blob: bb752a68943b855073432cc7280e986738c8b26e [file]
// Copyright 2026 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build !nethttpomithttp2
package http
import (
"context"
"crypto/tls"
"errors"
"io"
"log"
"net"
"net/http/internal/http2"
"time"
_ "unsafe" // for go:linkname
)
// net/http supports HTTP/2 by default, but this support is removed when
// the nethttpomithttp2 build tag is set.
//
// HTTP/2 support is provided by the net/http/internal/http2 package.
//
// This file (http2.go) connects net/http to the http2 package.
// Since http imports http2, to avoid an import cycle we need to
// translate http package types (e.g., Request) into the equivalent
// http2 package types (e.g., http2.ClientRequest).
//
// The golang.org/x/net/http2 package is the original source of truth for
// the HTTP/2 implementation. At this time, users may still import that
// package and register its implementation on a net/http Transport or Server.
// However, the x/net package is no longer synchronized with std.
func init() {
// NoBody and LocalAddrContextKey need to have the same value
// in the http and http2 packages.
//
// We can't define these values in net/http/internal,
// because their concrete types are part of the net/http API and
// moving them causes API checker failures.
// Override the http2 package versions at init time instead.
http2.LocalAddrContextKey = LocalAddrContextKey
http2.NoBody = NoBody
}
type http2Server = http2.Server
type http2Transport = http2.Transport
func (s *Server) configureHTTP2() {
h2srv := &http2.Server{}
// Historically, we've configured the HTTP/2 idle timeout in this fashion:
// Set once at configuration time.
if s.IdleTimeout != 0 {
s.h2IdleTimeout = s.IdleTimeout
} else {
s.h2IdleTimeout = s.ReadTimeout
}
if s.TLSConfig == nil {
s.TLSConfig = &tls.Config{}
}
s.nextProtoErr = h2srv.Configure(http2ServerConfig{s}, s.TLSConfig)
if s.nextProtoErr != nil {
return
}
s.RegisterOnShutdown(h2srv.GracefulShutdown)
if s.TLSNextProto == nil {
s.TLSNextProto = make(map[string]func(*Server, *tls.Conn, Handler))
}
// Historically, the presence of a TLSNextProto["h2"] key has been the signal to
// enable/disable HTTP/2 support. Set a value in the map, but we'll never use it.
s.TLSNextProto["h2"] = func(hs *Server, c *tls.Conn, h Handler) {
c.Close()
}
s.h2 = h2srv
}
func (s *Server) setHTTP2Config(conf http2ExternalServerConfig) {
if s.h2Config != nil {
panic("http: HTTP/2 Server already registered")
}
s.h2Config = conf
s.h2Config.ServeConnFunc(s.serveHTTP2Conn)
}
func (s *Server) serveHTTP2Conn(ctx context.Context, nc net.Conn, h Handler, sawClientPreface bool, upgradeReq *Request, settings []byte) {
s.setupHTTP2_ServeTLS()
var serverUpgradeReq *http2.ServerRequest
if upgradeReq != nil {
serverUpgradeReq = http2ServerRequestFromRequest(upgradeReq)
}
s.h2.ServeConn(nc, &http2.ServeConnOpts{
Context: ctx,
Handler: http2Handler{h},
BaseConfig: http2ServerConfig{s},
SawClientPreface: sawClientPreface,
UpgradeRequest: serverUpgradeReq,
Settings: settings,
})
}
func http2ServerRequestFromRequest(req *Request) *http2.ServerRequest {
return &http2.ServerRequest{
Context: req.Context(),
Proto: req.Proto,
ProtoMajor: req.ProtoMajor,
ProtoMinor: req.ProtoMinor,
Method: req.Method,
URL: req.URL,
Header: http2.Header(req.Header),
Trailer: http2.Header(req.Trailer),
Body: req.Body,
Host: req.Host,
ContentLength: req.ContentLength,
RemoteAddr: req.RemoteAddr,
RequestURI: req.RequestURI,
TLS: req.TLS,
MultipartForm: req.MultipartForm,
}
}
type http2Handler struct {
h Handler
}
func (h http2Handler) ServeHTTP(w *http2.ResponseWriter, req *http2.ServerRequest) {
h.h.ServeHTTP(http2ResponseWriter{w}, &Request{
ctx: req.Context,
Proto: "HTTP/2.0",
ProtoMajor: 2,
ProtoMinor: 0,
Method: req.Method,
URL: req.URL,
Header: Header(req.Header),
RequestURI: req.RequestURI,
Trailer: Header(req.Trailer),
Body: req.Body,
Host: req.Host,
ContentLength: req.ContentLength,
RemoteAddr: req.RemoteAddr,
TLS: req.TLS,
MultipartForm: req.MultipartForm,
})
}
type http2ResponseWriter struct {
*http2.ResponseWriter
}
// Optional http.ResponseWriter interfaces implemented.
