mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-11-04 00:52:25 -06:00 
			
		
		
		
	Bumps [golang.org/x/net](https://github.com/golang/net) from 0.25.0 to 0.26.0. - [Commits](https://github.com/golang/net/compare/v0.25.0...v0.26.0) --- updated-dependencies: - dependency-name: golang.org/x/net dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
		
			
				
	
	
		
			3326 lines
		
	
	
	
		
			102 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			3326 lines
		
	
	
	
		
			102 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2014 The Go Authors. All rights reserved.
 | 
						||
// Use of this source code is governed by a BSD-style
 | 
						||
// license that can be found in the LICENSE file.
 | 
						||
 | 
						||
// TODO: turn off the serve goroutine when idle, so
 | 
						||
// an idle conn only has the readFrames goroutine active. (which could
 | 
						||
// also be optimized probably to pin less memory in crypto/tls). This
 | 
						||
// would involve tracking when the serve goroutine is active (atomic
 | 
						||
// int32 read/CAS probably?) and starting it up when frames arrive,
 | 
						||
// and shutting it down when all handlers exit. the occasional PING
 | 
						||
// packets could use time.AfterFunc to call sc.wakeStartServeLoop()
 | 
						||
// (which is a no-op if already running) and then queue the PING write
 | 
						||
// as normal. The serve loop would then exit in most cases (if no
 | 
						||
// Handlers running) and not be woken up again until the PING packet
 | 
						||
// returns.
 | 
						||
 | 
						||
// TODO (maybe): add a mechanism for Handlers to going into
 | 
						||
// half-closed-local mode (rw.(io.Closer) test?) but not exit their
 | 
						||
// handler, and continue to be able to read from the
 | 
						||
// Request.Body. This would be a somewhat semantic change from HTTP/1
 | 
						||
// (or at least what we expose in net/http), so I'd probably want to
 | 
						||
// add it there too. For now, this package says that returning from
 | 
						||
// the Handler ServeHTTP function means you're both done reading and
 | 
						||
// done writing, without a way to stop just one or the other.
 | 
						||
 | 
						||
package http2
 | 
						||
 | 
						||
import (
 | 
						||
	"bufio"
 | 
						||
	"bytes"
 | 
						||
	"context"
 | 
						||
	"crypto/tls"
 | 
						||
	"errors"
 | 
						||
	"fmt"
 | 
						||
	"io"
 | 
						||
	"log"
 | 
						||
	"math"
 | 
						||
	"net"
 | 
						||
	"net/http"
 | 
						||
	"net/textproto"
 | 
						||
	"net/url"
 | 
						||
	"os"
 | 
						||
	"reflect"
 | 
						||
	"runtime"
 | 
						||
	"strconv"
 | 
						||
	"strings"
 | 
						||
	"sync"
 | 
						||
	"time"
 | 
						||
 | 
						||
	"golang.org/x/net/http/httpguts"
 | 
						||
	"golang.org/x/net/http2/hpack"
 | 
						||
)
 | 
						||
 | 
						||
const (
 | 
						||
	prefaceTimeout         = 10 * time.Second
 | 
						||
	firstSettingsTimeout   = 2 * time.Second // should be in-flight with preface anyway
 | 
						||
	handlerChunkWriteSize  = 4 << 10
 | 
						||
	defaultMaxStreams      = 250 // TODO: make this 100 as the GFE seems to?
 | 
						||
	maxQueuedControlFrames = 10000
 | 
						||
)
 | 
						||
 | 
						||
var (
 | 
						||
	errClientDisconnected = errors.New("client disconnected")
 | 
						||
	errClosedBody         = errors.New("body closed by handler")
 | 
						||
	errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
 | 
						||
	errStreamClosed       = errors.New("http2: stream closed")
 | 
						||
)
 | 
						||
 | 
						||
var responseWriterStatePool = sync.Pool{
 | 
						||
	New: func() interface{} {
 | 
						||
		rws := &responseWriterState{}
 | 
						||
		rws.bw = bufio.NewWriterSize(chunkWriter{rws}, handlerChunkWriteSize)
 | 
						||
		return rws
 | 
						||
	},
 | 
						||
}
 | 
						||
 | 
						||
// Test hooks.
 | 
						||
var (
 | 
						||
	testHookOnConn        func()
 | 
						||
	testHookGetServerConn func(*serverConn)
 | 
						||
	testHookOnPanicMu     *sync.Mutex // nil except in tests
 | 
						||
	testHookOnPanic       func(sc *serverConn, panicVal interface{}) (rePanic bool)
 | 
						||
)
 | 
						||
 | 
						||
// Server is an HTTP/2 server.
 | 
						||
type Server struct {
 | 
						||
	// MaxHandlers limits the number of http.Handler ServeHTTP goroutines
 | 
						||
	// which may run at a time over all connections.
 | 
						||
	// Negative or zero no limit.
 | 
						||
	// TODO: implement
 | 
						||
	MaxHandlers int
 | 
						||
 | 
						||
	// MaxConcurrentStreams optionally specifies the number of
 | 
						||
	// concurrent streams that each client may have open at a
 | 
						||
	// time. This is unrelated to the number of http.Handler goroutines
 | 
						||
	// which may be active globally, which is MaxHandlers.
 | 
						||
	// If zero, MaxConcurrentStreams defaults to at least 100, per
 | 
						||
	// the HTTP/2 spec's recommendations.
 | 
						||
	MaxConcurrentStreams uint32
 | 
						||
 | 
						||
	// MaxDecoderHeaderTableSize optionally specifies the http2
 | 
						||
	// SETTINGS_HEADER_TABLE_SIZE to send in the initial settings frame. It
 | 
						||
	// informs the remote endpoint of the maximum size of the header compression
 | 
						||
	// table used to decode header blocks, in octets. If zero, the default value
 | 
						||
	// of 4096 is used.
 | 
						||
	MaxDecoderHeaderTableSize uint32
 | 
						||
 | 
						||
	// MaxEncoderHeaderTableSize optionally specifies an upper limit for the
 | 
						||
	// header compression table used for encoding request headers. Received
 | 
						||
	// SETTINGS_HEADER_TABLE_SIZE settings are capped at this limit. If zero,
 | 
						||
	// the default value of 4096 is used.
 | 
						||
	MaxEncoderHeaderTableSize uint32
 | 
						||
 | 
						||
	// MaxReadFrameSize optionally specifies the largest frame
 | 
						||
	// this server is willing to read. A valid value is between
 | 
						||
	// 16k and 16M, inclusive. If zero or otherwise invalid, a
 | 
						||
	// default value is used.
 | 
						||
	MaxReadFrameSize uint32
 | 
						||
 | 
						||
	// PermitProhibitedCipherSuites, if true, permits the use of
 | 
						||
	// cipher suites prohibited by the HTTP/2 spec.
 | 
						||
	PermitProhibitedCipherSuites bool
 | 
						||
 | 
						||
	// IdleTimeout specifies how long until idle clients should be
 | 
						||
	// closed with a GOAWAY frame. PING frames are not considered
 | 
						||
	// activity for the purposes of IdleTimeout.
 | 
						||
	// If zero or negative, there is no timeout.
 | 
						||
	IdleTimeout time.Duration
 | 
						||
 | 
						||
	// MaxUploadBufferPerConnection is the size of the initial flow
 | 
						||
	// control window for each connections. The HTTP/2 spec does not
 | 
						||
	// allow this to be smaller than 65535 or larger than 2^32-1.
 | 
						||
	// If the value is outside this range, a default value will be
 | 
						||
	// used instead.
 | 
						||
	MaxUploadBufferPerConnection int32
 | 
						||
 | 
						||
	// MaxUploadBufferPerStream is the size of the initial flow control
 | 
						||
	// window for each stream. The HTTP/2 spec does not allow this to
 | 
						||
	// be larger than 2^32-1. If the value is zero or larger than the
 | 
						||
	// maximum, a default value will be used instead.
 | 
						||
	MaxUploadBufferPerStream int32
 | 
						||
 | 
						||
	// NewWriteScheduler constructs a write scheduler for a connection.
 | 
						||
	// If nil, a default scheduler is chosen.
 | 
						||
	NewWriteScheduler func() WriteScheduler
 | 
						||
 | 
						||
	// CountError, if non-nil, is called on HTTP/2 server errors.
 | 
						||
	// It's intended to increment a metric for monitoring, such
 | 
						||
	// as an expvar or Prometheus metric.
 | 
						||
	// The errType consists of only ASCII word characters.
 | 
						||
	CountError func(errType string)
 | 
						||
 | 
						||
	// Internal state. This is a pointer (rather than embedded directly)
 | 
						||
	// so that we don't embed a Mutex in this struct, which will make the
 | 
						||
	// struct non-copyable, which might break some callers.
 | 
						||
	state *serverInternalState
 | 
						||
 | 
						||
	// Synchronization group used for testing.
 | 
						||
	// Outside of tests, this is nil.
 | 
						||
	group synctestGroupInterface
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) markNewGoroutine() {
 | 
						||
	if s.group != nil {
 | 
						||
		s.group.Join()
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) now() time.Time {
 | 
						||
	if s.group != nil {
 | 
						||
		return s.group.Now()
 | 
						||
	}
 | 
						||
	return time.Now()
 | 
						||
}
 | 
						||
 | 
						||
// newTimer creates a new time.Timer, or a synthetic timer in tests.
 | 
						||
func (s *Server) newTimer(d time.Duration) timer {
 | 
						||
	if s.group != nil {
 | 
						||
		return s.group.NewTimer(d)
 | 
						||
	}
 | 
						||
	return timeTimer{time.NewTimer(d)}
 | 
						||
}
 | 
						||
 | 
						||
// afterFunc creates a new time.AfterFunc timer, or a synthetic timer in tests.
