Source code for websockets.handshake

"""
The :mod:`websockets.handshake` module deals with the WebSocket opening
handshake according to `section 4 of RFC 6455`_.

.. _section 4 of RFC 6455: http://tools.ietf.org/html/rfc6455#section-4

It provides functions to implement the handshake with any existing HTTP
library. You must pass to these functions:

- A ``set_header`` function accepting a header name and a header value,
- A ``get_header`` function accepting a header name and returning the header
  value.

The inputs and outputs of ``get_header`` and ``set_header`` are :class:`str`
objects containing only ASCII characters.

Some checks cannot be performed because they depend too much on the
context; instead, they're documented below.

To accept a connection, a server must:

- Read the request, check that the method is GET, and check the headers with
  :func:`check_request`,
- Send a 101 response to the client with the headers created by
  :func:`build_response` if the request is valid; otherwise, send an
  appropriate HTTP error code.

To open a connection, a client must:

- Send a GET request to the server with the headers created by
  :func:`build_request`,
- Read the response, check that the status code is 101, and check the headers
  with :func:`check_response`.

"""

import base64
import binascii
import hashlib
import random

from .exceptions import InvalidHeaderValue, InvalidUpgrade
from .headers import parse_connection, parse_upgrade


__all__ = [
    'build_request', 'check_request',
    'build_response', 'check_response',
]

GUID = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'


[docs]def build_request(set_header): """ Build a handshake request to send to the server. Return the ``key`` which must be passed to :func:`check_response`. """ raw_key = bytes(random.getrandbits(8) for _ in range(16)) key = base64.b64encode(raw_key).decode() set_header('Upgrade', 'websocket') set_header('Connection', 'Upgrade') set_header('Sec-WebSocket-Key', key) set_header('Sec-WebSocket-Version', '13') return key
[docs]def check_request(get_header): """ Check a handshake request received from the client. If the handshake is valid, this function returns the ``key`` which must be passed to :func:`build_response`. Otherwise it raises an :exc:`~websockets.exceptions.InvalidHandshake` exception and the server must return an error like 400 Bad Request. This function doesn't verify that the request is an HTTP/1.1 or higher GET request and doesn't perform Host and Origin checks. These controls are usually performed earlier in the HTTP request handling code. They're the responsibility of the caller. """ connection = parse_connection(get_header('Connection')) if not any(value.lower() == 'upgrade' for value in connection): raise InvalidUpgrade('Connection', get_header('Connection')) upgrade = parse_upgrade(get_header('Upgrade')) # For compatibility with non-strict implementations, ignore case when # checking the Upgrade header. It's supposed to be 'WebSocket'. if not (len(upgrade) == 1 and upgrade[0].lower() == 'websocket'): raise InvalidUpgrade('Upgrade', get_header('Upgrade')) key = get_header('Sec-WebSocket-Key') try: raw_key = base64.b64decode(key.encode(), validate=True) except binascii.Error: raise InvalidHeaderValue('Sec-WebSocket-Key', key) if len(raw_key) != 16: raise InvalidHeaderValue('Sec-WebSocket-Key', key) version = get_header('Sec-WebSocket-Version') if version != '13': raise InvalidHeaderValue('Sec-WebSocket-Version', version) return key
[docs]def build_response(set_header, key): """ Build a handshake response to send to the client. ``key`` comes from :func:`check_request`. """ set_header('Upgrade', 'websocket') set_header('Connection', 'Upgrade') set_header('Sec-WebSocket-Accept', accept(key))
[docs]def check_response(get_header, key): """ Check a handshake response received from the server. ``key`` comes from :func:`build_request`. If the handshake is valid, this function returns ``None``. Otherwise it raises an :exc:`~websockets.exceptions.InvalidHandshake` exception. This function doesn't verify that the response is an HTTP/1.1 or higher response with a 101 status code. These controls are the responsibility of the caller. """ connection = parse_connection(get_header('Connection')) if not any(value.lower() == 'upgrade' for value in connection): raise InvalidUpgrade('Connection', get_header('Connection')) upgrade = parse_upgrade(get_header('Upgrade')) # For compatibility with non-strict implementations, ignore case when # checking the Upgrade header. It's supposed to be 'WebSocket'. if not (len(upgrade) == 1 and upgrade[0].lower() == 'websocket'): raise InvalidUpgrade('Upgrade', get_header('Upgrade')) if get_header('Sec-WebSocket-Accept') != accept(key): raise InvalidHeaderValue( 'Sec-WebSocket-Accept', get_header('Sec-WebSocket-Accept'))
def accept(key): sha1 = hashlib.sha1((key + GUID).encode()).digest() return base64.b64encode(sha1).decode()