|  |  | // Copyright 2014 The Go Authors. All rights reserved.
 | 
						
						
						
							|  |  | // Use of this source code is governed by a BSD-style
 | 
						
						
						
							|  |  | // license that can be found in the LICENSE file.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // TODO: turn off the serve goroutine when idle, so
 | 
						
						
						
							|  |  | // an idle conn only has the readFrames goroutine active. (which could
 | 
						
						
						
							|  |  | // also be optimized probably to pin less memory in crypto/tls). This
 | 
						
						
						
							|  |  | // would involve tracking when the serve goroutine is active (atomic
 | 
						
						
						
							|  |  | // int32 read/CAS probably?) and starting it up when frames arrive,
 | 
						
						
						
							|  |  | // and shutting it down when all handlers exit. the occasional PING
 | 
						
						
						
							|  |  | // packets could use time.AfterFunc to call sc.wakeStartServeLoop()
 | 
						
						
						
							|  |  | // (which is a no-op if already running) and then queue the PING write
 | 
						
						
						
							|  |  | // as normal. The serve loop would then exit in most cases (if no
 | 
						
						
						
							|  |  | // Handlers running) and not be woken up again until the PING packet
 | 
						
						
						
							|  |  | // returns.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // TODO (maybe): add a mechanism for Handlers to going into
 | 
						
						
						
							|  |  | // half-closed-local mode (rw.(io.Closer) test?) but not exit their
 | 
						
						
						
							|  |  | // handler, and continue to be able to read from the
 | 
						
						
						
							|  |  | // Request.Body. This would be a somewhat semantic change from HTTP/1
 | 
						
						
						
							|  |  | // (or at least what we expose in net/http), so I'd probably want to
 | 
						
						
						
							|  |  | // add it there too. For now, this package says that returning from
 | 
						
						
						
							|  |  | // the Handler ServeHTTP function means you're both done reading and
 | 
						
						
						
							|  |  | // done writing, without a way to stop just one or the other.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | package http2
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | import (
 | 
						
						
						
							|  |  | 	"bufio"
 | 
						
						
						
							|  |  | 	"bytes"
 | 
						
						
						
							|  |  | 	"context"
 | 
						
						
						
							|  |  | 	"crypto/tls"
 | 
						
						
						
							|  |  | 	"errors"
 | 
						
						
						
							|  |  | 	"fmt"
 | 
						
						
						
							|  |  | 	"io"
 | 
						
						
						
							|  |  | 	"log"
 | 
						
						
						
							|  |  | 	"math"
 | 
						
						
						
							|  |  | 	"net"
 | 
						
						
						
							|  |  | 	"net/http"
 | 
						
						
						
							|  |  | 	"net/textproto"
 | 
						
						
						
							|  |  | 	"net/url"
 | 
						
						
						
							|  |  | 	"os"
 | 
						
						
						
							|  |  | 	"reflect"
 | 
						
						
						
							|  |  | 	"runtime"
 | 
						
						
						
							|  |  | 	"strconv"
 | 
						
						
						
							|  |  | 	"strings"
 | 
						
						
						
							|  |  | 	"sync"
 | 
						
						
						
							|  |  | 	"time"
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	"golang.org/x/net/http/httpguts"
 | 
						
						
						
							|  |  | 	"golang.org/x/net/http2/hpack"
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | const (
 | 
						
						
						
							|  |  | 	prefaceTimeout         = 10 * time.Second
 | 
						
						
						
							|  |  | 	firstSettingsTimeout   = 2 * time.Second // should be in-flight with preface anyway
 | 
						
						
						
							|  |  | 	handlerChunkWriteSize  = 4 << 10
 | 
						
						
						
							|  |  | 	defaultMaxStreams      = 250 // TODO: make this 100 as the GFE seems to?
 | 
						
						
						
							|  |  | 	maxQueuedControlFrames = 10000
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var (
 | 
						
						
						
							|  |  | 	errClientDisconnected = errors.New("client disconnected")
 | 
						
						
						
							|  |  | 	errClosedBody         = errors.New("body closed by handler")
 | 
						
						
						
							|  |  | 	errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
 | 
						
						
						
							|  |  | 	errStreamClosed       = errors.New("http2: stream closed")
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var responseWriterStatePool = sync.Pool{
 | 
						
						
						
							|  |  | 	New: func() interface{} {
 | 
						
						
						
							|  |  | 		rws := &responseWriterState{}
 | 
						
						
						
							|  |  | 		rws.bw = bufio.NewWriterSize(chunkWriter{rws}, handlerChunkWriteSize)
 | 
						
						
						
							|  |  | 		return rws
 | 
						
						
						
							|  |  | 	},
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Test hooks.
 | 
						
						
						
							|  |  | var (
 | 
						
						
						
							|  |  | 	testHookOnConn        func()
 | 
						
						
						
							|  |  | 	testHookGetServerConn func(*serverConn)
 | 
						
						
						
							|  |  | 	testHookOnPanicMu     *sync.Mutex // nil except in tests
 | 
						
						
						
							|  |  | 	testHookOnPanic       func(sc *serverConn, panicVal interface{}) (rePanic bool)
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Server is an HTTP/2 server.
 | 
						
						
						
							|  |  | type Server struct {
 | 
						
						
						
							|  |  | 	// MaxHandlers limits the number of http.Handler ServeHTTP goroutines
 | 
						
						
						
							|  |  | 	// which may run at a time over all connections.
 | 
						
						
						
							|  |  | 	// Negative or zero no limit.
 | 
						
						
						
							|  |  | 	// TODO: implement
 | 
						
						
						
							|  |  | 	MaxHandlers int
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxConcurrentStreams optionally specifies the number of
 | 
						
						
						
							|  |  | 	// concurrent streams that each client may have open at a
 | 
						
						
						
							|  |  | 	// time. This is unrelated to the number of http.Handler goroutines
 | 
						
						
						
							|  |  | 	// which may be active globally, which is MaxHandlers.
 | 
						
						
						
							|  |  | 	// If zero, MaxConcurrentStreams defaults to at least 100, per
 | 
						
						
						
							|  |  | 	// the HTTP/2 spec's recommendations.
 | 
						
						
						
							|  |  | 	MaxConcurrentStreams uint32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxDecoderHeaderTableSize optionally specifies the http2
 | 
						
						
						
							|  |  | 	// SETTINGS_HEADER_TABLE_SIZE to send in the initial settings frame. It
 | 
						
						
						
							|  |  | 	// informs the remote endpoint of the maximum size of the header compression
 | 
						
						
						
							|  |  | 	// table used to decode header blocks, in octets. If zero, the default value
 | 
						
						
						
							|  |  | 	// of 4096 is used.
 | 
						
						
						
							|  |  | 	MaxDecoderHeaderTableSize uint32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxEncoderHeaderTableSize optionally specifies an upper limit for the
 | 
						
						
						
							|  |  | 	// header compression table used for encoding request headers. Received
 | 
						
						
						
							|  |  | 	// SETTINGS_HEADER_TABLE_SIZE settings are capped at this limit. If zero,
 | 
						
						
						
							|  |  | 	// the default value of 4096 is used.
 | 
						
						
						
							|  |  | 	MaxEncoderHeaderTableSize uint32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxReadFrameSize optionally specifies the largest frame
 | 
						
						
						
							|  |  | 	// this server is willing to read. A valid value is between
 | 
						
						
						
							|  |  | 	// 16k and 16M, inclusive. If zero or otherwise invalid, a
 | 
						
						
						
							|  |  | 	// default value is used.
 | 
						
						
						
							|  |  | 	MaxReadFrameSize uint32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// PermitProhibitedCipherSuites, if true, permits the use of
 | 
						
						
						
							|  |  | 	// cipher suites prohibited by the HTTP/2 spec.
 | 
						
						
						
							|  |  | 	PermitProhibitedCipherSuites bool
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// IdleTimeout specifies how long until idle clients should be
 | 
						
						
						
							|  |  | 	// closed with a GOAWAY frame. PING frames are not considered
 | 
						
						
						
							|  |  | 	// activity for the purposes of IdleTimeout.
 | 
						
						
						
							|  |  | 	IdleTimeout time.Duration
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxUploadBufferPerConnection is the size of the initial flow
 | 
						
						
						
							|  |  | 	// control window for each connections. The HTTP/2 spec does not
 | 
						
						
						
							|  |  | 	// allow this to be smaller than 65535 or larger than 2^32-1.
 | 
						
						
						
							|  |  | 	// If the value is outside this range, a default value will be
 | 
						
						
						
							|  |  | 	// used instead.
 | 
						
						
						
							|  |  | 	MaxUploadBufferPerConnection int32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// MaxUploadBufferPerStream is the size of the initial flow control
 | 
						
						
						
							|  |  | 	// window for each stream. The HTTP/2 spec does not allow this to
 | 
						
						
						
							|  |  | 	// be larger than 2^32-1. If the value is zero or larger than the
 | 
						
						
						
							|  |  | 	// maximum, a default value will be used instead.
 | 
						
						
						
							|  |  | 	MaxUploadBufferPerStream int32
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// NewWriteScheduler constructs a write scheduler for a connection.
 | 
						
						
						
							|  |  | 	// If nil, a default scheduler is chosen.
 | 
						
						
						
							|  |  | 	NewWriteScheduler func() WriteScheduler
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// CountError, if non-nil, is called on HTTP/2 server errors.
 | 
						
						
						
							|  |  | 	// It's intended to increment a metric for monitoring, such
 | 
						
						
						
							|  |  | 	// as an expvar or Prometheus metric.
 | 
						
						
						
							|  |  | 	// The errType consists of only ASCII word characters.
 | 
						
						
						
							|  |  | 	CountError func(errType string)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Internal state. This is a pointer (rather than embedded directly)
 | 
						
						
						
							|  |  | 	// so that we don't embed a Mutex in this struct, which will make the
 | 
						
						
						
							|  |  | 	// struct non-copyable, which might break some callers.
 | 
						
						
						
							|  |  | 	state *serverInternalState
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) initialConnRecvWindowSize() int32 {
 | 
						
						
						
							|  |  | 	if s.MaxUploadBufferPerConnection >= initialWindowSize {
 | 
						
						
						
							|  |  | 		return s.MaxUploadBufferPerConnection
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return 1 << 20
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) initialStreamRecvWindowSize() int32 {
 | 
						
						
						
							|  |  | 	if s.MaxUploadBufferPerStream > 0 {
 | 
						
						
						
							|  |  | 		return s.MaxUploadBufferPerStream
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return 1 << 20
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) maxReadFrameSize() uint32 {
 | 
						
						
						
							|  |  | 	if v := s.MaxReadFrameSize; v >= minMaxFrameSize && v <= maxFrameSize {
 | 
						
						
						
							|  |  | 		return v
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return defaultMaxReadFrameSize
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) maxConcurrentStreams() uint32 {
 | 
						
						
						
							|  |  | 	if v := s.MaxConcurrentStreams; v > 0 {
 | 
						
						
						
							|  |  | 		return v
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return defaultMaxStreams
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) maxDecoderHeaderTableSize() uint32 {
 | 
						
						
						
							|  |  | 	if v := s.MaxDecoderHeaderTableSize; v > 0 {
 | 
						
						
						
							|  |  | 		return v
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return initialHeaderTableSize
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *Server) maxEncoderHeaderTableSize() uint32 {
 | 
						
						
						
							|  |  | 	if v := s.MaxEncoderHeaderTableSize; v > 0 {
 | 
						
						
						
							|  |  | 		return v
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return initialHeaderTableSize
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // maxQueuedControlFrames is the maximum number of control frames like
 | 
						
						
						
							|  |  | // SETTINGS, PING and RST_STREAM that will be queued for writing before
 | 
						
						
						
							|  |  | // the connection is closed to prevent memory exhaustion attacks.
 | 
						
						
						
							|  |  | func (s *Server) maxQueuedControlFrames() int {
 | 
						
						
						
							|  |  | 	// TODO: if anybody asks, add a Server field, and remember to define the
 | 
						
						
						
							|  |  | 	// behavior of negative values.
 | 
						
						
						
							|  |  | 	return maxQueuedControlFrames
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type serverInternalState struct {
 | 
						
						
						
							|  |  | 	mu          sync.Mutex
 | 
						
						
						
							|  |  | 	activeConns map[*serverConn]struct{}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *serverInternalState) registerConn(sc *serverConn) {
 | 
						
						
						
							|  |  | 	if s == nil {
 | 
						
						
						
							|  |  | 		return // if the Server was used without calling ConfigureServer
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.mu.Lock()
 | 
						
						
						
							|  |  | 	s.activeConns[sc] = struct{}{}
 | 
						
						
						
							|  |  | 	s.mu.Unlock()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *serverInternalState) unregisterConn(sc *serverConn) {
 | 
						
						
						
							|  |  | 	if s == nil {
 | 
						
						
						
							|  |  | 		return // if the Server was used without calling ConfigureServer
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.mu.Lock()
 | 
						
						
						
							|  |  | 	delete(s.activeConns, sc)
 | 
						
						
						
							|  |  | 	s.mu.Unlock()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (s *serverInternalState) startGracefulShutdown() {
 | 
						
						
						
							|  |  | 	if s == nil {
 | 
						
						
						
							|  |  | 		return // if the Server was used without calling ConfigureServer
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.mu.Lock()
 | 
						
						
						
							|  |  | 	for sc := range s.activeConns {
 | 
						
						
						
							|  |  | 		sc.startGracefulShutdown()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.mu.Unlock()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // ConfigureServer adds HTTP/2 support to a net/http Server.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // The configuration conf may be nil.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // ConfigureServer must be called before s begins serving.
 | 
						
						
						
							|  |  | func ConfigureServer(s *http.Server, conf *Server) error {
 | 
						
						
						
							|  |  | 	if s == nil {
 | 
						
						
						
							|  |  | 		panic("nil *http.Server")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if conf == nil {
 | 
						
						
						
							|  |  | 		conf = new(Server)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	conf.state = &serverInternalState{activeConns: make(map[*serverConn]struct{})}
 | 
						
						
						
							|  |  | 	if h1, h2 := s, conf; h2.IdleTimeout == 0 {
 | 
						
						
						
							|  |  | 		if h1.IdleTimeout != 0 {
 | 
						
						
						
							|  |  | 			h2.IdleTimeout = h1.IdleTimeout
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			h2.IdleTimeout = h1.ReadTimeout
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.RegisterOnShutdown(conf.state.startGracefulShutdown)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if s.TLSConfig == nil {
 | 
						
						
						
							|  |  | 		s.TLSConfig = new(tls.Config)
 | 
						
						
						
							|  |  | 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
 | 
						
						
						
							|  |  | 		// If they already provided a TLS 1.0–1.2 CipherSuite list, return an
 | 
						
						
						
							|  |  | 		// error if it is missing ECDHE_RSA_WITH_AES_128_GCM_SHA256 or
 | 
						
						
						
							|  |  | 		// ECDHE_ECDSA_WITH_AES_128_GCM_SHA256.
 | 
						
						
						
							|  |  | 		haveRequired := false
 | 
						
						
						
							|  |  | 		for _, cs := range s.TLSConfig.CipherSuites {
 | 
						
						
						
							|  |  | 			switch cs {
 | 
						
						
						
							|  |  | 			case tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
 | 
						
						
						
							|  |  | 				// Alternative MTI cipher to not discourage ECDSA-only servers.
 | 
						
						
						
							|  |  | 				// See http://golang.org/cl/30721 for further information.
 | 
						
						
						
							|  |  | 				tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
 | 
						
						
						
							|  |  | 				haveRequired = true
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if !haveRequired {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("http2: TLSConfig.CipherSuites is missing an HTTP/2-required AES_128_GCM_SHA256 cipher (need at least one of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 or TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256)")
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Note: not setting MinVersion to tls.VersionTLS12,
 | 
						
						
						
							|  |  | 	// as we don't want to interfere with HTTP/1.1 traffic
 | 
						
						
						
							|  |  | 	// on the user's server. We enforce TLS 1.2 later once
 | 
						
						
						
							|  |  | 	// we accept a connection. Ideally this should be done
 | 
						
						
						
							|  |  | 	// during next-proto selection, but using TLS <1.2 with
 | 
						
						
						
							|  |  | 	// HTTP/2 is still the client's bug.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	s.TLSConfig.PreferServerCipherSuites = true
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
 | 
						
						
						
							|  |  | 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
 | 
						
						
						
							|  |  | 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if s.TLSNextProto == nil {
 | 
						
						
						
							|  |  | 		s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	protoHandler := func(hs *http.Server, c *tls.Conn, h http.Handler) {
 | 
						
						
						
							|  |  | 		if testHookOnConn != nil {
 | 
						
						
						
							|  |  | 			testHookOnConn()
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		// The TLSNextProto interface predates contexts, so
 | 
						
						
						
							|  |  | 		// the net/http package passes down its per-connection
 | 
						
						
						
							|  |  | 		// base context via an exported but unadvertised
 | 
						
						
						
							|  |  | 		// method on the Handler. This is for internal
 | 
						
						
						
							|  |  | 		// net/http<=>http2 use only.
 | 
						
						
						
							|  |  | 		var ctx context.Context
 | 
						
						
						
							|  |  | 		type baseContexter interface {
 | 
						
						
						
							|  |  | 			BaseContext() context.Context
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if bc, ok := h.(baseContexter); ok {
 | 
						
						
						
							|  |  | 			ctx = bc.BaseContext()
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		conf.ServeConn(c, &ServeConnOpts{
 | 
						
						
						
							|  |  | 			Context:    ctx,
 | 
						
						
						
							|  |  | 			Handler:    h,
 | 
						
						
						
							|  |  | 			BaseConfig: hs,
 | 
						
						
						
							|  |  | 		})
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	s.TLSNextProto[NextProtoTLS] = protoHandler
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // ServeConnOpts are options for the Server.ServeConn method.
 | 
						
						
						
							|  |  | type ServeConnOpts struct {
 | 
						
						
						
							|  |  | 	// Context is the base context to use.
 | 
						
						
						
							|  |  | 	// If nil, context.Background is used.
 | 
						
						
						
							|  |  | 	Context context.Context
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// BaseConfig optionally sets the base configuration
 | 
						
						
						
							|  |  | 	// for values. If nil, defaults are used.
 | 
						
						
						
							|  |  | 	BaseConfig *http.Server
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Handler specifies which handler to use for processing
 | 
						
						
						
							|  |  | 	// requests. If nil, BaseConfig.Handler is used. If BaseConfig
 | 
						
						
						
							|  |  | 	// or BaseConfig.Handler is nil, http.DefaultServeMux is used.
 | 
						
						
						
							|  |  | 	Handler http.Handler
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// UpgradeRequest is an initial request received on a connection
 | 
						
						
						
							|  |  | 	// undergoing an h2c upgrade. The request body must have been
 | 
						
						
						
							|  |  | 	// completely read from the connection before calling ServeConn,
 | 
						
						
						
							|  |  | 	// and the 101 Switching Protocols response written.
 | 
						
						
						
							|  |  | 	UpgradeRequest *http.Request
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Settings is the decoded contents of the HTTP2-Settings header
 | 
						
						
						
							|  |  | 	// in an h2c upgrade request.
 | 
						
						
						
							|  |  | 	Settings []byte
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// SawClientPreface is set if the HTTP/2 connection preface
 | 
						
						
						
							|  |  | 	// has already been read from the connection.
 | 
						
						
						
							|  |  | 	SawClientPreface bool
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (o *ServeConnOpts) context() context.Context {
 | 
						
						
						
							|  |  | 	if o != nil && o.Context != nil {
 | 
						
						
						
							|  |  | 		return o.Context
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return context.Background()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (o *ServeConnOpts) baseConfig() *http.Server {
 | 
						
						
						
							|  |  | 	if o != nil && o.BaseConfig != nil {
 | 
						
						
						
							|  |  | 		return o.BaseConfig
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return new(http.Server)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (o *ServeConnOpts) handler() http.Handler {
 | 
						
						
						
							|  |  | 	if o != nil {
 | 
						
						
						
							|  |  | 		if o.Handler != nil {
 | 
						
						
						
							|  |  | 			return o.Handler
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if o.BaseConfig != nil && o.BaseConfig.Handler != nil {
 | 
						
						
						
							|  |  | 			return o.BaseConfig.Handler
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return http.DefaultServeMux
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // ServeConn serves HTTP/2 requests on the provided connection and
 | 
						
						
						
							|  |  | // blocks until the connection is no longer readable.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // ServeConn starts speaking HTTP/2 assuming that c has not had any
 | 
						
						
						
							|  |  | // reads or writes. It writes its initial settings frame and expects
 | 
						
						
						
							|  |  | // to be able to read the preface and settings frame from the
 | 
						
						
						
							|  |  | // client. If c has a ConnectionState method like a *tls.Conn, the
 | 
						
						
						
							|  |  | // ConnectionState is used to verify the TLS ciphersuite and to set
 | 
						
						
						
							|  |  | // the Request.TLS field in Handlers.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // ServeConn does not support h2c by itself. Any h2c support must be
 | 
						
						
						
							|  |  | // implemented in terms of providing a suitably-behaving net.Conn.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // The opts parameter is optional. If nil, default values are used.
 | 
						
						
						
							|  |  | func (s *Server) ServeConn(c net.Conn, opts *ServeConnOpts) {
 | 
						
						
						
							|  |  | 	baseCtx, cancel := serverConnBaseContext(c, opts)
 | 
						
						
						
							|  |  | 	defer cancel()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc := &serverConn{
 | 
						
