Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1 | // Copyright 2014 The Go Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 4 | |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 5 | // TODO: replace all <-sc.doneServing with reads from the stream's cw |
| 6 | // instead, and make sure that on close we close all open |
| 7 | // streams. then remove doneServing? |
| 8 | |
Brad Fitzpatrick | f530c4e | 2016-01-07 08:16:00 -0800 | [diff] [blame] | 9 | // TODO: re-audit GOAWAY support. Consider each incoming frame type and |
| 10 | // whether it should be ignored during graceful shutdown. |
Brad Fitzpatrick | cf89663 | 2014-12-09 07:15:26 +1100 | [diff] [blame] | 11 | |
| 12 | // TODO: disconnect idle clients. GFE seems to do 4 minutes. make |
| 13 | // configurable? or maximum number of idle clients and remove the |
| 14 | // oldest? |
| 15 | |
| 16 | // TODO: turn off the serve goroutine when idle, so |
| 17 | // an idle conn only has the readFrames goroutine active. (which could |
| 18 | // also be optimized probably to pin less memory in crypto/tls). This |
| 19 | // would involve tracking when the serve goroutine is active (atomic |
| 20 | // int32 read/CAS probably?) and starting it up when frames arrive, |
| 21 | // and shutting it down when all handlers exit. the occasional PING |
| 22 | // packets could use time.AfterFunc to call sc.wakeStartServeLoop() |
| 23 | // (which is a no-op if already running) and then queue the PING write |
| 24 | // as normal. The serve loop would then exit in most cases (if no |
| 25 | // Handlers running) and not be woken up again until the PING packet |
| 26 | // returns. |
| 27 | |
| 28 | // TODO (maybe): add a mechanism for Handlers to going into |
| 29 | // half-closed-local mode (rw.(io.Closer) test?) but not exit their |
| 30 | // handler, and continue to be able to read from the |
| 31 | // Request.Body. This would be a somewhat semantic change from HTTP/1 |
| 32 | // (or at least what we expose in net/http), so I'd probably want to |
| 33 | // add it there too. For now, this package says that returning from |
| 34 | // the Handler ServeHTTP function means you're both done reading and |
| 35 | // done writing, without a way to stop just one or the other. |
| 36 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 37 | package http2 |
| 38 | |
| 39 | import ( |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 40 | "bufio" |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 41 | "bytes" |
| 42 | "crypto/tls" |
| 43 | "errors" |
| 44 | "fmt" |
| 45 | "io" |
| 46 | "log" |
| 47 | "net" |
| 48 | "net/http" |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 49 | "net/textproto" |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 50 | "net/url" |
Brad Fitzpatrick | eb066e3 | 2016-01-26 18:31:02 +0000 | [diff] [blame] | 51 | "os" |
| 52 | "reflect" |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 53 | "runtime" |
Brad Fitzpatrick | d513e58 | 2016-01-31 06:24:40 +0000 | [diff] [blame] | 54 | "sort" |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 55 | "strconv" |
| 56 | "strings" |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 57 | "sync" |
Brad Fitzpatrick | 9584203 | 2014-11-15 09:47:42 -0800 | [diff] [blame] | 58 | "time" |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 59 | |
Brad Fitzpatrick | ae54c55 | 2015-09-24 09:19:02 +0200 | [diff] [blame] | 60 | "golang.org/x/net/http2/hpack" |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 61 | ) |
| 62 | |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 63 | const ( |
Brad Fitzpatrick | 9581fe1 | 2014-11-28 13:51:46 -0800 | [diff] [blame] | 64 | prefaceTimeout = 10 * time.Second |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 65 | firstSettingsTimeout = 2 * time.Second // should be in-flight with preface anyway |
| 66 | handlerChunkWriteSize = 4 << 10 |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 67 | defaultMaxStreams = 250 // TODO: make this 100 as the GFE seems to? |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 68 | ) |
| 69 | |
| 70 | var ( |
| 71 | errClientDisconnected = errors.New("client disconnected") |
| 72 | errClosedBody = errors.New("body closed by handler") |
Brad Fitzpatrick | b7f5d98 | 2015-10-26 13:59:20 -0500 | [diff] [blame] | 73 | errHandlerComplete = errors.New("http2: request body closed due to handler exiting") |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 74 | errStreamClosed = errors.New("http2: stream closed") |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 75 | ) |
| 76 | |
| 77 | var responseWriterStatePool = sync.Pool{ |
| 78 | New: func() interface{} { |
| 79 | rws := &responseWriterState{} |
| 80 | rws.bw = bufio.NewWriterSize(chunkWriter{rws}, handlerChunkWriteSize) |
| 81 | return rws |
| 82 | }, |
| 83 | } |
| 84 | |
| 85 | // Test hooks. |
| 86 | var ( |
| 87 | testHookOnConn func() |
| 88 | testHookGetServerConn func(*serverConn) |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 89 | testHookOnPanicMu *sync.Mutex // nil except in tests |
Brad Fitzpatrick | 996adcb | 2014-12-08 01:08:19 -0800 | [diff] [blame] | 90 | testHookOnPanic func(sc *serverConn, panicVal interface{}) (rePanic bool) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 91 | ) |
| 92 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 93 | // Server is an HTTP/2 server. |
| 94 | type Server struct { |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 95 | // MaxHandlers limits the number of http.Handler ServeHTTP goroutines |
| 96 | // which may run at a time over all connections. |
| 97 | // Negative or zero no limit. |
| 98 | // TODO: implement |
| 99 | MaxHandlers int |
| 100 | |
| 101 | // MaxConcurrentStreams optionally specifies the number of |
| 102 | // concurrent streams that each client may have open at a |
| 103 | // time. This is unrelated to the number of http.Handler goroutines |
| 104 | // which may be active globally, which is MaxHandlers. |
| 105 | // If zero, MaxConcurrentStreams defaults to at least 100, per |
| 106 | // the HTTP/2 spec's recommendations. |
| 107 | MaxConcurrentStreams uint32 |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 108 | |
| 109 | // MaxReadFrameSize optionally specifies the largest frame |
| 110 | // this server is willing to read. A valid value is between |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 111 | // 16k and 16M, inclusive. If zero or otherwise invalid, a |
| 112 | // default value is used. |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 113 | MaxReadFrameSize uint32 |
Brad Fitzpatrick | e4cd9ad | 2015-01-17 18:03:57 -0800 | [diff] [blame] | 114 | |
| 115 | // PermitProhibitedCipherSuites, if true, permits the use of |
| 116 | // cipher suites prohibited by the HTTP/2 spec. |
| 117 | PermitProhibitedCipherSuites bool |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 118 | } |
| 119 | |
| 120 | func (s *Server) maxReadFrameSize() uint32 { |
| 121 | if v := s.MaxReadFrameSize; v >= minMaxFrameSize && v <= maxFrameSize { |
| 122 | return v |
| 123 | } |
| 124 | return defaultMaxReadFrameSize |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 125 | } |
| 126 | |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 127 | func (s *Server) maxConcurrentStreams() uint32 { |
| 128 | if v := s.MaxConcurrentStreams; v > 0 { |
| 129 | return v |
| 130 | } |
| 131 | return defaultMaxStreams |
| 132 | } |
| 133 | |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 134 | // ConfigureServer adds HTTP/2 support to a net/http Server. |
| 135 | // |
| 136 | // The configuration conf may be nil. |
| 137 | // |
| 138 | // ConfigureServer must be called before s begins serving. |
Brad Fitzpatrick | 42ad508 | 2015-10-15 01:02:25 +0000 | [diff] [blame] | 139 | func ConfigureServer(s *http.Server, conf *Server) error { |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 140 | if conf == nil { |
| 141 | conf = new(Server) |
| 142 | } |
Brad Fitzpatrick | 42ad508 | 2015-10-15 01:02:25 +0000 | [diff] [blame] | 143 | |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 144 | if s.TLSConfig == nil { |
| 145 | s.TLSConfig = new(tls.Config) |
Brad Fitzpatrick | 42ad508 | 2015-10-15 01:02:25 +0000 | [diff] [blame] | 146 | } else if s.TLSConfig.CipherSuites != nil { |
| 147 | // If they already provided a CipherSuite list, return |
| 148 | // an error if it has a bad order or is missing |
| 149 | // ECDHE_RSA_WITH_AES_128_GCM_SHA256. |
| 150 | const requiredCipher = tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
| 151 | haveRequired := false |
| 152 | sawBad := false |
| 153 | for i, cs := range s.TLSConfig.CipherSuites { |
| 154 | if cs == requiredCipher { |
| 155 | haveRequired = true |
| 156 | } |
| 157 | if isBadCipher(cs) { |
| 158 | sawBad = true |
| 159 | } else if sawBad { |
| 160 | return fmt.Errorf("http2: TLSConfig.CipherSuites index %d contains an HTTP/2-approved cipher suite (%#04x), but it comes after unapproved cipher suites. With this configuration, clients that don't support previous, approved cipher suites may be given an unapproved one and reject the connection.", i, cs) |
| 161 | } |
| 162 | } |
| 163 | if !haveRequired { |
| 164 | return fmt.Errorf("http2: TLSConfig.CipherSuites is missing HTTP/2-required TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256") |
| 165 | } |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 166 | } |
Brad Fitzpatrick | 5df015f | 2014-12-08 11:16:59 -0800 | [diff] [blame] | 167 | |
| 168 | // Note: not setting MinVersion to tls.VersionTLS12, |
| 169 | // as we don't want to interfere with HTTP/1.1 traffic |
| 170 | // on the user's server. We enforce TLS 1.2 later once |
| 171 | // we accept a connection. Ideally this should be done |
| 172 | // during next-proto selection, but using TLS <1.2 with |
| 173 | // HTTP/2 is still the client's bug. |
| 174 | |
Brad Fitzpatrick | 42ad508 | 2015-10-15 01:02:25 +0000 | [diff] [blame] | 175 | s.TLSConfig.PreferServerCipherSuites = true |
Brad Fitzpatrick | 5df015f | 2014-12-08 11:16:59 -0800 | [diff] [blame] | 176 | |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 177 | haveNPN := false |
| 178 | for _, p := range s.TLSConfig.NextProtos { |
Brad Fitzpatrick | 36d9a67 | 2014-11-26 07:40:15 -0800 | [diff] [blame] | 179 | if p == NextProtoTLS { |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 180 | haveNPN = true |
| 181 | break |
| 182 | } |
| 183 | } |
| 184 | if !haveNPN { |
Brad Fitzpatrick | 36d9a67 | 2014-11-26 07:40:15 -0800 | [diff] [blame] | 185 | s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS) |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 186 | } |
Brad Fitzpatrick | 13dfd89 | 2015-03-05 15:57:11 -0800 | [diff] [blame] | 187 | // h2-14 is temporary (as of 2015-03-05) while we wait for all browsers |
| 188 | // to switch to "h2". |
| 189 | s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "h2-14") |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 190 | |
| 191 | if s.TLSNextProto == nil { |
| 192 | s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){} |
| 193 | } |
Brad Fitzpatrick | 13dfd89 | 2015-03-05 15:57:11 -0800 | [diff] [blame] | 194 | protoHandler := func(hs *http.Server, c *tls.Conn, h http.Handler) { |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 195 | if testHookOnConn != nil { |
| 196 | testHookOnConn() |
| 197 | } |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 198 | conf.ServeConn(c, &ServeConnOpts{ |
| 199 | Handler: h, |
| 200 | BaseConfig: hs, |
| 201 | }) |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 202 | } |
Brad Fitzpatrick | 13dfd89 | 2015-03-05 15:57:11 -0800 | [diff] [blame] | 203 | s.TLSNextProto[NextProtoTLS] = protoHandler |
| 204 | s.TLSNextProto["h2-14"] = protoHandler // temporary; see above. |
Brad Fitzpatrick | 42ad508 | 2015-10-15 01:02:25 +0000 | [diff] [blame] | 205 | return nil |
Brad Fitzpatrick | b5469d2 | 2014-11-13 12:17:52 -0800 | [diff] [blame] | 206 | } |
| 207 | |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 208 | // ServeConnOpts are options for the Server.ServeConn method. |
| 209 | type ServeConnOpts struct { |
| 210 | // BaseConfig optionally sets the base configuration |
| 211 | // for values. If nil, defaults are used. |
| 212 | BaseConfig *http.Server |
| 213 | |
| 214 | // Handler specifies which handler to use for processing |
| 215 | // requests. If nil, BaseConfig.Handler is used. If BaseConfig |
| 216 | // or BaseConfig.Handler is nil, http.DefaultServeMux is used. |
| 217 | Handler http.Handler |
| 218 | } |
| 219 | |
| 220 | func (o *ServeConnOpts) baseConfig() *http.Server { |
| 221 | if o != nil && o.BaseConfig != nil { |
| 222 | return o.BaseConfig |
| 223 | } |
| 224 | return new(http.Server) |
| 225 | } |
| 226 | |
| 227 | func (o *ServeConnOpts) handler() http.Handler { |
| 228 | if o != nil { |
| 229 | if o.Handler != nil { |
| 230 | return o.Handler |
| 231 | } |
| 232 | if o.BaseConfig != nil && o.BaseConfig.Handler != nil { |
| 233 | return o.BaseConfig.Handler |
| 234 | } |
| 235 | } |
| 236 | return http.DefaultServeMux |
| 237 | } |
| 238 | |
| 239 | // ServeConn serves HTTP/2 requests on the provided connection and |
| 240 | // blocks until the connection is no longer readable. |
| 241 | // |
| 242 | // ServeConn starts speaking HTTP/2 assuming that c has not had any |
| 243 | // reads or writes. It writes its initial settings frame and expects |
| 244 | // to be able to read the preface and settings frame from the |
| 245 | // client. If c has a ConnectionState method like a *tls.Conn, the |
| 246 | // ConnectionState is used to verify the TLS ciphersuite and to set |
| 247 | // the Request.TLS field in Handlers. |
| 248 | // |
| 249 | // ServeConn does not support h2c by itself. Any h2c support must be |
| 250 | // implemented in terms of providing a suitably-behaving net.Conn. |
| 251 | // |
| 252 | // The opts parameter is optional. If nil, default values are used. |
| 253 | func (s *Server) ServeConn(c net.Conn, opts *ServeConnOpts) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 254 | sc := &serverConn{ |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 255 | srv: s, |
| 256 | hs: opts.baseConfig(), |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 257 | conn: c, |
Brad Fitzpatrick | df959c2 | 2014-12-09 07:20:20 +1100 | [diff] [blame] | 258 | remoteAddrStr: c.RemoteAddr().String(), |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 259 | bw: newBufferedWriter(c), |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 260 | handler: opts.handler(), |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 261 | streams: make(map[uint32]*stream), |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 262 | readFrameCh: make(chan readFrameResult), |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 263 | wantWriteFrameCh: make(chan frameWriteMsg, 8), |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 264 | wroteFrameCh: make(chan frameWriteResult, 1), // buffered; one send in writeFrameAsync |
| 265 | bodyReadCh: make(chan bodyReadMsg), // buffering doesn't matter either way |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 266 | doneServing: make(chan struct{}), |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 267 | advMaxStreams: s.maxConcurrentStreams(), |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 268 | writeSched: writeScheduler{ |
| 269 | maxFrameSize: initialMaxFrameSize, |
| 270 | }, |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 271 | initialWindowSize: initialWindowSize, |
| 272 | headerTableSize: initialHeaderTableSize, |
| 273 | serveG: newGoroutineLock(), |
| 274 | pushEnabled: true, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 275 | } |
Brad Fitzpatrick | 9876618 | 2014-12-02 10:30:08 -0800 | [diff] [blame] | 276 | sc.flow.add(initialWindowSize) |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 277 | sc.inflow.add(initialWindowSize) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 278 | sc.hpackEncoder = hpack.NewEncoder(&sc.headerWriteBuf) |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 279 | sc.hpackDecoder = hpack.NewDecoder(initialHeaderTableSize, nil) |
Brad Fitzpatrick | 59e870b | 2015-10-14 00:12:18 +0000 | [diff] [blame] | 280 | sc.hpackDecoder.SetMaxStringLength(sc.maxHeaderStringLen()) |
Brad Fitzpatrick | 5e4e2dc | 2014-11-19 16:49:43 -0800 | [diff] [blame] | 281 | |
