mitmproxy/netlib/http/http1/read.py

357 lines
11 KiB
Python
Raw Normal View History

2015-09-15 17:12:15 +00:00
from __future__ import absolute_import, print_function, division
import time
import sys
import re
from ... import utils
from ...exceptions import HttpReadDisconnect, HttpSyntaxException, HttpException
from .. import Request, Response, Headers
2015-09-15 22:04:23 +00:00
ALPN_PROTO_HTTP1 = b'http/1.1'
2015-09-15 17:12:15 +00:00
def read_request(rfile, body_size_limit=None):
request = read_request_head(rfile)
2015-09-15 22:04:23 +00:00
expected_body_size = expected_http_body_size(request)
request.body = b"".join(read_body(rfile, expected_body_size, limit=body_size_limit))
2015-09-15 17:12:15 +00:00
request.timestamp_end = time.time()
return request
def read_request_head(rfile):
"""
Parse an HTTP request head (request line + headers) from an input stream
Args:
rfile: The input stream
Returns:
2015-09-15 22:04:23 +00:00
The HTTP request object (without body)
2015-09-15 17:12:15 +00:00
Raises:
2015-09-15 22:04:23 +00:00
HttpReadDisconnect: No bytes can be read from rfile.
HttpSyntaxException: The input is malformed HTTP.
HttpException: Any other error occured.
2015-09-15 17:12:15 +00:00
"""
timestamp_start = time.time()
if hasattr(rfile, "reset_timestamps"):
rfile.reset_timestamps()
form, method, scheme, host, port, path, http_version = _read_request_line(rfile)
headers = _read_headers(rfile)
if hasattr(rfile, "first_byte_timestamp"):
# more accurate timestamp_start
timestamp_start = rfile.first_byte_timestamp
return Request(
form, method, scheme, host, port, path, http_version, headers, None, timestamp_start
)
def read_response(rfile, request, body_size_limit=None):
response = read_response_head(rfile)
2015-09-15 22:04:23 +00:00
expected_body_size = expected_http_body_size(request, response)
response.body = b"".join(read_body(rfile, expected_body_size, body_size_limit))
2015-09-15 17:12:15 +00:00
response.timestamp_end = time.time()
return response
def read_response_head(rfile):
2015-09-15 22:04:23 +00:00
"""
Parse an HTTP response head (response line + headers) from an input stream
Args:
rfile: The input stream
Returns:
The HTTP request object (without body)
Raises:
HttpReadDisconnect: No bytes can be read from rfile.
HttpSyntaxException: The input is malformed HTTP.
HttpException: Any other error occured.
"""
2015-09-15 17:12:15 +00:00
timestamp_start = time.time()
if hasattr(rfile, "reset_timestamps"):
rfile.reset_timestamps()
http_version, status_code, message = _read_response_line(rfile)
headers = _read_headers(rfile)
if hasattr(rfile, "first_byte_timestamp"):
# more accurate timestamp_start
timestamp_start = rfile.first_byte_timestamp
2015-09-15 22:04:23 +00:00
return Response(http_version, status_code, message, headers, None, timestamp_start)
2015-09-15 17:12:15 +00:00
2015-09-15 22:04:23 +00:00
def read_body(rfile, expected_size, limit=None, max_chunk_size=4096):
2015-09-15 17:12:15 +00:00
"""
2015-09-15 22:04:23 +00:00
Read an HTTP message body
2015-09-15 17:12:15 +00:00
Args:
2015-09-15 22:04:23 +00:00
rfile: The input stream
expected_size: The expected body size (see :py:meth:`expected_body_size`)
limit: Maximum body size
max_chunk_size: Maximium chunk size that gets yielded
Returns:
A generator that yields byte chunks of the content.
2015-09-15 17:12:15 +00:00
Raises:
2015-09-15 22:04:23 +00:00
HttpException, if an error occurs
2015-09-15 17:12:15 +00:00
2015-09-15 22:04:23 +00:00
Caveats:
max_chunk_size is not considered if the transfer encoding is chunked.
"""
2015-09-15 17:12:15 +00:00
if not limit or limit < 0:
limit = sys.maxsize
if not max_chunk_size:
max_chunk_size = limit
if expected_size is None:
for x in _read_chunked(rfile, limit):
yield x
elif expected_size >= 0:
if limit is not None and expected_size > limit:
raise HttpException(
"HTTP Body too large. "
"Limit is {}, content length was advertised as {}".format(limit, expected_size)
)
bytes_left = expected_size
while bytes_left:
chunk_size = min(bytes_left, max_chunk_size)
content = rfile.read(chunk_size)
2015-09-15 22:04:23 +00:00
if len(content) < chunk_size:
raise HttpException("Unexpected EOF")
2015-09-15 17:12:15 +00:00
yield content
bytes_left -= chunk_size
else:
bytes_left = limit
while bytes_left:
chunk_size = min(bytes_left, max_chunk_size)
content = rfile.read(chunk_size)
if not content:
return
yield content
bytes_left -= chunk_size
not_done = rfile.read(1)
if not_done:
raise HttpException("HTTP body too large. Limit is {}.".format(limit))
def connection_close(http_version, headers):
"""
Checks the message to see if the client connection should be closed
according to RFC 2616 Section 8.1.
"""
# At first, check if we have an explicit Connection header.
if b"connection" in headers:
2015-09-15 22:04:23 +00:00
tokens = utils.get_header_tokens(headers, "connection")
if b"close" in tokens:
2015-09-15 17:12:15 +00:00
return True
2015-09-15 22:04:23 +00:00
elif b"keep-alive" in tokens:
2015-09-15 17:12:15 +00:00
return False
# If we don't have a Connection header, HTTP 1.1 connections are assumed to
# be persistent
return http_version != (1, 1)
2015-09-15 22:04:23 +00:00
def expected_http_body_size(request, response=False):
2015-09-15 17:12:15 +00:00
"""
2015-09-15 22:04:23 +00:00
Returns:
The expected body length:
- a positive integer, if the size is known in advance
- None, if the size in unknown in advance (chunked encoding)
- -1, if all data should be read until end of stream.
