aboutsummaryrefslogtreecommitdiffstats
path: root/netlib
diff options
context:
space:
mode:
Diffstat (limited to 'netlib')
-rw-r--r--netlib/http_cookies.py197
-rw-r--r--netlib/odict.py35
-rw-r--r--netlib/utils.py3
-rw-r--r--netlib/websockets/__init__.py1
-rw-r--r--netlib/websockets/implementations.py80
-rw-r--r--netlib/websockets/websockets.py410
-rw-r--r--netlib/wsgi.py29
7 files changed, 736 insertions, 19 deletions
diff --git a/netlib/http_cookies.py b/netlib/http_cookies.py
new file mode 100644
index 00000000..dab95ed0
--- /dev/null
+++ b/netlib/http_cookies.py
@@ -0,0 +1,197 @@
+"""
+A flexible module for cookie parsing and manipulation.
+
+This module differs from usual standards-compliant cookie modules in a number of
+ways. We try to be as permissive as possible, and to retain even mal-formed
+information. Duplicate cookies are preserved in parsing, and can be set in
+formatting. We do attempt to escape and quote values where needed, but will not
+reject data that violate the specs.
+
+Parsing accepts the formats in RFC6265 and partially RFC2109 and RFC2965. We do
+not parse the comma-separated variant of Set-Cookie that allows multiple cookies
+to be set in a single header. Technically this should be feasible, but it turns
+out that violations of RFC6265 that makes the parsing problem indeterminate are
+much more common than genuine occurences of the multi-cookie variants.
+Serialization follows RFC6265.
+
+ http://tools.ietf.org/html/rfc6265
+ http://tools.ietf.org/html/rfc2109
+ http://tools.ietf.org/html/rfc2965
+"""
+
+# TODO
+# - Disallow LHS-only Cookie values
+
+import re
+
+import odict
+
+
+def _read_until(s, start, term):
+ """
+ Read until one of the characters in term is reached.
+ """
+ if start == len(s):
+ return "", start+1
+ for i in range(start, len(s)):
+ if s[i] in term:
+ return s[start:i], i
+ return s[start:i+1], i+1
+
+
+def _read_token(s, start):
+ """
+ Read a token - the LHS of a token/value pair in a cookie.
+ """
+ return _read_until(s, start, ";=")
+
+
+def _read_quoted_string(s, start):
+ """
+ start: offset to the first quote of the string to be read
+
+ A sort of loose super-set of the various quoted string specifications.
+
+ RFC6265 disallows backslashes or double quotes within quoted strings.
+ Prior RFCs use backslashes to escape. This leaves us free to apply
+ backslash escaping by default and be compatible with everything.
+ """
+ escaping = False
+ ret = []
+ # Skip the first quote
+ for i in range(start+1, len(s)):
+ if escaping:
+ ret.append(s[i])
+ escaping = False
+ elif s[i] == '"':
+ break
+ elif s[i] == "\\":
+ escaping = True
+ pass
+ else:
+ ret.append(s[i])
+ return "".join(ret), i+1
+
+
+def _read_value(s, start, delims):
+ """
+ Reads a value - the RHS of a token/value pair in a cookie.
+
+ special: If the value is special, commas are premitted. Else comma
+ terminates. This helps us support old and new style values.
+ """
+ if start >= len(s):
+ return "", start
+ elif s[start] == '"':
+ return _read_quoted_string(s, start)
+ else:
+ return _read_until(s, start, delims)
+
+
+def _read_pairs(s, off=0, specials=()):
+ """
+ Read pairs of lhs=rhs values.
