Index: net/websockets/websocket_basic_stream.cc |
diff --git a/net/websockets/websocket_basic_stream.cc b/net/websockets/websocket_basic_stream.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..e5f5a243ce950747f69ea82956c5ec78eb3f4f08 |
--- /dev/null |
+++ b/net/websockets/websocket_basic_stream.cc |
@@ -0,0 +1,488 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/websockets/websocket_basic_stream.h" |
+ |
+#include <algorithm> |
+#include <limits> |
+#include <string> |
+#include <vector> |
+ |
+#include "base/base64.h" |
+#include "base/basictypes.h" |
+#include "base/bind.h" |
+#include "base/rand_util.h" |
+#include "base/safe_numerics.h" |
+#include "base/sha1.h" |
+#include "base/strings/string_util.h" |
+#include "base/strings/stringprintf.h" |
+#include "googleurl/src/url_canon.h" |
+#include "net/base/io_buffer.h" |
+#include "net/base/load_flags.h" |
+#include "net/http/http_request_headers.h" |
+#include "net/http/http_request_info.h" |
+#include "net/http/http_response_headers.h" |
+#include "net/http/http_stream_parser.h" |
+#include "net/http/http_util.h" |
+#include "net/socket/client_socket_handle.h" |
+#include "net/websockets/websocket_errors.h" |
+#include "net/websockets/websocket_frame.h" |
+#include "net/websockets/websocket_frame_parser.h" |
+ |
+namespace net { |
+ |
+namespace { |
+ |
+// The number of bytes to attempt to read at a time. |
+// TODO(ricea): See if there is a better number. Should it start small, and get |
+// bigger if needed? |
+const int kReadAtATime = 32 * 1024; |
+ |
+// RFC6455 only requires HTTP/1.1 "or better" but in practice an HTTP version |
+// other than 1.1 should not occur in a WebSocket handshake. |
+const char kWebSocketUpgradeOkStatusLineStartsWith[] = "HTTP/1.1 101 "; |
+ |
+// The Sec-WebSockey-Key challenge is 16 random bytes, base64 encoded. |
+const size_t kRawChallengeLength = 16; |
+ |
+// TODO(ricea): Define all these constants in one central place |
tyoshino (SeeGerritForStatus)
2013/08/01 04:47:52
yes. you can split this into a cl adding a file co
|
+const char kSecWebSocketProtocol[] = "Sec-WebSocket-Protocol"; |
+const char kSecWebSocketExtensions[] = "Sec-WebSocket-Extensions"; |
+const char kSecWebSocketKey[] = "Sec-WebSocket-Key"; |
+const char kSecWebSocketAccept[] = "Sec-WebSocket-Accept"; |
+const char kUpgrade[] = "Upgrade"; |
+const char kConnection[] = "Connection"; |
+const char kWebSocketToken[] = "websocket"; |
+const char kWebSocketGuid[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; |
+ |
+inline bool CaseInsensitiveLessASCII(char lhs, char rhs) { |
+ return base::ToLowerASCII(lhs) < base::ToLowerASCII(rhs); |
+} |
+ |
+} // namespace |
+ |
+struct WebSocketBasicStream::HandshakeData { |
+ public: |
+ HandshakeData() : http_response_info(NULL) {} |
+ ~HandshakeData() {} |
+ |
+ // HTTP implementation, used for the handshake. |
+ scoped_ptr<HttpStreamParser> http_parser; |
+ |
+ // Only used during handshake |
+ scoped_ptr<HttpRequestInfo> http_request_info; |
+ |
+ // Owned by the caller of SendHandshakeRequest. |
+ HttpResponseInfo* http_response_info; |
+ |
+ // The expected value for the Sec-WebSocket-Accept header, extracted from the |
+ // request headers. |
+ std::string handshake_response; |
+ |
+ // The extensions that were requested. |
+ std::vector<std::string> requested_extensions; |
+ |
+ // The sub-protocols that were requested. |
+ std::vector<std::string> requested_sub_protocols; |
+ |
+ private: |
+ DISALLOW_COPY_AND_ASSIGN(HandshakeData); |
+}; |
+ |
+struct WebSocketBasicStream::ParseRequestHeadersArg { |
+ std::string key; |
+ std::vector<std::string>* tokens; |
+ bool operator<(const ParseRequestHeadersArg& rhs) const; |
