// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/websockets/websocket_channel.h" #include // for INT_MAX #include #include #include #include #include "base/big_endian.h" #include "base/bind.h" #include "base/containers/circular_deque.h" #include "base/location.h" #include "base/memory/raw_ptr.h" #include "base/memory/weak_ptr.h" #include "base/numerics/safe_conversions.h" #include "base/strings/string_piece.h" #include "base/strings/stringprintf.h" #include "base/task/single_thread_task_runner.h" #include "base/threading/thread_task_runner_handle.h" #include "base/time/time.h" #include "net/base/auth.h" #include "net/base/io_buffer.h" #include "net/base/ip_endpoint.h" #include "net/http/http_request_headers.h" #include "net/http/http_response_headers.h" #include "net/http/http_util.h" #include "net/log/net_log_with_source.h" #include "net/traffic_annotation/network_traffic_annotation.h" #include "net/websockets/websocket_errors.h" #include "net/websockets/websocket_event_interface.h" #include "net/websockets/websocket_frame.h" #include "net/websockets/websocket_handshake_request_info.h" #include "net/websockets/websocket_handshake_response_info.h" #include "net/websockets/websocket_stream.h" #include "url/origin.h" namespace net { namespace { using base::StreamingUtf8Validator; constexpr size_t kWebSocketCloseCodeLength = 2; // Timeout for waiting for the server to acknowledge a closing handshake. constexpr int kClosingHandshakeTimeoutSeconds = 60; // We wait for the server to close the underlying connection as recommended in // https://tools.ietf.org/html/rfc6455#section-7.1.1 // We don't use 2MSL since there're server implementations that don't follow // the recommendation and wait for the client to close the underlying // connection. It leads to unnecessarily long time before CloseEvent // invocation. We want to avoid this rather than strictly following the spec // recommendation. constexpr int kUnderlyingConnectionCloseTimeoutSeconds = 2; using ChannelState = WebSocketChannel::ChannelState; // Maximum close reason length = max control frame payload - // status code length // = 125 - 2 constexpr size_t kMaximumCloseReasonLength = 125 - kWebSocketCloseCodeLength; // Check a close status code for strict compliance with RFC6455. This is only // used for close codes received from a renderer that we are intending to send // out over the network. See ParseClose() for the restrictions on incoming close // codes. The |code| parameter is type int for convenience of implementation; // the real type is uint16_t. Code 1005 is treated specially; it cannot be set // explicitly by Javascript but the renderer uses it to indicate we should send // a Close frame with no payload. bool IsStrictlyValidCloseStatusCode(int code) { static const int kInvalidRanges[] = { // [BAD, OK) 0, 1000, // 1000 is the first valid code 1006, 1007, // 1006 MUST NOT be set. 1014, 3000, // 1014 unassigned; 1015 up to 2999 are reserved. 5000, 65536, // Codes above 5000 are invalid. }; const int* const kInvalidRangesEnd = kInvalidRanges + std::size(kInvalidRanges); DCHECK_GE(code, 0); DCHECK_LT(code, 65536); const int* upper = std::upper_bound(kInvalidRanges, kInvalidRangesEnd, code); DCHECK_NE(kInvalidRangesEnd, upper); DCHECK_GT(upper, kInvalidRanges); DCHECK_GT(*upper, code); DCHECK_LE(*(upper - 1), code); return ((upper - kInvalidRanges) % 2) == 0; } // Sets |name| to the name of the frame type for the given |opcode|. Note that // for all of Text, Binary and Continuation opcode, this method returns // "Data frame". void GetFrameTypeForOpcode(WebSocketFrameHeader::OpCode opcode, std::string* name) { switch (opcode) { case WebSocketFrameHeader::kOpCodeText: // fall-thru case WebSocketFrameHeader::kOpCodeBinary: // fall-thru case WebSocketFrameHeader::kOpCodeContinuation: *name = "Data frame"; break; case WebSocketFrameHeader::kOpCodePing: *name = "Ping"; break; case WebSocketFrameHeader::kOpCodePong: *name = "Pong"; break; case WebSocketFrameHeader::kOpCodeClose: *name = "Close"; break; default: *name = "Unknown frame type"; break; } return; } base::Value NetLogFailParam(uint16_t code, base::StringPiece reason, base::StringPiece message) { base::Value dict(base::Value::Type::DICTIONARY); dict.SetDoubleKey("code", code); dict.SetStringKey("reason", reason); dict.SetStringKey("internal_reason", message); return dict; } class DependentIOBuffer : public WrappedIOBuffer { public: DependentIOBuffer(scoped_refptr buffer, size_t offset) : WrappedIOBuffer(buffer->data() + offset), buffer_(std::move(buffer)) {} private: ~DependentIOBuffer() override = default; scoped_refptr buffer_; }; } // namespace // A class to encapsulate a set of frames and information about the size of // those frames. class WebSocketChannel::SendBuffer { public: SendBuffer() : total_bytes_(0) {} // Add a WebSocketFrame to the buffer and increase total_bytes_. void AddFrame(std::unique_ptr chunk, scoped_refptr buffer); // Return a pointer to the frames_ for write purposes. std::vector>* frames() { return &frames_; } private: // The frames_ that will be sent in the next call to WriteFrames(). std::vector> frames_; // References of each WebSocketFrame.data; std::vector> buffers_; // The total size of the payload data in |frames_|. This will be used to // measure the throughput of the link. // TODO(ricea): Measure the throughput of the link. uint64_t total_bytes_; }; void WebSocketChannel::SendBuffer::AddFrame( std::unique_ptr frame, scoped_refptr buffer) { total_bytes_ += frame->header.payload_length; frames_.push_back(std::move(frame)); buffers_.push_back(std::move(buffer)); } // Implementation of WebSocketStream::ConnectDelegate that simply forwards the // calls on to the WebSocketChannel that created it. class WebSocketChannel::ConnectDelegate : public WebSocketStream::ConnectDelegate { public: explicit ConnectDelegate(WebSocketChannel* creator) : creator_(creator) {} ConnectDelegate(const ConnectDelegate&) = delete; ConnectDelegate& operator=(const ConnectDelegate&) = delete; void OnCreateRequest(URLRequest* request) override { creator_->OnCreateURLRequest(request); } void OnSuccess( std::unique_ptr stream, std::unique_ptr response) override { creator_->OnConnectSuccess(std::move(stream), std::move(response)); // |this| may have been deleted. } void OnFailure(const std::string& message, int net_error, absl::optional response_code) override { creator_->OnConnectFailure(message, net_error, response_code); // |this| has been deleted. } void OnStartOpeningHandshake( std::unique_ptr request) override { creator_->OnStartOpeningHandshake(std::move(request)); } void OnSSLCertificateError( std::unique_ptr ssl_error_callbacks, int net_error, const SSLInfo& ssl_info, bool fatal) override { creator_->OnSSLCertificateError(std::move(ssl_error_callbacks), net_error, ssl_info, fatal); } int OnAuthRequired(const AuthChallengeInfo& auth_info, scoped_refptr headers, const IPEndPoint& remote_endpoint, base::OnceCallback callback, absl::optional* credentials) override { return creator_->OnAuthRequired(auth_info, std::move(headers), remote_endpoint, std::move(callback), credentials); } private: // A pointer to the WebSocketChannel that created this object. There is no // danger of this pointer being stale, because deleting the WebSocketChannel // cancels the connect process, deleting this object and preventing its // callbacks from being called. const raw_ptr creator_; }; WebSocketChannel::WebSocketChannel( std::unique_ptr event_interface, URLRequestContext* url_request_context) : event_interface_(std::move(event_interface)), url_request_context_(url_request_context), closing_handshake_timeout_( base::Seconds(kClosingHandshakeTimeoutSeconds)), underlying_connection_close_timeout_( base::Seconds(kUnderlyingConnectionCloseTimeoutSeconds)), has_received_close_frame_(false), received_close_code_(0), state_(FRESHLY_CONSTRUCTED), sending_text_message_(false), receiving_text_message_(false), expecting_to_handle_continuation_(false), initial_frame_forwarded_(false) {} WebSocketChannel::~WebSocketChannel() { // The