "
self.lastMethodStuff = None # always log method/version anew when IP is different
methodStuff = (req.method, req.version)
if methodStuff == self.lastMethodStuff:
r=host+req.uri
else:
r='"%s %s%s %s"' % (req.method, host, req.uri, req.version)
self.lastMethodStuff = methodStuff
msg = t+ip+r+browser
else: msg = '%s - - [%s] "%s %s%s %s" - - - %s' % (req.remote_ip, time.strftime("%d/%b/%Y:%X"), req.method, host, req.uri, req.version, browser)
logging.info(msg)
if options.whois and hasattr(req,"valid_for_whois"): self.whoisLogger(req.remote_ip)
class WhoisLogger:
def __init__(self):
# Do NOT read options here - haven't been read yet
# (can be constructed even if not options.whois)
self.recent_whois = []
self.thread_running = False
def __call__(self,ip):
if ip in self.recent_whois: return
if len(self.recent_whois) > 20: # TODO: configure?
self.recent_whois.pop()
self.recent_whois.insert(0,ip)
self.reCheck(ip)
def reCheck(self,ip):
if self.thread_running: # allow only one at once
IOLoop.instance().add_timeout(time.time()+1,lambda *args:self.reCheck(ip))
return
self.thread_running = True
threading.Thread(target=whois_thread,args=(ip,self)).start()
def getWhois(ip):
import commands
lines = commands.getoutput("whois '"+ip.replace("'",'')+"'").split('\n')
if any(l and l.lower().split()[0]=="descr:" for l in lines): checkList = ["descr:"] # ,"netname:","address:"
else: checkList = ["orgname:"]
ret = []
for l in lines:
if len(l.split())<2: continue
field,value = l.split(None,1) ; field=field.lower()
if field in checkList or (field=="country:" and ret) and not value in ret: ret.append(value) # omit 1st country: from RIPE/APNIC/&c, and de-dup
return ", ".join(ret)
def whois_thread(ip,logger):
address = getWhois(ip)
logger.thread_running = False
if address: IOLoop.instance().add_callback(lambda *args:logging.info("whois "+ip+": "+address))
accessLog = BrowserLogger()
try:
import pycurl # check it's there
AsyncHTTPClient.configure("tornado.curl_httpclient.CurlAsyncHTTPClient")
except: pass # fall back to the pure-Python one
cookieExpires = "Tue Jan 19 03:14:07 2038" # TODO: S2G
def writeAndClose(stream,data):
# This helper function is needed for CONNECT and own_server handling because, contrary to Tornado docs, some Tornado versions (e.g. 2.3) send the last data packet in the FIRST callback of IOStream's read_until_close
if data: stream.write(data)
if not stream.closed(): stream.close()
# Domain-setting cookie for when we have no wildcard_dns and no default_site:
adjust_domain_cookieName = "_adjusterDN_"
adjust_domain_none = "0" # not a valid top-level domain (TODO hopefully no user wants this as a local domain...)
enable_adjustDomainCookieName_URL_override = True # TODO: document this! (Allow &_adjusterDN_=0 or &_adjusterDN_=wherever in bookmark URLs, so it doesn't matter what setting the cookie has when the bookmark is activated)
htmlmode_cookie_name = "_adjustZJCG_" # zap JS, CSS and Graphics
password_cookie_name = "_pxyAxsP_" # "proxy access password". have to pick something that's unlikely to collide with a site's cookie
class RequestForwarder(RequestHandler):
def get_error_html(self,status,**kwargs): return "<html><body>"+options.errorHTML+"</body></html>"
def cookie_host(self,checkReal=True,checkURL=True):
# for cookies telling us what host the user wants
if checkReal and convert_to_real_host(self.request.host,None): return # if we can get a real host without the cookie, the cookie does not apply to this host
if enable_adjustDomainCookieName_URL_override and checkURL:
if self.cookieViaURL: v = self.cookieViaURL
else:
v = self.request.arguments.get(adjust_domain_cookieName,None)
if type(v)==type([]): v=v[-1]
if v: self.removeArgument(adjust_domain_cookieName,urllib.quote(v))
if v:
self.cookieViaURL = v
if v==adjust_domain_none: return None
else: return v
return self.getCookie(adjust_domain_cookieName,adjust_domain_none)
def getCookie(self,cookieName,zeroValue=None):
# zeroValue is a value that the cookie can be set to so as to "clear" it (because some browsers don't seem to understand JS that clears a cookie)
for c in self.request.headers.get_list("Cookie"):
for cc in c.split(';'):
n,v = cc.strip().split('=',1)
if n==cookieName:
if v==zeroValue: v=None
return v
def clearUnrecognisedCookies(self):
# When serving via adjust_domain_cookieName, on URL box try to save browser memory (and request time) and improve security by deleting cookies set by previous sites. But can cover only the path=/ ones from here.