 | 
						||
func (s *Server) afterFunc(d time.Duration, f func()) timer {
 | 
						||
	if s.group != nil {
 | 
						||
		return s.group.AfterFunc(d, f)
 | 
						||
	}
 | 
						||
	return timeTimer{time.AfterFunc(d, f)}
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) initialConnRecvWindowSize() int32 {
 | 
						||
	if s.MaxUploadBufferPerConnection >= initialWindowSize {
 | 
						||
		return s.MaxUploadBufferPerConnection
 | 
						||
	}
 | 
						||
	return 1 << 20
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) initialStreamRecvWindowSize() int32 {
 | 
						||
	if s.MaxUploadBufferPerStream > 0 {
 | 
						||
		return s.MaxUploadBufferPerStream
 | 
						||
	}
 | 
						||
	return 1 << 20
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) maxReadFrameSize() uint32 {
 | 
						||
	if v := s.MaxReadFrameSize; v >= minMaxFrameSize && v <= maxFrameSize {
 | 
						||
		return v
 | 
						||
	}
 | 
						||
	return defaultMaxReadFrameSize
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) maxConcurrentStreams() uint32 {
 | 
						||
	if v := s.MaxConcurrentStreams; v > 0 {
 | 
						||
		return v
 | 
						||
	}
 | 
						||
	return defaultMaxStreams
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) maxDecoderHeaderTableSize() uint32 {
 | 
						||
	if v := s.MaxDecoderHeaderTableSize; v > 0 {
 | 
						||
		return v
 | 
						||
	}
 | 
						||
	return initialHeaderTableSize
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) maxEncoderHeaderTableSize() uint32 {
 | 
						||
	if v := s.MaxEncoderHeaderTableSize; v > 0 {
 | 
						||
		return v
 | 
						||
	}
 | 
						||
	return initialHeaderTableSize
 | 
						||
}
 | 
						||
 | 
						||
// maxQueuedControlFrames is the maximum number of control frames like
 | 
						||
// SETTINGS, PING and RST_STREAM that will be queued for writing before
 | 
						||
// the connection is closed to prevent memory exhaustion attacks.
 | 
						||
func (s *Server) maxQueuedControlFrames() int {
 | 
						||
	// TODO: if anybody asks, add a Server field, and remember to define the
 | 
						||
	// behavior of negative values.
 | 
						||
	return maxQueuedControlFrames
 | 
						||
}
 | 
						||
 | 
						||
type serverInternalState struct {
 | 
						||
	mu          sync.Mutex
 | 
						||
	activeConns map[*serverConn]struct{}
 | 
						||
}
 | 
						||
 | 
						||
func (s *serverInternalState) registerConn(sc *serverConn) {
 | 
						||
	if s == nil {
 | 
						||
		return // if the Server was used without calling ConfigureServer
 | 
						||
	}
 | 
						||
	s.mu.Lock()
 | 
						||
	s.activeConns[sc] = struct{}{}
 | 
						||
	s.mu.Unlock()
 | 
						||
}
 | 
						||
 | 
						||
func (s *serverInternalState) unregisterConn(sc *serverConn) {
 | 
						||
	if s == nil {
 | 
						||
		return // if the Server was used without calling ConfigureServer
 | 
						||
	}
 | 
						||
	s.mu.Lock()
 | 
						||
	delete(s.activeConns, sc)
 | 
						||
	s.mu.Unlock()
 | 
						||
}
 | 
						||
 | 
						||
func (s *serverInternalState) startGracefulShutdown() {
 | 
						||
	if s == nil {
 | 
						||
		return // if the Server was used without calling ConfigureServer
 | 
						||
	}
 | 
						||
	s.mu.Lock()
 | 
						||
	for sc := range s.activeConns {
 | 
						||
		sc.startGracefulShutdown()
 | 
						||
	}
 | 
						||
	s.mu.Unlock()
 | 
						||
}
 | 
						||
 | 
						||
// ConfigureServer adds HTTP/2 support to a net/http Server.
 | 
						||
//
 | 
						||
// The configuration conf may be nil.
 | 
						||
//
 | 
						||
// ConfigureServer must be called before s begins serving.
 | 
						||
func ConfigureServer(s *http.Server, conf *Server) error {
 | 
						||
	if s == nil {
 | 
						||
		panic("nil *http.Server")
 | 
						||
	}
 | 
						||
	if conf == nil {
 | 
						||
		conf = new(Server)
 | 
						||
	}
 | 
						||
	conf.state = &serverInternalState{activeConns: make(map[*serverConn]struct{})}
 | 
						||
	if h1, h2 := s, conf; h2.IdleTimeout == 0 {
 | 
						||
		if h1.IdleTimeout != 0 {
 | 
						||
			h2.IdleTimeout = h1.IdleTimeout
 | 
						||
		} else {
 | 
						||
			h2.IdleTimeout = h1.ReadTimeout
 | 
						||
		}
 | 
						||
	}
 | 
						||
	s.RegisterOnShutdown(conf.state.startGracefulShutdown)
 | 
						||
 | 
						||
	if s.TLSConfig == nil {
 | 
						||
		s.TLSConfig = new(tls.Config)
 | 
						||
	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
 | 
						||
		// If they already provided a TLS 1.0–1.2 CipherSuite list, return an
 | 
						||
		// error if it is missing ECDHE_RSA_WITH_AES_128_GCM_SHA256 or
 | 
						||
		// ECDHE_ECDSA_WITH_AES_128_GCM_SHA256.
 | 
						||
		haveRequired := false
 | 
						||
		for _, cs := range s.TLSConfig.CipherSuites {
 | 
						||
			switch cs {
 | 
						||
			case tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
 | 
						||
				// Alternative MTI cipher to not discourage ECDSA-only servers.
 | 
						||
				// See http://golang.org/cl/30721 for further information.
 | 
						||
				tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
 | 
						||
				haveRequired = true
 | 
						||
			}
 | 
						||
		}
 | 
						||
		if !haveRequired {
 | 
						||
			return fmt.Errorf("http2: TLSConfig.CipherSuites is missing an HTTP/2-required AES_128_GCM_SHA256 cipher (need at least one of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 or TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256)")
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	// Note: not setting MinVersion to tls.VersionTLS12,
 | 
						||
	// as we don't want to interfere with HTTP/1.1 traffic
 | 
						||
	// on the user's server. We enforce TLS 1.2 later once
 | 
						||
	// we accept a connection. Ideally this should be done
 | 
						||
	// during next-proto selection, but using TLS <1.2 with
 | 
						||
	// HTTP/2 is still the client's bug.
 | 
						||
 | 
						||
	s.TLSConfig.PreferServerCipherSuites = true
 | 
						||
 | 
						||
	if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
 | 
						||
		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
 | 
						||
	}
 | 
						||
	if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
 | 
						||
		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
 | 
						||
	}
 | 
						||
 | 
						||
	if s.TLSNextProto == nil {
 | 
						||
		s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){}
 | 
						||
	}
 | 
						||
	protoHandler := func(hs *http.Server, c *tls.Conn, h http.Handler) {
 | 
						||
		if testHookOnConn != nil {
 | 
						||
			testHookOnConn()
 | 
						||
		}
 | 
						||
		// The TLSNextProto interface predates contexts, so
 | 
						||
		// the net/http package passes down its per-connection
 | 
						||
		// base context via an exported but unadvertised
 | 
						||
		// method on the Handler. This is for internal
 | 
						||
		// net/http<=>http2 use only.
 | 
						||
		var ctx context.Context
 | 
						||
		type baseContexter interface {
 | 
						||
			BaseContext() context.Context
 | 
						||
		}
 | 
						||
		if bc, ok := h.(baseContexter); ok {
 | 
						||
			ctx = bc.BaseContext()
 | 
						||
		}
 | 
						||
		conf.ServeConn(c, &ServeConnOpts{
 | 
						||
			Context:    ctx,
 | 
						||
			Handler:    h,
 | 
						||
			BaseConfig: hs,
 | 
						||
		})
 | 
						||
	}
 | 
						||
	s.TLSNextProto[NextProtoTLS] = protoHandler
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
// ServeConnOpts are options for the Server.ServeConn method.
 | 
						||
type ServeConnOpts struct {
 | 
						||
	// Context is the base context to use.
 | 
						||
	// If nil, context.Background is used.
 | 
						||
	Context context.Context
 | 
						||
 | 
						||
	// BaseConfig optionally sets the base configuration
 | 
						||
	// for values. If nil, defaults are used.
 | 
						||
	BaseConfig *http.Server
 | 
						||
 | 
						||
	// Handler specifies which handler to use for processing
 | 
						||
	// requests. If nil, BaseConfig.Handler is used. If BaseConfig
 | 
						||
	// or BaseConfig.Handler is nil, http.DefaultServeMux is used.
 | 
						||
	Handler http.Handler
 | 
						||
 | 
						||
	// UpgradeRequest is an initial request received on a connection
 | 
						||
	// undergoing an h2c upgrade. The request body must have been
 | 
						||
	// completely read from the connection before calling ServeConn,
 | 
						||
	// and the 101 Switching Protocols response written.
 | 
						||
	UpgradeRequest *http.Request
 | 
						||
 | 
						||
	// Settings is the decoded contents of the HTTP2-Settings header
 | 
						||
	// in an h2c upgrade request.
 | 
						||
	Settings []byte
 | 
						||
 | 
						||
	// SawClientPreface is set if the HTTP/2 connection preface
 | 
						||
	// has already been read from the connection.
 | 
						||
	SawClientPreface bool
 | 
						||
}
 | 
						||
 | 
						||
func (o *ServeConnOpts) context() context.Context {
 | 
						||
	if o != nil && o.Context != nil {
 | 
						||
		return o.Context
 | 
						||
	}
 | 
						||
	return context.Background()
 | 
						||
}
 | 
						||
 | 
						||
func (o *ServeConnOpts) baseConfig() *http.Server {
 | 
						||
	if o != nil && o.BaseConfig != nil {
 | 
						||
		return o.BaseConfig
 | 
						||
	}
 | 
						||
	return new(http.Server)
 | 
						||
}
 | 
						||
 | 
						||
func (o *ServeConnOpts) handler() http.Handler {
 | 
						||
	if o != nil {
 | 
						||
		if o.Handler != nil {
 | 
						||
			return o.Handler
 | 
						||
		}
 | 
						||
		if o.BaseConfig != nil && o.BaseConfig.Handler != nil {
 | 
						||
			return o.BaseConfig.Handler
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return http.DefaultServeMux
 | 
						||
}
 | 
						||
 | 
						||
// ServeConn serves HTTP/2 requests on the provided connection and
 | 
						||
// blocks until the connection is no longer readable.