2015-09-15 17:12:15 +00:00
Raises:
HttpSyntaxException, if the content length header is invalid
"""
# Determine response size according to
# http://tools.ietf.org/html/rfc7230#section-3.3
2015-09-15 22:04:23 +00:00
if not response:
headers = request.headers
response_code = None
is_request = True
else:
headers = response.headers
response_code = response.status_code
is_request = False
2015-09-15 17:12:15 +00:00
2015-09-15 22:04:23 +00:00
if is_request:
if headers.get(b"expect", b"").lower() == b"100-continue":
return 0
else:
if request.method.upper() == b"HEAD":
return 0
if 100 <= response_code <= 199:
return 0
if response_code == 200 and request.method.upper() == b"CONNECT":
return 0
if response_code in (204, 304):
return 0
2015-09-15 17:12:15 +00:00
if b"chunked" in headers.get(b"transfer-encoding", b"").lower():
return None
if b"content-length" in headers:
try:
size = int(headers[b"content-length"])
if size < 0:
raise ValueError()
return size
except ValueError:
raise HttpSyntaxException("Unparseable Content Length")
if is_request:
return 0
return -1
def _get_first_line(rfile):
line = rfile.readline()
if line == b"\r\n" or line == b"\n":
# Possible leftover from previous message
line = rfile.readline()
if not line:
raise HttpReadDisconnect()
2015-09-15 22:04:23 +00:00
line = line.strip()
try:
line.decode("ascii")
except ValueError:
raise HttpSyntaxException("Non-ascii characters in first line: {}".format(line))
return line.strip()
2015-09-15 17:12:15 +00:00
def _read_request_line(rfile):
line = _get_first_line(rfile)
try:
2015-09-15 22:04:23 +00:00
method, path, http_version = line.split(b" ")
2015-09-15 17:12:15 +00:00
if path == b"*" or path.startswith(b"/"):
form = "relative"
scheme, host, port = None, None, None
elif method == b"CONNECT":
form = "authority"
host, port = _parse_authority_form(path)
scheme, path = None, None
else:
form = "absolute"
scheme, host, port, path = utils.parse_url(path)
2015-09-15 22:04:23 +00:00
_check_http_version(http_version)
2015-09-15 17:12:15 +00:00
except ValueError:
raise HttpSyntaxException("Bad HTTP request line: {}".format(line))
return form, method, scheme, host, port, path, http_version
def _parse_authority_form(hostport):
"""
Returns (host, port) if hostport is a valid authority-form host specification.
http://tools.ietf.org/html/draft-luotonen-web-proxy-tunneling-01 section 3.1
Raises:
ValueError, if the input is malformed
"""
try:
host, port = hostport.split(b":")
port = int(port)
if not utils.is_valid_host(host) or not utils.is_valid_port(port):
raise ValueError()
except ValueError:
2015-09-15 22:04:23 +00:00
raise HttpSyntaxException("Invalid host specification: {}".format(hostport))
2015-09-15 17:12:15 +00:00
return host, port
def _read_response_line(rfile):
line = _get_first_line(rfile)
try:
2015-09-15 22:04:23 +00:00
parts = line.split(b" ", 2)
2015-09-15 17:12:15 +00:00
if len(parts) == 2: # handle missing message gracefully
parts.append(b"")
http_version, status_code, message = parts
status_code = int(status_code)
_check_http_version(http_version)
except ValueError:
raise HttpSyntaxException("Bad HTTP response line: {}".format(line))
return http_version, status_code, message
def _check_http_version(http_version):
2015-09-15 22:04:23 +00:00
if not re.match(br"^HTTP/\d\.\d$", http_version):
2015-09-15 17:12:15 +00:00
raise HttpSyntaxException("Unknown HTTP version: {}".format(http_version))
def _read_headers(rfile):
"""
Read a set of headers.
Stop once a blank line is reached.
Returns:
A headers object
Raises:
HttpSyntaxException
"""
ret = []
while True:
line = rfile.readline()
if not line or line == b"\r\n" or line == b"\n":
break
if line[0] in b" \t":
if not ret:
raise HttpSyntaxException("Invalid headers")
# continued header
ret[-1][1] = ret[-1][1] + b'\r\n ' + line.strip()
else:
try:
name, value = line.split(b":", 1)
value = value.strip()
ret.append([name, value])
except ValueError:
raise HttpSyntaxException("Invalid headers")
return Headers(ret)
2015-09-15 22:04:23 +00:00
def _read_chunked(rfile, limit=sys.maxsize):
2015-09-15 17:12:15 +00:00
"""
Read a HTTP body with chunked transfer encoding.
Args:
rfile: the input file
limit: A positive integer
"""
total = 0
while True:
line = rfile.readline(128)
if line == b"":
raise HttpException("Connection closed prematurely")
if line != b"\r\n" and line != b"\n":
try:
length = int(line, 16)
except ValueError:
raise HttpSyntaxException("Invalid chunked encoding length: {}".format(line))
total += length
if total > limit:
raise HttpException(
"HTTP Body too large. Limit is {}, "
"chunked content longer than {}".format(limit, total)
)
chunk = rfile.read(length)
suffix = rfile.readline(5)
if suffix != b"\r\n":
raise HttpSyntaxException("Malformed chunked body")
if length == 0:
return
yield chunk