Back to top

hikari.impl.config

Data class containing network-related configuration settings.

View Source
# -*- coding: utf-8 -*-
# cython: language_level=3
# Copyright (c) 2020 Nekokatt
# Copyright (c) 2021-present davfsa
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
"""Data class containing network-related configuration settings."""

from __future__ import annotations

__all__: typing.Sequence[str] = (
    "BasicAuthHeader",
    "ProxySettings",
    "HTTPTimeoutSettings",
    "HTTPSettings",
    "CacheSettings",
)

import base64
import ssl as ssl_
import typing

import attr

from hikari.api import config
from hikari.internal import attr_extensions
from hikari.internal import data_binding

_BASICAUTH_TOKEN_PREFIX: typing.Final[str] = "Basic"  # nosec
_PROXY_AUTHENTICATION_HEADER: typing.Final[str] = "Proxy-Authentication"


def _ssl_factory(value: typing.Union[bool, ssl_.SSLContext]) -> ssl_.SSLContext:
    if not isinstance(value, bool):
        return value

    ssl = ssl_.create_default_context()
    # We can't turn SSL verification off without disabling hostname verification first.
    # If we are using verification, this will just leave it enabled, so it is fine.
    ssl.check_hostname = value
    ssl.verify_mode = ssl_.CERT_REQUIRED if value else ssl_.CERT_NONE
    return ssl


@attr_extensions.with_copy
@attr.define(kw_only=True, repr=True, weakref_slot=False)
class BasicAuthHeader:
    """An object that can be set as a producer for a basic auth header."""

    username: str = attr.field(validator=attr.validators.instance_of(str))
    """Username for the header.

    ...warning :: This must not contain `":"`.
    """

    password: str = attr.field(repr=False, validator=attr.validators.instance_of(str))
    """Password to use."""

    charset: str = attr.field(default="utf-8", validator=attr.validators.instance_of(str))
    """Encoding to use for the username and password.

    Default is `"utf-8"`, but you may choose to use something else,
    including third-party encodings (e.g. IBM's EBCDIC codepages).
    """

    @property
    def header(self) -> str:
        """Create the full `Authentication` header value."""
        raw_token = f"{self.username}:{self.password}".encode(self.charset)
        token_part = base64.b64encode(raw_token).decode(self.charset)
        return f"{_BASICAUTH_TOKEN_PREFIX} {token_part}"

    def __str__(self) -> str:
        return self.header


@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class ProxySettings(config.ProxySettings):
    """Settings for configuring an HTTP-based proxy."""

    auth: typing.Any = attr.field(default=None)
    """Authentication header value to use.

    When cast to a `str`, this should provide the full value
    for the authentication header.

    If you are using basic auth, you should consider using the
    `BasicAuthHeader` helper object here, as this will provide any
    transformations you may require into a base64 string.

    The default is to have this set to `None`, which will
    result in no authentication being provided.

    Returns
    -------
    typing.Any
        The value for the `Authentication` header, or `None`
        to disable.
    """

    headers: typing.Optional[data_binding.Headers] = attr.field(default=None)
    """Additional headers to use for requests via a proxy, if required."""

    url: typing.Union[None, str] = attr.field(default=None)
    """Proxy URL to use.

    Defaults to `None` which disables the use of an explicit proxy.

    Returns
    -------
    typing.Union[None, str]
        The proxy URL to use, or `None` to disable it.
    """

    trust_env: bool = attr.field(default=False, validator=attr.validators.instance_of(bool))
    """Toggle whether to look for a `netrc` file or environment variables.

    If `True`, and no `url` is given on this object, then
    `HTTP_PROXY` and `HTTPS_PROXY` will be used from the environment
    variables, or a `netrc` file may be read to determine credentials.

    If `False`, then this information is instead ignored.

    Defaults to `False` to prevent potentially unwanted behavior.

    .. note::
        For more details of using `netrc`, visit:
        <https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html>

    Returns
    -------
    bool
        `True` if allowing the use of environment variables
        and/or `netrc` to determine proxy settings; `False`
        if this should be disabled explicitly.
    """

    @property
    def all_headers(self) -> typing.Optional[data_binding.Headers]:
        """Return all proxy headers.