+
+ off: start offset
+ specials: a lower-cased list of keys that may contain commas
+ """
+ vals = []
+ while 1:
+ lhs, off = _read_token(s, off)
+ lhs = lhs.lstrip()
+ if lhs:
+ rhs = None
+ if off < len(s):
+ if s[off] == "=":
+ rhs, off = _read_value(s, off+1, ";")
+ vals.append([lhs, rhs])
+ off += 1
+ if not off < len(s):
+ break
+ return vals, off
+
+
+def _has_special(s):
+ for i in s:
+ if i in '",;\\':
+ return True
+ o = ord(i)
+ if o < 0x21 or o > 0x7e:
+ return True
+ return False
+
+
+ESCAPE = re.compile(r"([\"\\])")
+
+
+def _format_pairs(lst, specials=(), sep="; "):
+ """
+ specials: A lower-cased list of keys that will not be quoted.
+ """
+ vals = []
+ for k, v in lst:
+ if v is None:
+ vals.append(k)
+ else:
+ if k.lower() not in specials and _has_special(v):
+ v = ESCAPE.sub(r"\\\1", v)
+ v = '"%s"'%v
+ vals.append("%s=%s"%(k, v))
+ return sep.join(vals)
+
+
+def _format_set_cookie_pairs(lst):
+ return _format_pairs(
+ lst,
+ specials = ("expires", "path")
+ )
+
+
+def _parse_set_cookie_pairs(s):
+ """
+ For Set-Cookie, we support multiple cookies as described in RFC2109.
+ This function therefore returns a list of lists.
+ """
+ pairs, off = _read_pairs(
+ s,
+ specials = ("expires", "path")
+ )
+ return pairs
+
+
+def parse_set_cookie_header(str):
+ """
+ Parse a Set-Cookie header value
+
+ Returns a (name, value, attrs) tuple, or None, where attrs is an
+ ODictCaseless set of attributes. No attempt is made to parse attribute
+ values - they are treated purely as strings.
+ """
+ pairs = _parse_set_cookie_pairs(str)
+ if pairs:
+ return pairs[0][0], pairs[0][1], odict.ODictCaseless(pairs[1:])
+
+
+def format_set_cookie_header(name, value, attrs):
+ """
+ Formats a Set-Cookie header value.
+ """
+ pairs = [[name, value]]
+ pairs.extend(attrs.lst)
+ return _format_set_cookie_pairs(pairs)
+
+
+def parse_cookie_header(str):
+ """
+ Parse a Cookie header value.
+ Returns a (possibly empty) ODict object.
+ """
+ pairs, off = _read_pairs(str)
+ return odict.ODict(pairs)
+
+
+def format_cookie_header(od):
+ """
+ Formats a Cookie header value.
+ """
+ return _format_pairs(od.lst)
diff --git a/netlib/odict.py b/netlib/odict.py
index 7a2f611b..dd738c55 100644
--- a/netlib/odict.py
+++ b/netlib/odict.py
@@ -13,7 +13,8 @@ def safe_subn(pattern, repl, target, *args, **kwargs):
class ODict(object):
"""
- A dictionary-like object for managing ordered (key, value) data.
+ A dictionary-like object for managing ordered (key, value) data. Think
+ about it as a convenient interface to a list of (key, value) tuples.
"""
def __init__(self, lst=None):
self.lst = lst or []
@@ -64,11 +65,20 @@ class ODict(object):
key, they are cleared.
"""
if isinstance(valuelist, basestring):
- raise ValueError("Expected list of values instead of string. Example: odict['Host'] = ['www.example.com']")
-
- new = self._filter_lst(k, self.lst)
- for i in valuelist:
- new.append([k, i])
+ raise ValueError(
+ "Expected list of values instead of string. "
+ "Example: odict['Host'] = ['www.example.com']"
+ )
+ kc = self._kconv(k)
+ new = []
+ for i in self.lst:
+ if self._kconv(i[0]) == kc:
+ if valuelist:
+ new.append([k, valuelist.pop(0)])
+ else:
+ new.append(i)
+ while valuelist:
+ new.append([k, valuelist.pop(0)])
self.lst = new
def __delitem__(self, k):
@@ -84,7 +94,7 @@ class ODict(object):
return False
def add(self, key, value):
- self.lst.append([key, str(value)])
+ self.lst.append([key, value])
def get(self, k, d=None):
if k in self:
@@ -108,10 +118,19 @@ class ODict(object):
lst = copy.deepcopy(self.lst)
return self.__class__(lst)
+ def extend(self, other):
+ """
+ Add the contents of other, preserving any duplicates.
