2015-04-10 02:35:40 +00:00
|
|
|
import os
|
|
|
|
import struct
|
|
|
|
import io
|
2015-09-20 22:44:17 +00:00
|
|
|
|
2015-08-10 18:36:47 +00:00
|
|
|
from netlib import tcp
|
2016-06-02 00:31:41 +00:00
|
|
|
from netlib import strutils
|
2015-08-10 18:36:47 +00:00
|
|
|
from netlib import utils
|
2016-05-31 07:32:08 +00:00
|
|
|
from netlib import human
|
2016-08-18 15:31:43 +00:00
|
|
|
from .masker import Masker
|
2015-04-17 01:57:39 +00:00
|
|
|
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2015-04-21 11:13:42 +00:00
|
|
|
MAX_16_BIT_INT = (1 << 16)
|
|
|
|
MAX_64_BIT_INT = (1 << 64)
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2016-05-28 20:17:02 +00:00
|
|
|
DEFAULT = object()
|
2015-09-21 20:49:39 +00:00
|
|
|
|
2016-08-18 15:31:43 +00:00
|
|
|
# RFC 6455, Section 5.2 - Base Framing Protocol
|
2015-04-29 21:04:22 +00:00
|
|
|
OPCODE = utils.BiDi(
|
2015-05-27 09:18:54 +00:00
|
|
|
CONTINUE=0x00,
|
|
|
|
TEXT=0x01,
|
|
|
|
BINARY=0x02,
|
|
|
|
CLOSE=0x08,
|
|
|
|
PING=0x09,
|
|
|
|
PONG=0x0a
|
2015-04-29 21:04:22 +00:00
|
|
|
)
|
2015-04-20 05:18:30 +00:00
|
|
|
|
2016-08-18 15:31:43 +00:00
|
|
|
# RFC 6455, Section 7.4.1 - Defined Status Codes
|
|
|
|
CLOSE_REASON = utils.BiDi(
|
|
|
|
NORMAL_CLOSURE=1000,
|
|
|
|
GOING_AWAY=1001,
|
|
|
|
PROTOCOL_ERROR=1002,
|
|
|
|
UNSUPPORTED_DATA=1003,
|
|
|
|
RESERVED=1004,
|
|
|
|
RESERVED_NO_STATUS=1005,
|
|
|
|
RESERVED_ABNORMAL_CLOSURE=1006,
|
|
|
|
INVALID_PAYLOAD_DATA=1007,
|
|
|
|
POLICY_VIOLATION=1008,
|
|
|
|
MESSAGE_TOO_BIG=1009,
|
|
|
|
MANDATORY_EXTENSION=1010,
|
|
|
|
INTERNAL_ERROR=1011,
|
|
|
|
RESERVED_TLS_HANDHSAKE_FAILED=1015,
|
|
|
|
)
|
|
|
|
|
2015-08-10 18:44:36 +00:00
|
|
|
|
2016-10-17 04:29:45 +00:00
|
|
|
class FrameHeader:
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2015-04-24 03:09:21 +00:00
|
|
|
def __init__(
|
|
|
|
self,
|
2015-05-27 09:18:54 +00:00
|
|
|
opcode=OPCODE.TEXT,
|
|
|
|
payload_length=0,
|
|
|
|
fin=False,
|
|
|
|
rsv1=False,
|
|
|
|
rsv2=False,
|
|
|
|
rsv3=False,
|
2015-09-21 20:49:39 +00:00
|
|
|
masking_key=DEFAULT,
|
|
|
|
mask=DEFAULT,
|
|
|
|
length_code=DEFAULT
|
2015-04-24 03:09:21 +00:00
|
|
|
):
|
2015-04-24 03:23:00 +00:00
|
|
|
if not 0 <= opcode < 2 ** 4:
|
|
|
|
raise ValueError("opcode must be 0-16")
|
2015-04-24 03:09:21 +00:00
|
|
|
self.opcode = opcode
|
|
|
|
self.payload_length = payload_length
|
|
|
|
self.fin = fin
|
|
|
|
self.rsv1 = rsv1
|
|
|
|
self.rsv2 = rsv2
|
|
|
|
self.rsv3 = rsv3
|
2015-04-24 03:42:31 +00:00
|
|
|
|
2015-09-21 20:49:39 +00:00
|
|
|
if length_code is DEFAULT:
|
2015-07-08 07:34:10 +00:00
|
|
|
self.length_code = self._make_length_code(self.payload_length)
|
2015-04-24 03:42:31 +00:00
|
|
|
else:
|
|
|
|
self.length_code = length_code
|
|
|
|
|
2015-09-21 20:49:39 +00:00
|
|
|
if mask is DEFAULT and masking_key is DEFAULT:
|
2015-04-24 03:42:31 +00:00
|
|
|
self.mask = False
|
2015-09-20 22:44:17 +00:00
|
|
|
self.masking_key = b""
|
2015-09-21 20:49:39 +00:00
|
|
|
elif mask is DEFAULT:
|
2015-04-24 03:42:31 +00:00
|
|
|
self.mask = 1
|
|
|
|
self.masking_key = masking_key
|
2015-09-21 20:49:39 +00:00
|
|
|
elif masking_key is DEFAULT:
|
2015-04-24 03:42:31 +00:00
|
|
|
self.mask = mask
|
|
|
|
self.masking_key = os.urandom(4)
|
|
|
|
else:
|
|
|
|
self.mask = mask
|
|
|
|
self.masking_key = masking_key
|
|
|
|
|
|
|
|
if self.masking_key and len(self.masking_key) != 4:
|
|
|
|
raise ValueError("Masking key must be 4 bytes.")