        Will be `None` if no headers are to be send with any request.
        """
        if self.headers is None:
            if self.auth is None:
                return None
            return {_PROXY_AUTHENTICATION_HEADER: self.auth}

        if self.auth is None:
            return self.headers
        return {**self.headers, _PROXY_AUTHENTICATION_HEADER: self.auth}


@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPTimeoutSettings:
    """Settings to control HTTP request timeouts."""

    acquire_and_connect: typing.Optional[float] = attr.field(default=None)
    """Timeout for `request_socket_connect` PLUS connection acquisition.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    request_socket_connect: typing.Optional[float] = attr.field(default=None)
    """Timeout for connecting a socket.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    request_socket_read: typing.Optional[float] = attr.field(default=None)
    """Timeout for reading a socket.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    total: typing.Optional[float] = attr.field(default=30.0)
    """Total timeout for entire request.

    By default, this has a 30 second timeout allocated. Setting it to `None`
    will disable it.
    """

    @acquire_and_connect.validator
    @request_socket_connect.validator
    @request_socket_read.validator
    @total.validator
    def _(self, attrib: attr.Attribute[typing.Optional[float]], value: typing.Optional[float]) -> None:
        # This error won't occur until some time in the future where it will be annoying to
        # try and determine the root cause, so validate it NOW.
        if value is not None and (not isinstance(value, (float, int)) or value <= 0):
            raise ValueError(f"HTTPTimeoutSettings.{attrib.name} must be None, or a POSITIVE float/int")


@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPSettings(config.HTTPSettings):
    """Settings to control HTTP clients."""

    enable_cleanup_closed: bool = attr.field(default=True, validator=attr.validators.instance_of(bool))
    """Toggle whether to clean up closed transports.

    This defaults to `True` to combat various protocol and asyncio
    issues present when using Microsoft Windows. If you are sure you know
    what you are doing, you may instead set this to `False` to disable this
    behavior internally.
    """

    force_close_transports: bool = attr.field(default=True, validator=attr.validators.instance_of(bool))
    """Toggle whether to force close transports on shutdown.

    This defaults to `True` to combat various protocol and asyncio
    issues present when using Microsoft Windows. If you are sure you know
    what you are doing, you may instead set this to `False` to disable this
    behavior internally.
    """

    max_redirects: typing.Optional[int] = attr.field(default=10)
    """Behavior for handling redirect HTTP responses.

    If a `int`, allow following redirects from `3xx` HTTP responses
    for up to this many redirects. Exceeding this value will raise an
    exception.

    If `None`, then disallow any redirects.

    The default is to disallow this behavior for security reasons.

    Generally, it is safer to keep this disabled. You may find a case in the
    future where you need to enable this if Discord change their URL without
    warning.

    .. note::
        This will only apply to the REST API. WebSockets remain unaffected
        by any value set here.
    """

    @max_redirects.validator
    def _(self, _: attr.Attribute[typing.Optional[int]], value: typing.Optional[int]) -> None:
        # This error won't occur until some time in the future where it will be annoying to
        # try and determine the root cause, so validate it NOW.
        if value is not None and (not isinstance(value, int) or value <= 0):
            raise ValueError("http_settings.max_redirects must be None or a POSITIVE integer")

    ssl: ssl_.SSLContext = attr.field(
        factory=lambda: _ssl_factory(True),
        converter=_ssl_factory,
        validator=attr.validators.instance_of(ssl_.SSLContext),
    )
    """SSL context to use.

    This may be __assigned__ a `bool` or an `ssl.SSLContext` object.

    If assigned to `True`, a default SSL context is generated by
    this class that will enforce SSL verification. This is then stored in
    this field.

    If `False`, then a default SSL context is generated by this
    class that will **NOT** enforce SSL verification. This is then stored
    in this field.

    If an instance of `ssl.SSLContext`, then this context will be used.