						
						
							|  |  | 		srv:                         s,
 | 
						
						
						
							|  |  | 		hs:                          opts.baseConfig(),
 | 
						
						
						
							|  |  | 		conn:                        c,
 | 
						
						
						
							|  |  | 		baseCtx:                     baseCtx,
 | 
						
						
						
							|  |  | 		remoteAddrStr:               c.RemoteAddr().String(),
 | 
						
						
						
							|  |  | 		bw:                          newBufferedWriter(c),
 | 
						
						
						
							|  |  | 		handler:                     opts.handler(),
 | 
						
						
						
							|  |  | 		streams:                     make(map[uint32]*stream),
 | 
						
						
						
							|  |  | 		readFrameCh:                 make(chan readFrameResult),
 | 
						
						
						
							|  |  | 		wantWriteFrameCh:            make(chan FrameWriteRequest, 8),
 | 
						
						
						
							|  |  | 		serveMsgCh:                  make(chan interface{}, 8),
 | 
						
						
						
							|  |  | 		wroteFrameCh:                make(chan frameWriteResult, 1), // buffered; one send in writeFrameAsync
 | 
						
						
						
							|  |  | 		bodyReadCh:                  make(chan bodyReadMsg),         // buffering doesn't matter either way
 | 
						
						
						
							|  |  | 		doneServing:                 make(chan struct{}),
 | 
						
						
						
							|  |  | 		clientMaxStreams:            math.MaxUint32, // Section 6.5.2: "Initially, there is no limit to this value"
 | 
						
						
						
							|  |  | 		advMaxStreams:               s.maxConcurrentStreams(),
 | 
						
						
						
							|  |  | 		initialStreamSendWindowSize: initialWindowSize,
 | 
						
						
						
							|  |  | 		maxFrameSize:                initialMaxFrameSize,
 | 
						
						
						
							|  |  | 		serveG:                      newGoroutineLock(),
 | 
						
						
						
							|  |  | 		pushEnabled:                 true,
 | 
						
						
						
							|  |  | 		sawClientPreface:            opts.SawClientPreface,
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	s.state.registerConn(sc)
 | 
						
						
						
							|  |  | 	defer s.state.unregisterConn(sc)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// The net/http package sets the write deadline from the
 | 
						
						
						
							|  |  | 	// http.Server.WriteTimeout during the TLS handshake, but then
 | 
						
						
						
							|  |  | 	// passes the connection off to us with the deadline already set.
 | 
						
						
						
							|  |  | 	// Write deadlines are set per stream in serverConn.newStream.
 | 
						
						
						
							|  |  | 	// Disarm the net.Conn write deadline here.
 | 
						
						
						
							|  |  | 	if sc.hs.WriteTimeout != 0 {
 | 
						
						
						
							|  |  | 		sc.conn.SetWriteDeadline(time.Time{})
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if s.NewWriteScheduler != nil {
 | 
						
						
						
							|  |  | 		sc.writeSched = s.NewWriteScheduler()
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.writeSched = NewPriorityWriteScheduler(nil)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// These start at the RFC-specified defaults. If there is a higher
 | 
						
						
						
							|  |  | 	// configured value for inflow, that will be updated when we send a
 | 
						
						
						
							|  |  | 	// WINDOW_UPDATE shortly after sending SETTINGS.
 | 
						
						
						
							|  |  | 	sc.flow.add(initialWindowSize)
 | 
						
						
						
							|  |  | 	sc.inflow.init(initialWindowSize)
 | 
						
						
						
							|  |  | 	sc.hpackEncoder = hpack.NewEncoder(&sc.headerWriteBuf)
 | 
						
						
						
							|  |  | 	sc.hpackEncoder.SetMaxDynamicTableSizeLimit(s.maxEncoderHeaderTableSize())
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	fr := NewFramer(sc.bw, c)
 | 
						
						
						
							|  |  | 	if s.CountError != nil {
 | 
						
						
						
							|  |  | 		fr.countError = s.CountError
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	fr.ReadMetaHeaders = hpack.NewDecoder(s.maxDecoderHeaderTableSize(), nil)
 | 
						
						
						
							|  |  | 	fr.MaxHeaderListSize = sc.maxHeaderListSize()
 | 
						
						
						
							|  |  | 	fr.SetMaxReadFrameSize(s.maxReadFrameSize())
 | 
						
						
						
							|  |  | 	sc.framer = fr
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if tc, ok := c.(connectionStater); ok {
 | 
						
						
						
							|  |  | 		sc.tlsState = new(tls.ConnectionState)
 | 
						
						
						
							|  |  | 		*sc.tlsState = tc.ConnectionState()
 | 
						
						
						
							|  |  | 		// 9.2 Use of TLS Features
 | 
						
						
						
							|  |  | 		// An implementation of HTTP/2 over TLS MUST use TLS
 | 
						
						
						
							|  |  | 		// 1.2 or higher with the restrictions on feature set
 | 
						
						
						
							|  |  | 		// and cipher suite described in this section. Due to
 | 
						
						
						
							|  |  | 		// implementation limitations, it might not be
 | 
						
						
						
							|  |  | 		// possible to fail TLS negotiation. An endpoint MUST
 | 
						
						
						
							|  |  | 		// immediately terminate an HTTP/2 connection that
 | 
						
						
						
							|  |  | 		// does not meet the TLS requirements described in
 | 
						
						
						
							|  |  | 		// this section with a connection error (Section
 | 
						
						
						
							|  |  | 		// 5.4.1) of type INADEQUATE_SECURITY.
 | 
						
						
						
							|  |  | 		if sc.tlsState.Version < tls.VersionTLS12 {
 | 
						
						
						
							|  |  | 			sc.rejectConn(ErrCodeInadequateSecurity, "TLS version too low")
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if sc.tlsState.ServerName == "" {
 | 
						
						
						
							|  |  | 			// Client must use SNI, but we don't enforce that anymore,
 | 
						
						
						
							|  |  | 			// since it was causing problems when connecting to bare IP
 | 
						
						
						
							|  |  | 			// addresses during development.
 | 
						
						
						
							|  |  | 			//
 | 
						
						
						
							|  |  | 			// TODO: optionally enforce? Or enforce at the time we receive
 | 
						
						
						
							|  |  | 			// a new request, and verify the ServerName matches the :authority?
 | 
						
						
						
							|  |  | 			// But that precludes proxy situations, perhaps.
 | 
						
						
						
							|  |  | 			//
 | 
						
						
						
							|  |  | 			// So for now, do nothing here again.
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if !s.PermitProhibitedCipherSuites && isBadCipher(sc.tlsState.CipherSuite) {
 | 
						
						
						
							|  |  | 			// "Endpoints MAY choose to generate a connection error
 | 
						
						
						
							|  |  | 			// (Section 5.4.1) of type INADEQUATE_SECURITY if one of
 | 
						
						
						
							|  |  | 			// the prohibited cipher suites are negotiated."
 | 
						
						
						
							|  |  | 			//
 | 
						
						
						
							|  |  | 			// We choose that. In my opinion, the spec is weak
 | 
						
						
						
							|  |  | 			// here. It also says both parties must support at least
 | 
						
						
						
							|  |  | 			// TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no
 | 
						
						
						
							|  |  | 			// excuses here. If we really must, we could allow an
 | 
						
						
						
							|  |  | 			// "AllowInsecureWeakCiphers" option on the server later.
 | 
						
						
						
							|  |  | 			// Let's see how it plays out first.
 | 
						
						
						
							|  |  | 			sc.rejectConn(ErrCodeInadequateSecurity, fmt.Sprintf("Prohibited TLS 1.2 Cipher Suite: %x", sc.tlsState.CipherSuite))
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if opts.Settings != nil {
 | 
						
						
						
							|  |  | 		fr := &SettingsFrame{
 | 
						
						
						
							|  |  | 			FrameHeader: FrameHeader{valid: true},
 | 
						
						
						
							|  |  | 			p:           opts.Settings,
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if err := fr.ForeachSetting(sc.processSetting); err != nil {
 | 
						
						
						
							|  |  | 			sc.rejectConn(ErrCodeProtocol, "invalid settings")
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		opts.Settings = nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if hook := testHookGetServerConn; hook != nil {
 | 
						
						
						
							|  |  | 		hook(sc)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if opts.UpgradeRequest != nil {
 | 
						
						
						
							|  |  | 		sc.upgradeRequest(opts.UpgradeRequest)
 | 
						
						
						
							|  |  | 		opts.UpgradeRequest = nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.serve()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func serverConnBaseContext(c net.Conn, opts *ServeConnOpts) (ctx context.Context, cancel func()) {
 | 
						
						
						
							|  |  | 	ctx, cancel = context.WithCancel(opts.context())
 | 
						
						
						
							|  |  | 	ctx = context.WithValue(ctx, http.LocalAddrContextKey, c.LocalAddr())
 | 
						
						
						
							|  |  | 	if hs := opts.baseConfig(); hs != nil {
 | 
						
						
						
							|  |  | 		ctx = context.WithValue(ctx, http.ServerContextKey, hs)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) rejectConn(err ErrCode, debug string) {
 | 
						
						
						
							|  |  | 	sc.vlogf("http2: server rejecting conn: %v, %s", err, debug)
 | 
						
						
						
							|  |  | 	// ignoring errors. hanging up anyway.
 | 
						
						
						
							|  |  | 	sc.framer.WriteGoAway(0, err, []byte(debug))
 | 
						
						
						
							|  |  | 	sc.bw.Flush()
 | 
						
						
						
							|  |  | 	sc.conn.Close()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type serverConn struct {
 | 
						
						
						
							|  |  | 	// Immutable:
 | 
						
						
						
							|  |  | 	srv              *Server
 | 
						
						
						
							|  |  | 	hs               *http.Server
 | 
						
						
						
							|  |  | 	conn             net.Conn
 | 
						
						
						
							|  |  | 	bw               *bufferedWriter // writing to conn
 | 
						
						
						
							|  |  | 	handler          http.Handler
 | 
						
						
						
							|  |  | 	baseCtx          context.Context
 | 
						
						
						
							|  |  | 	framer           *Framer
 | 
						
						
						
							|  |  | 	doneServing      chan struct{}          // closed when serverConn.serve ends
 | 
						
						
						
							|  |  | 	readFrameCh      chan readFrameResult   // written by serverConn.readFrames
 | 
						
						
						
							|  |  | 	wantWriteFrameCh chan FrameWriteRequest // from handlers -> serve
 | 
						
						
						
							|  |  | 	wroteFrameCh     chan frameWriteResult  // from writeFrameAsync -> serve, tickles more frame writes
 | 
						
						
						
							|  |  | 	bodyReadCh       chan bodyReadMsg       // from handlers -> serve
 | 
						
						
						
							|  |  | 	serveMsgCh       chan interface{}       // misc messages & code to send to / run on the serve loop
 | 
						
						
						
							|  |  | 	flow             outflow                // conn-wide (not stream-specific) outbound flow control
 | 
						
						
						
							|  |  | 	inflow           inflow                 // conn-wide inbound flow control
 | 
						
						
						
							|  |  | 	tlsState         *tls.ConnectionState   // shared by all handlers, like net/http
 | 
						
						
						
							|  |  | 	remoteAddrStr    string
 | 
						
						
						
							|  |  | 	writeSched       WriteScheduler
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Everything following is owned by the serve loop; use serveG.check():
 | 
						
						
						
							|  |  | 	serveG                      goroutineLock // used to verify funcs are on serve()
 | 
						
						
						
							|  |  | 	pushEnabled                 bool
 | 
						
						
						
							|  |  | 	sawClientPreface            bool // preface has already been read, used in h2c upgrade
 | 
						
						
						
							|  |  | 	sawFirstSettings            bool // got the initial SETTINGS frame after the preface
 | 
						
						
						
							|  |  | 	needToSendSettingsAck       bool
 | 
						
						
						
							|  |  | 	unackedSettings             int    // how many SETTINGS have we sent without ACKs?
 | 
						
						
						
							|  |  | 	queuedControlFrames         int    // control frames in the writeSched queue
 | 
						
						
						
							|  |  | 	clientMaxStreams            uint32 // SETTINGS_MAX_CONCURRENT_STREAMS from client (our PUSH_PROMISE limit)
 | 
						
						
						
							|  |  | 	advMaxStreams               uint32 // our SETTINGS_MAX_CONCURRENT_STREAMS advertised the client
 | 
						
						
						
							|  |  | 	curClientStreams            uint32 // number of open streams initiated by the client
 | 
						
						
						
							|  |  | 	curPushedStreams            uint32 // number of open streams initiated by server push
 | 
						
						
						
							|  |  | 	maxClientStreamID           uint32 // max ever seen from client (odd), or 0 if there have been no client requests
 | 
						
						
						
							|  |  | 	maxPushPromiseID            uint32 // ID of the last push promise (even), or 0 if there have been no pushes
 | 
						
						
						
							|  |  | 	streams                     map[uint32]*stream
 | 
						
						
						
							|  |  | 	initialStreamSendWindowSize int32
 | 
						
						
						
							|  |  | 	maxFrameSize                int32
 | 
						
						
						
							|  |  | 	peerMaxHeaderListSize       uint32            // zero means unknown (default)
 | 
						
						
						
							|  |  | 	canonHeader                 map[string]string // http2-lower-case -> Go-Canonical-Case
 | 
						
						
						
							|  |  | 	canonHeaderKeysSize         int               // canonHeader keys size in bytes
 | 
						
						
						
							|  |  | 	writingFrame                bool              // started writing a frame (on serve goroutine or separate)
 | 
						
						
						
							|  |  | 	writingFrameAsync           bool              // started a frame on its own goroutine but haven't heard back on wroteFrameCh
 | 
						
						
						
							|  |  | 	needsFrameFlush             bool              // last frame write wasn't a flush
 | 
						
						
						
							|  |  | 	inGoAway                    bool              // we've started to or sent GOAWAY
 | 
						
						
						
							|  |  | 	inFrameScheduleLoop         bool              // whether we're in the scheduleFrameWrite loop
 | 
						
						
						
							|  |  | 	needToSendGoAway            bool              // we need to schedule a GOAWAY frame write
 | 
						
						
						
							|  |  | 	goAwayCode                  ErrCode
 | 
						
						
						
							|  |  | 	shutdownTimer               *time.Timer // nil until used
 | 
						
						
						
							|  |  | 	idleTimer                   *time.Timer // nil if unused
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Owned by the writeFrameAsync goroutine:
 | 
						
						
						
							|  |  | 	headerWriteBuf bytes.Buffer
 | 
						
						
						
							|  |  | 	hpackEncoder   *hpack.Encoder
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Used by startGracefulShutdown.
 | 
						
						
						
							|  |  | 	shutdownOnce sync.Once
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) maxHeaderListSize() uint32 {
 | 
						
						
						
							|  |  | 	n := sc.hs.MaxHeaderBytes
 | 
						
						
						
							|  |  | 	if n <= 0 {
 | 
						
						
						
							|  |  | 		n = http.DefaultMaxHeaderBytes
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// http2's count is in a slightly different unit and includes 32 bytes per pair.
 | 
						
						
						
							|  |  | 	// So, take the net/http.Server value and pad it up a bit, assuming 10 headers.
 | 
						
						
						
							|  |  | 	const perFieldOverhead = 32 // per http2 spec
 | 
						
						
						
							|  |  | 	const typicalHeaders = 10   // conservative
 | 
						
						
						
							|  |  | 	return uint32(n + typicalHeaders*perFieldOverhead)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) curOpenStreams() uint32 {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	return sc.curClientStreams + sc.curPushedStreams
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // stream represents a stream. This is the minimal metadata needed by
 | 
						
						
						
							|  |  | // the serve goroutine. Most of the actual stream state is owned by
 | 
						
						
						
							|  |  | // the http.Handler's goroutine in the responseWriter. Because the
 | 
						
						
						
							|  |  | // responseWriter's responseWriterState is recycled at the end of a
 | 
						
						
						
							|  |  | // handler, this struct intentionally has no pointer to the
 | 
						
						
						
							|  |  | // *responseWriter{,State} itself, as the Handler ending nils out the
 | 
						
						
						
							|  |  | // responseWriter's state field.
 | 
						
						
						
							|  |  | type stream struct {
 | 
						
						
						
							|  |  | 	// immutable:
 | 
						
						
						
							|  |  | 	sc        *serverConn
 | 
						
						
						
							|  |  | 	id        uint32
 | 
						
						
						
							|  |  | 	body      *pipe       // non-nil if expecting DATA frames
 | 
						
						
						
							|  |  | 	cw        closeWaiter // closed wait stream transitions to closed state
 | 
						
						
						
							|  |  | 	ctx       context.Context
 | 
						
						
						
							|  |  | 	cancelCtx func()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// owned by serverConn's serve loop:
 | 
						
						
						
							|  |  | 	bodyBytes        int64   // body bytes seen so far
 | 
						
						
						
							|  |  | 	declBodyBytes    int64   // or -1 if undeclared
 | 
						
						
						
							|  |  | 	flow             outflow // limits writing from Handler to client
 | 
						
						
						
							|  |  | 	inflow           inflow  // what the client is allowed to POST/etc to us
 | 
						
						
						
							|  |  | 	state            streamState
 | 
						
						
						
							|  |  | 	resetQueued      bool        // RST_STREAM queued for write; set by sc.resetStream
 | 
						
						
						
							|  |  | 	gotTrailerHeader bool        // HEADER frame for trailers was seen
 | 
						
						
						
							|  |  | 	wroteHeaders     bool        // whether we wrote headers (not status 100)
 | 
						
						
						
							|  |  | 	readDeadline     *time.Timer // nil if unused
 | 
						
						
						
							|  |  | 	writeDeadline    *time.Timer // nil if unused
 | 
						
						
						
							|  |  | 	closeErr         error       // set before cw is closed
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	trailer    http.Header // accumulated trailers
 | 
						
						
						
							|  |  | 	reqTrailer http.Header // handler's Request.Trailer
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) Framer() *Framer  { return sc.framer }
 | 
						
						
						
							|  |  | func (sc *serverConn) CloseConn() error { return sc.conn.Close() }
 | 
						
						
						
							|  |  | func (sc *serverConn) Flush() error     { return sc.bw.Flush() }
 | 
						
						
						
							|  |  | func (sc *serverConn) HeaderEncoder() (*hpack.Encoder, *bytes.Buffer) {
 | 
						
						
						
							|  |  | 	return sc.hpackEncoder, &sc.headerWriteBuf
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) state(streamID uint32) (streamState, *stream) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-5.1
 | 
						
						
						
							|  |  | 	if st, ok := sc.streams[streamID]; ok {
 | 
						
						
						
							|  |  | 		return st.state, st
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// "The first use of a new stream identifier implicitly closes all
 | 
						
						
						
							|  |  | 	// streams in the "idle" state that might have been initiated by
 | 
						
						
						
							|  |  | 	// that peer with a lower-valued stream identifier. For example, if
 | 
						
						
						
							|  |  | 	// a client sends a HEADERS frame on stream 7 without ever sending a
 | 
						
						
						
							|  |  | 	// frame on stream 5, then stream 5 transitions to the "closed"
 | 
						
						
						
							|  |  | 	// state when the first frame for stream 7 is sent or received."
 | 
						
						
						
							|  |  | 	if streamID%2 == 1 {
 | 
						
						
						
							|  |  | 		if streamID <= sc.maxClientStreamID {
 | 
						
						
						
							|  |  | 			return stateClosed, nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		if streamID <= sc.maxPushPromiseID {
 | 
						
						
						
							|  |  | 			return stateClosed, nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return stateIdle, nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // setConnState calls the net/http ConnState hook for this connection, if configured.
 | 
						
						
						
							|  |  | // Note that the net/http package does StateNew and StateClosed for us.
 | 
						
						
						
							|  |  | // There is currently no plan for StateHijacked or hijacking HTTP/2 connections.
 | 
						
						
						
							|  |  | func (sc *serverConn) setConnState(state http.ConnState) {
 | 
						
						
						
							|  |  | 	if sc.hs.ConnState != nil {
 | 
						
						
						
							|  |  | 		sc.hs.ConnState(sc.conn, state)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) vlogf(format string, args ...interface{}) {
 | 
						
						
						
							|  |  | 	if VerboseLogs {
 | 
						
						
						
							|  |  | 		sc.logf(format, args...)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) logf(format string, args ...interface{}) {
 | 
						
						
						
							|  |  | 	if lg := sc.hs.ErrorLog; lg != nil {
 | 
						
						
						
							|  |  | 		lg.Printf(format, args...)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		log.Printf(format, args...)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // errno returns v's underlying uintptr, else 0.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // TODO: remove this helper function once http2 can use build
 | 
						
						
						
							|  |  | // tags. See comment in isClosedConnError.
 | 
						
						
						
							|  |  | func errno(v error) uintptr {
 | 
						
						
						
							|  |  | 	if rv := reflect.ValueOf(v); rv.Kind() == reflect.Uintptr {
 | 
						
						
						
							|  |  | 		return uintptr(rv.Uint())
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return 0
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // isClosedConnError reports whether err is an error from use of a closed
 | 
						
						
						
							|  |  | // network connection.
 | 
						
						
						
							|  |  | func isClosedConnError(err error) bool {
 | 
						
						
						
							|  |  | 	if err == nil {
 | 
						
						
						
							|  |  | 		return false
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// TODO: remove this string search and be more like the Windows
 | 
						