var (
_ CloseNotifier = http2ResponseWriter{}
_ Flusher = http2ResponseWriter{}
_ io.StringWriter = http2ResponseWriter{}
)
func (w http2ResponseWriter) Flush() { w.ResponseWriter.FlushError() }
func (w http2ResponseWriter) FlushError() error { return w.ResponseWriter.FlushError() }
func (w http2ResponseWriter) Header() Header { return Header(w.ResponseWriter.Header()) }
func (w http2ResponseWriter) Push(target string, opts *PushOptions) error {
var (
method string
header http2.Header
)
if opts != nil {
method = opts.Method
header = http2.Header(opts.Header)
}
err := w.ResponseWriter.Push(target, method, header)
if err == http2.ErrNotSupported {
err = ErrNotSupported
}
return err
}
type http2ServerConfig struct {
s *Server
}
func (s http2ServerConfig) MaxHeaderBytes() int { return s.s.MaxHeaderBytes }
func (s http2ServerConfig) ConnState(c net.Conn, st http2.ConnState) {
if s.s.ConnState != nil {
s.s.ConnState(c, ConnState(st))
}
}
func (s http2ServerConfig) DoKeepAlives() bool { return s.s.doKeepAlives() }
func (s http2ServerConfig) WriteTimeout() time.Duration { return s.s.WriteTimeout }
func (s http2ServerConfig) SendPingTimeout() time.Duration { return s.s.ReadTimeout }
func (s http2ServerConfig) ErrorLog() *log.Logger { return s.s.ErrorLog }
func (s http2ServerConfig) ReadTimeout() time.Duration { return s.s.ReadTimeout }
func (s http2ServerConfig) DisableClientPriority() bool { return s.s.DisableClientPriority }
func (s http2ServerConfig) IdleTimeout() time.Duration {
if s.s.h2Config != nil {
return s.s.h2Config.IdleTimeout()
}
return s.s.h2IdleTimeout
}
func (s http2ServerConfig) HTTP2Config() http2.Config {
return mergeHTTP2Config(s.s.HTTP2, s.s.h2Config)
}
// http2ExternalServerConfig is an HTTP/2 configuration provided by x/net/http2.
//
// When a x/net/http2.Server wraps a net/http.Server, we need to support the user
// setting configuration settings on the x/net Server:
//
// s1 := &http.Server{}
// s2 := &http2.Server{}
// http2.ConfigureServer(s1, s2)
//
// // This setting needs to affect s1:
// s2.MaxReadFrameSize = 10000
//
// We handle this by having http2.ConfigureServer pass us an http2ExternalServerConfig
// (see http.Server.Serve) which we can use to query the current state of the http2.Server.
type http2ExternalServerConfig interface {
// Various configuration settings:
HTTP2Config() HTTP2Config
IdleTimeout() time.Duration
// ServeConnFunc provides a function to the x/net/http2.Server which it
// can use to serve a new connection.
ServeConnFunc(func(ctx context.Context, nc net.Conn, h Handler, sawClientPreface bool, upgradeReq *Request, settings []byte))
}
// http2ExternalTransportConfig is an HTTP/2 configuration provided by x/net/http2.