    .. warning::
        Setting a custom value here may have security implications, or
        may result in the application being unable to connect to Discord
        at all.

    .. warning::
        Disabling SSL verification is almost always unadvised. This
        is because your application will no longer check whether you are
        connecting to Discord, or to some third party spoof designed
        to steal personal credentials such as your application token.

        There may be cases where SSL certificates do not get updated,
        and in this case, you may find that disabling this explicitly
        allows you to work around any issues that are occurring, but
        you should immediately seek a better solution where possible
        if any form of personal security is in your interest.
    """

    timeouts: HTTPTimeoutSettings = attr.field(
        factory=HTTPTimeoutSettings, validator=attr.validators.instance_of(HTTPTimeoutSettings)
    )
    """Settings to control HTTP request timeouts.

    The behaviour if this is not explicitly defined is to use sane
    defaults that are most efficient for optimal use of this library.
    """


@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class CacheSettings(config.CacheSettings):
    """Settings to control the cache."""

    components: config.CacheComponents = attr.field(
        converter=config.CacheComponents, default=config.CacheComponents.ALL
    )
    """The cache components to use.

    Defaults to `hikari.api.cache.CacheComponents.ALL`.
    """

    max_messages: int = attr.field(default=300)
    """The maximum number of messages to store in the cache at once.

    This will have no effect if the messages cache is not enabled.

    Defaults to `300`.
    """

    max_dm_channel_ids: int = attr.field(default=50)
    """The maximum number of channel IDs to store in the cache at once.

    This will have no effect if the channel IDs cache is not enabled.

    Defaults to `50`.
    """
#  
@attr_extensions.with_copy
@attr.define(kw_only=True, repr=True, weakref_slot=False)
class BasicAuthHeader:
View Source
@attr_extensions.with_copy
@attr.define(kw_only=True, repr=True, weakref_slot=False)
class BasicAuthHeader:
    """An object that can be set as a producer for a basic auth header."""

    username: str = attr.field(validator=attr.validators.instance_of(str))
    """Username for the header.

    ...warning :: This must not contain `":"`.
    """

    password: str = attr.field(repr=False, validator=attr.validators.instance_of(str))
    """Password to use."""

    charset: str = attr.field(default="utf-8", validator=attr.validators.instance_of(str))
    """Encoding to use for the username and password.

    Default is `"utf-8"`, but you may choose to use something else,
    including third-party encodings (e.g. IBM's EBCDIC codepages).
    """

    @property
    def header(self) -> str:
        """Create the full `Authentication` header value."""
        raw_token = f"{self.username}:{self.password}".encode(self.charset)
        token_part = base64.b64encode(raw_token).decode(self.charset)
        return f"{_BASICAUTH_TOKEN_PREFIX} {token_part}"

    def __str__(self) -> str:
        return self.header

An object that can be set as a producer for a basic auth header.

Variables and properties
#  charset: str

Encoding to use for the username and password.

Default is "utf-8", but you may choose to use something else, including third-party encodings (e.g. IBM's EBCDIC codepages).

#  header: str

Create the full Authentication header value.

#  password: str

Password to use.

#  username: str

Username for the header.

...warning :: This must not contain ":".

Methods
#  def __init__(self, *, username: str, password: str, charset: str = 'utf-8'):
View Source
def __init__(self, *, username, password, charset=attr_dict['charset'].default):
    _setattr = _cached_setattr.__get__(self, self.__class__)
    _setattr('username', username)
    _setattr('password', password)
    _setattr('charset', charset)
    if _config._run_validators is True:
        __attr_validator_username(self, __attr_username, self.username)
        __attr_validator_password(self, __attr_password, self.password)
        __attr_validator_charset(self, __attr_charset, self.charset)

Method generated by attrs for class BasicAuthHeader.

#  
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class CacheSettings(hikari.api.config.CacheSettings):
View Source
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class CacheSettings(config.CacheSettings):
    """Settings to control the cache."""

    components: config.CacheComponents = attr.field(
        converter=config.CacheComponents, default=config.CacheComponents.ALL
    )
    """The cache components to use.