+}; |
+ |
+WebSocketBasicStream::WebSocketBasicStream( |
+ scoped_ptr<ClientSocketHandle> connection) |
+ : read_buffer_(new IOBufferWithSize(kReadAtATime)), |
+ connection_(connection.Pass()) {} |
+ |
+WebSocketBasicStream::~WebSocketBasicStream() { |
+ connection_->socket()->Disconnect(); |
+} |
+ |
+int WebSocketBasicStream::ReadFrames( |
+ ScopedVector<WebSocketFrameChunk>* frame_chunks, |
+ const CompletionCallback& callback) { |
+ DCHECK(frame_chunks->empty()); |
+ // If there is data left over after parsing the HTTP headers, attempt to parse |
+ // it as WebSocket frames. |
+ if (http_read_buffer_) { |
+ DCHECK_GE(http_read_buffer_->offset(), 0); |
+ if (!parser_.Decode(http_read_buffer_->data(), |
+ http_read_buffer_->offset(), |
+ frame_chunks)) { |
+ http_read_buffer_ = NULL; |
+ return WebSocketErrorToNetError(parser_.websocket_error()); |
+ } |
+ http_read_buffer_ = NULL; |
+ } |
+ // Loop until we either have at least one chunk to return, or we get |
+ // ERR_IO_PENDING, or something goes wrong. |
+ while (frame_chunks->empty()) { |
+ // This use of base::Unretained() is safe because WebSocketChannel will |
+ // delete us before deleting frame_chunks. |
+ int result = |
+ connection_->socket()->Read(read_buffer_.get(), |
+ read_buffer_->size(), |
+ base::Bind(&WebSocketBasicStream::ReadDone, |
+ base::Unretained(this), |
+ base::Unretained(frame_chunks), |
+ callback)); |
+ if (result > 0) { |
+ if (!parser_.Decode(read_buffer_->data(), result, frame_chunks)) { |
+ return WebSocketErrorToNetError(parser_.websocket_error()); |
+ } |
+ } else if (result == 0 && frame_chunks->empty()) { |
+ return ERR_CONNECTION_CLOSED; |
+ } else { |
+ return result; |
+ } |
+ } |
+ return OK; |
+} |
+ |
+void WebSocketBasicStream::ReadDone( |
+ ScopedVector<WebSocketFrameChunk>* frame_chunks, |
+ const CompletionCallback& callback, |
+ int result) { |
+ if (result > 0) { |
+ if (parser_.Decode(read_buffer_->data(), result, frame_chunks)) { |
+ if (!frame_chunks->empty()) { |
+ callback.Run(OK); |
+ } else { |
+ result = ReadFrames(frame_chunks, callback); |
+ if (result == ERR_IO_PENDING) { |
+ // We will be called back again. |
+ return; |
+ } |
+ } |
+ } else { |
+ result = WebSocketErrorToNetError(parser_.websocket_error()); |
+ } |
+ } |
+ if (result == 0 && frame_chunks->empty()) { |
+ result = ERR_CONNECTION_CLOSED; |
+ } |
+ DCHECK_NE(ERR_IO_PENDING, result); |
+ callback.Run(result); |
+} |
+ |
+int WebSocketBasicStream::WriteFrames( |
+ ScopedVector<WebSocketFrameChunk>* frame_chunks, |
+ const CompletionCallback& callback) { |
+ // This function always concatenates all frames into a single buffer. |
+ // TODO(ricea): Investigate whether it would be better in some cases to |
+ // perform multiple writes with smaller buffers. |
+ // |
+ // First calculate the size of the buffer we need to allocate. |
+ typedef ScopedVector<WebSocketFrameChunk>::const_iterator Iterator; |
+ int total_size = 0; |
+ for (Iterator it = frame_chunks->begin(); it != frame_chunks->end(); ++it) { |
+ WebSocketFrameChunk* chunk = *it; |
+ DCHECK(chunk->header && chunk->final_chunk) |
+ << "Only complete frames are supported by WebSocketBasicStream"; |
+ // Force the masked bit on. |
+ chunk->header->masked = true; |
+ // We enforce flow control so the renderer should never be able to force us |
+ // to cache anywhere near 2GB of frames. |
+ int chunk_size = |
+ chunk->data->size() + GetWebSocketFrameHeaderSize(*(chunk->header)); |
+ CHECK_GE(std::numeric_limits<int>::max() - total_size, chunk_size) |
+ << "Aborting to prevent overflow"; |
+ total_size += chunk_size; |
+ } |
+ scoped_refptr<IOBufferWithSize> total(new IOBufferWithSize(total_size)); |
