Skip to content
Projeler
Gruplar
Parçacıklar
Yardım
Yükleniyor...
Oturum aç / Kaydol
Gezinmeyi değiştir
C
cpython
Proje
Proje
Ayrıntılar
Etkinlik
Cycle Analytics
Depo (repository)
Depo (repository)
Dosyalar
Kayıtlar (commit)
Dallar (branch)
Etiketler
Katkıda bulunanlar
Grafik
Karşılaştır
Grafikler
Konular (issue)
0
Konular (issue)
0
Liste
Pano
Etiketler
Kilometre Taşları
Birleştirme (merge) Talepleri
0
Birleştirme (merge) Talepleri
0
CI / CD
CI / CD
İş akışları (pipeline)
İşler
Zamanlamalar
Grafikler
Paketler
Paketler
Wiki
Wiki
Parçacıklar
Parçacıklar
Üyeler
Üyeler
Collapse sidebar
Close sidebar
Etkinlik
Grafik
Grafikler
Yeni bir konu (issue) oluştur
İşler
Kayıtlar (commit)
Konu (issue) Panoları
Kenar çubuğunu aç
Batuhan Osman TASKAYA
cpython
Commits
5466bf1c
Kaydet (Commit)
5466bf1c
authored
Ara 18, 2010
tarafından
Senthil Kumaran
Dosyalara gözat
Seçenekler
Dosyalara Gözat
İndir
Eposta Yamaları
Sade Fark
Fix Issue6791 - Limit the HTTP header readline with _MAXLENGTH. Patch by Antoine Pitrou
üst
32e1771d
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
67 additions
and
8 deletions
+67
-8
client.py
Lib/http/client.py
+27
-6
server.py
Lib/http/server.py
+6
-2
test_httplib.py
Lib/test/test_httplib.py
+27
-0
test_httpservers.py
Lib/test/test_httpservers.py
+7
-0
No files found.
Lib/http/client.py
Dosyayı görüntüle @
5466bf1c
...
@@ -203,6 +203,9 @@ responses = {
...
@@ -203,6 +203,9 @@ responses = {
# maximal amount of data to read at one time in _safe_read
# maximal amount of data to read at one time in _safe_read
MAXAMOUNT
=
1048576
MAXAMOUNT
=
1048576
# maximal line length when calling readline().
_MAXLINE
=
65536
class
HTTPMessage
(
email
.
message
.
Message
):
class
HTTPMessage
(
email
.
message
.
Message
):
# XXX The only usage of this method is in
# XXX The only usage of this method is in
# http.server.CGIHTTPRequestHandler. Maybe move the code there so
# http.server.CGIHTTPRequestHandler. Maybe move the code there so
...
@@ -245,7 +248,9 @@ def parse_headers(fp, _class=HTTPMessage):
...
@@ -245,7 +248,9 @@ def parse_headers(fp, _class=HTTPMessage):
"""
"""
headers
=
[]
headers
=
[]
while
True
:
while
True
:
line
=
fp
.
readline
()
line
=
fp
.
readline
(
_MAXLINE
+
1
)
if
len
(
line
)
>
_MAXLINE
:
raise
LineTooLong
(
"header line"
)
headers
.
append
(
line
)
headers
.
append
(
line
)
if
line
in
(
b
'
\r\n
'
,
b
'
\n
'
,
b
''
):
if
line
in
(
b
'
\r\n
'
,
b
'
\n
'
,
b
''
):
break
break
...
@@ -299,7 +304,9 @@ class HTTPResponse(io.RawIOBase):
...
@@ -299,7 +304,9 @@ class HTTPResponse(io.RawIOBase):
self
.
will_close
=
_UNKNOWN
# conn will close at end of response
self
.
will_close
=
_UNKNOWN
# conn will close at end of response
def
_read_status
(
self
):
def
_read_status
(
self
):
line
=
str
(
self
.
fp
.
readline
(),
"iso-8859-1"
)
line
=
str
(
self
.
fp
.
readline
(
_MAXLINE
+
1
),
"iso-8859-1"
)
if
len
(
line
)
>
_MAXLINE
:
raise
LineTooLong
(
"status line"
)
if
self
.
debuglevel
>
0
:
if
self
.
debuglevel
>
0
:
print
(
"reply:"
,
repr
(
line
))
print
(
"reply:"
,
repr
(
line
))
if
not
line
:
if
not
line
:
...
