aboutsummaryrefslogtreecommitdiff
path: root/Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs
diff options
context:
space:
mode:
authorClaus Vium <clausvium@gmail.com>2019-02-25 23:34:32 +0100
committerClaus Vium <clausvium@gmail.com>2019-02-26 22:11:21 +0100
commit852460b99155e015ed5f1d7ad2fab0281bfdfbec (patch)
treebedbe59bfef06ce6acf8c774622545c0dc7549a4 /Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs
parent33b67a357fe73103f046b822d7cc66fc5318a9ef (diff)
kestrel init
Diffstat (limited to 'Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs')
-rw-r--r--Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs539
1 files changed, 539 insertions, 0 deletions
diff --git a/Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs b/Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs
new file mode 100644
index 000000000..facc54446
--- /dev/null
+++ b/Emby.Server.Implementations/SocketSharp/WebSocketSharpRequest.cs
@@ -0,0 +1,539 @@
+using System;
+using System.Collections.Generic;
+using System.Globalization;
+using System.IO;
+using System.Net;
+using System.Text;
+using Emby.Server.Implementations.HttpServer;
+using MediaBrowser.Model.Services;
+using Microsoft.AspNetCore.Http;
+using Microsoft.Extensions.Logging;
+using Microsoft.Extensions.Primitives;
+using Microsoft.Net.Http.Headers;
+using SocketHttpListener.Net;
+using IHttpFile = MediaBrowser.Model.Services.IHttpFile;
+using IHttpRequest = MediaBrowser.Model.Services.IHttpRequest;
+using IHttpResponse = MediaBrowser.Model.Services.IHttpResponse;
+using IResponse = MediaBrowser.Model.Services.IResponse;
+
+namespace Emby.Server.Implementations.SocketSharp
+{
+ public partial class WebSocketSharpRequest : IHttpRequest
+ {
+ private readonly HttpRequest request;
+ private readonly IHttpResponse response;
+
+ public WebSocketSharpRequest(HttpRequest httpContext, HttpResponse response, string operationName, ILogger logger)
+ {
+ this.OperationName = operationName;
+ this.request = httpContext;
+ this.response = new WebSocketSharpResponse(logger, response, this);
+
+ // HandlerFactoryPath = GetHandlerPathIfAny(UrlPrefixes[0]);
+ }
+
+ public HttpRequest HttpRequest => request;
+
+ public object OriginalRequest => request;
+
+ public IResponse Response => response;
+
+ public IHttpResponse HttpResponse => response;
+
+ public string OperationName { get; set; }
+
+ public object Dto { get; set; }
+
+ public string RawUrl => request.Path.ToUriComponent();
+
+ public string AbsoluteUri => request.Path.ToUriComponent().TrimEnd('/');
+
+ public string UserHostAddress => "";
+
+ public string XForwardedFor
+ => StringValues.IsNullOrEmpty(request.Headers["X-Forwarded-For"]) ? null : request.Headers["X-Forwarded-For"].ToString();
+
+ public int? XForwardedPort
+ => StringValues.IsNullOrEmpty(request.Headers["X-Forwarded-Port"]) ? (int?)null : int.Parse(request.Headers["X-Forwarded-Port"], CultureInfo.InvariantCulture);
+
+ public string XForwardedProtocol => StringValues.IsNullOrEmpty(request.Headers["X-Forwarded-Proto"]) ? null : request.Headers["X-Forwarded-Proto"].ToString();
+
+ public string XRealIp => StringValues.IsNullOrEmpty(request.Headers["X-Real-IP"]) ? null : request.Headers["X-Real-IP"].ToString();
+
+ private string remoteIp;
+
+ public string RemoteIp =>
+ remoteIp ??
+ (remoteIp = CheckBadChars(XForwardedFor) ??
+ NormalizeIp(CheckBadChars(XRealIp) ??
