mirror of
https://github.com/servo/servo
synced 2026-05-11 01:22:19 +02:00
Changed most #[allow]s to #[expect]s, mainly for clippy::too_many_arguments Removed unfulfilled expectations This is my first opensource contribution, so please let me know if anything should be done differently. Testing: Refactor Part of: #40838 --------- Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com> Signed-off-by: TimurBora <timurborisov5561@gmail.com> Co-authored-by: Tim van der Lippe <TimvdLippe@users.noreply.github.com>
376 lines
15 KiB
Rust
376 lines
15 KiB
Rust
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
||
|
||
//! The websocket handler has three main responsibilities:
|
||
//! 1) initiate the initial HTTP connection and process the response
|
||
//! 2) ensure any DOM requests for sending/closing are propagated to the network
|
||
//! 3) transmit any incoming messages/closing to the DOM
|
||
//!
|
||
//! In order to accomplish this, the handler uses a long-running loop that selects
|
||
//! over events from the network and events from the DOM, using async/await to avoid
|
||
//! the need for a dedicated thread per websocket.
|
||
|
||
use std::sync::Arc;
|
||
use std::sync::atomic::{AtomicBool, Ordering};
|
||
|
||
use async_tungstenite::WebSocketStream;
|
||
use async_tungstenite::tokio::{ConnectStream, client_async_tls_with_connector_and_config};
|
||
use base64::Engine;
|
||
use futures::stream::StreamExt;
|
||
use http::HeaderMap;
|
||
use http::header::{self, HeaderName, HeaderValue};
|
||
use ipc_channel::ipc::{IpcReceiver, IpcSender};
|
||
use ipc_channel::router::ROUTER;
|
||
use log::{debug, trace, warn};
|
||
use net_traits::request::{RequestBuilder, RequestMode};
|
||
use net_traits::{CookieSource, MessageData, WebSocketDomAction, WebSocketNetworkEvent};
|
||
use servo_url::ServoUrl;
|
||
use tokio::net::TcpStream;
|
||
use tokio::select;
|
||
use tokio::sync::mpsc::{UnboundedReceiver, unbounded_channel};
|
||
use tokio_rustls::TlsConnector;
|
||
use tungstenite::error::{Error, ProtocolError, UrlError};
|
||
use tungstenite::handshake::client::Response;
|
||
use tungstenite::protocol::CloseFrame;
|
||
use tungstenite::{ClientRequestBuilder, Message};
|
||
|
||
use crate::async_runtime::spawn_task;
|
||
use crate::connector::TlsConfig;
|
||
use crate::cookie::ServoCookie;
|
||
use crate::hosts::replace_host;
|
||
use crate::http_loader::HttpState;
|
||
|
||
/// Create a Request object for the initial HTTP request.
|
||
/// This request contains `Origin`, `Sec-WebSocket-Protocol`, `Authorization`,
|
||
/// and `Cookie` headers as appropriate.
|
||
/// Returns an error if any header values are invalid or tungstenite cannot create
|
||
/// the desired request.
|
||
pub fn create_handshake_request(
|
||
request: RequestBuilder,
|
||
http_state: Arc<HttpState>,
|
||
) -> Result<net_traits::request::Request, Error> {
|
||
let origin = request.url.origin();
|
||
|
||
let mut headers = HeaderMap::new();
|
||
headers.insert(
|
||
"Origin",
|
||
HeaderValue::from_str(&request.url.origin().ascii_serialization())?,
|
||
);
|
||
|
||
let host = format!(
|
||
"{}",
|
||
origin
|
||
.host()
|
||
.ok_or_else(|| Error::Url(UrlError::NoHostName))?
|
||
);
|
||
headers.insert("Host", HeaderValue::from_str(&host)?);
|
||
// https://websockets.spec.whatwg.org/#concept-websocket-establish
|
||
// 3. Append (`Upgrade`, `websocket`) to request’s header list.
|
||
headers.insert("Upgrade", HeaderValue::from_static("websocket"));
|
||
|
||
// 4. Append (`Connection`, `Upgrade`) to request’s header list.
|
||
headers.insert("Connection", HeaderValue::from_static("upgrade"));
|
||
|
||
// 5. Let keyValue be a nonce consisting of a randomly selected 16-byte value that has been
|
||
// forgiving-base64-encoded and isomorphic encoded.