						
						
							|  |  | 	// case below. That might involve modifying the standard library
 | 
						
						
						
							|  |  | 	// to return better error types.
 | 
						
						
						
							|  |  | 	str := err.Error()
 | 
						
						
						
							|  |  | 	if strings.Contains(str, "use of closed network connection") {
 | 
						
						
						
							|  |  | 		return true
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// TODO(bradfitz): x/tools/cmd/bundle doesn't really support
 | 
						
						
						
							|  |  | 	// build tags, so I can't make an http2_windows.go file with
 | 
						
						
						
							|  |  | 	// Windows-specific stuff. Fix that and move this, once we
 | 
						
						
						
							|  |  | 	// have a way to bundle this into std's net/http somehow.
 | 
						
						
						
							|  |  | 	if runtime.GOOS == "windows" {
 | 
						
						
						
							|  |  | 		if oe, ok := err.(*net.OpError); ok && oe.Op == "read" {
 | 
						
						
						
							|  |  | 			if se, ok := oe.Err.(*os.SyscallError); ok && se.Syscall == "wsarecv" {
 | 
						
						
						
							|  |  | 				const WSAECONNABORTED = 10053
 | 
						
						
						
							|  |  | 				const WSAECONNRESET = 10054
 | 
						
						
						
							|  |  | 				if n := errno(se.Err); n == WSAECONNRESET || n == WSAECONNABORTED {
 | 
						
						
						
							|  |  | 					return true
 | 
						
						
						
							|  |  | 				}
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return false
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) condlogf(err error, format string, args ...interface{}) {
 | 
						
						
						
							|  |  | 	if err == nil {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err) || err == errPrefaceTimeout {
 | 
						
						
						
							|  |  | 		// Boring, expected errors.
 | 
						
						
						
							|  |  | 		sc.vlogf(format, args...)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.logf(format, args...)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // maxCachedCanonicalHeadersKeysSize is an arbitrarily-chosen limit on the size
 | 
						
						
						
							|  |  | // of the entries in the canonHeader cache.
 | 
						
						
						
							|  |  | // This should be larger than the size of unique, uncommon header keys likely to
 | 
						
						
						
							|  |  | // be sent by the peer, while not so high as to permit unreasonable memory usage
 | 
						
						
						
							|  |  | // if the peer sends an unbounded number of unique header keys.
 | 
						
						
						
							|  |  | const maxCachedCanonicalHeadersKeysSize = 2048
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) canonicalHeader(v string) string {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	buildCommonHeaderMapsOnce()
 | 
						
						
						
							|  |  | 	cv, ok := commonCanonHeader[v]
 | 
						
						
						
							|  |  | 	if ok {
 | 
						
						
						
							|  |  | 		return cv
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	cv, ok = sc.canonHeader[v]
 | 
						
						
						
							|  |  | 	if ok {
 | 
						
						
						
							|  |  | 		return cv
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if sc.canonHeader == nil {
 | 
						
						
						
							|  |  | 		sc.canonHeader = make(map[string]string)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	cv = http.CanonicalHeaderKey(v)
 | 
						
						
						
							|  |  | 	size := 100 + len(v)*2 // 100 bytes of map overhead + key + value
 | 
						
						
						
							|  |  | 	if sc.canonHeaderKeysSize+size <= maxCachedCanonicalHeadersKeysSize {
 | 
						
						
						
							|  |  | 		sc.canonHeader[v] = cv
 | 
						
						
						
							|  |  | 		sc.canonHeaderKeysSize += size
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return cv
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type readFrameResult struct {
 | 
						
						
						
							|  |  | 	f   Frame // valid until readMore is called
 | 
						
						
						
							|  |  | 	err error
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// readMore should be called once the consumer no longer needs or
 | 
						
						
						
							|  |  | 	// retains f. After readMore, f is invalid and more frames can be
 | 
						
						
						
							|  |  | 	// read.
 | 
						
						
						
							|  |  | 	readMore func()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // readFrames is the loop that reads incoming frames.
 | 
						
						
						
							|  |  | // It takes care to only read one frame at a time, blocking until the
 | 
						
						
						
							|  |  | // consumer is done with the frame.
 | 
						
						
						
							|  |  | // It's run on its own goroutine.
 | 
						
						
						
							|  |  | func (sc *serverConn) readFrames() {
 | 
						
						
						
							|  |  | 	gate := make(gate)
 | 
						
						
						
							|  |  | 	gateDone := gate.Done
 | 
						
						
						
							|  |  | 	for {
 | 
						
						
						
							|  |  | 		f, err := sc.framer.ReadFrame()
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case sc.readFrameCh <- readFrameResult{f, err, gateDone}:
 | 
						
						
						
							|  |  | 		case <-sc.doneServing:
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case <-gate:
 | 
						
						
						
							|  |  | 		case <-sc.doneServing:
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if terminalReadFrameError(err) {
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // frameWriteResult is the message passed from writeFrameAsync to the serve goroutine.
 | 
						
						
						
							|  |  | type frameWriteResult struct {
 | 
						
						
						
							|  |  | 	_   incomparable
 | 
						
						
						
							|  |  | 	wr  FrameWriteRequest // what was written (or attempted)
 | 
						
						
						
							|  |  | 	err error             // result of the writeFrame call
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // writeFrameAsync runs in its own goroutine and writes a single frame
 | 
						
						
						
							|  |  | // and then reports when it's done.
 | 
						
						
						
							|  |  | // At most one goroutine can be running writeFrameAsync at a time per
 | 
						
						
						
							|  |  | // serverConn.
 | 
						
						
						
							|  |  | func (sc *serverConn) writeFrameAsync(wr FrameWriteRequest, wd *writeData) {
 | 
						
						
						
							|  |  | 	var err error
 | 
						
						
						
							|  |  | 	if wd == nil {
 | 
						
						
						
							|  |  | 		err = wr.write.writeFrame(sc)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		err = sc.framer.endWrite()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.wroteFrameCh <- frameWriteResult{wr: wr, err: err}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) closeAllStreamsOnConnClose() {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	for _, st := range sc.streams {
 | 
						
						
						
							|  |  | 		sc.closeStream(st, errClientDisconnected)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) stopShutdownTimer() {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if t := sc.shutdownTimer; t != nil {
 | 
						
						
						
							|  |  | 		t.Stop()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) notePanic() {
 | 
						
						
						
							|  |  | 	// Note: this is for serverConn.serve panicking, not http.Handler code.
 | 
						
						
						
							|  |  | 	if testHookOnPanicMu != nil {
 | 
						
						
						
							|  |  | 		testHookOnPanicMu.Lock()
 | 
						
						
						
							|  |  | 		defer testHookOnPanicMu.Unlock()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if testHookOnPanic != nil {
 | 
						
						
						
							|  |  | 		if e := recover(); e != nil {
 | 
						
						
						
							|  |  | 			if testHookOnPanic(sc, e) {
 | 
						
						
						
							|  |  | 				panic(e)
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) serve() {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	defer sc.notePanic()
 | 
						
						
						
							|  |  | 	defer sc.conn.Close()
 | 
						
						
						
							|  |  | 	defer sc.closeAllStreamsOnConnClose()
 | 
						
						
						
							|  |  | 	defer sc.stopShutdownTimer()
 | 
						
						
						
							|  |  | 	defer close(sc.doneServing) // unblocks handlers trying to send
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if VerboseLogs {
 | 
						
						
						
							|  |  | 		sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.writeFrame(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write: writeSettings{
 | 
						
						
						
							|  |  | 			{SettingMaxFrameSize, sc.srv.maxReadFrameSize()},
 | 
						
						
						
							|  |  | 			{SettingMaxConcurrentStreams, sc.advMaxStreams},
 | 
						
						
						
							|  |  | 			{SettingMaxHeaderListSize, sc.maxHeaderListSize()},
 | 
						
						
						
							|  |  | 			{SettingHeaderTableSize, sc.srv.maxDecoderHeaderTableSize()},
 | 
						
						
						
							|  |  | 			{SettingInitialWindowSize, uint32(sc.srv.initialStreamRecvWindowSize())},
 | 
						
						
						
							|  |  | 		},
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | 	sc.unackedSettings++
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Each connection starts with initialWindowSize inflow tokens.
 | 
						
						
						
							|  |  | 	// If a higher value is configured, we add more tokens.
 | 
						
						
						
							|  |  | 	if diff := sc.srv.initialConnRecvWindowSize() - initialWindowSize; diff > 0 {
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate(nil, int(diff))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if err := sc.readPreface(); err != nil {
 | 
						
						
						
							|  |  | 		sc.condlogf(err, "http2: server: error reading preface from client %v: %v", sc.conn.RemoteAddr(), err)
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// Now that we've got the preface, get us out of the
 | 
						
						
						
							|  |  | 	// "StateNew" state. We can't go directly to idle, though.
 | 
						
						
						
							|  |  | 	// Active means we read some data and anticipate a request. We'll
 | 
						
						
						
							|  |  | 	// do another Active when we get a HEADERS frame.
 | 
						
						
						
							|  |  | 	sc.setConnState(http.StateActive)
 | 
						
						
						
							|  |  | 	sc.setConnState(http.StateIdle)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if sc.srv.IdleTimeout != 0 {
 | 
						
						
						
							|  |  | 		sc.idleTimer = time.AfterFunc(sc.srv.IdleTimeout, sc.onIdleTimer)
 | 
						
						
						
							|  |  | 		defer sc.idleTimer.Stop()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	go sc.readFrames() // closed by defer sc.conn.Close above
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	settingsTimer := time.AfterFunc(firstSettingsTimeout, sc.onSettingsTimer)
 | 
						
						
						
							|  |  | 	defer settingsTimer.Stop()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	loopNum := 0
 | 
						
						
						
							|  |  | 	for {
 | 
						
						
						
							|  |  | 		loopNum++
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case wr := <-sc.wantWriteFrameCh:
 | 
						
						
						
							|  |  | 			if se, ok := wr.write.(StreamError); ok {
 | 
						
						
						
							|  |  | 				sc.resetStream(se)
 | 
						
						
						
							|  |  | 				break
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			sc.writeFrame(wr)
 | 
						
						
						
							|  |  | 		case res := <-sc.wroteFrameCh:
 | 
						
						
						
							|  |  | 			sc.wroteFrame(res)
 | 
						
						
						
							|  |  | 		case res := <-sc.readFrameCh:
 | 
						
						
						
							|  |  | 			// Process any written frames before reading new frames from the client since a
 | 
						
						
						
							|  |  | 			// written frame could have triggered a new stream to be started.
 | 
						
						
						
							|  |  | 			if sc.writingFrameAsync {
 | 
						
						
						
							|  |  | 				select {
 | 
						
						
						
							|  |  | 				case wroteRes := <-sc.wroteFrameCh:
 | 
						
						
						
							|  |  | 					sc.wroteFrame(wroteRes)
 | 
						
						
						
							|  |  | 				default:
 | 
						
						
						
							|  |  | 				}
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			if !sc.processFrameFromReader(res) {
 | 
						
						
						
							|  |  | 				return
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			res.readMore()
 | 
						
						
						
							|  |  | 			if settingsTimer != nil {
 | 
						
						
						
							|  |  | 				settingsTimer.Stop()
 | 
						
						
						
							|  |  | 				settingsTimer = nil
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		case m := <-sc.bodyReadCh:
 | 
						
						
						
							|  |  | 			sc.noteBodyRead(m.st, m.n)
 | 
						
						
						
							|  |  | 		case msg := <-sc.serveMsgCh:
 | 
						
						
						
							|  |  | 			switch v := msg.(type) {
 | 
						
						
						
							|  |  | 			case func(int):
 | 
						
						
						
							|  |  | 				v(loopNum) // for testing
 | 
						
						
						
							|  |  | 			case *serverMessage:
 | 
						
						
						
							|  |  | 				switch v {
 | 
						
						
						
							|  |  | 				case settingsTimerMsg:
 | 
						
						
						
							|  |  | 					sc.logf("timeout waiting for SETTINGS frames from %v", sc.conn.RemoteAddr())
 | 
						
						
						
							|  |  | 					return
 | 
						
						
						
							|  |  | 				case idleTimerMsg:
 | 
						
						
						
							|  |  | 					sc.vlogf("connection is idle")
 | 
						
						
						
							|  |  | 					sc.goAway(ErrCodeNo)
 | 
						
						
						
							|  |  | 				case shutdownTimerMsg:
 | 
						
						
						
							|  |  | 					sc.vlogf("GOAWAY close timer fired; closing conn from %v", sc.conn.RemoteAddr())
 | 
						
						
						
							|  |  | 					return
 | 
						
						
						
							|  |  | 				case gracefulShutdownMsg:
 | 
						
						
						
							|  |  | 					sc.startGracefulShutdownInternal()
 | 
						
						
						
							|  |  | 				default:
 | 
						
						
						
							|  |  | 					panic("unknown timer")
 | 
						
						
						
							|  |  | 				}
 | 
						
						
						
							|  |  | 			case *startPushRequest:
 | 
						
						
						
							|  |  | 				sc.startPush(v)
 | 
						
						
						
							|  |  | 			case func(*serverConn):
 | 
						
						
						
							|  |  | 				v(sc)
 | 
						
						
						
							|  |  | 			default:
 | 
						
						
						
							|  |  | 				panic(fmt.Sprintf("unexpected type %T", v))
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// If the peer is causing us to generate a lot of control frames,
 | 
						
						
						
							|  |  | 		// but not reading them from us, assume they are trying to make us
 | 
						
						
						
							|  |  | 		// run out of memory.
 | 
						
						
						
							|  |  | 		if sc.queuedControlFrames > sc.srv.maxQueuedControlFrames() {
 | 
						
						
						
							|  |  | 			sc.vlogf("http2: too many control frames in send queue, closing connection")
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// Start the shutdown timer after sending a GOAWAY. When sending GOAWAY
 | 
						
						
						
							|  |  | 		// with no error code (graceful shutdown), don't start the timer until
 | 
						
						
						
							|  |  | 		// all open streams have been completed.
 | 
						
						
						
							|  |  | 		sentGoAway := sc.inGoAway && !sc.needToSendGoAway && !sc.writingFrame
 | 
						
						
						
							|  |  | 		gracefulShutdownComplete := sc.goAwayCode == ErrCodeNo && sc.curOpenStreams() == 0
 | 
						
						
						
							|  |  | 		if sentGoAway && sc.shutdownTimer == nil && (sc.goAwayCode != ErrCodeNo || gracefulShutdownComplete) {
 | 
						
						
						
							|  |  | 			sc.shutDownIn(goAwayTimeout)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) awaitGracefulShutdown(sharedCh <-chan struct{}, privateCh chan struct{}) {
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 	case <-sharedCh:
 | 
						
						
						
							|  |  | 		close(privateCh)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type serverMessage int
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Message values sent to serveMsgCh.
 | 
						
						
						
							|  |  | var (
 | 
						
						
						
							|  |  | 	settingsTimerMsg    = new(serverMessage)
 | 
						
						
						
							|  |  | 	idleTimerMsg        = new(serverMessage)
 | 
						
						
						
							|  |  | 	shutdownTimerMsg    = new(serverMessage)
 | 
						
						
						
							|  |  | 	gracefulShutdownMsg = new(serverMessage)
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) onSettingsTimer() { sc.sendServeMsg(settingsTimerMsg) }
 | 
						
						
						
							|  |  | func (sc *serverConn) onIdleTimer()     { sc.sendServeMsg(idleTimerMsg) }
 | 
						
						
						
							|  |  | func (sc *serverConn) onShutdownTimer() { sc.sendServeMsg(shutdownTimerMsg) }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) sendServeMsg(msg interface{}) {
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn() // NOT
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case sc.serveMsgCh <- msg:
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var errPrefaceTimeout = errors.New("timeout waiting for client preface")
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // readPreface reads the ClientPreface greeting from the peer or
 | 
						
						
						
							|  |  | // returns errPrefaceTimeout on timeout, or an error if the greeting
 | 
						
						
						
							|  |  | // is invalid.
 | 
						
						
						
							|  |  | func (sc *serverConn) readPreface() error {
 | 
						
						
						
							|  |  | 	if sc.sawClientPreface {
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	errc := make(chan error, 1)
 | 
						
						
						
							|  |  | 	go func() {
 | 
						
						
						
							|  |  | 		// Read the client preface
 | 
						
						
						
							|  |  | 		buf := make([]byte, len(ClientPreface))
 | 
						
						
						
							|  |  | 		if _, err := io.ReadFull(sc.conn, buf); err != nil {
 | 
						
						
						
							|  |  | 			errc <- err
 | 
						
						
						
							|  |  | 		} else if !bytes.Equal(buf, clientPreface) {
 | 
						
						
						
							|  |  | 			errc <- fmt.Errorf("bogus greeting %q", buf)
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			errc <- nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}()
 | 
						
						
						
							|  |  | 	timer := time.NewTimer(prefaceTimeout) // TODO: configurable on *Server?
 | 
						
						
						
							|  |  | 	defer timer.Stop()
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case <-timer.C:
 | 
						
						
						
							|  |  | 		return errPrefaceTimeout
 | 
						
						
						
							|  |  | 	case err := <-errc:
 | 
						
						
						
							|  |  | 		if err == nil {
 | 
						
						
						
							|  |  | 			if VerboseLogs {
 | 
						
						
						
							|  |  | 				sc.vlogf("http2: server: client %v said hello", sc.conn.RemoteAddr())
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var errChanPool = sync.Pool{
 | 
						
						
						
							|  |  | 	New: func() interface{} { return make(chan error, 1) },
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var writeDataPool = sync.Pool{
 | 
						
						
						
							|  |  | 	New: func() interface{} { return new(writeData) },
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // writeDataFromHandler writes DATA response frames from a handler on
 | 
						
						
						
							|  |  | // the given stream.
 | 
						
						
						
							|  |  | func (sc *serverConn) writeDataFromHandler(stream *stream, data []byte, endStream bool) error {
 | 
						
						
						
							|  |  | 	ch := errChanPool.Get().(chan error)
 | 
						
						
						
							|  |  | 	writeArg := writeDataPool.Get().(*writeData)
 | 
						
						
						
							|  |  | 	*writeArg = writeData{stream.id, data, endStream}
 | 
						
						
						
							|  |  | 	err := sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write:  writeArg,
 | 
						
						
						
							|  |  | 		stream: stream,
 | 
						
						
						
							|  |  | 		done:   ch,
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | 	if err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	var frameWriteDone bool // the frame write is done (successfully or not)
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case err = <-ch:
 | 
						
						
						
							|  |  | 		frameWriteDone = true
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 		return errClientDisconnected
 | 
						
						
						
							|  |  | 	case <-stream.cw:
 | 
						
						
						
							|  |  | 		// If both ch and stream.cw were ready (as might
 | 
						
						
						
							|  |  | 		// happen on the final Write after an http.Handler
 | 
						
						
						
							|  |  | 		// ends), prefer the write result. Otherwise this
 | 
						
						
						
							|  |  | 		// might just be us successfully closing the stream.
 | 
						
						
						
							|  |  | 		// The writeFrameAsync and serve goroutines guarantee
 | 
						
						
						
							|  |  | 		// that the ch send will happen before the stream.cw
 | 
						
						
						
							|  |  | 		// close.
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case err = <-ch:
 | 
						
						
						
							|  |  | 			frameWriteDone = true
 | 
						
						
						
							|  |  | 		default:
 | 
						
						
						
							|  |  | 			return errStreamClosed
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	errChanPool.Put(ch)
 | 
						
						
						
							|  |  | 	if frameWriteDone {
 | 
						
						
						
							|  |  | 		writeDataPool.Put(writeArg)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return err
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // writeFrameFromHandler sends wr to sc.wantWriteFrameCh, but aborts
 | 
						
						
						
							|  |  | // if the connection has gone away.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // This must not be run from the serve goroutine itself, else it might
 | 
						
						
						
							|  |  | // deadlock writing to sc.wantWriteFrameCh (which is only mildly
 | 
						
						
						
							|  |  | // buffered and is read by serve itself). If you're on the serve
 | 
						
						
						
							|  |  | // goroutine, call writeFrame instead.
 | 
						
						
						
							|  |  | func (sc *serverConn) writeFrameFromHandler(wr FrameWriteRequest) error {
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn() // NOT
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case sc.wantWriteFrameCh <- wr:
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 		// Serve loop is gone.
 | 
						
						
						
							|  |  | 		// Client has closed their connection to the server.
 | 
						
						
						
							|  |  | 		return errClientDisconnected
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // writeFrame schedules a frame to write and sends it if there's nothing
 | 
						
						
						
							|  |  | // already being written.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // There is no pushback here (the serve goroutine never blocks). It's
 | 
						
						
						
							|  |  | // the http.Handlers that block, waiting for their previous frames to
 | 
						
						
						
							|  |  | // make it onto the wire
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // If you're not on the serve goroutine, use writeFrameFromHandler instead.
 | 
						
						
						
							|  |  | func (sc *serverConn) writeFrame(wr FrameWriteRequest) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// If true, wr will not be written and wr.done will not be signaled.
 | 
						
						
						
							|  |  | 	var ignoreWrite bool
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// We are not allowed to write frames on closed streams. RFC 7540 Section
 | 
						
						
						
							|  |  | 	// 5.1.1 says: "An endpoint MUST NOT send frames other than PRIORITY on
 | 
						
						
						
							|  |  | 	// a closed stream." Our server never sends PRIORITY, so that exception
 | 
						
