| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106 |
- // Copyright 2013 Gary Burd. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- package websocket
- import (
- "bufio"
- "errors"
- "net"
- "net/http"
- )
- // HandshakeError describes an error with the handshake from the peer.
- type HandshakeError struct {
- Err string
- }
- func (e HandshakeError) Error() string { return e.Err }
- // Upgrade upgrades the HTTP server connection to the WebSocket protocol.
- //
- // Upgrade returns a HandshakeError if the request is not a WebSocket
- // handshake. Applications should handle errors of this type by replying to the
- // client with an HTTP response.
- //
- // The application is responsible for checking the request origin before
- // calling Upgrade. An example implementation of the same origin policy is:
- //
- // if req.Header.Get("Origin") != "http://"+req.Host {
- // http.Error(w, "Origin not allowed", 403)
- // return
- // }
- //
- // Use the responseHeader to specify cookies (Set-Cookie) and the subprotocol
- // (Sec-WebSocket-Protocol).
- func Upgrade(w http.ResponseWriter, r *http.Request, responseHeader http.Header, readBufSize, writeBufSize int) (*Conn, error) {
- if values := r.Header["Sec-Websocket-Version"]; len(values) == 0 || values[0] != "13" {
- return nil, HandshakeError{"websocket: version != 13"}
- }
- if !tokenListContainsValue(r.Header, "Connection", "upgrade") {
- return nil, HandshakeError{"websocket: connection header != upgrade"}
- }
- if !tokenListContainsValue(r.Header, "Upgrade", "websocket") {
- return nil, HandshakeError{"websocket: upgrade != websocket"}
- }
- var challengeKey string
- values := r.Header["Sec-Websocket-Key"]
- if len(values) == 0 || values[0] == "" {
- return nil, HandshakeError{"websocket: key missing or blank"}
- }
- challengeKey = values[0]
- var (
- netConn net.Conn
- br *bufio.Reader
- err error
- )
- h, ok := w.(http.Hijacker)
- if !ok {
- return nil, errors.New("websocket: response does not implement http.Hijacker")
- }
- var rw *bufio.ReadWriter
- netConn, rw, err = h.Hijack()
- br = rw.Reader
- if br.Buffered() > 0 {
- netConn.Close()
- return nil, errors.New("websocket: client sent data before handshake is complete")
- }
- c := newConn(netConn, true, readBufSize, writeBufSize)
- p := c.writeBuf[:0]
- p = append(p, "HTTP/1.1 101 Switching Protocols\r\nUpgrade: websocket\r\nConnection: Upgrade\r\nSec-WebSocket-Accept: "...)
- p = append(p, computeAcceptKey(challengeKey)...)
- p = append(p, "\r\n"...)
- for k, vs := range responseHeader {
- for _, v := range vs {
- p = append(p, k...)
- p = append(p, ": "...)
- for i := 0; i < len(v); i++ {
- b := v[i]
- if b <= 31 {
- // prevent response splitting.
- b = ' '
- }
- p = append(p, b)
- }
- p = append(p, "\r\n"...)
- }
- }
- p = append(p, "\r\n"...)
- if _, err = netConn.Write(p); err != nil {
- netConn.Close()
- return nil, err
- }
- return c, nil
- }
|