+ char* data = total->data(); |
+ int remaining_size = total_size; |
+ for (Iterator it = frame_chunks->begin(); it != frame_chunks->end(); ++it) { |
+ WebSocketFrameChunk* chunk = *it; |
+ WebSocketMaskingKey mask = GenerateWebSocketMaskingKey(); |
+ int result = WriteWebSocketFrameHeader( |
+ *(chunk->header), &mask, data, remaining_size); |
+ DCHECK(result != ERR_INVALID_ARGUMENT) |
+ << "WriteWebSocketFrameHeader() says that " << remaining_size |
+ << " is not enough to write the header in. This should not happen."; |
+ CHECK_GE(result, 0) << "Potentially security-critical check failed"; |
+ data += result; |
+ remaining_size -= result; |
+ const char* const frame_data = chunk->data->data(); |
+ const int frame_size = chunk->data->size(); |
+ CHECK_GE(remaining_size, frame_size); |
+ std::copy(frame_data, frame_data + frame_size, data); |
+ MaskWebSocketFramePayload(mask, 0, data, frame_size); |
+ data += frame_size; |
+ remaining_size -= frame_size; |
+ } |
+ DCHECK_EQ(0, remaining_size) << "Buffer size calculation was wrong; " |
+ << remaining_size << " bytes left over."; |
+ scoped_refptr<DrainableIOBuffer> drainable_buffer( |
+ new DrainableIOBuffer(total, total_size)); |
+ return WriteEverything(drainable_buffer, callback); |
+} |
+ |
+int WebSocketBasicStream::WriteEverything( |
+ const scoped_refptr<DrainableIOBuffer>& buffer, |
+ const CompletionCallback& callback) { |
+ while (buffer->BytesRemaining() > 0) { |
+ // The use of base::Unretained() here is safe because on destruction we |
+ // disconnect the socket, preventing any further callbacks. |
+ int result = connection_->socket() |
+ ->Write(buffer.get(), |
+ buffer->BytesRemaining(), |
+ base::Bind(&WebSocketBasicStream::WriteDone, |
+ base::Unretained(this), |
+ buffer, |
+ callback)); |
+ if (result > 0) { |
+ buffer->DidConsume(result); |
+ } else { |
+ return result; |
+ } |
+ } |
+ return OK; |
+} |
+ |
+void WebSocketBasicStream::WriteDone( |
+ const scoped_refptr<DrainableIOBuffer>& buffer, |
+ const CompletionCallback& callback, |
+ int result) { |
+ if (result > 0) { |
+ buffer->DidConsume(result); |
+ if (buffer->BytesRemaining() > 0) { |
+ int result = WriteEverything(buffer, callback); |
+ if (result != ERR_IO_PENDING) { |
+ callback.Run(result); |
+ } |
+ } |
+ } |
+} |
+ |
+void WebSocketBasicStream::Close() { connection_->socket()->Disconnect(); } |
+ |
+std::string WebSocketBasicStream::GetSubProtocol() const { |
+ return sub_protocol_; |
+} |
+ |
+std::string WebSocketBasicStream::GetExtensions() const { return extensions_; } |
+ |
+std::string GenerateHandshakeChallenge() { |
+ std::string raw_challenge = base::RandBytesAsString(kRawChallengeLength); |
+ std::string encoded_challenge; |
+ bool encode_success = base::Base64Encode(raw_challenge, &encoded_challenge); |
+ DCHECK(encode_success); |
+ return encoded_challenge; |
+} |
+ |
+// TODO(ricea): Factor this and the implementation in |
+// websocket_handshake_handler.cc (and maybe the one in net/server as well) out |
+// into a single utility class. |
+std::string GenerateHandshakeResponse(std::string challenge) { |
+ challenge += kWebSocketGuid; |
+ std::string hash = base::SHA1HashString(challenge); |
+ std::string websocket_accept; |
+ bool encode_success = base::Base64Encode(hash, &websocket_accept); |
+ DCHECK(encode_success); |
+ return websocket_accept; |
+} |
+ |
+int WebSocketBasicStream::SendHandshakeRequest( |
+ const GURL& url, |
+ const HttpRequestHeaders& headers, |
+ HttpResponseInfo* response_info, |
+ const CompletionCallback& callback) { |
+ DCHECK(!headers.HasHeader(kSecWebSocketKey)) |
+ << "The caller of SendHandshakeRequest included a Sec-WebSocket-Key " |