for c in self.request.headers.get_list("Cookie"):
for cc in c.split(';'):
n,v = cc.strip().split('=',1)
if n in [password_cookie_name,adjust_domain_cookieName]: continue # don't do adjust_domain_cookieName unless take into account addCookieFromURL (TODO: but would we ever GET here if that happens?)
elif n in [htmlmode_cookie_name,"adjustCssSwitch","adjustNoFilter","adjustNoRender","_WA_warnOK"] and v=="1": continue
for dot in ["","."]:
logging.info(n+"="+v+"; Domain="+dot+self.cookieHostToSet()+"; Path=/; Expires=Thu Jan 01 00:00:00 1970")
self.add_header("Set-Cookie",n+"="+v+"; Domain="+dot+self.cookieHostToSet()+"; Path=/; Expires=Thu Jan 01 00:00:00 1970")
def addCookieFromURL(self):
if self.cookieViaURL: self.add_header("Set-Cookie",adjust_domain_cookieName+"="+urllib.quote(self.cookieViaURL)+"; Path=/; Expires="+cookieExpires)
def removeArgument(self,argName,value):
if "&"+argName+"="+value in self.request.uri: self.request.uri=self.request.uri.replace("&"+argName+"="+value,"")
elif self.request.uri.endswith("?"+argName+"="+value): self.request.uri=self.request.uri[:-len("?"+argName+"="+value)]
elif "?"+argName+"="+value+"&" in self.request.uri: self.request.uri=self.request.uri.replace("?"+argName+"="+value+"&","?")
def checkViewsource(self):
# if URI ends with .viewsource, return True and take it out of the URI and all arguments (need to do this before further processing)
if not options.viewsource or not self.request.uri.endswith(".viewsource"): return False
self.request.uri = self.request.uri[:-len(".viewsource")]
if not self.request.method.lower() in ['get','head']: return True # TODO: unless arguments are taken from both url AND body in that case
for k,argList in self.request.arguments.items():
if argList and argList[-1].endswith(".viewsource"):
argList[-1]=argList[-1][:-len(".viewsource")]
break
return True
def cookieHostToSet(self):
# for the Domain= field of cookies
for hs in options.host_suffix.split("/"):
if self.request.host.endswith("."+hs):
return hs
return self.request.host
def authenticates_ok(self,host):
if not options.password: return True
if options.password_domain and host and not (host==options.password_domain or host.endswith("."+options.password_domain)): return True
if options.password_domain: self.is_password_domain=True
# if they said ?p=(password), it's OK and we can
# give them a cookie with it
if "p" in self.request.arguments:
p = self.request.arguments["p"]
if type(p)==type([]): p=p[0]
if p == options.password:
for dot in ["","."]: self.add_header("Set-Cookie",password_cookie_name+"="+urllib.quote(options.password)+"; Domain="+dot+self.cookieHostToSet()+"; Path=/; Expires="+cookieExpires) # (at least in Safari, need BOTH with and without the dot to be sure of setting the domain and all subdomains. TODO: might be able to skip the dot if not wildcard_dns, here and in the cookie-setting scripts.)