@@ -340,7 +347,10 @@ class HTTPResponse(io.RawIOBase):
...
@@ -340,7 +347,10 @@ class HTTPResponse(io.RawIOBase):
break
break
# skip the header from the 100 response
# skip the header from the 100 response
while
True
:
while
True
:
skip
=
self
.
fp
.
readline
()
.
strip
()
skip
=
self
.
fp
.
readline
(
_MAXLINE
+
1
)
if
len
(
skip
)
>
_MAXLINE
:
raise
LineTooLong
(
"header line"
)
skip
=
skip
.
strip
()
if
not
skip
:
if
not
skip
:
break
break
if
self
.
debuglevel
>
0
:
if
self
.
debuglevel
>
0
:
...
@@ -508,7 +518,9 @@ class HTTPResponse(io.RawIOBase):
...
@@ -508,7 +518,9 @@ class HTTPResponse(io.RawIOBase):
value
=
[]
value
=
[]
while
True
:
while
True
:
if
chunk_left
is
None
:
if
chunk_left
is
None
:
line
=
self
.
fp
.
readline
()
line
=
self
.
fp
.
readline
(
_MAXLINE
+
1
)
if
len
(
line
)
>
_MAXLINE
:
raise
LineTooLong
(
"chunk size"
)
i
=
line
.
find
(
b
";"
)
i
=
line
.
find
(
b
";"
)
if
i
>=
0
:
if
i
>=
0
:
line
=
line
[:
i
]
# strip chunk-extensions
line
=
line
[:
i
]
# strip chunk-extensions
...
@@ -543,7 +555,9 @@ class HTTPResponse(io.RawIOBase):
...
@@ -543,7 +555,9 @@ class HTTPResponse(io.RawIOBase):
# read and discard trailer up to the CRLF terminator
# read and discard trailer up to the CRLF terminator
### note: we shouldn't have any trailers!
### note: we shouldn't have any trailers!
while
True
:
while
True
:
line
=
self
.
fp
.
readline
()
line
=
self
.
fp
.
readline
(
_MAXLINE
+
1
)
if
len
(
line
)
>
_MAXLINE
:
raise
LineTooLong
(
"trailer line"
)
if
not
line
:
if
not
line
:
# a vanishingly small number of sites EOF without
# a vanishingly small number of sites EOF without
# sending the trailer
# sending the trailer
...
@@ -692,7 +706,9 @@ class HTTPConnection:
...
@@ -692,7 +706,9 @@ class HTTPConnection:
raise
socket
.
error
(
"Tunnel connection failed:
%
d
%
s"
%
(
code
,
raise
socket
.
error
(
"Tunnel connection failed:
%
d
%
s"
%
(
code
,
message
.
strip
()))
message
.
strip
()))
while
True
:
while
True
:
line
=
response
.
fp
.
readline
()
line
=
response
.
fp
.
readline
(
_MAXLINE
+
1
)
if
len
(
line
)
>
_MAXLINE
:
raise
LineTooLong
(
"header line"
)
if
line
==
b
'
\r\n
'
:
if
line
==
b
'
\r\n
'
:
break
break
...
@@ -1137,5 +1153,10 @@ class BadStatusLine(HTTPException):
...
@@ -1137,5 +1153,10 @@ class BadStatusLine(HTTPException):
self
.
args
=
line
,
self
.
args
=
line
,
self
.
line
=
line
self
.
line
=
line
class
LineTooLong
(
HTTPException
):
def
__init__
(
self
,
line_type
):
HTTPException
.
__init__
(
self
,
"got more than
%
d bytes when reading
%
s"
%
(
_MAXLINE
,
line_type
))
# for backwards compatibility
# for backwards compatibility
error
=
HTTPException
error
=
HTTPException
Lib/http/server.py
Dosyayı görüntüle @
5466bf1c
...
@@ -314,8 +314,12 @@ class BaseHTTPRequestHandler(socketserver.StreamRequestHandler):
...
@@ -314,8 +314,12 @@ class BaseHTTPRequestHandler(socketserver.StreamRequestHandler):
self
.
command
,
self
.
path
,
self
.
request_version
=
command
,
path
,
version
self
.
command
,
self
.
path
,
self
.
request_version
=
command
,
path
,
version
# Examine the headers and look for a Connection directive.
# Examine the headers and look for a Connection directive.
self
.
headers
=
http
.
client
.
parse_headers
(
self
.
rfile
,
try
:
_class
=
self
.