stream may hold a pointer to read_frames_, and so it needs to be // destroyed first. stream_.reset(); // The timer may have a callback pointing back to us, so stop it just in case // someone decides to run the event loop from their destructor. close_timer_.Stop(); } void WebSocketChannel::SendAddChannelRequest( const GURL& socket_url, const std::vector& requested_subprotocols, const url::Origin& origin, const SiteForCookies& site_for_cookies, const IsolationInfo& isolation_info, const HttpRequestHeaders& additional_headers, NetworkTrafficAnnotationTag traffic_annotation) { SendAddChannelRequestWithSuppliedCallback( socket_url, requested_subprotocols, origin, site_for_cookies, isolation_info, additional_headers, traffic_annotation, base::BindOnce(&WebSocketStream::CreateAndConnectStream)); } void WebSocketChannel::SetState(State new_state) { DCHECK_NE(state_, new_state); state_ = new_state; } bool WebSocketChannel::InClosingState() const { // The state RECV_CLOSED is not supported here, because it is only used in one // code path and should not leak into the code in general. DCHECK_NE(RECV_CLOSED, state_) << "InClosingState called with state_ == RECV_CLOSED"; return state_ == SEND_CLOSED || state_ == CLOSE_WAIT || state_ == CLOSED; } WebSocketChannel::ChannelState WebSocketChannel::SendFrame( bool fin, WebSocketFrameHeader::OpCode op_code, scoped_refptr buffer, size_t buffer_size) { DCHECK_LE(buffer_size, static_cast(INT_MAX)); DCHECK(stream_) << "Got SendFrame without a connection established; fin=" << fin << " op_code=" << op_code << " buffer_size=" << buffer_size; if (InClosingState()) { DVLOG(1) << "SendFrame called in state " << state_ << ". This may be a bug, or a harmless race."; return CHANNEL_ALIVE; } DCHECK_EQ(state_, CONNECTED); DCHECK(WebSocketFrameHeader::IsKnownDataOpCode(op_code)) << "Got SendFrame with bogus op_code " << op_code << " fin=" << fin << " buffer_size=" << buffer_size; if (op_code == WebSocketFrameHeader::kOpCodeText || (op_code == WebSocketFrameHeader::kOpCodeContinuation && sending_text_message_)) { StreamingUtf8Validator::State state = outgoing_utf8_validator_.AddBytes(buffer->data(), buffer_size); if (state == StreamingUtf8Validator::INVALID || (state == StreamingUtf8Validator::VALID_MIDPOINT && fin)) { // TODO(ricea): Kill renderer. FailChannel("Browser sent a text frame containing invalid UTF-8", kWebSocketErrorGoingAway, ""); return CHANNEL_DELETED; // |this| has been deleted. } sending_text_message_ = !fin; DCHECK(!fin || state == StreamingUtf8Validator::VALID_ENDPOINT); } return SendFrameInternal(fin, op_code, std::move(buffer), buffer_size); // |this| may have been deleted. } ChannelState WebSocketChannel::StartClosingHandshake( uint16_t code, const std::string& reason) { if (InClosingState()) { // When the associated renderer process is killed while the channel is in // CLOSING state we reach here. DVLOG(1) << "StartClosingHandshake called in state " << state_ << ". This may be a bug, or a harmless race."; return CHANNEL_ALIVE; } if (has_received_close_frame_) { // We reach here if the client wants to start a closing handshake while // the browser is waiting for the client to consume incoming data frames // before responding to a closing handshake initiated by the server. // As the client doesn't want the data frames any more, we can respond to // the closing handshake initiated by the server. return RespondToClosingHandshake(); } if (state_ == CONNECTING) { // Abort the in-progress handshake and drop the connection immediately. stream_request_.reset(); SetState(CLOSED); DoDropChannel(false, kWebSocketErrorAbnormalClosure, ""); return CHANNEL_DELETED; } DCHECK_EQ(state_, CONNECTED); DCHECK(!close_timer_.IsRunning()); // This use of base::Unretained() is safe because we stop the timer in the // destructor. close_timer_.Start( FROM_HERE, closing_handshake_timeout_, base::BindOnce(&WebSocketChannel::CloseTimeout, base::Unretained(this))); // Javascript actually