						
						
							|  |  | 	// does not apply.
 | 
						
						
						
							|  |  | 	//
 | 
						
						
						
							|  |  | 	// The serverConn might close an open stream while the stream's handler
 | 
						
						
						
							|  |  | 	// is still running. For example, the server might close a stream when it
 | 
						
						
						
							|  |  | 	// receives bad data from the client. If this happens, the handler might
 | 
						
						
						
							|  |  | 	// attempt to write a frame after the stream has been closed (since the
 | 
						
						
						
							|  |  | 	// handler hasn't yet been notified of the close). In this case, we simply
 | 
						
						
						
							|  |  | 	// ignore the frame. The handler will notice that the stream is closed when
 | 
						
						
						
							|  |  | 	// it waits for the frame to be written.
 | 
						
						
						
							|  |  | 	//
 | 
						
						
						
							|  |  | 	// As an exception to this rule, we allow sending RST_STREAM after close.
 | 
						
						
						
							|  |  | 	// This allows us to immediately reject new streams without tracking any
 | 
						
						
						
							|  |  | 	// state for those streams (except for the queued RST_STREAM frame). This
 | 
						
						
						
							|  |  | 	// may result in duplicate RST_STREAMs in some cases, but the client should
 | 
						
						
						
							|  |  | 	// ignore those.
 | 
						
						
						
							|  |  | 	if wr.StreamID() != 0 {
 | 
						
						
						
							|  |  | 		_, isReset := wr.write.(StreamError)
 | 
						
						
						
							|  |  | 		if state, _ := sc.state(wr.StreamID()); state == stateClosed && !isReset {
 | 
						
						
						
							|  |  | 			ignoreWrite = true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Don't send a 100-continue response if we've already sent headers.
 | 
						
						
						
							|  |  | 	// See golang.org/issue/14030.
 | 
						
						
						
							|  |  | 	switch wr.write.(type) {
 | 
						
						
						
							|  |  | 	case *writeResHeaders:
 | 
						
						
						
							|  |  | 		wr.stream.wroteHeaders = true
 | 
						
						
						
							|  |  | 	case write100ContinueHeadersFrame:
 | 
						
						
						
							|  |  | 		if wr.stream.wroteHeaders {
 | 
						
						
						
							|  |  | 			// We do not need to notify wr.done because this frame is
 | 
						
						
						
							|  |  | 			// never written with wr.done != nil.
 | 
						
						
						
							|  |  | 			if wr.done != nil {
 | 
						
						
						
							|  |  | 				panic("wr.done != nil for write100ContinueHeadersFrame")
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			ignoreWrite = true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if !ignoreWrite {
 | 
						
						
						
							|  |  | 		if wr.isControl() {
 | 
						
						
						
							|  |  | 			sc.queuedControlFrames++
 | 
						
						
						
							|  |  | 			// For extra safety, detect wraparounds, which should not happen,
 | 
						
						
						
							|  |  | 			// and pull the plug.
 | 
						
						
						
							|  |  | 			if sc.queuedControlFrames < 0 {
 | 
						
						
						
							|  |  | 				sc.conn.Close()
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.writeSched.Push(wr)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.scheduleFrameWrite()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // startFrameWrite starts a goroutine to write wr (in a separate
 | 
						
						
						
							|  |  | // goroutine since that might block on the network), and updates the
 | 
						
						
						
							|  |  | // serve goroutine's state about the world, updated from info in wr.
 | 
						
						
						
							|  |  | func (sc *serverConn) startFrameWrite(wr FrameWriteRequest) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if sc.writingFrame {
 | 
						
						
						
							|  |  | 		panic("internal error: can only be writing one frame at a time")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	st := wr.stream
 | 
						
						
						
							|  |  | 	if st != nil {
 | 
						
						
						
							|  |  | 		switch st.state {
 | 
						
						
						
							|  |  | 		case stateHalfClosedLocal:
 | 
						
						
						
							|  |  | 			switch wr.write.(type) {
 | 
						
						
						
							|  |  | 			case StreamError, handlerPanicRST, writeWindowUpdate:
 | 
						
						
						
							|  |  | 				// RFC 7540 Section 5.1 allows sending RST_STREAM, PRIORITY, and WINDOW_UPDATE
 | 
						
						
						
							|  |  | 				// in this state. (We never send PRIORITY from the server, so that is not checked.)
 | 
						
						
						
							|  |  | 			default:
 | 
						
						
						
							|  |  | 				panic(fmt.Sprintf("internal error: attempt to send frame on a half-closed-local stream: %v", wr))
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		case stateClosed:
 | 
						
						
						
							|  |  | 			panic(fmt.Sprintf("internal error: attempt to send frame on a closed stream: %v", wr))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if wpp, ok := wr.write.(*writePushPromise); ok {
 | 
						
						
						
							|  |  | 		var err error
 | 
						
						
						
							|  |  | 		wpp.promisedID, err = wpp.allocatePromisedID()
 | 
						
						
						
							|  |  | 		if err != nil {
 | 
						
						
						
							|  |  | 			sc.writingFrameAsync = false
 | 
						
						
						
							|  |  | 			wr.replyToWriter(err)
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.writingFrame = true
 | 
						
						
						
							|  |  | 	sc.needsFrameFlush = true
 | 
						
						
						
							|  |  | 	if wr.write.staysWithinBuffer(sc.bw.Available()) {
 | 
						
						
						
							|  |  | 		sc.writingFrameAsync = false
 | 
						
						
						
							|  |  | 		err := wr.write.writeFrame(sc)
 | 
						
						
						
							|  |  | 		sc.wroteFrame(frameWriteResult{wr: wr, err: err})
 | 
						
						
						
							|  |  | 	} else if wd, ok := wr.write.(*writeData); ok {
 | 
						
						
						
							|  |  | 		// Encode the frame in the serve goroutine, to ensure we don't have
 | 
						
						
						
							|  |  | 		// any lingering asynchronous references to data passed to Write.
 | 
						
						
						
							|  |  | 		// See https://go.dev/issue/58446.
 | 
						
						
						
							|  |  | 		sc.framer.startWriteDataPadded(wd.streamID, wd.endStream, wd.p, nil)
 | 
						
						
						
							|  |  | 		sc.writingFrameAsync = true
 | 
						
						
						
							|  |  | 		go sc.writeFrameAsync(wr, wd)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.writingFrameAsync = true
 | 
						
						
						
							|  |  | 		go sc.writeFrameAsync(wr, nil)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // errHandlerPanicked is the error given to any callers blocked in a read from
 | 
						
						
						
							|  |  | // Request.Body when the main goroutine panics. Since most handlers read in the
 | 
						
						
						
							|  |  | // main ServeHTTP goroutine, this will show up rarely.
 | 
						
						
						
							|  |  | var errHandlerPanicked = errors.New("http2: handler panicked")
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // wroteFrame is called on the serve goroutine with the result of
 | 
						
						
						
							|  |  | // whatever happened on writeFrameAsync.
 | 
						
						
						
							|  |  | func (sc *serverConn) wroteFrame(res frameWriteResult) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if !sc.writingFrame {
 | 
						
						
						
							|  |  | 		panic("internal error: expected to be already writing a frame")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.writingFrame = false
 | 
						
						
						
							|  |  | 	sc.writingFrameAsync = false
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	wr := res.wr
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if writeEndsStream(wr.write) {
 | 
						
						
						
							|  |  | 		st := wr.stream
 | 
						
						
						
							|  |  | 		if st == nil {
 | 
						
						
						
							|  |  | 			panic("internal error: expecting non-nil stream")
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		switch st.state {
 | 
						
						
						
							|  |  | 		case stateOpen:
 | 
						
						
						
							|  |  | 			// Here we would go to stateHalfClosedLocal in
 | 
						
						
						
							|  |  | 			// theory, but since our handler is done and
 | 
						
						
						
							|  |  | 			// the net/http package provides no mechanism
 | 
						
						
						
							|  |  | 			// for closing a ResponseWriter while still
 | 
						
						
						
							|  |  | 			// reading data (see possible TODO at top of
 | 
						
						
						
							|  |  | 			// this file), we go into closed state here
 | 
						
						
						
							|  |  | 			// anyway, after telling the peer we're
 | 
						
						
						
							|  |  | 			// hanging up on them. We'll transition to
 | 
						
						
						
							|  |  | 			// stateClosed after the RST_STREAM frame is
 | 
						
						
						
							|  |  | 			// written.
 | 
						
						
						
							|  |  | 			st.state = stateHalfClosedLocal
 | 
						
						
						
							|  |  | 			// Section 8.1: a server MAY request that the client abort
 | 
						
						
						
							|  |  | 			// transmission of a request without error by sending a
 | 
						
						
						
							|  |  | 			// RST_STREAM with an error code of NO_ERROR after sending
 | 
						
						
						
							|  |  | 			// a complete response.
 | 
						
						
						
							|  |  | 			sc.resetStream(streamError(st.id, ErrCodeNo))
 | 
						
						
						
							|  |  | 		case stateHalfClosedRemote:
 | 
						
						
						
							|  |  | 			sc.closeStream(st, errHandlerComplete)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		switch v := wr.write.(type) {
 | 
						
						
						
							|  |  | 		case StreamError:
 | 
						
						
						
							|  |  | 			// st may be unknown if the RST_STREAM was generated to reject bad input.
 | 
						
						
						
							|  |  | 			if st, ok := sc.streams[v.StreamID]; ok {
 | 
						
						
						
							|  |  | 				sc.closeStream(st, v)
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		case handlerPanicRST:
 | 
						
						
						
							|  |  | 			sc.closeStream(wr.stream, errHandlerPanicked)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Reply (if requested) to unblock the ServeHTTP goroutine.
 | 
						
						
						
							|  |  | 	wr.replyToWriter(res.err)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.scheduleFrameWrite()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // scheduleFrameWrite tickles the frame writing scheduler.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // If a frame is already being written, nothing happens. This will be called again
 | 
						
						
						
							|  |  | // when the frame is done being written.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // If a frame isn't being written and we need to send one, the best frame
 | 
						
						
						
							|  |  | // to send is selected by writeSched.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // If a frame isn't being written and there's nothing else to send, we
 | 
						
						
						
							|  |  | // flush the write buffer.
 | 
						
						
						
							|  |  | func (sc *serverConn) scheduleFrameWrite() {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if sc.writingFrame || sc.inFrameScheduleLoop {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.inFrameScheduleLoop = true
 | 
						
						
						
							|  |  | 	for !sc.writingFrameAsync {
 | 
						
						
						
							|  |  | 		if sc.needToSendGoAway {
 | 
						
						
						
							|  |  | 			sc.needToSendGoAway = false
 | 
						
						
						
							|  |  | 			sc.startFrameWrite(FrameWriteRequest{
 | 
						
						
						
							|  |  | 				write: &writeGoAway{
 | 
						
						
						
							|  |  | 					maxStreamID: sc.maxClientStreamID,
 | 
						
						
						
							|  |  | 					code:        sc.goAwayCode,
 | 
						
						
						
							|  |  | 				},
 | 
						
						
						
							|  |  | 			})
 | 
						
						
						
							|  |  | 			continue
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if sc.needToSendSettingsAck {
 | 
						
						
						
							|  |  | 			sc.needToSendSettingsAck = false
 | 
						
						
						
							|  |  | 			sc.startFrameWrite(FrameWriteRequest{write: writeSettingsAck{}})
 | 
						
						
						
							|  |  | 			continue
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if !sc.inGoAway || sc.goAwayCode == ErrCodeNo {
 | 
						
						
						
							|  |  | 			if wr, ok := sc.writeSched.Pop(); ok {
 | 
						
						
						
							|  |  | 				if wr.isControl() {
 | 
						
						
						
							|  |  | 					sc.queuedControlFrames--
 | 
						
						
						
							|  |  | 				}
 | 
						
						
						
							|  |  | 				sc.startFrameWrite(wr)
 | 
						
						
						
							|  |  | 				continue
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if sc.needsFrameFlush {
 | 
						
						
						
							|  |  | 			sc.startFrameWrite(FrameWriteRequest{write: flushFrameWriter{}})
 | 
						
						
						
							|  |  | 			sc.needsFrameFlush = false // after startFrameWrite, since it sets this true
 | 
						
						
						
							|  |  | 			continue
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		break
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.inFrameScheduleLoop = false
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // startGracefulShutdown gracefully shuts down a connection. This
 | 
						
						
						
							|  |  | // sends GOAWAY with ErrCodeNo to tell the client we're gracefully
 | 
						
						
						
							|  |  | // shutting down. The connection isn't closed until all current
 | 
						
						
						
							|  |  | // streams are done.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // startGracefulShutdown returns immediately; it does not wait until
 | 
						
						
						
							|  |  | // the connection has shut down.
 | 
						
						
						
							|  |  | func (sc *serverConn) startGracefulShutdown() {
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn() // NOT
 | 
						
						
						
							|  |  | 	sc.shutdownOnce.Do(func() { sc.sendServeMsg(gracefulShutdownMsg) })
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // After sending GOAWAY with an error code (non-graceful shutdown), the
 | 
						
						
						
							|  |  | // connection will close after goAwayTimeout.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // If we close the connection immediately after sending GOAWAY, there may
 | 
						
						
						
							|  |  | // be unsent data in our kernel receive buffer, which will cause the kernel
 | 
						
						
						
							|  |  | // to send a TCP RST on close() instead of a FIN. This RST will abort the
 | 
						
						
						
							|  |  | // connection immediately, whether or not the client had received the GOAWAY.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // Ideally we should delay for at least 1 RTT + epsilon so the client has
 | 
						
						
						
							|  |  | // a chance to read the GOAWAY and stop sending messages. Measuring RTT
 | 
						
						
						
							|  |  | // is hard, so we approximate with 1 second. See golang.org/issue/18701.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // This is a var so it can be shorter in tests, where all requests uses the
 | 
						
						
						
							|  |  | // loopback interface making the expected RTT very small.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // TODO: configurable?
 | 
						
						
						
							|  |  | var goAwayTimeout = 1 * time.Second
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) startGracefulShutdownInternal() {
 | 
						
						
						
							|  |  | 	sc.goAway(ErrCodeNo)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) goAway(code ErrCode) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if sc.inGoAway {
 | 
						
						
						
							|  |  | 		if sc.goAwayCode == ErrCodeNo {
 | 
						
						
						
							|  |  | 			sc.goAwayCode = code
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.inGoAway = true
 | 
						
						
						
							|  |  | 	sc.needToSendGoAway = true
 | 
						
						
						
							|  |  | 	sc.goAwayCode = code
 | 
						
						
						
							|  |  | 	sc.scheduleFrameWrite()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) shutDownIn(d time.Duration) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	sc.shutdownTimer = time.AfterFunc(d, sc.onShutdownTimer)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) resetStream(se StreamError) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	sc.writeFrame(FrameWriteRequest{write: se})
 | 
						
						
						
							|  |  | 	if st, ok := sc.streams[se.StreamID]; ok {
 | 
						
						
						
							|  |  | 		st.resetQueued = true
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // processFrameFromReader processes the serve loop's read from readFrameCh from the
 | 
						
						
						
							|  |  | // frame-reading goroutine.
 | 
						
						
						
							|  |  | // processFrameFromReader returns whether the connection should be kept open.
 | 
						
						
						
							|  |  | func (sc *serverConn) processFrameFromReader(res readFrameResult) bool {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	err := res.err
 | 
						
						
						
							|  |  | 	if err != nil {
 | 
						
						
						
							|  |  | 		if err == ErrFrameTooLarge {
 | 
						
						
						
							|  |  | 			sc.goAway(ErrCodeFrameSize)
 | 
						
						
						
							|  |  | 			return true // goAway will close the loop
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		clientGone := err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err)
 | 
						
						
						
							|  |  | 		if clientGone {
 | 
						
						
						
							|  |  | 			// TODO: could we also get into this state if
 | 
						
						
						
							|  |  | 			// the peer does a half close
 | 
						
						
						
							|  |  | 			// (e.g. CloseWrite) because they're done
 | 
						
						
						
							|  |  | 			// sending frames but they're still wanting
 | 
						
						
						
							|  |  | 			// our open replies?  Investigate.
 | 
						
						
						
							|  |  | 			// TODO: add CloseWrite to crypto/tls.Conn first
 | 
						
						
						
							|  |  | 			// so we have a way to test this? I suppose
 | 
						
						
						
							|  |  | 			// just for testing we could have a non-TLS mode.
 | 
						
						
						
							|  |  | 			return false
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		f := res.f
 | 
						
						
						
							|  |  | 		if VerboseLogs {
 | 
						
						
						
							|  |  | 			sc.vlogf("http2: server read frame %v", summarizeFrame(f))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		err = sc.processFrame(f)
 | 
						
						
						
							|  |  | 		if err == nil {
 | 
						
						
						
							|  |  | 			return true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	switch ev := err.(type) {
 | 
						
						
						
							|  |  | 	case StreamError:
 | 
						
						
						
							|  |  | 		sc.resetStream(ev)
 | 
						
						
						
							|  |  | 		return true
 | 
						
						
						
							|  |  | 	case goAwayFlowError:
 | 
						
						
						
							|  |  | 		sc.goAway(ErrCodeFlowControl)
 | 
						
						
						
							|  |  | 		return true
 | 
						
						
						
							|  |  | 	case ConnectionError:
 | 
						
						
						
							|  |  | 		sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev)
 | 
						
						
						
							|  |  | 		sc.goAway(ErrCode(ev))
 | 
						
						
						
							|  |  | 		return true // goAway will handle shutdown
 | 
						
						
						
							|  |  | 	default:
 | 
						
						
						
							|  |  | 		if res.err != nil {
 | 
						
						
						
							|  |  | 			sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err)
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			sc.logf("http2: server closing client connection: %v", err)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return false
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processFrame(f Frame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// First frame received must be SETTINGS.
 | 
						
						
						
							|  |  | 	if !sc.sawFirstSettings {
 | 
						
						
						
							|  |  | 		if _, ok := f.(*SettingsFrame); !ok {
 | 
						
						
						
							|  |  | 			return sc.countError("first_settings", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.sawFirstSettings = true
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Discard frames for streams initiated after the identified last
 | 
						
						
						
							|  |  | 	// stream sent in a GOAWAY, or all frames after sending an error.
 | 
						
						
						
							|  |  | 	// We still need to return connection-level flow control for DATA frames.
 | 
						
						
						
							|  |  | 	// RFC 9113 Section 6.8.
 | 
						
						
						
							|  |  | 	if sc.inGoAway && (sc.goAwayCode != ErrCodeNo || f.Header().StreamID > sc.maxClientStreamID) {
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if f, ok := f.(*DataFrame); ok {
 | 
						
						
						
							|  |  | 			if !sc.inflow.take(f.Length) {
 | 
						
						
						
							|  |  | 				return sc.countError("data_flow", streamError(f.Header().StreamID, ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	switch f := f.(type) {
 | 
						
						
						
							|  |  | 	case *SettingsFrame:
 | 
						
						
						
							|  |  | 		return sc.processSettings(f)
 | 
						
						
						
							|  |  | 	case *MetaHeadersFrame:
 | 
						
						
						
							|  |  | 		return sc.processHeaders(f)
 | 
						
						
						
							|  |  | 	case *WindowUpdateFrame:
 | 
						
						
						
							|  |  | 		return sc.processWindowUpdate(f)
 | 
						
						
						
							|  |  | 	case *PingFrame:
 | 
						
						
						
							|  |  | 		return sc.processPing(f)
 | 
						
						
						
							|  |  | 	case *DataFrame:
 | 
						
						
						
							|  |  | 		return sc.processData(f)
 | 
						
						
						
							|  |  | 	case *RSTStreamFrame:
 | 
						
						
						
							|  |  | 		return sc.processResetStream(f)
 | 
						
						
						
							|  |  | 	case *PriorityFrame:
 | 
						
						
						
							|  |  | 		return sc.processPriority(f)
 | 
						
						
						
							|  |  | 	case *GoAwayFrame:
 | 
						
						
						
							|  |  | 		return sc.processGoAway(f)
 | 
						
						
						
							|  |  | 	case *PushPromiseFrame:
 | 
						
						
						
							|  |  | 		// A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE
 | 
						
						
						
							|  |  | 		// frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						
						
						
							|  |  | 		return sc.countError("push_promise", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	default:
 | 
						
						
						
							|  |  | 		sc.vlogf("http2: server ignoring frame: %v", f.Header())
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processPing(f *PingFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if f.IsAck() {
 | 
						
						
						
							|  |  | 		// 6.7 PING: " An endpoint MUST NOT respond to PING frames
 | 
						
						
						
							|  |  | 		// containing this flag."
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if f.StreamID != 0 {
 | 
						
						
						
							|  |  | 		// "PING frames are not associated with any individual
 | 
						
						
						
							|  |  | 		// stream. If a PING frame is received with a stream
 | 
						
						
						
							|  |  | 		// identifier field value other than 0x0, the recipient MUST
 | 
						
						
						
							|  |  | 		// respond with a connection error (Section 5.4.1) of type
 | 
						
						
						
							|  |  | 		// PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 		return sc.countError("ping_on_stream", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.writeFrame(FrameWriteRequest{write: writePingAck{f}})
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processWindowUpdate(f *WindowUpdateFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	switch {
 | 
						