MessageClass
)
self
.
headers
=
http
.
client
.
parse_headers
(
self
.
rfile
,
_class
=
self
.
MessageClass
)
except
http
.
client
.
LineTooLong
:
self
.
send_error
(
400
,
"Line too long"
)
return
False
conntype
=
self
.
headers
.
get
(
'Connection'
,
""
)
conntype
=
self
.
headers
.
get
(
'Connection'
,
""
)
if
conntype
.
lower
()
==
'close'
:
if
conntype
.
lower
()
==
'close'
:
...
...
Lib/test/test_httplib.py
Dosyayı görüntüle @
5466bf1c
...
@@ -317,6 +317,33 @@ class BasicTest(TestCase):
...
@@ -317,6 +317,33 @@ class BasicTest(TestCase):
self
.
assertEqual
(
"Basic realm=
\"
example
\"
"
,
self
.
assertEqual
(
"Basic realm=
\"
example
\"
"
,
resp
.
getheader
(
"www-authenticate"
))
resp
.
getheader
(
"www-authenticate"
))
# Test lines overflowing the max line size (_MAXLINE in http.client)
def
test_overflowing_status_line
(
self
):
body
=
"HTTP/1.1 200 Ok"
+
"k"
*
65536
+
"
\r\n
"
resp
=
client
.
HTTPResponse
(
FakeSocket
(
body
))
self
.
assertRaises
((
client
.
LineTooLong
,
client
.
BadStatusLine
),
resp
.
begin
)
def
test_overflowing_header_line
(
self
):
body
=
(
'HTTP/1.1 200 OK
\r\n
'
'X-Foo: bar'
+
'r'
*
65536
+
'
\r\n\r\n
'
)
resp
=
client
.
HTTPResponse
(
FakeSocket
(
body
))
self
.
assertRaises
(
client
.
LineTooLong
,
resp
.
begin
)
def
test_overflowing_chunked_line
(
self
):
body
=
(
'HTTP/1.1 200 OK
\r\n
'
'Transfer-Encoding: chunked
\r\n\r\n
'
+
'0'
*
65536
+
'a
\r\n
'
'hello world
\r\n
'
'0
\r\n
'
)
resp
=
client
.
HTTPResponse
(
FakeSocket
(
body
))
resp
.
begin
()
self
.
assertRaises
(
client
.
LineTooLong
,
resp
.
read
)
class
OfflineTest
(
TestCase
):
class
OfflineTest
(
TestCase
):
def
test_responses
(
self
):
def
test_responses
(
self
):
self
.
assertEqual
(
client
.
responses
[
client
.
NOT_FOUND
],
"Not Found"
)
self
.
assertEqual
(
client
.
responses
[
client
.
NOT_FOUND
],
"Not Found"
)
...
...
Lib/test/test_httpservers.py
Dosyayı görüntüle @
5466bf1c
...
@@ -573,6 +573,13 @@ class BaseHTTPRequestHandlerTestCase(unittest.TestCase):
...
@@ -573,6 +573,13 @@ class BaseHTTPRequestHandlerTestCase(unittest.TestCase):
self
.
assertEqual
(
result
[
0
],
b
'HTTP/1.1 414 Request-URI Too Long
\r\n
'
)
self
.
assertEqual
(
result
[
0
],
b
'HTTP/1.1 414 Request-URI Too Long
\r\n
'
)
self
.
assertFalse
(
self
.
handler
.
get_called
)
self
.
assertFalse
(
self
.
handler
.
get_called
)
def
test_header_length
(
self
):
# Issue #6791: same for headers
result
=
self
.
send_typical_request
(
b
'GET / HTTP/1.1
\r\n
X-Foo: bar'
+
b
'r'
*
65537
+
b
'
\r\n\r\n
'
)
self
.
assertEqual
(
result
[
0
],
b
'HTTP/1.1 400 Line too long
\r\n
'
)
self
.
assertFalse
(
self
.
handler
.
get_called
)
class
SimpleHTTPRequestHandlerTestCase
(
unittest
.
TestCase
):
class
SimpleHTTPRequestHandlerTestCase
(
unittest
.
TestCase
):
""" Test url parsing """
""" Test url parsing """
def
setUp
(
self
):
def
setUp
(
self
):
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment