server.go 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298
  1. // Copyright 2013 The Gorilla WebSocket Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package websocket
  5. import (
  6. "bufio"
  7. "errors"
  8. "net"
  9. "net/http"
  10. "net/url"
  11. "strings"
  12. "time"
  13. )
  14. // HandshakeError describes an error with the handshake from the peer.
  15. type HandshakeError struct {
  16. message string
  17. }
  18. func (e HandshakeError) Error() string { return e.message }
  19. // Upgrader specifies parameters for upgrading an HTTP connection to a
  20. // WebSocket connection.
  21. type Upgrader struct {
  22. // HandshakeTimeout specifies the duration for the handshake to complete.
  23. HandshakeTimeout time.Duration
  24. // ReadBufferSize and WriteBufferSize specify I/O buffer sizes. If a buffer
  25. // size is zero, then buffers allocated by the HTTP server are used. The
  26. // I/O buffer sizes do not limit the size of the messages that can be sent
  27. // or received.
  28. ReadBufferSize, WriteBufferSize int
  29. // Subprotocols specifies the server's supported protocols in order of
  30. // preference. If this field is set, then the Upgrade method negotiates a
  31. // subprotocol by selecting the first match in this list with a protocol
  32. // requested by the client.
  33. Subprotocols []string
  34. // Error specifies the function for generating HTTP error responses. If Error
  35. // is nil, then http.Error is used to generate the HTTP response.
  36. Error func(w http.ResponseWriter, r *http.Request, status int, reason error)
  37. // CheckOrigin returns true if the request Origin header is acceptable. If
  38. // CheckOrigin is nil, then a safe default is used: return false if the
  39. // Origin request header is present and the origin host is not equal to
  40. // request Host header.
  41. //
  42. // A CheckOrigin function should carefully validate the request origin to
  43. // prevent cross-site request forgery.
  44. CheckOrigin func(r *http.Request) bool
  45. // EnableCompression specify if the server should attempt to negotiate per
  46. // message compression (RFC 7692). Setting this value to true does not
  47. // guarantee that compression will be supported. Currently only "no context
  48. // takeover" modes are supported.
  49. EnableCompression bool
  50. }
  51. func (u *Upgrader) returnError(w http.ResponseWriter, r *http.Request, status int, reason string) (*Conn, error) {
  52. err := HandshakeError{reason}
  53. if u.Error != nil {
  54. u.Error(w, r, status, err)
  55. } else {
  56. w.Header().Set("Sec-Websocket-Version", "13")
  57. http.Error(w, http.StatusText(status), status)
  58. }
  59. return nil, err
  60. }
  61. // checkSameOrigin returns true if the origin is not set or is equal to the request host.
  62. func checkSameOrigin(r *http.Request) bool {
  63. origin := r.Header["Origin"]
  64. if len(origin) == 0 {
  65. return true
  66. }
  67. u, err := url.Parse(origin[0])
  68. if err != nil {
  69. return false
  70. }
  71. return equalASCIIFold(u.Host, r.Host)
  72. }
  73. func (u *Upgrader) selectSubprotocol(r *http.Request, responseHeader http.Header) string {
  74. if u.Subprotocols != nil {
  75. clientProtocols := Subprotocols(r)
  76. for _, serverProtocol := range u.Subprotocols {
  77. for _, clientProtocol := range clientProtocols {
  78. if clientProtocol == serverProtocol {
  79. return clientProtocol
  80. }
  81. }
  82. }
  83. } else if responseHeader != nil {
  84. return responseHeader.Get("Sec-Websocket-Protocol")
  85. }
  86. return ""
  87. }
  88. // Upgrade upgrades the HTTP server connection to the WebSocket protocol.
  89. //
  90. // The responseHeader is included in the response to the client's upgrade
  91. // request. Use the responseHeader to specify cookies (Set-Cookie) and the
  92. // application negotiated subprotocol (Sec-Websocket-Protocol).
  93. //
  94. // If the upgrade fails, then Upgrade replies to the client with an HTTP error
  95. // response.