						
						
							|  |  | 	case f.StreamID != 0: // stream-level flow control
 | 
						
						
						
							|  |  | 		state, st := sc.state(f.StreamID)
 | 
						
						
						
							|  |  | 		if state == stateIdle {
 | 
						
						
						
							|  |  | 			// Section 5.1: "Receiving any frame other than HEADERS
 | 
						
						
						
							|  |  | 			// or PRIORITY on a stream in this state MUST be
 | 
						
						
						
							|  |  | 			// treated as a connection error (Section 5.4.1) of
 | 
						
						
						
							|  |  | 			// type PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 			return sc.countError("stream_idle", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if st == nil {
 | 
						
						
						
							|  |  | 			// "WINDOW_UPDATE can be sent by a peer that has sent a
 | 
						
						
						
							|  |  | 			// frame bearing the END_STREAM flag. This means that a
 | 
						
						
						
							|  |  | 			// receiver could receive a WINDOW_UPDATE frame on a "half
 | 
						
						
						
							|  |  | 			// closed (remote)" or "closed" stream. A receiver MUST
 | 
						
						
						
							|  |  | 			// NOT treat this as an error, see Section 5.1."
 | 
						
						
						
							|  |  | 			return nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if !st.flow.add(int32(f.Increment)) {
 | 
						
						
						
							|  |  | 			return sc.countError("bad_flow", streamError(f.StreamID, ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	default: // connection-level flow control
 | 
						
						
						
							|  |  | 		if !sc.flow.add(int32(f.Increment)) {
 | 
						
						
						
							|  |  | 			return goAwayFlowError{}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.scheduleFrameWrite()
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processResetStream(f *RSTStreamFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	state, st := sc.state(f.StreamID)
 | 
						
						
						
							|  |  | 	if state == stateIdle {
 | 
						
						
						
							|  |  | 		// 6.4 "RST_STREAM frames MUST NOT be sent for a
 | 
						
						
						
							|  |  | 		// stream in the "idle" state. If a RST_STREAM frame
 | 
						
						
						
							|  |  | 		// identifying an idle stream is received, the
 | 
						
						
						
							|  |  | 		// recipient MUST treat this as a connection error
 | 
						
						
						
							|  |  | 		// (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						
						
						
							|  |  | 		return sc.countError("reset_idle_stream", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if st != nil {
 | 
						
						
						
							|  |  | 		st.cancelCtx()
 | 
						
						
						
							|  |  | 		sc.closeStream(st, streamError(f.StreamID, f.ErrCode))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) closeStream(st *stream, err error) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if st.state == stateIdle || st.state == stateClosed {
 | 
						
						
						
							|  |  | 		panic(fmt.Sprintf("invariant; can't close stream in state %v", st.state))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.state = stateClosed
 | 
						
						
						
							|  |  | 	if st.readDeadline != nil {
 | 
						
						
						
							|  |  | 		st.readDeadline.Stop()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if st.writeDeadline != nil {
 | 
						
						
						
							|  |  | 		st.writeDeadline.Stop()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if st.isPushed() {
 | 
						
						
						
							|  |  | 		sc.curPushedStreams--
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.curClientStreams--
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	delete(sc.streams, st.id)
 | 
						
						
						
							|  |  | 	if len(sc.streams) == 0 {
 | 
						
						
						
							|  |  | 		sc.setConnState(http.StateIdle)
 | 
						
						
						
							|  |  | 		if sc.srv.IdleTimeout != 0 {
 | 
						
						
						
							|  |  | 			sc.idleTimer.Reset(sc.srv.IdleTimeout)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if h1ServerKeepAlivesDisabled(sc.hs) {
 | 
						
						
						
							|  |  | 			sc.startGracefulShutdownInternal()
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if p := st.body; p != nil {
 | 
						
						
						
							|  |  | 		// Return any buffered unread bytes worth of conn-level flow control.
 | 
						
						
						
							|  |  | 		// See golang.org/issue/16481
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate(nil, p.Len())
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		p.CloseWithError(err)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if e, ok := err.(StreamError); ok {
 | 
						
						
						
							|  |  | 		if e.Cause != nil {
 | 
						
						
						
							|  |  | 			err = e.Cause
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			err = errStreamClosed
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.closeErr = err
 | 
						
						
						
							|  |  | 	st.cw.Close() // signals Handler's CloseNotifier, unblocks writes, etc
 | 
						
						
						
							|  |  | 	sc.writeSched.CloseStream(st.id)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processSettings(f *SettingsFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if f.IsAck() {
 | 
						
						
						
							|  |  | 		sc.unackedSettings--
 | 
						
						
						
							|  |  | 		if sc.unackedSettings < 0 {
 | 
						
						
						
							|  |  | 			// Why is the peer ACKing settings we never sent?
 | 
						
						
						
							|  |  | 			// The spec doesn't mention this case, but
 | 
						
						
						
							|  |  | 			// hang up on them anyway.
 | 
						
						
						
							|  |  | 			return sc.countError("ack_mystery", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if f.NumSettings() > 100 || f.HasDuplicates() {
 | 
						
						
						
							|  |  | 		// This isn't actually in the spec, but hang up on
 | 
						
						
						
							|  |  | 		// suspiciously large settings frames or those with
 | 
						
						
						
							|  |  | 		// duplicate entries.
 | 
						
						
						
							|  |  | 		return sc.countError("settings_big_or_dups", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if err := f.ForeachSetting(sc.processSetting); err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// TODO: judging by RFC 7540, Section 6.5.3 each SETTINGS frame should be
 | 
						
						
						
							|  |  | 	// acknowledged individually, even if multiple are received before the ACK.
 | 
						
						
						
							|  |  | 	sc.needToSendSettingsAck = true
 | 
						
						
						
							|  |  | 	sc.scheduleFrameWrite()
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processSetting(s Setting) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if err := s.Valid(); err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if VerboseLogs {
 | 
						
						
						
							|  |  | 		sc.vlogf("http2: server processing setting %v", s)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	switch s.ID {
 | 
						
						
						
							|  |  | 	case SettingHeaderTableSize:
 | 
						
						
						
							|  |  | 		sc.hpackEncoder.SetMaxDynamicTableSize(s.Val)
 | 
						
						
						
							|  |  | 	case SettingEnablePush:
 | 
						
						
						
							|  |  | 		sc.pushEnabled = s.Val != 0
 | 
						
						
						
							|  |  | 	case SettingMaxConcurrentStreams:
 | 
						
						
						
							|  |  | 		sc.clientMaxStreams = s.Val
 | 
						
						
						
							|  |  | 	case SettingInitialWindowSize:
 | 
						
						
						
							|  |  | 		return sc.processSettingInitialWindowSize(s.Val)
 | 
						
						
						
							|  |  | 	case SettingMaxFrameSize:
 | 
						
						
						
							|  |  | 		sc.maxFrameSize = int32(s.Val) // the maximum valid s.Val is < 2^31
 | 
						
						
						
							|  |  | 	case SettingMaxHeaderListSize:
 | 
						
						
						
							|  |  | 		sc.peerMaxHeaderListSize = s.Val
 | 
						
						
						
							|  |  | 	default:
 | 
						
						
						
							|  |  | 		// Unknown setting: "An endpoint that receives a SETTINGS
 | 
						
						
						
							|  |  | 		// frame with any unknown or unsupported identifier MUST
 | 
						
						
						
							|  |  | 		// ignore that setting."
 | 
						
						
						
							|  |  | 		if VerboseLogs {
 | 
						
						
						
							|  |  | 			sc.vlogf("http2: server ignoring unknown setting %v", s)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processSettingInitialWindowSize(val uint32) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	// Note: val already validated to be within range by
 | 
						
						
						
							|  |  | 	// processSetting's Valid call.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// "A SETTINGS frame can alter the initial flow control window
 | 
						
						
						
							|  |  | 	// size for all current streams. When the value of
 | 
						
						
						
							|  |  | 	// SETTINGS_INITIAL_WINDOW_SIZE changes, a receiver MUST
 | 
						
						
						
							|  |  | 	// adjust the size of all stream flow control windows that it
 | 
						
						
						
							|  |  | 	// maintains by the difference between the new value and the
 | 
						
						
						
							|  |  | 	// old value."
 | 
						
						
						
							|  |  | 	old := sc.initialStreamSendWindowSize
 | 
						
						
						
							|  |  | 	sc.initialStreamSendWindowSize = int32(val)
 | 
						
						
						
							|  |  | 	growth := int32(val) - old // may be negative
 | 
						
						
						
							|  |  | 	for _, st := range sc.streams {
 | 
						
						
						
							|  |  | 		if !st.flow.add(growth) {
 | 
						
						
						
							|  |  | 			// 6.9.2 Initial Flow Control Window Size
 | 
						
						
						
							|  |  | 			// "An endpoint MUST treat a change to
 | 
						
						
						
							|  |  | 			// SETTINGS_INITIAL_WINDOW_SIZE that causes any flow
 | 
						
						
						
							|  |  | 			// control window to exceed the maximum size as a
 | 
						
						
						
							|  |  | 			// connection error (Section 5.4.1) of type
 | 
						
						
						
							|  |  | 			// FLOW_CONTROL_ERROR."
 | 
						
						
						
							|  |  | 			return sc.countError("setting_win_size", ConnectionError(ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processData(f *DataFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	id := f.Header().StreamID
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	data := f.Data()
 | 
						
						
						
							|  |  | 	state, st := sc.state(id)
 | 
						
						
						
							|  |  | 	if id == 0 || state == stateIdle {
 | 
						
						
						
							|  |  | 		// Section 6.1: "DATA frames MUST be associated with a
 | 
						
						
						
							|  |  | 		// stream. If a DATA frame is received whose stream
 | 
						
						
						
							|  |  | 		// identifier field is 0x0, the recipient MUST respond
 | 
						
						
						
							|  |  | 		// with a connection error (Section 5.4.1) of type
 | 
						
						
						
							|  |  | 		// PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 		//
 | 
						
						
						
							|  |  | 		// Section 5.1: "Receiving any frame other than HEADERS
 | 
						
						
						
							|  |  | 		// or PRIORITY on a stream in this state MUST be
 | 
						
						
						
							|  |  | 		// treated as a connection error (Section 5.4.1) of
 | 
						
						
						
							|  |  | 		// type PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 		return sc.countError("data_on_idle", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// "If a DATA frame is received whose stream is not in "open"
 | 
						
						
						
							|  |  | 	// or "half closed (local)" state, the recipient MUST respond
 | 
						
						
						
							|  |  | 	// with a stream error (Section 5.4.2) of type STREAM_CLOSED."
 | 
						
						
						
							|  |  | 	if st == nil || state != stateOpen || st.gotTrailerHeader || st.resetQueued {
 | 
						
						
						
							|  |  | 		// This includes sending a RST_STREAM if the stream is
 | 
						
						
						
							|  |  | 		// in stateHalfClosedLocal (which currently means that
 | 
						
						
						
							|  |  | 		// the http.Handler returned, so it's done reading &
 | 
						
						
						
							|  |  | 		// done writing). Try to stop the client from sending
 | 
						
						
						
							|  |  | 		// more DATA.
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// But still enforce their connection-level flow control,
 | 
						
						
						
							|  |  | 		// and return any flow control bytes since we're not going
 | 
						
						
						
							|  |  | 		// to consume them.
 | 
						
						
						
							|  |  | 		if !sc.inflow.take(f.Length) {
 | 
						
						
						
							|  |  | 			return sc.countError("data_flow", streamError(id, ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if st != nil && st.resetQueued {
 | 
						
						
						
							|  |  | 			// Already have a stream error in flight. Don't send another.
 | 
						
						
						
							|  |  | 			return nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return sc.countError("closed", streamError(id, ErrCodeStreamClosed))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if st.body == nil {
 | 
						
						
						
							|  |  | 		panic("internal error: should have a body in this state")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Sender sending more than they'd declared?
 | 
						
						
						
							|  |  | 	if st.declBodyBytes != -1 && st.bodyBytes+int64(len(data)) > st.declBodyBytes {
 | 
						
						
						
							|  |  | 		if !sc.inflow.take(f.Length) {
 | 
						
						
						
							|  |  | 			return sc.countError("data_flow", streamError(id, ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		st.body.CloseWithError(fmt.Errorf("sender tried to send more than declared Content-Length of %d bytes", st.declBodyBytes))
 | 
						
						
						
							|  |  | 		// RFC 7540, sec 8.1.2.6: A request or response is also malformed if the
 | 
						
						
						
							|  |  | 		// value of a content-length header field does not equal the sum of the
 | 
						
						
						
							|  |  | 		// DATA frame payload lengths that form the body.
 | 
						
						
						
							|  |  | 		return sc.countError("send_too_much", streamError(id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if f.Length > 0 {
 | 
						
						
						
							|  |  | 		// Check whether the client has flow control quota.
 | 
						
						
						
							|  |  | 		if !takeInflows(&sc.inflow, &st.inflow, f.Length) {
 | 
						
						
						
							|  |  | 			return sc.countError("flow_on_data_length", streamError(id, ErrCodeFlowControl))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if len(data) > 0 {
 | 
						
						
						
							|  |  | 			st.bodyBytes += int64(len(data))
 | 
						
						
						
							|  |  | 			wrote, err := st.body.Write(data)
 | 
						
						
						
							|  |  | 			if err != nil {
 | 
						
						
						
							|  |  | 				// The handler has closed the request body.
 | 
						
						
						
							|  |  | 				// Return the connection-level flow control for the discarded data,
 | 
						
						
						
							|  |  | 				// but not the stream-level flow control.
 | 
						
						
						
							|  |  | 				sc.sendWindowUpdate(nil, int(f.Length)-wrote)
 | 
						
						
						
							|  |  | 				return nil
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			if wrote != len(data) {
 | 
						
						
						
							|  |  | 				panic("internal error: bad Writer")
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// Return any padded flow control now, since we won't
 | 
						
						
						
							|  |  | 		// refund it later on body reads.
 | 
						
						
						
							|  |  | 		// Call sendWindowUpdate even if there is no padding,
 | 
						
						
						
							|  |  | 		// to return buffered flow control credit if the sent
 | 
						
						
						
							|  |  | 		// window has shrunk.
 | 
						
						
						
							|  |  | 		pad := int32(f.Length) - int32(len(data))
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate32(nil, pad)
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate32(st, pad)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if f.StreamEnded() {
 | 
						
						
						
							|  |  | 		st.endStream()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processGoAway(f *GoAwayFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if f.ErrCode != ErrCodeNo {
 | 
						
						
						
							|  |  | 		sc.logf("http2: received GOAWAY %+v, starting graceful shutdown", f)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.vlogf("http2: received GOAWAY %+v, starting graceful shutdown", f)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.startGracefulShutdownInternal()
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-6.8
 | 
						
						
						
							|  |  | 	// We should not create any new streams, which means we should disable push.
 | 
						
						
						
							|  |  | 	sc.pushEnabled = false
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // isPushed reports whether the stream is server-initiated.
 | 
						
						
						
							|  |  | func (st *stream) isPushed() bool {
 | 
						
						
						
							|  |  | 	return st.id%2 == 0
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // endStream closes a Request.Body's pipe. It is called when a DATA
 | 
						
						
						
							|  |  | // frame says a request body is over (or after trailers).
 | 
						
						
						
							|  |  | func (st *stream) endStream() {
 | 
						
						
						
							|  |  | 	sc := st.sc
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if st.declBodyBytes != -1 && st.declBodyBytes != st.bodyBytes {
 | 
						
						
						
							|  |  | 		st.body.CloseWithError(fmt.Errorf("request declared a Content-Length of %d but only wrote %d bytes",
 | 
						
						
						
							|  |  | 			st.declBodyBytes, st.bodyBytes))
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		st.body.closeWithErrorAndCode(io.EOF, st.copyTrailersToHandlerRequest)
 | 
						
						
						
							|  |  | 		st.body.CloseWithError(io.EOF)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.state = stateHalfClosedRemote
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // copyTrailersToHandlerRequest is run in the Handler's goroutine in
 | 
						
						
						
							|  |  | // its Request.Body.Read just before it gets io.EOF.
 | 
						
						
						
							|  |  | func (st *stream) copyTrailersToHandlerRequest() {
 | 
						
						
						
							|  |  | 	for k, vv := range st.trailer {
 | 
						
						
						
							|  |  | 		if _, ok := st.reqTrailer[k]; ok {
 | 
						
						
						
							|  |  | 			// Only copy it over it was pre-declared.
 | 
						
						
						
							|  |  | 			st.reqTrailer[k] = vv
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // onReadTimeout is run on its own goroutine (from time.AfterFunc)
 | 
						
						
						
							|  |  | // when the stream's ReadTimeout has fired.
 | 
						
						
						
							|  |  | func (st *stream) onReadTimeout() {
 | 
						
						
						
							|  |  | 	// Wrap the ErrDeadlineExceeded to avoid callers depending on us
 | 
						
						
						
							|  |  | 	// returning the bare error.
 | 
						
						
						
							|  |  | 	st.body.CloseWithError(fmt.Errorf("%w", os.ErrDeadlineExceeded))
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // onWriteTimeout is run on its own goroutine (from time.AfterFunc)
 | 
						
						
						
							|  |  | // when the stream's WriteTimeout has fired.
 | 
						
						
						
							|  |  | func (st *stream) onWriteTimeout() {
 | 
						
						
						
							|  |  | 	st.sc.writeFrameFromHandler(FrameWriteRequest{write: StreamError{
 | 
						
						
						
							|  |  | 		StreamID: st.id,
 | 
						
						
						
							|  |  | 		Code:     ErrCodeInternal,
 | 
						
						
						
							|  |  | 		Cause:    os.ErrDeadlineExceeded,
 | 
						
						
						
							|  |  | 	}})
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processHeaders(f *MetaHeadersFrame) error {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	id := f.StreamID
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-5.1.1
 | 
						
						
						
							|  |  | 	// Streams initiated by a client MUST use odd-numbered stream
 | 
						
						
						
							|  |  | 	// identifiers. [...] An endpoint that receives an unexpected
 | 
						
						
						
							|  |  | 	// stream identifier MUST respond with a connection error
 | 
						
						
						
							|  |  | 	// (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						
						
						
							|  |  | 	if id%2 != 1 {
 | 
						
						
						
							|  |  | 		return sc.countError("headers_even", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// A HEADERS frame can be used to create a new stream or
 | 
						
						
						
							|  |  | 	// send a trailer for an open one. If we already have a stream
 | 
						
						
						
							|  |  | 	// open, let it process its own HEADERS frame (trailers at this
 | 
						
						
						
							|  |  | 	// point, if it's valid).
 | 
						
						
						
							|  |  | 	if st := sc.streams[f.StreamID]; st != nil {
 | 
						
						
						
							|  |  | 		if st.resetQueued {
 | 
						
						
						
							|  |  | 			// We're sending RST_STREAM to close the stream, so don't bother
 | 
						
						
						
							|  |  | 			// processing this frame.
 | 
						
						
						
							|  |  | 			return nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		// RFC 7540, sec 5.1: If an endpoint receives additional frames, other than
 | 
						
						
						
							|  |  | 		// WINDOW_UPDATE, PRIORITY, or RST_STREAM, for a stream that is in
 | 
						
						
						
							|  |  | 		// this state, it MUST respond with a stream error (Section 5.4.2) of
 | 
						
						
						
							|  |  | 		// type STREAM_CLOSED.
 | 
						
						
						
							|  |  | 		if st.state == stateHalfClosedRemote {
 | 
						
						
						
							|  |  | 			return sc.countError("headers_half_closed", streamError(id, ErrCodeStreamClosed))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return st.processTrailerHeaders(f)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// [...] The identifier of a newly established stream MUST be
 | 
						
						
						
							|  |  | 	// numerically greater than all streams that the initiating
 | 
						
						
						
							|  |  | 	// endpoint has opened or reserved. [...]  An endpoint that
 | 
						
						
						
							|  |  | 	// receives an unexpected stream identifier MUST respond with
 | 
						
						
						
							|  |  | 	// a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						
						
						
							|  |  | 	if id <= sc.maxClientStreamID {
 | 
						
						
						
							|  |  | 		return sc.countError("stream_went_down", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.maxClientStreamID = id
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if sc.idleTimer != nil {
 | 
						
						
						
							|  |  | 		sc.idleTimer.Stop()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-5.1.2
 | 
						
						
						
							|  |  | 	// [...] Endpoints MUST NOT exceed the limit set by their peer. An
 | 
						
						
						
							|  |  | 	// endpoint that receives a HEADERS frame that causes their
 | 
						
						
						
							|  |  | 	// advertised concurrent stream limit to be exceeded MUST treat
 | 
						
						
						
							|  |  | 	// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR
 | 
						
						
						
							|  |  | 	// or REFUSED_STREAM.
 | 
						
						
						
							|  |  | 	if sc.curClientStreams+1 > sc.advMaxStreams {
 | 
						
						
						
							|  |  | 		if sc.unackedSettings == 0 {
 | 
						
						
						
							|  |  | 			// They should know better.
 | 
						
						
						
							|  |  | 			return sc.countError("over_max_streams", streamError(id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		// Assume it's a network race, where they just haven't
 | 
						
						
						
							|  |  | 		// received our last SETTINGS update. But actually
 | 
						
						
						
							|  |  | 		// this can't happen yet, because we don't yet provide
 | 
						
						
						
							|  |  | 		// a way for users to adjust server parameters at
 | 
						
						
						
							|  |  | 		// runtime.
 | 
						
						
						
							|  |  | 		return sc.countError("over_max_streams_race", streamError(id, ErrCodeRefusedStream))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	initialState := stateOpen
 | 
						