self.removeArgument("p",options.password)
return True
# otherwise if they have the cookie they're OK
for c in self.request.headers.get_list("Cookie"):
for cc in c.split(';'):
if cc.strip().split('=',1)==[password_cookie_name,urllib.quote(options.password)]: return True # TODO: rm this cookie b4 sending to remote server, and don't let remote server clear it
# otherwise access denied
SUPPORTED_METHODS = the_supported_methods
@asynchronous
def get(self, *args, **kwargs): return self.doReq()
@asynchronous
def head(self, *args, **kwargs): return self.doReq()
@asynchronous
def post(self, *args, **kwargs): return self.doReq()
@asynchronous
def put(self, *args, **kwargs): return self.doReq()
@asynchronous
def delete(self, *args, **kwargs): return self.doReq()
@asynchronous
def patch(self, *args, **kwargs): return self.doReq()
@asynchronous
def options(self, *args, **kwargs): return self.doReq()
@asynchronous
def connect(self, *args, **kwargs):
if options.real_proxy: # support tunnelling (but we can't adjust anything)
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM, 0)
upstream = tornado.iostream.IOStream(s)
client = self.request.connection.stream
host, port = self.request.uri.split(':')
# See note about Tornado versions in the own_server code (if realHost == -1) below
upstream.connect((host, int(port)), lambda *args:(client.read_until_close(lambda data:writeAndClose(upstream,data),lambda data:upstream.write(data)), upstream.read_until_close(lambda data:writeAndClose(client,data),lambda data:client.write(data)), client.write('HTTP/1.0 200 Connection established\r\n\r\n')))
else: self.set_status(400),self.myfinish()
def myfinish(self):
if hasattr(self,"_finished") and self._finished: return # try to avoid "connection closed" exceptions if browser has already gone away
try: self.finish()
except: pass # belt and braces (depends on Tornado version?)
def redirect(self,redir):
self.set_status(301)
self.add_header("Location",redir)
self.write('<html><body><a href="%s">Redirect</a></body></html>' % redir)
self.myfinish()
def addToHeader(self,header,toAdd):
val = self.request.headers.get(header,"")
if val: val += ", "
self.request.headers[header] = val+toAdd
def proxyFor(self,server):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM, 0)
upstream = tornado.iostream.IOStream(s)
client = self.request.connection.stream
if ':' in server: host, port = server.split(':')
else: host, port = server, 80
upstream.connect((host, int(port)),lambda *args:(upstream.read_until_close(lambda data:writeAndClose(client,data),lambda data:client.write(data)),client.read_until_close(lambda data:writeAndClose(upstream,data),lambda data:upstream.write(data))))
upstream.write(self.request.method+" "+self.request.uri+" "+self.request.version+"\r\n"+"\r\n".join(("%s: %s" % (k,v)) for k,v in (list(h for h in self.request.headers.get_all() if not h[0].lower()=="x-real-ip")+[("X-Real-Ip",self.request.remote_ip)]))+"\r\n\r\n"+self.request.body)
def answerPing(self):
# answer a "ping" request from another machine that's using us as a fasterServer
# Need to make the response short, but still allow keepalive
self.request.suppress_logging = True
for h in ["Server","Content-Type"]:
try: self.clear_header(h)
except: pass
self.set_header("Etag","0") # shorter than Tornado's computed one (clear_header won't work with Etag)
self.write("1") ; self.myfinish()
def find_real_IP(self):
if not self.request.remote_ip == options.ipTrustReal: return
# log (and update Via header) using X-Real-Ip if available
try: self.request.remote_ip = self.request.connection.confirmed_ip
except:
self.request.remote_ip = self.request.headers.get("X-Real-Ip",self.request.remote_ip)
try: self.request.connection.confirmed_ip = self.request.remote_ip # keep it for keepalive connections (X-Real-Ip is set only on the 1st request)
except: pass
try: del self.request.headers["X-Real-Ip"]
except: pass
def serveRobots(self):
self.add_header("Content-Type","text/plain")
self.write("User-agent: *\nDisallow: /\n")
self.myfinish()
def serveImage(self,img):
if not options.renderLog:
self.request.suppress_logging = True
self.add_header("Content-Type","image/"+options.renderFormat)
self.add_header("Last-Modified","Sun, 06 Jul 2008 13:20:05 GMT")
self.add_header("Expires","Wed, 1 Dec 2036 23:59:59 GMT") # TODO: S2G
self.write(img) ; self.myfinish()
def set_htmlonly_cookie(self):