+ """
+ self.lst.extend(other.lst)
+
def __repr__(self):
+ return repr(self.lst)
+
+ def format(self):
elements = []
for itm in self.lst:
- elements.append(itm[0] + ": " + itm[1])
+ elements.append(itm[0] + ": " + str(itm[1]))
elements.append("")
return "\r\n".join(elements)
diff --git a/netlib/utils.py b/netlib/utils.py
index 79077ac6..03a70977 100644
--- a/netlib/utils.py
+++ b/netlib/utils.py
@@ -8,6 +8,9 @@ def isascii(s):
return False
return True
+# best way to do it in python 2.x
+def bytes_to_int(i):
+ return int(i.encode('hex'), 16)
def cleanBin(s, fixspacing=False):
"""
diff --git a/netlib/websockets/__init__.py b/netlib/websockets/__init__.py
new file mode 100644
index 00000000..9b4faa33
--- /dev/null
+++ b/netlib/websockets/__init__.py
@@ -0,0 +1 @@
+from __future__ import (absolute_import, print_function, division)
diff --git a/netlib/websockets/implementations.py b/netlib/websockets/implementations.py
new file mode 100644
index 00000000..337c5496
--- /dev/null
+++ b/netlib/websockets/implementations.py
@@ -0,0 +1,80 @@
+from netlib import tcp
+from base64 import b64encode
+from StringIO import StringIO
+from . import websockets as ws
+import struct
+import SocketServer
+import os
+
+# Simple websocket client and servers that are used to exercise the functionality in websockets.py
+# These are *not* fully RFC6455 compliant
+
+class WebSocketsEchoHandler(tcp.BaseHandler):
+ def __init__(self, connection, address, server):
+ super(WebSocketsEchoHandler, self).__init__(connection, address, server)
+ self.handshake_done = False
+
+ def handle(self):
+ while True:
+ if not self.handshake_done:
+ self.handshake()
+ else:
+ self.read_next_message()
+
+ def read_next_message(self):
+ decoded = ws.Frame.from_byte_stream(self.rfile.read).decoded_payload
+ self.on_message(decoded)
+
+ def send_message(self, message):
+ frame = ws.Frame.default(message, from_client = False)
+ self.wfile.write(frame.safe_to_bytes())
+ self.wfile.flush()
+
+ def handshake(self):
+ client_hs = ws.read_handshake(self.rfile.read, 1)
+ key = ws.process_handshake_from_client(client_hs)
+ response = ws.create_server_handshake(key)
+ self.wfile.write(response)
+ self.wfile.flush()
+ self.handshake_done = True
+
+ def on_message(self, message):
+ if message is not None:
+ self.send_message(message)
+
+
+class WebSocketsClient(tcp.TCPClient):
+ def __init__(self, address, source_address=None):
+ super(WebSocketsClient, self).__init__(address, source_address)
+ self.version = "13"
+ self.client_nounce = ws.create_client_nounce()
+ self.resource = "/"
+
+ def connect(self):
+ super(WebSocketsClient, self).connect()
+
+ handshake = ws.create_client_handshake(
+ self.address.host,
+ self.address.port,
+ self.client_nounce,
+ self.version,
+ self.resource
+ )
+
+ self.wfile.write(handshake)
+ self.wfile.flush()
+
+ server_handshake = ws.read_handshake(self.rfile.read, 1)
+
+ server_nounce = ws.process_handshake_from_server(server_handshake, self.client_nounce)
+
+ if not server_nounce == ws.create_server_nounce(self.client_nounce):
+ self.close()
+
+ def read_next_message(self):
+ return ws.Frame.from_byte_stream(self.rfile.read).payload
+
+ def send_message(self, message):
+ frame = ws.Frame.default(message, from_client = True)
+ self.wfile.write(frame.safe_to_bytes())
+ self.wfile.flush()
diff --git a/netlib/websockets/websockets.py b/netlib/websockets/websockets.py
new file mode 100644
index 00000000..86d98caf
--- /dev/null
+++ b/netlib/websockets/websockets.py
@@ -0,0 +1,410 @@
+from __future__ import absolute_import
+
+import base64
+import hashlib
+import mimetools
+import StringIO
+import os
+import struct
+import io
+
+from .. import utils
+
+# Colleciton of utility functions that implement small portions of the RFC6455
+# WebSockets Protocol Useful for building WebSocket clients and servers.