//
// When a x/net/http2.Transport wraps a net/http.Transport, we need to support the user
// setting configuration settings on the x/net Transport:
//
// tr1 := &http.Transport{}
// tr2 := http2.ConfigureTransports(t1)
//
// // This setting needs to affect tr1:
// tr2.MaxHeaderListSize = 10000
//
// We handle this by having http2.ConfigureTransports pass us an http2ExternalTransportConfig,
// which we can use to query the current state of the http2.Transport.
type http2ExternalTransportConfig interface {
// Various configuration settings:
HTTP2Config() HTTP2Config
DisableCompression() bool
MaxHeaderListSize() int64
IdleConnTimeout() time.Duration
// ConnFromContext is used to pass a net.Conn to Transport.NewClientConn
// via a context value. See Transport.http2NewClientConnFromContext.
ConnFromContext(context.Context) net.Conn
// DialFromContext is used to dial new connections, overriding Transport.DialContext etc.
// This is used when the user calls x/net/http2.Transport.RoundTrip directly,
// in which case the historical behavior is to use the http2.Transport's dial functions.
DialFromContext(ctx context.Context, network, addr string) (net.Conn, error)
// ExternalRoundTrip reports whether Transport.RoundTrip should call the
// external transport's RoundTrip. This is used when x/net/http2.Transport.ConnPool
// is set, in which case the user-provided ClientConnPool has taken responsibility
// for picking a connection to use.
ExternalRoundTrip() bool
// RoundTrip performs a round trip.
// It should only be used when ExternalRoundTrip requests it.
RoundTrip(*Request) (*Response, error)
// Registered is called to report successful registration of the config.
Registered(*Transport)
}
func (t *Transport) configureHTTP2(protocols Protocols) {
if t.TLSClientConfig == nil {
t.TLSClientConfig = &tls.Config{}
}
if t.HTTP2 == nil {
t.HTTP2 = &HTTP2Config{}
}
t2 := http2.NewTransport(transportConfig{t})
t.h2Transport = t2
t.registerProtocol("https", http2RoundTripper{t2, true})
if t.TLSNextProto == nil {
t.TLSNextProto = make(map[string]func(authority string, c *tls.Conn) RoundTripper)
}
// Historically, the presence of a TLSNextProto["h2"] key has been the signal to
// enable/disable HTTP/2 support. Set a value in the map, but we'll never use it.
t.TLSNextProto["h2"] = func(authority string, c *tls.Conn) RoundTripper {
return http2ErringRoundTripper{
errors.New("unexpected use of stub RoundTripper"),
}
}
// Server.ServeTLS clones the tls.Config before modifying it.
// Transport doesn't. We may want to make the two consistent some day.
//
// http2configureTransport will have already set NextProtos, but adjust it again
// here to remove HTTP/1.1 if the user has disabled it.
t.TLSClientConfig.NextProtos = adjustNextProtos(t.TLSClientConfig.NextProtos, protocols)
}
type http2ErringRoundTripper struct{ err error }
func (rt http2ErringRoundTripper) RoundTripErr() error { return rt.err }
func (rt http2ErringRoundTripper) RoundTrip(*Request) (*Response, error) { return nil, rt.err }
func http2RoundTrip(req *Request, rt func(*http2.ClientRequest) (*http2.ClientResponse, error)) (*Response, error) {
resp := &Response{}
cresp, err := rt(&http2.ClientRequest{
Context: req.Context(),
Method: req.Method,
URL: req.URL,
Header: http2.Header(req.Header),
Trailer: http2.Header(req.Trailer),
Body: req.Body,
Host: req.Host,
GetBody: req.GetBody,
ContentLength: req.ContentLength,
Cancel: req.Cancel,
Close: req.Close,
ResTrailer: (*http2.Header)(&resp.Trailer),
})
if err != nil {
return nil, err
}
resp.Status = cresp.Status + " " + StatusText(cresp.StatusCode)
resp.StatusCode = cresp.StatusCode
resp.Proto = "HTTP/2.0"
resp.ProtoMajor = 2
resp.ProtoMinor = 0
resp.ContentLength = cresp.ContentLength
resp.Uncompressed = cresp.Uncompressed
resp.Header = Header(cresp.Header)
resp.Trailer = Header(cresp.Trailer)
resp.Body = cresp.Body
resp.TLS = cresp.TLS
resp.Request = req
return resp, nil
}
// http2AddConn adds nc to the HTTP/2 connection pool.
