Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PR #9301/c240b52 backport][3.10] Replace code that can now be handled by yarl #9314

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGES/9301.misc.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Replaced code that can now be handled by ``yarl`` -- by :user:`bdraco`.
32 changes: 21 additions & 11 deletions aiohttp/client_reqrep.py
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@

import attr
from multidict import CIMultiDict, CIMultiDictProxy, MultiDict, MultiDictProxy
from yarl import URL
from yarl import URL, __version__ as yarl_version

from . import hdrs, helpers, http, multipart, payload
from .abc import AbstractStreamWriter
Expand Down Expand Up @@ -90,6 +90,10 @@

_CONTAINS_CONTROL_CHAR_RE = re.compile(r"[^-!#$%&'*+.^_`|~0-9a-zA-Z]")
json_re = re.compile(r"^application/(?:[\w.+-]+?\+)?json")
_YARL_SUPPORTS_HOST_SUBCOMPONENT = tuple(map(int, yarl_version.split(".")[:2])) >= (
1,
13,
)


def _gen_default_accept_encoding() -> str:
Expand Down Expand Up @@ -429,9 +433,13 @@
self.headers: CIMultiDict[str] = CIMultiDict()

# add host
netloc = cast(str, self.url.raw_host)
if helpers.is_ipv6_address(netloc):
netloc = f"[{netloc}]"
if _YARL_SUPPORTS_HOST_SUBCOMPONENT:
netloc = self.url.host_subcomponent
assert netloc is not None
else:
netloc = cast(str, self.url.raw_host)
if helpers.is_ipv6_address(netloc):
netloc = f"[{netloc}]"
# See https://github.com/aio-libs/aiohttp/issues/3636.
netloc = netloc.rstrip(".")
if self.url.port is not None and not self.url.is_default_port():
Expand Down Expand Up @@ -676,17 +684,19 @@
# - not CONNECT proxy must send absolute form URI
# - most common is origin form URI
if self.method == hdrs.METH_CONNECT:
connect_host = self.url.raw_host
assert connect_host is not None
if helpers.is_ipv6_address(connect_host):
connect_host = f"[{connect_host}]"
if _YARL_SUPPORTS_HOST_SUBCOMPONENT:
connect_host = self.url.host_subcomponent
assert connect_host is not None
else:
connect_host = self.url.raw_host
assert connect_host is not None
if helpers.is_ipv6_address(connect_host):
connect_host = f"[{connect_host}]"

Check warning on line 694 in aiohttp/client_reqrep.py

View check run for this annotation

Codecov / codecov/patch

aiohttp/client_reqrep.py#L694

Added line #L694 was not covered by tests
path = f"{connect_host}:{self.url.port}"
elif self.proxy and not self.is_ssl():
path = str(self.url)
else:
path = self.url.raw_path
if self.url.raw_query_string:
path += "?" + self.url.raw_query_string
path = self.url.raw_path_qs

protocol = conn.protocol
assert protocol is not None
Expand Down
15 changes: 11 additions & 4 deletions tests/test_client_request.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
from yarl import URL

import aiohttp
from aiohttp import BaseConnector, hdrs, helpers, payload
from aiohttp import BaseConnector, client_reqrep, hdrs, helpers, payload
from aiohttp.client_exceptions import ClientConnectionError
from aiohttp.client_reqrep import (
ClientRequest,
Expand Down Expand Up @@ -280,9 +280,16 @@ def test_host_header_ipv4(make_request) -> None:
assert req.headers["HOST"] == "127.0.0.2"


def test_host_header_ipv6(make_request) -> None:
req = make_request("get", "http://[::2]")
assert req.headers["HOST"] == "[::2]"
@pytest.mark.parametrize("yarl_supports_host_subcomponent", [True, False])
def test_host_header_ipv6(make_request, yarl_supports_host_subcomponent: bool) -> None:
# Ensure the old path is tested for old yarl versions
with mock.patch.object(
client_reqrep,
"_YARL_SUPPORTS_HOST_SUBCOMPONENT",
yarl_supports_host_subcomponent,
):
req = make_request("get", "http://[::2]")
assert req.headers["HOST"] == "[::2]"


def test_host_header_ipv4_with_port(make_request) -> None:
Expand Down
24 changes: 16 additions & 8 deletions tests/test_proxy_functional.py
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
from yarl import URL

import aiohttp
from aiohttp import web
from aiohttp import client_reqrep, web
from aiohttp.client_exceptions import ClientConnectionError
from aiohttp.helpers import IS_MACOS, IS_WINDOWS

Expand Down Expand Up @@ -95,6 +95,7 @@ async def handler(*args, **kwargs):
reason="asyncio on this python does not support TLS in TLS",
)
@pytest.mark.parametrize("web_server_endpoint_type", ("http", "https"))
@pytest.mark.parametrize("yarl_supports_host_subcomponent", [True, False])
@pytest.mark.filterwarnings(r"ignore:.*ssl.OP_NO_SSL*")
# Filter out the warning from
# https://github.com/abhinavsingh/proxy.py/blob/30574fd0414005dfa8792a6e797023e862bdcf43/proxy/common/utils.py#L226
Expand All @@ -104,18 +105,25 @@ async def test_secure_https_proxy_absolute_path(
secure_proxy_url: URL,
web_server_endpoint_url: str,
web_server_endpoint_payload: str,
yarl_supports_host_subcomponent: bool,
) -> None:
"""Ensure HTTP(S) sites are accessible through a secure proxy."""
conn = aiohttp.TCPConnector()
sess = aiohttp.ClientSession(connector=conn)

async with sess.get(
web_server_endpoint_url,
proxy=secure_proxy_url,
ssl=client_ssl_ctx, # used for both proxy and endpoint connections
) as response:
assert response.status == 200
assert await response.text() == web_server_endpoint_payload
# Ensure the old path is tested for old yarl versions
with mock.patch.object(
client_reqrep,
"_YARL_SUPPORTS_HOST_SUBCOMPONENT",
yarl_supports_host_subcomponent,
):
async with sess.get(
web_server_endpoint_url,
proxy=secure_proxy_url,
ssl=client_ssl_ctx, # used for both proxy and endpoint connections
) as response:
assert response.status == 200
assert await response.text() == web_server_endpoint_payload

await sess.close()
await conn.close()
Expand Down
Loading