+#
+# Emphassis is on readabilty, simplicity and modularity, not performance or
+# completeness
+#
+# This is a work in progress and does not yet contain all the utilites need to
+# create fully complient client/servers #
+# Spec: https://tools.ietf.org/html/rfc6455
+
+# The magic sha that websocket servers must know to prove they understand
+# RFC6455
+websockets_magic = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'
+
+
+class WebSocketFrameValidationException(Exception):
+ pass
+
+
+class Frame(object):
+ """
+ Represents one websockets frame.
+ Constructor takes human readable forms of the frame components
+ from_bytes() is also avaliable.
+
+ WebSockets Frame as defined in RFC6455
+
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-------+-+-------------+-------------------------------+
+ |F|R|R|R| opcode|M| Payload len | Extended payload length |
+ |I|S|S|S| (4) |A| (7) | (16/64) |
+ |N|V|V|V| |S| | (if payload len==126/127) |
+ | |1|2|3| |K| | |
+ +-+-+-+-+-------+-+-------------+ - - - - - - - - - - - - - - - +
+ | Extended payload length continued, if payload len == 127 |
+ + - - - - - - - - - - - - - - - +-------------------------------+
+ | |Masking-key, if MASK set to 1 |
+ +-------------------------------+-------------------------------+
+ | Masking-key (continued) | Payload Data |
+ +-------------------------------- - - - - - - - - - - - - - - - +
+ : Payload Data continued ... :
+ + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
+ | Payload Data continued ... |
+ +---------------------------------------------------------------+
+ """
+ def __init__(
+ self,
+ fin, # decmial integer 1 or 0
+ opcode, # decmial integer 1 - 4
+ mask_bit, # decimal integer 1 or 0
+ payload_length_code, # decimal integer 1 - 127
+ decoded_payload, # bytestring
+ rsv1 = 0, # decimal integer 1 or 0
+ rsv2 = 0, # decimal integer 1 or 0
+ rsv3 = 0, # decimal integer 1 or 0
+ payload = None, # bytestring
+ masking_key = None, # 32 bit byte string
+ actual_payload_length = None, # any decimal integer
+ ):
+ self.fin = fin
+ self.rsv1 = rsv1
+ self.rsv2 = rsv2
+ self.rsv3 = rsv3
+ self.opcode = opcode
+ self.mask_bit = mask_bit
+ self.payload_length_code = payload_length_code
+ self.masking_key = masking_key
+ self.payload = payload
+ self.decoded_payload = decoded_payload
+ self.actual_payload_length = actual_payload_length
+
+ @classmethod
+ def from_bytes(cls, bytestring):
+ """
+ Construct a websocket frame from an in-memory bytestring to construct
+ a frame from a stream of bytes, use from_byte_stream() directly
+ """
+ return cls.from_byte_stream(io.BytesIO(bytestring).read)
+
+ @classmethod
+ def default(cls, message, from_client = False):
+ """
+ Construct a basic websocket frame from some default values.
+ Creates a non-fragmented text frame.
+ """
+ length_code, actual_length = get_payload_length_pair(message)
+
+ if from_client:
+ mask_bit = 1
+ masking_key = random_masking_key()
+ payload = apply_mask(message, masking_key)
+ else:
+ mask_bit = 0
+ masking_key = None
+ payload = message
+
+ return cls(
+ fin = 1, # final frame
+ opcode = 1, # text
+ mask_bit = mask_bit,
+ payload_length_code = length_code,
+ payload = payload,
+ masking_key = masking_key,
+ decoded_payload = message,
+ actual_payload_length = actual_length
+ )
+
+ def is_valid(self):
+ """
+ Validate websocket frame invariants, call at anytime to ensure the
+ Frame has not been corrupted.
+ """
+ try:
+ assert 0 <= self.fin <= 1
+ assert 0 <= self.rsv1 <= 1
+ assert 0 <= self.rsv2 <= 1
+ assert 0 <= self.rsv3 <= 1
+ assert 1 <= self.opcode <= 4
+ assert 0 <= self.mask_bit <= 1
+ assert 1 <= self.payload_length_code <= 127
+
+ if self.mask_bit == 1:
+ assert 1 <= len(self.masking_key) <= 4
+ else:
+ assert self.masking_key is None
+
+ assert self.actual_payload_length == len(self.payload)
+
+ if self.payload is not None and self.masking_key is not None:
+ assert apply_mask(self.payload, self.masking_key) == self.decoded_payload
+
+ return True
+ except AssertionError:
+ return False
+
+ def human_readable(self):
+ return "\n".join([
+ ("fin - " + str(self.fin)),
+ ("rsv1 - " + str(self.rsv1)),
+ ("rsv2 - " + str(self.rsv2)),
+ ("rsv3 - " + str(self.rsv3)),
+ ("opcode - " + str(self.opcode)),
+ ("mask_bit - " + str(self.mask_bit)),
+ ("payload_length_code - " + str(self.payload_length_code)),
+ ("masking_key - " + str(self.masking_key)),
+ ("payload - " + str(self.payload)),
+ ("decoded_payload - " + str(self.decoded_payload)),
+ ("actual_payload_length - " + str(self.actual_payload_length))
+ ])
+
+ def safe_to_bytes(self):
+ if self.is_valid():
+ return self.to_bytes()
+ else:
+ raise WebSocketFrameValidationException()
+
+ def to_bytes(self):
+ """
+ Serialize the frame back into the wire format, returns a bytestring
+ If you haven't checked is_valid_frame() then there's no guarentees
+ that the serialized bytes will be correct. see safe_to_bytes()
+ """
+ max_16_bit_int = (1 << 16)
+ max_64_bit_int = (1 << 63)
+
+ # break down of the bit-math used to construct the first byte from the
+ # frame's integer values first shift the significant bit into the
+ # correct position
+ # 00000001 << 7 = 10000000
+ # ...
+ # then combine:
+ #
+ # 10000000 fin
+ # 01000000 res1
+ # 00100000 res2
+ # 00010000 res3
+ # 00000001 opcode
+ # -------- OR
+ # 11110001 = first_byte
+
+ first_byte = (self.fin << 7) | (self.rsv1 << 6) |\
+ (self.rsv2 << 4) | (self.rsv3 << 4) | self.opcode
+
+ second_byte = (self.mask_bit << 7) | self.payload_length_code
+
+ bytes = chr(first_byte) + chr(second_byte)
+
+ if self.actual_payload_length < 126:
+ pass
+ elif self.actual_payload_length < max_16_bit_int:
+ # '!H' pack as 16 bit unsigned short
+ # add 2 byte extended payload length
+ bytes += struct.pack('!H', self.actual_payload_length)
+ elif self.actual_payload_length < max_64_bit_int:
+ # '!Q' = pack as 64 bit unsigned long long
+ # add 8 bytes extended payload length
+ bytes += struct.pack('!Q', self.actual_payload_length)
+
+ if self.masking_key is not None:
+ bytes += self.masking_key
+
+ bytes += self.payload # already will be encoded if neccessary
+ return bytes
+
+ @classmethod
+ def from_byte_stream(cls, read_bytes):
+ """
+ read a websockets frame sent by a server or client
+
+ read_bytes is a function that can be backed
+ by sockets or by any byte reader. So this
+ function may be used to read frames from disk/wire/memory
+ """
+ first_byte = utils.bytes_to_int(read_bytes(1))
+ second_byte = utils.bytes_to_int(read_bytes(1))
+
+ # grab the left most bit
+ fin = first_byte >> 7
+ # grab right most 4 bits by and-ing with 00001111
+ opcode = first_byte & 15
+ # grab left most bit
+ mask_bit = second_byte >> 7
+ # grab the next 7 bits
+ payload_length = second_byte & 127
+
+ # payload_lengthy > 125 indicates you need to read more bytes
+ # to get the actual payload length
+ if payload_length <= 125:
+ actual_payload_length = payload_length
+
+ elif payload_length == 126:
+ actual_payload_length = utils.bytes_to_int(read_bytes(2))
+
+ elif payload_length == 127:
+ actual_payload_length = utils.bytes_to_int(read_bytes(8))
+
+ # masking key only present if mask bit set
+ if mask_bit == 1:
+ masking_key = read_bytes(4)
+ else:
+ masking_key = None
+
+ payload = read_bytes(actual_payload_length)
+
+ if mask_bit == 1:
+ decoded_payload = apply_mask(payload, masking_key)
+ else:
+ decoded_payload = payload
+
+ return cls(
+ fin = fin,
+ opcode = opcode,
+ mask_bit = mask_bit,
+ payload_length_code = payload_length,
+ payload = payload,
+ masking_key = masking_key,
+ decoded_payload = decoded_payload,
+ actual_payload_length = actual_payload_length
+ )
+
+ def __eq__(self, other):
+ return (
+ self.fin == other.fin and
+ self.rsv1 == other.rsv1 and
+ self.rsv2 == other.rsv2 and
+ self.rsv3 == other.rsv3 and
+ self.opcode == other.opcode and
+ self.mask_bit == other.mask_bit and
+ self.payload_length_code == other.payload_length_code and
+ self.masking_key == other.masking_key and
+ self.payload == other.payload and
+ self.decoded_payload == other.decoded_payload and
+ self.actual_payload_length == other.actual_payload_length
+ )
+
+
+def apply_mask(message, masking_key):
+ """
+ Data sent from the server must be masked to prevent malicious clients
+ from sending data over the wire in predictable patterns
+
+ This method both encodes and decodes strings with the provided mask
+
+ Servers do not have to mask data they send to the client.
+ https://tools.ietf.org/html/rfc6455#section-5.3
+ """
+ masks = [utils.bytes_to_int(byte) for byte in masking_key]
+ result = ""
+ for char in message:
+ result += chr(ord(char) ^ masks[len(result) % 4])
+ return result
+
+
+def random_masking_key():
+ return os.urandom(4)
+
+
+def create_client_handshake(host, port, key, version, resource):
+ """
+ WebSockets connections are intiated by the client with a valid HTTP
+ upgrade request
+ """
+ headers = [
+ ('Host', '%s:%s' % (host, port)),
+ ('Connection', 'Upgrade'),
+ ('Upgrade', 'websocket'),
+ ('Sec-WebSocket-Key', key),
+ ('Sec-WebSocket-Version', version)
+ ]
+ request = "GET %s HTTP/1.1" % resource
+ return build_handshake(headers, request)
+
+
+def create_server_handshake(key):
+ """
+ The server response is a valid HTTP 101 response.
+ """
+ headers = [
+ ('Connection', 'Upgrade'),
+ ('Upgrade', 'websocket'),
+ ('Sec-WebSocket-Accept', create_server_nounce(key))
+ ]
+ request = "HTTP/1.1 101 Switching Protocols"
+ return build_handshake(headers, request)
+
+
+def build_handshake(headers, request):
+ handshake = [request.encode('utf-8')]
+ for header, value in headers:
+ handshake.append(("%s: %s" % (header, value)).encode('utf-8'))
+ handshake.append(b'\r\n')
+ return b'\r\n'.join(handshake)
+
+
+def read_handshake(read_bytes, num_bytes_per_read):
+ """
+ From provided function that reads bytes, read in a
+ complete HTTP request, which terminates with a CLRF
+ """
+ response = b''
+ doubleCLRF = b'\r\n\r\n'
+ while True:
+ bytes = read_bytes(num_bytes_per_read)
+ if not bytes:
+ break
+ response += bytes
+ if doubleCLRF in response:
+ break
+ return response
+
+
+def get_payload_length_pair(payload_bytestring):
+ """
+ A websockets frame contains an initial length_code, and an optional
+ extended length code to represent the actual length if length code is
+ larger than 125
+ """
+ actual_length = len(payload_bytestring)
+
+ if actual_length <= 125:
+ length_code = actual_length
+ elif actual_length >= 126 and actual_length <= 65535:
+ length_code = 126
+ else:
+ length_code = 127
+ return (length_code, actual_length)
+
+
+def process_handshake_from_client(handshake):
+ headers = headers_from_http_message(handshake)
+ if headers.get("Upgrade", None) != "websocket":
+ return
+ key = headers['Sec-WebSocket-Key']
+ return key
+
+
+def process_handshake_from_server(handshake, client_nounce):
+ headers = headers_from_http_message(handshake)
+ if headers.get("Upgrade", None) != "websocket":
+ return
+ key = headers['Sec-WebSocket-Accept']
+ return key
+
+
+def headers_from_http_message(http_message):
+ return mimetools.Message(
+ StringIO.StringIO(http_message.split('\r\n', 1)[1])
+ )
+
+
+def create_server_nounce(client_nounce):
+ return base64.b64encode(
+ hashlib.sha1(client_nounce + websockets_magic).hexdigest().decode('hex')
+ )
+
+
+def create_client_nounce():
+ return base64.b64encode(os.urandom(16)).decode('utf-8')
diff --git a/netlib/wsgi.py b/netlib/wsgi.py
index bac27d5a..1b979608 100644
--- a/netlib/wsgi.py
+++ b/netlib/wsgi.py
@@ -1,5 +1,8 @@
from __future__ import (absolute_import, print_function, division)
-import cStringIO, urllib, time, traceback
+import cStringIO
+import urllib
+import time
+import traceback
from . import odict, tcp
@@ -23,15 +26,18 @@ class Request(object):
def date_time_string():
"""Return the current date and time formatted for a message header."""
WEEKS = ['Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat', 'Sun']
- MONTHS = [None,
- 'Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun',
- 'Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec']
+ MONTHS = [
+ None,
+ 'Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun',
+ 'Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec'
+ ]
now = time.time()
year, month, day, hh, mm, ss, wd, y, z = time.gmtime(now)
s = "%s, %02d %3s %4d %02d:%02d:%02d GMT" % (
- WEEKS[wd],
- day, MONTHS[month], year,
- hh, mm, ss)
+ WEEKS[wd],
+ day, MONTHS[month], year,
+ hh, mm, ss
+ )
return s
@@ -100,6 +106,7 @@ class WSGIAdaptor(object):
status = None,
headers = None
)
+
def write(data):
if not state["headers_sent"]:
soc.write("HTTP/1.1 %s\r\n"%state["status"])
@@ -108,7 +115,7 @@ class WSGIAdaptor(object):
h["Server"] = [self.sversion]
if 'date' not in h:
h["Date"] = [date_time_string()]
- soc.write(str(h))
+ soc.write(h.format())
soc.write("\r\n")
state["headers_sent"] = True
if data:
@@ -130,7 +137,9 @@ class WSGIAdaptor(object):
errs = cStringIO.StringIO()
try:
- dataiter = self.app(self.make_environ(request, errs, **env), start_response)
+ dataiter = self.app(
+ self.make_environ(request, errs, **env), start_response
+ )
for i in dataiter:
write(i)
if not state["headers_sent"]:
@@ -143,5 +152,3 @@ class WSGIAdaptor(object):
except Exception: # pragma: no cover
pass
return errs.getvalue()
-
-