func (t *Transport) http2AddConn(scheme, authority string, nc net.Conn) (RoundTripper, error) {
if t.h2Transport == nil {
return nil, errors.ErrUnsupported
}
err := t.h2Transport.AddConn(scheme, authority, nc)
if err != nil {
return nil, err
}
return http2RoundTripper{t.h2Transport, false}, nil
}
// http2NewClientConn creates an HTTP/2 genericClientConn (used to implement ClientConn) from nc.
// The connection is not added to the HTTP/2 connection pool.
func (t *Transport) http2NewClientConn(nc net.Conn, internalStateHook func()) (genericClientConn, error) {
if t.h2Transport == nil {
return nil, errors.ErrUnsupported
}
cc, err := t.h2Transport.NewClientConn(nc, internalStateHook)
if err != nil {
return nil, err
}
return http2ClientConn{cc}, nil
}
// http2NewClientConnFromContext creates a *ClientConn from a net.Conn.
//
// Transport.NewClientConn takes an address and dials a new net.Conn.
// We don't currently provide a simple way for the user to provide a net.Conn and get a
// *ClientConn out of it (although we do let the user provide their own Transport.DialContext,
// which can be used to effectively do this).
//
// x/net/http2.Transport.NewClientConn, in contrast, requires the user to provide a net.Conn.
// To support implementing the x/net/http2 NewClientConn in terms of a net/http.Transport,
// we permit x/net/http2 to pass us a net.Conn via a context key.
//
// http2NewClientConnFromContext handles extracting the net.Conn from the Context
// (when present) and creating a *ClientConn from it.
func (t *Transport) http2NewClientConnFromContext(ctx context.Context) (*ClientConn, error) {
if t.h2Config == nil {
return nil, errors.ErrUnsupported
}
nc := t.h2Config.ConnFromContext(ctx)
if nc == nil {
return nil, errors.ErrUnsupported
}
if t.h2Transport == nil {
return nil, errors.New("http: Transport does not support HTTP/2")
}
cc := &ClientConn{}
gc, err := t.http2NewClientConn(nc, cc.maybeRunStateHook)
if err != nil {
return nil, err
}
cc.stateHookMu.Lock()
defer cc.stateHookMu.Unlock()
cc.cc = gc
cc.lastAvailable = gc.Available()
return cc, nil
}
// http2ExternalDial creates a new HTTP/2 connection,
// using the x/net/http2.Transport's dial functions.
//
// This is used when the user has called x/net/http2.Transport.RoundTrip.
// If the RoundTrip needs to create a new connection,
// the historical behavior is for it to use the http2.Transport's DialTLS or DialTLSContext
// functions, and not any dial functions on the http.Transport.
func (t *Transport) http2ExternalDial(ctx context.Context, cm connectMethod) (RoundTripper, error) {
if t.h2Config == nil {
return nil, errors.ErrUnsupported
}
nc, err := t.h2Config.DialFromContext(ctx, "tcp", cm.targetAddr)
if err != nil {
return nil, err
}
return t.http2AddConn(cm.targetScheme, cm.targetAddr, nc)
}
type http2RoundTripper struct {
t *http2.Transport
mapCachedConnErr bool
}
func (rt http2RoundTripper) RoundTrip(req *Request) (*Response, error) {
resp, err := http2RoundTrip(req, rt.t.RoundTrip)
if err != nil {
if rt.mapCachedConnErr && http2isNoCachedConnError(err) {
err = ErrSkipAltProtocol
}
return nil, err
}
return resp, nil
}
type http2ClientConn struct {
http2.NetHTTPClientConn
}
func (cc http2ClientConn) RoundTrip(req *Request) (*Response, error) {
return http2RoundTrip(req, cc.NetHTTPClientConn.RoundTrip)
}
// transportConfig implements the http2.TransportConfig interface,
// providing the net/http Transport's configuration to the HTTP/2 implementation.