  96. func (u *Upgrader) Upgrade(w http.ResponseWriter, r *http.Request, responseHeader http.Header) (*Conn, error) {
  97. const badHandshake = "websocket: the client is not using the websocket protocol: "
  98. if !tokenListContainsValue(r.Header, "Connection", "upgrade") {
  99. return u.returnError(w, r, http.StatusBadRequest, badHandshake+"'upgrade' token not found in 'Connection' header")
  100. }
  101. if !tokenListContainsValue(r.Header, "Upgrade", "websocket") {
  102. return u.returnError(w, r, http.StatusBadRequest, badHandshake+"'websocket' token not found in 'Upgrade' header")
  103. }
  104. if r.Method != "GET" {
  105. return u.returnError(w, r, http.StatusMethodNotAllowed, badHandshake+"request method is not GET")
  106. }
  107. if !tokenListContainsValue(r.Header, "Sec-Websocket-Version", "13") {
  108. return u.returnError(w, r, http.StatusBadRequest, "websocket: unsupported version: 13 not found in 'Sec-Websocket-Version' header")
  109. }
  110. if _, ok := responseHeader["Sec-Websocket-Extensions"]; ok {
  111. return u.returnError(w, r, http.StatusInternalServerError, "websocket: application specific 'Sec-Websocket-Extensions' headers are unsupported")
  112. }
  113. checkOrigin := u.CheckOrigin
  114. if checkOrigin == nil {
  115. checkOrigin = checkSameOrigin
  116. }
  117. if !checkOrigin(r) {
  118. return u.returnError(w, r, http.StatusForbidden, "websocket: request origin not allowed by Upgrader.CheckOrigin")
  119. }
  120. challengeKey := r.Header.Get("Sec-Websocket-Key")
  121. if challengeKey == "" {
  122. return u.returnError(w, r, http.StatusBadRequest, "websocket: not a websocket handshake: `Sec-Websocket-Key' header is missing or blank")
  123. }
  124. subprotocol := u.selectSubprotocol(r, responseHeader)
  125. // Negotiate PMCE
  126. var compress bool
  127. if u.EnableCompression {
  128. for _, ext := range parseExtensions(r.Header) {
  129. if ext[""] != "permessage-deflate" {
  130. continue
  131. }
  132. compress = true
  133. break
  134. }
  135. }
  136. var (
  137. netConn net.Conn
  138. err error
  139. )
  140. h, ok := w.(http.Hijacker)
  141. if !ok {
  142. return u.returnError(w, r, http.StatusInternalServerError, "websocket: response does not implement http.Hijacker")
  143. }
  144. var brw *bufio.ReadWriter
  145. netConn, brw, err = h.Hijack()
  146. if err != nil {
  147. return u.returnError(w, r, http.StatusInternalServerError, err.Error())
  148. }
  149. if brw.Reader.Buffered() > 0 {
  150. netConn.Close()
  151. return nil, errors.New("websocket: client sent data before handshake is complete")
  152. }
  153. c := newConnBRW(netConn, true, u.ReadBufferSize, u.WriteBufferSize, brw)
  154. c.subprotocol = subprotocol
  155. if compress {
  156. c.newCompressionWriter = compressNoContextTakeover
  157. c.newDecompressionReader = decompressNoContextTakeover
  158. }
  159. p := c.writeBuf[:0]
  160. p = append(p, "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Accept: "...)
  161. p = append(p, computeAcceptKey(challengeKey)...)
  162. p = append(p, "\r\n"...)
  163. if c.subprotocol != "" {
  164. p = append(p, "Sec-Websocket-Protocol: "...)
  165. p = append(p, c.subprotocol...)
  166. p = append(p, "\r\n"...)
  167. }
  168. if compress {
  169. p = append(p, "Sec-Websocket-Extensions: permessage-deflate; server_no_context_takeover; client_no_context_takeover\r\n"...)