 | 
						||
//
 | 
						||
// ServeConn starts speaking HTTP/2 assuming that c has not had any
 | 
						||
// reads or writes. It writes its initial settings frame and expects
 | 
						||
// to be able to read the preface and settings frame from the
 | 
						||
// client. If c has a ConnectionState method like a *tls.Conn, the
 | 
						||
// ConnectionState is used to verify the TLS ciphersuite and to set
 | 
						||
// the Request.TLS field in Handlers.
 | 
						||
//
 | 
						||
// ServeConn does not support h2c by itself. Any h2c support must be
 | 
						||
// implemented in terms of providing a suitably-behaving net.Conn.
 | 
						||
//
 | 
						||
// The opts parameter is optional. If nil, default values are used.
 | 
						||
func (s *Server) ServeConn(c net.Conn, opts *ServeConnOpts) {
 | 
						||
	s.serveConn(c, opts, nil)
 | 
						||
}
 | 
						||
 | 
						||
func (s *Server) serveConn(c net.Conn, opts *ServeConnOpts, newf func(*serverConn)) {
 | 
						||
	baseCtx, cancel := serverConnBaseContext(c, opts)
 | 
						||
	defer cancel()
 | 
						||
 | 
						||
	sc := &serverConn{
 | 
						||
		srv:                         s,
 | 
						||
		hs:                          opts.baseConfig(),
 | 
						||
		conn:                        c,
 | 
						||
		baseCtx:                     baseCtx,
 | 
						||
		remoteAddrStr:               c.RemoteAddr().String(),
 | 
						||
		bw:                          newBufferedWriter(c),
 | 
						||
		handler:                     opts.handler(),
 | 
						||
		streams:                     make(map[uint32]*stream),
 | 
						||
		readFrameCh:                 make(chan readFrameResult),
 | 
						||
		wantWriteFrameCh:            make(chan FrameWriteRequest, 8),
 | 
						||
		serveMsgCh:                  make(chan interface{}, 8),
 | 
						||
		wroteFrameCh:                make(chan frameWriteResult, 1), // buffered; one send in writeFrameAsync
 | 
						||
		bodyReadCh:                  make(chan bodyReadMsg),         // buffering doesn't matter either way
 | 
						||
		doneServing:                 make(chan struct{}),
 | 
						||
		clientMaxStreams:            math.MaxUint32, // Section 6.5.2: "Initially, there is no limit to this value"
 | 
						||
		advMaxStreams:               s.maxConcurrentStreams(),
 | 
						||
		initialStreamSendWindowSize: initialWindowSize,
 | 
						||
		maxFrameSize:                initialMaxFrameSize,
 | 
						||
		serveG:                      newGoroutineLock(),
 | 
						||
		pushEnabled:                 true,
 | 
						||
		sawClientPreface:            opts.SawClientPreface,
 | 
						||
	}
 | 
						||
	if newf != nil {
 | 
						||
		newf(sc)
 | 
						||
	}
 | 
						||
 | 
						||
	s.state.registerConn(sc)
 | 
						||
	defer s.state.unregisterConn(sc)
 | 
						||
 | 
						||
	// The net/http package sets the write deadline from the
 | 
						||
	// http.Server.WriteTimeout during the TLS handshake, but then
 | 
						||
	// passes the connection off to us with the deadline already set.
 | 
						||
	// Write deadlines are set per stream in serverConn.newStream.
 | 
						||
	// Disarm the net.Conn write deadline here.
 | 
						||
	if sc.hs.WriteTimeout > 0 {
 | 
						||
		sc.conn.SetWriteDeadline(time.Time{})
 | 
						||
	}
 | 
						||
 | 
						||
	if s.NewWriteScheduler != nil {
 | 
						||
		sc.writeSched = s.NewWriteScheduler()
 | 
						||
	} else {
 | 
						||
		sc.writeSched = newRoundRobinWriteScheduler()
 | 
						||
	}
 | 
						||
 | 
						||
	// These start at the RFC-specified defaults. If there is a higher
 | 
						||
	// configured value for inflow, that will be updated when we send a
 | 
						||
	// WINDOW_UPDATE shortly after sending SETTINGS.
 | 
						||
	sc.flow.add(initialWindowSize)
 | 
						||
	sc.inflow.init(initialWindowSize)
 | 
						||
	sc.hpackEncoder = hpack.NewEncoder(&sc.headerWriteBuf)
 | 
						||
	sc.hpackEncoder.SetMaxDynamicTableSizeLimit(s.maxEncoderHeaderTableSize())
 | 
						||
 | 
						||
	fr := NewFramer(sc.bw, c)
 | 
						||
	if s.CountError != nil {
 | 
						||
		fr.countError = s.CountError
 | 
						||
	}
 | 
						||
	fr.ReadMetaHeaders = hpack.NewDecoder(s.maxDecoderHeaderTableSize(), nil)
 | 
						||
	fr.MaxHeaderListSize = sc.maxHeaderListSize()
 | 
						||
	fr.SetMaxReadFrameSize(s.maxReadFrameSize())
 | 
						||
	sc.framer = fr
 | 
						||
 | 
						||
	if tc, ok := c.(connectionStater); ok {
 | 
						||
		sc.tlsState = new(tls.ConnectionState)
 | 
						||
		*sc.tlsState = tc.ConnectionState()
 | 
						||
		// 9.2 Use of TLS Features
 | 
						||
		// An implementation of HTTP/2 over TLS MUST use TLS
 | 
						||
		// 1.2 or higher with the restrictions on feature set
 | 
						||
		// and cipher suite described in this section. Due to
 | 
						||
		// implementation limitations, it might not be
 | 
						||
		// possible to fail TLS negotiation. An endpoint MUST
 | 
						||
		// immediately terminate an HTTP/2 connection that
 | 
						||
		// does not meet the TLS requirements described in
 | 
						||
		// this section with a connection error (Section
 | 
						||
		// 5.4.1) of type INADEQUATE_SECURITY.
 | 
						||
		if sc.tlsState.Version < tls.VersionTLS12 {
 | 
						||
			sc.rejectConn(ErrCodeInadequateSecurity, "TLS version too low")
 | 
						||
			return
 | 
						||
		}
 | 
						||
 | 
						||
		if sc.tlsState.ServerName == "" {
 | 
						||
			// Client must use SNI, but we don't enforce that anymore,
 | 
						||
			// since it was causing problems when connecting to bare IP
 | 
						||
			// addresses during development.
 | 
						||
			//
 | 
						||
			// TODO: optionally enforce? Or enforce at the time we receive
 | 
						||
			// a new request, and verify the ServerName matches the :authority?
 | 
						||
			// But that precludes proxy situations, perhaps.
 | 
						||
			//
 | 
						||
			// So for now, do nothing here again.
 | 
						||
		}
 | 
						||
 | 
						||
		if !s.PermitProhibitedCipherSuites && isBadCipher(sc.tlsState.CipherSuite) {
 | 
						||
			// "Endpoints MAY choose to generate a connection error
 | 
						||
			// (Section 5.4.1) of type INADEQUATE_SECURITY if one of
 | 
						||
			// the prohibited cipher suites are negotiated."
 | 
						||
			//
 | 
						||
			// We choose that. In my opinion, the spec is weak
 | 
						||
			// here. It also says both parties must support at least
 | 
						||
			// TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no
 | 
						||
			// excuses here. If we really must, we could allow an
 | 
						||
			// "AllowInsecureWeakCiphers" option on the server later.
 | 
						||
			// Let's see how it plays out first.
 | 
						||
			sc.rejectConn(ErrCodeInadequateSecurity, fmt.Sprintf("Prohibited TLS 1.2 Cipher Suite: %x", sc.tlsState.CipherSuite))
 | 
						||
			return
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	if opts.Settings != nil {
 | 
						||
		fr := &SettingsFrame{
 | 
						||
			FrameHeader: FrameHeader{valid: true},
 | 
						||
			p:           opts.Settings,
 | 
						||
		}
 | 
						||
		if err := fr.ForeachSetting(sc.processSetting); err != nil {
 | 
						||
			sc.rejectConn(ErrCodeProtocol, "invalid settings")
 | 
						||
			return
 | 
						||
		}
 | 
						||
		opts.Settings = nil
 | 
						||
	}
 | 
						||
 | 
						||
	if hook := testHookGetServerConn; hook != nil {
 | 
						||
		hook(sc)
 | 
						||
	}
 | 
						||
 | 
						||
	if opts.UpgradeRequest != nil {
 | 
						||
		sc.upgradeRequest(opts.UpgradeRequest)
 | 
						||
		opts.UpgradeRequest = nil
 | 
						||
	}
 | 
						||
 | 
						||
	sc.serve()
 | 
						||
}
 | 
						||
 | 
						||
func serverConnBaseContext(c net.Conn, opts *ServeConnOpts) (ctx context.Context, cancel func()) {
 | 
						||
	ctx, cancel = context.WithCancel(opts.context())
 | 
						||
	ctx = context.WithValue(ctx, http.LocalAddrContextKey, c.LocalAddr())
 | 
						||
	if hs := opts.baseConfig(); hs != nil {
 | 
						||
		ctx = context.WithValue(ctx, http.ServerContextKey, hs)
 | 
						||
	}
 | 
						||
	return
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) rejectConn(err ErrCode, debug string) {
 | 
						||
	sc.vlogf("http2: server rejecting conn: %v, %s", err, debug)
 | 
						||
	// ignoring errors. hanging up anyway.
 | 
						||
	sc.framer.WriteGoAway(0, err, []byte(debug))
 | 
						||
	sc.bw.Flush()
 | 
						||
	sc.conn.Close()
 | 
						||
}
 | 
						||
 | 
						||
type serverConn struct {
 | 
						||
	// Immutable:
 | 
						||
	srv              *Server
 | 
						||
	hs               *http.Server
 | 
						||
	conn             net.Conn
 | 
						||
	bw               *bufferedWriter // writing to conn
 | 
						||
	handler          http.Handler
 | 
						||
	baseCtx          context.Context
 | 
						||
	framer           *Framer
 | 
						||
	doneServing      chan struct{}          // closed when serverConn.serve ends
 | 
						||
	readFrameCh      chan readFrameResult   // written by serverConn.readFrames
 | 
						||
	wantWriteFrameCh chan FrameWriteRequest // from handlers -> serve
 | 
						||
	wroteFrameCh     chan frameWriteResult  // from writeFrameAsync -> serve, tickles more frame writes
 | 
						||
	bodyReadCh       chan bodyReadMsg       // from handlers -> serve
 | 
						||
	serveMsgCh       chan interface{}       // misc messages & code to send to / run on the serve loop
 | 
						||
	flow             outflow                // conn-wide (not stream-specific) outbound flow control
 | 
						||
	inflow           inflow                 // conn-wide inbound flow control
 | 
						||
	tlsState         *tls.ConnectionState   // shared by all handlers, like net/http
 | 
						||
	remoteAddrStr    string
 | 
						||
	writeSched       WriteScheduler
 | 
						||
 | 
						||
	// Everything following is owned by the serve loop; use serveG.check():
 | 
						||
	serveG                      goroutineLock // used to verify funcs are on serve()
 | 
						||
	pushEnabled                 bool
 | 
						||
	sawClientPreface            bool // preface has already been read, used in h2c upgrade
 | 
						||
	sawFirstSettings            bool // got the initial SETTINGS frame after the preface
 | 
						||
	needToSendSettingsAck       bool
 | 
						||
	unackedSettings             int    // how many SETTINGS have we sent without ACKs?
 | 
						||
	queuedControlFrames         int    // control frames in the writeSched queue
 | 
						||
	clientMaxStreams            uint32 // SETTINGS_MAX_CONCURRENT_STREAMS from client (our PUSH_PROMISE limit)
 | 
						||
	advMaxStreams               uint32 // our SETTINGS_MAX_CONCURRENT_STREAMS advertised the client
 | 
						||
	curClientStreams            uint32 // number of open streams initiated by the client
 | 
						||
	curPushedStreams            uint32 // number of open streams initiated by server push
 | 
						||
	curHandlers                 uint32 // number of running handler goroutines
 | 
						||
	maxClientStreamID           uint32 // max ever seen from client (odd), or 0 if there have been no client requests
 | 
						||
	maxPushPromiseID            uint32 // ID of the last push promise (even), or 0 if there have been no pushes
 | 
						||
	streams                     map[uint32]*stream
 | 
						||
	unstartedHandlers           []unstartedHandler
 | 
						||
	initialStreamSendWindowSize int32
 | 
						||
	maxFrameSize                int32
 | 
						||
	peerMaxHeaderListSize       uint32            // zero means unknown (default)
 | 
						||
	canonHeader                 map[string]string // http2-lower-case -> Go-Canonical-Case
 | 
						||
	canonHeaderKeysSize         int               // canonHeader keys size in bytes
 | 
						||
	writingFrame                bool              // started writing a frame (on serve goroutine or separate)
 | 
						||
	writingFrameAsync           bool              // started a frame on its own goroutine but haven't heard back on wroteFrameCh
 | 
						||
	needsFrameFlush             bool              // last frame write wasn't a flush
 | 
						||
	inGoAway                    bool              // we've started to or sent GOAWAY
 | 
						||
	inFrameScheduleLoop         bool              // whether we're in the scheduleFrameWrite loop
 | 
						||
	needToSendGoAway            bool              // we need to schedule a GOAWAY frame write
 | 
						||
	goAwayCode                  ErrCode
 | 
						||
	shutdownTimer               timer // nil until used
 | 
						||
	idleTimer                   timer // nil if unused
 | 
						||
 | 
						||
	// Owned by the writeFrameAsync goroutine:
 | 
						||
	headerWriteBuf bytes.Buffer
 | 
						||
	hpackEncoder   *hpack.Encoder
 | 
						||
 | 
						||
	// Used by startGracefulShutdown.
 | 
						||
	shutdownOnce sync.Once
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) maxHeaderListSize() uint32 {
 | 
						||
	n := sc.hs.MaxHeaderBytes
 | 
						||
	if n <= 0 {
 | 
						||
		n = http.DefaultMaxHeaderBytes
 | 
						||
	}
 | 
						||
	// http2's count is in a slightly different unit and includes 32 bytes per pair.
 | 
						||
	// So, take the net/http.Server value and pad it up a bit, assuming 10 headers.
 | 
						||
	const perFieldOverhead = 32 // per http2 spec
 | 
						||
	const typicalHeaders = 10   // conservative
 | 
						||
	return uint32(n + typicalHeaders*perFieldOverhead)
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) curOpenStreams() uint32 {
 | 
						||
	sc.serveG.check()
 | 
						||
	return sc.curClientStreams + sc.curPushedStreams
 | 
						||
}
 | 
						||
 | 
						||
// stream represents a stream. This is the minimal metadata needed by
 | 
						||
// the serve goroutine. Most of the actual stream state is owned by
 | 
						||
// the http.Handler's goroutine in the responseWriter. Because the
 | 
						||
// responseWriter's responseWriterState is recycled at the end of a
 | 
						||
// handler, this struct intentionally has no pointer to the
 | 
						||
// *responseWriter{,State} itself, as the Handler ending nils out the
 | 
						||
// responseWriter's state field.
 | 
						||
type stream struct {
 | 
						||
	// immutable:
 | 
						||
	sc        *serverConn
 | 
						||
	id        uint32
 | 
						||
	body      *pipe       // non-nil if expecting DATA frames
 | 
						||
	cw        closeWaiter // closed wait stream transitions to closed state
 | 
						||
	ctx       context.Context
 | 
						||
	cancelCtx func()
 | 
						||
 | 
						||
	// owned by serverConn's serve loop:
 | 
						||
	bodyBytes        int64   // body bytes seen so far
 | 
						||
	declBodyBytes    int64   // or -1 if undeclared
 | 
						||
	flow             outflow // limits writing from Handler to client
 | 
						||
	inflow           inflow  // what the client is allowed to POST/etc to us
 | 
						||
	state            streamState
 | 
						||
	resetQueued      bool  // RST_STREAM queued for write; set by sc.resetStream
 | 
						||
	gotTrailerHeader bool  // HEADER frame for trailers was seen
 | 
						||
	wroteHeaders     bool  // whether we wrote headers (not status 100)
 | 
						||
	readDeadline     timer // nil if unused
 | 
						||
	writeDeadline    timer // nil if unused
 | 
						||
	closeErr         error // set before cw is closed
 | 
						||
 | 
						||
	trailer    http.Header // accumulated trailers
 | 
						||
	reqTrailer http.Header // handler's Request.Trailer
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) Framer() *Framer  { return sc.framer }
 | 
						||
func (sc *serverConn) CloseConn() error { return sc.conn.Close() }
 | 
						||
func (sc *serverConn) Flush() error     { return sc.bw.Flush() }
 | 
						||
func (sc *serverConn) HeaderEncoder() (*hpack.Encoder, *bytes.Buffer) {
 | 
						||
	return sc.hpackEncoder, &sc.headerWriteBuf
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) state(streamID uint32) (streamState, *stream) {
 | 
						||
	sc.serveG.check()
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-5.1
 | 
						||
	if st, ok := sc.streams[streamID]; ok {
 | 
						||
		return st.state, st
 | 
						||
	}
 | 
						||
	// "The first use of a new stream identifier implicitly closes all
 | 
						||
	// streams in the "idle" state that might have been initiated by
 | 
						||
	// that peer with a lower-valued stream identifier. For example, if
 | 
						||
	// a client sends a HEADERS frame on stream 7 without ever sending a
 | 
						||
	// frame on stream 5, then stream 5 transitions to the "closed"
 | 
						||
	// state when the first frame for stream 7 is sent or received."
 | 
						||
	if streamID%2 == 1 {
 | 
						||
		if streamID <= sc.maxClientStreamID {
 | 
						||
			return stateClosed, nil
 | 
						||
		}
 | 
						||
	} else {
 | 
						||
		if streamID <= sc.maxPushPromiseID {
 | 
						||
			return stateClosed, nil
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return stateIdle, nil
 | 
						||
}
 | 
						||
 | 
						||
// setConnState calls the net/http ConnState hook for this connection, if configured.
 | 
						||
// Note that the net/http package does StateNew and StateClosed for us.
 | 
						||
// There is currently no plan for StateHijacked or hijacking HTTP/2 connections.
 | 
						||
func (sc *serverConn) setConnState(state http.ConnState) {
 | 
						||
	if sc.hs.ConnState != nil {
 | 
						||
		sc.hs.ConnState(sc.conn, state)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) vlogf(format string, args ...interface{}) {
 | 
						||
	if VerboseLogs {
 | 
						||
		sc.logf(format, args...)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) logf(format string, args ...interface{}) {
 | 
						||
	if lg := sc.hs.ErrorLog; lg != nil {
 | 
						||
		lg.Printf(format, args...)
 | 
						||
	} else {
 | 
						||
		log.Printf(format, args...)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// errno returns v's underlying uintptr, else 0.
 | 
						||
//
 | 
						||
// TODO: remove this helper function once http2 can use build
 | 
						||
// tags. See comment in isClosedConnError.
 | 
						||
func errno(v error) uintptr {
 | 
						||
	if rv := reflect.ValueOf(v); rv.Kind() == reflect.Uintptr {
 | 
						||
		return uintptr(rv.Uint())
 | 
						||
	}
 | 
						||
	return 0
 | 
						||
}
 | 
						||
 | 
						||
// isClosedConnError reports whether err is an error from use of a closed
 | 
						||
// network connection.
 | 
						||
func isClosedConnError(err error) bool {
 | 
						||
	if err == nil {
 | 
						||
		return false
 | 
						||
	}
 | 
						||
 | 
						||
	if errors.Is(err, net.ErrClosed) {
 | 
						||
		return true
 | 
						||
	}
 | 
						||
 | 
						||
	// TODO(bradfitz): x/tools/cmd/bundle doesn't really support
 | 
						||
	// build tags, so I can't make an http2_windows.go file with
 | 
						||
	// Windows-specific stuff. Fix that and move this, once we
 | 
						||
	// have a way to bundle this into std's net/http somehow.
 | 
						||
	if runtime.GOOS == "windows" {
 | 
						||
		if oe, ok := err.(*net.OpError); ok && oe.Op == "read" {
 | 
						||
			if se, ok := oe.Err.(*os.SyscallError); ok && se.Syscall == "wsarecv" {
 | 
						||
				const WSAECONNABORTED = 10053
 | 
						||
				const WSAECONNRESET = 10054
 | 
						||
				if n := errno(se.Err); n == WSAECONNRESET || n == WSAECONNABORTED {
 | 
						||
					return true
 | 
						||
				}
 | 
						||
			}
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return false
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) condlogf(err error, format string, args ...interface{}) {
 | 
						||
	if err == nil {
 | 
						||
		return
 | 
						||
	}
 | 
						||
	if err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err) || err == errPrefaceTimeout {
 | 
						||
		// Boring, expected errors.
 | 
						||
		sc.vlogf(format, args...)
 | 
						||
	} else {
 | 
						||
		sc.logf(format, args...)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// maxCachedCanonicalHeadersKeysSize is an arbitrarily-chosen limit on the size
 | 
						||
// of the entries in the canonHeader cache.
 | 
						||
// This should be larger than the size of unique, uncommon header keys likely to
 | 
						||
// be sent by the peer, while not so high as to permit unreasonable memory usage
 | 
						||
// if the peer sends an unbounded number of unique header keys.
 | 
						||
const maxCachedCanonicalHeadersKeysSize = 2048
 | 
						||
 | 
						||
func (sc *serverConn) canonicalHeader(v string) string {
 | 
						||
	sc.serveG.check()
 | 
						||
	buildCommonHeaderMapsOnce()
 | 
						||
	cv, ok := commonCanonHeader[v]
 | 
						||
	if ok {
 | 
						||
		return cv
 | 
						||
	}
 | 
						||
	cv, ok = sc.canonHeader[v]
 | 
						||
	if ok {
 | 
						||
		return cv
 | 
						||
	}
 | 
						||
	if sc.canonHeader == nil {
 | 
						||
		sc.canonHeader = make(map[string]string)
 | 
						||
	}
 | 
						||
	cv = http.CanonicalHeaderKey(v)
 | 
						||
	size := 100 + len(v)*2 // 100 bytes of map overhead + key + value
 | 
						||
	if sc.canonHeaderKeysSize+size <= maxCachedCanonicalHeadersKeysSize {
 | 
						||
		sc.canonHeader[v] = cv
 | 
						||
		sc.canonHeaderKeysSize += size
 | 
						||
	}
 | 
						||
	return cv
 | 
						||
}
 | 
						||
 | 
						||
type readFrameResult struct {
 | 
						||
	f   Frame // valid until readMore is called
 | 
						||
	err error
 | 
						||
 | 
						||
	// readMore should be called once the consumer no longer needs or
 | 
						||
	// retains f. After readMore, f is invalid and more frames can be
 | 
						||
	// read.
 | 
						||
	readMore func()
 | 
						||
}
 | 
						||
 | 
						||
// readFrames is the loop that reads incoming frames.
 | 
						||
// It takes care to only read one frame at a time, blocking until the
 | 
						||
// consumer is done with the frame.
 | 
						||
// It's run on its own goroutine.
 | 
						||
func (sc *serverConn) readFrames() {
 | 
						||
	sc.srv.markNewGoroutine()
 | 
						||
	gate := make(chan struct{})
 | 
						||
	gateDone := func() { gate <- struct{}{} }
 | 
						||
	for {
 | 
						||
		f, err := sc.framer.ReadFrame()
 | 
						||
		select {
 | 
						||
		case sc.readFrameCh <- readFrameResult{f, err, gateDone}:
 | 
						||
		case <-sc.doneServing:
 | 
						||
			return
 | 
						||
		}
 | 
						||
		select {
 | 
						||
		case <-gate:
 | 
						||
		case <-sc.doneServing:
 | 
						||
			return
 | 
						||
		}
 | 
						||
		if terminalReadFrameError(err) {
 | 
						||
			return
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// frameWriteResult is the message passed from writeFrameAsync to the serve goroutine.
 | 
						||
type frameWriteResult struct {
 | 
						||
	_   incomparable
 | 
						||
	wr  FrameWriteRequest // what was written (or attempted)
 | 
						||
	err error             // result of the writeFrame call
 | 
						||
}
 | 
						||
 | 
						||
// writeFrameAsync runs in its own goroutine and writes a single frame
 | 
						||
// and then reports when it's done.
 | 
						||
// At most one goroutine can be running writeFrameAsync at a time per
 | 
						||
// serverConn.
 | 
						||
func (sc *serverConn) writeFrameAsync(wr FrameWriteRequest, wd *writeData) {
 | 
						||
	sc.srv.markNewGoroutine()
 | 
						||
	var err error
 | 
						||
	if wd == nil {
 | 
						||
		err = wr.write.writeFrame(sc)
 | 
						||
	} else {
 | 
						||
		err = sc.framer.endWrite()
 | 
						||
	}
 | 
						||
	sc.wroteFrameCh <- frameWriteResult{wr: wr, err: err}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) closeAllStreamsOnConnClose() {
 | 
						||
	sc.serveG.check()
 | 
						||
	for _, st := range sc.streams {
 | 
						||
		sc.closeStream(st, errClientDisconnected)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) stopShutdownTimer() {
 | 
						||
	sc.serveG.check()
 | 
						||
	if t := sc.shutdownTimer; t != nil {
 | 
						||
		t.Stop()
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) notePanic() {
 | 
						||
	// Note: this is for serverConn.serve panicking, not http.Handler code.
 | 
						||
	if testHookOnPanicMu != nil {
 | 
						||
		testHookOnPanicMu.Lock()
 | 
						||
		defer testHookOnPanicMu.Unlock()
 | 
						||
	}
 | 
						||
	if testHookOnPanic != nil {
 | 
						||
		if e := recover(); e != nil {
 | 
						||
			if testHookOnPanic(sc, e) {
 | 
						||
				panic(e)
 | 
						||
			}
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) serve() {
 | 
						||
	sc.serveG.check()
 | 
						||
	defer sc.notePanic()
 | 
						||
	defer sc.conn.Close()
 | 
						||
	defer sc.closeAllStreamsOnConnClose()
 | 
						||
	defer sc.stopShutdownTimer()
 | 
						||
	defer close(sc.doneServing) // unblocks handlers trying to send
 | 
						||
 | 
						||
	if VerboseLogs {
 | 
						||
		sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs)
 | 
						||
	}
 | 
						||
 | 
						||
	sc.writeFrame(FrameWriteRequest{
 | 
						||
		write: writeSettings{
 | 
						||
			{SettingMaxFrameSize, sc.srv.maxReadFrameSize()},
 | 
						||
			{SettingMaxConcurrentStreams, sc.advMaxStreams},
 | 
						||
			{SettingMaxHeaderListSize, sc.maxHeaderListSize()},
 | 
						||
			{SettingHeaderTableSize, sc.srv.maxDecoderHeaderTableSize()},
 | 
						||
			{SettingInitialWindowSize, uint32(sc.srv.initialStreamRecvWindowSize())},
 | 
						||
		},
 | 
						||
	})
 | 
						||
	sc.unackedSettings++
 | 
						||
 | 
						||
	// Each connection starts with initialWindowSize inflow tokens.
 | 
						||
	// If a higher value is configured, we add more tokens.
 | 
						||
	if diff := sc.srv.initialConnRecvWindowSize() - initialWindowSize; diff > 0 {
 | 
						||
		sc.sendWindowUpdate(nil, int(diff))
 | 
						||
	}
 | 
						||
 | 
						||
	if err := sc.readPreface(); err != nil {
 | 
						||
		sc.condlogf(err, "http2: server: error reading preface from client %v: %v", sc.conn.RemoteAddr(), err)
 | 
						||
		return
 | 
						||
	}
 | 
						||
	// Now that we've got the preface, get us out of the
 | 
						||
	// "StateNew" state. We can't go directly to idle, though.
 | 
						||
	// Active means we read some data and anticipate a request. We'll
 | 
						||
	// do another Active when we get a HEADERS frame.
 | 
						||
	sc.setConnState(http.StateActive)
 | 
						||
	sc.setConnState(http.StateIdle)
 | 
						||
 | 
						||
	if sc.srv.IdleTimeout > 0 {
 | 
						||
		sc.idleTimer = sc.srv.afterFunc(sc.srv.IdleTimeout, sc.onIdleTimer)
 | 
						||
		defer sc.idleTimer.Stop()
 | 
						||
	}
 | 
						||
 | 
						||
	go sc.readFrames() // closed by defer sc.conn.Close above
 | 
						||
 | 
						||
	settingsTimer := sc.srv.afterFunc(firstSettingsTimeout, sc.onSettingsTimer)
 | 
						||
	defer settingsTimer.Stop()
 | 
						||
 | 
						||
	loopNum := 0
 | 
						||
	for {
 | 
						||
		loopNum++
 | 
						||
		select {
 | 
						||
		case wr := <-sc.wantWriteFrameCh:
 | 
						||
			if se, ok := wr.write.(StreamError); ok {
 | 
						||
				sc.resetStream(se)
 | 
						||
				break
 | 
						||
			}
 | 
						||
			sc.writeFrame(wr)
 | 
						||
		case res := <-sc.wroteFrameCh:
 | 
						||
			sc.wroteFrame(res)
 | 
						||
		case res := <-sc.readFrameCh:
 | 
						||
			// Process any written frames before reading new frames from the client since a
 | 
						||
			// written frame could have triggered a new stream to be started.
 | 
						||
			if sc.writingFrameAsync {
 | 
						||
				select {
 | 
						||
				case wroteRes := <-sc.wroteFrameCh:
 | 
						||
					sc.wroteFrame(wroteRes)
 | 
						||
				default:
 | 
						||
				}
 | 
						||
			}
 | 
						||
			if !sc.processFrameFromReader(res) {
 | 
						||
				return
 | 
						||
			}
 | 
						||
			res.readMore()
 | 
						||
			if settingsTimer != nil {
 | 
						||
				settingsTimer.Stop()
 | 
						||
				settingsTimer = nil
 | 
						||
			}
 | 
						||
		case m := <-sc.bodyReadCh:
 | 
						||
			sc.noteBodyRead(m.st, m.n)
 | 
						||
		case msg := <-sc.serveMsgCh:
 | 
						||
			switch v := msg.(type) {
 | 
						||
			case func(int):
 | 
						||
				v(loopNum) // for testing
 | 
						||
			case *serverMessage:
 | 
						||
				switch v {
 | 
						||
				case settingsTimerMsg:
 | 
						||
					sc.logf("timeout waiting for SETTINGS frames from %v", sc.conn.RemoteAddr())
 | 
						||
					return
 | 
						||
				case idleTimerMsg:
 | 
						||
					sc.vlogf("connection is idle")
 | 
						||
					sc.goAway(ErrCodeNo)
 | 
						||
				case shutdownTimerMsg:
 | 
						||
					sc.vlogf("GOAWAY close timer fired; closing conn from %v", sc.conn.RemoteAddr())
 | 
						||
					return
 | 
						||
				case gracefulShutdownMsg:
 | 
						||
					sc.startGracefulShutdownInternal()
 | 
						||
				case handlerDoneMsg:
 | 
						||
					sc.handlerDone()
 | 
						||
				default:
 | 
						||
					panic("unknown timer")
 | 
						||
				}
 | 
						||
			case *startPushRequest:
 | 
						||
				sc.startPush(v)
 | 
						||
			case func(*serverConn):
 | 
						||
				v(sc)
 | 
						||
			default:
 | 
						||
				panic(fmt.Sprintf("unexpected type %T", v))
 | 
						||
			}
 | 
						||
		}
 | 
						||
 | 
						||
		// If the peer is causing us to generate a lot of control frames,
 | 
						||
		// but not reading them from us, assume they are trying to make us
 | 
						||
		// run out of memory.
 | 
						||
		if sc.queuedControlFrames > sc.srv.maxQueuedControlFrames() {
 | 
						||
			sc.vlogf("http2: too many control frames in send queue, closing connection")
 | 
						||
			return
 | 
						||
		}
 | 
						||
 | 
						||
		// Start the shutdown timer after sending a GOAWAY. When sending GOAWAY
 | 
						||
		// with no error code (graceful shutdown), don't start the timer until
 | 
						||
		// all open streams have been completed.
 | 
						||
		sentGoAway := sc.inGoAway && !sc.needToSendGoAway && !sc.writingFrame
 | 
						||
		gracefulShutdownComplete := sc.goAwayCode == ErrCodeNo && sc.curOpenStreams() == 0
 | 
						||
		if sentGoAway && sc.shutdownTimer == nil && (sc.goAwayCode != ErrCodeNo || gracefulShutdownComplete) {
 | 
						||
			sc.shutDownIn(goAwayTimeout)
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
type serverMessage int
 | 
						||
 | 
						||
// Message values sent to serveMsgCh.
 | 
						||
var (
 | 
						||
	settingsTimerMsg    = new(serverMessage)
 | 
						||
	idleTimerMsg        = new(serverMessage)
 | 
						||
	shutdownTimerMsg    = new(serverMessage)
 | 
						||
	gracefulShutdownMsg = new(serverMessage)
 | 
						||
	handlerDoneMsg      = new(serverMessage)
 | 
						||
)
 | 
						||
 | 
						||
func (sc *serverConn) onSettingsTimer() { sc.sendServeMsg(settingsTimerMsg) }
 | 
						||
func (sc *serverConn) onIdleTimer()     { sc.sendServeMsg(idleTimerMsg) }
 | 
						||
func (sc *serverConn) onShutdownTimer() { sc.sendServeMsg(shutdownTimerMsg) }
 | 
						||
 | 
						||
func (sc *serverConn) sendServeMsg(msg interface{}) {
 | 
						||
	sc.serveG.checkNotOn() // NOT
 | 
						||
	select {
 | 
						||
	case sc.serveMsgCh <- msg:
 | 
						||
	case <-sc.doneServing:
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
var errPrefaceTimeout = errors.New("timeout waiting for client preface")
 | 
						||
 | 
						||
// readPreface reads the ClientPreface greeting from the peer or
 | 
						||
// returns errPrefaceTimeout on timeout, or an error if the greeting
 | 
						||
// is invalid.
 | 
						||
func (sc *serverConn) readPreface() error {
 | 
						||
	if sc.sawClientPreface {
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	errc := make(chan error, 1)
 | 
						||
	go func() {
 | 
						||
		// Read the client preface
 | 
						||
		buf := make([]byte, len(ClientPreface))
 | 
						||
		if _, err := io.ReadFull(sc.conn, buf); err != nil {
 | 
						||
			errc <- err
 | 
						||
		} else if !bytes.Equal(buf, clientPreface) {
 | 
						||
			errc <- fmt.Errorf("bogus greeting %q", buf)
 | 
						||
		} else {
 | 
						||
			errc <- nil
 | 
						||
		}
 | 
						||
	}()
 | 
						||
	timer := sc.srv.newTimer(prefaceTimeout) // TODO: configurable on *Server?
 | 
						||
	defer timer.Stop()
 | 
						||
	select {
 | 
						||
	case <-timer.C():
 | 
						||
		return errPrefaceTimeout
 | 
						||
	case err := <-errc:
 | 
						||
		if err == nil {
 | 
						||
			if VerboseLogs {
 | 
						||
				sc.vlogf("http2: server: client %v said hello", sc.conn.RemoteAddr())
 | 
						||
			}
 | 
						||
		}
 | 
						||
		return err
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
var errChanPool = sync.Pool{
 | 
						||
	New: func() interface{} { return make(chan error, 1) },
 | 
						||
}
 | 
						||
 | 
						||
var writeDataPool = sync.Pool{
 | 
						||
	New: func() interface{} { return new(writeData) },
 | 
						||
}
 | 
						||
 | 
						||
// writeDataFromHandler writes DATA response frames from a handler on
 | 
						||
// the given stream.
 | 
						||
func (sc *serverConn) writeDataFromHandler(stream *stream, data []byte, endStream bool) error {
 | 
						||
	ch := errChanPool.Get().(chan error)
 | 
						||
	writeArg := writeDataPool.Get().(*writeData)
 | 
						||
	*writeArg = writeData{stream.id, data, endStream}
 | 
						||
	err := sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						||
		write:  writeArg,
 | 
						||
		stream: stream,
 | 
						||
		done:   ch,
 | 
						||
	})
 | 
						||
	if err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	var frameWriteDone bool // the frame write is done (successfully or not)
 | 
						||
	select {
 | 
						||
	case err = <-ch:
 | 
						||
		frameWriteDone = true
 | 
						||
	case <-sc.doneServing:
 | 
						||
		return errClientDisconnected
 | 
						||
	case <-stream.cw:
 | 
						||
		// If both ch and stream.cw were ready (as might
 | 
						||
		// happen on the final Write after an http.Handler
 | 
						||
		// ends), prefer the write result. Otherwise this
 | 
						||
		// might just be us successfully closing the stream.
 | 
						||
		// The writeFrameAsync and serve goroutines guarantee
 | 
						||
		// that the ch send will happen before the stream.cw
 | 
						||
		// close.
 | 
						||
		select {
 | 
						||
		case err = <-ch:
 | 
						||
			frameWriteDone = true
 | 
						||
		default:
 | 
						||
			return errStreamClosed
 | 
						||
		}
 | 
						||
	}
 | 
						||
	errChanPool.Put(ch)
 | 
						||
	if frameWriteDone {
 | 
						||
		writeDataPool.Put(writeArg)
 | 
						||
	}
 | 
						||
	return err
 | 
						||
}
 | 
						||
 | 
						||
// writeFrameFromHandler sends wr to sc.wantWriteFrameCh, but aborts
 | 
						||
// if the connection has gone away.
 | 
						||
//
 | 
						||
// This must not be run from the serve goroutine itself, else it might
 | 
						||
// deadlock writing to sc.wantWriteFrameCh (which is only mildly
 | 
						||
// buffered and is read by serve itself). If you're on the serve
 | 
						||
// goroutine, call writeFrame instead.
 | 
						||
func (sc *serverConn) writeFrameFromHandler(wr FrameWriteRequest) error {
 | 
						||
	sc.serveG.checkNotOn() // NOT
 | 
						||
	select {
 | 
						||
	case sc.wantWriteFrameCh <- wr:
 | 
						||
		return nil
 | 
						||
	case <-sc.doneServing:
 | 
						||
		// Serve loop is gone.
 | 
						||
		// Client has closed their connection to the server.
 | 
						||
		return errClientDisconnected
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// writeFrame schedules a frame to write and sends it if there's nothing
 | 
						||
// already being written.
 | 
						||
//
 | 
						||
// There is no pushback here (the serve goroutine never blocks). It's
 | 
						||
// the http.Handlers that block, waiting for their previous frames to
 | 
						||
// make it onto the wire
 | 
						||
//
 | 
						||
// If you're not on the serve goroutine, use writeFrameFromHandler instead.
 | 
						||
func (sc *serverConn) writeFrame(wr FrameWriteRequest) {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	// If true, wr will not be written and wr.done will not be signaled.
 | 
						||
	var ignoreWrite bool
 | 
						||
 | 
						||
	// We are not allowed to write frames on closed streams. RFC 7540 Section
 | 
						||
	// 5.1.1 says: "An endpoint MUST NOT send frames other than PRIORITY on
 | 
						||
	// a closed stream." Our server never sends PRIORITY, so that exception
 | 
						||
	// does not apply.
 | 
						||
	//
 | 
						||
	// The serverConn might close an open stream while the stream's handler
 | 
						||
	// is still running. For example, the server might close a stream when it
 | 
						||
	// receives bad data from the client. If this happens, the handler might
 | 
						||
	// attempt to write a frame after the stream has been closed (since the
 | 
						||
	// handler hasn't yet been notified of the close). In this case, we simply
 | 
						||
	// ignore the frame. The handler will notice that the stream is closed when
 | 
						||
	// it waits for the frame to be written.
 | 
						||
	//
 | 
						||
	// As an exception to this rule, we allow sending RST_STREAM after close.
 | 
						||
	// This allows us to immediately reject new streams without tracking any
 | 
						||
	// state for those streams (except for the queued RST_STREAM frame). This
 | 
						||
	// may result in duplicate RST_STREAMs in some cases, but the client should
 | 
						||
	// ignore those.
 | 
						||
	if wr.StreamID() != 0 {
 | 
						||
		_, isReset := wr.write.(StreamError)
 | 
						||
		if state, _ := sc.state(wr.StreamID()); state == stateClosed && !isReset {
 | 
						||
			ignoreWrite = true
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	// Don't send a 100-continue response if we've already sent headers.
 | 
						||
	// See golang.org/issue/14030.
 | 
						||
	switch wr.write.(type) {
 | 
						||
	case *writeResHeaders:
 | 
						||
		wr.stream.wroteHeaders = true
 | 
						||
	case write100ContinueHeadersFrame:
 | 
						||
		if wr.stream.wroteHeaders {
 | 
						||
			// We do not need to notify wr.done because this frame is
 | 
						||
			// never written with wr.done != nil.
 | 
						||
			if wr.done != nil {
 | 
						||
				panic("wr.done != nil for write100ContinueHeadersFrame")
 | 
						||
			}
 | 
						||
			ignoreWrite = true
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	if !ignoreWrite {
 | 
						||
		if wr.isControl() {
 | 
						||
			sc.queuedControlFrames++
 | 
						||
			// For extra safety, detect wraparounds, which should not happen,
 | 
						||
			// and pull the plug.
 | 
						||
			if sc.queuedControlFrames < 0 {
 | 
						||
				sc.conn.Close()
 | 
						||
			}
 | 
						||
		}
 | 
						||
		sc.writeSched.Push(wr)
 | 
						||
	}
 | 
						||
	sc.scheduleFrameWrite()
 | 
						||
}
 | 
						||
 | 
						||
// startFrameWrite starts a goroutine to write wr (in a separate
 | 
						||
// goroutine since that might block on the network), and updates the
 | 
						||
// serve goroutine's state about the world, updated from info in wr.
 | 
						||
func (sc *serverConn) startFrameWrite(wr FrameWriteRequest) {
 | 
						||
	sc.serveG.check()
 | 
						||
	if sc.writingFrame {
 | 
						||
		panic("internal error: can only be writing one frame at a time")
 | 
						||
	}
 | 
						||
 | 
						||
	st := wr.stream
 | 
						||
	if st != nil {
 | 
						||
		switch st.state {
 | 
						||
		case stateHalfClosedLocal:
 | 
						||
			switch wr.write.(type) {
 | 
						||
			case StreamError, handlerPanicRST, writeWindowUpdate:
 | 
						||
				// RFC 7540 Section 5.1 allows sending RST_STREAM, PRIORITY, and WINDOW_UPDATE
 | 
						||
				// in this state. (We never send PRIORITY from the server, so that is not checked.)
 | 
						||
			default:
 | 
						||
				panic(fmt.Sprintf("internal error: attempt to send frame on a half-closed-local stream: %v", wr))
 | 
						||
			}
 | 
						||
		case stateClosed:
 | 
						||
			panic(fmt.Sprintf("internal error: attempt to send frame on a closed stream: %v", wr))
 | 
						||
		}
 | 
						||
	}
 | 
						||
	if wpp, ok := wr.write.(*writePushPromise); ok {
 | 
						||
		var err error
 | 
						||
		wpp.promisedID, err = wpp.allocatePromisedID()
 | 
						||
		if err != nil {
 | 
						||
			sc.writingFrameAsync = false
 | 
						||
			wr.replyToWriter(err)
 | 
						||
			return
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	sc.writingFrame = true
 | 
						||
	sc.needsFrameFlush = true
 | 
						||
	if wr.write.staysWithinBuffer(sc.bw.Available()) {
 | 
						||
		sc.writingFrameAsync = false
 | 
						||
		err := wr.write.writeFrame(sc)
 | 
						||
		sc.wroteFrame(frameWriteResult{wr: wr, err: err})
 | 
						||
	} else if wd, ok := wr.write.(*writeData); ok {
 | 
						||
		// Encode the frame in the serve goroutine, to ensure we don't have
 | 
						||
		// any lingering asynchronous references to data passed to Write.
 | 
						||
		// See https://go.dev/issue/58446.
 | 
						||
		sc.framer.startWriteDataPadded(wd.streamID, wd.endStream, wd.p, nil)
 | 
						||
		sc.writingFrameAsync = true
 | 
						||
		go sc.writeFrameAsync(wr, wd)
 | 
						||
	} else {
 | 
						||
		sc.writingFrameAsync = true
 | 
						||
		go sc.writeFrameAsync(wr, nil)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// errHandlerPanicked is the error given to any callers blocked in a read from
 | 
						||
// Request.Body when the main goroutine panics. Since most handlers read in the
 | 
						||
// main ServeHTTP goroutine, this will show up rarely.
 | 
						||
var errHandlerPanicked = errors.New("http2: handler panicked")
 | 
						||
 | 
						||
// wroteFrame is called on the serve goroutine with the result of
 | 
						||
// whatever happened on writeFrameAsync.
 | 
						||
func (sc *serverConn) wroteFrame(res frameWriteResult) {
 | 
						||
	sc.serveG.check()
 | 
						||
	if !sc.writingFrame {
 | 
						||
		panic("internal error: expected to be already writing a frame")
 | 
						||
	}
 | 
						||
	sc.writingFrame = false
 | 
						||
	sc.writingFrameAsync = false
 | 
						||
 | 
						||
	wr := res.wr
 | 
						||
 | 
						||
	if writeEndsStream(wr.write) {
 | 
						||
		st := wr.stream
 | 
						||
		if st == nil {
 | 
						||
			panic("internal error: expecting non-nil stream")
 | 
						||
		}
 | 
						||
		switch st.state {
 | 
						||
		case stateOpen:
 | 
						||
			// Here we would go to stateHalfClosedLocal in
 | 
						||
			// theory, but since our handler is done and
 | 
						||
			// the net/http package provides no mechanism
 | 
						||
			// for closing a ResponseWriter while still
 | 
						||
			// reading data (see possible TODO at top of
 | 
						||
			// this file), we go into closed state here
 | 
						||
			// anyway, after telling the peer we're
 | 
						||
			// hanging up on them. We'll transition to
 | 
						||
			// stateClosed after the RST_STREAM frame is
 | 
						||
			// written.
 | 
						||
			st.state = stateHalfClosedLocal
 | 
						||
			// Section 8.1: a server MAY request that the client abort
 | 
						||
			// transmission of a request without error by sending a
 | 
						||
			// RST_STREAM with an error code of NO_ERROR after sending
 | 
						||
			// a complete response.
 | 
						||
			sc.resetStream(streamError(st.id, ErrCodeNo))
 | 
						||
		case stateHalfClosedRemote:
 | 
						||
			sc.closeStream(st, errHandlerComplete)
 | 
						||
		}
 | 
						||
	} else {
 | 
						||
		switch v := wr.write.(type) {
 | 
						||
		case StreamError:
 | 
						||
			// st may be unknown if the RST_STREAM was generated to reject bad input.
 | 
						||
			if st, ok := sc.streams[v.StreamID]; ok {
 | 
						||
				sc.closeStream(st, v)
 | 
						||
			}
 | 
						||
		case handlerPanicRST:
 | 
						||
			sc.closeStream(wr.stream, errHandlerPanicked)
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	// Reply (if requested) to unblock the ServeHTTP goroutine.
 | 
						||
	wr.replyToWriter(res.err)
 | 
						||
 | 
						||
	sc.scheduleFrameWrite()
 | 
						||
}
 | 
						||
 | 
						||
// scheduleFrameWrite tickles the frame writing scheduler.
 | 
						||
//
 | 
						||
// If a frame is already being written, nothing happens. This will be called again
 | 
						||
// when the frame is done being written.
 | 
						||
//
 | 
						||
// If a frame isn't being written and we need to send one, the best frame
 | 
						||
// to send is selected by writeSched.
 | 
						||
//
 | 
						||
// If a frame isn't being written and there's nothing else to send, we
 | 
						||
// flush the write buffer.
 | 
						||
func (sc *serverConn) scheduleFrameWrite() {
 | 
						||
	sc.serveG.check()
 | 
						||
	if sc.writingFrame || sc.inFrameScheduleLoop {
 | 
						||
		return
 | 
						||
	}
 | 
						||
	sc.inFrameScheduleLoop = true
 | 
						||
	for !sc.writingFrameAsync {
 | 
						||
		if sc.needToSendGoAway {
 | 
						||
			sc.needToSendGoAway = false
 | 
						||
			sc.startFrameWrite(FrameWriteRequest{
 | 
						||
				write: &writeGoAway{
 | 
						||
					maxStreamID: sc.maxClientStreamID,
 | 
						||
					code:        sc.goAwayCode,
 | 
						||
				},
 | 
						||
			})
 | 
						||
			continue
 | 
						||
		}
 | 
						||
		if sc.needToSendSettingsAck {
 | 
						||
			sc.needToSendSettingsAck = false
 | 
						||
			sc.startFrameWrite(FrameWriteRequest{write: writeSettingsAck{}})
 | 
						||
			continue
 | 
						||
		}
 | 
						||
		if !sc.inGoAway || sc.goAwayCode == ErrCodeNo {
 | 
						||
			if wr, ok := sc.writeSched.Pop(); ok {
 | 
						||
				if wr.isControl() {
 | 
						||
					sc.queuedControlFrames--
 | 
						||
				}
 | 
						||
				sc.startFrameWrite(wr)
 | 
						||
				continue
 | 
						||
			}
 | 
						||
		}
 | 
						||
		if sc.needsFrameFlush {
 | 
						||
			sc.startFrameWrite(FrameWriteRequest{write: flushFrameWriter{}})
 | 
						||
			sc.needsFrameFlush = false // after startFrameWrite, since it sets this true
 | 
						||
			continue
 | 
						||
		}
 | 
						||
		break
 | 
						||
	}
 | 
						||
	sc.inFrameScheduleLoop = false
 | 
						||
}
 | 
						||
 | 
						||
// startGracefulShutdown gracefully shuts down a connection. This
 | 
						||
// sends GOAWAY with ErrCodeNo to tell the client we're gracefully
 | 
						||
// shutting down. The connection isn't closed until all current
 | 
						||
// streams are done.