//
// When an x/net/http2 Transport has provided a configuration (see http2ExternalTransportConfig),
// the transportConfig merges the x/net/http2 and net/http Transport configurations.
type transportConfig struct {
t *Transport
}
func (t transportConfig) MaxResponseHeaderBytes() int64 { return t.t.MaxResponseHeaderBytes }
func (t transportConfig) DisableKeepAlives() bool { return t.t.DisableKeepAlives }
func (t transportConfig) ExpectContinueTimeout() time.Duration { return t.t.ExpectContinueTimeout }
func (t transportConfig) ResponseHeaderTimeout() time.Duration { return t.t.ResponseHeaderTimeout }
func (t transportConfig) MaxHeaderListSize() int64 {
if t.t.h2Config != nil {
return t.t.h2Config.MaxHeaderListSize()
}
return 0
}
func (t transportConfig) DisableCompression() bool {
if t.t.h2Config != nil && t.t.h2Config.DisableCompression() {
return true
}
return t.t.DisableCompression
}
func (t transportConfig) IdleConnTimeout() time.Duration {
// Unlike most config settings, historically IdleConnTimeout prefers the
// http2.Transport's setting over the http.Transport.
if t.t.h2Config != nil {
if timeout := t.t.h2Config.IdleConnTimeout(); timeout != 0 {
return timeout
}
}
return t.t.IdleConnTimeout
}
type http2Configer interface {
HTTP2Config() HTTP2Config
}
func mergeHTTP2Config(c1 *HTTP2Config, confer http2Configer) http2.Config {
if c1 == nil && confer == nil {
return http2.Config{}
}
var c http2.Config
if c1 != nil {
c = (http2.Config)(*c1)
}
var c2 HTTP2Config
if confer != nil {
c2 = confer.HTTP2Config()
}
if c.MaxConcurrentStreams == 0 {
c.MaxConcurrentStreams = c2.MaxConcurrentStreams
}
if c2.StrictMaxConcurrentRequests {
c.StrictMaxConcurrentRequests = true
}
if c.MaxDecoderHeaderTableSize == 0 {
c.MaxDecoderHeaderTableSize = c2.MaxDecoderHeaderTableSize
}
if c.MaxEncoderHeaderTableSize == 0 {
c.MaxEncoderHeaderTableSize = c2.MaxEncoderHeaderTableSize
}
if c.MaxReadFrameSize == 0 {
c.MaxReadFrameSize = c2.MaxReadFrameSize
}
if c.MaxReceiveBufferPerConnection == 0 {
c.MaxReceiveBufferPerConnection = c2.MaxReceiveBufferPerConnection
}
if c.MaxReceiveBufferPerStream == 0 {
c.MaxReceiveBufferPerStream = c2.MaxReceiveBufferPerStream
}
if c.SendPingTimeout == 0 {
c.SendPingTimeout = c2.SendPingTimeout
}
if c.PingTimeout == 0 {
c.PingTimeout = c2.PingTimeout
}
if c.WriteByteTimeout == 0 {
c.WriteByteTimeout = c2.WriteByteTimeout
}
if c2.PermitProhibitedCipherSuites {
c.PermitProhibitedCipherSuites = true
}
if c.CountError == nil {
c.CountError = c2.CountError
}
return c
}
func (t transportConfig) HTTP2Config() http2.Config {
return mergeHTTP2Config(t.t.HTTP2, t.t.h2Config)
}
// transportFromH1Transport provides a way for HTTP/2 tests to extract
// the http2.Transport from an http.Transport.
//
//go:linkname transportFromH1Transport net/http/internal/http2_test.transportFromH1Transport
func transportFromH1Transport(t *Transport) any {
t.nextProtoOnce.Do(t.onceSetNextProtoDefaults)
return t.h2Transport
}