1use std::{
4 io::{Read, Write},
5 marker::PhantomData,
6};
7
8use base64::Engine;
9use http::{
10 HeaderMap, HeaderName, Method, Request as HttpRequest, Response as HttpResponse, StatusCode,
11 Version,
12};
13use httparse::{Status, EMPTY_HEADER};
14
15use crate::{
16 error::{Error, ProtocolError, Result, SubProtocolError, UrlError},
17 handshake::{
18 core::{derive_accept_key, HandshakeRole, MidHandshake, ProcessingResult},
19 headers::{FromHttparse, MAX_HEADERS},
20 machine::{HandshakeMachine, StageResult, TryParse},
21 },
22 protocol::{
23 config::WebSocketConfig,
24 websocket::{OperationMode, WebSocket},
25 },
26};
27
28pub type Request = HttpRequest<()>;
30pub type Response = HttpResponse<Option<Vec<u8>>>;
32
33#[derive(Debug)]
35pub struct ClientHandshake<S> {
36 verify_data: VerifyData,
37 config: Option<WebSocketConfig>,
38 _marker: PhantomData<S>,
39}
40
41impl<S: Read + Write> ClientHandshake<S> {
42 pub fn start(
44 stream: S,
45 req: Request,
46 config: Option<WebSocketConfig>,
47 ) -> Result<MidHandshake<Self>> {
48 if req.method() != Method::GET {
49 return Err(Error::Protocol(ProtocolError::InvalidHttpMethod));
50 }
51 if req.version() < Version::HTTP_11 {
52 return Err(Error::Protocol(ProtocolError::InvalidHttpVersion));
53 }
54
55 let subprotocols = extract_subprotocols(&req)?;
56
57 let (request, key) = generate_request(req)?;
58
59 let machine = HandshakeMachine::start_write(stream, request);
60
61 let client = {
62 let accept_key = derive_accept_key(key.as_ref());
63 ClientHandshake {
64 verify_data: VerifyData { accept_key, subprotocols },
65 config,
66 _marker: PhantomData,
67 }
68 };
69
70 Ok(MidHandshake { role: client, machine })
71 }
72}
73
74impl<S: Read + Write> HandshakeRole for ClientHandshake<S> {
75 type IncomingData = Response;
76 type InternalStream = S;
77 type FinalResult = (WebSocket<S>, Response);
78
79 fn stage_finished(
80 &mut self,
81 finish: StageResult<Self::IncomingData, Self::InternalStream>,
82 ) -> Result<ProcessingResult<Self::InternalStream, Self::FinalResult>> {
83 Ok(match finish {
84 StageResult::DoneWriting(stream) => {
85 ProcessingResult::Continue(HandshakeMachine::start_read(stream))
86 }
87 StageResult::DoneReading { result, stream, tail } => {
88 let res = match self.verify_data.verify_response(result) {
89 Ok(r) => r,
90 Err(Error::Http(mut e)) => {
91 *e.body_mut() = Some(tail);
92 return Err(Error::Http(e));
93 }
94 Err(e) => return Err(e),
95 };
96
97 let websocket = WebSocket::from_partially_read(
98 stream,
99 tail,
100 OperationMode::Client,
101 self.config,
102 );
103 ProcessingResult::Done((websocket, res))
104 }
105 })
106 }
107}
108
109pub fn generate_request(mut request: Request) -> Result<(Vec<u8>, String)> {
111 let mut req = Vec::new();
112 write!(
113 req,
114 "GET {path} {version:?}\r\n",
115 path = request.uri().path_and_query().ok_or(Error::Url(UrlError::NoPathOrQuery))?.as_str(),
116 version = request.version()
117 )
118 .unwrap();
119
120 const KEY_HEADERNAME: &str = "Sec-WebSocket-Key";
121 const WEBSOCKET_HEADERS: [&str; 5] =
122 ["Host", "Connection", "Upgrade", "Sec-WebSocket-Version", KEY_HEADERNAME];
123
124 let key = request
125 .headers()
126 .get(KEY_HEADERNAME)
127 .ok_or_else(|| {
128 Error::Protocol(ProtocolError::InvalidHeader(
129 HeaderName::from_bytes(KEY_HEADERNAME.as_bytes()).unwrap(),
130 ))
131 })?
132 .to_str()?
133 .to_owned();
134
135 let headers = request.headers_mut();
136 for &header in &WEBSOCKET_HEADERS {
137 let val = headers.remove(header).ok_or_else(|| {
138 Error::Protocol(ProtocolError::InvalidHeader(
139 HeaderName::from_bytes(header.as_bytes()).unwrap(),
140 ))
141 })?;
142
143 write!(
144 req,
145 "{header}: {value}\r\n",
146 header = header,
147 value = val.to_str().map_err(|e| {
148 Error::Utf8(format!("{e} for header name '{header}' with value: {val:?}"))
149 })?