+ (string.IsNullOrEmpty(request.Host.Host) ? null : NormalizeIp(request.Host.Host))));
+
+ private static readonly char[] HttpTrimCharacters = new char[] { (char)0x09, (char)0xA, (char)0xB, (char)0xC, (char)0xD, (char)0x20 };
+
+ // CheckBadChars - throws on invalid chars to be not found in header name/value
+ internal static string CheckBadChars(string name)
+ {
+ if (name == null || name.Length == 0)
+ {
+ return name;
+ }
+
+ // VALUE check
+ // Trim spaces from both ends
+ name = name.Trim(HttpTrimCharacters);
+
+ // First, check for correctly formed multi-line value
+ // Second, check for absence of CTL characters
+ int crlf = 0;
+ for (int i = 0; i < name.Length; ++i)
+ {
+ char c = (char)(0x000000ff & (uint)name[i]);
+ switch (crlf)
+ {
+ case 0:
+ {
+ if (c == '\r')
+ {
+ crlf = 1;
+ }
+ else if (c == '\n')
+ {
+ // Technically this is bad HTTP. But it would be a breaking change to throw here.
+ // Is there an exploit?
+ crlf = 2;
+ }
+ else if (c == 127 || (c < ' ' && c != '\t'))
+ {
+ throw new ArgumentException("net_WebHeaderInvalidControlChars");
+ }
+
+ break;
+ }
+
+ case 1:
+ {
+ if (c == '\n')
+ {
+ crlf = 2;
+ break;
+ }
+
+ throw new ArgumentException("net_WebHeaderInvalidCRLFChars");
+ }
+
+ case 2:
+ {
+ if (c == ' ' || c == '\t')
+ {
+ crlf = 0;
+ break;
+ }
+
+ throw new ArgumentException("net_WebHeaderInvalidCRLFChars");
+ }
+ }
+ }
+
+ if (crlf != 0)
+ {
+ throw new ArgumentException("net_WebHeaderInvalidCRLFChars");
+ }
+
+ return name;
+ }
+
+ internal static bool ContainsNonAsciiChars(string token)
+ {
+ for (int i = 0; i < token.Length; ++i)
+ {
+ if ((token[i] < 0x20) || (token[i] > 0x7e))
+ {
+ return true;
+ }
+ }
+
+ return false;
+ }
+
+ private string NormalizeIp(string ip)
+ {
+ if (!string.IsNullOrWhiteSpace(ip))
+ {
+ // Handle ipv4 mapped to ipv6
+ const string srch = "::ffff:";
+ var index = ip.IndexOf(srch, StringComparison.OrdinalIgnoreCase);
+ if (index == 0)
+ {
+ ip = ip.Substring(srch.Length);
+ }
+ }
+
+ return ip;
+ }
+
+ public bool IsSecureConnection => request.IsHttps || XForwardedProtocol == "https";
+
+ public string[] AcceptTypes => request.Headers.GetCommaSeparatedValues(HeaderNames.Accept);
+
+ private Dictionary<string, object> items;
+ public Dictionary<string, object> Items => items ?? (items = new Dictionary<string, object>());
+
+ private string responseContentType;
+ public string ResponseContentType
+ {
+ get =>
+ responseContentType
+ ?? (responseContentType = GetResponseContentType(HttpRequest));
+ set => this.responseContentType = value;
+ }
+
+ public const string FormUrlEncoded = "application/x-www-form-urlencoded";
+ public const string MultiPartFormData = "multipart/form-data";
+ public static string GetResponseContentType(HttpRequest httpReq)
+ {
+ var specifiedContentType = GetQueryStringContentType(httpReq);
+ if (!string.IsNullOrEmpty(specifiedContentType))
+ {
+ return specifiedContentType;
+ }
+
+ const string serverDefaultContentType = "application/json";
+
+ var acceptContentTypes = httpReq.Headers.GetCommaSeparatedValues(HeaderNames.Accept); // TODO;
+ string defaultContentType = null;
+ if (HasAnyOfContentTypes(httpReq, FormUrlEncoded, MultiPartFormData))
+ {
+ defaultContentType = serverDefaultContentType;
+ }
+
+ var acceptsAnything = false;
+ var hasDefaultContentType = defaultContentType != null;
+ if (acceptContentTypes != null)
+ {
+ foreach (var acceptsType in acceptContentTypes)
+ {
+ // TODO: @bond move to Span when Span.Split lands