|
||
let key = HeaderValue::from_str(&tungstenite::handshake::client::generate_key()).unwrap();
|
||
|
||
// 6. Append (`Sec-WebSocket-Key`, keyValue) to request’s header list.
|
||
headers.insert("Sec-WebSocket-Key", key);
|
||
|
||
// 7. Append (`Sec-WebSocket-Version`, `13`) to request’s header list.
|
||
headers.insert("Sec-Websocket-Version", HeaderValue::from_static("13"));
|
||
|
||
// 8. For each protocol in protocols, combine (`Sec-WebSocket-Protocol`, protocol) in request’s
|
||
// header list.
|
||
let protocols = match request.mode {
|
||
RequestMode::WebSocket {
|
||
ref protocols,
|
||
original_url: _,
|
||
} => protocols,
|
||
_ => unreachable!("How did we get here?"),
|
||
};
|
||
if !protocols.is_empty() {
|
||
let protocols = protocols.join(",");
|
||
headers.insert("Sec-WebSocket-Protocol", HeaderValue::from_str(&protocols)?);
|
||
}
|
||
|
||
let mut cookie_jar = http_state.cookie_jar.write();
|
||
cookie_jar.remove_expired_cookies_for_url(&request.url);
|
||
if let Some(cookie_list) = cookie_jar.cookies_for_url(&request.url, CookieSource::HTTP) {
|
||
headers.insert("Cookie", HeaderValue::from_str(&cookie_list)?);
|
||
}
|
||
|
||
if request.url.password().is_some() || request.url.username() != "" {
|
||
let basic = base64::engine::general_purpose::STANDARD.encode(format!(
|
||
"{}:{}",
|
||
request.url.username(),
|
||
request.url.password().unwrap_or("")
|
||
));
|
||
headers.insert(
|
||
"Authorization",
|
||
HeaderValue::from_str(&format!("Basic {}", basic))?,
|
||
);
|
||
}
|
||
Ok(request.headers(headers).build())
|
||
}
|
||
|
||
/// Process an HTTP response resulting from a WS handshake.
|
||
/// This ensures that any `Cookie` or HSTS headers are recognized.
|
||
/// Returns an error if the protocol selected by the handshake doesn't
|
||
/// match the list of provided protocols in the original request.
|
||
fn process_ws_response(
|
||
http_state: &HttpState,
|
||
response: &Response,
|
||
resource_url: &ServoUrl,
|
||
protocols: &[String],
|
||
) -> Result<Option<String>, Error> {
|
||
trace!("processing websocket http response for {}", resource_url);
|
||
let mut protocol_in_use = None;
|
||
if let Some(protocol_name) = response.headers().get("Sec-WebSocket-Protocol") {
|
||
let protocol_name = protocol_name.to_str().unwrap_or("");
|
||
if !protocols.is_empty() && !protocols.iter().any(|p| protocol_name == (*p)) {
|
||
return Err(Error::Protocol(ProtocolError::InvalidHeader(Box::new(
|
||
HeaderName::from_static("sec-websocket-protocol"),
|
||
))));
|
||
}
|
||
protocol_in_use = Some(protocol_name.to_string());
|
||
}
|
||
|
||
let mut jar = http_state.cookie_jar.write();
|
||
// TODO(eijebong): Replace thise once typed headers settled on a cookie impl
|
||
for cookie in response.headers().get_all(header::SET_COOKIE) {
|
||
let cookie_bytes = cookie.as_bytes();
|
||
if !ServoCookie::is_valid_name_or_value(cookie_bytes) {
|
||
continue;
|
||
}
|
||
if let Ok(s) = std::str::from_utf8(cookie_bytes) {
|
||
if let Some(cookie) =
|
||
ServoCookie::from_cookie_string(s, resource_url, CookieSource::HTTP)
|
||
{
|
||
jar.push(cookie, resource_url, CookieSource::HTTP);
|
||
}
|
||
}
|
||
}
|
||
|
||
http_state
|
||
.hsts_list
|
||
.write()
|
||
.update_hsts_list_from_response(resource_url, response.headers());
|
||
|
||
Ok(protocol_in_use)
|
||
}
|
||
|
||
#[derive(Debug)]
|
||
enum DomMsg {
|
||
Send(Message),
|
||
Close(Option<(u16, String)>),
|
||
}
|
||
|
||
/// Initialize a listener for DOM actions. These are routed from the IPC channel
|
||
/// to a tokio channel that the main WS client task uses to receive them.