    Defaults to `hikari.api.cache.CacheComponents.ALL`.
    """

    max_messages: int = attr.field(default=300)
    """The maximum number of messages to store in the cache at once.

    This will have no effect if the messages cache is not enabled.

    Defaults to `300`.
    """

    max_dm_channel_ids: int = attr.field(default=50)
    """The maximum number of channel IDs to store in the cache at once.

    This will have no effect if the channel IDs cache is not enabled.

    Defaults to `50`.
    """

Settings to control the cache.

Variables and properties

The cache components to use.

Defaults to hikari.api.cache.CacheComponents.ALL.

#  max_dm_channel_ids: int

The maximum number of channel IDs to store in the cache at once.

This will have no effect if the channel IDs cache is not enabled.

Defaults to 50.

#  max_messages: int

The maximum number of messages to store in the cache at once.

This will have no effect if the messages cache is not enabled.

Defaults to 300.

Methods
#  def __init__(
   self,
   *,
   components: int = <CacheComponents.ALL: 2047>,
   max_messages: int = 300,
   max_dm_channel_ids: int = 50
):
View Source
def __init__(self, *, components=attr_dict['components'].default, max_messages=attr_dict['max_messages'].default, max_dm_channel_ids=attr_dict['max_dm_channel_ids'].default):
    _setattr = _cached_setattr.__get__(self, self.__class__)
    _setattr('components', __attr_converter_components(components))
    _setattr('max_messages', max_messages)
    _setattr('max_dm_channel_ids', max_dm_channel_ids)

Method generated by attrs for class CacheSettings.

#  
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPSettings(hikari.api.config.HTTPSettings):
View Source
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPSettings(config.HTTPSettings):
    """Settings to control HTTP clients."""

    enable_cleanup_closed: bool = attr.field(default=True, validator=attr.validators.instance_of(bool))
    """Toggle whether to clean up closed transports.

    This defaults to `True` to combat various protocol and asyncio
    issues present when using Microsoft Windows. If you are sure you know
    what you are doing, you may instead set this to `False` to disable this
    behavior internally.
    """

    force_close_transports: bool = attr.field(default=True, validator=attr.validators.instance_of(bool))
    """Toggle whether to force close transports on shutdown.

    This defaults to `True` to combat various protocol and asyncio
    issues present when using Microsoft Windows. If you are sure you know
    what you are doing, you may instead set this to `False` to disable this
    behavior internally.
    """

    max_redirects: typing.Optional[int] = attr.field(default=10)
    """Behavior for handling redirect HTTP responses.

    If a `int`, allow following redirects from `3xx` HTTP responses
    for up to this many redirects. Exceeding this value will raise an
    exception.

    If `None`, then disallow any redirects.

    The default is to disallow this behavior for security reasons.

    Generally, it is safer to keep this disabled. You may find a case in the
    future where you need to enable this if Discord change their URL without
    warning.

    .. note::
        This will only apply to the REST API. WebSockets remain unaffected
        by any value set here.
    """

    @max_redirects.validator
    def _(self, _: attr.Attribute[typing.Optional[int]], value: typing.Optional[int]) -> None:
        # This error won't occur until some time in the future where it will be annoying to
        # try and determine the root cause, so validate it NOW.
        if value is not None and (not isinstance(value, int) or value <= 0):
            raise ValueError("http_settings.max_redirects must be None or a POSITIVE integer")

    ssl: ssl_.SSLContext = attr.field(
        factory=lambda: _ssl_factory(True),
        converter=_ssl_factory,
        validator=attr.validators.instance_of(ssl_.SSLContext),
    )
    """SSL context to use.

    This may be __assigned__ a `bool` or an `ssl.SSLContext` object.

    If assigned to `True`, a default SSL context is generated by
    this class that will enforce SSL verification. This is then stored in
    this field.

    If `False`, then a default SSL context is generated by this
    class that will **NOT** enforce SSL verification. This is then stored
    in this field.

    If an instance of `ssl.SSLContext`, then this context will be used.