+ // https://github.com/dotnet/corefx/issues/26528
+ var contentType = acceptsType?.Split(';')[0].Trim();
+ acceptsAnything = contentType.Equals("*/*", StringComparison.OrdinalIgnoreCase);
+
+ if (acceptsAnything)
+ {
+ break;
+ }
+ }
+
+ if (acceptsAnything)
+ {
+ if (hasDefaultContentType)
+ {
+ return defaultContentType;
+ }
+ else
+ {
+ return serverDefaultContentType;
+ }
+ }
+ }
+
+ if (acceptContentTypes == null && httpReq.ContentType == Soap11)
+ {
+ return Soap11;
+ }
+
+ // We could also send a '406 Not Acceptable', but this is allowed also
+ return serverDefaultContentType;
+ }
+
+ public const string Soap11 = "text/xml; charset=utf-8";
+
+ public static bool HasAnyOfContentTypes(HttpRequest request, params string[] contentTypes)
+ {
+ if (contentTypes == null || request.ContentType == null)
+ {
+ return false;
+ }
+
+ foreach (var contentType in contentTypes)
+ {
+ if (IsContentType(request, contentType))
+ {
+ return true;
+ }
+ }
+
+ return false;
+ }
+
+ public static bool IsContentType(HttpRequest request, string contentType)
+ {
+ return request.ContentType.StartsWith(contentType, StringComparison.OrdinalIgnoreCase);
+ }
+
+ private static string GetQueryStringContentType(HttpRequest httpReq)
+ {
+ string format = httpReq.Query["format"];
+ if (format == null)
+ {
+ const int formatMaxLength = 4;
+ string pi = httpReq.Path.ToString();
+ if (pi == null || pi.Length <= formatMaxLength)
+ {
+ return null;
+ }
+
+ if (pi[0] == '/')
+ {
+ pi = pi.Substring(1);
+ }
+
+ format = LeftPart(pi, '/');
+ if (format.Length > formatMaxLength)
+ {
+ return null;
+ }
+ }
+
+ format = LeftPart(format, '.');
+ if (format.ToLower().Contains("json"))
+ {
+ return "application/json";
+ }
+ else if (format.ToLower().Contains("xml"))
+ {
+ return "application/xml";
+ }
+
+ return null;
+ }
+
+ public static string LeftPart(string strVal, char needle)
+ {
+ if (strVal == null)
+ {
+ return null;
+ }
+
+ var pos = strVal.IndexOf(needle.ToString(), StringComparison.Ordinal);
+ return pos == -1 ? strVal : strVal.Substring(0, pos);
+ }
+
+ public static ReadOnlySpan<string> LeftPart(ReadOnlySpan<string> strVal, char needle)
+ {
+ if (strVal == null)
+ {
+ return null;
+ }
+
+ var pos = strVal.IndexOf(needle.ToString());
+ return pos == -1 ? strVal : strVal.Slice(0, pos);
+ }
+
+ public static string HandlerFactoryPath;
+
+ private string pathInfo;
+ public string PathInfo
+ {
+ get
+ {
+ if (this.pathInfo == null)
+ {
+ var mode = HandlerFactoryPath;
+
+ var pos = request.Path.ToString().IndexOf("?", StringComparison.Ordinal);
+ if (pos != -1)
+ {
+ var path = request.Path.ToString().Substring(0, pos);
+ this.pathInfo = GetPathInfo(
+ path,
+ mode,
+ mode ?? string.Empty);
+ }
+ else
+ {
+ this.pathInfo = request.Path.ToString();
+ }
+
+ this.pathInfo = System.Net.WebUtility.UrlDecode(pathInfo);
+ this.pathInfo = NormalizePathInfo(pathInfo, mode);
+ }
+
+ return this.pathInfo;
+ }
+ }
+
+ private static string GetPathInfo(string fullPath, string mode, string appPath)
+ {
+ var pathInfo = ResolvePathInfoFromMappedPath(fullPath, mode);
+ if (!string.IsNullOrEmpty(pathInfo))
+ {
+ return pathInfo;
+ }
+
+ // Wildcard mode relies on this to work out the handlerPath
+ pathInfo = ResolvePathInfoFromMappedPath(fullPath, appPath);
+ if (!string.IsNullOrEmpty(pathInfo))
+ {
+ return pathInfo;
+ }
+
+ return fullPath;
+ }
+
+ private static string ResolvePathInfoFromMappedPath(string fullPath, string mappedPathRoot)
+ {
+ if (mappedPathRoot == null)
+ {
+ return null;
+ }
+
+ var sbPathInfo = new StringBuilder();
+ var fullPathParts = fullPath.Split('/');
+ var mappedPathRootParts = mappedPathRoot.Split('/');
+ var fullPathIndexOffset = mappedPathRootParts.Length - 1;
+ var pathRootFound = false;
+
+ for (var fullPathIndex = 0; fullPathIndex < fullPathParts.Length; fullPathIndex++)
+ {
+ if (pathRootFound)
+ {
+ sbPathInfo.Append("/" + fullPathParts[fullPathIndex]);
+ }
+ else if (fullPathIndex - fullPathIndexOffset >= 0)
+ {
+ pathRootFound = true;
+ for (var mappedPathRootIndex = 0; mappedPathRootIndex < mappedPathRootParts.Length; mappedPathRootIndex++)
+ {
+ if (!string.Equals(fullPathParts[fullPathIndex - fullPathIndexOffset + mappedPathRootIndex], mappedPathRootParts[mappedPathRootIndex], StringComparison.OrdinalIgnoreCase))
+ {
+ pathRootFound = false;
+ break;
+ }
+ }
+ }
+ }
+
+ if (!pathRootFound)
+ {
+ return null;
+ }
+
+ var path = sbPathInfo.ToString();
+ return path.Length > 1 ? path.TrimEnd('/') : "/";
+ }
+
+ private Dictionary<string, System.Net.Cookie> cookies;
+ public IDictionary<string, System.Net.Cookie> Cookies
+ {
+ get
+ {
+ if (cookies == null)
+ {
+ cookies = new Dictionary<string, System.Net.Cookie>();
+ foreach (var cookie in this.request.Cookies)
+ {
+ var httpCookie = cookie;
+ cookies[httpCookie.Key] = new Cookie(httpCookie.Key, httpCookie.Value, "", "");
+ }
+ }
+
+ return cookies;
+ }
+ }
+
+ public string UserAgent => request.Headers[HeaderNames.UserAgent];
+
+ public QueryParamCollection Headers => new QueryParamCollection(request.Headers);
+
+ private QueryParamCollection queryString;
+ public QueryParamCollection QueryString => queryString ?? (queryString = new QueryParamCollection(request.Query));
+
+ public bool IsLocal => true; // TODO
+
+ private string httpMethod;
+ public string HttpMethod =>
+ httpMethod
+ ?? (httpMethod = request.Method);
+
+ public string Verb => HttpMethod;
+
+ public string ContentType => request.ContentType;
+
+ private Encoding contentEncoding;
+ public Encoding ContentEncoding
+ {
+ get => contentEncoding ?? Encoding.GetEncoding(request.Headers[HeaderNames.ContentEncoding].ToString());
+ set => contentEncoding = value;
+ }
+
+ public Uri UrlReferrer => request.GetTypedHeaders().Referer;
+
+ public static Encoding GetEncoding(string contentTypeHeader)
+ {
+ var param = GetParameter(contentTypeHeader, "charset=");
+ if (param == null)
+ {
+ return null;
+ }
+
+ try
+ {
+ return Encoding.GetEncoding(param);
+ }
+ catch (ArgumentException)
+ {
+ return null;
+ }
+ }
+
+ public Stream InputStream => request.Body;
+
+ public long ContentLength => request.ContentLength ?? 0;
+
+ private IHttpFile[] httpFiles;
+ public IHttpFile[] Files
+ {
+ get
+ {
+ if (httpFiles == null)
+ {
+ if (files == null)
+ {
+ return httpFiles = Array.Empty<IHttpFile>();
+ }
+
+ httpFiles = new IHttpFile[files.Count];
+ var i = 0;
+ foreach (var pair in files)
+ {
+ var reqFile = pair.Value;
+ httpFiles[i] = new HttpFile
+ {
+ ContentType = reqFile.ContentType,
+ ContentLength = reqFile.ContentLength,
+ FileName = reqFile.FileName,
+ InputStream = reqFile.InputStream,
+ };
+ i++;
+ }
+ }
+
+ return httpFiles;
+ }
+ }
+
+ public static string NormalizePathInfo(string pathInfo, string handlerPath)
+ {
+ if (handlerPath != null)
+ {
+ var trimmed = pathInfo.TrimStart('/');
+ if (trimmed.StartsWith(handlerPath, StringComparison.OrdinalIgnoreCase))
+ {
+ return trimmed.Substring(handlerPath.Length);
+ }
+ }
+
+ return pathInfo;
+ }
+ }
+}