Skip to content

Commit

Permalink
[3.1] Make LineTooLong exception more detailed about actual data size (
Browse files Browse the repository at this point in the history
…GH-2863)

(cherry picked from commit 6a60358)

Co-authored-by: Alexey Popravka <popravich@users.noreply.github.com>
  • Loading branch information
popravich authored and asvetlov committed Apr 5, 2018
1 parent db7dcb8 commit a35f3d7
Show file tree
Hide file tree
Showing 4 changed files with 136 additions and 41 deletions.
11 changes: 6 additions & 5 deletions aiohttp/_http_parser.pyx
Original file line number Diff line number Diff line change
Expand Up @@ -370,7 +370,7 @@ cdef int cb_on_url(cparser.http_parser* parser,
try:
if length > pyparser._max_line_size:
raise LineTooLong(
'Status line is too long', pyparser._max_line_size)
'Status line is too long', pyparser._max_line_size, length)
pyparser._buf.extend(at[:length])
except BaseException as ex:
pyparser._last_error = ex
Expand All @@ -386,7 +386,7 @@ cdef int cb_on_status(cparser.http_parser* parser,
try:
if length > pyparser._max_line_size:
raise LineTooLong(
'Status line is too long', pyparser._max_line_size)
'Status line is too long', pyparser._max_line_size, length)
pyparser._buf.extend(at[:length])
except BaseException as ex:
pyparser._last_error = ex
Expand All @@ -402,7 +402,7 @@ cdef int cb_on_header_field(cparser.http_parser* parser,
pyparser._on_status_complete()
if length > pyparser._max_field_size:
raise LineTooLong(
'Header name is too long', pyparser._max_field_size)
'Header name is too long', pyparser._max_field_size, length)
pyparser._on_header_field(
at[:length].decode('utf-8', 'surrogateescape'), at[:length])
except BaseException as ex:
Expand All @@ -419,10 +419,11 @@ cdef int cb_on_header_value(cparser.http_parser* parser,
if pyparser._header_value is not None:
if len(pyparser._header_value) + length > pyparser._max_field_size:
raise LineTooLong(
'Header value is too long', pyparser._max_field_size)
'Header value is too long', pyparser._max_field_size,
len(pyparser._header_value) + length)
elif length > pyparser._max_field_size:
raise LineTooLong(
'Header value is too long', pyparser._max_field_size)
'Header value is too long', pyparser._max_field_size, length)
pyparser._on_header_value(
at[:length].decode('utf-8', 'surrogateescape'), at[:length])
except BaseException as ex:
Expand Down
5 changes: 3 additions & 2 deletions aiohttp/http_exceptions.py
Original file line number Diff line number Diff line change
Expand Up @@ -59,9 +59,10 @@ class ContentLengthError(PayloadEncodingError):

class LineTooLong(BadHttpMessage):

def __init__(self, line, limit='Unknown'):
def __init__(self, line, limit='Unknown', actual_size='Unknown'):
super().__init__(
"Got more than %s bytes when reading %s." % (limit, line))
"Got more than %s bytes (%s) when reading %s." % (
limit, actual_size, line))


class InvalidHeader(BadHttpMessage):
Expand Down
44 changes: 27 additions & 17 deletions aiohttp/http_parser.py
Original file line number Diff line number Diff line change
Expand Up @@ -256,17 +256,24 @@ def parse_headers(self, lines):
line_count = len(lines)

while line:
header_length = len(line)

# Parse initial header name : value pair.
try:
bname, bvalue = line.split(b':', 1)
except ValueError:
raise InvalidHeader(line) from None

bname = bname.strip(b' \t')
bvalue = bvalue.lstrip()
if HDRRE.search(bname):
raise InvalidHeader(bname)
if len(bname) > self.max_field_size:
raise LineTooLong(
"request header name {}".format(
bname.decode("utf8", "xmlcharrefreplace")),
self.max_field_size,
len(bname))

header_length = len(bvalue)

# next line
lines_idx += 1
Expand All @@ -283,7 +290,8 @@ def parse_headers(self, lines):
raise LineTooLong(
'request header field {}'.format(
bname.decode("utf8", "xmlcharrefreplace")),
self.max_field_size)
self.max_field_size,
header_length)
bvalue.append(line)

# next line
Expand All @@ -301,7 +309,8 @@ def parse_headers(self, lines):
raise LineTooLong(
'request header field {}'.format(
bname.decode("utf8", "xmlcharrefreplace")),
self.max_field_size)
self.max_field_size,
header_length)

bvalue = bvalue.strip()
name = bname.decode('utf-8', 'surrogateescape')
Expand Down Expand Up @@ -349,17 +358,17 @@ class HttpRequestParserPy(HttpParser):
"""

def parse_message(self, lines):
if len(lines[0]) > self.max_line_size:
raise LineTooLong(
'Status line is too long', self.max_line_size)

# request line
line = lines[0].decode('utf-8', 'surrogateescape')
try:
method, path, version = line.split(None, 2)
except ValueError:
raise BadStatusLine(line) from None

if len(path) > self.max_line_size:
raise LineTooLong(
'Status line is too long', self.max_line_size, len(path))

# method
method = method.upper()
if not METHRE.match(method):
Expand Down Expand Up @@ -397,20 +406,21 @@ class HttpResponseParserPy(HttpParser):
Returns RawResponseMessage"""

def parse_message(self, lines):
if len(lines[0]) > self.max_line_size:
raise LineTooLong(
'Status line is too long', self.max_line_size)

line = lines[0].decode('utf-8', 'surrogateescape')
try:
version, status = line.split(None, 1)
except ValueError:
raise BadStatusLine(line) from None
else:
try:
status, reason = status.split(None, 1)
except ValueError:
reason = ''

try:
status, reason = status.split(None, 1)
except ValueError:
reason = ''

if len(reason) > self.max_line_size:
raise LineTooLong(
'Status line is too long', self.max_line_size,
len(reason))

# version
match = VERSRE.match(version)
Expand Down
117 changes: 100 additions & 17 deletions tests/test_http_parser.py
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,10 @@ def protocol():
@pytest.fixture(params=REQUEST_PARSERS)
def parser(loop, protocol, request):
"""Parser implementations"""
return request.param(protocol, loop, 8190, 32768, 8190)
return request.param(protocol, loop,
max_line_size=8190,
max_headers=32768,
max_field_size=8190)


@pytest.fixture(params=REQUEST_PARSERS)
Expand All @@ -50,7 +53,10 @@ def request_cls(request):
@pytest.fixture(params=RESPONSE_PARSERS)
def response(loop, protocol, request):
"""Parser implementations"""
return request.param(protocol, loop, 8190, 32768, 8190)
return request.param(protocol, loop,
max_line_size=8190,
max_headers=32768,
max_field_size=8190)


@pytest.fixture(params=RESPONSE_PARSERS)
Expand Down Expand Up @@ -358,32 +364,82 @@ def test_invalid_name(parser):
parser.feed_data(text)


def test_max_header_field_size(parser):
name = b'test' * 10 * 1024
@pytest.mark.parametrize('size', [40960, 8191])
def test_max_header_field_size(parser, size):
name = b't' * size
text = (b'GET /test HTTP/1.1\r\n' + name + b':data\r\n\r\n')

with pytest.raises(http_exceptions.LineTooLong):
match = ("400, message='Got more than 8190 bytes \({}\) when reading"
.format(size))
with pytest.raises(http_exceptions.LineTooLong, match=match):
parser.feed_data(text)


def test_max_header_value_size(parser):
name = b'test' * 10 * 1024
def test_max_header_field_size_under_limit(parser):
name = b't' * 8190
text = (b'GET /test HTTP/1.1\r\n' + name + b':data\r\n\r\n')

messages, upgrade, tail = parser.feed_data(text)
msg = messages[0][0]
assert msg == (
'GET', '/test', (1, 1),
CIMultiDict({name.decode(): 'data'}),
((name, b'data'),),
False, None, False, False, URL('/test'))


