OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/websockets/websocket_basic_handshake_stream.h" | 5 #include "net/websockets/websocket_basic_handshake_stream.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <iterator> | 8 #include <iterator> |
9 #include <string> | |
9 | 10 |
10 #include "base/base64.h" | 11 #include "base/base64.h" |
11 #include "base/basictypes.h" | 12 #include "base/basictypes.h" |
12 #include "base/bind.h" | 13 #include "base/bind.h" |
13 #include "base/containers/hash_tables.h" | 14 #include "base/containers/hash_tables.h" |
14 #include "base/stl_util.h" | 15 #include "base/stl_util.h" |
15 #include "base/strings/string_util.h" | 16 #include "base/strings/string_util.h" |
17 #include "base/strings/stringprintf.h" | |
16 #include "crypto/random.h" | 18 #include "crypto/random.h" |
17 #include "net/http/http_request_headers.h" | 19 #include "net/http/http_request_headers.h" |
18 #include "net/http/http_request_info.h" | 20 #include "net/http/http_request_info.h" |
19 #include "net/http/http_response_body_drainer.h" | 21 #include "net/http/http_response_body_drainer.h" |
20 #include "net/http/http_response_headers.h" | 22 #include "net/http/http_response_headers.h" |
21 #include "net/http/http_status_code.h" | 23 #include "net/http/http_status_code.h" |
22 #include "net/http/http_stream_parser.h" | 24 #include "net/http/http_stream_parser.h" |
23 #include "net/socket/client_socket_handle.h" | 25 #include "net/socket/client_socket_handle.h" |
24 #include "net/websockets/websocket_basic_stream.h" | 26 #include "net/websockets/websocket_basic_stream.h" |
27 #include "net/websockets/websocket_extension_parser.h" | |
25 #include "net/websockets/websocket_handshake_constants.h" | 28 #include "net/websockets/websocket_handshake_constants.h" |
26 #include "net/websockets/websocket_handshake_handler.h" | 29 #include "net/websockets/websocket_handshake_handler.h" |
27 #include "net/websockets/websocket_stream.h" | 30 #include "net/websockets/websocket_stream.h" |
28 | 31 |
29 namespace net { | 32 namespace net { |
30 namespace { | 33 namespace { |
31 | 34 |
35 enum GetHeaderResult { | |
36 GET_HEADER_OK, | |
37 GET_HEADER_MISSING, | |
38 GET_HEADER_MULTIPLE, | |
39 }; | |
40 | |
41 std::string MissingHeaderMessage(const std::string& header_name) { | |
42 return std::string("'") + header_name + "' header is missing"; | |
43 } | |
44 | |
45 std::string MultipleHeaderValuesMessage(const std::string& header_name) { | |
46 return | |
47 std::string("'") + | |
48 header_name + | |
49 "' header must not appear more than once in a response"; | |
50 } | |
51 | |
32 std::string GenerateHandshakeChallenge() { | 52 std::string GenerateHandshakeChallenge() { |
33 std::string raw_challenge(websockets::kRawChallengeLength, '\0'); | 53 std::string raw_challenge(websockets::kRawChallengeLength, '\0'); |
34 crypto::RandBytes(string_as_array(&raw_challenge), raw_challenge.length()); | 54 crypto::RandBytes(string_as_array(&raw_challenge), raw_challenge.length()); |
35 std::string encoded_challenge; | 55 std::string encoded_challenge; |
36 base::Base64Encode(raw_challenge, &encoded_challenge); | 56 base::Base64Encode(raw_challenge, &encoded_challenge); |
37 return encoded_challenge; | 57 return encoded_challenge; |
38 } | 58 } |
39 | 59 |
40 void AddVectorHeaderIfNonEmpty(const char* name, | 60 void AddVectorHeaderIfNonEmpty(const char* name, |
41 const std::vector<std::string>& value, | 61 const std::vector<std::string>& value, |
42 HttpRequestHeaders* headers) { | 62 HttpRequestHeaders* headers) { |
43 if (value.empty()) | 63 if (value.empty()) |
44 return; | 64 return; |
45 headers->SetHeader(name, JoinString(value, ", ")); | 65 headers->SetHeader(name, JoinString(value, ", ")); |
46 } | 66 } |
47 | 67 |
48 // If |case_sensitive| is false, then |value| must be in lower-case. | 68 GetHeaderResult GetSingleHeaderValue(const HttpResponseHeaders* headers, |
49 bool ValidateSingleTokenHeader( | 69 const base::StringPiece& name, |
