tuxbot-bot/venv/lib/python3.7/site-packages/websockets/handshake.py
2019-12-16 18:12:10 +01:00

153 lines
5 KiB
Python

"""
The :mod:`websockets.handshake` module deals with the WebSocket opening
handshake according to `section 4 of RFC 6455`_.
.. _section 4 of RFC 6455: http://tools.ietf.org/html/rfc6455#section-4
Functions defined in this module manipulate HTTP headers. The ``headers``
argument must implement ``get`` and ``__setitem__`` and ``get`` — a small
subset of the :class:`~collections.abc.MutableMapping` abstract base class.
Headers names and values are :class:`str` objects containing only ASCII
characters.
Some checks cannot be performed because they depend too much on the
context; instead, they're documented below.
To accept a connection, a server must:
- Read the request, check that the method is GET, and check the headers with
:func:`check_request`,
- Send a 101 response to the client with the headers created by
:func:`build_response` if the request is valid; otherwise, send an
appropriate HTTP error code.
To open a connection, a client must:
- Send a GET request to the server with the headers created by
:func:`build_request`,
- Read the response, check that the status code is 101, and check the headers
with :func:`check_response`.
"""
import base64
import binascii
import hashlib
import random
from .exceptions import InvalidHeaderValue, InvalidUpgrade
from .headers import parse_connection, parse_upgrade
__all__ = [
'build_request', 'check_request',
'build_response', 'check_response',
]
GUID = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'
def build_request(headers):
"""
Build a handshake request to send to the server.
Return the ``key`` which must be passed to :func:`check_response`.
"""
raw_key = bytes(random.getrandbits(8) for _ in range(16))
key = base64.b64encode(raw_key).decode()
headers['Upgrade'] = 'websocket'
headers['Connection'] = 'Upgrade'
headers['Sec-WebSocket-Key'] = key
headers['Sec-WebSocket-Version'] = '13'
return key
def check_request(headers):
"""
Check a handshake request received from the client.
If the handshake is valid, this function returns the ``key`` which must be
passed to :func:`build_response`.
Otherwise it raises an :exc:`~websockets.exceptions.InvalidHandshake`
exception and the server must return an error like 400 Bad Request.
This function doesn't verify that the request is an HTTP/1.1 or higher GET
request and doesn't perform Host and Origin checks. These controls are
usually performed earlier in the HTTP request handling code. They're the
responsibility of the caller.
"""
connection = parse_connection(headers.get('Connection', ''))
if not any(value.lower() == 'upgrade' for value in connection):
raise InvalidUpgrade('Connection', headers.get('Connection', ''))
upgrade = parse_upgrade(headers.get('Upgrade', ''))
# For compatibility with non-strict implementations, ignore case when
# checking the Upgrade header. It's supposed to be 'WebSocket'.
if not (len(upgrade) == 1 and upgrade[0].lower() == 'websocket'):
raise InvalidUpgrade('Upgrade', headers.get('Upgrade', ''))
key = headers.get('Sec-WebSocket-Key', '')
try:
raw_key = base64.b64decode(key.encode(), validate=True)
except binascii.Error:
raise InvalidHeaderValue('Sec-WebSocket-Key', key)
if len(raw_key) != 16:
raise InvalidHeaderValue('Sec-WebSocket-Key', key)
version = headers.get('Sec-WebSocket-Version', '')
if version != '13':
raise InvalidHeaderValue('Sec-WebSocket-Version', version)
return key
def build_response(headers, key):
"""
Build a handshake response to send to the client.
``key`` comes from :func:`check_request`.
"""
headers['Upgrade'] = 'websocket'
headers['Connection'] = 'Upgrade'
headers['Sec-WebSocket-Accept'] = accept(key)
def check_response(headers, key):
"""
Check a handshake response received from the server.
``key`` comes from :func:`build_request`.
If the handshake is valid, this function returns ``None``.
Otherwise it raises an :exc:`~websockets.exceptions.InvalidHandshake`
exception.
This function doesn't verify that the response is an HTTP/1.1 or higher
response with a 101 status code. These controls are the responsibility of
the caller.
"""
connection = parse_connection(headers.get('Connection', ''))
if not any(value.lower() == 'upgrade' for value in connection):
raise InvalidUpgrade('Connection', headers.get('Connection', ''))
upgrade = parse_upgrade(headers.get('Upgrade', ''))
# For compatibility with non-strict implementations, ignore case when
# checking the Upgrade header. It's supposed to be 'WebSocket'.
if not (len(upgrade) == 1 and upgrade[0].lower() == 'websocket'):
raise InvalidUpgrade('Upgrade', headers.get('Upgrade', ''))
if headers.get('Sec-WebSocket-Accept', '') != accept(key):
raise InvalidHeaderValue(
'Sec-WebSocket-Accept', headers.get('Sec-WebSocket-Accept', ''))
def accept(key):
sha1 = hashlib.sha1((key + GUID).encode()).digest()
return base64.b64encode(sha1).decode()