    .. warning::
        Setting a custom value here may have security implications, or
        may result in the application being unable to connect to Discord
        at all.

    .. warning::
        Disabling SSL verification is almost always unadvised. This
        is because your application will no longer check whether you are
        connecting to Discord, or to some third party spoof designed
        to steal personal credentials such as your application token.

        There may be cases where SSL certificates do not get updated,
        and in this case, you may find that disabling this explicitly
        allows you to work around any issues that are occurring, but
        you should immediately seek a better solution where possible
        if any form of personal security is in your interest.
    """

    timeouts: HTTPTimeoutSettings = attr.field(
        factory=HTTPTimeoutSettings, validator=attr.validators.instance_of(HTTPTimeoutSettings)
    )
    """Settings to control HTTP request timeouts.

    The behaviour if this is not explicitly defined is to use sane
    defaults that are most efficient for optimal use of this library.
    """

Settings to control HTTP clients.

Variables and properties
#  enable_cleanup_closed: bool

Toggle whether to clean up closed transports.

This defaults to True to combat various protocol and asyncio issues present when using Microsoft Windows. If you are sure you know what you are doing, you may instead set this to False to disable this behavior internally.

#  force_close_transports: bool

Toggle whether to force close transports on shutdown.

This defaults to True to combat various protocol and asyncio issues present when using Microsoft Windows. If you are sure you know what you are doing, you may instead set this to False to disable this behavior internally.

#  max_redirects: Optional[int]

Behavior for handling redirect HTTP responses.

If a int, allow following redirects from 3xx HTTP responses for up to this many redirects. Exceeding this value will raise an exception.

If None, then disallow any redirects.

The default is to disallow this behavior for security reasons.

Generally, it is safer to keep this disabled. You may find a case in the future where you need to enable this if Discord change their URL without warning.

Note: This will only apply to the REST API. WebSockets remain unaffected by any value set here.

#  ssl: ssl.SSLContext

SSL context to use.

This may be __assigned__ a bool or an ssl.SSLContext object.

If assigned to True, a default SSL context is generated by this class that will enforce SSL verification. This is then stored in this field.

If False, then a default SSL context is generated by this class that will NOT enforce SSL verification. This is then stored in this field.

If an instance of ssl.SSLContext, then this context will be used.

Warning: Setting a custom value here may have security implications, or may result in the application being unable to connect to Discord at all.

Warning: Disabling SSL verification is almost always unadvised. This is because your application will no longer check whether you are connecting to Discord, or to some third party spoof designed to steal personal credentials such as your application token.

There may be cases where SSL certificates do not get updated, and in this case, you may find that disabling this explicitly allows you to work around any issues that are occurring, but you should immediately seek a better solution where possible if any form of personal security is in your interest.

Settings to control HTTP request timeouts.

The behaviour if this is not explicitly defined is to use sane defaults that are most efficient for optimal use of this library.

Methods
#  def __init__(
   self,
   *,
   enable_cleanup_closed: bool = True,
   force_close_transports: bool = True,
   max_redirects: Optional[int] = 10,
   ssl: Union[bool, ssl.SSLContext] = NOTHING,
   timeouts: hikari.impl.config.HTTPTimeoutSettings = NOTHING
):
View Source
def __init__(self, *, enable_cleanup_closed=attr_dict['enable_cleanup_closed'].default, force_close_transports=attr_dict['force_close_transports'].default, max_redirects=attr_dict['max_redirects'].default, ssl=NOTHING, timeouts=NOTHING):
    _setattr = _cached_setattr.__get__(self, self.__class__)
    _setattr('enable_cleanup_closed', enable_cleanup_closed)
    _setattr('force_close_transports', force_close_transports)
    _setattr('max_redirects', max_redirects)
    if ssl is not NOTHING:
        _setattr('ssl', __attr_converter_ssl(ssl))
    else:
        _setattr('ssl', __attr_converter_ssl(__attr_factory_ssl()))
    if timeouts is not NOTHING:
        _setattr('timeouts', timeouts)
    else:
        _setattr('timeouts', __attr_factory_timeouts())
    if _config._run_validators is True:
        __attr_validator_enable_cleanup_closed(self, __attr_enable_cleanup_closed, self.enable_cleanup_closed)
        __attr_validator_force_close_transports(self, __attr_force_close_transports, self.force_close_transports)
        __attr_validator_max_redirects(self, __attr_max_redirects, self.max_redirects)
        __attr_validator_ssl(self, __attr_ssl, self.ssl)
        __attr_validator_timeouts(self, __attr_timeouts, self.timeouts)

Method generated by attrs for class HTTPSettings.

#  
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPTimeoutSettings:
View Source
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class HTTPTimeoutSettings:
    """Settings to control HTTP request timeouts."""

    acquire_and_connect: typing.Optional[float] = attr.field(default=None)
    """Timeout for `request_socket_connect` PLUS connection acquisition.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    request_socket_connect: typing.Optional[float] = attr.field(default=None)
    """Timeout for connecting a socket.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    request_socket_read: typing.Optional[float] = attr.field(default=None)
    """Timeout for reading a socket.

    By default, this has no timeout allocated. Setting it to `None`
    will disable it.
    """

    total: typing.Optional[float] = attr.field(default=30.0)
    """Total timeout for entire request.

    By default, this has a 30 second timeout allocated. Setting it to `None`
    will disable it.
    """

    @acquire_and_connect.validator
    @request_socket_connect.validator
    @request_socket_read.validator
    @total.validator
    def _(self, attrib: attr.Attribute[typing.Optional[float]], value: typing.Optional[float]) -> None:
        # This error won't occur until some time in the future where it will be annoying to
        # try and determine the root cause, so validate it NOW.
        if value is not None and (not isinstance(value, (float, int)) or value <= 0):
            raise ValueError(f"HTTPTimeoutSettings.{attrib.name} must be None, or a POSITIVE float/int")

Settings to control HTTP request timeouts.

Variables and properties
#  acquire_and_connect: Optional[float]

Timeout for request_socket_connect PLUS connection acquisition.

By default, this has no timeout allocated. Setting it to None will disable it.

#  request_socket_connect: Optional[float]

Timeout for connecting a socket.

By default, this has no timeout allocated. Setting it to None will disable it.

#  request_socket_read: Optional[float]

Timeout for reading a socket.

By default, this has no timeout allocated. Setting it to None will disable it.

#  total: Optional[float]

Total timeout for entire request.

By default, this has a 30 second timeout allocated. Setting it to None will disable it.

Methods
#  def __init__(
   self,
   *,
   acquire_and_connect: Optional[float] = None,
   request_socket_connect: Optional[float] = None,
   request_socket_read: Optional[float] = None,
   total: Optional[float] = 30.0
):
View Source
def __init__(self, *, acquire_and_connect=attr_dict['acquire_and_connect'].default, request_socket_connect=attr_dict['request_socket_connect'].default, request_socket_read=attr_dict['request_socket_read'].default, total=attr_dict['total'].default):
    _setattr = _cached_setattr.__get__(self, self.__class__)
    _setattr('acquire_and_connect', acquire_and_connect)
    _setattr('request_socket_connect', request_socket_connect)
    _setattr('request_socket_read', request_socket_read)
    _setattr('total', total)
    if _config._run_validators is True:
        __attr_validator_acquire_and_connect(self, __attr_acquire_and_connect, self.acquire_and_connect)
        __attr_validator_request_socket_connect(self, __attr_request_socket_connect, self.request_socket_connect)
        __attr_validator_request_socket_read(self, __attr_request_socket_read, self.request_socket_read)
        __attr_validator_total(self, __attr_total, self.total)

Method generated by attrs for class HTTPTimeoutSettings.

#  
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class ProxySettings(hikari.api.config.ProxySettings):
View Source
@attr_extensions.with_copy
@attr.define(kw_only=True, weakref_slot=False)
class ProxySettings(config.ProxySettings):
    """Settings for configuring an HTTP-based proxy."""

    auth: typing.Any = attr.field(default=None)
    """Authentication header value to use.

    When cast to a `str`, this should provide the full value
    for the authentication header.

    If you are using basic auth, you should consider using the
    `BasicAuthHeader` helper object here, as this will provide any
    transformations you may require into a base64 string.

    The default is to have this set to `None`, which will
    result in no authentication being provided.

    Returns
    -------
    typing.Any
        The value for the `Authentication` header, or `None`
        to disable.
    """

    headers: typing.Optional[data_binding.Headers] = attr.field(default=None)
    """Additional headers to use for requests via a proxy, if required."""

    url: typing.Union[None, str] = attr.field(default=None)
    """Proxy URL to use.

    Defaults to `None` which disables the use of an explicit proxy.

    Returns
    -------
    typing.Union[None, str]
        The proxy URL to use, or `None` to disable it.
    """

    trust_env: bool = attr.field(default=False, validator=attr.validators.instance_of(bool))
    """Toggle whether to look for a `netrc` file or environment variables.

    If `True`, and no `url` is given on this object, then
    `HTTP_PROXY` and `HTTPS_PROXY` will be used from the environment
    variables, or a `netrc` file may be read to determine credentials.

    If `False`, then this information is instead ignored.

    Defaults to `False` to prevent potentially unwanted behavior.

    .. note::
        For more details of using `netrc`, visit:
        <https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html>

    Returns
    -------
    bool
        `True` if allowing the use of environment variables
        and/or `netrc` to determine proxy settings; `False`
        if this should be disabled explicitly.
    """

    @property
    def all_headers(self) -> typing.Optional[data_binding.Headers]:
        """Return all proxy headers.

        Will be `None` if no headers are to be send with any request.
        """
        if self.headers is None:
            if self.auth is None:
                return None
            return {_PROXY_AUTHENTICATION_HEADER: self.auth}

        if self.auth is None:
            return self.headers
        return {**self.headers, _PROXY_AUTHENTICATION_HEADER: self.auth}

Settings for configuring an HTTP-based proxy.

Variables and properties
#  all_headers: Optional[Mapping[str, str]]

Return all proxy headers.

Will be None if no headers are to be send with any request.

#  auth: Any

Authentication header value to use.

When cast to a str, this should provide the full value for the authentication header.

If you are using basic auth, you should consider using the BasicAuthHeader helper object here, as this will provide any transformations you may require into a base64 string.

The default is to have this set to None, which will result in no authentication being provided.

Returns
  • typing.Any: The value for the Authentication header, or None to disable.
#  headers: Optional[Mapping[str, str]]

Additional headers to use for requests via a proxy, if required.

#  trust_env: bool

Toggle whether to look for a netrc file or environment variables.

If True, and no url is given on this object, then HTTP_PROXY and HTTPS_PROXY will be used from the environment variables, or a netrc file may be read to determine credentials.

If False, then this information is instead ignored.

Defaults to False to prevent potentially unwanted behavior.

Note: For more details of using netrc, visit: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html

Returns
  • bool: True if allowing the use of environment variables and/or netrc to determine proxy settings; False if this should be disabled explicitly.
#  url: Optional[str]

Proxy URL to use.

Defaults to None which disables the use of an explicit proxy.

Returns
  • typing.Union[None, str]: The proxy URL to use, or None to disable it.
Methods
#  def __init__(
   self,
   *,
   auth: Any = None,
   headers: Optional[Mapping[str, str]] = None,
   url: Optional[str] = None,
   trust_env: bool = False
):
View Source
def __init__(self, *, auth=attr_dict['auth'].default, headers=attr_dict['headers'].default, url=attr_dict['url'].default, trust_env=attr_dict['trust_env'].default):
    _setattr = _cached_setattr.__get__(self, self.__class__)
    _setattr('auth', auth)
    _setattr('headers', headers)
    _setattr('url', url)
    _setattr('trust_env', trust_env)
    if _config._run_validators is True:
        __attr_validator_trust_env(self, __attr_trust_env, self.trust_env)

Method generated by attrs for class ProxySettings.