50 const scoped_refptr<HttpResponseHeaders>& headers, | 70 std::string* value) { |
51 const base::StringPiece& name, | |
52 const std::string& value, | |
53 bool case_sensitive) { | |
54 void* state = NULL; | 71 void* state = NULL; |
55 std::string token; | 72 size_t num_values = 0; |
56 int tokens = 0; | 73 std::string temp_value; |
57 bool has_value = false; | 74 while (headers->EnumerateHeader(&state, name, &temp_value)) { |
58 while (headers->EnumerateHeader(&state, name, &token)) { | 75 if (++num_values > 1) |
59 if (++tokens > 1) | 76 return GET_HEADER_MULTIPLE; |
60 return false; | 77 *value = temp_value; |
61 has_value = case_sensitive ? value == token | |
62 : LowerCaseEqualsASCII(token, value.c_str()); | |
63 } | 78 } |
64 return has_value; | 79 return num_values > 0 ? GET_HEADER_OK : GET_HEADER_MISSING; |
80 } | |
81 | |
82 bool ValidateHeaderHasSingleValue(GetHeaderResult result, | |
83 const std::string& header_name, | |
84 std::string* failure_message) { | |
85 if (result == GET_HEADER_MISSING) { | |
86 *failure_message = MissingHeaderMessage(header_name); | |
87 return false; | |
88 } | |
89 if (result == GET_HEADER_MULTIPLE) { | |
90 *failure_message = MultipleHeaderValuesMessage(header_name); | |
91 return false; | |
92 } | |
93 DCHECK_EQ(result, GET_HEADER_OK); | |
94 return true; | |
95 } | |
96 | |
97 bool ValidateUpgrade(const HttpResponseHeaders* headers, | |
98 std::string* failure_message) { | |
99 std::string value; | |
100 GetHeaderResult result = | |
101 GetSingleHeaderValue(headers, websockets::kUpgrade, &value); | |
102 if (!ValidateHeaderHasSingleValue(result, | |
103 websockets::kUpgrade, | |
104 failure_message)) { | |
105 return false; | |
106 } | |
107 | |
108 if (!LowerCaseEqualsASCII(value, websockets::kWebSocketLowercase)) { | |
109 *failure_message = | |
110 "'Upgrade' header value is not 'WebSocket': " + value; | |
111 return false; | |
112 } | |
113 return true; | |
114 } | |
115 | |
116 bool ValidateSecWebSocketAccept(const HttpResponseHeaders* headers, | |
117 const std::string& expected, | |
118 std::string* failure_message) { | |
119 std::string actual; | |
120 GetHeaderResult result = | |
121 GetSingleHeaderValue(headers, websockets::kSecWebSocketAccept, &actual); | |
122 if (!ValidateHeaderHasSingleValue(result, | |
123 websockets::kSecWebSocketAccept, | |
124 failure_message)) { | |
125 return false; | |
126 } | |
127 | |
128 if (expected != actual) { | |
129 *failure_message = "Incorrect 'Sec-WebSocket-Accept' header value"; | |
130 return false; | |
131 } | |
132 return true; | |
133 } | |
134 | |
135 bool ValidateConnection(const HttpResponseHeaders* headers, | |
136 std::string* failure_message) { | |
137 // Connection header is permitted to contain other tokens. | |
138 if (!headers->HasHeader(HttpRequestHeaders::kConnection)) { | |
139 *failure_message = MissingHeaderMessage(HttpRequestHeaders::kConnection); | |
140 return false; | |
141 } | |
142 if (!headers->HasHeaderValue(HttpRequestHeaders::kConnection, | |
143 websockets::kUpgrade)) { | |
144 *failure_message = "'Connection' header value must contain 'Upgrade'"; | |
145 return false; | |
146 } | |
147 return true; | |
65 } | 148 } |
66 | 149 |
67 bool ValidateSubProtocol( | 150 bool ValidateSubProtocol( |
68 const scoped_refptr<HttpResponseHeaders>& headers, | 151 const HttpResponseHeaders* headers, |
69 const std::vector<std::string>& requested_sub_protocols, | 152 const std::vector<std::string>& requested_sub_protocols, |
70 std::string* sub_protocol) { | 153 std::string* sub_protocol, |
154 std::string* failure_message) { | |
71 void* state = NULL; | 155 void* state = NULL; |
72 std::string token; | 156 std::string value; |
157 std::string last_value; | |
73 base::hash_set<std::string> requested_set(requested_sub_protocols.begin(), | 158 base::hash_set<std::string> requested_set(requested_sub_protocols.begin(), |
74 requested_sub_protocols.end()); | 159 requested_sub_protocols.end()); |
75 int accepted = 0; | 160 int count = 0; |
