mirror of
https://github.com/fafhrd91/actix-web
synced 2024-11-28 10:02:38 +01:00
316 lines
10 KiB
Rust
316 lines
10 KiB
Rust
//! WebSocket protocol support.
|
|
//!
|
|
//! To setup a `WebSocket`, first do web socket handshake then on success
|
|
//! convert `Payload` into a `WsStream` stream and then use `WsWriter` to
|
|
//! communicate with the peer.
|
|
use std::io;
|
|
|
|
use derive_more::{Display, From};
|
|
use http::{header, Method, StatusCode};
|
|
|
|
use crate::error::ResponseError;
|
|
use crate::message::RequestHead;
|
|
use crate::response::{Response, ResponseBuilder};
|
|
|
|
mod codec;
|
|
mod frame;
|
|
mod mask;
|
|
mod proto;
|
|
mod transport;
|
|
|
|
pub use self::codec::{Codec, Frame, Message};
|
|
pub use self::frame::Parser;
|
|
pub use self::proto::{hash_key, CloseCode, CloseReason, OpCode};
|
|
pub use self::transport::Transport;
|
|
|
|
/// Websocket protocol errors
|
|
#[derive(Debug, Display, From)]
|
|
pub enum ProtocolError {
|
|
/// Received an unmasked frame from client
|
|
#[display(fmt = "Received an unmasked frame from client")]
|
|
UnmaskedFrame,
|
|
/// Received a masked frame from server
|
|
#[display(fmt = "Received a masked frame from server")]
|
|
MaskedFrame,
|
|
/// Encountered invalid opcode
|
|
#[display(fmt = "Invalid opcode: {}", _0)]
|
|
InvalidOpcode(u8),
|
|
/// Invalid control frame length
|
|
#[display(fmt = "Invalid control frame length: {}", _0)]
|
|
InvalidLength(usize),
|
|
/// Bad web socket op code
|
|
#[display(fmt = "Bad web socket op code")]
|
|
BadOpCode,
|
|
/// A payload reached size limit.
|
|
#[display(fmt = "A payload reached size limit.")]
|
|
Overflow,
|
|
/// Continuation is not supported
|
|
#[display(fmt = "Continuation is not supported.")]
|
|
NoContinuation,
|
|
/// Bad utf-8 encoding
|
|
#[display(fmt = "Bad utf-8 encoding.")]
|
|
BadEncoding,
|
|
/// Io error
|
|
#[display(fmt = "io error: {}", _0)]
|
|
Io(io::Error),
|
|
}
|
|
|
|
impl ResponseError for ProtocolError {}
|
|
|
|
/// Websocket handshake errors
|
|
#[derive(PartialEq, Debug, Display)]
|
|
pub enum HandshakeError {
|
|
/// Only get method is allowed
|
|
#[display(fmt = "Method not allowed")]
|
|
GetMethodRequired,
|
|
/// Upgrade header if not set to websocket
|
|
#[display(fmt = "Websocket upgrade is expected")]
|
|
NoWebsocketUpgrade,
|
|
/// Connection header is not set to upgrade
|
|
#[display(fmt = "Connection upgrade is expected")]
|
|
NoConnectionUpgrade,
|
|
/// Websocket version header is not set
|
|
#[display(fmt = "Websocket version header is required")]
|
|
NoVersionHeader,
|
|
/// Unsupported websocket version
|
|
#[display(fmt = "Unsupported version")]
|
|
UnsupportedVersion,
|
|
/// Websocket key is not set or wrong
|
|
#[display(fmt = "Unknown websocket key")]
|
|
BadWebsocketKey,
|
|
}
|
|
|
|
impl ResponseError for HandshakeError {
|
|
fn error_response(&self) -> Response {
|
|
match *self {
|
|
HandshakeError::GetMethodRequired => Response::MethodNotAllowed()
|
|
.header(header::ALLOW, "GET")
|
|
.finish(),
|
|
HandshakeError::NoWebsocketUpgrade => Response::BadRequest()
|
|
.reason("No WebSocket UPGRADE header found")
|
|
.finish(),
|
|
HandshakeError::NoConnectionUpgrade => Response::BadRequest()
|
|
.reason("No CONNECTION upgrade")
|
|
.finish(),
|
|
HandshakeError::NoVersionHeader => Response::BadRequest()
|
|
.reason("Websocket version header is required")
|
|
.finish(),
|
|
HandshakeError::UnsupportedVersion => Response::BadRequest()
|
|
.reason("Unsupported version")
|
|
.finish(),
|
|
HandshakeError::BadWebsocketKey => {
|
|
Response::BadRequest().reason("Handshake error").finish()
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Verify `WebSocket` handshake request and create handshake reponse.
|
|
// /// `protocols` is a sequence of known protocols. On successful handshake,
|
|
// /// the returned response headers contain the first protocol in this list
|
|
// /// which the server also knows.
|
|
pub fn handshake(req: &RequestHead) -> Result<ResponseBuilder, HandshakeError> {
|
|
verify_handshake(req)?;
|
|
Ok(handshake_response(req))
|
|
}
|
|
|
|
/// Verify `WebSocket` handshake request.
|
|
// /// `protocols` is a sequence of known protocols. On successful handshake,
|
|
// /// the returned response headers contain the first protocol in this list
|
|
// /// which the server also knows.
