2023-02-01 15:33:04 +08:00
|
|
|
import logging
|
2022-10-25 08:52:59 +07:00
|
|
|
import sys
|
2022-09-09 19:35:48 +03:00
|
|
|
from functools import wraps
|
2023-04-28 16:10:11 +01:00
|
|
|
from inspect import Parameter, Signature, isawaitable, iscoroutinefunction
|
2023-05-09 15:30:46 +01:00
|
|
|
from typing import Awaitable, Callable, List, Optional, Type, TypeVar, Union
|
2022-10-30 11:03:16 +04:00
|
|
|
|
2022-10-25 08:52:59 +07:00
|
|
|
if sys.version_info >= (3, 10):
|
|
|
|
|
from typing import ParamSpec
|
|
|
|
|
else:
|
|
|
|
|
from typing_extensions import ParamSpec
|
2022-09-09 19:35:48 +03:00
|
|
|
|
|
|
|
|
from fastapi.concurrency import run_in_threadpool
|
2023-04-28 16:10:11 +01:00
|
|
|
from fastapi.dependencies.utils import get_typed_return_annotation, get_typed_signature
|
2022-09-10 20:06:37 +08:00
|
|
|
from starlette.requests import Request
|
|
|
|
|
from starlette.responses import Response
|
2020-08-26 18:04:57 +08:00
|
|
|
|
|
|
|
|
from fastapi_cache import FastAPICache
|
2020-10-16 16:55:33 +08:00
|
|
|
from fastapi_cache.coder import Coder
|
2023-04-27 16:24:22 +01:00
|
|
|
from fastapi_cache.types import KeyBuilder
|
2020-08-26 18:04:57 +08:00
|
|
|
|
2023-04-27 16:31:42 +01:00
|
|
|
logger: logging.Logger = logging.getLogger(__name__)
|
2023-01-17 12:15:53 +00:00
|
|
|
logger.addHandler(logging.NullHandler())
|
2022-10-25 08:52:59 +07:00
|
|
|
P = ParamSpec("P")
|
|
|
|
|
R = TypeVar("R")
|
|
|
|
|
|
|
|
|
|
|
2023-04-28 16:10:11 +01:00
|
|
|
def _augment_signature(signature: Signature, *extra: Parameter) -> Signature:
|
|
|
|
|
if not extra:
|
2023-04-27 18:14:59 +01:00
|
|
|
return signature
|
|
|
|
|
|
|
|
|
|
parameters = list(signature.parameters.values())
|
|
|
|
|
variadic_keyword_params = []
|
2023-04-28 16:10:11 +01:00
|
|
|
while parameters and parameters[-1].kind is Parameter.VAR_KEYWORD:
|
2023-04-27 18:14:59 +01:00
|
|
|
variadic_keyword_params.append(parameters.pop())
|
|
|
|
|
|
2023-04-28 16:10:11 +01:00
|
|
|
return signature.replace(parameters=[*parameters, *extra, *variadic_keyword_params])
|
|
|
|
|
|
|
|
|
|
|
2023-05-09 15:30:46 +01:00
|
|
|
def _locate_param(sig: Signature, dep: Parameter, to_inject: List[Parameter]) -> Parameter:
|
2023-04-28 16:10:11 +01:00
|
|
|
"""Locate an existing parameter in the decorated endpoint
|
|
|
|
|
|
|
|
|
|
If not found, returns the injectable parameter, and adds it to the to_inject list.
|
|
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
param = next(
|
|
|
|
|
(param for param in sig.parameters.values() if param.annotation is dep.annotation),
|
|
|
|
|
None,
|
|
|
|
|
)
|
|
|
|
|
if param is None:
|
|
|
|
|
to_inject.append(dep)
|
|
|
|
|
param = dep
|
|
|
|
|
return param
|
2023-04-27 18:14:59 +01:00
|
|
|
|
|
|
|
|
|
2020-08-26 18:04:57 +08:00
|
|
|
def cache(
|
2022-10-25 08:52:59 +07:00
|
|
|
expire: Optional[int] = None,
|