161 bool has_multiple_protocols = false; | |
162 bool has_invalid_protocol = false; | |
163 | |
76 while (headers->EnumerateHeader( | 164 while (headers->EnumerateHeader( |
77 &state, websockets::kSecWebSocketProtocol, &token)) { | 165 &state, websockets::kSecWebSocketProtocol, &value) && |
78 if (requested_set.count(token) == 0) | 166 !(has_multiple_protocols && has_invalid_protocol)) { |
tyoshino (SeeGerritForStatus)
2014/01/09 04:08:48
how about
- just breaking at each if-clause
- do E
yhirano
2014/01/09 05:24:51
I moved the EnumerateHeader call to the while body
| |
79 return false; | 167 if (requested_set.count(value) == 0) |
168 has_invalid_protocol = true; | |
169 if (++count > 1) | |
170 has_multiple_protocols = true; | |
171 last_value = value; | |
172 } | |
80 | 173 |
81 *sub_protocol = token; | 174 if (has_multiple_protocols) { |
82 // The server is only allowed to accept one protocol. | 175 *failure_message = |
83 if (++accepted > 1) | 176 MultipleHeaderValuesMessage(websockets::kSecWebSocketProtocol); |
84 return false; | 177 return false; |
178 } else if (count > 0 && requested_sub_protocols.size() == 0) { | |
179 *failure_message = | |
180 std::string("Response must not include 'Sec-WebSocket-Protocol' " | |
181 "header if not present in request: ") | |
182 + last_value; | |
183 return false; | |
184 } else if (has_invalid_protocol) { | |
185 *failure_message = | |
186 "'Sec-WebSocket-Protocol' header value '" + | |
187 last_value + | |
188 "' in response does not match any of sent values"; | |
189 return false; | |
190 } else if (requested_sub_protocols.size() > 0 && count == 0) { | |
191 *failure_message = | |
192 "Sent non-empty 'Sec-WebSocket-Protocol' header " | |
193 "but no response was received"; | |
194 return false; | |
85 } | 195 } |
86 // If the browser requested > 0 protocols, the server is required to accept | 196 *sub_protocol = last_value; |
87 // one. | 197 return true; |
88 return requested_set.empty() || accepted == 1; | |
89 } | 198 } |
90 | 199 |
91 bool ValidateExtensions(const scoped_refptr<HttpResponseHeaders>& headers, | 200 bool ValidateExtensions(const HttpResponseHeaders* headers, |
92 const std::vector<std::string>& requested_extensions, | 201 const std::vector<std::string>& requested_extensions, |
93 std::string* extensions) { | 202 std::string* extensions, |
203 std::string* failure_message) { | |
94 void* state = NULL; | 204 void* state = NULL; |
95 std::string token; | 205 std::string value; |
96 while (headers->EnumerateHeader( | 206 while (headers->EnumerateHeader( |
97 &state, websockets::kSecWebSocketExtensions, &token)) { | 207 &state, websockets::kSecWebSocketExtensions, &value)) { |
208 WebSocketExtensionParser parser; | |
209 parser.Parse(value); | |
210 if (parser.has_error()) { | |
211 // TODO(yhirano) Set appropriate failure message. | |
212 *failure_message = | |
213 "'Sec-WebSocket-Extensions' header value is " | |
214 "rejected by the parser: " + | |
215 value; | |
216 return false; | |
217 } | |
98 // TODO(ricea): Accept permessage-deflate with valid parameters. | 218 // TODO(ricea): Accept permessage-deflate with valid parameters. |
219 *failure_message = | |
220 "Found an unsupported extension '" + | |
221 parser.extension().name() + | |
222 "' in 'Sec-WebSocket-Extensions' header"; | |
99 return false; | 223 return false; |
100 } | 224 } |
101 return true; | 225 return true; |
102 } | 226 } |
103 | 227 |
104 } // namespace | 228 } // namespace |
105 | 229 |
106 WebSocketBasicHandshakeStream::WebSocketBasicHandshakeStream( | 230 WebSocketBasicHandshakeStream::WebSocketBasicHandshakeStream( |
107 scoped_ptr<ClientSocketHandle> connection, | 231 scoped_ptr<ClientSocketHandle> connection, |
108 bool using_proxy, | 232 bool using_proxy, |
(...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
260 state_.read_buf(), | 384 state_.read_buf(), |
261 sub_protocol_, | 385 sub_protocol_, |
262 extensions_)); | 386 extensions_)); |
263 } | 387 } |
264 | 388 |