| 282 | fr := NewFramer(sc.bw, c) |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 283 | fr.SetMaxReadFrameSize(s.maxReadFrameSize()) |
Brad Fitzpatrick | 5e4e2dc | 2014-11-19 16:49:43 -0800 | [diff] [blame] | 284 | sc.framer = fr |
| 285 | |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 286 | if tc, ok := c.(connectionStater); ok { |
Brad Fitzpatrick | 30b1681 | 2014-12-08 10:10:39 -0800 | [diff] [blame] | 287 | sc.tlsState = new(tls.ConnectionState) |
| 288 | *sc.tlsState = tc.ConnectionState() |
| 289 | // 9.2 Use of TLS Features |
| 290 | // An implementation of HTTP/2 over TLS MUST use TLS |
| 291 | // 1.2 or higher with the restrictions on feature set |
| 292 | // and cipher suite described in this section. Due to |
| 293 | // implementation limitations, it might not be |
| 294 | // possible to fail TLS negotiation. An endpoint MUST |
| 295 | // immediately terminate an HTTP/2 connection that |
| 296 | // does not meet the TLS requirements described in |
| 297 | // this section with a connection error (Section |
| 298 | // 5.4.1) of type INADEQUATE_SECURITY. |
| 299 | if sc.tlsState.Version < tls.VersionTLS12 { |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 300 | sc.rejectConn(ErrCodeInadequateSecurity, "TLS version too low") |
Brad Fitzpatrick | 30b1681 | 2014-12-08 10:10:39 -0800 | [diff] [blame] | 301 | return |
| 302 | } |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 303 | |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 304 | if sc.tlsState.ServerName == "" { |
Brad Fitzpatrick | f0f7876 | 2015-01-17 12:25:12 -0800 | [diff] [blame] | 305 | // Client must use SNI, but we don't enforce that anymore, |
| 306 | // since it was causing problems when connecting to bare IP |
| 307 | // addresses during development. |
| 308 | // |
| 309 | // TODO: optionally enforce? Or enforce at the time we receive |
| 310 | // a new request, and verify the the ServerName matches the :authority? |
| 311 | // But that precludes proxy situations, perhaps. |
| 312 | // |
| 313 | // So for now, do nothing here again. |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 314 | } |
| 315 | |
Brad Fitzpatrick | 6ccd669 | 2016-02-02 14:37:19 -0800 | [diff] [blame^] | 316 | if !s.PermitProhibitedCipherSuites && isBadCipher(sc.tlsState.CipherSuite) { |
Brad Fitzpatrick | 5df015f | 2014-12-08 11:16:59 -0800 | [diff] [blame] | 317 | // "Endpoints MAY choose to generate a connection error |
| 318 | // (Section 5.4.1) of type INADEQUATE_SECURITY if one of |
| 319 | // the prohibited cipher suites are negotiated." |
| 320 | // |
| 321 | // We choose that. In my opinion, the spec is weak |
| 322 | // here. It also says both parties must support at least |
| 323 | // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no |
| 324 | // excuses here. If we really must, we could allow an |
| 325 | // "AllowInsecureWeakCiphers" option on the server later. |
| 326 | // Let's see how it plays out first. |
Brad Fitzpatrick | 36f7934 | 2015-01-17 12:24:34 -0800 | [diff] [blame] | 327 | sc.rejectConn(ErrCodeInadequateSecurity, fmt.Sprintf("Prohibited TLS 1.2 Cipher Suite: %x", sc.tlsState.CipherSuite)) |
Brad Fitzpatrick | 5df015f | 2014-12-08 11:16:59 -0800 | [diff] [blame] | 328 | return |
| 329 | } |
Brad Fitzpatrick | 30b1681 | 2014-12-08 10:10:39 -0800 | [diff] [blame] | 330 | } |
| 331 | |
Brad Fitzpatrick | 0db6d65 | 2014-11-15 15:49:19 -0800 | [diff] [blame] | 332 | if hook := testHookGetServerConn; hook != nil { |
| 333 | hook(sc) |
| 334 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 335 | sc.serve() |
| 336 | } |
| 337 | |
Brad Fitzpatrick | 5df015f | 2014-12-08 11:16:59 -0800 | [diff] [blame] | 338 | // isBadCipher reports whether the cipher is blacklisted by the HTTP/2 spec. |
| 339 | func isBadCipher(cipher uint16) bool { |
| 340 | switch cipher { |
| 341 | case tls.TLS_RSA_WITH_RC4_128_SHA, |
| 342 | tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA, |
| 343 | tls.TLS_RSA_WITH_AES_128_CBC_SHA, |
| 344 | tls.TLS_RSA_WITH_AES_256_CBC_SHA, |
| 345 | tls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, |
| 346 | tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
| 347 | tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
| 348 | tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA, |
| 349 | tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, |
| 350 | tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
| 351 | tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: |
| 352 | // Reject cipher suites from Appendix A. |
| 353 | // "This list includes those cipher suites that do not |
| 354 | // offer an ephemeral key exchange and those that are |
| 355 | // based on the TLS null, stream or block cipher type" |
| 356 | return true |
| 357 | default: |
| 358 | return false |
| 359 | } |
| 360 | } |
| 361 | |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 362 | func (sc *serverConn) rejectConn(err ErrCode, debug string) { |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 363 | sc.vlogf("http2: server rejecting conn: %v, %s", err, debug) |
Brad Fitzpatrick | 842bf9f | 2014-12-08 10:31:57 -0800 | [diff] [blame] | 364 | // ignoring errors. hanging up anyway. |
| 365 | sc.framer.WriteGoAway(0, err, []byte(debug)) |
| 366 | sc.bw.Flush() |
| 367 | sc.conn.Close() |
| 368 | } |
| 369 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 370 | type serverConn struct { |
| 371 | // Immutable: |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 372 | srv *Server |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 373 | hs *http.Server |
| 374 | conn net.Conn |
Brad Fitzpatrick | 5e4e2dc | 2014-11-19 16:49:43 -0800 | [diff] [blame] | 375 | bw *bufferedWriter // writing to conn |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 376 | handler http.Handler |
| 377 | framer *Framer |
| 378 | hpackDecoder *hpack.Decoder |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 379 | doneServing chan struct{} // closed when serverConn.serve ends |
| 380 | readFrameCh chan readFrameResult // written by serverConn.readFrames |
| 381 | wantWriteFrameCh chan frameWriteMsg // from handlers -> serve |
| 382 | wroteFrameCh chan frameWriteResult // from writeFrameAsync -> serve, tickles more frame writes |
| 383 | bodyReadCh chan bodyReadMsg // from handlers -> serve |
| 384 | testHookCh chan func(int) // code to run on the serve loop |
| 385 | flow flow // conn-wide (not stream-specific) outbound flow control |
| 386 | inflow flow // conn-wide inbound flow control |
| 387 | tlsState *tls.ConnectionState // shared by all handlers, like net/http |
Brad Fitzpatrick | df959c2 | 2014-12-09 07:20:20 +1100 | [diff] [blame] | 388 | remoteAddrStr string |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 389 | |
| 390 | // Everything following is owned by the serve loop; use serveG.check(): |
Brad Fitzpatrick | 165c098 | 2014-11-26 08:53:01 -0800 | [diff] [blame] | 391 | serveG goroutineLock // used to verify funcs are on serve() |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 392 | pushEnabled bool |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 393 | sawFirstSettings bool // got the initial SETTINGS frame after the preface |
| 394 | needToSendSettingsAck bool |
Brad Fitzpatrick | 6a9b77b | 2014-12-03 13:56:36 -0800 | [diff] [blame] | 395 | unackedSettings int // how many SETTINGS have we sent without ACKs? |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 396 | clientMaxStreams uint32 // SETTINGS_MAX_CONCURRENT_STREAMS from client (our PUSH_PROMISE limit) |
| 397 | advMaxStreams uint32 // our SETTINGS_MAX_CONCURRENT_STREAMS advertised the client |
| 398 | curOpenStreams uint32 // client's number of open streams |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 399 | maxStreamID uint32 // max ever seen |
| 400 | streams map[uint32]*stream |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 401 | initialWindowSize int32 |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 402 | headerTableSize uint32 |
Brad Fitzpatrick | 29704b8 | 2015-10-10 18:01:18 -0700 | [diff] [blame] | 403 | peerMaxHeaderListSize uint32 // zero means unknown (default) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 404 | canonHeader map[string]string // http2-lower-case -> Go-Canonical-Case |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 405 | req requestParam // non-zero while reading request headers |
Brad Fitzpatrick | aa524f6 | 2014-11-25 10:31:37 -0800 | [diff] [blame] | 406 | writingFrame bool // started write goroutine but haven't heard back on wroteFrameCh |
| 407 | needsFrameFlush bool // last frame write wasn't a flush |
Brad Fitzpatrick | a13c4a4 | 2014-11-27 17:47:29 -0800 | [diff] [blame] | 408 | writeSched writeScheduler |
| 409 | inGoAway bool // we've started to or sent GOAWAY |
| 410 | needToSendGoAway bool // we need to schedule a GOAWAY frame write |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 411 | goAwayCode ErrCode |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 412 | shutdownTimerCh <-chan time.Time // nil until used |
| 413 | shutdownTimer *time.Timer // nil until used |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 414 | |
Brad Fitzpatrick | 23564bf | 2014-11-27 19:40:04 -0800 | [diff] [blame] | 415 | // Owned by the writeFrameAsync goroutine: |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 416 | headerWriteBuf bytes.Buffer |
| 417 | hpackEncoder *hpack.Encoder |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 418 | } |
| 419 | |
Brad Fitzpatrick | 59e870b | 2015-10-14 00:12:18 +0000 | [diff] [blame] | 420 | func (sc *serverConn) maxHeaderStringLen() int { |
| 421 | v := sc.maxHeaderListSize() |
| 422 | if uint32(int(v)) == v { |
| 423 | return int(v) |
| 424 | } |
| 425 | // They had a crazy big number for MaxHeaderBytes anyway, |
| 426 | // so give them unlimited header lengths: |
| 427 | return 0 |
| 428 | } |
| 429 | |
Brad Fitzpatrick | 29704b8 | 2015-10-10 18:01:18 -0700 | [diff] [blame] | 430 | func (sc *serverConn) maxHeaderListSize() uint32 { |
| 431 | n := sc.hs.MaxHeaderBytes |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 432 | if n <= 0 { |
Brad Fitzpatrick | 29704b8 | 2015-10-10 18:01:18 -0700 | [diff] [blame] | 433 | n = http.DefaultMaxHeaderBytes |
| 434 | } |
| 435 | // http2's count is in a slightly different unit and includes 32 bytes per pair. |
| 436 | // So, take the net/http.Server value and pad it up a bit, assuming 10 headers. |
| 437 | const perFieldOverhead = 32 // per http2 spec |
| 438 | const typicalHeaders = 10 // conservative |
| 439 | return uint32(n + typicalHeaders*perFieldOverhead) |
| 440 | } |
| 441 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 442 | // requestParam is the state of the next request, initialized over |
| 443 | // potentially several frames HEADERS + zero or more CONTINUATION |
| 444 | // frames. |
| 445 | type requestParam struct { |
| 446 | // stream is non-nil if we're reading (HEADER or CONTINUATION) |
| 447 | // frames for a request (but not DATA). |
| 448 | stream *stream |
| 449 | header http.Header |
| 450 | method, path string |
| 451 | scheme, authority string |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 452 | sawRegularHeader bool // saw a non-pseudo header already |
| 453 | invalidHeader bool // an invalid header was seen |
| 454 | headerListSize int64 // actually uint32, but easier math this way |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 455 | } |
| 456 | |
Gabriel Aszalos | 1aa5b31 | 2014-11-19 16:56:22 +0000 | [diff] [blame] | 457 | // stream represents a stream. This is the minimal metadata needed by |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 458 | // the serve goroutine. Most of the actual stream state is owned by |
| 459 | // the http.Handler's goroutine in the responseWriter. Because the |
| 460 | // responseWriter's responseWriterState is recycled at the end of a |
| 461 | // handler, this struct intentionally has no pointer to the |
| 462 | // *responseWriter{,State} itself, as the Handler ending nils out the |
| 463 | // responseWriter's state field. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 464 | type stream struct { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 465 | // immutable: |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 466 | sc *serverConn |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 467 | id uint32 |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 468 | body *pipe // non-nil if expecting DATA frames |
| 469 | cw closeWaiter // closed wait stream transitions to closed state |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 470 | |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 471 | // owned by serverConn's serve loop: |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 472 | bodyBytes int64 // body bytes seen so far |
| 473 | declBodyBytes int64 // or -1 if undeclared |
| 474 | flow flow // limits writing from Handler to client |
| 475 | inflow flow // what the client is allowed to POST/etc to us |
| 476 | parent *stream // or nil |
| 477 | numTrailerValues int64 |
| 478 | weight uint8 |
| 479 | state streamState |
| 480 | sentReset bool // only true once detached from streams map |
| 481 | gotReset bool // only true once detacted from streams map |
| 482 | gotTrailerHeader bool // HEADER frame for trailers was seen |
| 483 | |
| 484 | trailer http.Header // accumulated trailers |
| 485 | reqTrailer http.Header // handler's Request.Trailer |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 486 | } |
| 487 | |
Brad Fitzpatrick | 23564bf | 2014-11-27 19:40:04 -0800 | [diff] [blame] | 488 | func (sc *serverConn) Framer() *Framer { return sc.framer } |
| 489 | func (sc *serverConn) CloseConn() error { return sc.conn.Close() } |
| 490 | func (sc *serverConn) Flush() error { return sc.bw.Flush() } |
| 491 | func (sc *serverConn) HeaderEncoder() (*hpack.Encoder, *bytes.Buffer) { |
| 492 | return sc.hpackEncoder, &sc.headerWriteBuf |
| 493 | } |
| 494 | |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 495 | func (sc *serverConn) state(streamID uint32) (streamState, *stream) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 496 | sc.serveG.check() |
| 497 | // http://http2.github.io/http2-spec/#rfc.section.5.1 |
| 498 | if st, ok := sc.streams[streamID]; ok { |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 499 | return st.state, st |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 500 | } |
| 501 | // "The first use of a new stream identifier implicitly closes all |
| 502 | // streams in the "idle" state that might have been initiated by |
| 503 | // that peer with a lower-valued stream identifier. For example, if |
| 504 | // a client sends a HEADERS frame on stream 7 without ever sending a |
| 505 | // frame on stream 5, then stream 5 transitions to the "closed" |
| 506 | // state when the first frame for stream 7 is sent or received." |
| 507 | if streamID <= sc.maxStreamID { |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 508 | return stateClosed, nil |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 509 | } |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 510 | return stateIdle, nil |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 511 | } |
| 512 | |
Brad Fitzpatrick | cd8c270 | 2015-10-15 20:01:14 +0000 | [diff] [blame] | 513 | // setConnState calls the net/http ConnState hook for this connection, if configured. |
| 514 | // Note that the net/http package does StateNew and StateClosed for us. |
| 515 | // There is currently no plan for StateHijacked or hijacking HTTP/2 connections. |
| 516 | func (sc *serverConn) setConnState(state http.ConnState) { |
| 517 | if sc.hs.ConnState != nil { |
| 518 | sc.hs.ConnState(sc.conn, state) |
| 519 | } |
| 520 | } |
| 521 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 522 | func (sc *serverConn) vlogf(format string, args ...interface{}) { |
| 523 | if VerboseLogs { |
| 524 | sc.logf(format, args...) |
| 525 | } |
| 526 | } |
| 527 | |
| 528 | func (sc *serverConn) logf(format string, args ...interface{}) { |
| 529 | if lg := sc.hs.ErrorLog; lg != nil { |
| 530 | lg.Printf(format, args...) |
| 531 | } else { |
| 532 | log.Printf(format, args...) |
| 533 | } |
| 534 | } |
| 535 | |
Brad Fitzpatrick | eb066e3 | 2016-01-26 18:31:02 +0000 | [diff] [blame] | 536 | // errno returns v's underlying uintptr, else 0. |
