blob: 5f62b49e492d620186d0c9872a4c5dbe248255c0 [file] [log] [blame]
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001// Copyright 2014 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08004
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08005// TODO: replace all <-sc.doneServing with reads from the stream's cw
6// instead, and make sure that on close we close all open
7// streams. then remove doneServing?
8
Brad Fitzpatrickf530c4e2016-01-07 08:16:00 -08009// TODO: re-audit GOAWAY support. Consider each incoming frame type and
10// whether it should be ignored during graceful shutdown.
Brad Fitzpatrickcf896632014-12-09 07:15:26 +110011
12// TODO: disconnect idle clients. GFE seems to do 4 minutes. make
13// configurable? or maximum number of idle clients and remove the
14// oldest?
15
16// TODO: turn off the serve goroutine when idle, so
17// an idle conn only has the readFrames goroutine active. (which could
18// also be optimized probably to pin less memory in crypto/tls). This
19// would involve tracking when the serve goroutine is active (atomic
20// int32 read/CAS probably?) and starting it up when frames arrive,
21// and shutting it down when all handlers exit. the occasional PING
22// packets could use time.AfterFunc to call sc.wakeStartServeLoop()
23// (which is a no-op if already running) and then queue the PING write
24// as normal. The serve loop would then exit in most cases (if no
25// Handlers running) and not be woken up again until the PING packet
26// returns.
27
28// TODO (maybe): add a mechanism for Handlers to going into
29// half-closed-local mode (rw.(io.Closer) test?) but not exit their
30// handler, and continue to be able to read from the
31// Request.Body. This would be a somewhat semantic change from HTTP/1
32// (or at least what we expose in net/http), so I'd probably want to
33// add it there too. For now, this package says that returning from
34// the Handler ServeHTTP function means you're both done reading and
35// done writing, without a way to stop just one or the other.
36
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080037package http2
38
39import (
Brad Fitzpatrick390047e2014-11-14 20:37:08 -080040 "bufio"
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080041 "bytes"
42 "crypto/tls"
43 "errors"
44 "fmt"
45 "io"
46 "log"
47 "net"
48 "net/http"
Blake Mizeranyb4be4942015-12-15 17:33:14 -080049 "net/textproto"
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080050 "net/url"
Brad Fitzpatrickeb066e32016-01-26 18:31:02 +000051 "os"
52 "reflect"
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +000053 "runtime"
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080054 "strconv"
55 "strings"
Brad Fitzpatrick729bd722014-11-13 14:09:36 -080056 "sync"
Brad Fitzpatrick95842032014-11-15 09:47:42 -080057 "time"
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080058
Brad Fitzpatrickae54c552015-09-24 09:19:02 +020059 "golang.org/x/net/http2/hpack"
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080060)
61
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -080062const (
Brad Fitzpatrick9581fe12014-11-28 13:51:46 -080063 prefaceTimeout = 10 * time.Second
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -080064 firstSettingsTimeout = 2 * time.Second // should be in-flight with preface anyway
65 handlerChunkWriteSize = 4 << 10
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +110066 defaultMaxStreams = 250 // TODO: make this 100 as the GFE seems to?
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -080067)
68
69var (
70 errClientDisconnected = errors.New("client disconnected")
71 errClosedBody = errors.New("body closed by handler")
Brad Fitzpatrickb7f5d982015-10-26 13:59:20 -050072 errHandlerComplete = errors.New("http2: request body closed due to handler exiting")
Brad Fitzpatrick56401052015-10-20 22:27:39 +000073 errStreamClosed = errors.New("http2: stream closed")
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -080074)
75
76var responseWriterStatePool = sync.Pool{
77 New: func() interface{} {
78 rws := &responseWriterState{}
79 rws.bw = bufio.NewWriterSize(chunkWriter{rws}, handlerChunkWriteSize)
80 return rws
81 },
82}
83
84// Test hooks.
85var (
86 testHookOnConn func()
87 testHookGetServerConn func(*serverConn)
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -080088 testHookOnPanicMu *sync.Mutex // nil except in tests
Brad Fitzpatrick996adcb2014-12-08 01:08:19 -080089 testHookOnPanic func(sc *serverConn, panicVal interface{}) (rePanic bool)
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -080090)
91
Brad Fitzpatrickb331b812014-11-13 11:51:54 -080092// Server is an HTTP/2 server.
93type Server struct {
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -080094 // MaxHandlers limits the number of http.Handler ServeHTTP goroutines
95 // which may run at a time over all connections.
96 // Negative or zero no limit.
97 // TODO: implement
98 MaxHandlers int
99
100 // MaxConcurrentStreams optionally specifies the number of
101 // concurrent streams that each client may have open at a
102 // time. This is unrelated to the number of http.Handler goroutines
103 // which may be active globally, which is MaxHandlers.
104 // If zero, MaxConcurrentStreams defaults to at least 100, per
105 // the HTTP/2 spec's recommendations.
106 MaxConcurrentStreams uint32
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800107
108 // MaxReadFrameSize optionally specifies the largest frame
109 // this server is willing to read. A valid value is between
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -0800110 // 16k and 16M, inclusive. If zero or otherwise invalid, a
111 // default value is used.
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800112 MaxReadFrameSize uint32
Brad Fitzpatricke4cd9ad2015-01-17 18:03:57 -0800113
114 // PermitProhibitedCipherSuites, if true, permits the use of
115 // cipher suites prohibited by the HTTP/2 spec.
116 PermitProhibitedCipherSuites bool
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800117}
118
119func (s *Server) maxReadFrameSize() uint32 {
120 if v := s.MaxReadFrameSize; v >= minMaxFrameSize && v <= maxFrameSize {
121 return v
122 }
123 return defaultMaxReadFrameSize
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800124}
125
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -0800126func (s *Server) maxConcurrentStreams() uint32 {
127 if v := s.MaxConcurrentStreams; v > 0 {
128 return v
129 }
130 return defaultMaxStreams
131}
132
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800133// ConfigureServer adds HTTP/2 support to a net/http Server.
134//
135// The configuration conf may be nil.
136//
137// ConfigureServer must be called before s begins serving.
Brad Fitzpatrick42ad5082015-10-15 01:02:25 +0000138func ConfigureServer(s *http.Server, conf *Server) error {
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800139 if conf == nil {
140 conf = new(Server)
141 }
Brad Fitzpatrick42ad5082015-10-15 01:02:25 +0000142
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800143 if s.TLSConfig == nil {
144 s.TLSConfig = new(tls.Config)
Brad Fitzpatrick42ad5082015-10-15 01:02:25 +0000145 } else if s.TLSConfig.CipherSuites != nil {
146 // If they already provided a CipherSuite list, return
147 // an error if it has a bad order or is missing
148 // ECDHE_RSA_WITH_AES_128_GCM_SHA256.
149 const requiredCipher = tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
150 haveRequired := false
151 sawBad := false
152 for i, cs := range s.TLSConfig.CipherSuites {
153 if cs == requiredCipher {
154 haveRequired = true
155 }
156 if isBadCipher(cs) {
157 sawBad = true
158 } else if sawBad {
159 return fmt.Errorf("http2: TLSConfig.CipherSuites index %d contains an HTTP/2-approved cipher suite (%#04x), but it comes after unapproved cipher suites. With this configuration, clients that don't support previous, approved cipher suites may be given an unapproved one and reject the connection.", i, cs)
160 }
161 }
162 if !haveRequired {
163 return fmt.Errorf("http2: TLSConfig.CipherSuites is missing HTTP/2-required TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
164 }
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800165 }
Brad Fitzpatrick5df015f2014-12-08 11:16:59 -0800166
167 // Note: not setting MinVersion to tls.VersionTLS12,
168 // as we don't want to interfere with HTTP/1.1 traffic
169 // on the user's server. We enforce TLS 1.2 later once
170 // we accept a connection. Ideally this should be done
171 // during next-proto selection, but using TLS <1.2 with
172 // HTTP/2 is still the client's bug.
173
Brad Fitzpatrick42ad5082015-10-15 01:02:25 +0000174 s.TLSConfig.PreferServerCipherSuites = true
Brad Fitzpatrick5df015f2014-12-08 11:16:59 -0800175
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800176 haveNPN := false
177 for _, p := range s.TLSConfig.NextProtos {
Brad Fitzpatrick36d9a672014-11-26 07:40:15 -0800178 if p == NextProtoTLS {
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800179 haveNPN = true
180 break
181 }
182 }
183 if !haveNPN {
Brad Fitzpatrick36d9a672014-11-26 07:40:15 -0800184 s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800185 }
Brad Fitzpatrick13dfd892015-03-05 15:57:11 -0800186 // h2-14 is temporary (as of 2015-03-05) while we wait for all browsers
187 // to switch to "h2".
188 s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "h2-14")
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800189
190 if s.TLSNextProto == nil {
191 s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){}
192 }
Brad Fitzpatrick13dfd892015-03-05 15:57:11 -0800193 protoHandler := func(hs *http.Server, c *tls.Conn, h http.Handler) {
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800194 if testHookOnConn != nil {
195 testHookOnConn()
196 }
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800197 conf.ServeConn(c, &ServeConnOpts{
198 Handler: h,
199 BaseConfig: hs,
200 })
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800201 }
Brad Fitzpatrick13dfd892015-03-05 15:57:11 -0800202 s.TLSNextProto[NextProtoTLS] = protoHandler
203 s.TLSNextProto["h2-14"] = protoHandler // temporary; see above.
Brad Fitzpatrick42ad5082015-10-15 01:02:25 +0000204 return nil
Brad Fitzpatrickb5469d22014-11-13 12:17:52 -0800205}
206
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800207// ServeConnOpts are options for the Server.ServeConn method.
208type ServeConnOpts struct {
209 // BaseConfig optionally sets the base configuration
210 // for values. If nil, defaults are used.
211 BaseConfig *http.Server
212
213 // Handler specifies which handler to use for processing
214 // requests. If nil, BaseConfig.Handler is used. If BaseConfig
215 // or BaseConfig.Handler is nil, http.DefaultServeMux is used.
216 Handler http.Handler
217}
218
219func (o *ServeConnOpts) baseConfig() *http.Server {
220 if o != nil && o.BaseConfig != nil {
221 return o.BaseConfig
222 }
223 return new(http.Server)
224}
225
226func (o *ServeConnOpts) handler() http.Handler {
227 if o != nil {
228 if o.Handler != nil {
229 return o.Handler
230 }
231 if o.BaseConfig != nil && o.BaseConfig.Handler != nil {
232 return o.BaseConfig.Handler
233 }
234 }
235 return http.DefaultServeMux
236}
237
238// ServeConn serves HTTP/2 requests on the provided connection and
239// blocks until the connection is no longer readable.
240//
241// ServeConn starts speaking HTTP/2 assuming that c has not had any
242// reads or writes. It writes its initial settings frame and expects
243// to be able to read the preface and settings frame from the
244// client. If c has a ConnectionState method like a *tls.Conn, the
245// ConnectionState is used to verify the TLS ciphersuite and to set
246// the Request.TLS field in Handlers.
247//
248// ServeConn does not support h2c by itself. Any h2c support must be
249// implemented in terms of providing a suitably-behaving net.Conn.
250//
251// The opts parameter is optional. If nil, default values are used.
252func (s *Server) ServeConn(c net.Conn, opts *ServeConnOpts) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800253 sc := &serverConn{
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800254 srv: s,
255 hs: opts.baseConfig(),
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800256 conn: c,
Brad Fitzpatrickdf959c22014-12-09 07:20:20 +1100257 remoteAddrStr: c.RemoteAddr().String(),
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800258 bw: newBufferedWriter(c),
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800259 handler: opts.handler(),
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800260 streams: make(map[uint32]*stream),
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000261 readFrameCh: make(chan readFrameResult),
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800262 wantWriteFrameCh: make(chan frameWriteMsg, 8),
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000263 wroteFrameCh: make(chan frameWriteResult, 1), // buffered; one send in writeFrameAsync
264 bodyReadCh: make(chan bodyReadMsg), // buffering doesn't matter either way
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800265 doneServing: make(chan struct{}),
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800266 advMaxStreams: s.maxConcurrentStreams(),
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800267 writeSched: writeScheduler{
268 maxFrameSize: initialMaxFrameSize,
269 },
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -0800270 initialWindowSize: initialWindowSize,
271 headerTableSize: initialHeaderTableSize,
272 serveG: newGoroutineLock(),
273 pushEnabled: true,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800274 }
Brad Fitzpatrick98766182014-12-02 10:30:08 -0800275 sc.flow.add(initialWindowSize)
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +1100276 sc.inflow.add(initialWindowSize)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800277 sc.hpackEncoder = hpack.NewEncoder(&sc.headerWriteBuf)
Brad Fitzpatrick5e4e2dc2014-11-19 16:49:43 -0800278
279 fr := NewFramer(sc.bw, c)
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +0530280 fr.ReadMetaHeaders = hpack.NewDecoder(initialHeaderTableSize, nil)
281 fr.MaxHeaderListSize = sc.maxHeaderListSize()
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800282 fr.SetMaxReadFrameSize(s.maxReadFrameSize())
Brad Fitzpatrick5e4e2dc2014-11-19 16:49:43 -0800283 sc.framer = fr
284
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800285 if tc, ok := c.(connectionStater); ok {
Brad Fitzpatrick30b16812014-12-08 10:10:39 -0800286 sc.tlsState = new(tls.ConnectionState)
287 *sc.tlsState = tc.ConnectionState()
288 // 9.2 Use of TLS Features
289 // An implementation of HTTP/2 over TLS MUST use TLS
290 // 1.2 or higher with the restrictions on feature set
291 // and cipher suite described in this section. Due to
292 // implementation limitations, it might not be
293 // possible to fail TLS negotiation. An endpoint MUST
294 // immediately terminate an HTTP/2 connection that
295 // does not meet the TLS requirements described in
296 // this section with a connection error (Section
297 // 5.4.1) of type INADEQUATE_SECURITY.
298 if sc.tlsState.Version < tls.VersionTLS12 {
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800299 sc.rejectConn(ErrCodeInadequateSecurity, "TLS version too low")
Brad Fitzpatrick30b16812014-12-08 10:10:39 -0800300 return
301 }
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800302
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800303 if sc.tlsState.ServerName == "" {
Brad Fitzpatrickf0f78762015-01-17 12:25:12 -0800304 // Client must use SNI, but we don't enforce that anymore,
305 // since it was causing problems when connecting to bare IP
306 // addresses during development.
307 //
308 // TODO: optionally enforce? Or enforce at the time we receive
309 // a new request, and verify the the ServerName matches the :authority?
310 // But that precludes proxy situations, perhaps.
311 //
312 // So for now, do nothing here again.
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800313 }
314
Brad Fitzpatrick6ccd6692016-02-02 14:37:19 -0800315 if !s.PermitProhibitedCipherSuites && isBadCipher(sc.tlsState.CipherSuite) {
Brad Fitzpatrick5df015f2014-12-08 11:16:59 -0800316 // "Endpoints MAY choose to generate a connection error
317 // (Section 5.4.1) of type INADEQUATE_SECURITY if one of
318 // the prohibited cipher suites are negotiated."
319 //
320 // We choose that. In my opinion, the spec is weak
321 // here. It also says both parties must support at least
322 // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no
323 // excuses here. If we really must, we could allow an
324 // "AllowInsecureWeakCiphers" option on the server later.
325 // Let's see how it plays out first.
Brad Fitzpatrick36f79342015-01-17 12:24:34 -0800326 sc.rejectConn(ErrCodeInadequateSecurity, fmt.Sprintf("Prohibited TLS 1.2 Cipher Suite: %x", sc.tlsState.CipherSuite))
Brad Fitzpatrick5df015f2014-12-08 11:16:59 -0800327 return
328 }
Brad Fitzpatrick30b16812014-12-08 10:10:39 -0800329 }
330
Brad Fitzpatrick0db6d652014-11-15 15:49:19 -0800331 if hook := testHookGetServerConn; hook != nil {
332 hook(sc)
333 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800334 sc.serve()
335}
336
Brad Fitzpatrick5df015f2014-12-08 11:16:59 -0800337// isBadCipher reports whether the cipher is blacklisted by the HTTP/2 spec.
338func isBadCipher(cipher uint16) bool {
339 switch cipher {
340 case tls.TLS_RSA_WITH_RC4_128_SHA,
341 tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
342 tls.TLS_RSA_WITH_AES_128_CBC_SHA,
343 tls.TLS_RSA_WITH_AES_256_CBC_SHA,
344 tls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
345 tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
346 tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
347 tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,
348 tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
349 tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
350 tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
351 // Reject cipher suites from Appendix A.
352 // "This list includes those cipher suites that do not
353 // offer an ephemeral key exchange and those that are
354 // based on the TLS null, stream or block cipher type"
355 return true
356 default:
357 return false
358 }
359}
360
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800361func (sc *serverConn) rejectConn(err ErrCode, debug string) {
Brad Fitzpatrick415f1912015-12-16 20:28:38 +0000362 sc.vlogf("http2: server rejecting conn: %v, %s", err, debug)
Brad Fitzpatrick842bf9f2014-12-08 10:31:57 -0800363 // ignoring errors. hanging up anyway.
364 sc.framer.WriteGoAway(0, err, []byte(debug))
365 sc.bw.Flush()
366 sc.conn.Close()
367}
368
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800369type serverConn struct {
370 // Immutable:
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800371 srv *Server
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800372 hs *http.Server
373 conn net.Conn
Brad Fitzpatrick5e4e2dc2014-11-19 16:49:43 -0800374 bw *bufferedWriter // writing to conn
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800375 handler http.Handler
376 framer *Framer
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000377 doneServing chan struct{} // closed when serverConn.serve ends
378 readFrameCh chan readFrameResult // written by serverConn.readFrames
379 wantWriteFrameCh chan frameWriteMsg // from handlers -> serve
380 wroteFrameCh chan frameWriteResult // from writeFrameAsync -> serve, tickles more frame writes
381 bodyReadCh chan bodyReadMsg // from handlers -> serve
382 testHookCh chan func(int) // code to run on the serve loop
383 flow flow // conn-wide (not stream-specific) outbound flow control
384 inflow flow // conn-wide inbound flow control
385 tlsState *tls.ConnectionState // shared by all handlers, like net/http
Brad Fitzpatrickdf959c22014-12-09 07:20:20 +1100386 remoteAddrStr string
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800387
388 // Everything following is owned by the serve loop; use serveG.check():
Brad Fitzpatrick165c0982014-11-26 08:53:01 -0800389 serveG goroutineLock // used to verify funcs are on serve()
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -0800390 pushEnabled bool
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800391 sawFirstSettings bool // got the initial SETTINGS frame after the preface
392 needToSendSettingsAck bool
Brad Fitzpatrick6a9b77b2014-12-03 13:56:36 -0800393 unackedSettings int // how many SETTINGS have we sent without ACKs?
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -0800394 clientMaxStreams uint32 // SETTINGS_MAX_CONCURRENT_STREAMS from client (our PUSH_PROMISE limit)
395 advMaxStreams uint32 // our SETTINGS_MAX_CONCURRENT_STREAMS advertised the client
396 curOpenStreams uint32 // client's number of open streams
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800397 maxStreamID uint32 // max ever seen
398 streams map[uint32]*stream
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800399 initialWindowSize int32
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -0800400 headerTableSize uint32
Brad Fitzpatrick29704b82015-10-10 18:01:18 -0700401 peerMaxHeaderListSize uint32 // zero means unknown (default)
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800402 canonHeader map[string]string // http2-lower-case -> Go-Canonical-Case
Brad Fitzpatrickaa524f62014-11-25 10:31:37 -0800403 writingFrame bool // started write goroutine but haven't heard back on wroteFrameCh
404 needsFrameFlush bool // last frame write wasn't a flush
Brad Fitzpatricka13c4a42014-11-27 17:47:29 -0800405 writeSched writeScheduler
406 inGoAway bool // we've started to or sent GOAWAY
407 needToSendGoAway bool // we need to schedule a GOAWAY frame write
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800408 goAwayCode ErrCode
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800409 shutdownTimerCh <-chan time.Time // nil until used
410 shutdownTimer *time.Timer // nil until used
Brad Fitzpatricke7da8ed2016-03-05 22:47:48 +0000411 freeRequestBodyBuf []byte // if non-nil, a free initialWindowSize buffer for getRequestBodyBuf
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800412
Brad Fitzpatrick23564bf2014-11-27 19:40:04 -0800413 // Owned by the writeFrameAsync goroutine:
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800414 headerWriteBuf bytes.Buffer
415 hpackEncoder *hpack.Encoder
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800416}
417
Brad Fitzpatrick29704b82015-10-10 18:01:18 -0700418func (sc *serverConn) maxHeaderListSize() uint32 {
419 n := sc.hs.MaxHeaderBytes
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +0000420 if n <= 0 {
Brad Fitzpatrick29704b82015-10-10 18:01:18 -0700421 n = http.DefaultMaxHeaderBytes
422 }
423 // http2's count is in a slightly different unit and includes 32 bytes per pair.
424 // So, take the net/http.Server value and pad it up a bit, assuming 10 headers.
425 const perFieldOverhead = 32 // per http2 spec
426 const typicalHeaders = 10 // conservative
427 return uint32(n + typicalHeaders*perFieldOverhead)
428}
429
Gabriel Aszalos1aa5b312014-11-19 16:56:22 +0000430// stream represents a stream. This is the minimal metadata needed by
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800431// the serve goroutine. Most of the actual stream state is owned by
432// the http.Handler's goroutine in the responseWriter. Because the
433// responseWriter's responseWriterState is recycled at the end of a
434// handler, this struct intentionally has no pointer to the
435// *responseWriter{,State} itself, as the Handler ending nils out the
436// responseWriter's state field.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800437type stream struct {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800438 // immutable:
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +0000439 sc *serverConn
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800440 id uint32
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800441 body *pipe // non-nil if expecting DATA frames
442 cw closeWaiter // closed wait stream transitions to closed state
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800443
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800444 // owned by serverConn's serve loop:
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +0000445 bodyBytes int64 // body bytes seen so far
446 declBodyBytes int64 // or -1 if undeclared
447 flow flow // limits writing from Handler to client
448 inflow flow // what the client is allowed to POST/etc to us
449 parent *stream // or nil
450 numTrailerValues int64
451 weight uint8
452 state streamState
453 sentReset bool // only true once detached from streams map
454 gotReset bool // only true once detacted from streams map
455 gotTrailerHeader bool // HEADER frame for trailers was seen
Brad Fitzpatricke7da8ed2016-03-05 22:47:48 +0000456 reqBuf []byte
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +0000457
458 trailer http.Header // accumulated trailers
459 reqTrailer http.Header // handler's Request.Trailer
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800460}
461
Brad Fitzpatrick23564bf2014-11-27 19:40:04 -0800462func (sc *serverConn) Framer() *Framer { return sc.framer }
463func (sc *serverConn) CloseConn() error { return sc.conn.Close() }
464func (sc *serverConn) Flush() error { return sc.bw.Flush() }
465func (sc *serverConn) HeaderEncoder() (*hpack.Encoder, *bytes.Buffer) {
466 return sc.hpackEncoder, &sc.headerWriteBuf
467}
468
Brad Fitzpatricka98415a2014-12-08 00:47:45 -0800469func (sc *serverConn) state(streamID uint32) (streamState, *stream) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800470 sc.serveG.check()
471 // http://http2.github.io/http2-spec/#rfc.section.5.1
472 if st, ok := sc.streams[streamID]; ok {
Brad Fitzpatricka98415a2014-12-08 00:47:45 -0800473 return st.state, st
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800474 }
475 // "The first use of a new stream identifier implicitly closes all
476 // streams in the "idle" state that might have been initiated by
477 // that peer with a lower-valued stream identifier. For example, if
478 // a client sends a HEADERS frame on stream 7 without ever sending a
479 // frame on stream 5, then stream 5 transitions to the "closed"
480 // state when the first frame for stream 7 is sent or received."
481 if streamID <= sc.maxStreamID {
Brad Fitzpatricka98415a2014-12-08 00:47:45 -0800482 return stateClosed, nil
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800483 }
Brad Fitzpatricka98415a2014-12-08 00:47:45 -0800484 return stateIdle, nil
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800485}
486
Brad Fitzpatrickcd8c2702015-10-15 20:01:14 +0000487// setConnState calls the net/http ConnState hook for this connection, if configured.
488// Note that the net/http package does StateNew and StateClosed for us.
489// There is currently no plan for StateHijacked or hijacking HTTP/2 connections.
490func (sc *serverConn) setConnState(state http.ConnState) {
491 if sc.hs.ConnState != nil {
492 sc.hs.ConnState(sc.conn, state)
493 }
494}
495
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800496func (sc *serverConn) vlogf(format string, args ...interface{}) {
497 if VerboseLogs {
498 sc.logf(format, args...)
499 }
500}
501
502func (sc *serverConn) logf(format string, args ...interface{}) {
503 if lg := sc.hs.ErrorLog; lg != nil {
504 lg.Printf(format, args...)
505 } else {
506 log.Printf(format, args...)
507 }
508}
509
Brad Fitzpatrickeb066e32016-01-26 18:31:02 +0000510// errno returns v's underlying uintptr, else 0.
511//
512// TODO: remove this helper function once http2 can use build
513// tags. See comment in isClosedConnError.
514func errno(v error) uintptr {
515 if rv := reflect.ValueOf(v); rv.Kind() == reflect.Uintptr {
516 return uintptr(rv.Uint())
517 }
518 return 0
519}
520
521// isClosedConnError reports whether err is an error from use of a closed
522// network connection.
523func isClosedConnError(err error) bool {
524 if err == nil {
525 return false
526 }
527
528 // TODO: remove this string search and be more like the Windows
529 // case below. That might involve modifying the standard library
530 // to return better error types.
531 str := err.Error()
532 if strings.Contains(str, "use of closed network connection") {
533 return true
534 }
535
536 // TODO(bradfitz): x/tools/cmd/bundle doesn't really support
537 // build tags, so I can't make an http2_windows.go file with
538 // Windows-specific stuff. Fix that and move this, once we
539 // have a way to bundle this into std's net/http somehow.
540 if runtime.GOOS == "windows" {
541 if oe, ok := err.(*net.OpError); ok && oe.Op == "read" {
542 if se, ok := oe.Err.(*os.SyscallError); ok && se.Syscall == "wsarecv" {
543 const WSAECONNABORTED = 10053
544 const WSAECONNRESET = 10054
545 if n := errno(se.Err); n == WSAECONNRESET || n == WSAECONNABORTED {
546 return true
547 }
548 }
549 }
550 }
551 return false
552}
553
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800554func (sc *serverConn) condlogf(err error, format string, args ...interface{}) {
555 if err == nil {
556 return
557 }
Brad Fitzpatrickeb066e32016-01-26 18:31:02 +0000558 if err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800559 // Boring, expected errors.
560 sc.vlogf(format, args...)
561 } else {
562 sc.logf(format, args...)
563 }
564}
565
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800566func (sc *serverConn) canonicalHeader(v string) string {
567 sc.serveG.check()
Brad Fitzpatrick6520e262014-11-15 09:36:47 -0800568 cv, ok := commonCanonHeader[v]
569 if ok {
570 return cv
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800571 }
Brad Fitzpatrick6520e262014-11-15 09:36:47 -0800572 cv, ok = sc.canonHeader[v]
573 if ok {
574 return cv
575 }
576 if sc.canonHeader == nil {
577 sc.canonHeader = make(map[string]string)
578 }
579 cv = http.CanonicalHeaderKey(v)
580 sc.canonHeader[v] = cv
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800581 return cv
582}
583
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000584type readFrameResult struct {
585 f Frame // valid until readMore is called
586 err error
587
588 // readMore should be called once the consumer no longer needs or
589 // retains f. After readMore, f is invalid and more frames can be
590 // read.
591 readMore func()
592}
593
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800594// readFrames is the loop that reads incoming frames.
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000595// It takes care to only read one frame at a time, blocking until the
596// consumer is done with the frame.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800597// It's run on its own goroutine.
598func (sc *serverConn) readFrames() {
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000599 gate := make(gate)
Brad Fitzpatrickc5617802016-03-22 01:45:52 +0000600 gateDone := gate.Done
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800601 for {
602 f, err := sc.framer.ReadFrame()
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000603 select {
Brad Fitzpatrickc5617802016-03-22 01:45:52 +0000604 case sc.readFrameCh <- readFrameResult{f, err, gateDone}:
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000605 case <-sc.doneServing:
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800606 return
607 }
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000608 select {
609 case <-gate:
610 case <-sc.doneServing:
611 return
612 }
Brad Fitzpatrickea6dba82015-12-23 08:43:06 -0800613 if terminalReadFrameError(err) {
614 return
615 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800616 }
617}
618
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000619// frameWriteResult is the message passed from writeFrameAsync to the serve goroutine.
620type frameWriteResult struct {
621 wm frameWriteMsg // what was written (or attempted)
622 err error // result of the writeFrame call
623}
624
Brad Fitzpatrickaa524f62014-11-25 10:31:37 -0800625// writeFrameAsync runs in its own goroutine and writes a single frame
626// and then reports when it's done.
627// At most one goroutine can be running writeFrameAsync at a time per
628// serverConn.
629func (sc *serverConn) writeFrameAsync(wm frameWriteMsg) {
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800630 err := wm.write.writeFrame(sc)
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000631 sc.wroteFrameCh <- frameWriteResult{wm, err}
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800632}
633
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800634func (sc *serverConn) closeAllStreamsOnConnClose() {
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -0800635 sc.serveG.check()
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800636 for _, st := range sc.streams {
637 sc.closeStream(st, errClientDisconnected)
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -0800638 }
639}
640
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800641func (sc *serverConn) stopShutdownTimer() {
642 sc.serveG.check()
643 if t := sc.shutdownTimer; t != nil {
644 t.Stop()
645 }
646}
647
Brad Fitzpatrick996adcb2014-12-08 01:08:19 -0800648func (sc *serverConn) notePanic() {
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +0000649 // Note: this is for serverConn.serve panicking, not http.Handler code.
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -0800650 if testHookOnPanicMu != nil {
651 testHookOnPanicMu.Lock()
652 defer testHookOnPanicMu.Unlock()
653 }
Brad Fitzpatrick996adcb2014-12-08 01:08:19 -0800654 if testHookOnPanic != nil {
655 if e := recover(); e != nil {
656 if testHookOnPanic(sc, e) {
657 panic(e)
658 }
659 }
660 }
661}
662
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800663func (sc *serverConn) serve() {
664 sc.serveG.check()
Brad Fitzpatrick996adcb2014-12-08 01:08:19 -0800665 defer sc.notePanic()
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800666 defer sc.conn.Close()
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800667 defer sc.closeAllStreamsOnConnClose()
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800668 defer sc.stopShutdownTimer()
Brad Fitzpatrickaa524f62014-11-25 10:31:37 -0800669 defer close(sc.doneServing) // unblocks handlers trying to send
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800670
Brad Fitzpatrick415f1912015-12-16 20:28:38 +0000671 if VerboseLogs {
672 sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs)
673 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800674
Brad Fitzpatrick23564bf2014-11-27 19:40:04 -0800675 sc.writeFrame(frameWriteMsg{
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800676 write: writeSettings{
Brad Fitzpatrick23564bf2014-11-27 19:40:04 -0800677 {SettingMaxFrameSize, sc.srv.maxReadFrameSize()},
678 {SettingMaxConcurrentStreams, sc.advMaxStreams},
Brad Fitzpatrick29704b82015-10-10 18:01:18 -0700679 {SettingMaxHeaderListSize, sc.maxHeaderListSize()},
Brad Fitzpatrick953b5112014-12-06 17:59:01 -0800680
681 // TODO: more actual settings, notably
682 // SettingInitialWindowSize, but then we also
683 // want to bump up the conn window size the
684 // same amount here right after the settings
Brad Fitzpatrick23564bf2014-11-27 19:40:04 -0800685 },
686 })
Brad Fitzpatrick6a9b77b2014-12-03 13:56:36 -0800687 sc.unackedSettings++
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800688
689 if err := sc.readPreface(); err != nil {
Brad Fitzpatrick415f1912015-12-16 20:28:38 +0000690 sc.condlogf(err, "http2: server: error reading preface from client %v: %v", sc.conn.RemoteAddr(), err)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800691 return
692 }
Brad Fitzpatrickcd8c2702015-10-15 20:01:14 +0000693 // Now that we've got the preface, get us out of the
694 // "StateNew" state. We can't go directly to idle, though.
695 // Active means we read some data and anticipate a request. We'll
696 // do another Active when we get a HEADERS frame.
697 sc.setConnState(http.StateActive)
698 sc.setConnState(http.StateIdle)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800699
Brad Fitzpatrickaa524f62014-11-25 10:31:37 -0800700 go sc.readFrames() // closed by defer sc.conn.Close above
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800701
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800702 settingsTimer := time.NewTimer(firstSettingsTimeout)
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +0000703 loopNum := 0
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800704 for {
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +0000705 loopNum++
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800706 select {
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800707 case wm := <-sc.wantWriteFrameCh:
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800708 sc.writeFrame(wm)
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000709 case res := <-sc.wroteFrameCh:
710 sc.wroteFrame(res)
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000711 case res := <-sc.readFrameCh:
712 if !sc.processFrameFromReader(res) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800713 return
714 }
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +0000715 res.readMore()
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800716 if settingsTimer.C != nil {
717 settingsTimer.Stop()
718 settingsTimer.C = nil
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800719 }
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -0800720 case m := <-sc.bodyReadCh:
721 sc.noteBodyRead(m.st, m.n)
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800722 case <-settingsTimer.C:
723 sc.logf("timeout waiting for SETTINGS frames from %v", sc.conn.RemoteAddr())
724 return
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800725 case <-sc.shutdownTimerCh:
726 sc.vlogf("GOAWAY close timer fired; closing conn from %v", sc.conn.RemoteAddr())
727 return
Brad Fitzpatrick0db6d652014-11-15 15:49:19 -0800728 case fn := <-sc.testHookCh:
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +0000729 fn(loopNum)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800730 }
731 }
732}
733
Brad Fitzpatrick95842032014-11-15 09:47:42 -0800734// readPreface reads the ClientPreface greeting from the peer
735// or returns an error on timeout or an invalid greeting.
736func (sc *serverConn) readPreface() error {
737 errc := make(chan error, 1)
738 go func() {
739 // Read the client preface
740 buf := make([]byte, len(ClientPreface))
Brad Fitzpatrick95842032014-11-15 09:47:42 -0800741 if _, err := io.ReadFull(sc.conn, buf); err != nil {
742 errc <- err
743 } else if !bytes.Equal(buf, clientPreface) {
744 errc <- fmt.Errorf("bogus greeting %q", buf)
745 } else {
746 errc <- nil
747 }
748 }()
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +1100749 timer := time.NewTimer(prefaceTimeout) // TODO: configurable on *Server?
Brad Fitzpatrick95842032014-11-15 09:47:42 -0800750 defer timer.Stop()
751 select {
752 case <-timer.C:
753 return errors.New("timeout waiting for client preface")
754 case err := <-errc:
755 if err == nil {
Brad Fitzpatrick415f1912015-12-16 20:28:38 +0000756 if VerboseLogs {
757 sc.vlogf("http2: server: client %v said hello", sc.conn.RemoteAddr())
758 }
Brad Fitzpatrick95842032014-11-15 09:47:42 -0800759 }
760 return err
761 }
762}
763
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +0000764var errChanPool = sync.Pool{
765 New: func() interface{} { return make(chan error, 1) },
766}
767
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700768var writeDataPool = sync.Pool{
769 New: func() interface{} { return new(writeData) },
770}
771
772// writeDataFromHandler writes DATA response frames from a handler on
773// the given stream.
774func (sc *serverConn) writeDataFromHandler(stream *stream, data []byte, endStream bool) error {
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +0000775 ch := errChanPool.Get().(chan error)
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700776 writeArg := writeDataPool.Get().(*writeData)
777 *writeArg = writeData{stream.id, data, endStream}
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000778 err := sc.writeFrameFromHandler(frameWriteMsg{
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700779 write: writeArg,
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800780 stream: stream,
781 done: ch,
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800782 })
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000783 if err != nil {
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800784 return err
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000785 }
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700786 var frameWriteDone bool // the frame write is done (successfully or not)
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000787 select {
788 case err = <-ch:
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700789 frameWriteDone = true
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800790 case <-sc.doneServing:
791 return errClientDisconnected
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800792 case <-stream.cw:
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000793 // If both ch and stream.cw were ready (as might
794 // happen on the final Write after an http.Handler
795 // ends), prefer the write result. Otherwise this
796 // might just be us successfully closing the stream.
797 // The writeFrameAsync and serve goroutines guarantee
798 // that the ch send will happen before the stream.cw
799 // close.
800 select {
801 case err = <-ch:
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700802 frameWriteDone = true
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000803 default:
804 return errStreamClosed
805 }
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800806 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000807 errChanPool.Put(ch)
Brad Fitzpatrickc95266f2015-10-29 12:35:12 -0700808 if frameWriteDone {
809 writeDataPool.Put(writeArg)
810 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000811 return err
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800812}
813
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800814// writeFrameFromHandler sends wm to sc.wantWriteFrameCh, but aborts
815// if the connection has gone away.
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800816//
817// This must not be run from the serve goroutine itself, else it might
818// deadlock writing to sc.wantWriteFrameCh (which is only mildly
819// buffered and is read by serve itself). If you're on the serve
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800820// goroutine, call writeFrame instead.
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000821func (sc *serverConn) writeFrameFromHandler(wm frameWriteMsg) error {
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800822 sc.serveG.checkNotOn() // NOT
823 select {
824 case sc.wantWriteFrameCh <- wm:
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000825 return nil
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800826 case <-sc.doneServing:
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000827 // Serve loop is gone.
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800828 // Client has closed their connection to the server.
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000829 return errClientDisconnected
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -0800830 }
Brad Fitzpatricka29a3232014-11-15 11:18:25 -0800831}
832
Brad Fitzpatricka92fa952014-12-02 10:31:34 -0800833// writeFrame schedules a frame to write and sends it if there's nothing
834// already being written.
Brad Fitzpatrickdc0c5c02014-11-20 14:15:26 -0800835//
Brad Fitzpatricka92fa952014-12-02 10:31:34 -0800836// There is no pushback here (the serve goroutine never blocks). It's
837// the http.Handlers that block, waiting for their previous frames to
838// make it onto the wire
839//
840// If you're not on the serve goroutine, use writeFrameFromHandler instead.
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800841func (sc *serverConn) writeFrame(wm frameWriteMsg) {
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800842 sc.serveG.check()
Brad Fitzpatricka13c4a42014-11-27 17:47:29 -0800843 sc.writeSched.add(wm)
Tatsuhiro Tsujikawacc1e1da2014-12-02 20:04:27 +0900844 sc.scheduleFrameWrite()
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800845}
846
Brad Fitzpatrick165c0982014-11-26 08:53:01 -0800847// startFrameWrite starts a goroutine to write wm (in a separate
848// goroutine since that might block on the network), and updates the
849// serve goroutine's state about the world, updated from info in wm.
850func (sc *serverConn) startFrameWrite(wm frameWriteMsg) {
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -0800851 sc.serveG.check()
852 if sc.writingFrame {
Brad Fitzpatrick165c0982014-11-26 08:53:01 -0800853 panic("internal error: can only be writing one frame at a time")
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -0800854 }
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800855
856 st := wm.stream
857 if st != nil {
858 switch st.state {
859 case stateHalfClosedLocal:
860 panic("internal error: attempt to send frame on half-closed-local stream")
861 case stateClosed:
862 if st.sentReset || st.gotReset {
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000863 // Skip this frame.
864 sc.scheduleFrameWrite()
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800865 return
866 }
Brad Fitzpatricka92fa952014-12-02 10:31:34 -0800867 panic(fmt.Sprintf("internal error: attempt to send a write %v on a closed stream", wm))
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800868 }
869 }
870
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000871 sc.writingFrame = true
Brad Fitzpatrick5e4e2dc2014-11-19 16:49:43 -0800872 sc.needsFrameFlush = true
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000873 go sc.writeFrameAsync(wm)
874}
875
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +0000876// errHandlerPanicked is the error given to any callers blocked in a read from
877// Request.Body when the main goroutine panics. Since most handlers read in the
878// the main ServeHTTP goroutine, this will show up rarely.
879var errHandlerPanicked = errors.New("http2: handler panicked")
880
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000881// wroteFrame is called on the serve goroutine with the result of
882// whatever happened on writeFrameAsync.
883func (sc *serverConn) wroteFrame(res frameWriteResult) {
884 sc.serveG.check()
885 if !sc.writingFrame {
886 panic("internal error: expected to be already writing a frame")
887 }
888 sc.writingFrame = false
889
890 wm := res.wm
891 st := wm.stream
892
893 closeStream := endsStream(wm.write)
894
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +0000895 if _, ok := wm.write.(handlerPanicRST); ok {
896 sc.closeStream(st, errHandlerPanicked)
897 }
898
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000899 // Reply (if requested) to the blocked ServeHTTP goroutine.
900 if ch := wm.done; ch != nil {
901 select {
902 case ch <- res.err:
903 default:
904 panic(fmt.Sprintf("unbuffered done channel passed in for type %T", wm.write))
905 }
906 }
907 wm.write = nil // prevent use (assume it's tainted after wm.done send)
908
909 if closeStream {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800910 if st == nil {
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800911 panic("internal error: expecting non-nil stream")
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800912 }
913 switch st.state {
914 case stateOpen:
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -0800915 // Here we would go to stateHalfClosedLocal in
916 // theory, but since our handler is done and
917 // the net/http package provides no mechanism
918 // for finishing writing to a ResponseWriter
919 // while still reading data (see possible TODO
920 // at top of this file), we go into closed
921 // state here anyway, after telling the peer
922 // we're hanging up on them.
923 st.state = stateHalfClosedLocal // won't last long, but necessary for closeStream via resetStream
924 errCancel := StreamError{st.id, ErrCodeCancel}
925 sc.resetStream(errCancel)
Brad Fitzpatrickbd391962014-11-17 18:58:58 -0800926 case stateHalfClosedRemote:
Brad Fitzpatrickb7f5d982015-10-26 13:59:20 -0500927 sc.closeStream(st, errHandlerComplete)
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -0800928 }
929 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +0000930
931 sc.scheduleFrameWrite()
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -0800932}
933
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800934// scheduleFrameWrite tickles the frame writing scheduler.
935//
936// If a frame is already being written, nothing happens. This will be called again
937// when the frame is done being written.
938//
939// If a frame isn't being written we need to send one, the best frame
940// to send is selected, preferring first things that aren't
941// stream-specific (e.g. ACKing settings), and then finding the
942// highest priority stream.
943//
944// If a frame isn't being written and there's nothing else to send, we
945// flush the write buffer.
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800946func (sc *serverConn) scheduleFrameWrite() {
947 sc.serveG.check()
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800948 if sc.writingFrame {
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800949 return
950 }
951 if sc.needToSendGoAway {
952 sc.needToSendGoAway = false
Brad Fitzpatrick165c0982014-11-26 08:53:01 -0800953 sc.startFrameWrite(frameWriteMsg{
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800954 write: &writeGoAway{
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800955 maxStreamID: sc.maxStreamID,
956 code: sc.goAwayCode,
957 },
958 })
959 return
960 }
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800961 if sc.needToSendSettingsAck {
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -0800962 sc.needToSendSettingsAck = false
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -0800963 sc.startFrameWrite(frameWriteMsg{write: writeSettingsAck{}})
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -0800964 return
965 }
Brad Fitzpatrick2b459472014-11-30 19:18:57 -0800966 if !sc.inGoAway {
967 if wm, ok := sc.writeSched.take(); ok {
968 sc.startFrameWrite(wm)
969 return
970 }
971 }
972 if sc.needsFrameFlush {
973 sc.startFrameWrite(frameWriteMsg{write: flushFrameWriter{}})
974 sc.needsFrameFlush = false // after startFrameWrite, since it sets this true
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800975 return
976 }
Brad Fitzpatrick520123b2014-11-14 15:57:37 -0800977}
978
Brad Fitzpatrick55815ec2014-11-15 13:29:57 -0800979func (sc *serverConn) goAway(code ErrCode) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -0800980 sc.serveG.check()
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800981 if sc.inGoAway {
Brad Fitzpatrick55815ec2014-11-15 13:29:57 -0800982 return
983 }
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -0800984 if code != ErrCodeNo {
985 sc.shutDownIn(250 * time.Millisecond)
986 } else {
987 // TODO: configurable
988 sc.shutDownIn(1 * time.Second)
989 }
990 sc.inGoAway = true
991 sc.needToSendGoAway = true
992 sc.goAwayCode = code
993 sc.scheduleFrameWrite()
994}
995
996func (sc *serverConn) shutDownIn(d time.Duration) {
997 sc.serveG.check()
998 sc.shutdownTimer = time.NewTimer(d)
999 sc.shutdownTimerCh = sc.shutdownTimer.C
Brad Fitzpatrick55815ec2014-11-15 13:29:57 -08001000}
1001
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -08001002func (sc *serverConn) resetStream(se StreamError) {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001003 sc.serveG.check()
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001004 sc.writeFrame(frameWriteMsg{write: se})
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -08001005 if st, ok := sc.streams[se.StreamID]; ok {
1006 st.sentReset = true
1007 sc.closeStream(st, se)
1008 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001009}
1010
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001011// processFrameFromReader processes the serve loop's read from readFrameCh from the
1012// frame-reading goroutine.
1013// processFrameFromReader returns whether the connection should be kept open.
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +00001014func (sc *serverConn) processFrameFromReader(res readFrameResult) bool {
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001015 sc.serveG.check()
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +00001016 err := res.err
1017 if err != nil {
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -08001018 if err == ErrFrameTooLarge {
1019 sc.goAway(ErrCodeFrameSize)
1020 return true // goAway will close the loop
1021 }
Brad Fitzpatrickeb066e32016-01-26 18:31:02 +00001022 clientGone := err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err)
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001023 if clientGone {
1024 // TODO: could we also get into this state if
1025 // the peer does a half close
1026 // (e.g. CloseWrite) because they're done
1027 // sending frames but they're still wanting
1028 // our open replies? Investigate.
Brad Fitzpatrickb2ca8da2014-12-08 00:41:28 -08001029 // TODO: add CloseWrite to crypto/tls.Conn first
1030 // so we have a way to test this? I suppose
1031 // just for testing we could have a non-TLS mode.
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001032 return false
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001033 }
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +00001034 } else {
1035 f := res.f
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001036 if VerboseLogs {
1037 sc.vlogf("http2: server read frame %v", summarizeFrame(f))
1038 }
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001039 err = sc.processFrame(f)
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001040 if err == nil {
1041 return true
1042 }
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001043 }
1044
1045 switch ev := err.(type) {
1046 case StreamError:
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -08001047 sc.resetStream(ev)
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001048 return true
1049 case goAwayFlowError:
Brad Fitzpatrick55815ec2014-11-15 13:29:57 -08001050 sc.goAway(ErrCodeFlowControl)
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001051 return true
1052 case ConnectionError:
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001053 sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev)
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -08001054 sc.goAway(ErrCode(ev))
1055 return true // goAway will handle shutdown
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001056 default:
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +00001057 if res.err != nil {
Brad Fitzpatrickeb066e32016-01-26 18:31:02 +00001058 sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err)
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001059 } else {
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001060 sc.logf("http2: server closing client connection: %v", err)
Brad Fitzpatrick8ec321e2014-11-25 14:08:16 -08001061 }
Brad Fitzpatrick271cfc12015-10-12 23:49:56 +00001062 return false
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001063 }
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001064}
1065
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001066func (sc *serverConn) processFrame(f Frame) error {
1067 sc.serveG.check()
1068
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001069 // First frame received must be SETTINGS.
1070 if !sc.sawFirstSettings {
1071 if _, ok := f.(*SettingsFrame); !ok {
1072 return ConnectionError(ErrCodeProtocol)
1073 }
1074 sc.sawFirstSettings = true
1075 }
1076
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001077 switch f := f.(type) {
1078 case *SettingsFrame:
1079 return sc.processSettings(f)
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301080 case *MetaHeadersFrame:
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001081 return sc.processHeaders(f)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001082 case *WindowUpdateFrame:
1083 return sc.processWindowUpdate(f)
1084 case *PingFrame:
1085 return sc.processPing(f)
1086 case *DataFrame:
1087 return sc.processData(f)
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001088 case *RSTStreamFrame:
1089 return sc.processResetStream(f)
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001090 case *PriorityFrame:
1091 return sc.processPriority(f)
Daniel Morsing9f251692014-12-05 18:17:30 +00001092 case *PushPromiseFrame:
1093 // A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE
1094 // frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
1095 return ConnectionError(ErrCodeProtocol)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001096 default:
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001097 sc.vlogf("http2: server ignoring frame: %v", f.Header())
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001098 return nil
1099 }
1100}
1101
1102func (sc *serverConn) processPing(f *PingFrame) error {
1103 sc.serveG.check()
Brad Fitzpatricka179abb2015-11-07 16:46:24 +01001104 if f.IsAck() {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001105 // 6.7 PING: " An endpoint MUST NOT respond to PING frames
1106 // containing this flag."
1107 return nil
1108 }
1109 if f.StreamID != 0 {
1110 // "PING frames are not associated with any individual
1111 // stream. If a PING frame is received with a stream
1112 // identifier field value other than 0x0, the recipient MUST
1113 // respond with a connection error (Section 5.4.1) of type
1114 // PROTOCOL_ERROR."
1115 return ConnectionError(ErrCodeProtocol)
1116 }
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001117 sc.writeFrame(frameWriteMsg{write: writePingAck{f}})
Brad Fitzpatrick9e0eccc2014-11-15 09:14:49 -08001118 return nil
1119}
1120
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001121func (sc *serverConn) processWindowUpdate(f *WindowUpdateFrame) error {
1122 sc.serveG.check()
1123 switch {
1124 case f.StreamID != 0: // stream-level flow control
1125 st := sc.streams[f.StreamID]
1126 if st == nil {
1127 // "WINDOW_UPDATE can be sent by a peer that has sent a
1128 // frame bearing the END_STREAM flag. This means that a
1129 // receiver could receive a WINDOW_UPDATE frame on a "half
1130 // closed (remote)" or "closed" stream. A receiver MUST
1131 // NOT treat this as an error, see Section 5.1."
1132 return nil
1133 }
1134 if !st.flow.add(int32(f.Increment)) {
1135 return StreamError{f.StreamID, ErrCodeFlowControl}
1136 }
1137 default: // connection-level flow control
1138 if !sc.flow.add(int32(f.Increment)) {
1139 return goAwayFlowError{}
1140 }
1141 }
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001142 sc.scheduleFrameWrite()
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001143 return nil
1144}
1145
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001146func (sc *serverConn) processResetStream(f *RSTStreamFrame) error {
1147 sc.serveG.check()
Brad Fitzpatricka98415a2014-12-08 00:47:45 -08001148
1149 state, st := sc.state(f.StreamID)
1150 if state == stateIdle {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001151 // 6.4 "RST_STREAM frames MUST NOT be sent for a
1152 // stream in the "idle" state. If a RST_STREAM frame
1153 // identifying an idle stream is received, the
1154 // recipient MUST treat this as a connection error
1155 // (Section 5.4.1) of type PROTOCOL_ERROR.
1156 return ConnectionError(ErrCodeProtocol)
1157 }
Brad Fitzpatricka98415a2014-12-08 00:47:45 -08001158 if st != nil {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001159 st.gotReset = true
1160 sc.closeStream(st, StreamError{f.StreamID, f.ErrCode})
1161 }
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001162 return nil
1163}
1164
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001165func (sc *serverConn) closeStream(st *stream, err error) {
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001166 sc.serveG.check()
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001167 if st.state == stateIdle || st.state == stateClosed {
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -08001168 panic(fmt.Sprintf("invariant; can't close stream in state %v", st.state))
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001169 }
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001170 st.state = stateClosed
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -08001171 sc.curOpenStreams--
Brad Fitzpatrickcd8c2702015-10-15 20:01:14 +00001172 if sc.curOpenStreams == 0 {
1173 sc.setConnState(http.StateIdle)
1174 }
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001175 delete(sc.streams, st.id)
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001176 if p := st.body; p != nil {
Brad Fitzpatrickb7f5d982015-10-26 13:59:20 -05001177 p.CloseWithError(err)
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001178 }
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001179 st.cw.Close() // signals Handler's CloseNotifier, unblocks writes, etc
Brad Fitzpatrick5b95eb32014-12-02 10:52:56 -08001180 sc.writeSched.forgetStream(st.id)
Brad Fitzpatricke7da8ed2016-03-05 22:47:48 +00001181 if st.reqBuf != nil {
1182 // Stash this request body buffer (64k) away for reuse
1183 // by a future POST/PUT/etc.
1184 //
1185 // TODO(bradfitz): share on the server? sync.Pool?
1186 // Server requires locks and might hurt contention.
1187 // sync.Pool might work, or might be worse, depending
1188 // on goroutine CPU migrations. (get and put on
1189 // separate CPUs). Maybe a mix of strategies. But
1190 // this is an easy win for now.
1191 sc.freeRequestBodyBuf = st.reqBuf
1192 }
Brad Fitzpatrick6d3aa4f2014-11-15 14:55:57 -08001193}
1194
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001195func (sc *serverConn) processSettings(f *SettingsFrame) error {
1196 sc.serveG.check()
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001197 if f.IsAck() {
Brad Fitzpatrick6a9b77b2014-12-03 13:56:36 -08001198 sc.unackedSettings--
1199 if sc.unackedSettings < 0 {
1200 // Why is the peer ACKing settings we never sent?
1201 // The spec doesn't mention this case, but
1202 // hang up on them anyway.
1203 return ConnectionError(ErrCodeProtocol)
1204 }
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001205 return nil
1206 }
1207 if err := f.ForeachSetting(sc.processSetting); err != nil {
1208 return err
1209 }
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -08001210 sc.needToSendSettingsAck = true
1211 sc.scheduleFrameWrite()
Brad Fitzpatrickd07a0e42014-11-15 10:47:12 -08001212 return nil
1213}
1214
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001215func (sc *serverConn) processSetting(s Setting) error {
1216 sc.serveG.check()
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001217 if err := s.Valid(); err != nil {
1218 return err
1219 }
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001220 if VerboseLogs {
1221 sc.vlogf("http2: server processing setting %v", s)
1222 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001223 switch s.ID {
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001224 case SettingHeaderTableSize:
1225 sc.headerTableSize = s.Val
Tatsuhiro Tsujikawac7d67a52014-11-20 01:01:39 +09001226 sc.hpackEncoder.SetMaxDynamicTableSize(s.Val)
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001227 case SettingEnablePush:
1228 sc.pushEnabled = s.Val != 0
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001229 case SettingMaxConcurrentStreams:
Brad Fitzpatrick6ec17312014-11-23 10:07:07 -08001230 sc.clientMaxStreams = s.Val
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001231 case SettingInitialWindowSize:
1232 return sc.processSettingInitialWindowSize(s.Val)
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001233 case SettingMaxFrameSize:
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001234 sc.writeSched.maxFrameSize = s.Val
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001235 case SettingMaxHeaderListSize:
Brad Fitzpatrick29704b82015-10-10 18:01:18 -07001236 sc.peerMaxHeaderListSize = s.Val
gbbr0b3b5742014-11-23 00:44:48 +00001237 default:
1238 // Unknown setting: "An endpoint that receives a SETTINGS
1239 // frame with any unknown or unsupported identifier MUST
1240 // ignore that setting."
Brad Fitzpatrick415f1912015-12-16 20:28:38 +00001241 if VerboseLogs {
1242 sc.vlogf("http2: server ignoring unknown setting %v", s)
1243 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001244 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001245 return nil
1246}
1247
1248func (sc *serverConn) processSettingInitialWindowSize(val uint32) error {
1249 sc.serveG.check()
Brad Fitzpatrickbc00c572014-11-17 12:28:01 -08001250 // Note: val already validated to be within range by
1251 // processSetting's Valid call.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001252
1253 // "A SETTINGS frame can alter the initial flow control window
1254 // size for all current streams. When the value of
1255 // SETTINGS_INITIAL_WINDOW_SIZE changes, a receiver MUST
1256 // adjust the size of all stream flow control windows that it
1257 // maintains by the difference between the new value and the
1258 // old value."
1259 old := sc.initialWindowSize
1260 sc.initialWindowSize = int32(val)
1261 growth := sc.initialWindowSize - old // may be negative
1262 for _, st := range sc.streams {
1263 if !st.flow.add(growth) {
1264 // 6.9.2 Initial Flow Control Window Size
1265 // "An endpoint MUST treat a change to
1266 // SETTINGS_INITIAL_WINDOW_SIZE that causes any flow
1267 // control window to exceed the maximum size as a
1268 // connection error (Section 5.4.1) of type
1269 // FLOW_CONTROL_ERROR."
1270 return ConnectionError(ErrCodeFlowControl)
1271 }
1272 }
1273 return nil
1274}
1275
1276func (sc *serverConn) processData(f *DataFrame) error {
1277 sc.serveG.check()
1278 // "If a DATA frame is received whose stream is not in "open"
1279 // or "half closed (local)" state, the recipient MUST respond
1280 // with a stream error (Section 5.4.2) of type STREAM_CLOSED."
1281 id := f.Header().StreamID
1282 st, ok := sc.streams[id]
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001283 if !ok || st.state != stateOpen || st.gotTrailerHeader {
Brad Fitzpatrickf3a6d9a2014-12-08 07:53:36 -08001284 // This includes sending a RST_STREAM if the stream is
1285 // in stateHalfClosedLocal (which currently means that
1286 // the http.Handler returned, so it's done reading &
1287 // done writing). Try to stop the client from sending
1288 // more DATA.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001289 return StreamError{id, ErrCodeStreamClosed}
1290 }
1291 if st.body == nil {
Brad Fitzpatrickb0a06c82014-11-26 09:21:28 -08001292 panic("internal error: should have a body in this state")
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001293 }
1294 data := f.Data()
1295
1296 // Sender sending more than they'd declared?
1297 if st.declBodyBytes != -1 && st.bodyBytes+int64(len(data)) > st.declBodyBytes {
Brad Fitzpatrickb7f5d982015-10-26 13:59:20 -05001298 st.body.CloseWithError(fmt.Errorf("sender tried to send more than declared Content-Length of %d bytes", st.declBodyBytes))
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001299 return StreamError{id, ErrCodeStreamClosed}
1300 }
1301 if len(data) > 0 {
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +11001302 // Check whether the client has flow control quota.
1303 if int(st.inflow.available()) < len(data) {
1304 return StreamError{id, ErrCodeFlowControl}
1305 }
1306 st.inflow.take(int32(len(data)))
Brad Fitzpatrick0218ba62014-11-26 09:36:05 -08001307 wrote, err := st.body.Write(data)
1308 if err != nil {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001309 return StreamError{id, ErrCodeStreamClosed}
1310 }
Brad Fitzpatrick0218ba62014-11-26 09:36:05 -08001311 if wrote != len(data) {
1312 panic("internal error: bad Writer")
1313 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001314 st.bodyBytes += int64(len(data))
1315 }
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001316 if f.StreamEnded() {
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001317 st.endStream()
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001318 }
1319 return nil
1320}
1321
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001322// endStream closes a Request.Body's pipe. It is called when a DATA
1323// frame says a request body is over (or after trailers).
1324func (st *stream) endStream() {
1325 sc := st.sc
1326 sc.serveG.check()
1327
1328 if st.declBodyBytes != -1 && st.declBodyBytes != st.bodyBytes {
1329 st.body.CloseWithError(fmt.Errorf("request declared a Content-Length of %d but only wrote %d bytes",
1330 st.declBodyBytes, st.bodyBytes))
1331 } else {
1332 st.body.closeWithErrorAndCode(io.EOF, st.copyTrailersToHandlerRequest)
1333 st.body.CloseWithError(io.EOF)
1334 }
1335 st.state = stateHalfClosedRemote
1336}
1337
1338// copyTrailersToHandlerRequest is run in the Handler's goroutine in
1339// its Request.Body.Read just before it gets io.EOF.
1340func (st *stream) copyTrailersToHandlerRequest() {
1341 for k, vv := range st.trailer {
1342 if _, ok := st.reqTrailer[k]; ok {
1343 // Only copy it over it was pre-declared.
1344 st.reqTrailer[k] = vv
1345 }
1346 }
1347}
1348
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301349func (sc *serverConn) processHeaders(f *MetaHeadersFrame) error {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001350 sc.serveG.check()
1351 id := f.Header().StreamID
Brad Fitzpatrick21896bb2014-11-19 16:05:21 -08001352 if sc.inGoAway {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001353 // Ignore.
1354 return nil
1355 }
1356 // http://http2.github.io/http2-spec/#rfc.section.5.1.1
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001357 // Streams initiated by a client MUST use odd-numbered stream
1358 // identifiers. [...] An endpoint that receives an unexpected
1359 // stream identifier MUST respond with a connection error
1360 // (Section 5.4.1) of type PROTOCOL_ERROR.
1361 if id%2 != 1 {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001362 return ConnectionError(ErrCodeProtocol)
1363 }
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001364 // A HEADERS frame can be used to create a new stream or
1365 // send a trailer for an open one. If we already have a stream
1366 // open, let it process its own HEADERS frame (trailers at this
1367 // point, if it's valid).
1368 st := sc.streams[f.Header().StreamID]
1369 if st != nil {
1370 return st.processTrailerHeaders(f)
1371 }
1372
1373 // [...] The identifier of a newly established stream MUST be
1374 // numerically greater than all streams that the initiating
1375 // endpoint has opened or reserved. [...] An endpoint that
1376 // receives an unexpected stream identifier MUST respond with
1377 // a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301378 if id <= sc.maxStreamID {
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001379 return ConnectionError(ErrCodeProtocol)
1380 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301381 sc.maxStreamID = id
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001382
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001383 st = &stream{
1384 sc: sc,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001385 id: id,
1386 state: stateOpen,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001387 }
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001388 if f.StreamEnded() {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001389 st.state = stateHalfClosedRemote
1390 }
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +11001391 st.cw.Init()
1392
1393 st.flow.conn = &sc.flow // link to conn-level counter
1394 st.flow.add(sc.initialWindowSize)
1395 st.inflow.conn = &sc.inflow // link to conn-level counter
1396 st.inflow.add(initialWindowSize) // TODO: update this when we send a higher initial window size in the initial settings
1397
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001398 sc.streams[id] = st
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001399 if f.HasPriority() {
Daniel Morsinga5c55932014-12-14 13:34:18 +01001400 adjustStreamPriority(sc.streams, st.id, f.Priority)
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001401 }
Brad Fitzpatrickb3e0a872014-11-23 21:15:59 -08001402 sc.curOpenStreams++
Brad Fitzpatrickcd8c2702015-10-15 20:01:14 +00001403 if sc.curOpenStreams == 1 {
1404 sc.setConnState(http.StateActive)
1405 }
Brad Fitzpatrickb3e0a872014-11-23 21:15:59 -08001406 if sc.curOpenStreams > sc.advMaxStreams {
Brad Fitzpatrick6a9b77b2014-12-03 13:56:36 -08001407 // "Endpoints MUST NOT exceed the limit set by their
1408 // peer. An endpoint that receives a HEADERS frame
1409 // that causes their advertised concurrent stream
1410 // limit to be exceeded MUST treat this as a stream
1411 // error (Section 5.4.2) of type PROTOCOL_ERROR or
1412 // REFUSED_STREAM."
1413 if sc.unackedSettings == 0 {
1414 // They should know better.
1415 return StreamError{st.id, ErrCodeProtocol}
1416 }
1417 // Assume it's a network race, where they just haven't
1418 // received our last SETTINGS update. But actually
1419 // this can't happen yet, because we don't yet provide
1420 // a way for users to adjust server parameters at
1421 // runtime.
1422 return StreamError{st.id, ErrCodeRefusedStream}
Brad Fitzpatrickb3e0a872014-11-23 21:15:59 -08001423 }
1424
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301425 rw, req, err := sc.newWriterAndRequest(st, f)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001426 if err != nil {
1427 return err
1428 }
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001429 st.reqTrailer = req.Trailer
1430 if st.reqTrailer != nil {
1431 st.trailer = make(http.Header)
1432 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001433 st.body = req.Body.(*requestBody).pipe // may be nil
1434 st.declBodyBytes = req.ContentLength
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +00001435
1436 handler := sc.handler.ServeHTTP
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301437 if f.Truncated {
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +00001438 // Their header list was too long. Send a 431 error.
1439 handler = handleHeaderListTooLong
1440 }
1441
1442 go sc.runHandler(rw, req, handler)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001443 return nil
1444}
1445
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301446func (st *stream) processTrailerHeaders(f *MetaHeadersFrame) error {
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001447 sc := st.sc
1448 sc.serveG.check()
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301449 if st.gotTrailerHeader {
1450 return ConnectionError(ErrCodeProtocol)
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001451 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301452 st.gotTrailerHeader = true
1453 if !f.StreamEnded() {
1454 return StreamError{st.id, ErrCodeProtocol}
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001455 }
Brad Fitzpatrickf530c4e2016-01-07 08:16:00 -08001456
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301457 if len(f.PseudoFields()) > 0 {
1458 return StreamError{st.id, ErrCodeProtocol}
Brad Fitzpatrickf530c4e2016-01-07 08:16:00 -08001459 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301460 if st.trailer != nil {
1461 for _, hf := range f.RegularFields() {
1462 key := sc.canonicalHeader(hf.Name)
1463 st.trailer[key] = append(st.trailer[key], hf.Value)
1464 }
1465 }
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001466 st.endStream()
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001467 return nil
1468}
1469
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001470func (sc *serverConn) processPriority(f *PriorityFrame) error {
Daniel Morsinga5c55932014-12-14 13:34:18 +01001471 adjustStreamPriority(sc.streams, f.StreamID, f.PriorityParam)
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001472 return nil
1473}
1474
Daniel Morsinga5c55932014-12-14 13:34:18 +01001475func adjustStreamPriority(streams map[uint32]*stream, streamID uint32, priority PriorityParam) {
1476 st, ok := streams[streamID]
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001477 if !ok {
1478 // TODO: not quite correct (this streamID might
1479 // already exist in the dep tree, but be closed), but
1480 // close enough for now.
1481 return
1482 }
1483 st.weight = priority.Weight
Daniel Morsinga5c55932014-12-14 13:34:18 +01001484 parent := streams[priority.StreamDep] // might be nil
1485 if parent == st {
1486 // if client tries to set this stream to be the parent of itself
1487 // ignore and keep going
1488 return
1489 }
1490
1491 // section 5.3.3: If a stream is made dependent on one of its
1492 // own dependencies, the formerly dependent stream is first
1493 // moved to be dependent on the reprioritized stream's previous
1494 // parent. The moved dependency retains its weight.
1495 for piter := parent; piter != nil; piter = piter.parent {
1496 if piter == st {
1497 parent.parent = st.parent
1498 break
1499 }
1500 }
1501 st.parent = parent
1502 if priority.Exclusive && (st.parent != nil || priority.StreamDep == 0) {
1503 for _, openStream := range streams {
1504 if openStream != st && openStream.parent == st.parent {
Brad Fitzpatrick2ee3a492014-11-30 23:18:32 -08001505 openStream.parent = st
1506 }
1507 }
1508 }
1509}
1510
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301511func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*responseWriter, *http.Request, error) {
Brad Fitzpatrickb3e0a872014-11-23 21:15:59 -08001512 sc.serveG.check()
Brad Fitzpatrickb3e0a872014-11-23 21:15:59 -08001513
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301514 method := f.PseudoValue("method")
1515 path := f.PseudoValue("path")
1516 scheme := f.PseudoValue("scheme")
1517 authority := f.PseudoValue("authority")
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001518
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301519 isConnect := method == "CONNECT"
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001520 if isConnect {
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301521 if path != "" || scheme != "" || authority == "" {
1522 return nil, nil, StreamError{f.StreamID, ErrCodeProtocol}
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001523 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301524 } else if method == "" || path == "" ||
1525 (scheme != "https" && scheme != "http") {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001526 // See 8.1.2.6 Malformed Requests and Responses:
1527 //
1528 // Malformed requests or responses that are detected
1529 // MUST be treated as a stream error (Section 5.4.2)
1530 // of type PROTOCOL_ERROR."
1531 //
1532 // 8.1.2.3 Request Pseudo-Header Fields
1533 // "All HTTP/2 requests MUST include exactly one valid
1534 // value for the :method, :scheme, and :path
1535 // pseudo-header fields"
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301536 return nil, nil, StreamError{f.StreamID, ErrCodeProtocol}
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001537 }
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001538
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301539 bodyOpen := !f.StreamEnded()
1540 if method == "HEAD" && bodyOpen {
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001541 // HEAD requests can't have bodies
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301542 return nil, nil, StreamError{f.StreamID, ErrCodeProtocol}
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001543 }
Brad Fitzpatrick30b16812014-12-08 10:10:39 -08001544 var tlsState *tls.ConnectionState // nil if not scheme https
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001545
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301546 if scheme == "https" {
Brad Fitzpatrick30b16812014-12-08 10:10:39 -08001547 tlsState = sc.tlsState
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001548 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301549
1550 header := make(http.Header)
1551 for _, hf := range f.RegularFields() {
1552 header.Add(sc.canonicalHeader(hf.Name), hf.Value)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001553 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301554
1555 if authority == "" {
1556 authority = header.Get("Host")
1557 }
1558 needsContinue := header.Get("Expect") == "100-continue"
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001559 if needsContinue {
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301560 header.Del("Expect")
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001561 }
Brad Fitzpatrickb8469202015-10-07 22:10:10 -07001562 // Merge Cookie headers into one "; "-delimited value.
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301563 if cookies := header["Cookie"]; len(cookies) > 1 {
1564 header.Set("Cookie", strings.Join(cookies, "; "))
Brad Fitzpatrickb8469202015-10-07 22:10:10 -07001565 }
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001566
1567 // Setup Trailers
1568 var trailer http.Header
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301569 for _, v := range header["Trailer"] {
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001570 for _, key := range strings.Split(v, ",") {
1571 key = http.CanonicalHeaderKey(strings.TrimSpace(key))
1572 switch key {
1573 case "Transfer-Encoding", "Trailer", "Content-Length":
1574 // Bogus. (copy of http1 rules)
1575 // Ignore.