150 )
151 .unwrap();
152 }
153
154 let insensitive: Vec<String> =
155 WEBSOCKET_HEADERS.iter().map(|h| h.to_ascii_lowercase()).collect();
156 for (k, v) in headers {
157 let mut name = k.as_str();
158
159 if insensitive.iter().any(|h| h == name) {
160 return Err(Error::Protocol(ProtocolError::InvalidHeader(k.clone())));
161 }
162
163 if name == "sec-websocket-protocol" {
164 name = "Sec-WebSocket-Protocol";
165 }
166 if name == "origin" {
167 name = "Origin";
168 }
169
170 writeln!(
171 req,
172 "{}: {}\r",
173 name,
174 v.to_str().map_err(|e| Error::Utf8(format!(
175 "{e} for header name '{name}' with value: {v:?}"
176 )))?
177 )
178 .unwrap();
179 }
180
181 writeln!(req, "\r").unwrap();
182 Ok((req, key))
183}
184
185fn extract_subprotocols(req: &Request) -> Result<Option<Vec<String>>> {
186 if let Some(subprotocols) = req.headers().get("Sec-WebSocket-Protocol") {
187 Ok(Some(subprotocols.to_str()?.split(',').map(|s| s.trim().to_string()).collect()))
188 } else {
189 Ok(None)
190 }
191}
192
193#[derive(Debug)]
194struct VerifyData {
195 accept_key: String,
196 subprotocols: Option<Vec<String>>,
197}
198
199impl VerifyData {
200 pub fn verify_response(&self, res: Response) -> Result<Response> {
201 if res.status() != StatusCode::SWITCHING_PROTOCOLS {
202 return Err(Error::Http(res));
203 }
204
205 let headers = res.headers();
206
207 if !headers
208 .get("Connection")
209 .and_then(|h| h.to_str().ok())
210 .map(|v| v.split([',', ' ']).any(|s| s.eq_ignore_ascii_case("Upgrade")))
211 .unwrap_or(false)
212 {
213 return Err(Error::Protocol(ProtocolError::MissingConnectionUpgradeHeader));
214 }
215
216 if !headers
217 .get("Upgrade")
218 .and_then(|h| h.to_str().ok())
219 .map(|v| v.eq_ignore_ascii_case("websocket"))
220 .unwrap_or(false)
221 {
222 return Err(Error::Protocol(ProtocolError::MissingUpgradeHeader));
223 }
224
225 if !headers.get("Sec-WebSocket-Accept").map(|h| h == &self.accept_key).unwrap_or(false) {
226 return Err(Error::Protocol(ProtocolError::AcceptKeyMismatch));
227 }
228
229 if headers.get("Sec-WebSocket-Protocol").is_none() && self.subprotocols.is_some() {
230 return Err(Error::Protocol(ProtocolError::SecWebSocketSubProtocolError(
231 SubProtocolError::NoSubProtocol,
232 )));
233 }
234 if headers.get("Sec-Websocket-Protocol").is_some() && self.subprotocols.is_none() {
235 return Err(Error::Protocol(ProtocolError::SecWebSocketSubProtocolError(
236 SubProtocolError::ServerSentSubProtocolNoneRequested,
237 )));
238 }
239 if let Some(returned_subprotocol) = headers.get("Sec-WebSocket-Protocol") {
240 if let Some(accepted_subprotocols) = &self.subprotocols {
241 if !accepted_subprotocols.contains(&returned_subprotocol.to_str()?.to_string()) {
242 return Err(Error::Protocol(ProtocolError::SecWebSocketSubProtocolError(
243 SubProtocolError::InvalidSubProtocol,
244 )));
245 }
246 }
247 }
248
249 Ok(res)
250 }
251}
252
253impl TryParse for Response {
254 fn try_parse(data: &[u8]) -> crate::error::Result<Option<(usize, Self)>> {
255 let mut hbuffer = [EMPTY_HEADER; MAX_HEADERS];
256 let mut req = httparse::Response::new(&mut hbuffer);
257
258 Ok(match req.parse(data)? {
259 Status::Partial => None,
260 Status::Complete(n) => Some((n, Response::from_httparse(req)?)),
261 })
262 }
263}
264
265impl<'b: 'h, 'h> FromHttparse<httparse::Response<'h, 'b>> for Response {
266 fn from_httparse(raw: httparse::Response<'h, 'b>) -> crate::error::Result<Self> {
267 if raw.version != Some(1) {
268 return Err(Error::Protocol(ProtocolError::InvalidHttpVersion));
269 }
270
271 let headers = HeaderMap::from_httparse(raw.headers)?;
272
273 let mut res = Response::new(None);
274 *res.status_mut() = StatusCode::from_u16(raw.code.expect("Bug: no HTTP status code"))?;
275 *res.headers_mut() = headers;
276 *res.version_mut() = Version::HTTP_11;
277
278 Ok(res)
279 }
280}
281
282pub fn generate_key() -> String {
284 let r: [u8; 16] = rand::random();
285 base64::engine::general_purpose::STANDARD.encode(r)
286}