						
						
							|  |  | 	if f.StreamEnded() {
 | 
						
						
						
							|  |  | 		initialState = stateHalfClosedRemote
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st := sc.newStream(id, 0, initialState)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if f.HasPriority() {
 | 
						
						
						
							|  |  | 		if err := sc.checkPriority(f.StreamID, f.Priority); err != nil {
 | 
						
						
						
							|  |  | 			return err
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.writeSched.AdjustStream(st.id, f.Priority)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rw, req, err := sc.newWriterAndRequest(st, f)
 | 
						
						
						
							|  |  | 	if err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.reqTrailer = req.Trailer
 | 
						
						
						
							|  |  | 	if st.reqTrailer != nil {
 | 
						
						
						
							|  |  | 		st.trailer = make(http.Header)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.body = req.Body.(*requestBody).pipe // may be nil
 | 
						
						
						
							|  |  | 	st.declBodyBytes = req.ContentLength
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	handler := sc.handler.ServeHTTP
 | 
						
						
						
							|  |  | 	if f.Truncated {
 | 
						
						
						
							|  |  | 		// Their header list was too long. Send a 431 error.
 | 
						
						
						
							|  |  | 		handler = handleHeaderListTooLong
 | 
						
						
						
							|  |  | 	} else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
 | 
						
						
						
							|  |  | 		handler = new400Handler(err)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// The net/http package sets the read deadline from the
 | 
						
						
						
							|  |  | 	// http.Server.ReadTimeout during the TLS handshake, but then
 | 
						
						
						
							|  |  | 	// passes the connection off to us with the deadline already
 | 
						
						
						
							|  |  | 	// set. Disarm it here after the request headers are read,
 | 
						
						
						
							|  |  | 	// similar to how the http1 server works. Here it's
 | 
						
						
						
							|  |  | 	// technically more like the http1 Server's ReadHeaderTimeout
 | 
						
						
						
							|  |  | 	// (in Go 1.8), though. That's a more sane option anyway.
 | 
						
						
						
							|  |  | 	if sc.hs.ReadTimeout != 0 {
 | 
						
						
						
							|  |  | 		sc.conn.SetReadDeadline(time.Time{})
 | 
						
						
						
							|  |  | 		if st.body != nil {
 | 
						
						
						
							|  |  | 			st.readDeadline = time.AfterFunc(sc.hs.ReadTimeout, st.onReadTimeout)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	go sc.runHandler(rw, req, handler)
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) upgradeRequest(req *http.Request) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	id := uint32(1)
 | 
						
						
						
							|  |  | 	sc.maxClientStreamID = id
 | 
						
						
						
							|  |  | 	st := sc.newStream(id, 0, stateHalfClosedRemote)
 | 
						
						
						
							|  |  | 	st.reqTrailer = req.Trailer
 | 
						
						
						
							|  |  | 	if st.reqTrailer != nil {
 | 
						
						
						
							|  |  | 		st.trailer = make(http.Header)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	rw := sc.newResponseWriter(st, req)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Disable any read deadline set by the net/http package
 | 
						
						
						
							|  |  | 	// prior to the upgrade.
 | 
						
						
						
							|  |  | 	if sc.hs.ReadTimeout != 0 {
 | 
						
						
						
							|  |  | 		sc.conn.SetReadDeadline(time.Time{})
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	go sc.runHandler(rw, req, sc.handler.ServeHTTP)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (st *stream) processTrailerHeaders(f *MetaHeadersFrame) error {
 | 
						
						
						
							|  |  | 	sc := st.sc
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if st.gotTrailerHeader {
 | 
						
						
						
							|  |  | 		return sc.countError("dup_trailers", ConnectionError(ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.gotTrailerHeader = true
 | 
						
						
						
							|  |  | 	if !f.StreamEnded() {
 | 
						
						
						
							|  |  | 		return sc.countError("trailers_not_ended", streamError(st.id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if len(f.PseudoFields()) > 0 {
 | 
						
						
						
							|  |  | 		return sc.countError("trailers_pseudo", streamError(st.id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if st.trailer != nil {
 | 
						
						
						
							|  |  | 		for _, hf := range f.RegularFields() {
 | 
						
						
						
							|  |  | 			key := sc.canonicalHeader(hf.Name)
 | 
						
						
						
							|  |  | 			if !httpguts.ValidTrailerHeader(key) {
 | 
						
						
						
							|  |  | 				// TODO: send more details to the peer somehow. But http2 has
 | 
						
						
						
							|  |  | 				// no way to send debug data at a stream level. Discuss with
 | 
						
						
						
							|  |  | 				// HTTP folk.
 | 
						
						
						
							|  |  | 				return sc.countError("trailers_bogus", streamError(st.id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			st.trailer[key] = append(st.trailer[key], hf.Value)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.endStream()
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) checkPriority(streamID uint32, p PriorityParam) error {
 | 
						
						
						
							|  |  | 	if streamID == p.StreamDep {
 | 
						
						
						
							|  |  | 		// Section 5.3.1: "A stream cannot depend on itself. An endpoint MUST treat
 | 
						
						
						
							|  |  | 		// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 		// Section 5.3.3 says that a stream can depend on one of its dependencies,
 | 
						
						
						
							|  |  | 		// so it's only self-dependencies that are forbidden.
 | 
						
						
						
							|  |  | 		return sc.countError("priority", streamError(streamID, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) processPriority(f *PriorityFrame) error {
 | 
						
						
						
							|  |  | 	if err := sc.checkPriority(f.StreamID, f.PriorityParam); err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.writeSched.AdjustStream(f.StreamID, f.PriorityParam)
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) newStream(id, pusherID uint32, state streamState) *stream {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	if id == 0 {
 | 
						
						
						
							|  |  | 		panic("internal error: cannot create stream with id 0")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	ctx, cancelCtx := context.WithCancel(sc.baseCtx)
 | 
						
						
						
							|  |  | 	st := &stream{
 | 
						
						
						
							|  |  | 		sc:        sc,
 | 
						
						
						
							|  |  | 		id:        id,
 | 
						
						
						
							|  |  | 		state:     state,
 | 
						
						
						
							|  |  | 		ctx:       ctx,
 | 
						
						
						
							|  |  | 		cancelCtx: cancelCtx,
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	st.cw.Init()
 | 
						
						
						
							|  |  | 	st.flow.conn = &sc.flow // link to conn-level counter
 | 
						
						
						
							|  |  | 	st.flow.add(sc.initialStreamSendWindowSize)
 | 
						
						
						
							|  |  | 	st.inflow.init(sc.srv.initialStreamRecvWindowSize())
 | 
						
						
						
							|  |  | 	if sc.hs.WriteTimeout != 0 {
 | 
						
						
						
							|  |  | 		st.writeDeadline = time.AfterFunc(sc.hs.WriteTimeout, st.onWriteTimeout)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.streams[id] = st
 | 
						
						
						
							|  |  | 	sc.writeSched.OpenStream(st.id, OpenStreamOptions{PusherID: pusherID})
 | 
						
						
						
							|  |  | 	if st.isPushed() {
 | 
						
						
						
							|  |  | 		sc.curPushedStreams++
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		sc.curClientStreams++
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if sc.curOpenStreams() == 1 {
 | 
						
						
						
							|  |  | 		sc.setConnState(http.StateActive)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	return st
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*responseWriter, *http.Request, error) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rp := requestParam{
 | 
						
						
						
							|  |  | 		method:    f.PseudoValue("method"),
 | 
						
						
						
							|  |  | 		scheme:    f.PseudoValue("scheme"),
 | 
						
						
						
							|  |  | 		authority: f.PseudoValue("authority"),
 | 
						
						
						
							|  |  | 		path:      f.PseudoValue("path"),
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	isConnect := rp.method == "CONNECT"
 | 
						
						
						
							|  |  | 	if isConnect {
 | 
						
						
						
							|  |  | 		if rp.path != "" || rp.scheme != "" || rp.authority == "" {
 | 
						
						
						
							|  |  | 			return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	} else if rp.method == "" || rp.path == "" || (rp.scheme != "https" && rp.scheme != "http") {
 | 
						
						
						
							|  |  | 		// See 8.1.2.6 Malformed Requests and Responses:
 | 
						
						
						
							|  |  | 		//
 | 
						
						
						
							|  |  | 		// Malformed requests or responses that are detected
 | 
						
						
						
							|  |  | 		// MUST be treated as a stream error (Section 5.4.2)
 | 
						
						
						
							|  |  | 		// of type PROTOCOL_ERROR."
 | 
						
						
						
							|  |  | 		//
 | 
						
						
						
							|  |  | 		// 8.1.2.3 Request Pseudo-Header Fields
 | 
						
						
						
							|  |  | 		// "All HTTP/2 requests MUST include exactly one valid
 | 
						
						
						
							|  |  | 		// value for the :method, :scheme, and :path
 | 
						
						
						
							|  |  | 		// pseudo-header fields"
 | 
						
						
						
							|  |  | 		return nil, nil, sc.countError("bad_path_method", streamError(f.StreamID, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rp.header = make(http.Header)
 | 
						
						
						
							|  |  | 	for _, hf := range f.RegularFields() {
 | 
						
						
						
							|  |  | 		rp.header.Add(sc.canonicalHeader(hf.Name), hf.Value)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if rp.authority == "" {
 | 
						
						
						
							|  |  | 		rp.authority = rp.header.Get("Host")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rw, req, err := sc.newWriterAndRequestNoBody(st, rp)
 | 
						
						
						
							|  |  | 	if err != nil {
 | 
						
						
						
							|  |  | 		return nil, nil, err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	bodyOpen := !f.StreamEnded()
 | 
						
						
						
							|  |  | 	if bodyOpen {
 | 
						
						
						
							|  |  | 		if vv, ok := rp.header["Content-Length"]; ok {
 | 
						
						
						
							|  |  | 			if cl, err := strconv.ParseUint(vv[0], 10, 63); err == nil {
 | 
						
						
						
							|  |  | 				req.ContentLength = int64(cl)
 | 
						
						
						
							|  |  | 			} else {
 | 
						
						
						
							|  |  | 				req.ContentLength = 0
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			req.ContentLength = -1
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		req.Body.(*requestBody).pipe = &pipe{
 | 
						
						
						
							|  |  | 			b: &dataBuffer{expected: req.ContentLength},
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return rw, req, nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type requestParam struct {
 | 
						
						
						
							|  |  | 	method                  string
 | 
						
						
						
							|  |  | 	scheme, authority, path string
 | 
						
						
						
							|  |  | 	header                  http.Header
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) newWriterAndRequestNoBody(st *stream, rp requestParam) (*responseWriter, *http.Request, error) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	var tlsState *tls.ConnectionState // nil if not scheme https
 | 
						
						
						
							|  |  | 	if rp.scheme == "https" {
 | 
						
						
						
							|  |  | 		tlsState = sc.tlsState
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	needsContinue := httpguts.HeaderValuesContainsToken(rp.header["Expect"], "100-continue")
 | 
						
						
						
							|  |  | 	if needsContinue {
 | 
						
						
						
							|  |  | 		rp.header.Del("Expect")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	// Merge Cookie headers into one "; "-delimited value.
 | 
						
						
						
							|  |  | 	if cookies := rp.header["Cookie"]; len(cookies) > 1 {
 | 
						
						
						
							|  |  | 		rp.header.Set("Cookie", strings.Join(cookies, "; "))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Setup Trailers
 | 
						
						
						
							|  |  | 	var trailer http.Header
 | 
						
						
						
							|  |  | 	for _, v := range rp.header["Trailer"] {
 | 
						
						
						
							|  |  | 		for _, key := range strings.Split(v, ",") {
 | 
						
						
						
							|  |  | 			key = http.CanonicalHeaderKey(textproto.TrimString(key))
 | 
						
						
						
							|  |  | 			switch key {
 | 
						
						
						
							|  |  | 			case "Transfer-Encoding", "Trailer", "Content-Length":
 | 
						
						
						
							|  |  | 				// Bogus. (copy of http1 rules)
 | 
						
						
						
							|  |  | 				// Ignore.
 | 
						
						
						
							|  |  | 			default:
 | 
						
						
						
							|  |  | 				if trailer == nil {
 | 
						
						
						
							|  |  | 					trailer = make(http.Header)
 | 
						
						
						
							|  |  | 				}
 | 
						
						
						
							|  |  | 				trailer[key] = nil
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	delete(rp.header, "Trailer")
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	var url_ *url.URL
 | 
						
						
						
							|  |  | 	var requestURI string
 | 
						
						
						
							|  |  | 	if rp.method == "CONNECT" {
 | 
						
						
						
							|  |  | 		url_ = &url.URL{Host: rp.authority}
 | 
						
						
						
							|  |  | 		requestURI = rp.authority // mimic HTTP/1 server behavior
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		var err error
 | 
						
						
						
							|  |  | 		url_, err = url.ParseRequestURI(rp.path)
 | 
						
						
						
							|  |  | 		if err != nil {
 | 
						
						
						
							|  |  | 			return nil, nil, sc.countError("bad_path", streamError(st.id, ErrCodeProtocol))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		requestURI = rp.path
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	body := &requestBody{
 | 
						
						
						
							|  |  | 		conn:          sc,
 | 
						
						
						
							|  |  | 		stream:        st,
 | 
						
						
						
							|  |  | 		needsContinue: needsContinue,
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	req := &http.Request{
 | 
						
						
						
							|  |  | 		Method:     rp.method,
 | 
						
						
						
							|  |  | 		URL:        url_,
 | 
						
						
						
							|  |  | 		RemoteAddr: sc.remoteAddrStr,
 | 
						
						
						
							|  |  | 		Header:     rp.header,
 | 
						
						
						
							|  |  | 		RequestURI: requestURI,
 | 
						
						
						
							|  |  | 		Proto:      "HTTP/2.0",
 | 
						
						
						
							|  |  | 		ProtoMajor: 2,
 | 
						
						
						
							|  |  | 		ProtoMinor: 0,
 | 
						
						
						
							|  |  | 		TLS:        tlsState,
 | 
						
						
						
							|  |  | 		Host:       rp.authority,
 | 
						
						
						
							|  |  | 		Body:       body,
 | 
						
						
						
							|  |  | 		Trailer:    trailer,
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	req = req.WithContext(st.ctx)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rw := sc.newResponseWriter(st, req)
 | 
						
						
						
							|  |  | 	return rw, req, nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) newResponseWriter(st *stream, req *http.Request) *responseWriter {
 | 
						
						
						
							|  |  | 	rws := responseWriterStatePool.Get().(*responseWriterState)
 | 
						
						
						
							|  |  | 	bwSave := rws.bw
 | 
						
						
						
							|  |  | 	*rws = responseWriterState{} // zero all the fields
 | 
						
						
						
							|  |  | 	rws.conn = sc
 | 
						
						
						
							|  |  | 	rws.bw = bwSave
 | 
						
						
						
							|  |  | 	rws.bw.Reset(chunkWriter{rws})
 | 
						
						
						
							|  |  | 	rws.stream = st
 | 
						
						
						
							|  |  | 	rws.req = req
 | 
						
						
						
							|  |  | 	return &responseWriter{rws: rws}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Run on its own goroutine.
 | 
						
						
						
							|  |  | func (sc *serverConn) runHandler(rw *responseWriter, req *http.Request, handler func(http.ResponseWriter, *http.Request)) {
 | 
						
						
						
							|  |  | 	didPanic := true
 | 
						
						
						
							|  |  | 	defer func() {
 | 
						
						
						
							|  |  | 		rw.rws.stream.cancelCtx()
 | 
						
						
						
							|  |  | 		if req.MultipartForm != nil {
 | 
						
						
						
							|  |  | 			req.MultipartForm.RemoveAll()
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if didPanic {
 | 
						
						
						
							|  |  | 			e := recover()
 | 
						
						
						
							|  |  | 			sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						
						
						
							|  |  | 				write:  handlerPanicRST{rw.rws.stream.id},
 | 
						
						
						
							|  |  | 				stream: rw.rws.stream,
 | 
						
						
						
							|  |  | 			})
 | 
						
						
						
							|  |  | 			// Same as net/http:
 | 
						
						
						
							|  |  | 			if e != nil && e != http.ErrAbortHandler {
 | 
						
						
						
							|  |  | 				const size = 64 << 10
 | 
						
						
						
							|  |  | 				buf := make([]byte, size)
 | 
						
						
						
							|  |  | 				buf = buf[:runtime.Stack(buf, false)]
 | 
						
						
						
							|  |  | 				sc.logf("http2: panic serving %v: %v\n%s", sc.conn.RemoteAddr(), e, buf)
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 			return
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		rw.handlerDone()
 | 
						
						
						
							|  |  | 	}()
 | 
						
						
						
							|  |  | 	handler(rw, req)
 | 
						
						
						
							|  |  | 	didPanic = false
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func handleHeaderListTooLong(w http.ResponseWriter, r *http.Request) {
 | 
						
						
						
							|  |  | 	// 10.5.1 Limits on Header Block Size:
 | 
						
						
						
							|  |  | 	// .. "A server that receives a larger header block than it is
 | 
						
						
						
							|  |  | 	// willing to handle can send an HTTP 431 (Request Header Fields Too
 | 
						
						
						
							|  |  | 	// Large) status code"
 | 
						
						
						
							|  |  | 	const statusRequestHeaderFieldsTooLarge = 431 // only in Go 1.6+
 | 
						
						
						
							|  |  | 	w.WriteHeader(statusRequestHeaderFieldsTooLarge)
 | 
						
						
						
							|  |  | 	io.WriteString(w, "<h1>HTTP Error 431</h1><p>Request Header Field(s) Too Large</p>")
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // called from handler goroutines.
 | 
						
						
						
							|  |  | // h may be nil.
 | 
						
						
						
							|  |  | func (sc *serverConn) writeHeaders(st *stream, headerData *writeResHeaders) error {
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn() // NOT on
 | 
						
						
						
							|  |  | 	var errc chan error
 | 
						
						
						
							|  |  | 	if headerData.h != nil {
 | 
						
						
						
							|  |  | 		// If there's a header map (which we don't own), so we have to block on
 | 
						
						
						
							|  |  | 		// waiting for this frame to be written, so an http.Flush mid-handler
 | 
						
						
						
							|  |  | 		// writes out the correct value of keys, before a handler later potentially
 | 
						
						
						
							|  |  | 		// mutates it.
 | 
						
						
						
							|  |  | 		errc = errChanPool.Get().(chan error)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if err := sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write:  headerData,
 | 
						
						
						
							|  |  | 		stream: st,
 | 
						
						
						
							|  |  | 		done:   errc,
 | 
						
						
						
							|  |  | 	}); err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if errc != nil {
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case err := <-errc:
 | 
						
						
						
							|  |  | 			errChanPool.Put(errc)
 | 
						
						
						
							|  |  | 			return err
 | 
						
						
						
							|  |  | 		case <-sc.doneServing:
 | 
						
						
						
							|  |  | 			return errClientDisconnected
 | 
						
						
						
							|  |  | 		case <-st.cw:
 | 
						
						
						
							|  |  | 			return errStreamClosed
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // called from handler goroutines.
 | 
						
						
						
							|  |  | func (sc *serverConn) write100ContinueHeaders(st *stream) {
 | 
						
						
						
							|  |  | 	sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write:  write100ContinueHeadersFrame{st.id},
 | 
						
						
						
							|  |  | 		stream: st,
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // A bodyReadMsg tells the server loop that the http.Handler read n
 | 
						
						
						
							|  |  | // bytes of the DATA from the client on the given stream.
 | 
						
						
						
							|  |  | type bodyReadMsg struct {
 | 
						
						
						
							|  |  | 	st *stream
 | 
						
						
						
							|  |  | 	n  int
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // called from handler goroutines.
 | 
						
						
						
							|  |  | // Notes that the handler for the given stream ID read n bytes of its body
 | 
						
						
						
							|  |  | // and schedules flow control tokens to be sent.
 | 
						
						
						
							|  |  | func (sc *serverConn) noteBodyReadFromHandler(st *stream, n int, err error) {
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn() // NOT on
 | 
						
						
						
							|  |  | 	if n > 0 {
 | 
						
						
						
							|  |  | 		select {
 | 
						
						
						
							|  |  | 		case sc.bodyReadCh <- bodyReadMsg{st, n}:
 | 
						
						
						
							|  |  | 		case <-sc.doneServing:
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) noteBodyRead(st *stream, n int) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	sc.sendWindowUpdate(nil, n) // conn-level
 | 
						
						
						
							|  |  | 	if st.state != stateHalfClosedRemote && st.state != stateClosed {
 | 
						
						
						
							|  |  | 		// Don't send this WINDOW_UPDATE if the stream is closed
 | 
						
						
						
							|  |  | 		// remotely.
 | 
						
						
						
							|  |  | 		sc.sendWindowUpdate(st, n)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // st may be nil for conn-level
 | 
						
						
						
							|  |  | func (sc *serverConn) sendWindowUpdate32(st *stream, n int32) {
 | 
						
						
						
							|  |  | 	sc.sendWindowUpdate(st, int(n))
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // st may be nil for conn-level
 | 
						
						
						
							|  |  | func (sc *serverConn) sendWindowUpdate(st *stream, n int) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 	var streamID uint32
 | 
						
						
						
							|  |  | 	var send int32
 | 
						
						
						
							|  |  | 	if st == nil {
 | 
						
						
						
							|  |  | 		send = sc.inflow.add(n)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		streamID = st.id
 | 
						