only permits 1000 and 3000-4999, but the implementation // itself may produce different codes. The length of |reason| is also checked // by Javascript. if (!IsStrictlyValidCloseStatusCode(code) || reason.size() > kMaximumCloseReasonLength) { // "InternalServerError" is actually used for errors from any endpoint, per // errata 3227 to RFC6455. If the renderer is sending us an invalid code or // reason it must be malfunctioning in some way, and based on that we // interpret this as an internal error. if (SendClose(kWebSocketErrorInternalServerError, "") == CHANNEL_DELETED) return CHANNEL_DELETED; DCHECK_EQ(CONNECTED, state_); SetState(SEND_CLOSED); return CHANNEL_ALIVE; } if (SendClose(code, StreamingUtf8Validator::Validate(reason) ? reason : std::string()) == CHANNEL_DELETED) return CHANNEL_DELETED; DCHECK_EQ(CONNECTED, state_); SetState(SEND_CLOSED); return CHANNEL_ALIVE; } void WebSocketChannel::SendAddChannelRequestForTesting( const GURL& socket_url, const std::vector& requested_subprotocols, const url::Origin& origin, const SiteForCookies& site_for_cookies, const IsolationInfo& isolation_info, const HttpRequestHeaders& additional_headers, NetworkTrafficAnnotationTag traffic_annotation, WebSocketStreamRequestCreationCallback callback) { SendAddChannelRequestWithSuppliedCallback( socket_url, requested_subprotocols, origin, site_for_cookies, isolation_info, additional_headers, traffic_annotation, std::move(callback)); } void WebSocketChannel::SetClosingHandshakeTimeoutForTesting( base::TimeDelta delay) { closing_handshake_timeout_ = delay; } void WebSocketChannel::SetUnderlyingConnectionCloseTimeoutForTesting( base::TimeDelta delay) { underlying_connection_close_timeout_ = delay; } void WebSocketChannel::SendAddChannelRequestWithSuppliedCallback( const GURL& socket_url, const std::vector& requested_subprotocols, const url::Origin& origin, const SiteForCookies& site_for_cookies, const IsolationInfo& isolation_info, const HttpRequestHeaders& additional_headers, NetworkTrafficAnnotationTag traffic_annotation, WebSocketStreamRequestCreationCallback callback) { DCHECK_EQ(FRESHLY_CONSTRUCTED, state_); if (!socket_url.SchemeIsWSOrWSS()) { // TODO(ricea): Kill the renderer (this error should have been caught by // Javascript). event_interface_->OnFailChannel("Invalid scheme", ERR_FAILED, absl::nullopt); // |this| is deleted here. return; } socket_url_ = socket_url; auto connect_delegate = std::make_unique(this); stream_request_ = std::move(callback).Run( socket_url_, requested_subprotocols, origin, site_for_cookies, isolation_info, additional_headers, url_request_context_.get(), NetLogWithSource(), traffic_annotation, std::move(connect_delegate)); SetState(CONNECTING); } void WebSocketChannel::OnCreateURLRequest(URLRequest* request) { event_interface_->OnCreateURLRequest(request); } void WebSocketChannel::OnConnectSuccess( std::unique_ptr stream, std::unique_ptr response) { DCHECK(stream); DCHECK_EQ(CONNECTING, state_); stream_ = std::move(stream); SetState(CONNECTED); // |stream_request_| is not used once the connection has succeeded. stream_request_.reset(); event_interface_->OnAddChannelResponse( std::move(response), stream_->GetSubProtocol(), stream_->GetExtensions()); // |this| may have been deleted after OnAddChannelResponse. } void WebSocketChannel::OnConnectFailure(const std::string& message, int net_error, absl::optional response_code) { DCHECK_EQ(CONNECTING, state_); // Copy the message before we delete its owner. std::string message_copy = message; SetState(CLOSED); stream_request_.reset(); event_interface_->OnFailChannel(message_copy, net_error, response_code); // |this| has been deleted. } void WebSocketChannel::OnSSLCertificateError( std::unique_ptr ssl_error_callbacks, int net_error, const SSLInfo& ssl_info, bool fatal) { event_interface_->OnSSLCertificateError( std::move(ssl_error_callbacks), socket_url_, net_error, ssl_info, fatal); } int WebSocketChannel::OnAuthRequired( const AuthChallengeInfo& auth_info, scoped_refptr response_headers, const IPEndPoint& remote_endpoint, base::OnceCallback callback, absl::optional* credentials) { return event_interface_->OnAuthRequired( auth_info, std::move(response_headers), remote_endpoint, std::move(callback), credentials); } void WebSocketChannel::OnStartOpeningHandshake( std::unique_ptr request) { event_interface_->OnStartOpeningHandshake(std::move(request)); } ChannelState WebSocketChannel::WriteFrames() { int result = OK; do { // This use of base::Unretained is safe because this object owns the // WebSocketStream and destroying it cancels all callbacks. result = stream_->WriteFrames( data_being_sent_->frames(), base::BindOnce(base::IgnoreResult(&WebSocketChannel::OnWriteDone), base::Unretained(this), false)); if (result != ERR_IO_PENDING) { if (OnWriteDone(true, result) == CHANNEL_DELETED) return CHANNEL_DELETED; // OnWriteDone() returns CHANNEL_DELETED on error. Here |state_| is // guaranteed to be the same as before OnWriteDone() call. } } while (result == OK && data_being_sent_); return CHANNEL_ALIVE; } ChannelState WebSocketChannel::OnWriteDone(bool synchronous, int result) { DCHECK_NE(FRESHLY_CONSTRUCTED, state_); DCHECK_NE(CONNECTING, state_); DCHECK_NE(ERR_IO_PENDING, result); DCHECK(data_being_sent_); switch (result) { case OK: if (data_to_send_next_) { data_being_sent_ = std::move(data_to_send_next_); if (!synchronous) return WriteFrames(); } else { data_being_sent_.reset(); event_interface_->OnSendDataFrameDone(); } return CHANNEL_ALIVE; // If a recoverable error condition existed, it would go here. default: DCHECK_LT(result, 0) << "WriteFrames() should only return OK or ERR_ codes"; stream_->Close(); SetState(CLOSED); DoDropChannel(false, kWebSocketErrorAbnormalClosure, ""); return CHANNEL_DELETED; } } ChannelState WebSocketChannel::ReadFrames() { DCHECK(stream_); DCHECK(state_ == CONNECTED || state_ == SEND_CLOSED || state_ == CLOSE_WAIT); DCHECK(read_frames_.empty()); if (is_reading_) { return CHANNEL_ALIVE; } if (!InClosingState() && has_received_close_frame_) { DCHECK(!event_interface_->HasPendingDataFrames()); // We've been waiting for the client to consume the frames before // responding to the closing handshake initiated by the server. if (RespondToClosingHandshake() == CHANNEL_DELETED) { return CHANNEL_DELETED; } } // TODO(crbug.com/999235): Remove this CHECK. CHECK(event_interface_); while (!event_interface_->HasPendingDataFrames()) { DCHECK(stream_); // This use of base::Unretained is safe because this object owns the // WebSocketStream, and any pending reads will be cancelled when it is // destroyed. const int result = stream_->ReadFrames( &read_frames_, base::BindOnce(base::IgnoreResult(&WebSocketChannel::OnReadDone), base::Unretained(this), false)); if (result == ERR_IO_PENDING) { is_reading_ = true; return CHANNEL_ALIVE; } if (OnReadDone(true, result) == CHANNEL_DELETED) { return CHANNEL_DELETED; } DCHECK_NE(CLOSED, state_); // TODO(crbug.com/999235): Remove this CHECK. CHECK(event_interface_); } return CHANNEL_ALIVE; } ChannelState WebSocketChannel::OnReadDone(bool synchronous, int result) { DVLOG(3) << "WebSocketChannel::OnReadDone synchronous?" << synchronous << ", result=" << result << ", read_frames_.size=" << read_frames_.size(); DCHECK_NE(FRESHLY_CONSTRUCTED, state_); DCHECK_NE(CONNECTING, state_); DCHECK_NE(ERR_IO_PENDING, result); switch (result) { case OK: // ReadFrames() must use ERR_CONNECTION_CLOSED for a closed connection // with no data read, not an empty response. DCHECK(!read_frames_.empty()) << "ReadFrames() returned OK, but nothing was read."; for (size_t i = 0; i < read_frames_.size(); ++i) { if (HandleFrame(std::move(read_frames_[i])) == CHANNEL_DELETED) return CHANNEL_DELETED; } read_frames_.clear(); DCHECK_NE(CLOSED, state_); if (!synchronous) { is_reading_ = false; if (!event_interface_->HasPendingDataFrames()) { return ReadFrames(); } } return CHANNEL_ALIVE; case ERR_WS_PROTOCOL_ERROR: // This could be kWebSocketErrorProtocolError (specifically, non-minimal // encoding of payload length) or kWebSocketErrorMessageTooBig, or an // extension-specific error. FailChannel("Invalid frame header", kWebSocketErrorProtocolError, "WebSocket Protocol Error"); return CHANNEL_DELETED; default: DCHECK_LT(result, 0) << "ReadFrames() should only return OK or ERR_ codes"; stream_->Close(); SetState(CLOSED); uint16_t code = kWebSocketErrorAbnormalClosure; std::string reason = ""; bool was_clean = false; if (has_received_close_frame_) { code = received_close_code_; reason = received_close_reason_; was_clean = (result == ERR_CONNECTION_CLOSED); } DoDropChannel(was_clean, code, reason); return CHANNEL_DELETED; } } ChannelState WebSocketChannel::HandleFrame( std::unique_ptr frame) { if (frame->header.masked) { // RFC6455 Section 5.1 "A client MUST close a connection if it detects a // masked frame." FailChannel( "A server must not mask any frames that it sends to the " "client.", kWebSocketErrorProtocolError, "Masked frame from server"); return CHANNEL_DELETED; } const WebSocketFrameHeader::OpCode opcode = frame->header.opcode; DCHECK(!WebSocketFrameHeader::IsKnownControlOpCode(opcode) || frame->header.final); if (frame->header.reserved1 || frame->header.reserved2 || frame->header.reserved3) { FailChannel( base::StringPrintf("One or more reserved bits are on: reserved1 = %d, " "reserved2 = %d, reserved3 = %d", static_cast(frame->header.reserved1), static_cast(frame->header.reserved2), static_cast(frame->header.reserved3)), kWebSocketErrorProtocolError, "Invalid reserved bit"); return CHANNEL_DELETED; } // Respond to the frame appropriately to its type. return HandleFrameByState( opcode, frame->header.final, base::make_span(frame->payload, frame->header.payload_length)); } ChannelState WebSocketChannel::HandleFrameByState( const WebSocketFrameHeader::OpCode opcode, bool final, base::span payload) { DCHECK_NE(RECV_CLOSED, state_) << "HandleFrame() does not support being called re-entrantly from within " "SendClose()"; DCHECK_NE(CLOSED, state_); if (state_ == CLOSE_WAIT) { std::string frame_name; GetFrameTypeForOpcode(opcode, &frame_name); // FailChannel() won't send another Close frame. FailChannel(frame_name + " received after close", kWebSocketErrorProtocolError, ""); return CHANNEL_DELETED; } switch (opcode) { case WebSocketFrameHeader::kOpCodeText: // fall-thru case WebSocketFrameHeader::kOpCodeBinary: case WebSocketFrameHeader::kOpCodeContinuation: return HandleDataFrame(opcode, final, std::move(payload)); case WebSocketFrameHeader::kOpCodePing: DVLOG(1) << "Got Ping of size " << payload.size(); if (state_ == CONNECTED) { auto buffer = base::MakeRefCounted(payload.size()); memcpy(buffer->data(), payload.data(), payload.size()); return SendFrameInternal(true, WebSocketFrameHeader::kOpCodePong, std::move(buffer), payload.size()); } DVLOG(3) << "Ignored ping in state " << state_; return CHANNEL_ALIVE; case WebSocketFrameHeader::kOpCodePong: DVLOG(1) << "Got Pong of size " << payload.size(); // There is no need to do anything with pong messages. return CHANNEL_ALIVE; case WebSocketFrameHeader::kOpCodeClose: { uint16_t code = kWebSocketNormalClosure; std::string reason; std::string message; if (!ParseClose(payload, &code, &reason, &message)) { FailChannel(message, code, reason); return CHANNEL_DELETED; } // TODO(ricea): Find a way to safely log the message from the close // message (escape control codes and so on). return HandleCloseFrame(code, reason); } default: FailChannel(base::StringPrintf("Unrecognized frame opcode: %d", opcode), kWebSocketErrorProtocolError, "Unknown opcode"); return CHANNEL_DELETED; } } ChannelState WebSocketChannel::HandleDataFrame( WebSocketFrameHeader::OpCode opcode, bool final, base::span payload) { DVLOG(3) << "WebSocketChannel::HandleDataFrame opcode=" << opcode << ", final?" << final << ", data=" << (void*)payload.data() << ", size=" << payload.size(); if (state_ != CONNECTED) { DVLOG(3) << "Ignored data packet received in state " << state_; return CHANNEL_ALIVE; } if (has_received_close_frame_) { DVLOG(3) << "Ignored