+ << "header. They are not supposed to do that."; |
+ http_read_buffer_ = new GrowableIOBuffer; |
+ scoped_ptr<HttpRequestInfo> info(new HttpRequestInfo); |
+ info->url = url; |
+ // TODO(ricea): WTF does using_proxy come from? |
+ bool using_proxy = false; |
+ // TODO(ricea): See comment below. |
+ info->method = using_proxy ? "CONNECT" : HttpRequestHeaders::kGetMethod; |
+ // TODO(ricea): Double-check these flags |
+ info->load_flags = LOAD_VERIFY_EV_CERT | LOAD_DISABLE_CACHE; |
+ info->motivation = HttpRequestInfo::NORMAL_MOTIVATION; |
+ bool enable_privacy_mode = true; |
+ // TODO(ricea): Somehow make this work |
+ // if (context_ && context_->network_delegate()) { |
+ // enable_privacy_mode = |
+ // context_->network_delegate()->CanEnablePrivacyMode(url_, url_); |
+ // } |
+ info->privacy_mode = |
+ enable_privacy_mode ? kPrivacyModeEnabled : kPrivacyModeDisabled; |
+ handshake_data_->http_request_info = info.Pass(); |
+ ParseRequestHeadersArg args[] = { |
+ {kSecWebSocketProtocol, &(handshake_data_->requested_sub_protocols)}, |
+ {kSecWebSocketExtensions, &(handshake_data_->requested_extensions)}, |
+ }; |
+ ParseRequestHeaders(headers, args, arraysize(args)); |
+ |
+ // TODO(ricea): Where is this supposed to come from? |
+ BoundNetLog net_log; |
+ |
+ handshake_data_->http_parser |
+ .reset(new HttpStreamParser(connection_.get(), |
+ handshake_data_->http_request_info.get(), |
+ http_read_buffer_.get(), |
+ net_log)); |
+ // Create a new URL which is identical except that the scheme is changed from |
+ // ws: or wss: to http: or https:. For some reason this takes 6 lines of |
+ // code. This is literally one of the most insane APIs I have ever used. |
+ std::string new_scheme = url.SchemeIsSecure() ? "https" : "http"; |
+ url_canon::Replacements<char> replacements; |
+ url_parse::Component comp; |
+ comp.len = base::checked_numeric_cast<int>(new_scheme.length()); |
+ replacements.SetScheme(new_scheme.c_str(), comp); |
+ GURL httpified_url = url.ReplaceComponents(replacements); |
+ // TODO(ricea): The proxy case. In this case we need to send two sets of |
+ // headers, eg. |
+ // |
+ // CONNECT www.google.com:80 HTTP/1.1 |
+ // Host: www.google.com:80 |
+ // Proxy-Authorization: basic aGVsbG86d29ybGQ |
+ // |
+ // GET /ws_endpoint?type=text HTTP/1.1 |
+ // Host: www.google.com:80 |
+ // Cookie: ... |
+ // |
+ // Or maybe we won't be called until the proxy tunnel has already been |
+ // established and we just send headers as normal. |
+ const std::string path = HttpUtil::PathForRequest(httpified_url); |
+ std::string request_line = |
+ base::StringPrintf("%s %s HTTP/1.1\r\n", |
+ handshake_data_->http_request_info->method.c_str(), |
+ path.c_str()); |
+ handshake_data_->http_response_info = response_info; |
+ |
+ // Create a new header object, so that we can add the Sec-WebSockey-Key |
+ // header. |
+ HttpRequestHeaders enriched_headers; |
+ enriched_headers.CopyFrom(headers); |
+ std::string handshake_challenge = GenerateHandshakeChallenge(); |
+ enriched_headers.SetHeader(kSecWebSocketKey, handshake_challenge); |
+ handshake_data_->handshake_response = |
+ GenerateHandshakeResponse(handshake_challenge); |
+ return handshake_data_->http_parser |
+ ->SendRequest(request_line, headers, response_info, callback); |
+} |
+ |
+int WebSocketBasicStream::ReadHandshakeResponse( |
+ const CompletionCallback& callback) { |
+ // TODO(ricea): Find a justification for this use of base::Unretained. |
+ int result = handshake_data_->http_parser->ReadResponseHeaders(base::Bind( |
+ &WebSocketBasicStream::HandshakeDone, base::Unretained(this), callback)); |
+ if (result == OK) { |
+ result = ProcessHandshake(); |