|
2015-04-24 03:09:21 +00:00
|
|
|
|
2015-07-08 07:34:10 +00:00
|
|
|
@classmethod
|
|
|
|
def _make_length_code(self, length):
|
|
|
|
"""
|
|
|
|
A websockets frame contains an initial length_code, and an optional
|
|
|
|
extended length code to represent the actual length if length code is
|
|
|
|
larger than 125
|
|
|
|
"""
|
|
|
|
if length <= 125:
|
|
|
|
return length
|
|
|
|
elif length >= 126 and length <= 65535:
|
|
|
|
return 126
|
|
|
|
else:
|
|
|
|
return 127
|
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
def __repr__(self):
|
2015-04-30 00:10:08 +00:00
|
|
|
vals = [
|
2015-05-31 05:24:44 +00:00
|
|
|
"ws frame:",
|
2015-04-30 00:10:08 +00:00
|
|
|
OPCODE.get_name(self.opcode, hex(self.opcode)).lower()
|
|
|
|
]
|
|
|
|
flags = []
|
|
|
|
for i in ["fin", "rsv1", "rsv2", "rsv3", "mask"]:
|
|
|
|
if getattr(self, i):
|
|
|
|
flags.append(i)
|
|
|
|
if flags:
|
|
|
|
vals.extend([":", "|".join(flags)])
|
|
|
|
if self.masking_key:
|
2015-05-27 09:18:54 +00:00
|
|
|
vals.append(":key=%s" % repr(self.masking_key))
|
2015-04-30 00:10:08 +00:00
|
|
|
if self.payload_length:
|
2016-05-31 07:32:08 +00:00
|
|
|
vals.append(" %s" % human.pretty_size(self.payload_length))
|
2015-04-30 00:10:08 +00:00
|
|
|
return "".join(vals)
|
2015-04-29 21:04:22 +00:00
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
def __bytes__(self):
|
2015-04-24 03:09:21 +00:00
|
|
|
first_byte = utils.setbit(0, 7, self.fin)
|
|
|
|
first_byte = utils.setbit(first_byte, 6, self.rsv1)
|
|
|
|
first_byte = utils.setbit(first_byte, 5, self.rsv2)
|
|
|
|
first_byte = utils.setbit(first_byte, 4, self.rsv3)
|
|
|
|
first_byte = first_byte | self.opcode
|
|
|
|
|
2015-04-24 03:42:31 +00:00
|
|
|
second_byte = utils.setbit(self.length_code, 7, self.mask)
|
2015-04-24 03:09:21 +00:00
|
|
|
|
2016-10-17 02:15:22 +00:00
|
|
|
b = bytes([first_byte, second_byte])
|
2015-04-24 03:09:21 +00:00
|
|
|
|
|
|
|
if self.payload_length < 126:
|
|
|
|
pass
|
|
|
|
elif self.payload_length < MAX_16_BIT_INT:
|
|
|
|
# '!H' pack as 16 bit unsigned short
|
|
|
|
# add 2 byte extended payload length
|
|
|
|
b += struct.pack('!H', self.payload_length)
|
|
|
|
elif self.payload_length < MAX_64_BIT_INT:
|
|
|
|
# '!Q' = pack as 64 bit unsigned long long
|
|
|
|
# add 8 bytes extended payload length
|
|
|
|
b += struct.pack('!Q', self.payload_length)
|
2016-08-18 15:31:43 +00:00
|
|
|
else:
|
|
|
|
raise ValueError("Payload length exceeds 64bit integer")
|
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
if self.masking_key:
|
2015-04-24 03:09:21 +00:00
|
|
|
b += self.masking_key
|
|
|
|
return b
|
|
|
|
|
|
|
|
@classmethod
|
2015-06-17 11:10:27 +00:00
|
|
|
def from_file(cls, fp):
|
2015-04-24 03:09:21 +00:00
|
|
|
"""
|
|
|
|
read a websockets frame header
|
|
|
|
"""
|
2016-10-17 02:15:22 +00:00
|
|
|
first_byte, second_byte = fp.safe_read(2)
|
2015-04-24 03:09:21 +00:00
|
|
|
fin = utils.getbit(first_byte, 7)
|
|
|
|
rsv1 = utils.getbit(first_byte, 6)
|
|
|
|
rsv2 = utils.getbit(first_byte, 5)
|
|
|
|
rsv3 = utils.getbit(first_byte, 4)
|
2016-08-18 15:31:43 +00:00
|
|
|
opcode = first_byte & 0xF
|
2015-04-24 03:31:14 +00:00
|
|
|
mask_bit = utils.getbit(second_byte, 7)
|
2016-08-18 15:31:43 +00:00
|
|
|
length_code = second_byte & 0x7F
|
2015-04-24 03:09:21 +00:00
|
|
|
|
2016-08-18 15:31:43 +00:00
|
|
|
# payload_length > 125 indicates you need to read more bytes
|
2015-04-24 03:09:21 +00:00
|
|
|
# to get the actual payload length
|
|
|
|
if length_code <= 125:
|
|
|
|
payload_length = length_code
|
|
|
|
elif length_code == 126:
|
2015-09-17 13:16:12 +00:00
|
|
|
payload_length, = struct.unpack("!H", fp.safe_read(2))
|
2016-08-18 15:31:43 +00:00
|
|
|
else: # length_code == 127:
|
2015-09-17 13:16:12 +00:00
|
|
|
payload_length, = struct.unpack("!Q", fp.safe_read(8))
|
2015-04-24 03:09:21 +00:00
|
|
|
|
|
|
|
# masking key only present if mask bit set
|
|
|
|
if mask_bit == 1:
|
2015-05-04 22:47:02 +00:00
|
|
|
masking_key = fp.safe_read(4)
|
2015-04-24 03:09:21 +00:00
|
|
|
else:
|
2015-09-21 20:49:39 +00:00
|
|
|
masking_key = None
|
2015-04-24 03:09:21 +00:00
|
|
|
|
2015-06-17 11:10:27 +00:00
|
|
|
return cls(
|
2015-05-27 09:18:54 +00:00
|
|
|
fin=fin,
|
|
|
|
rsv1=rsv1,
|
|
|
|
rsv2=rsv2,
|
|
|
|
rsv3=rsv3,
|
|
|
|
opcode=opcode,
|
|
|
|
mask=mask_bit,
|
|
|
|
length_code=length_code,
|
|
|
|
payload_length=payload_length,
|
|
|
|
masking_key=masking_key,
|
2015-04-24 03:09:21 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
def __eq__(self, other):
|
2015-09-20 22:44:17 +00:00
|
|
|
if isinstance(other, FrameHeader):
|
|
|
|
return bytes(self) == bytes(other)
|
|
|
|
return False
|
2015-04-23 20:47:09 +00:00
|
|
|
|
|
|
|
|
2016-10-17 04:29:45 +00:00
|
|
|
class Frame:
|
2015-04-10 02:35:40 +00:00
|
|
|
"""
|
2016-08-18 15:31:43 +00:00
|
|
|
Represents a single WebSockets frame.
|
|
|
|
Constructor takes human readable forms of the frame components.
|
|
|
|
from_bytes() reads from a file-like object to create a new Frame.