|
||
fn setup_dom_listener(
|
||
dom_action_receiver: IpcReceiver<WebSocketDomAction>,
|
||
initiated_close: Arc<AtomicBool>,
|
||
) -> UnboundedReceiver<DomMsg> {
|
||
let (sender, receiver) = unbounded_channel();
|
||
|
||
ROUTER.add_typed_route(
|
||
dom_action_receiver,
|
||
Box::new(move |message| {
|
||
let dom_action = message.expect("Ws dom_action message to deserialize");
|
||
trace!("handling WS DOM action: {:?}", dom_action);
|
||
match dom_action {
|
||
WebSocketDomAction::SendMessage(MessageData::Text(data)) => {
|
||
if let Err(e) = sender.send(DomMsg::Send(Message::Text(data.into()))) {
|
||
warn!("Error sending websocket message: {:?}", e);
|
||
}
|
||
},
|
||
WebSocketDomAction::SendMessage(MessageData::Binary(data)) => {
|
||
if let Err(e) = sender.send(DomMsg::Send(Message::Binary(data.into()))) {
|
||
warn!("Error sending websocket message: {:?}", e);
|
||
}
|
||
},
|
||
WebSocketDomAction::Close(code, reason) => {
|
||
if initiated_close.fetch_or(true, Ordering::SeqCst) {
|
||
return;
|
||
}
|
||
let frame = code.map(move |c| (c, reason.unwrap_or_default()));
|
||
if let Err(e) = sender.send(DomMsg::Close(frame)) {
|
||
warn!("Error closing websocket: {:?}", e);
|
||
}
|
||
},
|
||
}
|
||
}),
|
||
);
|
||
|
||
receiver
|
||
}
|
||
|
||
/// Listen for WS events from the DOM and the network until one side
|
||
/// closes the connection or an error occurs. Since this is an async
|
||
/// function that uses the select operation, it will run as a task
|
||
/// on the WS tokio runtime.
|
||
async fn run_ws_loop(
|
||
mut dom_receiver: UnboundedReceiver<DomMsg>,
|
||
resource_event_sender: IpcSender<WebSocketNetworkEvent>,
|
||
mut stream: WebSocketStream<ConnectStream>,
|
||
) {
|
||
loop {
|
||
select! {
|
||
dom_msg = dom_receiver.recv() => {
|
||
trace!("processing dom msg: {:?}", dom_msg);
|
||
let dom_msg = match dom_msg {
|
||
Some(msg) => msg,
|
||
None => break,
|
||
};
|
||
match dom_msg {
|
||
DomMsg::Send(m) => {
|
||
if let Err(e) = stream.send(m).await {
|
||
warn!("error sending websocket message: {:?}", e);
|
||
}
|
||
},
|
||
DomMsg::Close(frame) => {
|
||
if let Err(e) = stream.close(frame.map(|(code, reason)| {
|
||
CloseFrame {
|
||
code: code.into(),
|
||
reason: reason.into(),
|
||
}
|
||
})).await {
|
||
warn!("error closing websocket: {:?}", e);
|
||
}
|
||
},
|
||
}
|
||
}
|
||
ws_msg = stream.next() => {
|
||
trace!("processing WS stream: {:?}", ws_msg);
|
||
let msg = match ws_msg {
|
||
Some(Ok(msg)) => msg,
|
||
Some(Err(e)) => {
|
||
warn!("Error in WebSocket communication: {:?}", e);
|
||
let _ = resource_event_sender.send(WebSocketNetworkEvent::Fail);
|
||
break;
|
||
},
|
||
None => {
|
||
warn!("Error in WebSocket communication");
|
||
let _ = resource_event_sender.send(WebSocketNetworkEvent::Fail);
|
||
break;
|
||
}
|
||
};
|
||
match msg {
|
||
Message::Text(s) => {
|
||
let message = MessageData::Text(s.as_str().to_owned());
|
||
if let Err(e) = resource_event_sender
|
||
.send(WebSocketNetworkEvent::MessageReceived(message))
|
||
{
|
||
warn!("Error sending websocket notification: {:?}", e);
|
||
break;
|
||
}
|
||
}
|
||
|
||
Message::Binary(v) => {
|
||
let message = MessageData::Binary(v.to_vec());
|
||
if let Err(e) = resource_event_sender
|
||
.send(WebSocketNetworkEvent::MessageReceived(message))
|
||
{
|
||
warn!("Error sending websocket notification: {:?}", e);
|
||
break;
|
||
}
|
||
}
|
||
|
||
Message::Ping(_) | Message::Pong(_) => {}
|
||
|
||
Message::Close(frame) => {
|
||
let (reason, code) = match frame {
|
||
Some(frame) => (frame.reason, Some(frame.code.into())),
|
||
None => ("".into(), None),
|
||
};
|
||
debug!("Websocket connection closing due to ({:?}) {}", code, reason);
|
||
let _ = resource_event_sender.send(WebSocketNetworkEvent::Close(
|
||
code,
|
||
reason.to_string(),
|
||
));
|
||
break;
|
||
}
|
||
|
||
Message::Frame(_) => {
|
||
warn!("Unexpected websocket frame message");
|
||
}
|
||
}
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
/// Initiate a new async WS connection. Returns an error if the connection fails
|
||
/// for any reason, or if the response isn't valid. Otherwise, the endless WS
|
||
/// listening loop will be started.