						
						
							|  |  | 		send = st.inflow.add(n)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if send == 0 {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	sc.writeFrame(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write:  writeWindowUpdate{streamID: streamID, n: uint32(send)},
 | 
						
						
						
							|  |  | 		stream: st,
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // requestBody is the Handler's Request.Body type.
 | 
						
						
						
							|  |  | // Read and Close may be called concurrently.
 | 
						
						
						
							|  |  | type requestBody struct {
 | 
						
						
						
							|  |  | 	_             incomparable
 | 
						
						
						
							|  |  | 	stream        *stream
 | 
						
						
						
							|  |  | 	conn          *serverConn
 | 
						
						
						
							|  |  | 	closeOnce     sync.Once // for use by Close only
 | 
						
						
						
							|  |  | 	sawEOF        bool      // for use by Read only
 | 
						
						
						
							|  |  | 	pipe          *pipe     // non-nil if we have a HTTP entity message body
 | 
						
						
						
							|  |  | 	needsContinue bool      // need to send a 100-continue
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (b *requestBody) Close() error {
 | 
						
						
						
							|  |  | 	b.closeOnce.Do(func() {
 | 
						
						
						
							|  |  | 		if b.pipe != nil {
 | 
						
						
						
							|  |  | 			b.pipe.BreakWithError(errClosedBody)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (b *requestBody) Read(p []byte) (n int, err error) {
 | 
						
						
						
							|  |  | 	if b.needsContinue {
 | 
						
						
						
							|  |  | 		b.needsContinue = false
 | 
						
						
						
							|  |  | 		b.conn.write100ContinueHeaders(b.stream)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if b.pipe == nil || b.sawEOF {
 | 
						
						
						
							|  |  | 		return 0, io.EOF
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	n, err = b.pipe.Read(p)
 | 
						
						
						
							|  |  | 	if err == io.EOF {
 | 
						
						
						
							|  |  | 		b.sawEOF = true
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if b.conn == nil && inTests {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	b.conn.noteBodyReadFromHandler(b.stream, n, err)
 | 
						
						
						
							|  |  | 	return
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // responseWriter is the http.ResponseWriter implementation. It's
 | 
						
						
						
							|  |  | // intentionally small (1 pointer wide) to minimize garbage. The
 | 
						
						
						
							|  |  | // responseWriterState pointer inside is zeroed at the end of a
 | 
						
						
						
							|  |  | // request (in handlerDone) and calls on the responseWriter thereafter
 | 
						
						
						
							|  |  | // simply crash (caller's mistake), but the much larger responseWriterState
 | 
						
						
						
							|  |  | // and buffers are reused between multiple requests.
 | 
						
						
						
							|  |  | type responseWriter struct {
 | 
						
						
						
							|  |  | 	rws *responseWriterState
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Optional http.ResponseWriter interfaces implemented.
 | 
						
						
						
							|  |  | var (
 | 
						
						
						
							|  |  | 	_ http.CloseNotifier = (*responseWriter)(nil)
 | 
						
						
						
							|  |  | 	_ http.Flusher       = (*responseWriter)(nil)
 | 
						
						
						
							|  |  | 	_ stringWriter       = (*responseWriter)(nil)
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type responseWriterState struct {
 | 
						
						
						
							|  |  | 	// immutable within a request:
 | 
						
						
						
							|  |  | 	stream *stream
 | 
						
						
						
							|  |  | 	req    *http.Request
 | 
						
						
						
							|  |  | 	conn   *serverConn
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// TODO: adjust buffer writing sizes based on server config, frame size updates from peer, etc
 | 
						
						
						
							|  |  | 	bw *bufio.Writer // writing to a chunkWriter{this *responseWriterState}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// mutated by http.Handler goroutine:
 | 
						
						
						
							|  |  | 	handlerHeader http.Header // nil until called
 | 
						
						
						
							|  |  | 	snapHeader    http.Header // snapshot of handlerHeader at WriteHeader time
 | 
						
						
						
							|  |  | 	trailers      []string    // set in writeChunk
 | 
						
						
						
							|  |  | 	status        int         // status code passed to WriteHeader
 | 
						
						
						
							|  |  | 	wroteHeader   bool        // WriteHeader called (explicitly or implicitly). Not necessarily sent to user yet.
 | 
						
						
						
							|  |  | 	sentHeader    bool        // have we sent the header frame?
 | 
						
						
						
							|  |  | 	handlerDone   bool        // handler has finished
 | 
						
						
						
							|  |  | 	dirty         bool        // a Write failed; don't reuse this responseWriterState
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sentContentLen int64 // non-zero if handler set a Content-Length header
 | 
						
						
						
							|  |  | 	wroteBytes     int64
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	closeNotifierMu sync.Mutex // guards closeNotifierCh
 | 
						
						
						
							|  |  | 	closeNotifierCh chan bool  // nil until first used
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type chunkWriter struct{ rws *responseWriterState }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (cw chunkWriter) Write(p []byte) (n int, err error) {
 | 
						
						
						
							|  |  | 	n, err = cw.rws.writeChunk(p)
 | 
						
						
						
							|  |  | 	if err == errStreamClosed {
 | 
						
						
						
							|  |  | 		// If writing failed because the stream has been closed,
 | 
						
						
						
							|  |  | 		// return the reason it was closed.
 | 
						
						
						
							|  |  | 		err = cw.rws.stream.closeErr
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return n, err
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (rws *responseWriterState) hasTrailers() bool { return len(rws.trailers) > 0 }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (rws *responseWriterState) hasNonemptyTrailers() bool {
 | 
						
						
						
							|  |  | 	for _, trailer := range rws.trailers {
 | 
						
						
						
							|  |  | 		if _, ok := rws.handlerHeader[trailer]; ok {
 | 
						
						
						
							|  |  | 			return true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return false
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // declareTrailer is called for each Trailer header when the
 | 
						
						
						
							|  |  | // response header is written. It notes that a header will need to be
 | 
						
						
						
							|  |  | // written in the trailers at the end of the response.
 | 
						
						
						
							|  |  | func (rws *responseWriterState) declareTrailer(k string) {
 | 
						
						
						
							|  |  | 	k = http.CanonicalHeaderKey(k)
 | 
						
						
						
							|  |  | 	if !httpguts.ValidTrailerHeader(k) {
 | 
						
						
						
							|  |  | 		// Forbidden by RFC 7230, section 4.1.2.
 | 
						
						
						
							|  |  | 		rws.conn.logf("ignoring invalid trailer %q", k)
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if !strSliceContains(rws.trailers, k) {
 | 
						
						
						
							|  |  | 		rws.trailers = append(rws.trailers, k)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // writeChunk writes chunks from the bufio.Writer. But because
 | 
						
						
						
							|  |  | // bufio.Writer may bypass its chunking, sometimes p may be
 | 
						
						
						
							|  |  | // arbitrarily large.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // writeChunk is also responsible (on the first chunk) for sending the
 | 
						
						
						
							|  |  | // HEADER response.
 | 
						
						
						
							|  |  | func (rws *responseWriterState) writeChunk(p []byte) (n int, err error) {
 | 
						
						
						
							|  |  | 	if !rws.wroteHeader {
 | 
						
						
						
							|  |  | 		rws.writeHeader(200)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if rws.handlerDone {
 | 
						
						
						
							|  |  | 		rws.promoteUndeclaredTrailers()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	isHeadResp := rws.req.Method == "HEAD"
 | 
						
						
						
							|  |  | 	if !rws.sentHeader {
 | 
						
						
						
							|  |  | 		rws.sentHeader = true
 | 
						
						
						
							|  |  | 		var ctype, clen string
 | 
						
						
						
							|  |  | 		if clen = rws.snapHeader.Get("Content-Length"); clen != "" {
 | 
						
						
						
							|  |  | 			rws.snapHeader.Del("Content-Length")
 | 
						
						
						
							|  |  | 			if cl, err := strconv.ParseUint(clen, 10, 63); err == nil {
 | 
						
						
						
							|  |  | 				rws.sentContentLen = int64(cl)
 | 
						
						
						
							|  |  | 			} else {
 | 
						
						
						
							|  |  | 				clen = ""
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if clen == "" && rws.handlerDone && bodyAllowedForStatus(rws.status) && (len(p) > 0 || !isHeadResp) {
 | 
						
						
						
							|  |  | 			clen = strconv.Itoa(len(p))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		_, hasContentType := rws.snapHeader["Content-Type"]
 | 
						
						
						
							|  |  | 		// If the Content-Encoding is non-blank, we shouldn't
 | 
						
						
						
							|  |  | 		// sniff the body. See Issue golang.org/issue/31753.
 | 
						
						
						
							|  |  | 		ce := rws.snapHeader.Get("Content-Encoding")
 | 
						
						
						
							|  |  | 		hasCE := len(ce) > 0
 | 
						
						
						
							|  |  | 		if !hasCE && !hasContentType && bodyAllowedForStatus(rws.status) && len(p) > 0 {
 | 
						
						
						
							|  |  | 			ctype = http.DetectContentType(p)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		var date string
 | 
						
						
						
							|  |  | 		if _, ok := rws.snapHeader["Date"]; !ok {
 | 
						
						
						
							|  |  | 			// TODO(bradfitz): be faster here, like net/http? measure.
 | 
						
						
						
							|  |  | 			date = time.Now().UTC().Format(http.TimeFormat)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		for _, v := range rws.snapHeader["Trailer"] {
 | 
						
						
						
							|  |  | 			foreachHeaderElement(v, rws.declareTrailer)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// "Connection" headers aren't allowed in HTTP/2 (RFC 7540, 8.1.2.2),
 | 
						
						
						
							|  |  | 		// but respect "Connection" == "close" to mean sending a GOAWAY and tearing
 | 
						
						
						
							|  |  | 		// down the TCP connection when idle, like we do for HTTP/1.
 | 
						
						
						
							|  |  | 		// TODO: remove more Connection-specific header fields here, in addition
 | 
						
						
						
							|  |  | 		// to "Connection".
 | 
						
						
						
							|  |  | 		if _, ok := rws.snapHeader["Connection"]; ok {
 | 
						
						
						
							|  |  | 			v := rws.snapHeader.Get("Connection")
 | 
						
						
						
							|  |  | 			delete(rws.snapHeader, "Connection")
 | 
						
						
						
							|  |  | 			if v == "close" {
 | 
						
						
						
							|  |  | 				rws.conn.startGracefulShutdown()
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		endStream := (rws.handlerDone && !rws.hasTrailers() && len(p) == 0) || isHeadResp
 | 
						
						
						
							|  |  | 		err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						
						
						
							|  |  | 			streamID:      rws.stream.id,
 | 
						
						
						
							|  |  | 			httpResCode:   rws.status,
 | 
						
						
						
							|  |  | 			h:             rws.snapHeader,
 | 
						
						
						
							|  |  | 			endStream:     endStream,
 | 
						
						
						
							|  |  | 			contentType:   ctype,
 | 
						
						
						
							|  |  | 			contentLength: clen,
 | 
						
						
						
							|  |  | 			date:          date,
 | 
						
						
						
							|  |  | 		})
 | 
						
						
						
							|  |  | 		if err != nil {
 | 
						
						
						
							|  |  | 			rws.dirty = true
 | 
						
						
						
							|  |  | 			return 0, err
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if endStream {
 | 
						
						
						
							|  |  | 			return 0, nil
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if isHeadResp {
 | 
						
						
						
							|  |  | 		return len(p), nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if len(p) == 0 && !rws.handlerDone {
 | 
						
						
						
							|  |  | 		return 0, nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// only send trailers if they have actually been defined by the
 | 
						
						
						
							|  |  | 	// server handler.
 | 
						
						
						
							|  |  | 	hasNonemptyTrailers := rws.hasNonemptyTrailers()
 | 
						
						
						
							|  |  | 	endStream := rws.handlerDone && !hasNonemptyTrailers
 | 
						
						
						
							|  |  | 	if len(p) > 0 || endStream {
 | 
						
						
						
							|  |  | 		// only send a 0 byte DATA frame if we're ending the stream.
 | 
						
						
						
							|  |  | 		if err := rws.conn.writeDataFromHandler(rws.stream, p, endStream); err != nil {
 | 
						
						
						
							|  |  | 			rws.dirty = true
 | 
						
						
						
							|  |  | 			return 0, err
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if rws.handlerDone && hasNonemptyTrailers {
 | 
						
						
						
							|  |  | 		err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						
						
						
							|  |  | 			streamID:  rws.stream.id,
 | 
						
						
						
							|  |  | 			h:         rws.handlerHeader,
 | 
						
						
						
							|  |  | 			trailers:  rws.trailers,
 | 
						
						
						
							|  |  | 			endStream: true,
 | 
						
						
						
							|  |  | 		})
 | 
						
						
						
							|  |  | 		if err != nil {
 | 
						
						
						
							|  |  | 			rws.dirty = true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		return len(p), err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return len(p), nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // TrailerPrefix is a magic prefix for ResponseWriter.Header map keys
 | 
						
						
						
							|  |  | // that, if present, signals that the map entry is actually for
 | 
						
						
						
							|  |  | // the response trailers, and not the response headers. The prefix
 | 
						
						
						
							|  |  | // is stripped after the ServeHTTP call finishes and the values are
 | 
						
						
						
							|  |  | // sent in the trailers.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // This mechanism is intended only for trailers that are not known
 | 
						
						
						
							|  |  | // prior to the headers being written. If the set of trailers is fixed
 | 
						
						
						
							|  |  | // or known before the header is written, the normal Go trailers mechanism
 | 
						
						
						
							|  |  | // is preferred:
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | //	https://golang.org/pkg/net/http/#ResponseWriter
 | 
						
						
						
							|  |  | //	https://golang.org/pkg/net/http/#example_ResponseWriter_trailers
 | 
						
						
						
							|  |  | const TrailerPrefix = "Trailer:"
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // promoteUndeclaredTrailers permits http.Handlers to set trailers
 | 
						
						
						
							|  |  | // after the header has already been flushed. Because the Go
 | 
						
						
						
							|  |  | // ResponseWriter interface has no way to set Trailers (only the
 | 
						
						
						
							|  |  | // Header), and because we didn't want to expand the ResponseWriter
 | 
						
						
						
							|  |  | // interface, and because nobody used trailers, and because RFC 7230
 | 
						
						
						
							|  |  | // says you SHOULD (but not must) predeclare any trailers in the
 | 
						
						
						
							|  |  | // header, the official ResponseWriter rules said trailers in Go must
 | 
						
						
						
							|  |  | // be predeclared, and then we reuse the same ResponseWriter.Header()
 | 
						
						
						
							|  |  | // map to mean both Headers and Trailers. When it's time to write the
 | 
						
						
						
							|  |  | // Trailers, we pick out the fields of Headers that were declared as
 | 
						
						
						
							|  |  | // trailers. That worked for a while, until we found the first major
 | 
						
						
						
							|  |  | // user of Trailers in the wild: gRPC (using them only over http2),
 | 
						
						
						
							|  |  | // and gRPC libraries permit setting trailers mid-stream without
 | 
						
						
						
							|  |  | // predeclaring them. So: change of plans. We still permit the old
 | 
						
						
						
							|  |  | // way, but we also permit this hack: if a Header() key begins with
 | 
						
						
						
							|  |  | // "Trailer:", the suffix of that key is a Trailer. Because ':' is an
 | 
						
						
						
							|  |  | // invalid token byte anyway, there is no ambiguity. (And it's already
 | 
						
						
						
							|  |  | // filtered out) It's mildly hacky, but not terrible.
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // This method runs after the Handler is done and promotes any Header
 | 
						
						
						
							|  |  | // fields to be trailers.
 | 
						
						
						
							|  |  | func (rws *responseWriterState) promoteUndeclaredTrailers() {
 | 
						
						
						
							|  |  | 	for k, vv := range rws.handlerHeader {
 | 
						
						
						
							|  |  | 		if !strings.HasPrefix(k, TrailerPrefix) {
 | 
						
						
						
							|  |  | 			continue
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		trailerKey := strings.TrimPrefix(k, TrailerPrefix)
 | 
						
						
						
							|  |  | 		rws.declareTrailer(trailerKey)
 | 
						
						
						
							|  |  | 		rws.handlerHeader[http.CanonicalHeaderKey(trailerKey)] = vv
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if len(rws.trailers) > 1 {
 | 
						
						
						
							|  |  | 		sorter := sorterPool.Get().(*sorter)
 | 
						
						
						
							|  |  | 		sorter.SortStrings(rws.trailers)
 | 
						
						
						
							|  |  | 		sorterPool.Put(sorter)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) SetReadDeadline(deadline time.Time) error {
 | 
						
						
						
							|  |  | 	st := w.rws.stream
 | 
						
						
						
							|  |  | 	if !deadline.IsZero() && deadline.Before(time.Now()) {
 | 
						
						
						
							|  |  | 		// If we're setting a deadline in the past, reset the stream immediately
 | 
						
						
						
							|  |  | 		// so writes after SetWriteDeadline returns will fail.
 | 
						
						
						
							|  |  | 		st.onReadTimeout()
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	w.rws.conn.sendServeMsg(func(sc *serverConn) {
 | 
						
						
						
							|  |  | 		if st.readDeadline != nil {
 | 
						
						
						
							|  |  | 			if !st.readDeadline.Stop() {
 | 
						
						
						
							|  |  | 				// Deadline already exceeded, or stream has been closed.
 | 
						
						
						
							|  |  | 				return
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if deadline.IsZero() {
 | 
						
						
						
							|  |  | 			st.readDeadline = nil
 | 
						
						
						
							|  |  | 		} else if st.readDeadline == nil {
 | 
						
						
						
							|  |  | 			st.readDeadline = time.AfterFunc(deadline.Sub(time.Now()), st.onReadTimeout)
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			st.readDeadline.Reset(deadline.Sub(time.Now()))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) SetWriteDeadline(deadline time.Time) error {
 | 
						
						
						
							|  |  | 	st := w.rws.stream
 | 
						
						
						
							|  |  | 	if !deadline.IsZero() && deadline.Before(time.Now()) {
 | 
						
						
						
							|  |  | 		// If we're setting a deadline in the past, reset the stream immediately
 | 
						
						
						
							|  |  | 		// so writes after SetWriteDeadline returns will fail.
 | 
						
						
						
							|  |  | 		st.onWriteTimeout()
 | 
						
						
						
							|  |  | 		return nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	w.rws.conn.sendServeMsg(func(sc *serverConn) {
 | 
						
						
						
							|  |  | 		if st.writeDeadline != nil {
 | 
						
						
						
							|  |  | 			if !st.writeDeadline.Stop() {
 | 
						
						
						
							|  |  | 				// Deadline already exceeded, or stream has been closed.
 | 
						
						
						
							|  |  | 				return
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if deadline.IsZero() {
 | 
						
						
						
							|  |  | 			st.writeDeadline = nil
 | 
						
						
						
							|  |  | 		} else if st.writeDeadline == nil {
 | 
						
						
						
							|  |  | 			st.writeDeadline = time.AfterFunc(deadline.Sub(time.Now()), st.onWriteTimeout)
 | 
						
						
						
							|  |  | 		} else {
 | 
						
						
						
							|  |  | 			st.writeDeadline.Reset(deadline.Sub(time.Now()))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) Flush() {
 | 
						
						
						
							|  |  | 	w.FlushError()
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) FlushError() error {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	if rws == nil {
 | 
						
						
						
							|  |  | 		panic("Header called after Handler finished")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	var err error
 | 
						
						
						
							|  |  | 	if rws.bw.Buffered() > 0 {
 | 
						
						
						
							|  |  | 		err = rws.bw.Flush()
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		// The bufio.Writer won't call chunkWriter.Write
 | 
						
						
						
							|  |  | 		// (writeChunk with zero bytes, so we have to do it
 | 
						
						
						
							|  |  | 		// ourselves to force the HTTP response header and/or
 | 
						
						
						
							|  |  | 		// final DATA frame (with END_STREAM) to be sent.
 | 
						
						
						
							|  |  | 		_, err = chunkWriter{rws}.Write(nil)
 | 
						
						
						
							|  |  | 		if err == nil {
 | 
						
						
						
							|  |  | 			select {
 | 
						
						
						
							|  |  | 			case <-rws.stream.cw:
 | 
						
						
						
							|  |  | 				err = rws.stream.closeErr
 | 
						
						
						
							|  |  | 			default:
 | 
						
						
						
							|  |  | 			}
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return err
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) CloseNotify() <-chan bool {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	if rws == nil {
 | 
						
						
						
							|  |  | 		panic("CloseNotify called after Handler finished")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	rws.closeNotifierMu.Lock()
 | 
						
						
						
							|  |  | 	ch := rws.closeNotifierCh
 | 
						
						
						
							|  |  | 	if ch == nil {
 | 
						
						
						
							|  |  | 		ch = make(chan bool, 1)
 | 
						
						
						
							|  |  | 		rws.closeNotifierCh = ch
 | 
						
						
						
							|  |  | 		cw := rws.stream.cw
 | 
						
						
						
							|  |  | 		go func() {
 | 
						
						
						
							|  |  | 			cw.Wait() // wait for close
 | 
						
						
						
							|  |  | 			ch <- true
 | 
						
						
						
							|  |  | 		}()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	rws.closeNotifierMu.Unlock()
 | 
						
						
						
							|  |  | 	return ch
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) Header() http.Header {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	if rws == nil {
 | 
						
						
						
							|  |  | 		panic("Header called after Handler finished")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if rws.handlerHeader == nil {
 | 
						