2022-10-30 11:03:16 +04:00
|
|
|
coder: Optional[Type[Coder]] = None,
|
2023-04-27 16:24:22 +01:00
|
|
|
key_builder: Optional[KeyBuilder] = None,
|
2023-05-09 15:30:46 +01:00
|
|
|
namespace: str = "",
|
2023-04-28 16:10:11 +01:00
|
|
|
injected_dependency_namespace: str = "__fastapi_cache",
|
2023-05-09 15:30:46 +01:00
|
|
|
) -> Callable[[Callable[P, Awaitable[R]]], Callable[P, Awaitable[Union[R, Response]]]]:
|
2020-08-26 18:04:57 +08:00
|
|
|
"""
|
|
|
|
|
cache all function
|
|
|
|
|
:param namespace:
|
|
|
|
|
:param expire:
|
|
|
|
|
:param coder:
|
|
|
|
|
:param key_builder:
|
2022-08-01 00:04:10 +02:00
|
|
|
|
2020-08-26 18:04:57 +08:00
|
|
|
:return:
|
|
|
|
|
"""
|
|
|
|
|
|
2023-04-28 16:10:11 +01:00
|
|
|
injected_request = Parameter(
|
|
|
|
|
name=f"{injected_dependency_namespace}_request",
|
|
|
|
|
annotation=Request,
|
|
|
|
|
kind=Parameter.KEYWORD_ONLY,
|
|
|
|
|
)
|
|
|
|
|
injected_response = Parameter(
|
|
|
|
|
name=f"{injected_dependency_namespace}_response",
|
|
|
|
|
annotation=Response,
|
|
|
|
|
kind=Parameter.KEYWORD_ONLY,
|
|
|
|
|
)
|
|
|
|
|
|
2023-05-09 15:30:46 +01:00
|
|
|
def wrapper(func: Callable[P, Awaitable[R]]) -> Callable[P, Awaitable[Union[R, Response]]]:
|
2023-04-28 16:10:11 +01:00
|
|
|
# get_typed_signature ensures that any forward references are resolved first
|
|
|
|
|
wrapped_signature = get_typed_signature(func)
|
|
|
|
|
to_inject: list[Parameter] = []
|
|
|
|
|
request_param = _locate_param(wrapped_signature, injected_request, to_inject)
|
|
|
|
|
response_param = _locate_param(wrapped_signature, injected_response, to_inject)
|
2023-05-08 16:42:21 +01:00
|
|
|
return_type = get_typed_return_annotation(func)
|
2022-09-10 20:06:37 +08:00
|
|
|
|
2020-08-26 18:04:57 +08:00
|
|
|
@wraps(func)
|
2023-05-09 15:30:46 +01:00
|
|
|
async def inner(*args: P.args, **kwargs: P.kwargs) -> Union[R, Response]:
|
2020-10-16 16:55:33 +08:00
|
|
|
nonlocal coder
|
|
|
|
|
nonlocal expire
|
|
|
|
|
nonlocal key_builder
|
2022-10-14 13:44:49 +02:00
|
|
|
|
2022-10-25 08:52:59 +07:00
|
|
|
async def ensure_async_func(*args: P.args, **kwargs: P.kwargs) -> R:
|
2022-10-14 13:44:49 +02:00
|
|
|
"""Run cached sync functions in thread pool just like FastAPI."""
|
2023-04-28 16:10:11 +01:00
|
|
|
# if the wrapped function does NOT have request or response in
|
|
|
|
|
# its function signature, make sure we don't pass them in as
|
|
|
|
|
# keyword arguments
|
|
|
|
|
kwargs.pop(injected_request.name, None)
|
|
|
|
|
kwargs.pop(injected_response.name, None)
|
|
|
|
|
|
|
|
|
|
if iscoroutinefunction(func):
|
2022-10-14 14:09:02 +02:00
|
|
|
# async, return as is.
|
|
|
|
|
# unintuitively, we have to await once here, so that caller
|
|
|
|
|
# does not have to await twice. See
|
|
|
|
|
# https://stackoverflow.com/a/59268198/532513
|
|
|
|
|
return await func(*args, **kwargs)
|
2022-10-14 13:44:49 +02:00
|
|
|
else:
|
|
|
|
|
# sync, wrap in thread and return async
|
2022-10-14 14:09:02 +02:00
|
|
|
# see above why we have to await even although caller also awaits.
|
|
|
|
|
return await run_in_threadpool(func, *args, **kwargs)
|
2022-10-14 13:44:49 +02:00
|
|
|
|
2021-01-06 20:00:58 +08:00
|
|
|
copy_kwargs = kwargs.copy()
|
2023-04-28 16:10:11 +01:00
|
|
|
request: Optional[Request] = copy_kwargs.pop(request_param.name, None)
|
|
|
|
|
response: Optional[Response] = copy_kwargs.pop(response_param.name, None)
|
2021-10-28 15:52:21 +08:00
|
|
|
if (
|
2022-08-08 12:40:33 -03:00
|
|
|
request and request.headers.get("Cache-Control") in ("no-store", "no-cache")
|
2021-10-28 15:52:21 +08:00
|
|
|
) or not FastAPICache.get_enable():
|
2022-10-14 13:44:49 +02:00
|
|
|
return await ensure_async_func(*args, **kwargs)
|
2020-10-16 16:55:33 +08:00
|
|
|
|
2023-05-10 17:46:48 +01:00
|
|
|
prefix = FastAPICache.get_prefix()
|
2020-10-16 16:55:33 +08:00
|
|
|
coder = coder or FastAPICache.get_coder()
|
|
|
|
|
expire = expire or FastAPICache.get_expire()
|
|
|
|
|
key_builder = key_builder or FastAPICache.get_key_builder()
|
2020-08-26 18:04:57 +08:00
|
|
|
backend = FastAPICache.get_backend()
|
2021-01-06 20:00:58 +08:00
|
|
|
|
2023-04-27 16:29:10 +01:00
|
|
|
cache_key = key_builder(
|
|
|
|
|
func,
|
2023-05-10 17:46:48 +01:00
|
|
|
f"{prefix}:{namespace}",
|
2023-04-27 16:29:10 +01:00
|
|
|
request=request,
|
|
|
|
|
response=response,
|
|
|
|
|
args=args,
|
|
|
|
|
kwargs=copy_kwargs,
|
|
|
|
|
)
|
2023-04-28 16:10:11 +01:00
|
|
|
if isawaitable(cache_key):
|
2023-04-27 16:29:10 +01:00
|
|
|
cache_key = await cache_key
|
|
|
|
|
|
2023-01-05 18:44:40 +00:00
|
|
|
try:
|
2023-05-09 15:30:46 +01:00
|
|
|
ttl, cached = await backend.get_with_ttl(cache_key)
|
2023-01-13 23:53:02 +00:00
|
|
|
except Exception:
|
2023-02-15 10:45:19 +08:00
|
|
|
logger.warning(
|
|
|
|
|
f"Error retrieving cache key '{cache_key}' from backend:", exc_info=True
|
|
|
|
|
)
|
2023-05-09 15:30:46 +01:00
|
|
|
ttl, cached = 0, None
|
2020-10-08 15:10:34 +08:00
|
|
|
if not request:
|
2023-05-09 15:30:46 +01:00
|
|
|
if cached is not None:
|
|
|
|
|
return coder.decode_as_type(cached, type_=return_type)
|
2022-10-14 13:44:49 +02:00
|
|
|
ret = await ensure_async_func(*args, **kwargs)
|
2023-01-05 18:44:40 +00:00
|
|
|
try:
|
2023-01-14 19:11:42 +01:00
|
|
|
await backend.set(cache_key, coder.encode(ret), expire)
|
2023-01-13 23:53:02 +00:00
|
|
|
except Exception:
|
2023-02-15 10:45:19 +08:00
|
|
|
logger.warning(
|
|
|
|
|
f"Error setting cache key '{cache_key}' in backend:", exc_info=True
|
|
|
|
|
)
|
2020-10-08 15:10:34 +08:00
|
|
|
return ret
|
2020-08-26 18:04:57 +08:00
|
|
|
|
|
|
|
|
if request.method != "GET":
|
2023-04-28 18:43:40 +01:00
|
|
|
return await ensure_async_func(*args, **kwargs)
|
2022-10-14 13:44:49 +02:00
|
|
|
|
2020-08-26 18:04:57 +08:00
|
|
|
if_none_match = request.headers.get("if-none-match")
|
2023-05-09 15:30:46 +01:00
|
|
|
if cached is not None:
|
2020-08-26 18:04:57 +08:00
|
|
|
if response:
|
|
|
|
|
response.headers["Cache-Control"] = f"max-age={ttl}"
|
2023-05-09 15:30:46 +01:00
|
|
|
etag = f"W/{hash(cached)}"
|
2020-08-26 18:04:57 +08:00
|
|
|
if if_none_match == etag:
|
|
|
|
|
response.status_code = 304
|
|
|
|
|
return response
|
|
|
|
|
response.headers["ETag"] = etag
|
2023-05-09 15:30:46 +01:00
|
|
|
return coder.decode_as_type(cached, type_=return_type)
|
2022-10-14 13:44:49 +02:00
|
|
|
|
|
|
|
|
ret = await ensure_async_func(*args, **kwargs)
|
2022-02-04 16:37:18 +01:00
|
|
|
encoded_ret = coder.encode(ret)
|
2022-08-01 00:04:10 +02:00
|
|
|
|
2023-01-05 18:44:40 +00:00
|
|
|
try:
|
2023-01-14 19:11:42 +01:00
|
|
|
await backend.set(cache_key, encoded_ret, expire)
|
2023-01-13 23:53:02 +00:00
|
|
|
except Exception:
|
2023-01-17 12:15:53 +00:00
|
|
|
logger.warning(f"Error setting cache key '{cache_key}' in backend:", exc_info=True)
|
2023-01-14 19:11:42 +01:00
|
|
|
|
2023-05-09 15:30:46 +01:00
|
|
|
if response:
|
|
|
|
|
response.headers["Cache-Control"] = f"max-age={expire}"
|
|
|
|
|
etag = f"W/{hash(encoded_ret)}"
|
|
|
|
|
response.headers["ETag"] = etag
|
2020-08-26 18:04:57 +08:00
|
|
|
return ret
|
|
|
|
|
|
2023-04-28 16:10:11 +01:00
|
|
|
inner.__signature__ = _augment_signature(wrapped_signature, *to_inject)
|
2020-08-26 18:04:57 +08:00
|
|
|
return inner
|
|
|
|
|
|
|
|
|
|
return wrapper
|