data packet as we've received a close frame."; return CHANNEL_ALIVE; } DCHECK(opcode == WebSocketFrameHeader::kOpCodeContinuation || opcode == WebSocketFrameHeader::kOpCodeText || opcode == WebSocketFrameHeader::kOpCodeBinary); const bool got_continuation = (opcode == WebSocketFrameHeader::kOpCodeContinuation); if (got_continuation != expecting_to_handle_continuation_) { const std::string console_log = got_continuation ? "Received unexpected continuation frame." : "Received start of new message but previous message is unfinished."; const std::string reason = got_continuation ? "Unexpected continuation" : "Previous data frame unfinished"; FailChannel(console_log, kWebSocketErrorProtocolError, reason); return CHANNEL_DELETED; } expecting_to_handle_continuation_ = !final; WebSocketFrameHeader::OpCode opcode_to_send = opcode; if (!initial_frame_forwarded_ && opcode == WebSocketFrameHeader::kOpCodeContinuation) { opcode_to_send = receiving_text_message_ ? WebSocketFrameHeader::kOpCodeText : WebSocketFrameHeader::kOpCodeBinary; } if (opcode == WebSocketFrameHeader::kOpCodeText || (opcode == WebSocketFrameHeader::kOpCodeContinuation && receiving_text_message_)) { // This call is not redundant when size == 0 because it tells us what // the current state is. StreamingUtf8Validator::State state = incoming_utf8_validator_.AddBytes( payload.data(), static_cast(payload.size())); if (state == StreamingUtf8Validator::INVALID || (state == StreamingUtf8Validator::VALID_MIDPOINT && final)) { FailChannel("Could not decode a text frame as UTF-8.", kWebSocketErrorProtocolError, "Invalid UTF-8 in text frame"); return CHANNEL_DELETED; } receiving_text_message_ = !final; DCHECK(!final || state == StreamingUtf8Validator::VALID_ENDPOINT); } if (payload.size() == 0U && !final) return CHANNEL_ALIVE; initial_frame_forwarded_ = !final; // Sends the received frame to the renderer process. event_interface_->OnDataFrame(final, opcode_to_send, payload); return CHANNEL_ALIVE; } ChannelState WebSocketChannel::HandleCloseFrame(uint16_t code, const std::string& reason) { DVLOG(1) << "Got Close with code " << code; switch (state_) { case CONNECTED: has_received_close_frame_ = true; received_close_code_ = code; received_close_reason_ = reason; if (event_interface_->HasPendingDataFrames()) { // We have some data to be sent to the renderer before sending this // frame. return CHANNEL_ALIVE; } return RespondToClosingHandshake(); case SEND_CLOSED: SetState(CLOSE_WAIT); DCHECK(close_timer_.IsRunning()); close_timer_.Stop(); // This use of base::Unretained() is safe because we stop the timer // in the destructor. close_timer_.Start(FROM_HERE, underlying_connection_close_timeout_, base::BindOnce(&WebSocketChannel::CloseTimeout, base::Unretained(this))); // From RFC6455 section 7.1.5: "Each endpoint // will see the status code sent by the other end as _The WebSocket // Connection Close Code_." has_received_close_frame_ = true; received_close_code_ = code; received_close_reason_ = reason; break; default: LOG(DFATAL) << "Got Close in unexpected state " << state_; break; } return CHANNEL_ALIVE; } ChannelState WebSocketChannel::RespondToClosingHandshake() { DCHECK(has_received_close_frame_); DCHECK_EQ(CONNECTED, state_); SetState(RECV_CLOSED); if (SendClose(received_close_code_, received_close_reason_) == CHANNEL_DELETED) return CHANNEL_DELETED; DCHECK_EQ(RECV_CLOSED, state_); SetState(CLOSE_WAIT); DCHECK(!close_timer_.IsRunning()); // This use of base::Unretained() is safe because we stop the timer // in the destructor. close_timer_.Start( FROM_HERE, underlying_connection_close_timeout_, base::BindOnce(&WebSocketChannel::CloseTimeout, base::Unretained(this))); event_interface_->OnClosingHandshake(); return CHANNEL_ALIVE; } ChannelState WebSocketChannel::SendFrameInternal( bool fin, WebSocketFrameHeader::OpCode op_code, scoped_refptr buffer, uint64_t buffer_size) { DCHECK(state_ == CONNECTED || state_ == RECV_CLOSED); DCHECK(stream_); auto frame = std::make_unique(op_code); WebSocketFrameHeader& header = frame->header; header.final = fin; header.masked = true; header.payload_length = buffer_size; frame->payload = buffer->data(); if (data_being_sent_) { // Either the link to the WebSocket server is saturated, or several messages // are being sent in a batch. if (!data_to_send_next_) data_to_send_next_ = std::make_unique(); data_to_send_next_->AddFrame(std::move(frame), std::move(buffer)); return CHANNEL_ALIVE; } data_being_sent_ = std::make_unique(); data_being_sent_->AddFrame(std::move(frame), std::move(buffer)); return WriteFrames(); } void WebSocketChannel::FailChannel(const std::string& message, uint16_t code, const std::string& reason) { DCHECK_NE(FRESHLY_CONSTRUCTED, state_); DCHECK_NE(CONNECTING, state_); DCHECK_NE(CLOSED, state_); stream_->GetNetLogWithSource().AddEvent( net::NetLogEventType::WEBSOCKET_INVALID_FRAME, [&] { return NetLogFailParam(code, reason, message); }); if (state_ == CONNECTED) { if (SendClose(code, reason) == CHANNEL_DELETED) return; } // Careful study of RFC6455 section 7.1.7 and 7.1.1 indicates the browser // should close the connection itself without waiting for the closing // handshake. stream_->Close(); SetState(CLOSED); event_interface_->OnFailChannel(message, ERR_FAILED, absl::nullopt); } ChannelState WebSocketChannel::SendClose(uint16_t code, const std::string& reason) { DCHECK(state_ == CONNECTED || state_ == RECV_CLOSED); DCHECK_LE(reason.size(), kMaximumCloseReasonLength); scoped_refptr body; uint64_t size = 0; if (code == kWebSocketErrorNoStatusReceived) { // Special case: translate kWebSocketErrorNoStatusReceived into a Close // frame with no payload. DCHECK(reason.empty()); body = base::MakeRefCounted(0); } else { const size_t payload_length = kWebSocketCloseCodeLength + reason.length(); body = base::MakeRefCounted(payload_length); size = payload_length; base::WriteBigEndian(body->data(), code); static_assert(sizeof(code) == kWebSocketCloseCodeLength, "they should both be two"); std::copy( reason.begin(), reason.end(), body->data() + kWebSocketCloseCodeLength); } return SendFrameInternal(true, WebSocketFrameHeader::kOpCodeClose, std::move(body), size); } bool WebSocketChannel::ParseClose(base::span payload, uint16_t* code, std::string* reason, std::string* message) { const uint64_t size = static_cast(payload.size()); reason->clear(); if (size < kWebSocketCloseCodeLength) { if (size == 0U) { *code = kWebSocketErrorNoStatusReceived; return true; } DVLOG(1) << "Close frame with payload size " << size << " received " << "(the first byte is " << std::hex << static_cast(payload.data()[0]) << ")"; *code = kWebSocketErrorProtocolError; *message = "Received a broken close frame containing an invalid size body."; return false; } const char* data = payload.data(); uint16_t unchecked_code = 0; base::ReadBigEndian(reinterpret_cast(data), &unchecked_code); static_assert(sizeof(unchecked_code) == kWebSocketCloseCodeLength, "they should both be two bytes"); switch (unchecked_code) { case kWebSocketErrorNoStatusReceived: case kWebSocketErrorAbnormalClosure: case kWebSocketErrorTlsHandshake: *code = kWebSocketErrorProtocolError; *message = "Received a broken close frame containing a reserved status code."; return false; default: *code = unchecked_code; break; } std::string text(data + kWebSocketCloseCodeLength, data + size); if (StreamingUtf8Validator::Validate(text)) { reason->swap(text); return true; } *code = kWebSocketErrorProtocolError; *reason = "Invalid UTF-8 in Close frame"; *message = "Received a broken close frame containing invalid UTF-8."; return false; } void WebSocketChannel::DoDropChannel(bool was_clean, uint16_t code, const std::string& reason) { event_interface_->OnDropChannel(was_clean, code, reason); } void WebSocketChannel::CloseTimeout() { stream_->GetNetLogWithSource().AddEvent( net::NetLogEventType::WEBSOCKET_CLOSE_TIMEOUT); stream_->Close(); SetState(CLOSED); DoDropChannel(false, kWebSocketErrorAbnormalClosure, ""); // |this| has been deleted. } } // namespace net