ALL exceptions - even validation errors. This is excessive logging but in development mode it should be fine and even helpful in debugging few issues.
520 lines
15 KiB
Python
520 lines
15 KiB
Python
# Copyright (c) 2015, Frappe Technologies Pvt. Ltd. and Contributors
|
|
# License: MIT. See LICENSE
|
|
|
|
import functools
|
|
import gc
|
|
import logging
|
|
import os
|
|
import re
|
|
|
|
from werkzeug.exceptions import HTTPException, NotFound
|
|
from werkzeug.middleware.profiler import ProfilerMiddleware
|
|
from werkzeug.middleware.proxy_fix import ProxyFix
|
|
from werkzeug.middleware.shared_data import SharedDataMiddleware
|
|
from werkzeug.wrappers import Request, Response
|
|
from werkzeug.wsgi import ClosingIterator
|
|
|
|
import frappe
|
|
import frappe.api
|
|
import frappe.handler
|
|
import frappe.monitor
|
|
import frappe.rate_limiter
|
|
import frappe.recorder
|
|
import frappe.utils.response
|
|
from frappe import _
|
|
from frappe.auth import SAFE_HTTP_METHODS, UNSAFE_HTTP_METHODS, HTTPRequest, validate_auth
|
|
from frappe.middlewares import StaticDataMiddleware
|
|
from frappe.utils import CallbackManager, cint, get_site_name
|
|
from frappe.utils.data import escape_html
|
|
from frappe.utils.error import log_error, log_error_snapshot
|
|
from frappe.website.page_renderers.error_page import ErrorPage
|
|
from frappe.website.serve import get_response
|
|
|
|
_site = None
|
|
_sites_path = os.environ.get("SITES_PATH", ".")
|
|
|
|
|
|
# If gc.freeze is done then importing modules before forking allows us to share the memory
|
|
import gettext
|
|
|
|
import babel
|
|
import babel.messages
|
|
import bleach
|
|
import num2words
|
|
import pydantic
|
|
|
|
import frappe.boot
|
|
import frappe.client
|
|
import frappe.core.doctype.file.file
|
|
import frappe.core.doctype.user.user
|
|
import frappe.database.mariadb.database # Load database related utils
|
|
import frappe.database.query
|
|
import frappe.desk.desktop # workspace
|
|
import frappe.desk.form.save
|
|
import frappe.model.db_query
|
|
import frappe.query_builder
|
|
import frappe.utils.background_jobs # Enqueue is very common
|
|
import frappe.utils.data # common utils
|
|
import frappe.utils.jinja # web page rendering
|
|
import frappe.utils.jinja_globals
|
|
import frappe.utils.redis_wrapper # Exact redis_wrapper
|
|
import frappe.utils.safe_exec
|
|
import frappe.utils.typing_validations # any whitelisted method uses this
|
|
import frappe.website.path_resolver # all the page types and resolver
|
|
import frappe.website.router # Website router
|
|
import frappe.website.website_generator # web page doctypes
|
|
|
|
# end: module pre-loading
|
|
|
|
|
|
def after_response_wrapper(app):
|
|
"""Wrap a WSGI application to call after_response hooks after we have responded.
|
|
|
|
This is done to reduce response time by deferring expensive tasks."""