1576 default:
1577 if trailer == nil {
1578 trailer = make(http.Header)
1579 }
1580 trailer[key] = nil
1581 }
1582 }
1583 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301584 delete(header, "Trailer")
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001585
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001586 body := &requestBody{
Brad Fitzpatrick914bad52014-11-30 21:05:26 -08001587 conn: sc,
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301588 stream: st,
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001589 needsContinue: needsContinue,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001590 }
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001591 var url_ *url.URL
1592 var requestURI string
1593 if isConnect {
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301594 url_ = &url.URL{Host: authority}
1595 requestURI = authority // mimic HTTP/1 server behavior
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001596 } else {
1597 var err error
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301598 url_, err = url.ParseRequestURI(path)
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001599 if err != nil {
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301600 return nil, nil, StreamError{f.StreamID, ErrCodeProtocol}
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001601 }
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301602 requestURI = path
Brad Fitzpatrickff0471b2014-11-14 21:55:14 -08001603 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001604 req := &http.Request{
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301605 Method: method,
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001606 URL: url_,
Brad Fitzpatrickdf959c22014-12-09 07:20:20 +11001607 RemoteAddr: sc.remoteAddrStr,
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301608 Header: header,
Brad Fitzpatrick961116a2016-01-05 14:53:21 -08001609 RequestURI: requestURI,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001610 Proto: "HTTP/2.0",
1611 ProtoMajor: 2,
1612 ProtoMinor: 0,
1613 TLS: tlsState,
1614 Host: authority,
1615 Body: body,
Brad Fitzpatrickc24de9d2015-12-16 17:29:56 +00001616 Trailer: trailer,
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001617 }
1618 if bodyOpen {
Brad Fitzpatrick1600a4c2016-03-26 08:32:47 +11001619 // Disabled, per golang.org/issue/14960:
1620 // st.reqBuf = sc.getRequestBodyBuf()
1621 // TODO: remove this 64k of garbage per request (again, but without a data race):
1622 buf := make([]byte, initialWindowSize)
1623
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001624 body.pipe = &pipe{
Brad Fitzpatrick1600a4c2016-03-26 08:32:47 +11001625 b: &fixedBuffer{buf: buf},
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001626 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001627
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301628 if vv, ok := header["Content-Length"]; ok {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001629 req.ContentLength, _ = strconv.ParseInt(vv[0], 10, 64)
1630 } else {
1631 req.ContentLength = -1
1632 }
1633 }
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001634
1635 rws := responseWriterStatePool.Get().(*responseWriterState)
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001636 bwSave := rws.bw
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08001637 *rws = responseWriterState{} // zero all the fields
Brad Fitzpatrick914bad52014-11-30 21:05:26 -08001638 rws.conn = sc
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001639 rws.bw = bwSave
1640 rws.bw.Reset(chunkWriter{rws})
Brad Fitzpatrick9e1fb3c2016-02-20 14:24:27 +05301641 rws.stream = st
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001642 rws.req = req
1643 rws.body = body
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001644
1645 rw := &responseWriter{rws: rws}
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001646 return rw, req, nil
1647}
1648
Brad Fitzpatricke7da8ed2016-03-05 22:47:48 +00001649func (sc *serverConn) getRequestBodyBuf() []byte {
1650 sc.serveG.check()
1651 if buf := sc.freeRequestBodyBuf; buf != nil {
1652 sc.freeRequestBodyBuf = nil
1653 return buf
1654 }
1655 return make([]byte, initialWindowSize)
1656}
1657
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001658// Run on its own goroutine.
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +00001659func (sc *serverConn) runHandler(rw *responseWriter, req *http.Request, handler func(http.ResponseWriter, *http.Request)) {
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +00001660 didPanic := true
1661 defer func() {
1662 if didPanic {
1663 e := recover()
1664 // Same as net/http:
1665 const size = 64 << 10
1666 buf := make([]byte, size)
1667 buf = buf[:runtime.Stack(buf, false)]
1668 sc.writeFrameFromHandler(frameWriteMsg{
1669 write: handlerPanicRST{rw.rws.stream.id},
1670 stream: rw.rws.stream,
1671 })
1672 sc.logf("http2: panic serving %v: %v\n%s", sc.conn.RemoteAddr(), e, buf)
1673 return
1674 }
1675 rw.handlerDone()
1676 }()
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +00001677 handler(rw, req)
Brad Fitzpatrick74bd44b2015-12-15 00:47:28 +00001678 didPanic = false
Brad Fitzpatrickd8f3c682015-10-12 20:56:49 +00001679}
1680
1681func handleHeaderListTooLong(w http.ResponseWriter, r *http.Request) {
1682 // 10.5.1 Limits on Header Block Size:
1683 // .. "A server that receives a larger header block than it is
1684 // willing to handle can send an HTTP 431 (Request Header Fields Too
1685 // Large) status code"
1686 const statusRequestHeaderFieldsTooLarge = 431 // only in Go 1.6+
1687 w.WriteHeader(statusRequestHeaderFieldsTooLarge)
1688 io.WriteString(w, "<h1>HTTP Error 431</h1><p>Request Header Field(s) Too Large</p>")
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001689}
1690
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001691// called from handler goroutines.
1692// h may be nil.
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001693func (sc *serverConn) writeHeaders(st *stream, headerData *writeResHeaders) error {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001694 sc.serveG.checkNotOn() // NOT on
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001695 var errc chan error
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001696 if headerData.h != nil {
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001697 // If there's a header map (which we don't own), so we have to block on
1698 // waiting for this frame to be written, so an http.Flush mid-handler
1699 // writes out the correct value of keys, before a handler later potentially
1700 // mutates it.
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +00001701 errc = errChanPool.Get().(chan error)
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001702 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001703 if err := sc.writeFrameFromHandler(frameWriteMsg{
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001704 write: headerData,
1705 stream: st,
1706 done: errc,
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001707 }); err != nil {
1708 return err
1709 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001710 if errc != nil {
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -08001711 select {
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001712 case err := <-errc:
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +00001713 errChanPool.Put(errc)
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001714 return err
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -08001715 case <-sc.doneServing:
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001716 return errClientDisconnected
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +00001717 case <-st.cw:
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001718 return errStreamClosed
Brad Fitzpatrick9b41faf2014-11-19 10:45:13 -08001719 }
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08001720 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001721 return nil
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001722}
1723
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001724// called from handler goroutines.
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001725func (sc *serverConn) write100ContinueHeaders(st *stream) {
Brad Fitzpatrick4e3c9222014-11-22 17:35:09 -08001726 sc.writeFrameFromHandler(frameWriteMsg{
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001727 write: write100ContinueHeadersFrame{st.id},
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001728 stream: st,
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001729 })
1730}
1731
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001732// A bodyReadMsg tells the server loop that the http.Handler read n
1733// bytes of the DATA from the client on the given stream.
1734type bodyReadMsg struct {
1735 st *stream
1736 n int
1737}
1738
1739// called from handler goroutines.
1740// Notes that the handler for the given stream ID read n bytes of its body
1741// and schedules flow control tokens to be sent.
1742func (sc *serverConn) noteBodyReadFromHandler(st *stream, n int) {
1743 sc.serveG.checkNotOn() // NOT on
Brad Fitzpatrick0a9f6502015-10-27 14:23:57 -07001744 select {
1745 case sc.bodyReadCh <- bodyReadMsg{st, n}:
1746 case <-sc.doneServing:
1747 }
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001748}
1749
1750func (sc *serverConn) noteBodyRead(st *stream, n int) {
1751 sc.serveG.check()
1752 sc.sendWindowUpdate(nil, n) // conn-level
Brad Fitzpatrick0f1a8652014-12-07 20:49:33 -08001753 if st.state != stateHalfClosedRemote && st.state != stateClosed {
1754 // Don't send this WINDOW_UPDATE if the stream is closed
1755 // remotely.
1756 sc.sendWindowUpdate(st, n)
1757 }
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001758}
1759
1760// st may be nil for conn-level
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001761func (sc *serverConn) sendWindowUpdate(st *stream, n int) {
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001762 sc.serveG.check()
1763 // "The legal range for the increment to the flow control
1764 // window is 1 to 2^31-1 (2,147,483,647) octets."
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +11001765 // A Go Read call on 64-bit machines could in theory read
1766 // a larger Read than this. Very unlikely, but we handle it here
1767 // rather than elsewhere for now.
1768 const maxUint31 = 1<<31 - 1
1769 for n >= maxUint31 {
1770 sc.sendWindowUpdate32(st, maxUint31)
1771 n -= maxUint31
1772 }
1773 sc.sendWindowUpdate32(st, int32(n))
1774}
1775
1776// st may be nil for conn-level
1777func (sc *serverConn) sendWindowUpdate32(st *stream, n int32) {
1778 sc.serveG.check()
1779 if n == 0 {
1780 return
1781 }
1782 if n < 0 {
1783 panic("negative update")
1784 }
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001785 var streamID uint32
1786 if st != nil {
1787 streamID = st.id
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001788 }
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +11001789 sc.writeFrame(frameWriteMsg{
1790 write: writeWindowUpdate{streamID: streamID, n: uint32(n)},
1791 stream: st,
1792 })
1793 var ok bool
1794 if st == nil {
1795 ok = sc.inflow.add(n)
1796 } else {
1797 ok = st.inflow.add(n)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001798 }
Brad Fitzpatrick068d35d2014-12-09 07:10:31 +11001799 if !ok {
1800 panic("internal error; sent too many window updates without decrements?")
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001801 }
1802}
1803
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001804type requestBody struct {
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001805 stream *stream
Brad Fitzpatrick914bad52014-11-30 21:05:26 -08001806 conn *serverConn
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001807 closed bool
1808 pipe *pipe // non-nil if we have a HTTP entity message body
1809 needsContinue bool // need to send a 100-continue
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001810}
1811
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001812func (b *requestBody) Close() error {
1813 if b.pipe != nil {
Brad Fitzpatrickb7f5d982015-10-26 13:59:20 -05001814 b.pipe.CloseWithError(errClosedBody)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001815 }
1816 b.closed = true
1817 return nil
1818}
1819
1820func (b *requestBody) Read(p []byte) (n int, err error) {
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001821 if b.needsContinue {
1822 b.needsContinue = false
Brad Fitzpatrick914bad52014-11-30 21:05:26 -08001823 b.conn.write100ContinueHeaders(b.stream)
Brad Fitzpatrick9d63ade2014-11-15 12:02:43 -08001824 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001825 if b.pipe == nil {
1826 return 0, io.EOF
1827 }
1828 n, err = b.pipe.Read(p)
1829 if n > 0 {
Brad Fitzpatrickc8bab6a2014-12-07 18:51:56 -08001830 b.conn.noteBodyReadFromHandler(b.stream, n)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001831 }
1832 return
1833}
1834
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001835// responseWriter is the http.ResponseWriter implementation. It's
1836// intentionally small (1 pointer wide) to minimize garbage. The
1837// responseWriterState pointer inside is zeroed at the end of a
1838// request (in handlerDone) and calls on the responseWriter thereafter
1839// simply crash (caller's mistake), but the much larger responseWriterState
1840// and buffers are reused between multiple requests.
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001841type responseWriter struct {
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001842 rws *responseWriterState
1843}
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08001844
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001845// Optional http.ResponseWriter interfaces implemented.
1846var (
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001847 _ http.CloseNotifier = (*responseWriter)(nil)
1848 _ http.Flusher = (*responseWriter)(nil)
1849 _ stringWriter = (*responseWriter)(nil)
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001850)
1851
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001852type responseWriterState struct {
1853 // immutable within a request:
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001854 stream *stream
1855 req *http.Request
1856 body *requestBody // to close at end of request, if DATA frames didn't
Brad Fitzpatrick914bad52014-11-30 21:05:26 -08001857 conn *serverConn
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001858
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08001859 // TODO: adjust buffer writing sizes based on server config, frame size updates from peer, etc
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001860 bw *bufio.Writer // writing to a chunkWriter{this *responseWriterState}
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001861
1862 // mutated by http.Handler goroutine:
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001863 handlerHeader http.Header // nil until called
1864 snapHeader http.Header // snapshot of handlerHeader at WriteHeader time
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001865 trailers []string // set in writeChunk
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08001866 status int // status code passed to WriteHeader
Brad Fitzpatrick3c8c6132014-11-20 18:34:52 -08001867 wroteHeader bool // WriteHeader called (explicitly or implicitly). Not necessarily sent to user yet.
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001868 sentHeader bool // have we sent the header frame?
1869 handlerDone bool // handler has finished
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001870
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001871 sentContentLen int64 // non-zero if handler set a Content-Length header
1872 wroteBytes int64
1873
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08001874 closeNotifierMu sync.Mutex // guards closeNotifierCh
1875 closeNotifierCh chan bool // nil until first used
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001876}
1877
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001878type chunkWriter struct{ rws *responseWriterState }
1879
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001880func (cw chunkWriter) Write(p []byte) (n int, err error) { return cw.rws.writeChunk(p) }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001881
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001882func (rws *responseWriterState) hasTrailers() bool { return len(rws.trailers) != 0 }
1883
1884// declareTrailer is called for each Trailer header when the
1885// response header is written. It notes that a header will need to be
1886// written in the trailers at the end of the response.
1887func (rws *responseWriterState) declareTrailer(k string) {
1888 k = http.CanonicalHeaderKey(k)
1889 switch k {
1890 case "Transfer-Encoding", "Content-Length", "Trailer":
1891 // Forbidden by RFC 2616 14.40.
1892 return
1893 }
Brad Fitzpatrickd513e582016-01-31 06:24:40 +00001894 if !strSliceContains(rws.trailers, k) {
1895 rws.trailers = append(rws.trailers, k)
1896 }
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001897}
1898
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001899// writeChunk writes chunks from the bufio.Writer. But because
1900// bufio.Writer may bypass its chunking, sometimes p may be
1901// arbitrarily large.