  170. }
  171. for k, vs := range responseHeader {
  172. if k == "Sec-Websocket-Protocol" {
  173. continue
  174. }
  175. for _, v := range vs {
  176. p = append(p, k...)
  177. p = append(p, ": "...)
  178. for i := 0; i < len(v); i++ {
  179. b := v[i]
  180. if b <= 31 {
  181. // prevent response splitting.
  182. b = ' '
  183. }
  184. p = append(p, b)
  185. }
  186. p = append(p, "\r\n"...)
  187. }
  188. }
  189. p = append(p, "\r\n"...)
  190. // Clear deadlines set by HTTP server.
  191. netConn.SetDeadline(time.Time{})
  192. if u.HandshakeTimeout > 0 {
  193. netConn.SetWriteDeadline(time.Now().Add(u.HandshakeTimeout))
  194. }
  195. if _, err = netConn.Write(p); err != nil {
  196. netConn.Close()
  197. return nil, err
  198. }
  199. if u.HandshakeTimeout > 0 {
  200. netConn.SetWriteDeadline(time.Time{})
  201. }
  202. return c, nil
  203. }
  204. // Upgrade upgrades the HTTP server connection to the WebSocket protocol.
  205. //
  206. // Deprecated: Use websocket.Upgrader instead.
  207. //
  208. // Upgrade does not perform origin checking. The application is responsible for
  209. // checking the Origin header before calling Upgrade. An example implementation
  210. // of the same origin policy check is:
  211. //
  212. // if req.Header.Get("Origin") != "http://"+req.Host {
  213. // http.Error(w, "Origin not allowed", http.StatusForbidden)
  214. // return
  215. // }
  216. //
  217. // If the endpoint supports subprotocols, then the application is responsible
  218. // for negotiating the protocol used on the connection. Use the Subprotocols()
  219. // function to get the subprotocols requested by the client. Use the
  220. // Sec-Websocket-Protocol response header to specify the subprotocol selected
  221. // by the application.
  222. //
  223. // The responseHeader is included in the response to the client's upgrade
  224. // request. Use the responseHeader to specify cookies (Set-Cookie) and the
  225. // negotiated subprotocol (Sec-Websocket-Protocol).
  226. //
  227. // The connection buffers IO to the underlying network connection. The
  228. // readBufSize and writeBufSize parameters specify the size of the buffers to
  229. // use. Messages can be larger than the buffers.
  230. //
  231. // If the request is not a valid WebSocket handshake, then Upgrade returns an
  232. // error of type HandshakeError. Applications should handle this error by
  233. // replying to the client with an HTTP error response.
  234. func Upgrade(w http.ResponseWriter, r *http.Request, responseHeader http.Header, readBufSize, writeBufSize int) (*Conn, error) {
  235. u := Upgrader{ReadBufferSize: readBufSize, WriteBufferSize: writeBufSize}
  236. u.Error = func(w http.ResponseWriter, r *http.Request, status int, reason error) {
  237. // don't return errors to maintain backwards compatibility
  238. }
  239. u.CheckOrigin = func(r *http.Request) bool {
  240. // allow all connections by default
  241. return true
  242. }
  243. return u.Upgrade(w, r, responseHeader)
  244. }
  245. // Subprotocols returns the subprotocols requested by the client in the
  246. // Sec-Websocket-Protocol header.
  247. func Subprotocols(r *http.Request) []string {
  248. h := strings.TrimSpace(r.Header.Get("Sec-Websocket-Protocol"))
  249. if h == "" {
  250. return nil
  251. }
  252. protocols := strings.Split(h, ",")
  253. for i := range protocols {
  254. protocols[i] = strings.TrimSpace(protocols[i])
  255. }
  256. return protocols
  257. }
  258. // IsWebSocketUpgrade returns true if the client requested upgrade to the
  259. // WebSocket protocol.
  260. func IsWebSocketUpgrade(r *http.Request) bool {
  261. return tokenListContainsValue(r.Header, "Connection", "upgrade") &&
  262. tokenListContainsValue(r.Header, "Upgrade", "websocket")
  263. }