						
						
							|  |  | 		rws.handlerHeader = make(http.Header)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return rws.handlerHeader
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // checkWriteHeaderCode is a copy of net/http's checkWriteHeaderCode.
 | 
						
						
						
							|  |  | func checkWriteHeaderCode(code int) {
 | 
						
						
						
							|  |  | 	// Issue 22880: require valid WriteHeader status codes.
 | 
						
						
						
							|  |  | 	// For now we only enforce that it's three digits.
 | 
						
						
						
							|  |  | 	// In the future we might block things over 599 (600 and above aren't defined
 | 
						
						
						
							|  |  | 	// at http://httpwg.org/specs/rfc7231.html#status.codes).
 | 
						
						
						
							|  |  | 	// But for now any three digits.
 | 
						
						
						
							|  |  | 	//
 | 
						
						
						
							|  |  | 	// We used to send "HTTP/1.1 000 0" on the wire in responses but there's
 | 
						
						
						
							|  |  | 	// no equivalent bogus thing we can realistically send in HTTP/2,
 | 
						
						
						
							|  |  | 	// so we'll consistently panic instead and help people find their bugs
 | 
						
						
						
							|  |  | 	// early. (We can't return an error from WriteHeader even if we wanted to.)
 | 
						
						
						
							|  |  | 	if code < 100 || code > 999 {
 | 
						
						
						
							|  |  | 		panic(fmt.Sprintf("invalid WriteHeader code %v", code))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) WriteHeader(code int) {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	if rws == nil {
 | 
						
						
						
							|  |  | 		panic("WriteHeader called after Handler finished")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	rws.writeHeader(code)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (rws *responseWriterState) writeHeader(code int) {
 | 
						
						
						
							|  |  | 	if rws.wroteHeader {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	checkWriteHeaderCode(code)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Handle informational headers
 | 
						
						
						
							|  |  | 	if code >= 100 && code <= 199 {
 | 
						
						
						
							|  |  | 		// Per RFC 8297 we must not clear the current header map
 | 
						
						
						
							|  |  | 		h := rws.handlerHeader
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		_, cl := h["Content-Length"]
 | 
						
						
						
							|  |  | 		_, te := h["Transfer-Encoding"]
 | 
						
						
						
							|  |  | 		if cl || te {
 | 
						
						
						
							|  |  | 			h = h.Clone()
 | 
						
						
						
							|  |  | 			h.Del("Content-Length")
 | 
						
						
						
							|  |  | 			h.Del("Transfer-Encoding")
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		if rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						
						
						
							|  |  | 			streamID:    rws.stream.id,
 | 
						
						
						
							|  |  | 			httpResCode: code,
 | 
						
						
						
							|  |  | 			h:           h,
 | 
						
						
						
							|  |  | 			endStream:   rws.handlerDone && !rws.hasTrailers(),
 | 
						
						
						
							|  |  | 		}) != nil {
 | 
						
						
						
							|  |  | 			rws.dirty = true
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	rws.wroteHeader = true
 | 
						
						
						
							|  |  | 	rws.status = code
 | 
						
						
						
							|  |  | 	if len(rws.handlerHeader) > 0 {
 | 
						
						
						
							|  |  | 		rws.snapHeader = cloneHeader(rws.handlerHeader)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func cloneHeader(h http.Header) http.Header {
 | 
						
						
						
							|  |  | 	h2 := make(http.Header, len(h))
 | 
						
						
						
							|  |  | 	for k, vv := range h {
 | 
						
						
						
							|  |  | 		vv2 := make([]string, len(vv))
 | 
						
						
						
							|  |  | 		copy(vv2, vv)
 | 
						
						
						
							|  |  | 		h2[k] = vv2
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return h2
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // The Life Of A Write is like this:
 | 
						
						
						
							|  |  | //
 | 
						
						
						
							|  |  | // * Handler calls w.Write or w.WriteString ->
 | 
						
						
						
							|  |  | // * -> rws.bw (*bufio.Writer) ->
 | 
						
						
						
							|  |  | // * (Handler might call Flush)
 | 
						
						
						
							|  |  | // * -> chunkWriter{rws}
 | 
						
						
						
							|  |  | // * -> responseWriterState.writeChunk(p []byte)
 | 
						
						
						
							|  |  | // * -> responseWriterState.writeChunk (most of the magic; see comment there)
 | 
						
						
						
							|  |  | func (w *responseWriter) Write(p []byte) (n int, err error) {
 | 
						
						
						
							|  |  | 	return w.write(len(p), p, "")
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) WriteString(s string) (n int, err error) {
 | 
						
						
						
							|  |  | 	return w.write(len(s), nil, s)
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // either dataB or dataS is non-zero.
 | 
						
						
						
							|  |  | func (w *responseWriter) write(lenData int, dataB []byte, dataS string) (n int, err error) {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	if rws == nil {
 | 
						
						
						
							|  |  | 		panic("Write called after Handler finished")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if !rws.wroteHeader {
 | 
						
						
						
							|  |  | 		w.WriteHeader(200)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if !bodyAllowedForStatus(rws.status) {
 | 
						
						
						
							|  |  | 		return 0, http.ErrBodyNotAllowed
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	rws.wroteBytes += int64(len(dataB)) + int64(len(dataS)) // only one can be set
 | 
						
						
						
							|  |  | 	if rws.sentContentLen != 0 && rws.wroteBytes > rws.sentContentLen {
 | 
						
						
						
							|  |  | 		// TODO: send a RST_STREAM
 | 
						
						
						
							|  |  | 		return 0, errors.New("http2: handler wrote more than declared Content-Length")
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if dataB != nil {
 | 
						
						
						
							|  |  | 		return rws.bw.Write(dataB)
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		return rws.bw.WriteString(dataS)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) handlerDone() {
 | 
						
						
						
							|  |  | 	rws := w.rws
 | 
						
						
						
							|  |  | 	dirty := rws.dirty
 | 
						
						
						
							|  |  | 	rws.handlerDone = true
 | 
						
						
						
							|  |  | 	w.Flush()
 | 
						
						
						
							|  |  | 	w.rws = nil
 | 
						
						
						
							|  |  | 	if !dirty {
 | 
						
						
						
							|  |  | 		// Only recycle the pool if all prior Write calls to
 | 
						
						
						
							|  |  | 		// the serverConn goroutine completed successfully. If
 | 
						
						
						
							|  |  | 		// they returned earlier due to resets from the peer
 | 
						
						
						
							|  |  | 		// there might still be write goroutines outstanding
 | 
						
						
						
							|  |  | 		// from the serverConn referencing the rws memory. See
 | 
						
						
						
							|  |  | 		// issue 20704.
 | 
						
						
						
							|  |  | 		responseWriterStatePool.Put(rws)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // Push errors.
 | 
						
						
						
							|  |  | var (
 | 
						
						
						
							|  |  | 	ErrRecursivePush    = errors.New("http2: recursive push not allowed")
 | 
						
						
						
							|  |  | 	ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
 | 
						
						
						
							|  |  | )
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | var _ http.Pusher = (*responseWriter)(nil)
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (w *responseWriter) Push(target string, opts *http.PushOptions) error {
 | 
						
						
						
							|  |  | 	st := w.rws.stream
 | 
						
						
						
							|  |  | 	sc := st.sc
 | 
						
						
						
							|  |  | 	sc.serveG.checkNotOn()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// No recursive pushes: "PUSH_PROMISE frames MUST only be sent on a peer-initiated stream."
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-6.6
 | 
						
						
						
							|  |  | 	if st.isPushed() {
 | 
						
						
						
							|  |  | 		return ErrRecursivePush
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	if opts == nil {
 | 
						
						
						
							|  |  | 		opts = new(http.PushOptions)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Default options.
 | 
						
						
						
							|  |  | 	if opts.Method == "" {
 | 
						
						
						
							|  |  | 		opts.Method = "GET"
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if opts.Header == nil {
 | 
						
						
						
							|  |  | 		opts.Header = http.Header{}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	wantScheme := "http"
 | 
						
						
						
							|  |  | 	if w.rws.req.TLS != nil {
 | 
						
						
						
							|  |  | 		wantScheme = "https"
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// Validate the request.
 | 
						
						
						
							|  |  | 	u, err := url.Parse(target)
 | 
						
						
						
							|  |  | 	if err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if u.Scheme == "" {
 | 
						
						
						
							|  |  | 		if !strings.HasPrefix(target, "/") {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("target must be an absolute URL or an absolute path: %q", target)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		u.Scheme = wantScheme
 | 
						
						
						
							|  |  | 		u.Host = w.rws.req.Host
 | 
						
						
						
							|  |  | 	} else {
 | 
						
						
						
							|  |  | 		if u.Scheme != wantScheme {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("cannot push URL with scheme %q from request with scheme %q", u.Scheme, wantScheme)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		if u.Host == "" {
 | 
						
						
						
							|  |  | 			return errors.New("URL must have a host")
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	for k := range opts.Header {
 | 
						
						
						
							|  |  | 		if strings.HasPrefix(k, ":") {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("promised request headers cannot include pseudo header %q", k)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		// These headers are meaningful only if the request has a body,
 | 
						
						
						
							|  |  | 		// but PUSH_PROMISE requests cannot have a body.
 | 
						
						
						
							|  |  | 		// http://tools.ietf.org/html/rfc7540#section-8.2
 | 
						
						
						
							|  |  | 		// Also disallow Host, since the promised URL must be absolute.
 | 
						
						
						
							|  |  | 		if asciiEqualFold(k, "content-length") ||
 | 
						
						
						
							|  |  | 			asciiEqualFold(k, "content-encoding") ||
 | 
						
						
						
							|  |  | 			asciiEqualFold(k, "trailer") ||
 | 
						
						
						
							|  |  | 			asciiEqualFold(k, "te") ||
 | 
						
						
						
							|  |  | 			asciiEqualFold(k, "expect") ||
 | 
						
						
						
							|  |  | 			asciiEqualFold(k, "host") {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("promised request headers cannot include %q", k)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if err := checkValidHTTP2RequestHeaders(opts.Header); err != nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// The RFC effectively limits promised requests to GET and HEAD:
 | 
						
						
						
							|  |  | 	// "Promised requests MUST be cacheable [GET, HEAD, or POST], and MUST be safe [GET or HEAD]"
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-8.2
 | 
						
						
						
							|  |  | 	if opts.Method != "GET" && opts.Method != "HEAD" {
 | 
						
						
						
							|  |  | 		return fmt.Errorf("method %q must be GET or HEAD", opts.Method)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	msg := &startPushRequest{
 | 
						
						
						
							|  |  | 		parent: st,
 | 
						
						
						
							|  |  | 		method: opts.Method,
 | 
						
						
						
							|  |  | 		url:    u,
 | 
						
						
						
							|  |  | 		header: cloneHeader(opts.Header),
 | 
						
						
						
							|  |  | 		done:   errChanPool.Get().(chan error),
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 		return errClientDisconnected
 | 
						
						
						
							|  |  | 	case <-st.cw:
 | 
						
						
						
							|  |  | 		return errStreamClosed
 | 
						
						
						
							|  |  | 	case sc.serveMsgCh <- msg:
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	select {
 | 
						
						
						
							|  |  | 	case <-sc.doneServing:
 | 
						
						
						
							|  |  | 		return errClientDisconnected
 | 
						
						
						
							|  |  | 	case <-st.cw:
 | 
						
						
						
							|  |  | 		return errStreamClosed
 | 
						
						
						
							|  |  | 	case err := <-msg.done:
 | 
						
						
						
							|  |  | 		errChanPool.Put(msg.done)
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | type startPushRequest struct {
 | 
						
						
						
							|  |  | 	parent *stream
 | 
						
						
						
							|  |  | 	method string
 | 
						
						
						
							|  |  | 	url    *url.URL
 | 
						
						
						
							|  |  | 	header http.Header
 | 
						
						
						
							|  |  | 	done   chan error
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) startPush(msg *startPushRequest) {
 | 
						
						
						
							|  |  | 	sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-6.6.
 | 
						
						
						
							|  |  | 	// PUSH_PROMISE frames MUST only be sent on a peer-initiated stream that
 | 
						
						
						
							|  |  | 	// is in either the "open" or "half-closed (remote)" state.
 | 
						
						
						
							|  |  | 	if msg.parent.state != stateOpen && msg.parent.state != stateHalfClosedRemote {
 | 
						
						
						
							|  |  | 		// responseWriter.Push checks that the stream is peer-initiated.
 | 
						
						
						
							|  |  | 		msg.done <- errStreamClosed
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// http://tools.ietf.org/html/rfc7540#section-6.6.
 | 
						
						
						
							|  |  | 	if !sc.pushEnabled {
 | 
						
						
						
							|  |  | 		msg.done <- http.ErrNotSupported
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	// PUSH_PROMISE frames must be sent in increasing order by stream ID, so
 | 
						
						
						
							|  |  | 	// we allocate an ID for the promised stream lazily, when the PUSH_PROMISE
 | 
						
						
						
							|  |  | 	// is written. Once the ID is allocated, we start the request handler.
 | 
						
						
						
							|  |  | 	allocatePromisedID := func() (uint32, error) {
 | 
						
						
						
							|  |  | 		sc.serveG.check()
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// Check this again, just in case. Technically, we might have received
 | 
						
						
						
							|  |  | 		// an updated SETTINGS by the time we got around to writing this frame.
 | 
						
						
						
							|  |  | 		if !sc.pushEnabled {
 | 
						
						
						
							|  |  | 			return 0, http.ErrNotSupported
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		// http://tools.ietf.org/html/rfc7540#section-6.5.2.
 | 
						
						
						
							|  |  | 		if sc.curPushedStreams+1 > sc.clientMaxStreams {
 | 
						
						
						
							|  |  | 			return 0, ErrPushLimitReached
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// http://tools.ietf.org/html/rfc7540#section-5.1.1.
 | 
						
						
						
							|  |  | 		// Streams initiated by the server MUST use even-numbered identifiers.
 | 
						
						
						
							|  |  | 		// A server that is unable to establish a new stream identifier can send a GOAWAY
 | 
						
						
						
							|  |  | 		// frame so that the client is forced to open a new connection for new streams.
 | 
						
						
						
							|  |  | 		if sc.maxPushPromiseID+2 >= 1<<31 {
 | 
						
						
						
							|  |  | 			sc.startGracefulShutdownInternal()
 | 
						
						
						
							|  |  | 			return 0, ErrPushLimitReached
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 		sc.maxPushPromiseID += 2
 | 
						
						
						
							|  |  | 		promisedID := sc.maxPushPromiseID
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		// http://tools.ietf.org/html/rfc7540#section-8.2.
 | 
						
						
						
							|  |  | 		// Strictly speaking, the new stream should start in "reserved (local)", then
 | 
						
						
						
							|  |  | 		// transition to "half closed (remote)" after sending the initial HEADERS, but
 | 
						
						
						
							|  |  | 		// we start in "half closed (remote)" for simplicity.
 | 
						
						
						
							|  |  | 		// See further comments at the definition of stateHalfClosedRemote.
 | 
						
						
						
							|  |  | 		promised := sc.newStream(promisedID, msg.parent.id, stateHalfClosedRemote)
 | 
						
						
						
							|  |  | 		rw, req, err := sc.newWriterAndRequestNoBody(promised, requestParam{
 | 
						
						
						
							|  |  | 			method:    msg.method,
 | 
						
						
						
							|  |  | 			scheme:    msg.url.Scheme,
 | 
						
						
						
							|  |  | 			authority: msg.url.Host,
 | 
						
						
						
							|  |  | 			path:      msg.url.RequestURI(),
 | 
						
						
						
							|  |  | 			header:    cloneHeader(msg.header), // clone since handler runs concurrently with writing the PUSH_PROMISE
 | 
						
						
						
							|  |  | 		})
 | 
						
						
						
							|  |  | 		if err != nil {
 | 
						
						
						
							|  |  | 			// Should not happen, since we've already validated msg.url.
 | 
						
						
						
							|  |  | 			panic(fmt.Sprintf("newWriterAndRequestNoBody(%+v): %v", msg.url, err))
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 		go sc.runHandler(rw, req, sc.handler.ServeHTTP)
 | 
						
						
						
							|  |  | 		return promisedID, nil
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | 	sc.writeFrame(FrameWriteRequest{
 | 
						
						
						
							|  |  | 		write: &writePushPromise{
 | 
						
						
						
							|  |  | 			streamID:           msg.parent.id,
 | 
						
						
						
							|  |  | 			method:             msg.method,
 | 
						
						
						
							|  |  | 			url:                msg.url,
 | 
						
						
						
							|  |  | 			h:                  msg.header,
 | 
						
						
						
							|  |  | 			allocatePromisedID: allocatePromisedID,
 | 
						
						
						
							|  |  | 		},
 | 
						
						
						
							|  |  | 		stream: msg.parent,
 | 
						
						
						
							|  |  | 		done:   msg.done,
 | 
						
						
						
							|  |  | 	})
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // foreachHeaderElement splits v according to the "#rule" construction
 | 
						
						
						
							|  |  | // in RFC 7230 section 7 and calls fn for each non-empty element.
 | 
						
						
						
							|  |  | func foreachHeaderElement(v string, fn func(string)) {
 | 
						
						
						
							|  |  | 	v = textproto.TrimString(v)
 | 
						
						
						
							|  |  | 	if v == "" {
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if !strings.Contains(v, ",") {
 | 
						
						
						
							|  |  | 		fn(v)
 | 
						
						
						
							|  |  | 		return
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	for _, f := range strings.Split(v, ",") {
 | 
						
						
						
							|  |  | 		if f = textproto.TrimString(f); f != "" {
 | 
						
						
						
							|  |  | 			fn(f)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // From http://httpwg.org/specs/rfc7540.html#rfc.section.8.1.2.2
 | 
						
						
						
							|  |  | var connHeaders = []string{
 | 
						
						
						
							|  |  | 	"Connection",
 | 
						
						
						
							|  |  | 	"Keep-Alive",
 | 
						
						
						
							|  |  | 	"Proxy-Connection",
 | 
						
						
						
							|  |  | 	"Transfer-Encoding",
 | 
						
						
						
							|  |  | 	"Upgrade",
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // checkValidHTTP2RequestHeaders checks whether h is a valid HTTP/2 request,
 | 
						
						
						
							|  |  | // per RFC 7540 Section 8.1.2.2.
 | 
						
						
						
							|  |  | // The returned error is reported to users.
 | 
						
						
						
							|  |  | func checkValidHTTP2RequestHeaders(h http.Header) error {
 | 
						
						
						
							|  |  | 	for _, k := range connHeaders {
 | 
						
						
						
							|  |  | 		if _, ok := h[k]; ok {
 | 
						
						
						
							|  |  | 			return fmt.Errorf("request header %q is not valid in HTTP/2", k)
 | 
						
						
						
							|  |  | 		}
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	te := h["Te"]
 | 
						
						
						
							|  |  | 	if len(te) > 0 && (len(te) > 1 || (te[0] != "trailers" && te[0] != "")) {
 | 
						
						
						
							|  |  | 		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return nil
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func new400Handler(err error) http.HandlerFunc {
 | 
						
						
						
							|  |  | 	return func(w http.ResponseWriter, r *http.Request) {
 | 
						
						
						
							|  |  | 		http.Error(w, err.Error(), http.StatusBadRequest)
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | // h1ServerKeepAlivesDisabled reports whether hs has its keep-alives
 | 
						
						
						
							|  |  | // disabled. See comments on h1ServerShutdownChan above for why
 | 
						
						
						
							|  |  | // the code is written this way.
 | 
						
						
						
							|  |  | func h1ServerKeepAlivesDisabled(hs *http.Server) bool {
 | 
						
						
						
							|  |  | 	var x interface{} = hs
 | 
						
						
						
							|  |  | 	type I interface {
 | 
						
						
						
							|  |  | 		doKeepAlives() bool
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	if hs, ok := x.(I); ok {
 | 
						
						
						
							|  |  | 		return !hs.doKeepAlives()
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	return false
 | 
						
						
						
							|  |  | }
 | 
						
						
						
							|  |  | 
 | 
						
						
						
							|  |  | func (sc *serverConn) countError(name string, err error) error {
 | 
						
						
						
							|  |  | 	if sc == nil || sc.srv == nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	f := sc.srv.CountError
 | 
						
						
						
							|  |  | 	if f == nil {
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	var typ string
 | 
						
						
						
							|  |  | 	var code ErrCode
 | 
						
						
						
							|  |  | 	switch e := err.(type) {
 | 
						
						
						
							|  |  | 	case ConnectionError:
 | 
						
						
						
							|  |  | 		typ = "conn"
 | 
						
						
						
							|  |  | 		code = ErrCode(e)
 | 
						
						
						
							|  |  | 	case StreamError:
 | 
						
						
						
							|  |  | 		typ = "stream"
 | 
						
						
						
							|  |  | 		code = ErrCode(e.Code)
 | 
						
						
						
							|  |  | 	default:
 | 
						
						
						
							|  |  | 		return err
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	codeStr := errCodeName[code]
 | 
						
						
						
							|  |  | 	if codeStr == "" {
 | 
						
						
						
							|  |  | 		codeStr = strconv.Itoa(int(code))
 | 
						
						
						
							|  |  | 	}
 | 
						
						
						
							|  |  | 	f(fmt.Sprintf("%s_%s_%s", typ, codeStr, name))
 | 
						
						
						
							|  |  | 	return err
 | 
						
						
						
							|  |  | }
 |