1902//
1903// writeChunk is also responsible (on the first chunk) for sending the
1904// HEADER response.
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001905func (rws *responseWriterState) writeChunk(p []byte) (n int, err error) {
1906 if !rws.wroteHeader {
1907 rws.writeHeader(200)
1908 }
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001909
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001910 isHeadResp := rws.req.Method == "HEAD"
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001911 if !rws.sentHeader {
1912 rws.sentHeader = true
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001913 var ctype, clen string
1914 if clen = rws.snapHeader.Get("Content-Length"); clen != "" {
1915 rws.snapHeader.Del("Content-Length")
1916 clen64, err := strconv.ParseInt(clen, 10, 64)
1917 if err == nil && clen64 >= 0 {
1918 rws.sentContentLen = clen64
1919 } else {
1920 clen = ""
1921 }
1922 }
Brad Fitzpatrick1796f9b2015-12-08 22:22:07 +00001923 if clen == "" && rws.handlerDone && bodyAllowedForStatus(rws.status) && (len(p) > 0 || !isHeadResp) {
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001924 clen = strconv.Itoa(len(p))
1925 }
Brad Fitzpatrick1796f9b2015-12-08 22:22:07 +00001926 _, hasContentType := rws.snapHeader["Content-Type"]
1927 if !hasContentType && bodyAllowedForStatus(rws.status) {
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001928 ctype = http.DetectContentType(p)
1929 }
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001930 var date string
1931 if _, ok := rws.snapHeader["Date"]; !ok {
1932 // TODO(bradfitz): be faster here, like net/http? measure.
1933 date = time.Now().UTC().Format(http.TimeFormat)
1934 }
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001935
1936 for _, v := range rws.snapHeader["Trailer"] {
1937 foreachHeaderElement(v, rws.declareTrailer)
1938 }
1939
1940 endStream := (rws.handlerDone && !rws.hasTrailers() && len(p) == 0) || isHeadResp
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001941 err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
Brad Fitzpatrickf16a0b32014-11-28 13:49:30 -08001942 streamID: rws.stream.id,
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001943 httpResCode: rws.status,
1944 h: rws.snapHeader,
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001945 endStream: endStream,
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001946 contentType: ctype,
1947 contentLength: clen,
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001948 date: date,
Brad Fitzpatrickc94bffa2015-10-13 18:18:12 +00001949 })
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001950 if err != nil {
1951 return 0, err
1952 }
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001953 if endStream {
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001954 return 0, nil
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001955 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001956 }
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08001957 if isHeadResp {
1958 return len(p), nil
1959 }
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001960 if len(p) == 0 && !rws.handlerDone {
1961 return 0, nil
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001962 }
Brad Fitzpatrick56401052015-10-20 22:27:39 +00001963
Brad Fitzpatrickd513e582016-01-31 06:24:40 +00001964 if rws.handlerDone {
1965 rws.promoteUndeclaredTrailers()
1966 }
1967
Blake Mizeranyb4be4942015-12-15 17:33:14 -08001968 endStream := rws.handlerDone && !rws.hasTrailers()
1969 if len(p) > 0 || endStream {
1970 // only send a 0 byte DATA frame if we're ending the stream.
1971 if err := rws.conn.writeDataFromHandler(rws.stream, p, endStream); err != nil {
1972 return 0, err
1973 }
1974 }
1975
1976 if rws.handlerDone && rws.hasTrailers() {
1977 err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
1978 streamID: rws.stream.id,
1979 h: rws.handlerHeader,
1980 trailers: rws.trailers,
1981 endStream: true,
1982 })
1983 return len(p), err
Brad Fitzpatrick3d7a3ad2014-11-15 21:38:23 -08001984 }
Brad Fitzpatrick2b459472014-11-30 19:18:57 -08001985 return len(p), nil
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08001986}
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08001987
Brad Fitzpatrickd513e582016-01-31 06:24:40 +00001988// TrailerPrefix is a magic prefix for ResponseWriter.Header map keys
1989// that, if present, signals that the map entry is actually for
1990// the response trailers, and not the response headers. The prefix
1991// is stripped after the ServeHTTP call finishes and the values are
1992// sent in the trailers.
1993//
1994// This mechanism is intended only for trailers that are not known
1995// prior to the headers being written. If the set of trailers is fixed
1996// or known before the header is written, the normal Go trailers mechanism
1997// is preferred:
1998// https://golang.org/pkg/net/http/#ResponseWriter
1999// https://golang.org/pkg/net/http/#example_ResponseWriter_trailers
2000const TrailerPrefix = "Trailer:"
2001
2002// promoteUndeclaredTrailers permits http.Handlers to set trailers
2003// after the header has already been flushed. Because the Go
2004// ResponseWriter interface has no way to set Trailers (only the
2005// Header), and because we didn't want to expand the ResponseWriter
2006// interface, and because nobody used trailers, and because RFC 2616
2007// says you SHOULD (but not must) predeclare any trailers in the
2008// header, the official ResponseWriter rules said trailers in Go must
2009// be predeclared, and then we reuse the same ResponseWriter.Header()
2010// map to mean both Headers and Trailers. When it's time to write the
2011// Trailers, we pick out the fields of Headers that were declared as
2012// trailers. That worked for a while, until we found the first major
2013// user of Trailers in the wild: gRPC (using them only over http2),
2014// and gRPC libraries permit setting trailers mid-stream without
2015// predeclarnig them. So: change of plans. We still permit the old
2016// way, but we also permit this hack: if a Header() key begins with
2017// "Trailer:", the suffix of that key is a Trailer. Because ':' is an
2018// invalid token byte anyway, there is no ambiguity. (And it's already
2019// filtered out) It's mildly hacky, but not terrible.
2020//
2021// This method runs after the Handler is done and promotes any Header
2022// fields to be trailers.
2023func (rws *responseWriterState) promoteUndeclaredTrailers() {
2024 for k, vv := range rws.handlerHeader {
2025 if !strings.HasPrefix(k, TrailerPrefix) {
2026 continue
2027 }
2028 trailerKey := strings.TrimPrefix(k, TrailerPrefix)
2029 rws.declareTrailer(trailerKey)
2030 rws.handlerHeader[http.CanonicalHeaderKey(trailerKey)] = vv
2031 }
Brad Fitzpatrick48765182016-03-22 02:00:46 +00002032
2033 if len(rws.trailers) > 1 {
2034 sorter := sorterPool.Get().(*sorter)
2035 sorter.SortStrings(rws.trailers)
2036 sorterPool.Put(sorter)
2037 }
Brad Fitzpatrickd513e582016-01-31 06:24:40 +00002038}
2039
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002040func (w *responseWriter) Flush() {
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002041 rws := w.rws
2042 if rws == nil {
2043 panic("Header called after Handler finished")
2044 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002045 if rws.bw.Buffered() > 0 {
2046 if err := rws.bw.Flush(); err != nil {
2047 // Ignore the error. The frame writer already knows.
2048 return
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002049 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002050 } else {
2051 // The bufio.Writer won't call chunkWriter.Write
2052 // (writeChunk with zero bytes, so we have to do it
2053 // ourselves to force the HTTP response header and/or
2054 // final DATA frame (with END_STREAM) to be sent.
2055 rws.writeChunk(nil)
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002056 }
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002057}
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002058
Brad Fitzpatrickbd391962014-11-17 18:58:58 -08002059func (w *responseWriter) CloseNotify() <-chan bool {
2060 rws := w.rws
2061 if rws == nil {
2062 panic("CloseNotify called after Handler finished")
2063 }
2064 rws.closeNotifierMu.Lock()
2065 ch := rws.closeNotifierCh
2066 if ch == nil {
2067 ch = make(chan bool, 1)
2068 rws.closeNotifierCh = ch
2069 go func() {
2070 rws.stream.cw.Wait() // wait for close
2071 ch <- true
2072 }()
2073 }
2074 rws.closeNotifierMu.Unlock()
2075 return ch
2076}
2077
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002078func (w *responseWriter) Header() http.Header {
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002079 rws := w.rws
2080 if rws == nil {
2081 panic("Header called after Handler finished")
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002082 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002083 if rws.handlerHeader == nil {
2084 rws.handlerHeader = make(http.Header)
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002085 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002086 return rws.handlerHeader
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002087}
2088
2089func (w *responseWriter) WriteHeader(code int) {
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002090 rws := w.rws
2091 if rws == nil {
2092 panic("WriteHeader called after Handler finished")
2093 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002094 rws.writeHeader(code)
2095}
2096
2097func (rws *responseWriterState) writeHeader(code int) {
2098 if !rws.wroteHeader {
2099 rws.wroteHeader = true
2100 rws.status = code
2101 if len(rws.handlerHeader) > 0 {
2102 rws.snapHeader = cloneHeader(rws.handlerHeader)
2103 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002104 }
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002105}
2106
2107func cloneHeader(h http.Header) http.Header {
2108 h2 := make(http.Header, len(h))
2109 for k, vv := range h {
2110 vv2 := make([]string, len(vv))
2111 copy(vv2, vv)
2112 h2[k] = vv2
2113 }
2114 return h2
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002115}
2116
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002117// The Life Of A Write is like this:
2118//
Brad Fitzpatricked26b482014-11-26 09:16:43 -08002119// * Handler calls w.Write or w.WriteString ->
2120// * -> rws.bw (*bufio.Writer) ->
2121// * (Handler migth call Flush)
2122// * -> chunkWriter{rws}
2123// * -> responseWriterState.writeChunk(p []byte)
2124// * -> responseWriterState.writeChunk (most of the magic; see comment there)
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002125func (w *responseWriter) Write(p []byte) (n int, err error) {
2126 return w.write(len(p), p, "")
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002127}
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002128
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002129func (w *responseWriter) WriteString(s string) (n int, err error) {
2130 return w.write(len(s), nil, s)
2131}
2132
2133// either dataB or dataS is non-zero.
2134func (w *responseWriter) write(lenData int, dataB []byte, dataS string) (n int, err error) {
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002135 rws := w.rws
2136 if rws == nil {
2137 panic("Write called after Handler finished")
2138 }
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002139 if !rws.wroteHeader {
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002140 w.WriteHeader(200)
2141 }
Brad Fitzpatrickc745c362015-11-24 17:14:16 -08002142 if !bodyAllowedForStatus(rws.status) {
2143 return 0, http.ErrBodyNotAllowed
2144 }
2145 rws.wroteBytes += int64(len(dataB)) + int64(len(dataS)) // only one can be set
2146 if rws.sentContentLen != 0 && rws.wroteBytes > rws.sentContentLen {
2147 // TODO: send a RST_STREAM
2148 return 0, errors.New("http2: handler wrote more than declared Content-Length")
2149 }
2150
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002151 if dataB != nil {
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002152 return rws.bw.Write(dataB)
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002153 } else {
Brad Fitzpatrick390047e2014-11-14 20:37:08 -08002154 return rws.bw.WriteString(dataS)
Brad Fitzpatrick15a4bf32014-11-14 10:56:12 -08002155 }
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002156}
2157
2158func (w *responseWriter) handlerDone() {
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002159 rws := w.rws
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002160 rws.handlerDone = true
2161 w.Flush()
Brad Fitzpatrick729bd722014-11-13 14:09:36 -08002162 w.rws = nil
Brad Fitzpatrick520123b2014-11-14 15:57:37 -08002163 responseWriterStatePool.Put(rws)
Brad Fitzpatrickb331b812014-11-13 11:51:54 -08002164}
Blake Mizeranyb4be4942015-12-15 17:33:14 -08002165
2166// foreachHeaderElement splits v according to the "#rule" construction
2167// in RFC 2616 section 2.1 and calls fn for each non-empty element.
2168func foreachHeaderElement(v string, fn func(string)) {
2169 v = textproto.TrimString(v)
2170 if v == "" {
2171 return
2172 }
2173 if !strings.Contains(v, ",") {
2174 fn(v)
2175 return
2176 }
2177 for _, f := range strings.Split(v, ",") {
2178 if f = textproto.TrimString(f); f != "" {
2179 fn(f)
2180 }
2181 }
2182}