net/http2: omit invalid header value from error message
Updates golang/go#43631
Change-Id: Iaacc875fecbdb76f4099d3eb3d67f7ec9d40c224
GitHub-Last-Rev: 3e22a9ea2f4e4f24ccfdeeb47b57f055f0639c83
GitHub-Pull-Request: golang/net#115
Reviewed-on: https://go-review.googlesource.com/c/net/+/355930
Trust: Damien Neil <dneil@google.com>
Run-TryBot: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Trust: Cherry Mui <cherryyz@google.com>
diff --git a/http2/errors.go b/http2/errors.go
index 2663e5d..f2067da 100644
--- a/http2/errors.go
+++ b/http2/errors.go
@@ -136,7 +136,7 @@
type headerFieldValueError string
func (e headerFieldValueError) Error() string {
- return fmt.Sprintf("invalid header field value %q", string(e))
+ return fmt.Sprintf("invalid header field value for %q", string(e))
}
var (
diff --git a/http2/frame.go b/http2/frame.go
index 96a7479..0178647 100644
--- a/http2/frame.go
+++ b/http2/frame.go
@@ -1532,7 +1532,8 @@
fr.debugReadLoggerf("http2: decoded hpack field %+v", hf)
}
if !httpguts.ValidHeaderFieldValue(hf.Value) {
- invalid = headerFieldValueError(hf.Value)
+ // Don't include the value in the error, because it may be sensitive.
+ invalid = headerFieldValueError(hf.Name)
}
isPseudo := strings.HasPrefix(hf.Name, ":")
if isPseudo {
diff --git a/http2/frame_test.go b/http2/frame_test.go
index 48bf969..86e5d4f 100644
--- a/http2/frame_test.go
+++ b/http2/frame_test.go
@@ -1068,7 +1068,7 @@
name: "invalid_field_value",
w: func(f *Framer) { write(f, encodeHeaderRaw(t, "key", "bad_null\x00")) },
want: streamError(1, ErrCodeProtocol),
- wantErrReason: "invalid header field value \"bad_null\\x00\"",
+ wantErrReason: `invalid header field value for "key"`,
},
}
for i, tt := range tests {
diff --git a/http2/transport.go b/http2/transport.go
index ac6b01b..9180ba3 100644
--- a/http2/transport.go
+++ b/http2/transport.go
@@ -1770,7 +1770,8 @@
}
for _, v := range vv {
if !httpguts.ValidHeaderFieldValue(v) {
- return nil, fmt.Errorf("invalid HTTP header value %q for header %q", v, k)
+ // Don't include the value in the error, because it may be sensitive.
+ return nil, fmt.Errorf("invalid HTTP header value for header %q", k)
}
}
}
diff --git a/http2/transport_test.go b/http2/transport_test.go
index 1cdd981..030cbe9 100644
--- a/http2/transport_test.go
+++ b/http2/transport_test.go
@@ -1487,7 +1487,7 @@
})
}
func TestTransportInvalidTrailer_BinaryFieldValue(t *testing.T) {
- testInvalidTrailer(t, oneHeader, headerFieldValueError("has\nnewline"), func(enc *hpack.Encoder) {
+ testInvalidTrailer(t, oneHeader, headerFieldValueError("x"), func(enc *hpack.Encoder) {
enc.WriteField(hpack.HeaderField{Name: "x", Value: "has\nnewline"})
})
}
@@ -2451,7 +2451,7 @@
},
3: {
h: http.Header{"foo": {"foo\x01bar"}},
- wantErr: `invalid HTTP header value "foo\x01bar" for header "foo"`,
+ wantErr: `invalid HTTP header value for header "foo"`,
},
}