+ } |
+ return result; |
+} |
+ |
+bool WebSocketBasicStream::ParseRequestHeadersArg::operator<( |
+ const ParseRequestHeadersArg& rhs) const { |
+ return std::lexicographical_compare(key.begin(), |
+ key.end(), |
+ rhs.key.begin(), |
+ rhs.key.end(), |
+ CaseInsensitiveLessASCII); |
+} |
+ |
+void WebSocketBasicStream::ParseRequestHeaders( |
+ const HttpRequestHeaders& headers, |
+ ParseRequestHeadersArg args[], |
+ size_t count) { |
+ ParseRequestHeadersArg* begin = args; |
+ ParseRequestHeadersArg* end = args + count; |
+ std::sort(begin, end); // Sort so we can do binary search. |
+ HttpRequestHeaders::Iterator it(headers); |
+ while (it.GetNext()) { |
+ ParseRequestHeadersArg needle = {std::string(it.name()), NULL}; |
+ ParseRequestHeadersArg* answer = std::lower_bound(begin, end, needle); |
+ if (answer != end) { |
+ DCHECK(!HttpUtil::IsNonCoalescingHeader(it.name())); |
+ const std::string& value = it.value(); |
+ HttpUtil::ValuesIterator value_it(value.begin(), value.end(), ','); |
+ while (value_it.GetNext()) { |
+ answer->tokens->push_back(value_it.value()); |
+ } |
+ } |
+ } |
+} |
+ |
+void WebSocketBasicStream::HandshakeDone(const CompletionCallback& callback, |
+ int result) { |
+ if (result == OK) { |
+ result = ProcessHandshake(); |
+ } |
+ callback.Run(result); |
+} |
+ |
+bool WebSocketBasicStream::ValidateSingleTokenHeader( |
+ const scoped_refptr<HttpResponseHeaders>& headers, |
+ const base::StringPiece& name, |
+ const std::string& value) { |
+ void* state = NULL; |
+ std::string token; |
+ int tokens = 0; |
+ bool has_value = false; |
+ while (headers->EnumerateHeader(&state, name, &token)) { |
+ if (++tokens > 1) { |
+ return false; |
+ } |
+ has_value = LowerCaseEqualsASCII(value, token.c_str()); |
+ } |
+ return has_value; |
+} |
+ |
+bool WebSocketBasicStream::ValidateUpgradeResponseHeader( |
+ const scoped_refptr<HttpResponseHeaders>& headers) { |
+ return ValidateSingleTokenHeader(headers, kUpgrade, kWebSocketToken); |
+} |
+ |
+bool WebSocketBasicStream::ValidateSecWebSocketAcceptResponseHeader( |
+ const scoped_refptr<HttpResponseHeaders>& headers) { |
+ return ValidateSingleTokenHeader( |
+ headers, kSecWebSocketAccept, handshake_data_->handshake_response); |
+} |
+ |
+int WebSocketBasicStream::ProcessHandshake() { |
tyoshino (SeeGerritForStatus)
2013/08/01 04:47:52
consider splitting handshake processing code or st
|
+ DCHECK(handshake_data_); |
+ DCHECK(handshake_data_->http_request_info); |
+ DCHECK(handshake_data_->http_response_info); |
+ DCHECK(handshake_data_->http_response_info->headers); |
+ const scoped_refptr<HttpResponseHeaders>& headers = |
+ handshake_data_->http_response_info->headers; |
+ if (!StartsWithASCII(headers->GetStatusLine(), |
+ kWebSocketUpgradeOkStatusLineStartsWith, |
+ true)) { |
+ // TODO(ricea): Would a more specific error be better? |
+ return ERR_INVALID_RESPONSE; |
+ } |
+ // There must be an exact case-insensitive match for "Upgrade: websocket" |
+ // Look at the tokenised Upgrade: header, ensure it has exactly one token and |
+ // that token is "websocket" |
+ if (!ValidateUpgradeResponseHeader(headers)) { |
+ return ERR_INVALID_RESPONSE; |
+ } |
+ // The Connection header field must contain a an "upgrade" token. |
+ if (!headers->HasHeaderValue(HttpRequestHeaders::kConnection, kUpgrade)) { |
+ return ERR_INVALID_RESPONSE; |
+ } |
+ // Sec-WebSocket-Accept contains the correct challenge response. |
+ if (!ValidateSecWebSocketAcceptResponseHeader(headers)) { |
+ return ERR_INVALID_RESPONSE; |
+ } |
+ |
+ handshake_data_.reset(); |
+ if (http_read_buffer_->offset() == 0) { |
+ http_read_buffer_ = NULL; |
+ } |
+ return OK; |
+} |
+ |
+} // namespace net |