|
|
|
|
|
|
|
|
WebSockets Frame as defined in RFC6455
|
|
|
|
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-------+-+-------------+-------------------------------+
|
|
|
|
|F|R|R|R| opcode|M| Payload len | Extended payload length |
|
|
|
|
|I|S|S|S| (4) |A| (7) | (16/64) |
|
|
|
|
|N|V|V|V| |S| | (if payload len==126/127) |
|
|
|
|
| |1|2|3| |K| | |
|
|
|
|
+-+-+-+-+-------+-+-------------+ - - - - - - - - - - - - - - - +
|
|
|
|
| Extended payload length continued, if payload len == 127 |
|
|
|
|
+ - - - - - - - - - - - - - - - +-------------------------------+
|
|
|
|
| |Masking-key, if MASK set to 1 |
|
|
|
|
+-------------------------------+-------------------------------+
|
|
|
|
| Masking-key (continued) | Payload Data |
|
|
|
|
+-------------------------------- - - - - - - - - - - - - - - - +
|
|
|
|
: Payload Data continued ... :
|
|
|
|
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
|
|
|
|
| Payload Data continued ... |
|
|
|
|
+---------------------------------------------------------------+
|
2015-04-10 02:35:40 +00:00
|
|
|
"""
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
def __init__(self, payload=b"", **kwargs):
|
2015-04-21 01:39:00 +00:00
|
|
|
self.payload = payload
|
2015-04-24 03:09:21 +00:00
|
|
|
kwargs["payload_length"] = kwargs.get("payload_length", len(payload))
|
|
|
|
self.header = FrameHeader(**kwargs)
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2015-04-24 03:31:14 +00:00
|
|
|
@classmethod
|
|
|
|
def from_bytes(cls, bytestring):
|
|
|
|
"""
|
|
|
|
Construct a websocket frame from an in-memory bytestring
|
|
|
|
to construct a frame from a stream of bytes, use from_file() directly
|
|
|
|
"""
|
2015-05-04 22:47:02 +00:00
|
|
|
return cls.from_file(tcp.Reader(io.BytesIO(bytestring)))
|
2015-04-24 03:31:14 +00:00
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
def __repr__(self):
|
|
|
|
ret = repr(self.header)
|
2015-05-31 05:24:44 +00:00
|
|
|
if self.payload:
|
2016-07-05 22:11:32 +00:00
|
|
|
ret = ret + "\nPayload:\n" + strutils.bytes_to_escaped_str(self.payload)
|
2015-05-31 05:24:44 +00:00
|
|
|
return ret
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2015-09-20 22:44:17 +00:00
|
|
|
def __bytes__(self):
|
2015-04-10 02:35:40 +00:00
|
|
|
"""
|
2015-05-15 23:32:18 +00:00
|
|
|
Serialize the frame to wire format. Returns a string.
|
2015-04-17 01:57:39 +00:00
|
|
|
"""
|
2015-09-20 22:44:17 +00:00
|
|
|
b = bytes(self.header)
|
2015-04-24 03:09:21 +00:00
|
|
|
if self.header.masking_key:
|
2016-08-18 15:31:43 +00:00
|
|
|
b += Masker(self.header.masking_key)(self.payload)
|
2015-04-23 21:21:04 +00:00
|
|
|
else:
|
|
|
|
b += self.payload
|
2015-04-21 10:39:45 +00:00
|
|
|
return b
|
2015-04-10 02:35:40 +00:00
|
|
|
|
|
|
|
@classmethod
|
2015-04-21 11:13:42 +00:00
|
|
|
def from_file(cls, fp):
|
2015-04-10 02:35:40 +00:00
|
|
|
"""
|
|
|
|
read a websockets frame sent by a server or client
|
2015-04-21 01:39:00 +00:00
|
|
|
|
2015-04-21 11:13:42 +00:00
|
|
|
fp is a "file like" object that could be backed by a network
|
2015-04-21 01:39:00 +00:00
|
|
|
stream or a disk or an in memory stream reader
|
|
|
|
"""
|
2015-04-24 03:09:21 +00:00
|
|
|
header = FrameHeader.from_file(fp)
|
2015-05-04 22:47:02 +00:00
|
|
|
payload = fp.safe_read(header.payload_length)
|
2015-04-17 01:57:39 +00:00
|
|
|
|
2015-04-24 03:09:21 +00:00
|
|
|
if header.mask == 1 and header.masking_key:
|
2016-08-18 15:31:43 +00:00
|
|
|
payload = Masker(header.masking_key)(payload)
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2016-08-18 15:31:43 +00:00
|
|
|
frame = cls(payload)
|
|
|
|
frame.header = header
|
|
|
|
return frame
|
2015-04-10 02:35:40 +00:00
|
|
|
|
2015-04-11 22:40:18 +00:00
|
|
|
def __eq__(self, other):
|
2015-09-20 22:44:17 +00:00
|
|
|
if isinstance(other, Frame):
|
|
|
|
return bytes(self) == bytes(other)
|
2015-09-21 20:49:39 +00:00
|
|
|
return False
|