| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| import re |
|
|
| from ._abnf import chunk_header, header_field, request_line, status_line |
| from ._events import * |
| from ._state import * |
| from ._util import LocalProtocolError, RemoteProtocolError, validate |
|
|
| __all__ = ["READERS"] |
|
|
| header_field_re = re.compile(header_field.encode("ascii")) |
|
|
| |
| |
| obs_fold_re = re.compile(br"[ \t]+") |
|
|
|
|
| def _obsolete_line_fold(lines): |
| it = iter(lines) |
| last = None |
| for line in it: |
| match = obs_fold_re.match(line) |
| if match: |
| if last is None: |
| raise LocalProtocolError("continuation line at start of headers") |
| if not isinstance(last, bytearray): |
| last = bytearray(last) |
| last += b" " |
| last += line[match.end() :] |
| else: |
| if last is not None: |
| yield last |
| last = line |
| if last is not None: |
| yield last |
|
|
|
|
| def _decode_header_lines(lines): |
| for line in _obsolete_line_fold(lines): |
| matches = validate(header_field_re, line, "illegal header line: {!r}", line) |
| yield (matches["field_name"], matches["field_value"]) |
|
|
|
|
| request_line_re = re.compile(request_line.encode("ascii")) |
|
|
|
|
| def maybe_read_from_IDLE_client(buf): |
| lines = buf.maybe_extract_lines() |
| if lines is None: |
| if buf.is_next_line_obviously_invalid_request_line(): |
| raise LocalProtocolError("illegal request line") |
| return None |
| if not lines: |
| raise LocalProtocolError("no request line received") |
| matches = validate( |
| request_line_re, lines[0], "illegal request line: {!r}", lines[0] |
| ) |
| return Request( |
| headers=list(_decode_header_lines(lines[1:])), _parsed=True, **matches |
| ) |
|
|
|
|
| status_line_re = re.compile(status_line.encode("ascii")) |
|
|
|
|
| def maybe_read_from_SEND_RESPONSE_server(buf): |
| lines = buf.maybe_extract_lines() |
| if lines is None: |
| if buf.is_next_line_obviously_invalid_request_line(): |
| raise LocalProtocolError("illegal request line") |
| return None |
| if not lines: |
| raise LocalProtocolError("no response line received") |
| matches = validate(status_line_re, lines[0], "illegal status line: {!r}", lines[0]) |
| |
| if matches["reason"] is None: |
| matches["reason"] = b"" |
| status_code = matches["status_code"] = int(matches["status_code"]) |
| class_ = InformationalResponse if status_code < 200 else Response |
| return class_( |
| headers=list(_decode_header_lines(lines[1:])), _parsed=True, **matches |
| ) |
|
|
|
|
| class ContentLengthReader: |
| def __init__(self, length): |
| self._length = length |
| self._remaining = length |
|
|
| def __call__(self, buf): |
| if self._remaining == 0: |
| return EndOfMessage() |
| data = buf.maybe_extract_at_most(self._remaining) |
| if data is None: |
| return None |
| self._remaining -= len(data) |
| return Data(data=data) |
|
|
| def read_eof(self): |
| raise RemoteProtocolError( |
| "peer closed connection without sending complete message body " |
| "(received {} bytes, expected {})".format( |
| self._length - self._remaining, self._length |
| ) |
| ) |
|
|
|
|
| chunk_header_re = re.compile(chunk_header.encode("ascii")) |
|
|
|
|
| class ChunkedReader: |
| def __init__(self): |
| self._bytes_in_chunk = 0 |
| |
| |
| |
| self._bytes_to_discard = 0 |
| self._reading_trailer = False |
|
|
| def __call__(self, buf): |
| if self._reading_trailer: |
| lines = buf.maybe_extract_lines() |
| if lines is None: |
| return None |
| return EndOfMessage(headers=list(_decode_header_lines(lines))) |
| if self._bytes_to_discard > 0: |
| data = buf.maybe_extract_at_most(self._bytes_to_discard) |
| if data is None: |
| return None |
| self._bytes_to_discard -= len(data) |
| if self._bytes_to_discard > 0: |
| return None |
| |
| assert self._bytes_to_discard == 0 |
| if self._bytes_in_chunk == 0: |
| |
| chunk_header = buf.maybe_extract_next_line() |
| if chunk_header is None: |
| return None |
| matches = validate( |
| chunk_header_re, |
| chunk_header, |
| "illegal chunk header: {!r}", |
| chunk_header, |
| ) |
| |
| self._bytes_in_chunk = int(matches["chunk_size"], base=16) |
| if self._bytes_in_chunk == 0: |
| self._reading_trailer = True |
| return self(buf) |
| chunk_start = True |
| else: |
| chunk_start = False |
| assert self._bytes_in_chunk > 0 |
| data = buf.maybe_extract_at_most(self._bytes_in_chunk) |
| if data is None: |
| return None |
| self._bytes_in_chunk -= len(data) |
| if self._bytes_in_chunk == 0: |
| self._bytes_to_discard = 2 |
| chunk_end = True |
| else: |
| chunk_end = False |
| return Data(data=data, chunk_start=chunk_start, chunk_end=chunk_end) |
|
|
| def read_eof(self): |
| raise RemoteProtocolError( |
| "peer closed connection without sending complete message body " |
| "(incomplete chunked read)" |
| ) |
|
|
|
|
| class Http10Reader: |
| def __call__(self, buf): |
| data = buf.maybe_extract_at_most(999999999) |
| if data is None: |
| return None |
| return Data(data=data) |
|
|
| def read_eof(self): |
| return EndOfMessage() |
|
|
|
|
| def expect_nothing(buf): |
| if buf: |
| raise LocalProtocolError("Got data when expecting EOF") |
| return None |
|
|
|
|
| READERS = { |
| (CLIENT, IDLE): maybe_read_from_IDLE_client, |
| (SERVER, IDLE): maybe_read_from_SEND_RESPONSE_server, |
| (SERVER, SEND_RESPONSE): maybe_read_from_SEND_RESPONSE_server, |
| (CLIENT, DONE): expect_nothing, |
| (CLIENT, MUST_CLOSE): expect_nothing, |
| (CLIENT, CLOSED): expect_nothing, |
| (SERVER, DONE): expect_nothing, |
| (SERVER, MUST_CLOSE): expect_nothing, |
| (SERVER, CLOSED): expect_nothing, |
| SEND_BODY: { |
| "chunked": ChunkedReader, |
| "content-length": ContentLengthReader, |
| "http/1.0": Http10Reader, |
| }, |
| } |
|
|