|
|
pub fn verify_handshake(req: &RequestHead) -> Result<(), HandshakeError> {
|
|
// WebSocket accepts only GET
|
|
if req.method != Method::GET {
|
|
return Err(HandshakeError::GetMethodRequired);
|
|
}
|
|
|
|
// Check for "UPGRADE" to websocket header
|
|
let has_hdr = if let Some(hdr) = req.headers().get(header::UPGRADE) {
|
|
if let Ok(s) = hdr.to_str() {
|
|
s.to_ascii_lowercase().contains("websocket")
|
|
} else {
|
|
false
|
|
}
|
|
} else {
|
|
false
|
|
};
|
|
if !has_hdr {
|
|
return Err(HandshakeError::NoWebsocketUpgrade);
|
|
}
|
|
|
|
// Upgrade connection
|
|
if !req.upgrade() {
|
|
return Err(HandshakeError::NoConnectionUpgrade);
|
|
}
|
|
|
|
// check supported version
|
|
if !req.headers().contains_key(header::SEC_WEBSOCKET_VERSION) {
|
|
return Err(HandshakeError::NoVersionHeader);
|
|
}
|
|
let supported_ver = {
|
|
if let Some(hdr) = req.headers().get(header::SEC_WEBSOCKET_VERSION) {
|
|
hdr == "13" || hdr == "8" || hdr == "7"
|
|
} else {
|
|
false
|
|
}
|
|
};
|
|
if !supported_ver {
|
|
return Err(HandshakeError::UnsupportedVersion);
|
|
}
|
|
|
|
// check client handshake for validity
|
|
if !req.headers().contains_key(header::SEC_WEBSOCKET_KEY) {
|
|
return Err(HandshakeError::BadWebsocketKey);
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
/// Create websocket's handshake response
|
|
///
|
|
/// This function returns handshake `Response`, ready to send to peer.
|
|
pub fn handshake_response(req: &RequestHead) -> ResponseBuilder {
|
|
let key = {
|
|
let key = req.headers().get(header::SEC_WEBSOCKET_KEY).unwrap();
|
|
proto::hash_key(key.as_ref())
|
|
};
|
|
|
|
Response::build(StatusCode::SWITCHING_PROTOCOLS)
|
|
.upgrade("websocket")
|
|
.header(header::TRANSFER_ENCODING, "chunked")
|
|
.header(header::SEC_WEBSOCKET_ACCEPT, key.as_str())
|
|
.take()
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use crate::test::TestRequest;
|
|
use http::{header, Method};
|
|
|
|
#[test]
|
|
fn test_handshake() {
|
|
let req = TestRequest::default().method(Method::POST).finish();
|
|
assert_eq!(
|
|
HandshakeError::GetMethodRequired,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default().finish();
|
|
assert_eq!(
|
|
HandshakeError::NoWebsocketUpgrade,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(header::UPGRADE, header::HeaderValue::from_static("test"))
|
|
.finish();
|
|
assert_eq!(
|
|
HandshakeError::NoWebsocketUpgrade,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(
|
|
header::UPGRADE,
|
|
header::HeaderValue::from_static("websocket"),
|
|
)
|
|
.finish();
|
|
assert_eq!(
|
|
HandshakeError::NoConnectionUpgrade,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(
|
|
header::UPGRADE,
|
|
header::HeaderValue::from_static("websocket"),
|
|
)
|
|
.header(
|
|
header::CONNECTION,
|
|
header::HeaderValue::from_static("upgrade"),
|
|
)
|
|
.finish();
|
|
assert_eq!(
|
|
HandshakeError::NoVersionHeader,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(
|
|
header::UPGRADE,
|
|
header::HeaderValue::from_static("websocket"),
|
|
)
|
|
.header(
|
|
header::CONNECTION,
|
|
header::HeaderValue::from_static("upgrade"),
|
|
)
|
|
.header(
|
|
header::SEC_WEBSOCKET_VERSION,
|
|
header::HeaderValue::from_static("5"),
|
|
)
|
|
.finish();
|
|
assert_eq!(
|
|
HandshakeError::UnsupportedVersion,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(
|
|
header::UPGRADE,
|
|
header::HeaderValue::from_static("websocket"),
|
|
)
|
|
.header(
|
|
header::CONNECTION,
|
|
header::HeaderValue::from_static("upgrade"),
|
|
)
|
|
.header(
|
|
header::SEC_WEBSOCKET_VERSION,
|
|
header::HeaderValue::from_static("13"),
|
|
)
|
|
.finish();
|
|
assert_eq!(
|
|
HandshakeError::BadWebsocketKey,
|
|
verify_handshake(req.head()).err().unwrap()
|
|
);
|
|
|
|
let req = TestRequest::default()
|
|
.header(
|
|
header::UPGRADE,
|
|
header::HeaderValue::from_static("websocket"),
|
|
)
|
|
.header(
|
|
header::CONNECTION,
|
|
header::HeaderValue::from_static("upgrade"),
|
|
)
|
|
.header(
|
|
header::SEC_WEBSOCKET_VERSION,
|
|
header::HeaderValue::from_static("13"),
|
|
)
|
|
.header(
|
|
header::SEC_WEBSOCKET_KEY,
|
|
header::HeaderValue::from_static("13"),
|
|
)
|
|
.finish();
|
|
assert_eq!(
|
|
StatusCode::SWITCHING_PROTOCOLS,
|
|
handshake_response(req.head()).finish().status()
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_wserror_http_response() {
|
|
let resp: Response = HandshakeError::GetMethodRequired.error_response();
|
|
assert_eq!(resp.status(), StatusCode::METHOD_NOT_ALLOWED);
|
|
let resp: Response = HandshakeError::NoWebsocketUpgrade.error_response();
|
|
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
|
|
let resp: Response = HandshakeError::NoConnectionUpgrade.error_response();
|
|
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
|
|
let resp: Response = HandshakeError::NoVersionHeader.error_response();
|
|
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
|
|
let resp: Response = HandshakeError::UnsupportedVersion.error_response();
|
|
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
|
|
let resp: Response = HandshakeError::BadWebsocketKey.error_response();
|
|
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
|
|
}
|
|
}
|