# Set the cookie according to the value of "pr" entered from the URL box.
# TODO: option to combine this and other cookie-based settings with enable_adjustDomainCookieName_URL_override so the setting can be bookmarked ? (some users might want that off however, as an address is different from a setting; in the case of htmlOnly the q= URL can already be bookmarked if can stop it before the redirect)
if options.htmlonly_mode:
htmlonly_mode = "pr" in self.request.arguments
current_setting = htmlmode_cookie_name+"=1" in ';'.join(self.request.headers.get_list("Cookie"))
if not htmlonly_mode == current_setting:
if htmlonly_mode: val="1"
else: val="0"
self.add_header("Set-Cookie",htmlmode_cookie_name+"="+val+"; Path=/; Expires="+cookieExpires)
def htmlOnlyMode(self): return options.htmlonly_mode and htmlmode_cookie_name+"=1" in ';'.join(self.request.headers.get_list("Cookie"))
def handle_URLbox_query(self,v):
self.set_htmlonly_cookie()
if not v.startswith("http://"):
if ' ' in v or not '.' in v: v=getSearchURL(v)
else: v="http://"+v
if not options.wildcard_dns:
i = len("http://") ; j = i
while j<len(v) and v[j] in string.letters+string.digits+'.-': j += 1
v2 = v[i:j]
ch = self.cookie_host(checkURL=False)
if convert_to_requested_host(v2,ch)==v2: # can't do it without changing cookie_host
if enable_adjustDomainCookieName_URL_override:
# do it by URL so they can bookmark it (that is if it doesn't immediately redirect)
# (TODO: option to also include the password in this link so it can be passed it around? and also in the 'back to URL box' link? but it would be inconsistent because not all links can do that, unless we consistently 302-redirect everything so that they do, but that would reduce the efficiency of the browser's HTTP fetches. Anyway under normal circumstances we probably won't want users accidentally spreading include-password URLs)
vv = adjust_domain_cookieName+'='+urllib.quote(v2)
if '?' in v: v += '&'+vv
else: v += '?'+vv
else: self.add_header("Set-Cookie",adjust_domain_cookieName+"="+urllib.quote(v2)+"; Path=/; Expires="+cookieExpires) # (DON'T do this unconditionally, convert_to_requested_host above might see we already have another fixed domain for it)
# (TODO: if convert_to_requested_host somehow returns a *different* non-default_site domain, that cookie will be lost. Might need to enforce max 1 non-default_site domain.)
else: v2 = ch
else: v2=None # not needed if wildcard_dns
self.redirect(domain_process(v,v2,True))
def serve_URLbox(self):
if not options.wildcard_dns: self.clearUnrecognisedCookies() # TODO: optional?
self.addCookieFromURL()
self.doResponse2(urlbox_html(self.htmlOnlyMode()),True,False) # TODO: run htmlFilter on it also? (render etc will be done by doResponse2)
def doReq(self):
debuglog("doReq "+self.request.uri)
if self.request.uri=="/ping" and self.request.headers.get("User-Agent","")=="ping": return self.answerPing()
if fasterServer_up:
return self.proxyFor(options.fasterServer)
self.find_real_IP()
# TODO: option to restrict by self.request.remote_ip ? Slow down heavy users?
viewSource = self.checkViewsource()
self.cookieViaURL = None
realHost = convert_to_real_host(self.request.host,self.cookie_host(checkReal=False)) # don't need checkReal if return value will be passed to convert_to_real_host anyway
if realHost == -1:
return self.proxyFor(options.own_server)
# (TODO: what if it's keep-alive and some browser figures out our other domains are on the same IP and tries to fetch them through the same connection? is that supposed to be allowed?)
elif realHost==0 and options.ownServer_if_not_root: realHost=options.own_server # asking by cookie to adjust the same host, so don't proxyFor() it but fetch it normally and adjust it
self.request.valid_for_whois = 1 # (if options.whois, don't whois unless it gets this far, e.g. don't whois any that didn't even match "/(.*)" etc)
maybeRobots = (not options.robots and self.request.uri=="/robots.txt") # don't actually serveRobots yet, because MIGHT want to pass it to own_server (see below)
self.is_password_domain=False # needed by doResponse2
if options.password and not options.real_proxy: # whether or not open_proxy, because might still have password (perhaps on password_domain), anyway the doc for open_proxy says "allow running" not "run"
# First ensure the wildcard part of the host is de-dotted, so the authentication cookie can be shared across hosts.
# (This is not done if options.real_proxy because we don't want to touch the hostname for that)
host = self.request.host
if host:
if host.endswith(":"+str(options.port)): host=host[:-len(":"+str(options.port))]
for hs in options.host_suffix.split("/"):
ohs = "."+hs
if host.endswith(ohs) and host.index(".")<len(host)-len(ohs):
if maybeRobots: return self.serveRobots()
if options.port==80: colPort=""
else: colPort=":"+str(options.port)
return self.redirect("http://"+dedot(host[:-len(ohs)])+ohs+colPort+self.request.uri)
# Now OK to check authentication:
if not self.authenticates_ok(host):
if options.auth_error=="http://":
if options.own_server: return self.proxyFor(options.own_server)
elif maybeRobots: return self.serveRobots()
else: options.auth_error = "auth_error set incorrectly (own_server not set)" # see auth_error help (TODO: is it really a good idea to say this HERE?)
elif maybeRobots: return self.serveRobots()
elif options.auth_error.startswith("http://"): return self.redirect(options.auth_error)
self.set_status(401)
self.write("<html><body>"+options.auth_error+"</body></html>")
self.myfinish() ; return
# Authentication is now OK
self.set_header("Server",program_name[:program_name.index("(c)")].strip())
# Now check if it's an image request:
path = self.request.uri
if path.startswith("http://"): path=urlparse.urlunparse(("","")+urlparse.urlparse(path)[2:]) # (gets here only if options.real_proxy, otherwise we won't have added a handler for paths that don't start with '/')
img = Renderer.getImage(path)
if img: return self.serveImage(img)
# Not an image:
if not realHost: # default_site(s) not set
if options.own_server and options.ownServer_if_not_root and len(self.request.path)>1: return self.proxyFor(options.own_server)
elif maybeRobots: return self.serveRobots()
# Serve URL box
v=self.request.arguments.get("q","")
if v and type(v)==type([]): v=v[0]
if v: return self.handle_URLbox_query(v)
else: return self.serve_URLbox()
if maybeRobots: return self.serveRobots()
self.addCookieFromURL()
isProxyRequest = options.real_proxy and realHost == self.request.host
def fixDNS(val):
if isProxyRequest: return val
if val.startswith("http://"): return "http://"+fixDNS(val[7:])
i=0
while i<len(val) and val[i] in string.letters+string.digits+'.-': i += 1
if i<len(val) and val[i]==':': # port no.
i += 1
while i<len(val) and val[i] in string.digits: i += 1
if not i: return val
r=convert_to_real_host(val[:i],self.cookie_host())
if r==-1: return val # shouldn't happen
elif not r: r="" # ensure it's a string
return r+val[i:]
converterFlags = []
for opt,suffix,ext,fmt in [
(options.pdftotext,pdftotext_suffix,".pdf","pdf"),
(options.epubtotext,epubtotext_suffix,".epub","epub"),
(options.epubtozip,epubtozip_suffix,".epub","epub"),
(options.askBitrate,mp3lofi_suffix,".mp3",None),
]:
if opt and self.request.uri.endswith(suffix) and (self.request.uri.lower()[:-len(suffix)].endswith(ext) or guessCMS(self.request.uri,fmt)):
self.request.uri = self.request.uri[:-len(suffix)]
converterFlags.append(True)
else: converterFlags.append(False)
if options.default_cookies:
for defaultCookie in options.default_cookies.split(';'):
defaultCookie = defaultCookie.strip()
if defaultCookie.startswith("(") and ")" in defaultCookie: # browser-specific
if not defaultCookie[1:defaultCookie.index(")")] in self.request.headers.get("User-Agent",""): continue
defaultCookie=defaultCookie[defaultCookie.index(")")+1:]
# add if a cookie of that name is not already set
dcName,dcValue=defaultCookie.strip().split('=',1)
if not self.getCookie(dcName): self.request.headers.add("Cookie",defaultCookie)
if self.request.headers.get_list("Cookie"):
# some sites require them all in one header
ck = "; ".join(self.request.headers.get_list("Cookie"))
self.request.headers["Cookie"]=ck
for v in self.request.headers.get_list("Referer"):
if v: self.request.headers["Referer"] = fixDNS(v)
if "http://" in self.request.uri[1:]: # xyz?q=http://... stuff
u=self.request.uri.split("http://")
for i in range(1,len(u)): u[i]=fixDNS(u[i])
self.request.uri="http://".join(u)
if self.request.uri.startswith("http://"): # will reach here only if options.real_proxy
if not self.request.headers["Host"]: self.request.headers["Host"] = urlparse.urlparse(self.request.uri).netloc
self.request.uri = urlparse.urlunparse(("","")+urlparse.urlparse(self.request.uri)[2:])
try: del self.request.headers['Proxy-Connection']
except: pass
else: self.request.headers["Host"]=realHost
try: del self.request.headers["Accept-Encoding"] # we'd better re-do that one
except: pass
if options.via:
v = self.request.version
if v.startswith("HTTP/"): v=v[5:]
self.addToHeader("Via",v+" "+convert_to_via_host(self.request.host)+" ("+program_name[:program_name.index("(c)")].strip()+")")
self.addToHeader("X-Forwarded-For",self.request.remote_ip)
self.sendRequest(converterFlags,viewSource,isProxyRequest,follow_redirects=False) # (DON'T follow redirects - browser needs to know about them!)
def sendRequest(self,converterFlags,viewSource,isProxyRequest,follow_redirects):
http = AsyncHTTPClient()
body = self.request.body
if not body: body = None # required by some Tornado versions
# TODO: basic authentication? auth_username, auth_password
self.urlToFetch = "http://"+self.request.headers["Host"]+self.request.uri
# TODO: try del self.request.headers['Connection'] ? but check it can't mess up Tornado (may have to put it back before write()s)
http.fetch(self.urlToFetch,
use_gzip=not hasattr(self,"avoid_gzip"),
method=self.request.method, headers=self.request.headers, body=body,
callback=lambda r:self.doResponse(r,converterFlags,viewSource,isProxyRequest),follow_redirects=follow_redirects)
def doResponse(self,response,converterFlags,viewSource,isProxyRequest):
debuglog("doResponse "+self.request.uri)
do_pdftotext,do_epubtotext,do_epubtozip,do_mp3 = converterFlags
do_domain_process = do_html_process = do_js_process = True
do_json_process = do_css_process = False
charset = "utf-8" # by default
if not response.code or response.code==599:
# (some Tornado versions don't like us copying a 599 response)
try: error = str(response.error)
except: error = "Gateway timeout or something"
if "incorrect data check" in error and not hasattr(self,"avoid_gzip"):
# Some versions of the GWAN server can send NULL bytes at the end of gzip data. Retry without requesting gzip.
self.avoid_gzip = True
return self.sendRequest(converterFlags,viewSource,isProxyRequest,False)
self.set_status(504)
return self.doResponse2(("<html><body>%s</body></html>" % error),True,False)
if viewSource:
def txt2html(t): return t.replace("&","&").replace("<","<").replace(">",">").replace("\n","<br>")
def h2html(h): return "<br>".join("<b>"+txt2html(k)+"</b>: "+txt2html(v) for k,v in sorted(h.get_all()))
return self.doResponse2("<html><body><a href=\"#1\">Headers sent</a> | <a href=\"#2\">Headers received</a> | <a href=\"#3\">Page source</a><a name=\"1\"></a><h2>Headers sent</h2>"+h2html(self.request.headers)+"<a name=\"2\"></a><h2>Headers received</h2>"+h2html(response.headers)+"<a name=\"3\"></a><h2>Page source</h2>"+txt2html(response.body),True,False)
headers_to_add = []
if (do_pdftotext or do_epubtotext or do_epubtozip or do_mp3) and not response.headers.get("Location","") and response.headers.get("Content-type","").startswith("text/"):
# We thought we were going to get a PDF etc that could be converted, but it looks like they just sent more HTML (perhaps a "which version of the PDF did you want" screen)
do_pdftotext=do_epubtotext=do_epubtozip=do_mp3=False
cookie_host = self.cookie_host()
for name,value in response.headers.get_all():
if name.lower() in ["connection","content-length","content-encoding","transfer-encoding","etag","server","alternate-protocol"]: continue # we'll do our own connection type etc
# TODO: WebSocket (and Microsoft SM) gets the client to say 'Connection: Upgrade' with a load of Sec-WebSocket-* headers, check what Tornado does with that
if (do_pdftotext or do_epubtotext) and name.lower() in ["content-disposition","content-type"]: continue # we're re-doing these also
elif do_epubtozip and name.lower()=="content-disposition" and value.replace('"','').endswith(".epub"):
epub = value.rfind(".epub")
value=value[:epub]+".zip"+value[epub+5:]
elif "location" in name.lower():
old_value_1 = value
if not isProxyRequest:
value=domain_process(value,cookie_host,True)
offsite = (value==old_value_1 and "http://" in value)
else: offsite = False
old_value_2 = value
if do_pdftotext: # is it still going to be pdf?
if value.lower().endswith(".pdf") or guessCMS(value,"pdf"): value += pdftotext_suffix
if do_epubtotext:
if value.lower().endswith(".epub") or guessCMS(value,"epub"): value += epubtotext_suffix
if do_epubtozip:
if value.lower().endswith(".epub") or guessCMS(value,"epub"): value += epubtozip_suffix
if do_mp3:
if value.lower().endswith(".mp3"): value += mp3lofi_suffix
if offsite and not old_value_2==value:
# ouch, we're not going to be able to do it this way because it's redirecting to somewhere we can't domain-proxy for. But we could follow the redirects ourselves to do the conversion:
return self.sendRequest(converterFlags,viewSource,isProxyRequest,follow_redirects=True)
# TODO: if that sendRequest results in HTML, overriding the do_... options, the browser will end up with an incorrect idea of the current address; might want to detect this and give the user the unchanged Location: header
else: do_pdftotext=do_epubtotext=do_epubtozip=do_mp3=False # do not attempt to media-process any body that is sent with this Location: redirect (if it's just a copy of the URL then running it through ebook-convert might hold things up unnecessarily)
if cookie_host and self.request.path=="/" and value.startswith("http") and not value.startswith("http://"+cookie_host+"/"):
# This'll be a problem. If the user is requesting / and the site's trying to redirect off-site, how do we know that the user isn't trying to get back to the URL box (having forgotten to clear the cookie) and now can't possibly do so because / always results in an off-site Location redirect ?
# (The same thing can occur if offsite is False but we're redirecting to one of our other domains, hence we use the value.startswith condition instead of the 'offsite' flag; the latter is true only if NONE of our domains can do it.)
# (DON'T just do this for ANY offsite url when in cookie_host mode - that could mess up images and things. (Could still mess up images etc if they're served from / with query parameters; for now we're assuming path=/ is a good condition to do this. The whole cookie_host thing is a compromise anyway; wildcard_dns is better.))
if offsite: reason="which this adjuster is not currently set to adjust"
else: reason="which will be adjusted at %s (not here)" % (value[len("http://"):(value+"/").index('/',len("http://"))],)
return self.doResponse2(("<html><body>The server is redirecting you to <a href=\"%s\">%s</a> %s.</body></html>" % (value,old_value_1,reason)),True,False) # and 'Back to URL box' link will be added
elif "set-cookie" in name.lower() and not isProxyRequest:
value=cookie_domain_process(value,cookie_host)
headers_to_add.append((name,value))
if name.lower()=="content-type":
if do_epubtozip: value="application/zip"
value=value.lower()
if not options.askBitrate: do_mp3 = (value=="audio/mpeg" or (value.startswith("application/") and response.headers.get("Content-Disposition","").replace('"','').endswith('.mp3'))) # else do only if was set in converterFlags
do_domain_process = ("html" in value or "css" in value or "javascript" in value or "json" in value or self.request.path.endswith(".js") or self.request.path.endswith(".css")) # and hope the server doesn't incorrectly say text/plain or something for a CSS or JS that doesn't end with that extension
do_js_process = ("html" in value or "javascript" in value or self.request.path.endswith(".js"))
do_html_process = ("html" in value) # TODO: configurable?
do_json_process = ("json" in value)
do_css_process = ("css" in value or self.request.path.endswith(".css"))
if "charset=" in value:
charset=extractCharsetEquals(value)
if do_html_process: headers_to_add[-1]=((name,value.replace(charset,"utf-8"))) # we'll be converting it
elif do_html_process: headers_to_add[-1]=((name,value+"; charset=utf-8")) # ditto (don't leave as latin-1)
# TODO: if there's no content-type header, send one anyway, with a charset
self.set_status(response.code) # (not before here! as might return doResponse2 above which will need status 200. Redirect without Location gets "unknown error 0x80072f76" on Pocket IE 6.)
added = {}
for name,value in headers_to_add:
if name in added: self.add_header(name,value)
else: self.set_header(name,value) # overriding any Tornado default
added[name]=1
body = response.body
if not body:
self.myfinish() ; return # might just be a redirect (TODO: if it's not, set type to text/html and report error?)
if do_html_process:
# Normalise the character set
charset2,tagStart,tagEnd = get_httpequiv_charset(body)
if charset2:
charset=charset2 # override server header (TODO: is this always correct?)
body = body[:tagStart]+body[tagEnd:] # delete that META tag because we're changing the charset
if body.startswith('<?xml version="1.0" encoding'): body = '<?xml version="1.0"'+body[body.find("?>"):] # TODO: honour THIS 'encoding'? anyway remove it because we've changed it to utf-8 (and if we're using LXML it would get a 'unicode strings with encoding not supported' exception)
if charset=="gb2312": charset="gb18030" # 18030 is a superset of 2312, and some pages say 2312 for backward compatibility with old software when they're actually 18030 (most Chinese software treats both as equivalent, but not all Western software does)
try: "".decode(charset)
except: charset="latin-1" # ?? (unrecognised charset name)
if not charset=="utf-8": body=body.decode(charset,'replace').encode('utf-8')
if do_pdftotext or do_epubtotext:
self.set_header("Content-Type","text/plain; charset=utf-8")
self.set_header("Content-Disposition","attachment; filename=\"%s\"" % (self.request.uri[self.request.uri.rfind("/")+1:self.request.uri.rfind(".")]+".txt"))
# (Pocket IE on Windows Mobile doesn't always obey Content-Disposition, but Opera Mini etc should do it)
import tempfile
if do_pdftotext: ext="pdf"
elif do_epubtotext: ext="epub"
else: ext="" # shouldn't get here
def remove_blanks_add_utf8_BOM(out): return '\xef\xbb\xbf'+"\n".join([x for x in out.replace("\r","").split("\n") if x])
# first, is the result of pdftotext etc cached?
ktkey = (self.request.host, self.request.uri)
if kept_tempfiles.get(ktkey,None)==1:
# This conversion is in progress on another request (TODO: check it didn't somehow fail without updating kept_tempfiles?)
def tryLater():
try: txt=open(kept_tempfiles[ktkey]).read()
except: txt = None
if txt:
self.write(remove_blanks_add_utf8_BOM(txt))
self.myfinish()
else: IOLoop.instance().add_timeout(time.time()+1,lambda *args:tryLater())
return tryLater()
if not ktkey in kept_tempfiles:
kept_tempfiles[ktkey] = 1 # in progress
try: txt=open(kept_tempfiles[ktkey]).read()
except: txt = None
if txt:
self.write(remove_blanks_add_utf8_BOM(txt))
self.myfinish() ; return
# not cached - need to generate
f=tempfile.NamedTemporaryFile(delete=False,suffix="."+ext) # Python 2.6+
f.write(body) ; f.close()
def tryDel(k):
try: del kept_tempfiles[k]
except: pass
def unlinkLater(k,fn):
kept_tempfiles[k] = fn # it's ready for now
IOLoop.instance().add_timeout(time.time()+options.pdfepubkeep,lambda *args:(tryDel(k),os.unlink(fn)))
if do_pdftotext: runFilter(("pdftotext -enc UTF-8 -nopgbrk \"%s\" -" % f.name),"",(lambda out:(unlinkLater(ktkey,f.name),self.write(remove_blanks_add_utf8_BOM(out)),self.myfinish())), False)
elif do_epubtotext:
def ebookCallback(self,fn):
try: txt = open(fn+".txt").read()
except: txt = "Unable to read ebook-convert's output"
unlinkLater(ktkey,fn+".txt")
unlinkLater(0,fn)
self.write(remove_blanks_add_utf8_BOM(txt))
self.myfinish()
runFilter(("ebook-convert %s %s.txt" % (f.name,f.name)),"",(lambda out:ebookCallback(self,f.name)), False)
return
if do_domain_process and not isProxyRequest: body = domain_process(body,cookie_host) # first, so filters to run and scripts to add can mention new domains without these being redirected back
# Must also do things like 'delete' BEFORE the filters, especially if lxml is in use and might change the code so the delete patterns aren't recognised
if not self.checkBrowser(options.deleteOmit):