|
|
|
|
@functools.wraps(app)
|
|
def application(environ, start_response):
|
|
return ClosingIterator(
|
|
app(environ, start_response),
|
|
(
|
|
frappe.rate_limiter.update,
|
|
frappe.recorder.dump,
|
|
frappe.request.after_response.run,
|
|
frappe.destroy,
|
|
),
|
|
)
|
|
|
|
return application
|
|
|
|
|
|
@after_response_wrapper
|
|
@Request.application
|
|
def application(request: Request):
|
|
response = None
|
|
|
|
try:
|
|
rollback = True
|
|
|
|
init_request(request)
|
|
|
|
validate_auth()
|
|
|
|
if request.method == "OPTIONS":
|
|
response = Response()
|
|
|
|
elif frappe.form_dict.cmd:
|
|
from frappe.deprecation_dumpster import deprecation_warning
|
|
|
|
deprecation_warning(
|
|
"unknown",
|
|
"v17",
|
|
f"{frappe.form_dict.cmd}: Sending `cmd` for RPC calls is deprecated, call REST API instead `/api/method/cmd`",
|
|
)
|
|
frappe.handler.handle()
|
|
response = frappe.utils.response.build_response("json")
|
|
|
|
elif request.path.startswith("/api/"):
|
|
response = frappe.api.handle(request)
|
|
|
|
elif request.path.startswith("/backups"):
|
|
response = frappe.utils.response.download_backup(request.path)
|
|
|
|
elif request.path.startswith("/private/files/"):
|
|
response = frappe.utils.response.download_private_file(request.path)
|
|
|
|
elif request.method in ("GET", "HEAD", "POST"):
|
|
response = get_response()
|
|
|
|
else:
|
|
raise NotFound
|
|
|
|
except HTTPException as e:
|
|
return e
|
|
|
|
except Exception as e:
|
|
response = handle_exception(e)
|
|
|
|
else:
|
|
rollback = sync_database(rollback)
|
|
|
|
finally:
|
|
# Important note:
|
|
# this function *must* always return a response, hence any exception thrown outside of
|
|
# try..catch block like this finally block needs to be handled appropriately.
|
|
|
|
if rollback and request.method in UNSAFE_HTTP_METHODS and frappe.db:
|
|
frappe.db.rollback()
|
|
|
|
try:
|
|
run_after_request_hooks(request, response)
|
|
except Exception:
|
|
# We can not handle exceptions safely here.
|
|
frappe.logger().error("Failed to run after request hook", exc_info=True)
|
|
|
|
log_request(request, response)
|
|
process_response(response)
|
|
|
|
return response
|
|
|
|
|
|
def run_after_request_hooks(request, response):
|
|
if not getattr(frappe.local, "initialised", False):
|
|
return
|
|
|
|
for after_request_task in frappe.get_hooks("after_request"):
|
|
frappe.call(after_request_task, response=response, request=request)
|
|
|
|
|
|
def init_request(request):
|
|
frappe.local.request = request
|
|
frappe.local.request.after_response = CallbackManager()
|
|
|
|
frappe.local.is_ajax = frappe.get_request_header("X-Requested-With") == "XMLHttpRequest"
|
|
|
|
site = _site or request.headers.get("X-Frappe-Site-Name") or get_site_name(request.host)
|
|
frappe.init(site, sites_path=_sites_path, force=True)
|
|
|
|
if not (frappe.local.conf and frappe.local.conf.db_name):
|
|
# site does not exist
|
|
raise NotFound
|
|
|
|
if frappe.local.conf.maintenance_mode:
|
|
frappe.connect()
|
|
if frappe.local.conf.allow_reads_during_maintenance:
|
|
setup_read_only_mode()
|
|
else:
|
|
raise frappe.SessionStopped("Session Stopped")
|
|
else:
|
|
frappe.connect(set_admin_as_user=False)
|
|
if request.path.startswith("/api/method/upload_file"):
|
|
from frappe.core.api.file import get_max_file_size
|
|
|
|
request.max_content_length = get_max_file_size()
|
|
else:
|
|
request.max_content_length = cint(frappe.local.conf.get("max_file_size")) or 25 * 1024 * 1024
|
|
make_form_dict(request)
|
|
|
|
if request.method != "OPTIONS":
|
|
frappe.local.http_request = HTTPRequest()
|
|
|
|
for before_request_task in frappe.get_hooks("before_request"):
|
|
frappe.call(before_request_task)
|
|
|
|
|
|
def setup_read_only_mode():
|
|
"""During maintenance_mode reads to DB can still be performed to reduce downtime. This
|
|
function sets up read only mode
|
|
|
|
- Setting global flag so other pages, desk and database can know that we are in read only mode.
|
|
- Setup read only database access either by:
|
|
- Connecting to read replica if one exists
|
|
- Or setting up read only SQL transactions.
|
|
"""
|
|
frappe.flags.read_only = True
|
|
|
|
# If replica is available then just connect replica, else setup read only transaction.
|
|
if frappe.conf.read_from_replica:
|
|
frappe.connect_replica()
|
|
else:
|
|
frappe.db.begin(read_only=True)
|
|
|
|
|
|
def log_request(request, response):
|
|
if hasattr(frappe.local, "conf") and frappe.local.conf.enable_frappe_logger:
|
|
frappe.logger("frappe.web", allow_site=frappe.local.site).info(
|
|
{
|
|
"site": get_site_name(request.host),
|
|
"remote_addr": getattr(request, "remote_addr", "NOTFOUND"),
|
|
"pid": os.getpid(),
|
|
"user": getattr(frappe.local.session, "user", "NOTFOUND"),
|
|
"base_url": getattr(request, "base_url", "NOTFOUND"),
|
|
"full_path": getattr(request, "full_path", "NOTFOUND"),
|
|
"method": getattr(request, "method", "NOTFOUND"),
|
|
"scheme": getattr(request, "scheme", "NOTFOUND"),
|
|
"http_status_code": getattr(response, "status_code", "NOTFOUND"),
|
|
}
|
|
)
|
|
|
|
|
|
def process_response(response):
|
|
if not response:
|
|
return
|
|
|
|
# cache control
|
|
# read: https://simonhearne.com/2022/caching-header-best-practices/
|
|
if frappe.local.response.can_cache:
|
|
response.headers.extend(
|
|
{
|
|
# default: 5m (client), 3h (allow stale resources for this long if upstream is down)
|
|
"Cache-Control": "private,max-age=300,stale-while-revalidate=10800",
|
|
}
|
|
)
|
|
else:
|
|
response.headers.extend(
|
|
{
|
|
"Cache-Control": "no-store,no-cache,must-revalidate,max-age=0",
|
|
}
|
|
)
|
|
|
|
# Set cookies, only if response is non-cacheable to avoid proxy cache invalidation
|
|
if hasattr(frappe.local, "cookie_manager") and not frappe.local.response.can_cache:
|
|
frappe.local.cookie_manager.flush_cookies(response=response)
|
|
|
|
# rate limiter headers
|
|
if hasattr(frappe.local, "rate_limiter"):
|
|
response.headers.extend(frappe.local.rate_limiter.headers())
|
|
|
|
if trace_id := frappe.monitor.get_trace_id():
|
|
response.headers.extend({"X-Frappe-Request-Id": trace_id})
|
|
|
|
# CORS headers
|
|
if hasattr(frappe.local, "conf"):
|
|
set_cors_headers(response)
|
|
|
|
|
|
def set_cors_headers(response):
|
|
if not (
|
|
(allowed_origins := frappe.conf.allow_cors)
|
|
and (request := frappe.local.request)
|
|
and (origin := request.headers.get("Origin"))
|
|
):
|
|
return
|
|
|
|
if allowed_origins != "*":
|
|
if not isinstance(allowed_origins, list):
|
|
allowed_origins = [allowed_origins]
|
|
|
|
if origin not in allowed_origins:
|
|
return
|
|
|
|
cors_headers = {
|
|
"Access-Control-Allow-Credentials": "true",
|
|
"Access-Control-Allow-Origin": origin,
|
|
"Vary": "Origin",
|
|
}
|
|
|
|
# only required for preflight requests
|
|
if request.method == "OPTIONS":
|
|
cors_headers["Access-Control-Allow-Methods"] = request.headers.get("Access-Control-Request-Method")
|
|
|
|
if allowed_headers := request.headers.get("Access-Control-Request-Headers"):
|
|
cors_headers["Access-Control-Allow-Headers"] = allowed_headers
|
|
|
|
# allow browsers to cache preflight requests for upto a day
|
|
if not frappe.conf.developer_mode:
|
|
cors_headers["Access-Control-Max-Age"] = "86400"
|
|
|
|
response.headers.extend(cors_headers)
|
|
|
|
|
|
def make_form_dict(request: Request):
|
|
import json
|
|
|
|
request_data = request.get_data(as_text=True)
|
|
if request_data and request.is_json:
|
|
args = json.loads(request_data)
|
|
else:
|
|
args = {}
|
|
args.update(request.args or {})
|
|
args.update(request.form or {})
|
|
|
|
if isinstance(args, dict):
|
|
frappe.local.form_dict = frappe._dict(args)
|
|
# _ is passed by $.ajax so that the request is not cached by the browser. So, remove _ from form_dict
|
|
frappe.local.form_dict.pop("_", None)
|
|
elif isinstance(args, list):
|
|
frappe.local.form_dict["data"] = args
|
|
else:
|
|
frappe.throw(_("Invalid request arguments"))
|
|
|
|
|
|
def handle_exception(e):
|
|
response = None
|
|
http_status_code = getattr(e, "http_status_code", 500)
|
|
accept_header = frappe.get_request_header("Accept") or ""
|
|
respond_as_json = (
|
|
frappe.get_request_header("Accept") and (frappe.local.is_ajax or "application/json" in accept_header)
|
|
) or (frappe.local.request.path.startswith("/api/") and not accept_header.startswith("text"))
|
|
|
|
if not frappe.session.user:
|
|
# If session creation fails then user won't be unset. This causes a lot of code that
|
|
# assumes presence of this to fail. Session creation fails => guest or expired login
|
|
# usually.
|
|
frappe.session.user = "Guest"
|
|
|
|
if respond_as_json:
|
|
# handle ajax responses first
|
|
# if the request is ajax, send back the trace or error message
|
|
response = frappe.utils.response.report_error(http_status_code)
|
|
|
|
elif isinstance(e, frappe.SessionStopped):
|
|
response = frappe.utils.response.handle_session_stopped()
|
|
|
|
elif (
|
|
http_status_code == 500
|
|
and (frappe.db and isinstance(e, frappe.db.InternalError))
|
|
and (frappe.db and (frappe.db.is_deadlocked(e) or frappe.db.is_timedout(e)))
|
|
):
|
|
http_status_code = 508
|
|
|
|
elif http_status_code == 401:
|
|
response = ErrorPage(
|
|
http_status_code=http_status_code,
|
|
title=_("Session Expired"),
|
|
message=_("Your session has expired, please login again to continue."),
|
|
).render()
|
|
|
|
elif http_status_code == 403:
|
|
response = ErrorPage(
|
|
http_status_code=http_status_code,
|
|
title=_("Not Permitted"),
|
|
message=_("You do not have enough permissions to complete the action"),
|
|
).render()
|
|
|
|
elif http_status_code == 404:
|
|
response = ErrorPage(
|
|
http_status_code=http_status_code,
|
|
title=_("Not Found"),
|
|
message=_("The resource you are looking for is not available"),
|
|
).render()
|
|
|
|
elif http_status_code == 429:
|
|
response = frappe.rate_limiter.respond()
|
|
|
|
else:
|
|
response = ErrorPage(
|
|
http_status_code=http_status_code, title=_("Server Error"), message=_("Uncaught Exception")
|
|
).render()
|
|
|
|
if e.__class__ == frappe.AuthenticationError:
|
|
if hasattr(frappe.local, "login_manager"):
|
|
frappe.local.login_manager.clear_cookies()
|
|
|
|
if http_status_code >= 500 or frappe.conf.developer_mode:
|
|
log_error_snapshot(e)
|
|
|
|
if frappe.conf.get("developer_mode") and not respond_as_json:
|
|
# don't fail silently for non-json response errors
|
|
print(frappe.get_traceback())
|
|
|
|
return response
|
|
|
|
|
|
def sync_database(rollback: bool) -> bool:
|
|
# if HTTP method would change server state, commit if necessary
|
|
if frappe.db and (frappe.local.flags.commit or frappe.local.request.method in UNSAFE_HTTP_METHODS):
|
|
frappe.db.commit()
|
|
rollback = False
|
|
elif frappe.db:
|
|
frappe.db.rollback()
|
|
rollback = False
|
|
|
|
# update session
|
|
if session := getattr(frappe.local, "session_obj", None):
|
|
if session.update():
|
|
rollback = False
|
|
|
|
return rollback
|
|
|
|
|
|
# Always initialize sentry SDK if the DSN is sent
|
|
if sentry_dsn := os.getenv("FRAPPE_SENTRY_DSN"):
|
|
import sentry_sdk
|
|
from sentry_sdk.integrations.argv import ArgvIntegration
|
|
from sentry_sdk.integrations.atexit import AtexitIntegration
|
|
from sentry_sdk.integrations.dedupe import DedupeIntegration
|
|
from sentry_sdk.integrations.excepthook import ExcepthookIntegration
|
|
from sentry_sdk.integrations.modules import ModulesIntegration
|
|
from sentry_sdk.integrations.wsgi import SentryWsgiMiddleware
|
|
|
|
from frappe.utils.sentry import FrappeIntegration, before_send
|
|
|
|
integrations = [
|
|
AtexitIntegration(),
|
|
ExcepthookIntegration(),
|
|
DedupeIntegration(),
|
|
ModulesIntegration(),
|
|
ArgvIntegration(),
|
|
]
|
|
|
|
experiments = {}
|
|
kwargs = {}
|
|
|
|
if os.getenv("ENABLE_SENTRY_DB_MONITORING"):
|
|
integrations.append(FrappeIntegration())
|
|
experiments["record_sql_params"] = True
|
|
|
|
if tracing_sample_rate := os.getenv("SENTRY_TRACING_SAMPLE_RATE"):
|
|
kwargs["traces_sample_rate"] = float(tracing_sample_rate)
|
|
application = SentryWsgiMiddleware(application)
|
|
|
|
if profiling_sample_rate := os.getenv("SENTRY_PROFILING_SAMPLE_RATE"):
|
|
kwargs["profiles_sample_rate"] = float(profiling_sample_rate)
|
|
|
|
sentry_sdk.init(
|
|
dsn=sentry_dsn,
|
|
before_send=before_send,
|
|
attach_stacktrace=True,
|
|
release=frappe.__version__,
|
|
auto_enabling_integrations=False,
|
|
default_integrations=False,
|
|
integrations=integrations,
|
|
_experiments=experiments,
|
|
**kwargs,
|
|
)
|
|
|
|
|
|
def serve(
|
|
port=8000,
|
|
profile=False,
|
|
no_reload=False,
|
|
no_threading=False,
|
|
site=None,
|
|
sites_path=".",
|
|
proxy=False,
|
|
):
|
|
global application, _site, _sites_path
|
|
_site = site
|
|
_sites_path = sites_path
|
|
|
|
from werkzeug.serving import run_simple
|
|
|
|
if profile or os.environ.get("USE_PROFILER"):
|
|
application = ProfilerMiddleware(application, sort_by=("cumtime", "calls"))
|
|
|
|
if not os.environ.get("NO_STATICS"):
|
|
application = application_with_statics()
|
|
|
|
if proxy or os.environ.get("USE_PROXY"):
|
|
application = ProxyFix(application, x_for=1, x_proto=1, x_host=1, x_port=1, x_prefix=1)
|
|
|
|
application.debug = True
|
|
application.config = {"SERVER_NAME": "127.0.0.1:8000"}
|
|
|
|
log = logging.getLogger("werkzeug")
|
|
log.propagate = False
|
|
|
|
in_test_env = os.environ.get("CI")
|
|
if in_test_env:
|
|
log.setLevel(logging.ERROR)
|
|
|
|
run_simple(
|
|
"0.0.0.0",
|
|
int(port),
|
|
application,
|
|
exclude_patterns=["test_*"],
|
|
use_reloader=False if in_test_env else not no_reload,
|
|
use_debugger=not in_test_env,
|
|
use_evalex=not in_test_env,
|
|
threaded=not no_threading,
|
|
)
|
|
|
|
|
|
def application_with_statics():
|
|
global application, _sites_path
|
|
|
|
application = SharedDataMiddleware(application, {"/assets": str(os.path.join(_sites_path, "assets"))})
|
|
|
|
application = StaticDataMiddleware(application, {"/files": str(os.path.abspath(_sites_path))})
|
|
|
|
return application
|