| 537 | // |
| 538 | // TODO: remove this helper function once http2 can use build |
| 539 | // tags. See comment in isClosedConnError. |
| 540 | func errno(v error) uintptr { |
| 541 | if rv := reflect.ValueOf(v); rv.Kind() == reflect.Uintptr { |
| 542 | return uintptr(rv.Uint()) |
| 543 | } |
| 544 | return 0 |
| 545 | } |
| 546 | |
| 547 | // isClosedConnError reports whether err is an error from use of a closed |
| 548 | // network connection. |
| 549 | func isClosedConnError(err error) bool { |
| 550 | if err == nil { |
| 551 | return false |
| 552 | } |
| 553 | |
| 554 | // TODO: remove this string search and be more like the Windows |
| 555 | // case below. That might involve modifying the standard library |
| 556 | // to return better error types. |
| 557 | str := err.Error() |
| 558 | if strings.Contains(str, "use of closed network connection") { |
| 559 | return true |
| 560 | } |
| 561 | |
| 562 | // TODO(bradfitz): x/tools/cmd/bundle doesn't really support |
| 563 | // build tags, so I can't make an http2_windows.go file with |
| 564 | // Windows-specific stuff. Fix that and move this, once we |
| 565 | // have a way to bundle this into std's net/http somehow. |
| 566 | if runtime.GOOS == "windows" { |
| 567 | if oe, ok := err.(*net.OpError); ok && oe.Op == "read" { |
| 568 | if se, ok := oe.Err.(*os.SyscallError); ok && se.Syscall == "wsarecv" { |
| 569 | const WSAECONNABORTED = 10053 |
| 570 | const WSAECONNRESET = 10054 |
| 571 | if n := errno(se.Err); n == WSAECONNRESET || n == WSAECONNABORTED { |
| 572 | return true |
| 573 | } |
| 574 | } |
| 575 | } |
| 576 | } |
| 577 | return false |
| 578 | } |
| 579 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 580 | func (sc *serverConn) condlogf(err error, format string, args ...interface{}) { |
| 581 | if err == nil { |
| 582 | return |
| 583 | } |
Brad Fitzpatrick | eb066e3 | 2016-01-26 18:31:02 +0000 | [diff] [blame] | 584 | if err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 585 | // Boring, expected errors. |
| 586 | sc.vlogf(format, args...) |
| 587 | } else { |
| 588 | sc.logf(format, args...) |
| 589 | } |
| 590 | } |
| 591 | |
| 592 | func (sc *serverConn) onNewHeaderField(f hpack.HeaderField) { |
| 593 | sc.serveG.check() |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 594 | if VerboseLogs { |
| 595 | sc.vlogf("http2: server decoded %v", f) |
| 596 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 597 | switch { |
Brad Fitzpatrick | b2ed34f | 2016-01-20 20:16:54 +0000 | [diff] [blame] | 598 | case !validHeaderFieldValue(f.Value): // f.Name checked _after_ pseudo check, since ':' is invalid |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 599 | sc.req.invalidHeader = true |
| 600 | case strings.HasPrefix(f.Name, ":"): |
| 601 | if sc.req.sawRegularHeader { |
| 602 | sc.logf("pseudo-header after regular header") |
| 603 | sc.req.invalidHeader = true |
| 604 | return |
| 605 | } |
| 606 | var dst *string |
| 607 | switch f.Name { |
| 608 | case ":method": |
| 609 | dst = &sc.req.method |
| 610 | case ":path": |
| 611 | dst = &sc.req.path |
| 612 | case ":scheme": |
| 613 | dst = &sc.req.scheme |
| 614 | case ":authority": |
| 615 | dst = &sc.req.authority |
| 616 | default: |
| 617 | // 8.1.2.1 Pseudo-Header Fields |
| 618 | // "Endpoints MUST treat a request or response |
| 619 | // that contains undefined or invalid |
| 620 | // pseudo-header fields as malformed (Section |
| 621 | // 8.1.2.6)." |
| 622 | sc.logf("invalid pseudo-header %q", f.Name) |
| 623 | sc.req.invalidHeader = true |
| 624 | return |
| 625 | } |
| 626 | if *dst != "" { |
| 627 | sc.logf("duplicate pseudo-header %q sent", f.Name) |
| 628 | sc.req.invalidHeader = true |
| 629 | return |
| 630 | } |
| 631 | *dst = f.Value |
Brad Fitzpatrick | b2ed34f | 2016-01-20 20:16:54 +0000 | [diff] [blame] | 632 | case !validHeaderFieldName(f.Name): |
| 633 | sc.req.invalidHeader = true |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 634 | default: |
| 635 | sc.req.sawRegularHeader = true |
| 636 | sc.req.header.Add(sc.canonicalHeader(f.Name), f.Value) |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 637 | const headerFieldOverhead = 32 // per spec |
| 638 | sc.req.headerListSize += int64(len(f.Name)) + int64(len(f.Value)) + headerFieldOverhead |
| 639 | if sc.req.headerListSize > int64(sc.maxHeaderListSize()) { |
| 640 | sc.hpackDecoder.SetEmitEnabled(false) |
| 641 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 642 | } |
| 643 | } |
| 644 | |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 645 | func (st *stream) onNewTrailerField(f hpack.HeaderField) { |
| 646 | sc := st.sc |
| 647 | sc.serveG.check() |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 648 | if VerboseLogs { |
| 649 | sc.vlogf("http2: server decoded trailer %v", f) |
| 650 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 651 | switch { |
Brad Fitzpatrick | b2ed34f | 2016-01-20 20:16:54 +0000 | [diff] [blame] | 652 | case strings.HasPrefix(f.Name, ":"): |
Brad Fitzpatrick | f530c4e | 2016-01-07 08:16:00 -0800 | [diff] [blame] | 653 | sc.req.invalidHeader = true |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 654 | return |
Brad Fitzpatrick | b2ed34f | 2016-01-20 20:16:54 +0000 | [diff] [blame] | 655 | case !validHeaderFieldName(f.Name) || !validHeaderFieldValue(f.Value): |
Brad Fitzpatrick | f530c4e | 2016-01-07 08:16:00 -0800 | [diff] [blame] | 656 | sc.req.invalidHeader = true |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 657 | return |
| 658 | default: |
| 659 | key := sc.canonicalHeader(f.Name) |
| 660 | if st.trailer != nil { |
| 661 | vv := append(st.trailer[key], f.Value) |
| 662 | st.trailer[key] = vv |
| 663 | |
| 664 | // arbitrary; TODO: read spec about header list size limits wrt trailers |
| 665 | const tooBig = 1000 |
| 666 | if len(vv) >= tooBig { |
| 667 | sc.hpackDecoder.SetEmitEnabled(false) |
| 668 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 669 | } |
| 670 | } |
| 671 | } |
| 672 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 673 | func (sc *serverConn) canonicalHeader(v string) string { |
| 674 | sc.serveG.check() |
Brad Fitzpatrick | 6520e26 | 2014-11-15 09:36:47 -0800 | [diff] [blame] | 675 | cv, ok := commonCanonHeader[v] |
| 676 | if ok { |
| 677 | return cv |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 678 | } |
Brad Fitzpatrick | 6520e26 | 2014-11-15 09:36:47 -0800 | [diff] [blame] | 679 | cv, ok = sc.canonHeader[v] |
| 680 | if ok { |
| 681 | return cv |
| 682 | } |
| 683 | if sc.canonHeader == nil { |
| 684 | sc.canonHeader = make(map[string]string) |
| 685 | } |
| 686 | cv = http.CanonicalHeaderKey(v) |
| 687 | sc.canonHeader[v] = cv |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 688 | return cv |
| 689 | } |
| 690 | |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 691 | type readFrameResult struct { |
| 692 | f Frame // valid until readMore is called |
| 693 | err error |
| 694 | |
| 695 | // readMore should be called once the consumer no longer needs or |
| 696 | // retains f. After readMore, f is invalid and more frames can be |
| 697 | // read. |
| 698 | readMore func() |
| 699 | } |
| 700 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 701 | // readFrames is the loop that reads incoming frames. |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 702 | // It takes care to only read one frame at a time, blocking until the |
| 703 | // consumer is done with the frame. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 704 | // It's run on its own goroutine. |
| 705 | func (sc *serverConn) readFrames() { |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 706 | gate := make(gate) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 707 | for { |
| 708 | f, err := sc.framer.ReadFrame() |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 709 | select { |
| 710 | case sc.readFrameCh <- readFrameResult{f, err, gate.Done}: |
| 711 | case <-sc.doneServing: |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 712 | return |
| 713 | } |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 714 | select { |
| 715 | case <-gate: |
| 716 | case <-sc.doneServing: |
| 717 | return |
| 718 | } |
Brad Fitzpatrick | ea6dba8 | 2015-12-23 08:43:06 -0800 | [diff] [blame] | 719 | if terminalReadFrameError(err) { |
| 720 | return |
| 721 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 722 | } |
| 723 | } |
| 724 | |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 725 | // frameWriteResult is the message passed from writeFrameAsync to the serve goroutine. |
| 726 | type frameWriteResult struct { |
| 727 | wm frameWriteMsg // what was written (or attempted) |
| 728 | err error // result of the writeFrame call |
| 729 | } |
| 730 | |
Brad Fitzpatrick | aa524f6 | 2014-11-25 10:31:37 -0800 | [diff] [blame] | 731 | // writeFrameAsync runs in its own goroutine and writes a single frame |
| 732 | // and then reports when it's done. |
| 733 | // At most one goroutine can be running writeFrameAsync at a time per |
| 734 | // serverConn. |
| 735 | func (sc *serverConn) writeFrameAsync(wm frameWriteMsg) { |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 736 | err := wm.write.writeFrame(sc) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 737 | sc.wroteFrameCh <- frameWriteResult{wm, err} |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 738 | } |
| 739 | |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 740 | func (sc *serverConn) closeAllStreamsOnConnClose() { |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 741 | sc.serveG.check() |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 742 | for _, st := range sc.streams { |
| 743 | sc.closeStream(st, errClientDisconnected) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 744 | } |
| 745 | } |
| 746 | |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 747 | func (sc *serverConn) stopShutdownTimer() { |
| 748 | sc.serveG.check() |
| 749 | if t := sc.shutdownTimer; t != nil { |
| 750 | t.Stop() |
| 751 | } |
| 752 | } |
| 753 | |
Brad Fitzpatrick | 996adcb | 2014-12-08 01:08:19 -0800 | [diff] [blame] | 754 | func (sc *serverConn) notePanic() { |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 755 | // Note: this is for serverConn.serve panicking, not http.Handler code. |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 756 | if testHookOnPanicMu != nil { |
| 757 | testHookOnPanicMu.Lock() |
| 758 | defer testHookOnPanicMu.Unlock() |
| 759 | } |
Brad Fitzpatrick | 996adcb | 2014-12-08 01:08:19 -0800 | [diff] [blame] | 760 | if testHookOnPanic != nil { |
| 761 | if e := recover(); e != nil { |
| 762 | if testHookOnPanic(sc, e) { |
| 763 | panic(e) |
| 764 | } |
| 765 | } |
| 766 | } |
| 767 | } |
| 768 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 769 | func (sc *serverConn) serve() { |
| 770 | sc.serveG.check() |
Brad Fitzpatrick | 996adcb | 2014-12-08 01:08:19 -0800 | [diff] [blame] | 771 | defer sc.notePanic() |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 772 | defer sc.conn.Close() |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 773 | defer sc.closeAllStreamsOnConnClose() |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 774 | defer sc.stopShutdownTimer() |
Brad Fitzpatrick | aa524f6 | 2014-11-25 10:31:37 -0800 | [diff] [blame] | 775 | defer close(sc.doneServing) // unblocks handlers trying to send |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 776 | |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 777 | if VerboseLogs { |
| 778 | sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs) |
| 779 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 780 | |
Brad Fitzpatrick | 23564bf | 2014-11-27 19:40:04 -0800 | [diff] [blame] | 781 | sc.writeFrame(frameWriteMsg{ |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 782 | write: writeSettings{ |
Brad Fitzpatrick | 23564bf | 2014-11-27 19:40:04 -0800 | [diff] [blame] | 783 | {SettingMaxFrameSize, sc.srv.maxReadFrameSize()}, |
| 784 | {SettingMaxConcurrentStreams, sc.advMaxStreams}, |
Brad Fitzpatrick | 29704b8 | 2015-10-10 18:01:18 -0700 | [diff] [blame] | 785 | {SettingMaxHeaderListSize, sc.maxHeaderListSize()}, |
Brad Fitzpatrick | 953b511 | 2014-12-06 17:59:01 -0800 | [diff] [blame] | 786 | |
| 787 | // TODO: more actual settings, notably |
| 788 | // SettingInitialWindowSize, but then we also |
| 789 | // want to bump up the conn window size the |
| 790 | // same amount here right after the settings |
Brad Fitzpatrick | 23564bf | 2014-11-27 19:40:04 -0800 | [diff] [blame] | 791 | }, |
| 792 | }) |
Brad Fitzpatrick | 6a9b77b | 2014-12-03 13:56:36 -0800 | [diff] [blame] | 793 | sc.unackedSettings++ |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 794 | |
| 795 | if err := sc.readPreface(); err != nil { |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 796 | sc.condlogf(err, "http2: server: error reading preface from client %v: %v", sc.conn.RemoteAddr(), err) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 797 | return |
| 798 | } |
Brad Fitzpatrick | cd8c270 | 2015-10-15 20:01:14 +0000 | [diff] [blame] | 799 | // Now that we've got the preface, get us out of the |
| 800 | // "StateNew" state. We can't go directly to idle, though. |
| 801 | // Active means we read some data and anticipate a request. We'll |
| 802 | // do another Active when we get a HEADERS frame. |
| 803 | sc.setConnState(http.StateActive) |
| 804 | sc.setConnState(http.StateIdle) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 805 | |
Brad Fitzpatrick | aa524f6 | 2014-11-25 10:31:37 -0800 | [diff] [blame] | 806 | go sc.readFrames() // closed by defer sc.conn.Close above |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 807 | |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 808 | settingsTimer := time.NewTimer(firstSettingsTimeout) |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 809 | loopNum := 0 |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 810 | for { |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 811 | loopNum++ |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 812 | select { |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 813 | case wm := <-sc.wantWriteFrameCh: |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 814 | sc.writeFrame(wm) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 815 | case res := <-sc.wroteFrameCh: |
| 816 | sc.wroteFrame(res) |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 817 | case res := <-sc.readFrameCh: |
| 818 | if !sc.processFrameFromReader(res) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 819 | return |
| 820 | } |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 821 | res.readMore() |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 822 | if settingsTimer.C != nil { |
| 823 | settingsTimer.Stop() |
| 824 | settingsTimer.C = nil |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 825 | } |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 826 | case m := <-sc.bodyReadCh: |
| 827 | sc.noteBodyRead(m.st, m.n) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 828 | case <-settingsTimer.C: |
| 829 | sc.logf("timeout waiting for SETTINGS frames from %v", sc.conn.RemoteAddr()) |
| 830 | return |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 831 | case <-sc.shutdownTimerCh: |
| 832 | sc.vlogf("GOAWAY close timer fired; closing conn from %v", sc.conn.RemoteAddr()) |
| 833 | return |
Brad Fitzpatrick | 0db6d65 | 2014-11-15 15:49:19 -0800 | [diff] [blame] | 834 | case fn := <-sc.testHookCh: |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 835 | fn(loopNum) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 836 | } |
| 837 | } |
| 838 | } |
| 839 | |
Brad Fitzpatrick | 9584203 | 2014-11-15 09:47:42 -0800 | [diff] [blame] | 840 | // readPreface reads the ClientPreface greeting from the peer |
| 841 | // or returns an error on timeout or an invalid greeting. |
| 842 | func (sc *serverConn) readPreface() error { |
| 843 | errc := make(chan error, 1) |
| 844 | go func() { |
| 845 | // Read the client preface |
| 846 | buf := make([]byte, len(ClientPreface)) |
Brad Fitzpatrick | 9584203 | 2014-11-15 09:47:42 -0800 | [diff] [blame] | 847 | if _, err := io.ReadFull(sc.conn, buf); err != nil { |
| 848 | errc <- err |
| 849 | } else if !bytes.Equal(buf, clientPreface) { |
| 850 | errc <- fmt.Errorf("bogus greeting %q", buf) |
| 851 | } else { |
| 852 | errc <- nil |
| 853 | } |
| 854 | }() |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 855 | timer := time.NewTimer(prefaceTimeout) // TODO: configurable on *Server? |
Brad Fitzpatrick | 9584203 | 2014-11-15 09:47:42 -0800 | [diff] [blame] | 856 | defer timer.Stop() |
| 857 | select { |
| 858 | case <-timer.C: |
| 859 | return errors.New("timeout waiting for client preface") |
| 860 | case err := <-errc: |
| 861 | if err == nil { |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 862 | if VerboseLogs { |
| 863 | sc.vlogf("http2: server: client %v said hello", sc.conn.RemoteAddr()) |
| 864 | } |
Brad Fitzpatrick | 9584203 | 2014-11-15 09:47:42 -0800 | [diff] [blame] | 865 | } |
| 866 | return err |
| 867 | } |
| 868 | } |
| 869 | |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 870 | var errChanPool = sync.Pool{ |
| 871 | New: func() interface{} { return make(chan error, 1) }, |
| 872 | } |
| 873 | |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 874 | var writeDataPool = sync.Pool{ |
| 875 | New: func() interface{} { return new(writeData) }, |
| 876 | } |
| 877 | |
| 878 | // writeDataFromHandler writes DATA response frames from a handler on |
| 879 | // the given stream. |
| 880 | func (sc *serverConn) writeDataFromHandler(stream *stream, data []byte, endStream bool) error { |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 881 | ch := errChanPool.Get().(chan error) |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 882 | writeArg := writeDataPool.Get().(*writeData) |
| 883 | *writeArg = writeData{stream.id, data, endStream} |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 884 | err := sc.writeFrameFromHandler(frameWriteMsg{ |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 885 | write: writeArg, |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 886 | stream: stream, |
| 887 | done: ch, |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 888 | }) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 889 | if err != nil { |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 890 | return err |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 891 | } |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 892 | var frameWriteDone bool // the frame write is done (successfully or not) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 893 | select { |
| 894 | case err = <-ch: |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 895 | frameWriteDone = true |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 896 | case <-sc.doneServing: |
| 897 | return errClientDisconnected |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 898 | case <-stream.cw: |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 899 | // If both ch and stream.cw were ready (as might |
| 900 | // happen on the final Write after an http.Handler |
| 901 | // ends), prefer the write result. Otherwise this |
| 902 | // might just be us successfully closing the stream. |
| 903 | // The writeFrameAsync and serve goroutines guarantee |
| 904 | // that the ch send will happen before the stream.cw |
| 905 | // close. |
| 906 | select { |
| 907 | case err = <-ch: |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 908 | frameWriteDone = true |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 909 | default: |
| 910 | return errStreamClosed |
| 911 | } |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 912 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 913 | errChanPool.Put(ch) |
Brad Fitzpatrick | c95266f | 2015-10-29 12:35:12 -0700 | [diff] [blame] | 914 | if frameWriteDone { |
| 915 | writeDataPool.Put(writeArg) |
| 916 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 917 | return err |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 918 | } |
| 919 | |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 920 | // writeFrameFromHandler sends wm to sc.wantWriteFrameCh, but aborts |
| 921 | // if the connection has gone away. |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 922 | // |
| 923 | // This must not be run from the serve goroutine itself, else it might |
| 924 | // deadlock writing to sc.wantWriteFrameCh (which is only mildly |
| 925 | // buffered and is read by serve itself). If you're on the serve |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 926 | // goroutine, call writeFrame instead. |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 927 | func (sc *serverConn) writeFrameFromHandler(wm frameWriteMsg) error { |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 928 | sc.serveG.checkNotOn() // NOT |
| 929 | select { |
| 930 | case sc.wantWriteFrameCh <- wm: |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 931 | return nil |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 932 | case <-sc.doneServing: |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 933 | // Serve loop is gone. |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 934 | // Client has closed their connection to the server. |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 935 | return errClientDisconnected |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 936 | } |
Brad Fitzpatrick | a29a323 | 2014-11-15 11:18:25 -0800 | [diff] [blame] | 937 | } |
| 938 | |
Brad Fitzpatrick | a92fa95 | 2014-12-02 10:31:34 -0800 | [diff] [blame] | 939 | // writeFrame schedules a frame to write and sends it if there's nothing |
| 940 | // already being written. |
Brad Fitzpatrick | dc0c5c0 | 2014-11-20 14:15:26 -0800 | [diff] [blame] | 941 | // |
Brad Fitzpatrick | a92fa95 | 2014-12-02 10:31:34 -0800 | [diff] [blame] | 942 | // There is no pushback here (the serve goroutine never blocks). It's |
| 943 | // the http.Handlers that block, waiting for their previous frames to |
| 944 | // make it onto the wire |
| 945 | // |
| 946 | // If you're not on the serve goroutine, use writeFrameFromHandler instead. |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 947 | func (sc *serverConn) writeFrame(wm frameWriteMsg) { |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 948 | sc.serveG.check() |
Brad Fitzpatrick | a13c4a4 | 2014-11-27 17:47:29 -0800 | [diff] [blame] | 949 | sc.writeSched.add(wm) |
Tatsuhiro Tsujikawa | cc1e1da | 2014-12-02 20:04:27 +0900 | [diff] [blame] | 950 | sc.scheduleFrameWrite() |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 951 | } |
| 952 | |
Brad Fitzpatrick | 165c098 | 2014-11-26 08:53:01 -0800 | [diff] [blame] | 953 | // startFrameWrite starts a goroutine to write wm (in a separate |
| 954 | // goroutine since that might block on the network), and updates the |
| 955 | // serve goroutine's state about the world, updated from info in wm. |
| 956 | func (sc *serverConn) startFrameWrite(wm frameWriteMsg) { |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 957 | sc.serveG.check() |
| 958 | if sc.writingFrame { |
Brad Fitzpatrick | 165c098 | 2014-11-26 08:53:01 -0800 | [diff] [blame] | 959 | panic("internal error: can only be writing one frame at a time") |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 960 | } |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 961 | |
| 962 | st := wm.stream |
| 963 | if st != nil { |
| 964 | switch st.state { |
| 965 | case stateHalfClosedLocal: |
| 966 | panic("internal error: attempt to send frame on half-closed-local stream") |
| 967 | case stateClosed: |
| 968 | if st.sentReset || st.gotReset { |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 969 | // Skip this frame. |
| 970 | sc.scheduleFrameWrite() |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 971 | return |
| 972 | } |
Brad Fitzpatrick | a92fa95 | 2014-12-02 10:31:34 -0800 | [diff] [blame] | 973 | panic(fmt.Sprintf("internal error: attempt to send a write %v on a closed stream", wm)) |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 974 | } |
| 975 | } |
| 976 | |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 977 | sc.writingFrame = true |
Brad Fitzpatrick | 5e4e2dc | 2014-11-19 16:49:43 -0800 | [diff] [blame] | 978 | sc.needsFrameFlush = true |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 979 | go sc.writeFrameAsync(wm) |
| 980 | } |
| 981 | |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 982 | // errHandlerPanicked is the error given to any callers blocked in a read from |
| 983 | // Request.Body when the main goroutine panics. Since most handlers read in the |
| 984 | // the main ServeHTTP goroutine, this will show up rarely. |
| 985 | var errHandlerPanicked = errors.New("http2: handler panicked") |
| 986 | |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 987 | // wroteFrame is called on the serve goroutine with the result of |
| 988 | // whatever happened on writeFrameAsync. |
| 989 | func (sc *serverConn) wroteFrame(res frameWriteResult) { |
| 990 | sc.serveG.check() |
| 991 | if !sc.writingFrame { |
| 992 | panic("internal error: expected to be already writing a frame") |
| 993 | } |
| 994 | sc.writingFrame = false |
| 995 | |
| 996 | wm := res.wm |
| 997 | st := wm.stream |
| 998 | |
| 999 | closeStream := endsStream(wm.write) |
| 1000 | |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 1001 | if _, ok := wm.write.(handlerPanicRST); ok { |
| 1002 | sc.closeStream(st, errHandlerPanicked) |
| 1003 | } |
| 1004 | |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1005 | // Reply (if requested) to the blocked ServeHTTP goroutine. |
| 1006 | if ch := wm.done; ch != nil { |
| 1007 | select { |
| 1008 | case ch <- res.err: |
| 1009 | default: |
| 1010 | panic(fmt.Sprintf("unbuffered done channel passed in for type %T", wm.write)) |
| 1011 | } |
| 1012 | } |
| 1013 | wm.write = nil // prevent use (assume it's tainted after wm.done send) |
| 1014 | |
| 1015 | if closeStream { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1016 | if st == nil { |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1017 | panic("internal error: expecting non-nil stream") |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1018 | } |
| 1019 | switch st.state { |
| 1020 | case stateOpen: |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 1021 | // Here we would go to stateHalfClosedLocal in |
| 1022 | // theory, but since our handler is done and |
| 1023 | // the net/http package provides no mechanism |
| 1024 | // for finishing writing to a ResponseWriter |
| 1025 | // while still reading data (see possible TODO |
| 1026 | // at top of this file), we go into closed |
| 1027 | // state here anyway, after telling the peer |
| 1028 | // we're hanging up on them. |
| 1029 | st.state = stateHalfClosedLocal // won't last long, but necessary for closeStream via resetStream |
| 1030 | errCancel := StreamError{st.id, ErrCodeCancel} |
| 1031 | sc.resetStream(errCancel) |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1032 | case stateHalfClosedRemote: |
Brad Fitzpatrick | b7f5d98 | 2015-10-26 13:59:20 -0500 | [diff] [blame] | 1033 | sc.closeStream(st, errHandlerComplete) |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 1034 | } |
| 1035 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1036 | |
| 1037 | sc.scheduleFrameWrite() |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 1038 | } |
| 1039 | |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 1040 | // scheduleFrameWrite tickles the frame writing scheduler. |
| 1041 | // |
| 1042 | // If a frame is already being written, nothing happens. This will be called again |
| 1043 | // when the frame is done being written. |
| 1044 | // |
| 1045 | // If a frame isn't being written we need to send one, the best frame |
| 1046 | // to send is selected, preferring first things that aren't |
| 1047 | // stream-specific (e.g. ACKing settings), and then finding the |
| 1048 | // highest priority stream. |
| 1049 | // |
| 1050 | // If a frame isn't being written and there's nothing else to send, we |
| 1051 | // flush the write buffer. |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1052 | func (sc *serverConn) scheduleFrameWrite() { |
| 1053 | sc.serveG.check() |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1054 | if sc.writingFrame { |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1055 | return |
| 1056 | } |
| 1057 | if sc.needToSendGoAway { |
| 1058 | sc.needToSendGoAway = false |
Brad Fitzpatrick | 165c098 | 2014-11-26 08:53:01 -0800 | [diff] [blame] | 1059 | sc.startFrameWrite(frameWriteMsg{ |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1060 | write: &writeGoAway{ |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1061 | maxStreamID: sc.maxStreamID, |
| 1062 | code: sc.goAwayCode, |
| 1063 | }, |
| 1064 | }) |
| 1065 | return |
| 1066 | } |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1067 | if sc.needToSendSettingsAck { |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 1068 | sc.needToSendSettingsAck = false |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1069 | sc.startFrameWrite(frameWriteMsg{write: writeSettingsAck{}}) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1070 | return |
| 1071 | } |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 1072 | if !sc.inGoAway { |
| 1073 | if wm, ok := sc.writeSched.take(); ok { |
| 1074 | sc.startFrameWrite(wm) |
| 1075 | return |
| 1076 | } |
| 1077 | } |
| 1078 | if sc.needsFrameFlush { |
| 1079 | sc.startFrameWrite(frameWriteMsg{write: flushFrameWriter{}}) |
| 1080 | sc.needsFrameFlush = false // after startFrameWrite, since it sets this true |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1081 | return |
| 1082 | } |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1083 | } |
| 1084 | |
Brad Fitzpatrick | 55815ec | 2014-11-15 13:29:57 -0800 | [diff] [blame] | 1085 | func (sc *serverConn) goAway(code ErrCode) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1086 | sc.serveG.check() |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1087 | if sc.inGoAway { |
Brad Fitzpatrick | 55815ec | 2014-11-15 13:29:57 -0800 | [diff] [blame] | 1088 | return |
| 1089 | } |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1090 | if code != ErrCodeNo { |
| 1091 | sc.shutDownIn(250 * time.Millisecond) |
| 1092 | } else { |
| 1093 | // TODO: configurable |
| 1094 | sc.shutDownIn(1 * time.Second) |
| 1095 | } |
| 1096 | sc.inGoAway = true |
| 1097 | sc.needToSendGoAway = true |
| 1098 | sc.goAwayCode = code |
| 1099 | sc.scheduleFrameWrite() |
| 1100 | } |
| 1101 | |
| 1102 | func (sc *serverConn) shutDownIn(d time.Duration) { |
| 1103 | sc.serveG.check() |
| 1104 | sc.shutdownTimer = time.NewTimer(d) |
| 1105 | sc.shutdownTimerCh = sc.shutdownTimer.C |
Brad Fitzpatrick | 55815ec | 2014-11-15 13:29:57 -0800 | [diff] [blame] | 1106 | } |
| 1107 | |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 1108 | func (sc *serverConn) resetStream(se StreamError) { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1109 | sc.serveG.check() |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1110 | sc.writeFrame(frameWriteMsg{write: se}) |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 1111 | if st, ok := sc.streams[se.StreamID]; ok { |
| 1112 | st.sentReset = true |
| 1113 | sc.closeStream(st, se) |
| 1114 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1115 | } |
| 1116 | |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1117 | // processFrameFromReader processes the serve loop's read from readFrameCh from the |
| 1118 | // frame-reading goroutine. |
| 1119 | // processFrameFromReader returns whether the connection should be kept open. |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 1120 | func (sc *serverConn) processFrameFromReader(res readFrameResult) bool { |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1121 | sc.serveG.check() |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 1122 | err := res.err |
| 1123 | if err != nil { |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1124 | if err == ErrFrameTooLarge { |
| 1125 | sc.goAway(ErrCodeFrameSize) |
| 1126 | return true // goAway will close the loop |
| 1127 | } |
Brad Fitzpatrick | eb066e3 | 2016-01-26 18:31:02 +0000 | [diff] [blame] | 1128 | clientGone := err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err) |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1129 | if clientGone { |
| 1130 | // TODO: could we also get into this state if |
| 1131 | // the peer does a half close |
| 1132 | // (e.g. CloseWrite) because they're done |
| 1133 | // sending frames but they're still wanting |
| 1134 | // our open replies? Investigate. |
Brad Fitzpatrick | b2ca8da | 2014-12-08 00:41:28 -0800 | [diff] [blame] | 1135 | // TODO: add CloseWrite to crypto/tls.Conn first |
| 1136 | // so we have a way to test this? I suppose |
| 1137 | // just for testing we could have a non-TLS mode. |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1138 | return false |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1139 | } |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 1140 | } else { |
| 1141 | f := res.f |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1142 | if VerboseLogs { |
| 1143 | sc.vlogf("http2: server read frame %v", summarizeFrame(f)) |
| 1144 | } |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1145 | err = sc.processFrame(f) |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1146 | if err == nil { |
| 1147 | return true |
| 1148 | } |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1149 | } |
| 1150 | |
| 1151 | switch ev := err.(type) { |
| 1152 | case StreamError: |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 1153 | sc.resetStream(ev) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1154 | return true |
| 1155 | case goAwayFlowError: |
Brad Fitzpatrick | 55815ec | 2014-11-15 13:29:57 -0800 | [diff] [blame] | 1156 | sc.goAway(ErrCodeFlowControl) |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1157 | return true |
| 1158 | case ConnectionError: |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1159 | sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev) |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1160 | sc.goAway(ErrCode(ev)) |
| 1161 | return true // goAway will handle shutdown |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1162 | default: |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 1163 | if res.err != nil { |
Brad Fitzpatrick | eb066e3 | 2016-01-26 18:31:02 +0000 | [diff] [blame] | 1164 | sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err) |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1165 | } else { |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1166 | sc.logf("http2: server closing client connection: %v", err) |
Brad Fitzpatrick | 8ec321e | 2014-11-25 14:08:16 -0800 | [diff] [blame] | 1167 | } |
Brad Fitzpatrick | 271cfc1 | 2015-10-12 23:49:56 +0000 | [diff] [blame] | 1168 | return false |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1169 | } |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1170 | } |
| 1171 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1172 | func (sc *serverConn) processFrame(f Frame) error { |
| 1173 | sc.serveG.check() |
| 1174 | |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1175 | // First frame received must be SETTINGS. |
| 1176 | if !sc.sawFirstSettings { |
| 1177 | if _, ok := f.(*SettingsFrame); !ok { |
| 1178 | return ConnectionError(ErrCodeProtocol) |
| 1179 | } |
| 1180 | sc.sawFirstSettings = true |
| 1181 | } |
| 1182 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1183 | switch f := f.(type) { |
| 1184 | case *SettingsFrame: |
| 1185 | return sc.processSettings(f) |
| 1186 | case *HeadersFrame: |
| 1187 | return sc.processHeaders(f) |
| 1188 | case *ContinuationFrame: |
| 1189 | return sc.processContinuation(f) |
| 1190 | case *WindowUpdateFrame: |
| 1191 | return sc.processWindowUpdate(f) |
| 1192 | case *PingFrame: |
| 1193 | return sc.processPing(f) |
| 1194 | case *DataFrame: |
| 1195 | return sc.processData(f) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1196 | case *RSTStreamFrame: |
| 1197 | return sc.processResetStream(f) |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1198 | case *PriorityFrame: |
| 1199 | return sc.processPriority(f) |
Daniel Morsing | 9f25169 | 2014-12-05 18:17:30 +0000 | [diff] [blame] | 1200 | case *PushPromiseFrame: |
| 1201 | // A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE |
| 1202 | // frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR. |
| 1203 | return ConnectionError(ErrCodeProtocol) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1204 | default: |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1205 | sc.vlogf("http2: server ignoring frame: %v", f.Header()) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1206 | return nil |
| 1207 | } |
| 1208 | } |
| 1209 | |
| 1210 | func (sc *serverConn) processPing(f *PingFrame) error { |
| 1211 | sc.serveG.check() |
Brad Fitzpatrick | a179abb | 2015-11-07 16:46:24 +0100 | [diff] [blame] | 1212 | if f.IsAck() { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1213 | // 6.7 PING: " An endpoint MUST NOT respond to PING frames |
| 1214 | // containing this flag." |
| 1215 | return nil |
| 1216 | } |
| 1217 | if f.StreamID != 0 { |
| 1218 | // "PING frames are not associated with any individual |
| 1219 | // stream. If a PING frame is received with a stream |
| 1220 | // identifier field value other than 0x0, the recipient MUST |
| 1221 | // respond with a connection error (Section 5.4.1) of type |
| 1222 | // PROTOCOL_ERROR." |
| 1223 | return ConnectionError(ErrCodeProtocol) |
| 1224 | } |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1225 | sc.writeFrame(frameWriteMsg{write: writePingAck{f}}) |
Brad Fitzpatrick | 9e0eccc | 2014-11-15 09:14:49 -0800 | [diff] [blame] | 1226 | return nil |
| 1227 | } |
| 1228 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1229 | func (sc *serverConn) processWindowUpdate(f *WindowUpdateFrame) error { |
| 1230 | sc.serveG.check() |
| 1231 | switch { |
| 1232 | case f.StreamID != 0: // stream-level flow control |
| 1233 | st := sc.streams[f.StreamID] |
| 1234 | if st == nil { |
| 1235 | // "WINDOW_UPDATE can be sent by a peer that has sent a |
| 1236 | // frame bearing the END_STREAM flag. This means that a |
| 1237 | // receiver could receive a WINDOW_UPDATE frame on a "half |
| 1238 | // closed (remote)" or "closed" stream. A receiver MUST |
| 1239 | // NOT treat this as an error, see Section 5.1." |
| 1240 | return nil |
| 1241 | } |
| 1242 | if !st.flow.add(int32(f.Increment)) { |
| 1243 | return StreamError{f.StreamID, ErrCodeFlowControl} |
| 1244 | } |
| 1245 | default: // connection-level flow control |
| 1246 | if !sc.flow.add(int32(f.Increment)) { |
| 1247 | return goAwayFlowError{} |
| 1248 | } |
| 1249 | } |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 1250 | sc.scheduleFrameWrite() |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1251 | return nil |
| 1252 | } |
| 1253 | |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1254 | func (sc *serverConn) processResetStream(f *RSTStreamFrame) error { |
| 1255 | sc.serveG.check() |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 1256 | |
| 1257 | state, st := sc.state(f.StreamID) |
| 1258 | if state == stateIdle { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1259 | // 6.4 "RST_STREAM frames MUST NOT be sent for a |
| 1260 | // stream in the "idle" state. If a RST_STREAM frame |
| 1261 | // identifying an idle stream is received, the |
| 1262 | // recipient MUST treat this as a connection error |
| 1263 | // (Section 5.4.1) of type PROTOCOL_ERROR. |
| 1264 | return ConnectionError(ErrCodeProtocol) |
| 1265 | } |
Brad Fitzpatrick | a98415a | 2014-12-08 00:47:45 -0800 | [diff] [blame] | 1266 | if st != nil { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1267 | st.gotReset = true |
| 1268 | sc.closeStream(st, StreamError{f.StreamID, f.ErrCode}) |
| 1269 | } |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1270 | return nil |
| 1271 | } |
| 1272 | |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1273 | func (sc *serverConn) closeStream(st *stream, err error) { |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1274 | sc.serveG.check() |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1275 | if st.state == stateIdle || st.state == stateClosed { |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 1276 | panic(fmt.Sprintf("invariant; can't close stream in state %v", st.state)) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1277 | } |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1278 | st.state = stateClosed |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 1279 | sc.curOpenStreams-- |
Brad Fitzpatrick | cd8c270 | 2015-10-15 20:01:14 +0000 | [diff] [blame] | 1280 | if sc.curOpenStreams == 0 { |
| 1281 | sc.setConnState(http.StateIdle) |
| 1282 | } |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1283 | delete(sc.streams, st.id) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1284 | if p := st.body; p != nil { |
Brad Fitzpatrick | b7f5d98 | 2015-10-26 13:59:20 -0500 | [diff] [blame] | 1285 | p.CloseWithError(err) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1286 | } |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 1287 | st.cw.Close() // signals Handler's CloseNotifier, unblocks writes, etc |
Brad Fitzpatrick | 5b95eb3 | 2014-12-02 10:52:56 -0800 | [diff] [blame] | 1288 | sc.writeSched.forgetStream(st.id) |
Brad Fitzpatrick | 6d3aa4f | 2014-11-15 14:55:57 -0800 | [diff] [blame] | 1289 | } |
| 1290 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1291 | func (sc *serverConn) processSettings(f *SettingsFrame) error { |
| 1292 | sc.serveG.check() |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1293 | if f.IsAck() { |
Brad Fitzpatrick | 6a9b77b | 2014-12-03 13:56:36 -0800 | [diff] [blame] | 1294 | sc.unackedSettings-- |
| 1295 | if sc.unackedSettings < 0 { |
| 1296 | // Why is the peer ACKing settings we never sent? |
| 1297 | // The spec doesn't mention this case, but |
| 1298 | // hang up on them anyway. |
| 1299 | return ConnectionError(ErrCodeProtocol) |
| 1300 | } |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1301 | return nil |
| 1302 | } |
| 1303 | if err := f.ForeachSetting(sc.processSetting); err != nil { |
| 1304 | return err |
| 1305 | } |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 1306 | sc.needToSendSettingsAck = true |
| 1307 | sc.scheduleFrameWrite() |
Brad Fitzpatrick | d07a0e4 | 2014-11-15 10:47:12 -0800 | [diff] [blame] | 1308 | return nil |
| 1309 | } |
| 1310 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1311 | func (sc *serverConn) processSetting(s Setting) error { |
| 1312 | sc.serveG.check() |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1313 | if err := s.Valid(); err != nil { |
| 1314 | return err |
| 1315 | } |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1316 | if VerboseLogs { |
| 1317 | sc.vlogf("http2: server processing setting %v", s) |
| 1318 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1319 | switch s.ID { |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1320 | case SettingHeaderTableSize: |
| 1321 | sc.headerTableSize = s.Val |
Tatsuhiro Tsujikawa | c7d67a5 | 2014-11-20 01:01:39 +0900 | [diff] [blame] | 1322 | sc.hpackEncoder.SetMaxDynamicTableSize(s.Val) |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1323 | case SettingEnablePush: |
| 1324 | sc.pushEnabled = s.Val != 0 |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1325 | case SettingMaxConcurrentStreams: |
Brad Fitzpatrick | 6ec1731 | 2014-11-23 10:07:07 -0800 | [diff] [blame] | 1326 | sc.clientMaxStreams = s.Val |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1327 | case SettingInitialWindowSize: |
| 1328 | return sc.processSettingInitialWindowSize(s.Val) |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1329 | case SettingMaxFrameSize: |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 1330 | sc.writeSched.maxFrameSize = s.Val |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1331 | case SettingMaxHeaderListSize: |
Brad Fitzpatrick | 29704b8 | 2015-10-10 18:01:18 -0700 | [diff] [blame] | 1332 | sc.peerMaxHeaderListSize = s.Val |
gbbr | 0b3b574 | 2014-11-23 00:44:48 +0000 | [diff] [blame] | 1333 | default: |
| 1334 | // Unknown setting: "An endpoint that receives a SETTINGS |
| 1335 | // frame with any unknown or unsupported identifier MUST |
| 1336 | // ignore that setting." |
Brad Fitzpatrick | 415f191 | 2015-12-16 20:28:38 +0000 | [diff] [blame] | 1337 | if VerboseLogs { |
| 1338 | sc.vlogf("http2: server ignoring unknown setting %v", s) |
| 1339 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1340 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1341 | return nil |
| 1342 | } |
| 1343 | |
| 1344 | func (sc *serverConn) processSettingInitialWindowSize(val uint32) error { |
| 1345 | sc.serveG.check() |
Brad Fitzpatrick | bc00c57 | 2014-11-17 12:28:01 -0800 | [diff] [blame] | 1346 | // Note: val already validated to be within range by |
| 1347 | // processSetting's Valid call. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1348 | |
| 1349 | // "A SETTINGS frame can alter the initial flow control window |
| 1350 | // size for all current streams. When the value of |
| 1351 | // SETTINGS_INITIAL_WINDOW_SIZE changes, a receiver MUST |
| 1352 | // adjust the size of all stream flow control windows that it |
| 1353 | // maintains by the difference between the new value and the |
| 1354 | // old value." |
| 1355 | old := sc.initialWindowSize |
| 1356 | sc.initialWindowSize = int32(val) |
| 1357 | growth := sc.initialWindowSize - old // may be negative |
| 1358 | for _, st := range sc.streams { |
| 1359 | if !st.flow.add(growth) { |
| 1360 | // 6.9.2 Initial Flow Control Window Size |
| 1361 | // "An endpoint MUST treat a change to |
| 1362 | // SETTINGS_INITIAL_WINDOW_SIZE that causes any flow |
| 1363 | // control window to exceed the maximum size as a |
| 1364 | // connection error (Section 5.4.1) of type |
| 1365 | // FLOW_CONTROL_ERROR." |
| 1366 | return ConnectionError(ErrCodeFlowControl) |
| 1367 | } |
| 1368 | } |
| 1369 | return nil |
| 1370 | } |
| 1371 | |
| 1372 | func (sc *serverConn) processData(f *DataFrame) error { |
| 1373 | sc.serveG.check() |
| 1374 | // "If a DATA frame is received whose stream is not in "open" |
| 1375 | // or "half closed (local)" state, the recipient MUST respond |
| 1376 | // with a stream error (Section 5.4.2) of type STREAM_CLOSED." |
| 1377 | id := f.Header().StreamID |
| 1378 | st, ok := sc.streams[id] |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1379 | if !ok || st.state != stateOpen || st.gotTrailerHeader { |
Brad Fitzpatrick | f3a6d9a | 2014-12-08 07:53:36 -0800 | [diff] [blame] | 1380 | // This includes sending a RST_STREAM if the stream is |
| 1381 | // in stateHalfClosedLocal (which currently means that |
| 1382 | // the http.Handler returned, so it's done reading & |
| 1383 | // done writing). Try to stop the client from sending |
| 1384 | // more DATA. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1385 | return StreamError{id, ErrCodeStreamClosed} |
| 1386 | } |
| 1387 | if st.body == nil { |
Brad Fitzpatrick | b0a06c8 | 2014-11-26 09:21:28 -0800 | [diff] [blame] | 1388 | panic("internal error: should have a body in this state") |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1389 | } |
| 1390 | data := f.Data() |
| 1391 | |
| 1392 | // Sender sending more than they'd declared? |
| 1393 | if st.declBodyBytes != -1 && st.bodyBytes+int64(len(data)) > st.declBodyBytes { |
Brad Fitzpatrick | b7f5d98 | 2015-10-26 13:59:20 -0500 | [diff] [blame] | 1394 | st.body.CloseWithError(fmt.Errorf("sender tried to send more than declared Content-Length of %d bytes", st.declBodyBytes)) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1395 | return StreamError{id, ErrCodeStreamClosed} |
| 1396 | } |
| 1397 | if len(data) > 0 { |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 1398 | // Check whether the client has flow control quota. |
| 1399 | if int(st.inflow.available()) < len(data) { |
| 1400 | return StreamError{id, ErrCodeFlowControl} |
| 1401 | } |
| 1402 | st.inflow.take(int32(len(data))) |
Brad Fitzpatrick | 0218ba6 | 2014-11-26 09:36:05 -0800 | [diff] [blame] | 1403 | wrote, err := st.body.Write(data) |
| 1404 | if err != nil { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1405 | return StreamError{id, ErrCodeStreamClosed} |
| 1406 | } |
Brad Fitzpatrick | 0218ba6 | 2014-11-26 09:36:05 -0800 | [diff] [blame] | 1407 | if wrote != len(data) { |
| 1408 | panic("internal error: bad Writer") |
| 1409 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1410 | st.bodyBytes += int64(len(data)) |
| 1411 | } |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1412 | if f.StreamEnded() { |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1413 | st.endStream() |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1414 | } |
| 1415 | return nil |
| 1416 | } |
| 1417 | |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1418 | // endStream closes a Request.Body's pipe. It is called when a DATA |
| 1419 | // frame says a request body is over (or after trailers). |
| 1420 | func (st *stream) endStream() { |
| 1421 | sc := st.sc |
| 1422 | sc.serveG.check() |
| 1423 | |
| 1424 | if st.declBodyBytes != -1 && st.declBodyBytes != st.bodyBytes { |
| 1425 | st.body.CloseWithError(fmt.Errorf("request declared a Content-Length of %d but only wrote %d bytes", |
| 1426 | st.declBodyBytes, st.bodyBytes)) |
| 1427 | } else { |
| 1428 | st.body.closeWithErrorAndCode(io.EOF, st.copyTrailersToHandlerRequest) |
| 1429 | st.body.CloseWithError(io.EOF) |
| 1430 | } |
| 1431 | st.state = stateHalfClosedRemote |
| 1432 | } |
| 1433 | |
| 1434 | // copyTrailersToHandlerRequest is run in the Handler's goroutine in |
| 1435 | // its Request.Body.Read just before it gets io.EOF. |
| 1436 | func (st *stream) copyTrailersToHandlerRequest() { |
| 1437 | for k, vv := range st.trailer { |
| 1438 | if _, ok := st.reqTrailer[k]; ok { |
| 1439 | // Only copy it over it was pre-declared. |
| 1440 | st.reqTrailer[k] = vv |
| 1441 | } |
| 1442 | } |
| 1443 | } |
| 1444 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1445 | func (sc *serverConn) processHeaders(f *HeadersFrame) error { |
| 1446 | sc.serveG.check() |
| 1447 | id := f.Header().StreamID |
Brad Fitzpatrick | 21896bb | 2014-11-19 16:05:21 -0800 | [diff] [blame] | 1448 | if sc.inGoAway { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1449 | // Ignore. |
| 1450 | return nil |
| 1451 | } |
| 1452 | // http://http2.github.io/http2-spec/#rfc.section.5.1.1 |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1453 | // Streams initiated by a client MUST use odd-numbered stream |
| 1454 | // identifiers. [...] An endpoint that receives an unexpected |
| 1455 | // stream identifier MUST respond with a connection error |
| 1456 | // (Section 5.4.1) of type PROTOCOL_ERROR. |
| 1457 | if id%2 != 1 { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1458 | return ConnectionError(ErrCodeProtocol) |
| 1459 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1460 | // A HEADERS frame can be used to create a new stream or |
| 1461 | // send a trailer for an open one. If we already have a stream |
| 1462 | // open, let it process its own HEADERS frame (trailers at this |
| 1463 | // point, if it's valid). |
| 1464 | st := sc.streams[f.Header().StreamID] |
| 1465 | if st != nil { |
| 1466 | return st.processTrailerHeaders(f) |
| 1467 | } |
| 1468 | |
| 1469 | // [...] The identifier of a newly established stream MUST be |
| 1470 | // numerically greater than all streams that the initiating |
| 1471 | // endpoint has opened or reserved. [...] An endpoint that |
| 1472 | // receives an unexpected stream identifier MUST respond with |
| 1473 | // a connection error (Section 5.4.1) of type PROTOCOL_ERROR. |
| 1474 | if id <= sc.maxStreamID || sc.req.stream != nil { |
| 1475 | return ConnectionError(ErrCodeProtocol) |
| 1476 | } |
| 1477 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1478 | if id > sc.maxStreamID { |
| 1479 | sc.maxStreamID = id |
| 1480 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1481 | st = &stream{ |
| 1482 | sc: sc, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1483 | id: id, |
| 1484 | state: stateOpen, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1485 | } |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1486 | if f.StreamEnded() { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1487 | st.state = stateHalfClosedRemote |
| 1488 | } |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 1489 | st.cw.Init() |
| 1490 | |
| 1491 | st.flow.conn = &sc.flow // link to conn-level counter |
| 1492 | st.flow.add(sc.initialWindowSize) |
| 1493 | st.inflow.conn = &sc.inflow // link to conn-level counter |
| 1494 | st.inflow.add(initialWindowSize) // TODO: update this when we send a higher initial window size in the initial settings |
| 1495 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1496 | sc.streams[id] = st |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1497 | if f.HasPriority() { |
Daniel Morsing | a5c5593 | 2014-12-14 13:34:18 +0100 | [diff] [blame] | 1498 | adjustStreamPriority(sc.streams, st.id, f.Priority) |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1499 | } |
Brad Fitzpatrick | b3e0a87 | 2014-11-23 21:15:59 -0800 | [diff] [blame] | 1500 | sc.curOpenStreams++ |
Brad Fitzpatrick | cd8c270 | 2015-10-15 20:01:14 +0000 | [diff] [blame] | 1501 | if sc.curOpenStreams == 1 { |
| 1502 | sc.setConnState(http.StateActive) |
| 1503 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1504 | sc.req = requestParam{ |
| 1505 | stream: st, |
| 1506 | header: make(http.Header), |
| 1507 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1508 | sc.hpackDecoder.SetEmitFunc(sc.onNewHeaderField) |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 1509 | sc.hpackDecoder.SetEmitEnabled(true) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1510 | return sc.processHeaderBlockFragment(st, f.HeaderBlockFragment(), f.HeadersEnded()) |
| 1511 | } |
| 1512 | |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1513 | func (st *stream) processTrailerHeaders(f *HeadersFrame) error { |
| 1514 | sc := st.sc |
| 1515 | sc.serveG.check() |
| 1516 | if st.gotTrailerHeader { |
| 1517 | return ConnectionError(ErrCodeProtocol) |
| 1518 | } |
| 1519 | st.gotTrailerHeader = true |
Brad Fitzpatrick | f530c4e | 2016-01-07 08:16:00 -0800 | [diff] [blame] | 1520 | if !f.StreamEnded() { |
| 1521 | return StreamError{st.id, ErrCodeProtocol} |
| 1522 | } |
| 1523 | sc.resetPendingRequest() // we use invalidHeader from it for trailers |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1524 | return st.processTrailerHeaderBlockFragment(f.HeaderBlockFragment(), f.HeadersEnded()) |
| 1525 | } |
| 1526 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1527 | func (sc *serverConn) processContinuation(f *ContinuationFrame) error { |
| 1528 | sc.serveG.check() |
| 1529 | st := sc.streams[f.Header().StreamID] |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1530 | if st.gotTrailerHeader { |
| 1531 | return st.processTrailerHeaderBlockFragment(f.HeaderBlockFragment(), f.HeadersEnded()) |
| 1532 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1533 | return sc.processHeaderBlockFragment(st, f.HeaderBlockFragment(), f.HeadersEnded()) |
| 1534 | } |
| 1535 | |
| 1536 | func (sc *serverConn) processHeaderBlockFragment(st *stream, frag []byte, end bool) error { |
| 1537 | sc.serveG.check() |
| 1538 | if _, err := sc.hpackDecoder.Write(frag); err != nil { |
Brad Fitzpatrick | 59e870b | 2015-10-14 00:12:18 +0000 | [diff] [blame] | 1539 | return ConnectionError(ErrCodeCompression) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1540 | } |
| 1541 | if !end { |
| 1542 | return nil |
| 1543 | } |
| 1544 | if err := sc.hpackDecoder.Close(); err != nil { |
Brad Fitzpatrick | 59e870b | 2015-10-14 00:12:18 +0000 | [diff] [blame] | 1545 | return ConnectionError(ErrCodeCompression) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1546 | } |
Brad Fitzpatrick | b3e0a87 | 2014-11-23 21:15:59 -0800 | [diff] [blame] | 1547 | defer sc.resetPendingRequest() |
| 1548 | if sc.curOpenStreams > sc.advMaxStreams { |
Brad Fitzpatrick | 6a9b77b | 2014-12-03 13:56:36 -0800 | [diff] [blame] | 1549 | // "Endpoints MUST NOT exceed the limit set by their |
| 1550 | // peer. An endpoint that receives a HEADERS frame |
| 1551 | // that causes their advertised concurrent stream |
| 1552 | // limit to be exceeded MUST treat this as a stream |
| 1553 | // error (Section 5.4.2) of type PROTOCOL_ERROR or |
| 1554 | // REFUSED_STREAM." |
| 1555 | if sc.unackedSettings == 0 { |
| 1556 | // They should know better. |
| 1557 | return StreamError{st.id, ErrCodeProtocol} |
| 1558 | } |
| 1559 | // Assume it's a network race, where they just haven't |
| 1560 | // received our last SETTINGS update. But actually |
| 1561 | // this can't happen yet, because we don't yet provide |
| 1562 | // a way for users to adjust server parameters at |
| 1563 | // runtime. |
| 1564 | return StreamError{st.id, ErrCodeRefusedStream} |
Brad Fitzpatrick | b3e0a87 | 2014-11-23 21:15:59 -0800 | [diff] [blame] | 1565 | } |
| 1566 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1567 | rw, req, err := sc.newWriterAndRequest() |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1568 | if err != nil { |
| 1569 | return err |
| 1570 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1571 | st.reqTrailer = req.Trailer |
| 1572 | if st.reqTrailer != nil { |
| 1573 | st.trailer = make(http.Header) |
| 1574 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1575 | st.body = req.Body.(*requestBody).pipe // may be nil |
| 1576 | st.declBodyBytes = req.ContentLength |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 1577 | |
| 1578 | handler := sc.handler.ServeHTTP |
| 1579 | if !sc.hpackDecoder.EmitEnabled() { |
| 1580 | // Their header list was too long. Send a 431 error. |
| 1581 | handler = handleHeaderListTooLong |
| 1582 | } |
| 1583 | |
| 1584 | go sc.runHandler(rw, req, handler) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1585 | return nil |
| 1586 | } |
| 1587 | |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1588 | func (st *stream) processTrailerHeaderBlockFragment(frag []byte, end bool) error { |
| 1589 | sc := st.sc |
| 1590 | sc.serveG.check() |
| 1591 | sc.hpackDecoder.SetEmitFunc(st.onNewTrailerField) |
| 1592 | if _, err := sc.hpackDecoder.Write(frag); err != nil { |
| 1593 | return ConnectionError(ErrCodeCompression) |
| 1594 | } |
| 1595 | if !end { |
| 1596 | return nil |
| 1597 | } |
Brad Fitzpatrick | f530c4e | 2016-01-07 08:16:00 -0800 | [diff] [blame] | 1598 | |
| 1599 | rp := &sc.req |
| 1600 | if rp.invalidHeader { |
| 1601 | return StreamError{rp.stream.id, ErrCodeProtocol} |
| 1602 | } |
| 1603 | |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1604 | err := sc.hpackDecoder.Close() |
| 1605 | st.endStream() |
| 1606 | if err != nil { |
| 1607 | return ConnectionError(ErrCodeCompression) |
| 1608 | } |
| 1609 | return nil |
| 1610 | } |
| 1611 | |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1612 | func (sc *serverConn) processPriority(f *PriorityFrame) error { |
Daniel Morsing | a5c5593 | 2014-12-14 13:34:18 +0100 | [diff] [blame] | 1613 | adjustStreamPriority(sc.streams, f.StreamID, f.PriorityParam) |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1614 | return nil |
| 1615 | } |
| 1616 | |
Daniel Morsing | a5c5593 | 2014-12-14 13:34:18 +0100 | [diff] [blame] | 1617 | func adjustStreamPriority(streams map[uint32]*stream, streamID uint32, priority PriorityParam) { |
| 1618 | st, ok := streams[streamID] |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1619 | if !ok { |
| 1620 | // TODO: not quite correct (this streamID might |
| 1621 | // already exist in the dep tree, but be closed), but |
| 1622 | // close enough for now. |
| 1623 | return |
| 1624 | } |
| 1625 | st.weight = priority.Weight |
Daniel Morsing | a5c5593 | 2014-12-14 13:34:18 +0100 | [diff] [blame] | 1626 | parent := streams[priority.StreamDep] // might be nil |
| 1627 | if parent == st { |
| 1628 | // if client tries to set this stream to be the parent of itself |
| 1629 | // ignore and keep going |
| 1630 | return |
| 1631 | } |
| 1632 | |
| 1633 | // section 5.3.3: If a stream is made dependent on one of its |
| 1634 | // own dependencies, the formerly dependent stream is first |
| 1635 | // moved to be dependent on the reprioritized stream's previous |
| 1636 | // parent. The moved dependency retains its weight. |
| 1637 | for piter := parent; piter != nil; piter = piter.parent { |
| 1638 | if piter == st { |
| 1639 | parent.parent = st.parent |
| 1640 | break |
| 1641 | } |
| 1642 | } |
| 1643 | st.parent = parent |
| 1644 | if priority.Exclusive && (st.parent != nil || priority.StreamDep == 0) { |
| 1645 | for _, openStream := range streams { |
| 1646 | if openStream != st && openStream.parent == st.parent { |
Brad Fitzpatrick | 2ee3a49 | 2014-11-30 23:18:32 -0800 | [diff] [blame] | 1647 | openStream.parent = st |
| 1648 | } |
| 1649 | } |
| 1650 | } |
| 1651 | } |
| 1652 | |
Brad Fitzpatrick | b3e0a87 | 2014-11-23 21:15:59 -0800 | [diff] [blame] | 1653 | // resetPendingRequest zeros out all state related to a HEADERS frame |
| 1654 | // and its zero or more CONTINUATION frames sent to start a new |
| 1655 | // request. |
| 1656 | func (sc *serverConn) resetPendingRequest() { |
| 1657 | sc.serveG.check() |
| 1658 | sc.req = requestParam{} |
| 1659 | } |
| 1660 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1661 | func (sc *serverConn) newWriterAndRequest() (*responseWriter, *http.Request, error) { |
| 1662 | sc.serveG.check() |
| 1663 | rp := &sc.req |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1664 | |
| 1665 | if rp.invalidHeader { |
| 1666 | return nil, nil, StreamError{rp.stream.id, ErrCodeProtocol} |
| 1667 | } |
| 1668 | |
| 1669 | isConnect := rp.method == "CONNECT" |
| 1670 | if isConnect { |
| 1671 | if rp.path != "" || rp.scheme != "" || rp.authority == "" { |
| 1672 | return nil, nil, StreamError{rp.stream.id, ErrCodeProtocol} |
| 1673 | } |
| 1674 | } else if rp.method == "" || rp.path == "" || |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1675 | (rp.scheme != "https" && rp.scheme != "http") { |
| 1676 | // See 8.1.2.6 Malformed Requests and Responses: |
| 1677 | // |
| 1678 | // Malformed requests or responses that are detected |
| 1679 | // MUST be treated as a stream error (Section 5.4.2) |
| 1680 | // of type PROTOCOL_ERROR." |
| 1681 | // |
| 1682 | // 8.1.2.3 Request Pseudo-Header Fields |
| 1683 | // "All HTTP/2 requests MUST include exactly one valid |
| 1684 | // value for the :method, :scheme, and :path |
| 1685 | // pseudo-header fields" |
| 1686 | return nil, nil, StreamError{rp.stream.id, ErrCodeProtocol} |
| 1687 | } |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1688 | |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 1689 | bodyOpen := rp.stream.state == stateOpen |
| 1690 | if rp.method == "HEAD" && bodyOpen { |
| 1691 | // HEAD requests can't have bodies |
| 1692 | return nil, nil, StreamError{rp.stream.id, ErrCodeProtocol} |
| 1693 | } |
Brad Fitzpatrick | 30b1681 | 2014-12-08 10:10:39 -0800 | [diff] [blame] | 1694 | var tlsState *tls.ConnectionState // nil if not scheme https |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1695 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1696 | if rp.scheme == "https" { |
Brad Fitzpatrick | 30b1681 | 2014-12-08 10:10:39 -0800 | [diff] [blame] | 1697 | tlsState = sc.tlsState |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1698 | } |
| 1699 | authority := rp.authority |
| 1700 | if authority == "" { |
| 1701 | authority = rp.header.Get("Host") |
| 1702 | } |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1703 | needsContinue := rp.header.Get("Expect") == "100-continue" |
| 1704 | if needsContinue { |
| 1705 | rp.header.Del("Expect") |
| 1706 | } |
Brad Fitzpatrick | b846920 | 2015-10-07 22:10:10 -0700 | [diff] [blame] | 1707 | // Merge Cookie headers into one "; "-delimited value. |
| 1708 | if cookies := rp.header["Cookie"]; len(cookies) > 1 { |
| 1709 | rp.header.Set("Cookie", strings.Join(cookies, "; ")) |
| 1710 | } |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1711 | |
| 1712 | // Setup Trailers |
| 1713 | var trailer http.Header |
| 1714 | for _, v := range rp.header["Trailer"] { |
| 1715 | for _, key := range strings.Split(v, ",") { |
| 1716 | key = http.CanonicalHeaderKey(strings.TrimSpace(key)) |
| 1717 | switch key { |
| 1718 | case "Transfer-Encoding", "Trailer", "Content-Length": |
| 1719 | // Bogus. (copy of http1 rules) |
| 1720 | // Ignore. |
| 1721 | default: |
| 1722 | if trailer == nil { |
| 1723 | trailer = make(http.Header) |
| 1724 | } |
| 1725 | trailer[key] = nil |
| 1726 | } |
| 1727 | } |
| 1728 | } |
| 1729 | delete(rp.header, "Trailer") |
| 1730 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1731 | body := &requestBody{ |
Brad Fitzpatrick | 914bad5 | 2014-11-30 21:05:26 -0800 | [diff] [blame] | 1732 | conn: sc, |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1733 | stream: rp.stream, |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1734 | needsContinue: needsContinue, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1735 | } |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1736 | var url_ *url.URL |
| 1737 | var requestURI string |
| 1738 | if isConnect { |
| 1739 | url_ = &url.URL{Host: rp.authority} |
| 1740 | requestURI = rp.authority // mimic HTTP/1 server behavior |
| 1741 | } else { |
| 1742 | var err error |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1743 | url_, err = url.ParseRequestURI(rp.path) |
| 1744 | if err != nil { |
| 1745 | return nil, nil, StreamError{rp.stream.id, ErrCodeProtocol} |
| 1746 | } |
| 1747 | requestURI = rp.path |
Brad Fitzpatrick | ff0471b | 2014-11-14 21:55:14 -0800 | [diff] [blame] | 1748 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1749 | req := &http.Request{ |
| 1750 | Method: rp.method, |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1751 | URL: url_, |
Brad Fitzpatrick | df959c2 | 2014-12-09 07:20:20 +1100 | [diff] [blame] | 1752 | RemoteAddr: sc.remoteAddrStr, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1753 | Header: rp.header, |
Brad Fitzpatrick | 961116a | 2016-01-05 14:53:21 -0800 | [diff] [blame] | 1754 | RequestURI: requestURI, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1755 | Proto: "HTTP/2.0", |
| 1756 | ProtoMajor: 2, |
| 1757 | ProtoMinor: 0, |
| 1758 | TLS: tlsState, |
| 1759 | Host: authority, |
| 1760 | Body: body, |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1761 | Trailer: trailer, |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1762 | } |
| 1763 | if bodyOpen { |
| 1764 | body.pipe = &pipe{ |
Brad Fitzpatrick | c24de9d | 2015-12-16 17:29:56 +0000 | [diff] [blame] | 1765 | b: &fixedBuffer{buf: make([]byte, initialWindowSize)}, // TODO: garbage |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1766 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1767 | |
| 1768 | if vv, ok := rp.header["Content-Length"]; ok { |
| 1769 | req.ContentLength, _ = strconv.ParseInt(vv[0], 10, 64) |
| 1770 | } else { |
| 1771 | req.ContentLength = -1 |
| 1772 | } |
| 1773 | } |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1774 | |
| 1775 | rws := responseWriterStatePool.Get().(*responseWriterState) |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1776 | bwSave := rws.bw |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1777 | *rws = responseWriterState{} // zero all the fields |
Brad Fitzpatrick | 914bad5 | 2014-11-30 21:05:26 -0800 | [diff] [blame] | 1778 | rws.conn = sc |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1779 | rws.bw = bwSave |
| 1780 | rws.bw.Reset(chunkWriter{rws}) |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1781 | rws.stream = rp.stream |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1782 | rws.req = req |
| 1783 | rws.body = body |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1784 | |
| 1785 | rw := &responseWriter{rws: rws} |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1786 | return rw, req, nil |
| 1787 | } |
| 1788 | |
| 1789 | // Run on its own goroutine. |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 1790 | func (sc *serverConn) runHandler(rw *responseWriter, req *http.Request, handler func(http.ResponseWriter, *http.Request)) { |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 1791 | didPanic := true |
| 1792 | defer func() { |
| 1793 | if didPanic { |
| 1794 | e := recover() |
| 1795 | // Same as net/http: |
| 1796 | const size = 64 << 10 |
| 1797 | buf := make([]byte, size) |
| 1798 | buf = buf[:runtime.Stack(buf, false)] |
| 1799 | sc.writeFrameFromHandler(frameWriteMsg{ |
| 1800 | write: handlerPanicRST{rw.rws.stream.id}, |
| 1801 | stream: rw.rws.stream, |
| 1802 | }) |
| 1803 | sc.logf("http2: panic serving %v: %v\n%s", sc.conn.RemoteAddr(), e, buf) |
| 1804 | return |
| 1805 | } |
| 1806 | rw.handlerDone() |
| 1807 | }() |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 1808 | handler(rw, req) |
Brad Fitzpatrick | 74bd44b | 2015-12-15 00:47:28 +0000 | [diff] [blame] | 1809 | didPanic = false |
Brad Fitzpatrick | d8f3c68 | 2015-10-12 20:56:49 +0000 | [diff] [blame] | 1810 | } |
| 1811 | |
| 1812 | func handleHeaderListTooLong(w http.ResponseWriter, r *http.Request) { |
| 1813 | // 10.5.1 Limits on Header Block Size: |
| 1814 | // .. "A server that receives a larger header block than it is |
| 1815 | // willing to handle can send an HTTP 431 (Request Header Fields Too |
| 1816 | // Large) status code" |
| 1817 | const statusRequestHeaderFieldsTooLarge = 431 // only in Go 1.6+ |
| 1818 | w.WriteHeader(statusRequestHeaderFieldsTooLarge) |
| 1819 | io.WriteString(w, "<h1>HTTP Error 431</h1><p>Request Header Field(s) Too Large</p>") |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1820 | } |
| 1821 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1822 | // called from handler goroutines. |
| 1823 | // h may be nil. |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1824 | func (sc *serverConn) writeHeaders(st *stream, headerData *writeResHeaders) error { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1825 | sc.serveG.checkNotOn() // NOT on |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1826 | var errc chan error |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1827 | if headerData.h != nil { |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1828 | // If there's a header map (which we don't own), so we have to block on |
| 1829 | // waiting for this frame to be written, so an http.Flush mid-handler |
| 1830 | // writes out the correct value of keys, before a handler later potentially |
| 1831 | // mutates it. |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 1832 | errc = errChanPool.Get().(chan error) |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1833 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1834 | if err := sc.writeFrameFromHandler(frameWriteMsg{ |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1835 | write: headerData, |
| 1836 | stream: st, |
| 1837 | done: errc, |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1838 | }); err != nil { |
| 1839 | return err |
| 1840 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1841 | if errc != nil { |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 1842 | select { |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1843 | case err := <-errc: |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 1844 | errChanPool.Put(errc) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1845 | return err |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 1846 | case <-sc.doneServing: |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1847 | return errClientDisconnected |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 1848 | case <-st.cw: |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1849 | return errStreamClosed |
Brad Fitzpatrick | 9b41faf | 2014-11-19 10:45:13 -0800 | [diff] [blame] | 1850 | } |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1851 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 1852 | return nil |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1853 | } |
| 1854 | |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1855 | // called from handler goroutines. |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1856 | func (sc *serverConn) write100ContinueHeaders(st *stream) { |
Brad Fitzpatrick | 4e3c922 | 2014-11-22 17:35:09 -0800 | [diff] [blame] | 1857 | sc.writeFrameFromHandler(frameWriteMsg{ |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 1858 | write: write100ContinueHeadersFrame{st.id}, |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1859 | stream: st, |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1860 | }) |
| 1861 | } |
| 1862 | |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1863 | // A bodyReadMsg tells the server loop that the http.Handler read n |
| 1864 | // bytes of the DATA from the client on the given stream. |
| 1865 | type bodyReadMsg struct { |
| 1866 | st *stream |
| 1867 | n int |
| 1868 | } |
| 1869 | |
| 1870 | // called from handler goroutines. |
| 1871 | // Notes that the handler for the given stream ID read n bytes of its body |
| 1872 | // and schedules flow control tokens to be sent. |
| 1873 | func (sc *serverConn) noteBodyReadFromHandler(st *stream, n int) { |
| 1874 | sc.serveG.checkNotOn() // NOT on |
Brad Fitzpatrick | 0a9f650 | 2015-10-27 14:23:57 -0700 | [diff] [blame] | 1875 | select { |
| 1876 | case sc.bodyReadCh <- bodyReadMsg{st, n}: |
| 1877 | case <-sc.doneServing: |
| 1878 | } |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1879 | } |
| 1880 | |
| 1881 | func (sc *serverConn) noteBodyRead(st *stream, n int) { |
| 1882 | sc.serveG.check() |
| 1883 | sc.sendWindowUpdate(nil, n) // conn-level |
Brad Fitzpatrick | 0f1a865 | 2014-12-07 20:49:33 -0800 | [diff] [blame] | 1884 | if st.state != stateHalfClosedRemote && st.state != stateClosed { |
| 1885 | // Don't send this WINDOW_UPDATE if the stream is closed |
| 1886 | // remotely. |
| 1887 | sc.sendWindowUpdate(st, n) |
| 1888 | } |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1889 | } |
| 1890 | |
| 1891 | // st may be nil for conn-level |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1892 | func (sc *serverConn) sendWindowUpdate(st *stream, n int) { |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1893 | sc.serveG.check() |
| 1894 | // "The legal range for the increment to the flow control |
| 1895 | // window is 1 to 2^31-1 (2,147,483,647) octets." |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 1896 | // A Go Read call on 64-bit machines could in theory read |
| 1897 | // a larger Read than this. Very unlikely, but we handle it here |
| 1898 | // rather than elsewhere for now. |
| 1899 | const maxUint31 = 1<<31 - 1 |
| 1900 | for n >= maxUint31 { |
| 1901 | sc.sendWindowUpdate32(st, maxUint31) |
| 1902 | n -= maxUint31 |
| 1903 | } |
| 1904 | sc.sendWindowUpdate32(st, int32(n)) |
| 1905 | } |
| 1906 | |
| 1907 | // st may be nil for conn-level |
| 1908 | func (sc *serverConn) sendWindowUpdate32(st *stream, n int32) { |
| 1909 | sc.serveG.check() |
| 1910 | if n == 0 { |
| 1911 | return |
| 1912 | } |
| 1913 | if n < 0 { |
| 1914 | panic("negative update") |
| 1915 | } |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1916 | var streamID uint32 |
| 1917 | if st != nil { |
| 1918 | streamID = st.id |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1919 | } |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 1920 | sc.writeFrame(frameWriteMsg{ |
| 1921 | write: writeWindowUpdate{streamID: streamID, n: uint32(n)}, |
| 1922 | stream: st, |
| 1923 | }) |
| 1924 | var ok bool |
| 1925 | if st == nil { |
| 1926 | ok = sc.inflow.add(n) |
| 1927 | } else { |
| 1928 | ok = st.inflow.add(n) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1929 | } |
Brad Fitzpatrick | 068d35d | 2014-12-09 07:10:31 +1100 | [diff] [blame] | 1930 | if !ok { |
| 1931 | panic("internal error; sent too many window updates without decrements?") |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1932 | } |
| 1933 | } |
| 1934 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1935 | type requestBody struct { |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1936 | stream *stream |
Brad Fitzpatrick | 914bad5 | 2014-11-30 21:05:26 -0800 | [diff] [blame] | 1937 | conn *serverConn |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1938 | closed bool |
| 1939 | pipe *pipe // non-nil if we have a HTTP entity message body |
| 1940 | needsContinue bool // need to send a 100-continue |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1941 | } |
| 1942 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1943 | func (b *requestBody) Close() error { |
| 1944 | if b.pipe != nil { |
Brad Fitzpatrick | b7f5d98 | 2015-10-26 13:59:20 -0500 | [diff] [blame] | 1945 | b.pipe.CloseWithError(errClosedBody) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1946 | } |
| 1947 | b.closed = true |
| 1948 | return nil |
| 1949 | } |
| 1950 | |
| 1951 | func (b *requestBody) Read(p []byte) (n int, err error) { |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1952 | if b.needsContinue { |
| 1953 | b.needsContinue = false |
Brad Fitzpatrick | 914bad5 | 2014-11-30 21:05:26 -0800 | [diff] [blame] | 1954 | b.conn.write100ContinueHeaders(b.stream) |
Brad Fitzpatrick | 9d63ade | 2014-11-15 12:02:43 -0800 | [diff] [blame] | 1955 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1956 | if b.pipe == nil { |
| 1957 | return 0, io.EOF |
| 1958 | } |
| 1959 | n, err = b.pipe.Read(p) |
| 1960 | if n > 0 { |
Brad Fitzpatrick | c8bab6a | 2014-12-07 18:51:56 -0800 | [diff] [blame] | 1961 | b.conn.noteBodyReadFromHandler(b.stream, n) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1962 | } |
| 1963 | return |
| 1964 | } |
| 1965 | |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1966 | // responseWriter is the http.ResponseWriter implementation. It's |
| 1967 | // intentionally small (1 pointer wide) to minimize garbage. The |
| 1968 | // responseWriterState pointer inside is zeroed at the end of a |
| 1969 | // request (in handlerDone) and calls on the responseWriter thereafter |
| 1970 | // simply crash (caller's mistake), but the much larger responseWriterState |
| 1971 | // and buffers are reused between multiple requests. |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1972 | type responseWriter struct { |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1973 | rws *responseWriterState |
| 1974 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 1975 | |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1976 | // Optional http.ResponseWriter interfaces implemented. |
| 1977 | var ( |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1978 | _ http.CloseNotifier = (*responseWriter)(nil) |
| 1979 | _ http.Flusher = (*responseWriter)(nil) |
| 1980 | _ stringWriter = (*responseWriter)(nil) |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1981 | ) |
| 1982 | |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1983 | type responseWriterState struct { |
| 1984 | // immutable within a request: |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 1985 | stream *stream |
| 1986 | req *http.Request |
| 1987 | body *requestBody // to close at end of request, if DATA frames didn't |
Brad Fitzpatrick | 914bad5 | 2014-11-30 21:05:26 -0800 | [diff] [blame] | 1988 | conn *serverConn |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1989 | |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1990 | // TODO: adjust buffer writing sizes based on server config, frame size updates from peer, etc |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1991 | bw *bufio.Writer // writing to a chunkWriter{this *responseWriterState} |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 1992 | |
| 1993 | // mutated by http.Handler goroutine: |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1994 | handlerHeader http.Header // nil until called |
| 1995 | snapHeader http.Header // snapshot of handlerHeader at WriteHeader time |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 1996 | trailers []string // set in writeChunk |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 1997 | status int // status code passed to WriteHeader |
Brad Fitzpatrick | 3c8c613 | 2014-11-20 18:34:52 -0800 | [diff] [blame] | 1998 | wroteHeader bool // WriteHeader called (explicitly or implicitly). Not necessarily sent to user yet. |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 1999 | sentHeader bool // have we sent the header frame? |
| 2000 | handlerDone bool // handler has finished |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 2001 | |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2002 | sentContentLen int64 // non-zero if handler set a Content-Length header |
| 2003 | wroteBytes int64 |
| 2004 | |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 2005 | closeNotifierMu sync.Mutex // guards closeNotifierCh |
| 2006 | closeNotifierCh chan bool // nil until first used |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2007 | } |
| 2008 | |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2009 | type chunkWriter struct{ rws *responseWriterState } |
| 2010 | |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2011 | func (cw chunkWriter) Write(p []byte) (n int, err error) { return cw.rws.writeChunk(p) } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2012 | |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2013 | func (rws *responseWriterState) hasTrailers() bool { return len(rws.trailers) != 0 } |
| 2014 | |
| 2015 | // declareTrailer is called for each Trailer header when the |
| 2016 | // response header is written. It notes that a header will need to be |
| 2017 | // written in the trailers at the end of the response. |
| 2018 | func (rws *responseWriterState) declareTrailer(k string) { |
| 2019 | k = http.CanonicalHeaderKey(k) |
| 2020 | switch k { |
| 2021 | case "Transfer-Encoding", "Content-Length", "Trailer": |
| 2022 | // Forbidden by RFC 2616 14.40. |
| 2023 | return |
| 2024 | } |
Brad Fitzpatrick | d513e58 | 2016-01-31 06:24:40 +0000 | [diff] [blame] | 2025 | if !strSliceContains(rws.trailers, k) { |
| 2026 | rws.trailers = append(rws.trailers, k) |
| 2027 | } |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2028 | } |
| 2029 | |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2030 | // writeChunk writes chunks from the bufio.Writer. But because |
| 2031 | // bufio.Writer may bypass its chunking, sometimes p may be |
| 2032 | // arbitrarily large. |
| 2033 | // |
| 2034 | // writeChunk is also responsible (on the first chunk) for sending the |
| 2035 | // HEADER response. |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2036 | func (rws *responseWriterState) writeChunk(p []byte) (n int, err error) { |
| 2037 | if !rws.wroteHeader { |
| 2038 | rws.writeHeader(200) |
| 2039 | } |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2040 | |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2041 | isHeadResp := rws.req.Method == "HEAD" |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2042 | if !rws.sentHeader { |
| 2043 | rws.sentHeader = true |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2044 | var ctype, clen string |
| 2045 | if clen = rws.snapHeader.Get("Content-Length"); clen != "" { |
| 2046 | rws.snapHeader.Del("Content-Length") |
| 2047 | clen64, err := strconv.ParseInt(clen, 10, 64) |
| 2048 | if err == nil && clen64 >= 0 { |
| 2049 | rws.sentContentLen = clen64 |
| 2050 | } else { |
| 2051 | clen = "" |
| 2052 | } |
| 2053 | } |
Brad Fitzpatrick | 1796f9b | 2015-12-08 22:22:07 +0000 | [diff] [blame] | 2054 | if clen == "" && rws.handlerDone && bodyAllowedForStatus(rws.status) && (len(p) > 0 || !isHeadResp) { |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2055 | clen = strconv.Itoa(len(p)) |
| 2056 | } |
Brad Fitzpatrick | 1796f9b | 2015-12-08 22:22:07 +0000 | [diff] [blame] | 2057 | _, hasContentType := rws.snapHeader["Content-Type"] |
| 2058 | if !hasContentType && bodyAllowedForStatus(rws.status) { |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2059 | ctype = http.DetectContentType(p) |
| 2060 | } |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2061 | var date string |
| 2062 | if _, ok := rws.snapHeader["Date"]; !ok { |
| 2063 | // TODO(bradfitz): be faster here, like net/http? measure. |
| 2064 | date = time.Now().UTC().Format(http.TimeFormat) |
| 2065 | } |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2066 | |
| 2067 | for _, v := range rws.snapHeader["Trailer"] { |
| 2068 | foreachHeaderElement(v, rws.declareTrailer) |
| 2069 | } |
| 2070 | |
| 2071 | endStream := (rws.handlerDone && !rws.hasTrailers() && len(p) == 0) || isHeadResp |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 2072 | err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{ |
Brad Fitzpatrick | f16a0b3 | 2014-11-28 13:49:30 -0800 | [diff] [blame] | 2073 | streamID: rws.stream.id, |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2074 | httpResCode: rws.status, |
| 2075 | h: rws.snapHeader, |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2076 | endStream: endStream, |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2077 | contentType: ctype, |
| 2078 | contentLength: clen, |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2079 | date: date, |
Brad Fitzpatrick | c94bffa | 2015-10-13 18:18:12 +0000 | [diff] [blame] | 2080 | }) |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 2081 | if err != nil { |
| 2082 | return 0, err |
| 2083 | } |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2084 | if endStream { |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 2085 | return 0, nil |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2086 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2087 | } |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2088 | if isHeadResp { |
| 2089 | return len(p), nil |
| 2090 | } |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 2091 | if len(p) == 0 && !rws.handlerDone { |
| 2092 | return 0, nil |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2093 | } |
Brad Fitzpatrick | 5640105 | 2015-10-20 22:27:39 +0000 | [diff] [blame] | 2094 | |
Brad Fitzpatrick | d513e58 | 2016-01-31 06:24:40 +0000 | [diff] [blame] | 2095 | if rws.handlerDone { |
| 2096 | rws.promoteUndeclaredTrailers() |
| 2097 | } |
| 2098 | |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2099 | endStream := rws.handlerDone && !rws.hasTrailers() |
| 2100 | if len(p) > 0 || endStream { |
| 2101 | // only send a 0 byte DATA frame if we're ending the stream. |
| 2102 | if err := rws.conn.writeDataFromHandler(rws.stream, p, endStream); err != nil { |
| 2103 | return 0, err |
| 2104 | } |
| 2105 | } |
| 2106 | |
| 2107 | if rws.handlerDone && rws.hasTrailers() { |
| 2108 | err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{ |
| 2109 | streamID: rws.stream.id, |
| 2110 | h: rws.handlerHeader, |
| 2111 | trailers: rws.trailers, |
| 2112 | endStream: true, |
| 2113 | }) |
| 2114 | return len(p), err |
Brad Fitzpatrick | 3d7a3ad | 2014-11-15 21:38:23 -0800 | [diff] [blame] | 2115 | } |
Brad Fitzpatrick | 2b45947 | 2014-11-30 19:18:57 -0800 | [diff] [blame] | 2116 | return len(p), nil |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2117 | } |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2118 | |
Brad Fitzpatrick | d513e58 | 2016-01-31 06:24:40 +0000 | [diff] [blame] | 2119 | // TrailerPrefix is a magic prefix for ResponseWriter.Header map keys |
| 2120 | // that, if present, signals that the map entry is actually for |
| 2121 | // the response trailers, and not the response headers. The prefix |
| 2122 | // is stripped after the ServeHTTP call finishes and the values are |
| 2123 | // sent in the trailers. |
| 2124 | // |
| 2125 | // This mechanism is intended only for trailers that are not known |
| 2126 | // prior to the headers being written. If the set of trailers is fixed |
| 2127 | // or known before the header is written, the normal Go trailers mechanism |
| 2128 | // is preferred: |
| 2129 | // https://golang.org/pkg/net/http/#ResponseWriter |
| 2130 | // https://golang.org/pkg/net/http/#example_ResponseWriter_trailers |
| 2131 | const TrailerPrefix = "Trailer:" |
| 2132 | |
| 2133 | // promoteUndeclaredTrailers permits http.Handlers to set trailers |
| 2134 | // after the header has already been flushed. Because the Go |
| 2135 | // ResponseWriter interface has no way to set Trailers (only the |
| 2136 | // Header), and because we didn't want to expand the ResponseWriter |
| 2137 | // interface, and because nobody used trailers, and because RFC 2616 |
| 2138 | // says you SHOULD (but not must) predeclare any trailers in the |
| 2139 | // header, the official ResponseWriter rules said trailers in Go must |
| 2140 | // be predeclared, and then we reuse the same ResponseWriter.Header() |
| 2141 | // map to mean both Headers and Trailers. When it's time to write the |
| 2142 | // Trailers, we pick out the fields of Headers that were declared as |
| 2143 | // trailers. That worked for a while, until we found the first major |
| 2144 | // user of Trailers in the wild: gRPC (using them only over http2), |
| 2145 | // and gRPC libraries permit setting trailers mid-stream without |
| 2146 | // predeclarnig them. So: change of plans. We still permit the old |
| 2147 | // way, but we also permit this hack: if a Header() key begins with |
| 2148 | // "Trailer:", the suffix of that key is a Trailer. Because ':' is an |
| 2149 | // invalid token byte anyway, there is no ambiguity. (And it's already |
| 2150 | // filtered out) It's mildly hacky, but not terrible. |
| 2151 | // |
| 2152 | // This method runs after the Handler is done and promotes any Header |
| 2153 | // fields to be trailers. |
| 2154 | func (rws *responseWriterState) promoteUndeclaredTrailers() { |
| 2155 | for k, vv := range rws.handlerHeader { |
| 2156 | if !strings.HasPrefix(k, TrailerPrefix) { |
| 2157 | continue |
| 2158 | } |
| 2159 | trailerKey := strings.TrimPrefix(k, TrailerPrefix) |
| 2160 | rws.declareTrailer(trailerKey) |
| 2161 | rws.handlerHeader[http.CanonicalHeaderKey(trailerKey)] = vv |
| 2162 | } |
| 2163 | sort.Strings(rws.trailers) |
| 2164 | } |
| 2165 | |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2166 | func (w *responseWriter) Flush() { |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2167 | rws := w.rws |
| 2168 | if rws == nil { |
| 2169 | panic("Header called after Handler finished") |
| 2170 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2171 | if rws.bw.Buffered() > 0 { |
| 2172 | if err := rws.bw.Flush(); err != nil { |
| 2173 | // Ignore the error. The frame writer already knows. |
| 2174 | return |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2175 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2176 | } else { |
| 2177 | // The bufio.Writer won't call chunkWriter.Write |
| 2178 | // (writeChunk with zero bytes, so we have to do it |
| 2179 | // ourselves to force the HTTP response header and/or |
| 2180 | // final DATA frame (with END_STREAM) to be sent. |
| 2181 | rws.writeChunk(nil) |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2182 | } |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2183 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2184 | |
Brad Fitzpatrick | bd39196 | 2014-11-17 18:58:58 -0800 | [diff] [blame] | 2185 | func (w *responseWriter) CloseNotify() <-chan bool { |
| 2186 | rws := w.rws |
| 2187 | if rws == nil { |
| 2188 | panic("CloseNotify called after Handler finished") |
| 2189 | } |
| 2190 | rws.closeNotifierMu.Lock() |
| 2191 | ch := rws.closeNotifierCh |
| 2192 | if ch == nil { |
| 2193 | ch = make(chan bool, 1) |
| 2194 | rws.closeNotifierCh = ch |
| 2195 | go func() { |
| 2196 | rws.stream.cw.Wait() // wait for close |
| 2197 | ch <- true |
| 2198 | }() |
| 2199 | } |
| 2200 | rws.closeNotifierMu.Unlock() |
| 2201 | return ch |
| 2202 | } |
| 2203 | |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2204 | func (w *responseWriter) Header() http.Header { |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2205 | rws := w.rws |
| 2206 | if rws == nil { |
| 2207 | panic("Header called after Handler finished") |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2208 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2209 | if rws.handlerHeader == nil { |
| 2210 | rws.handlerHeader = make(http.Header) |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2211 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2212 | return rws.handlerHeader |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2213 | } |
| 2214 | |
| 2215 | func (w *responseWriter) WriteHeader(code int) { |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2216 | rws := w.rws |
| 2217 | if rws == nil { |
| 2218 | panic("WriteHeader called after Handler finished") |
| 2219 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2220 | rws.writeHeader(code) |
| 2221 | } |
| 2222 | |
| 2223 | func (rws *responseWriterState) writeHeader(code int) { |
| 2224 | if !rws.wroteHeader { |
| 2225 | rws.wroteHeader = true |
| 2226 | rws.status = code |
| 2227 | if len(rws.handlerHeader) > 0 { |
| 2228 | rws.snapHeader = cloneHeader(rws.handlerHeader) |
| 2229 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2230 | } |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2231 | } |
| 2232 | |
| 2233 | func cloneHeader(h http.Header) http.Header { |
| 2234 | h2 := make(http.Header, len(h)) |
| 2235 | for k, vv := range h { |
| 2236 | vv2 := make([]string, len(vv)) |
| 2237 | copy(vv2, vv) |
| 2238 | h2[k] = vv2 |
| 2239 | } |
| 2240 | return h2 |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2241 | } |
| 2242 | |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2243 | // The Life Of A Write is like this: |
| 2244 | // |
Brad Fitzpatrick | ed26b48 | 2014-11-26 09:16:43 -0800 | [diff] [blame] | 2245 | // * Handler calls w.Write or w.WriteString -> |
| 2246 | // * -> rws.bw (*bufio.Writer) -> |
| 2247 | // * (Handler migth call Flush) |
| 2248 | // * -> chunkWriter{rws} |
| 2249 | // * -> responseWriterState.writeChunk(p []byte) |
| 2250 | // * -> responseWriterState.writeChunk (most of the magic; see comment there) |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2251 | func (w *responseWriter) Write(p []byte) (n int, err error) { |
| 2252 | return w.write(len(p), p, "") |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2253 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2254 | |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2255 | func (w *responseWriter) WriteString(s string) (n int, err error) { |
| 2256 | return w.write(len(s), nil, s) |
| 2257 | } |
| 2258 | |
| 2259 | // either dataB or dataS is non-zero. |
| 2260 | func (w *responseWriter) write(lenData int, dataB []byte, dataS string) (n int, err error) { |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2261 | rws := w.rws |
| 2262 | if rws == nil { |
| 2263 | panic("Write called after Handler finished") |
| 2264 | } |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2265 | if !rws.wroteHeader { |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2266 | w.WriteHeader(200) |
| 2267 | } |
Brad Fitzpatrick | c745c36 | 2015-11-24 17:14:16 -0800 | [diff] [blame] | 2268 | if !bodyAllowedForStatus(rws.status) { |
| 2269 | return 0, http.ErrBodyNotAllowed |
| 2270 | } |
| 2271 | rws.wroteBytes += int64(len(dataB)) + int64(len(dataS)) // only one can be set |
| 2272 | if rws.sentContentLen != 0 && rws.wroteBytes > rws.sentContentLen { |
| 2273 | // TODO: send a RST_STREAM |
| 2274 | return 0, errors.New("http2: handler wrote more than declared Content-Length") |
| 2275 | } |
| 2276 | |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2277 | if dataB != nil { |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2278 | return rws.bw.Write(dataB) |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2279 | } else { |
Brad Fitzpatrick | 390047e | 2014-11-14 20:37:08 -0800 | [diff] [blame] | 2280 | return rws.bw.WriteString(dataS) |
Brad Fitzpatrick | 15a4bf3 | 2014-11-14 10:56:12 -0800 | [diff] [blame] | 2281 | } |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2282 | } |
| 2283 | |
| 2284 | func (w *responseWriter) handlerDone() { |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2285 | rws := w.rws |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2286 | rws.handlerDone = true |
| 2287 | w.Flush() |
Brad Fitzpatrick | 729bd72 | 2014-11-13 14:09:36 -0800 | [diff] [blame] | 2288 | w.rws = nil |
Brad Fitzpatrick | 520123b | 2014-11-14 15:57:37 -0800 | [diff] [blame] | 2289 | responseWriterStatePool.Put(rws) |
Brad Fitzpatrick | b331b81 | 2014-11-13 11:51:54 -0800 | [diff] [blame] | 2290 | } |
Blake Mizerany | b4be494 | 2015-12-15 17:33:14 -0800 | [diff] [blame] | 2291 | |
| 2292 | // foreachHeaderElement splits v according to the "#rule" construction |
| 2293 | // in RFC 2616 section 2.1 and calls fn for each non-empty element. |
| 2294 | func foreachHeaderElement(v string, fn func(string)) { |
| 2295 | v = textproto.TrimString(v) |
| 2296 | if v == "" { |
| 2297 | return |
| 2298 | } |
| 2299 | if !strings.Contains(v, ",") { |
| 2300 | fn(v) |
| 2301 | return |
| 2302 | } |
| 2303 | for _, f := range strings.Split(v, ",") { |
| 2304 | if f = textproto.TrimString(f); f != "" { |
| 2305 | fn(f) |
| 2306 | } |
| 2307 | } |
| 2308 | } |