@pytest.mark.parametrize('size', [40960, 8191])
def test_max_header_value_size(parser, size):
name = b't' * size
text = (b'GET /test HTTP/1.1\r\n'
b'data:' + name + b'\r\n\r\n')

with pytest.raises(http_exceptions.LineTooLong):
match = ("400, message='Got more than 8190 bytes \({}\) when reading"
.format(size))
with pytest.raises(http_exceptions.LineTooLong, match=match):
parser.feed_data(text)


def test_max_header_value_size_continuation(parser):
name = b'test' * 10 * 1024
def test_max_header_value_size_under_limit(parser):
value = b'A' * 8190
text = (b'GET /test HTTP/1.1\r\n'
b'data:' + value + b'\r\n\r\n')

messages, upgrade, tail = parser.feed_data(text)
msg = messages[0][0]
assert msg == (
'GET', '/test', (1, 1),
CIMultiDict({'data': value.decode()}),
((b'data', value),),
False, None, False, False, URL('/test'))


@pytest.mark.parametrize('size', [40965, 8191])
def test_max_header_value_size_continuation(parser, size):
name = b'T' * (size - 5)
text = (b'GET /test HTTP/1.1\r\n'
b'data: test\r\n ' + name + b'\r\n\r\n')

with pytest.raises(http_exceptions.LineTooLong):
match = ("400, message='Got more than 8190 bytes \({}\) when reading"
.format(size))
with pytest.raises(http_exceptions.LineTooLong, match=match):
parser.feed_data(text)


def test_max_header_value_size_continuation_under_limit(parser):
value = b'A' * 8185
text = (b'GET /test HTTP/1.1\r\n'
b'data: test\r\n ' + value + b'\r\n\r\n')

messages, upgrade, tail = parser.feed_data(text)
msg = messages[0][0]
assert msg == (
'GET', '/test', (1, 1),
CIMultiDict({'data': 'test ' + value.decode()}),
((b'data', b'test ' + value),),
False, None, False, False, URL('/test'))


def test_http_request_parser(parser):
text = b'GET /path HTTP/1.1\r\n\r\n'
messages, upgrade, tail = parser.feed_data(text)
Expand Down Expand Up @@ -452,10 +508,23 @@ def test_http_request_parser_bad_version(parser):
parser.feed_data(b'GET //get HT/11\r\n\r\n')


def test_http_request_max_status_line(parser):
with pytest.raises(http_exceptions.LineTooLong):
@pytest.mark.parametrize('size', [40965, 8191])
def test_http_request_max_status_line(parser, size):
path = b't' * (size - 5)
match = ("400, message='Got more than 8190 bytes \({}\) when reading"
.format(size))
with pytest.raises(http_exceptions.LineTooLong, match=match):
parser.feed_data(
b'GET /path' + b'test' * 10 * 1024 + b' HTTP/1.1\r\n\r\n')
b'GET /path' + path + b' HTTP/1.1\r\n\r\n')


def test_http_request_max_status_line_under_limit(parser):
path = b't' * (8190 - 5)
messages, upgraded, tail = parser.feed_data(
b'GET /path' + path + b' HTTP/1.1\r\n\r\n')
msg = messages[0][0]
assert msg == ('GET', '/path' + path.decode(), (1, 1), CIMultiDict(), (),
False, None, False, False, URL('/path' + path.decode()))


def test_http_response_parser_utf8(response):
Expand All @@ -474,10 +543,24 @@ def test_http_response_parser_utf8(response):
assert not tail


def test_http_response_parser_bad_status_line_too_long(response):
with pytest.raises(http_exceptions.LineTooLong):
@pytest.mark.parametrize('size', [40962, 8191])
def test_http_response_parser_bad_status_line_too_long(response, size):
reason = b't' * (size - 2)
match = ("400, message='Got more than 8190 bytes \({}\) when reading"
.format(size))
with pytest.raises(http_exceptions.LineTooLong, match=match):
response.feed_data(
b'HTTP/1.1 200 Ok' + b'test' * 10 * 1024 + b'\r\n\r\n')
b'HTTP/1.1 200 Ok' + reason + b'\r\n\r\n')


def test_http_response_parser_status_line_under_limit(response):
reason = b'O' * 8190
messages, upgraded, tail = response.feed_data(
b'HTTP/1.1 200 ' + reason + b'\r\n\r\n')
msg = messages[0][0]
assert msg.version == (1, 1)
assert msg.code == 200
assert msg.reason == reason.decode()


def test_http_response_parser_bad_version(response):
Expand Down

0 comments on commit a35f3d7

Please sign in to comment.