265 void WebSocketBasicHandshakeStream::SetWebSocketKeyForTesting( | 389 void WebSocketBasicHandshakeStream::SetWebSocketKeyForTesting( |
266 const std::string& key) { | 390 const std::string& key) { |
267 handshake_challenge_for_testing_.reset(new std::string(key)); | 391 handshake_challenge_for_testing_.reset(new std::string(key)); |
268 } | 392 } |
269 | 393 |
394 std::string WebSocketBasicHandshakeStream::GetFailureMessage() const { | |
395 return failure_message_; | |
396 } | |
397 | |
270 void WebSocketBasicHandshakeStream::ReadResponseHeadersCallback( | 398 void WebSocketBasicHandshakeStream::ReadResponseHeadersCallback( |
271 const CompletionCallback& callback, | 399 const CompletionCallback& callback, |
272 int result) { | 400 int result) { |
273 if (result == OK) | 401 if (result == OK) |
274 result = ValidateResponse(); | 402 result = ValidateResponse(); |
275 callback.Run(result); | 403 callback.Run(result); |
276 } | 404 } |
277 | 405 |
278 int WebSocketBasicHandshakeStream::ValidateResponse() { | 406 int WebSocketBasicHandshakeStream::ValidateResponse() { |
279 DCHECK(http_response_info_); | 407 DCHECK(http_response_info_); |
280 const scoped_refptr<HttpResponseHeaders>& headers = | 408 const scoped_refptr<HttpResponseHeaders>& headers = |
281 http_response_info_->headers; | 409 http_response_info_->headers; |
282 | 410 |
283 switch (headers->response_code()) { | 411 switch (headers->response_code()) { |
284 case HTTP_SWITCHING_PROTOCOLS: | 412 case HTTP_SWITCHING_PROTOCOLS: |
285 return ValidateUpgradeResponse(headers); | 413 return ValidateUpgradeResponse(headers); |
286 | 414 |
287 // We need to pass these through for authentication to work. | 415 // We need to pass these through for authentication to work. |
288 case HTTP_UNAUTHORIZED: | 416 case HTTP_UNAUTHORIZED: |
289 case HTTP_PROXY_AUTHENTICATION_REQUIRED: | 417 case HTTP_PROXY_AUTHENTICATION_REQUIRED: |
290 return OK; | 418 return OK; |
291 | 419 |
292 // Other status codes are potentially risky (see the warnings in the | 420 // Other status codes are potentially risky (see the warnings in the |
293 // WHATWG WebSocket API spec) and so are dropped by default. | 421 // WHATWG WebSocket API spec) and so are dropped by default. |
294 default: | 422 default: |
423 failure_message_ = base::StringPrintf("Unexpected status code: %d", | |
424 headers->response_code()); | |
295 return ERR_INVALID_RESPONSE; | 425 return ERR_INVALID_RESPONSE; |
296 } | 426 } |
297 } | 427 } |
298 | 428 |
299 int WebSocketBasicHandshakeStream::ValidateUpgradeResponse( | 429 int WebSocketBasicHandshakeStream::ValidateUpgradeResponse( |
300 const scoped_refptr<HttpResponseHeaders>& headers) { | 430 const scoped_refptr<HttpResponseHeaders>& headers) { |
301 if (ValidateSingleTokenHeader(headers, | 431 if (ValidateUpgrade(headers.get(), &failure_message_) && |
302 websockets::kUpgrade, | 432 ValidateSecWebSocketAccept(headers.get(), |
303 websockets::kWebSocketLowercase, | 433 handshake_challenge_response_, |
304 false) && | 434 &failure_message_) && |
305 ValidateSingleTokenHeader(headers, | 435 ValidateConnection(headers.get(), &failure_message_) && |
306 websockets::kSecWebSocketAccept, | 436 ValidateSubProtocol(headers.get(), |
307 handshake_challenge_response_, | 437 requested_sub_protocols_, |
308 true) && | 438 &sub_protocol_, |
309 headers->HasHeaderValue(HttpRequestHeaders::kConnection, | 439 &failure_message_) && |
310 websockets::kUpgrade) && | 440 ValidateExtensions(headers.get(), |
311 ValidateSubProtocol(headers, requested_sub_protocols_, &sub_protocol_) && | 441 requested_extensions_, |
312 ValidateExtensions(headers, requested_extensions_, &extensions_)) { | 442 &extensions_, |
443 &failure_message_)) { | |
313 return OK; | 444 return OK; |
314 } | 445 } |
446 failure_message_ = "Error during WebSocket handshake: " + failure_message_; | |
315 return ERR_INVALID_RESPONSE; | 447 return ERR_INVALID_RESPONSE; |
316 } | 448 } |
317 | 449 |
318 } // namespace net | 450 } // namespace net |
OLD | NEW |