|
||
pub(crate) async fn start_websocket(
|
||
http_state: Arc<HttpState>,
|
||
resource_event_sender: IpcSender<WebSocketNetworkEvent>,
|
||
protocols: &[String],
|
||
client: &net_traits::request::Request,
|
||
tls_config: TlsConfig,
|
||
dom_action_receiver: IpcReceiver<WebSocketDomAction>,
|
||
) -> Result<Response, Error> {
|
||
trace!("starting WS connection to {}", client.url());
|
||
|
||
let initiated_close = Arc::new(AtomicBool::new(false));
|
||
let dom_receiver = setup_dom_listener(dom_action_receiver, initiated_close.clone());
|
||
|
||
let url = client.url();
|
||
let host = replace_host(url.host_str().expect("URL has no host"));
|
||
let mut net_url = client.url().into_url();
|
||
net_url
|
||
.set_host(Some(&host))
|
||
.map_err(|e| Error::Url(UrlError::UnableToConnect(e.to_string())))?;
|
||
|
||
let domain = net_url
|
||
.host()
|
||
.ok_or_else(|| Error::Url(UrlError::NoHostName))?;
|
||
let port = net_url
|
||
.port_or_known_default()
|
||
.ok_or_else(|| Error::Url(UrlError::UnableToConnect("Unknown port".into())))?;
|
||
|
||
let try_socket = TcpStream::connect((&*domain.to_string(), port)).await;
|
||
let socket = try_socket.map_err(Error::Io)?;
|
||
let connector = TlsConnector::from(Arc::new(tls_config));
|
||
|
||
// TODO(pylbrecht): move request conversion to a separate function
|
||
let mut original_url = client.original_url();
|
||
if original_url.scheme() == "ws" && url.scheme() == "https" {
|
||
original_url.as_mut_url().set_scheme("wss").unwrap();
|
||
}
|
||
let mut builder =
|
||
ClientRequestBuilder::new(original_url.as_str().parse().expect("unable to parse URI"));
|
||
for (key, value) in client.headers.iter() {
|
||
builder = builder.with_header(
|
||
key.as_str(),
|
||
value
|
||
.to_str()
|
||
.expect("unable to convert header value to string"),
|
||
);
|
||
}
|
||
|
||
let (stream, response) =
|
||
client_async_tls_with_connector_and_config(builder, socket, Some(connector), None).await?;
|
||
|
||
let protocol_in_use = process_ws_response(&http_state, &response, &url, protocols)?;
|
||
|
||
if !initiated_close.load(Ordering::SeqCst) {
|
||
if resource_event_sender
|
||
.send(WebSocketNetworkEvent::ConnectionEstablished { protocol_in_use })
|
||
.is_err()
|
||
{
|
||
return Ok(response);
|
||
}
|
||
|
||
trace!("about to start ws loop for {}", url);
|
||
spawn_task(run_ws_loop(dom_receiver, resource_event_sender, stream));
|
||
} else {
|
||
trace!("client closed connection for {}, not running loop", url);
|
||
}
|
||
Ok(response)
|
||
}
|