 | 
						||
//
 | 
						||
// startGracefulShutdown returns immediately; it does not wait until
 | 
						||
// the connection has shut down.
 | 
						||
func (sc *serverConn) startGracefulShutdown() {
 | 
						||
	sc.serveG.checkNotOn() // NOT
 | 
						||
	sc.shutdownOnce.Do(func() { sc.sendServeMsg(gracefulShutdownMsg) })
 | 
						||
}
 | 
						||
 | 
						||
// After sending GOAWAY with an error code (non-graceful shutdown), the
 | 
						||
// connection will close after goAwayTimeout.
 | 
						||
//
 | 
						||
// If we close the connection immediately after sending GOAWAY, there may
 | 
						||
// be unsent data in our kernel receive buffer, which will cause the kernel
 | 
						||
// to send a TCP RST on close() instead of a FIN. This RST will abort the
 | 
						||
// connection immediately, whether or not the client had received the GOAWAY.
 | 
						||
//
 | 
						||
// Ideally we should delay for at least 1 RTT + epsilon so the client has
 | 
						||
// a chance to read the GOAWAY and stop sending messages. Measuring RTT
 | 
						||
// is hard, so we approximate with 1 second. See golang.org/issue/18701.
 | 
						||
//
 | 
						||
// This is a var so it can be shorter in tests, where all requests uses the
 | 
						||
// loopback interface making the expected RTT very small.
 | 
						||
//
 | 
						||
// TODO: configurable?
 | 
						||
var goAwayTimeout = 1 * time.Second
 | 
						||
 | 
						||
func (sc *serverConn) startGracefulShutdownInternal() {
 | 
						||
	sc.goAway(ErrCodeNo)
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) goAway(code ErrCode) {
 | 
						||
	sc.serveG.check()
 | 
						||
	if sc.inGoAway {
 | 
						||
		if sc.goAwayCode == ErrCodeNo {
 | 
						||
			sc.goAwayCode = code
 | 
						||
		}
 | 
						||
		return
 | 
						||
	}
 | 
						||
	sc.inGoAway = true
 | 
						||
	sc.needToSendGoAway = true
 | 
						||
	sc.goAwayCode = code
 | 
						||
	sc.scheduleFrameWrite()
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) shutDownIn(d time.Duration) {
 | 
						||
	sc.serveG.check()
 | 
						||
	sc.shutdownTimer = sc.srv.afterFunc(d, sc.onShutdownTimer)
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) resetStream(se StreamError) {
 | 
						||
	sc.serveG.check()
 | 
						||
	sc.writeFrame(FrameWriteRequest{write: se})
 | 
						||
	if st, ok := sc.streams[se.StreamID]; ok {
 | 
						||
		st.resetQueued = true
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// processFrameFromReader processes the serve loop's read from readFrameCh from the
 | 
						||
// frame-reading goroutine.
 | 
						||
// processFrameFromReader returns whether the connection should be kept open.
 | 
						||
func (sc *serverConn) processFrameFromReader(res readFrameResult) bool {
 | 
						||
	sc.serveG.check()
 | 
						||
	err := res.err
 | 
						||
	if err != nil {
 | 
						||
		if err == ErrFrameTooLarge {
 | 
						||
			sc.goAway(ErrCodeFrameSize)
 | 
						||
			return true // goAway will close the loop
 | 
						||
		}
 | 
						||
		clientGone := err == io.EOF || err == io.ErrUnexpectedEOF || isClosedConnError(err)
 | 
						||
		if clientGone {
 | 
						||
			// TODO: could we also get into this state if
 | 
						||
			// the peer does a half close
 | 
						||
			// (e.g. CloseWrite) because they're done
 | 
						||
			// sending frames but they're still wanting
 | 
						||
			// our open replies?  Investigate.
 | 
						||
			// TODO: add CloseWrite to crypto/tls.Conn first
 | 
						||
			// so we have a way to test this? I suppose
 | 
						||
			// just for testing we could have a non-TLS mode.
 | 
						||
			return false
 | 
						||
		}
 | 
						||
	} else {
 | 
						||
		f := res.f
 | 
						||
		if VerboseLogs {
 | 
						||
			sc.vlogf("http2: server read frame %v", summarizeFrame(f))
 | 
						||
		}
 | 
						||
		err = sc.processFrame(f)
 | 
						||
		if err == nil {
 | 
						||
			return true
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	switch ev := err.(type) {
 | 
						||
	case StreamError:
 | 
						||
		sc.resetStream(ev)
 | 
						||
		return true
 | 
						||
	case goAwayFlowError:
 | 
						||
		sc.goAway(ErrCodeFlowControl)
 | 
						||
		return true
 | 
						||
	case ConnectionError:
 | 
						||
		if res.f != nil {
 | 
						||
			if id := res.f.Header().StreamID; id > sc.maxClientStreamID {
 | 
						||
				sc.maxClientStreamID = id
 | 
						||
			}
 | 
						||
		}
 | 
						||
		sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev)
 | 
						||
		sc.goAway(ErrCode(ev))
 | 
						||
		return true // goAway will handle shutdown
 | 
						||
	default:
 | 
						||
		if res.err != nil {
 | 
						||
			sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err)
 | 
						||
		} else {
 | 
						||
			sc.logf("http2: server closing client connection: %v", err)
 | 
						||
		}
 | 
						||
		return false
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processFrame(f Frame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	// First frame received must be SETTINGS.
 | 
						||
	if !sc.sawFirstSettings {
 | 
						||
		if _, ok := f.(*SettingsFrame); !ok {
 | 
						||
			return sc.countError("first_settings", ConnectionError(ErrCodeProtocol))
 | 
						||
		}
 | 
						||
		sc.sawFirstSettings = true
 | 
						||
	}
 | 
						||
 | 
						||
	// Discard frames for streams initiated after the identified last
 | 
						||
	// stream sent in a GOAWAY, or all frames after sending an error.
 | 
						||
	// We still need to return connection-level flow control for DATA frames.
 | 
						||
	// RFC 9113 Section 6.8.
 | 
						||
	if sc.inGoAway && (sc.goAwayCode != ErrCodeNo || f.Header().StreamID > sc.maxClientStreamID) {
 | 
						||
 | 
						||
		if f, ok := f.(*DataFrame); ok {
 | 
						||
			if !sc.inflow.take(f.Length) {
 | 
						||
				return sc.countError("data_flow", streamError(f.Header().StreamID, ErrCodeFlowControl))
 | 
						||
			}
 | 
						||
			sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						||
		}
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
 | 
						||
	switch f := f.(type) {
 | 
						||
	case *SettingsFrame:
 | 
						||
		return sc.processSettings(f)
 | 
						||
	case *MetaHeadersFrame:
 | 
						||
		return sc.processHeaders(f)
 | 
						||
	case *WindowUpdateFrame:
 | 
						||
		return sc.processWindowUpdate(f)
 | 
						||
	case *PingFrame:
 | 
						||
		return sc.processPing(f)
 | 
						||
	case *DataFrame:
 | 
						||
		return sc.processData(f)
 | 
						||
	case *RSTStreamFrame:
 | 
						||
		return sc.processResetStream(f)
 | 
						||
	case *PriorityFrame:
 | 
						||
		return sc.processPriority(f)
 | 
						||
	case *GoAwayFrame:
 | 
						||
		return sc.processGoAway(f)
 | 
						||
	case *PushPromiseFrame:
 | 
						||
		// A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE
 | 
						||
		// frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						||
		return sc.countError("push_promise", ConnectionError(ErrCodeProtocol))
 | 
						||
	default:
 | 
						||
		sc.vlogf("http2: server ignoring frame: %v", f.Header())
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processPing(f *PingFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	if f.IsAck() {
 | 
						||
		// 6.7 PING: " An endpoint MUST NOT respond to PING frames
 | 
						||
		// containing this flag."
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	if f.StreamID != 0 {
 | 
						||
		// "PING frames are not associated with any individual
 | 
						||
		// stream. If a PING frame is received with a stream
 | 
						||
		// identifier field value other than 0x0, the recipient MUST
 | 
						||
		// respond with a connection error (Section 5.4.1) of type
 | 
						||
		// PROTOCOL_ERROR."
 | 
						||
		return sc.countError("ping_on_stream", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	sc.writeFrame(FrameWriteRequest{write: writePingAck{f}})
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processWindowUpdate(f *WindowUpdateFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	switch {
 | 
						||
	case f.StreamID != 0: // stream-level flow control
 | 
						||
		state, st := sc.state(f.StreamID)
 | 
						||
		if state == stateIdle {
 | 
						||
			// Section 5.1: "Receiving any frame other than HEADERS
 | 
						||
			// or PRIORITY on a stream in this state MUST be
 | 
						||
			// treated as a connection error (Section 5.4.1) of
 | 
						||
			// type PROTOCOL_ERROR."
 | 
						||
			return sc.countError("stream_idle", ConnectionError(ErrCodeProtocol))
 | 
						||
		}
 | 
						||
		if st == nil {
 | 
						||
			// "WINDOW_UPDATE can be sent by a peer that has sent a
 | 
						||
			// frame bearing the END_STREAM flag. This means that a
 | 
						||
			// receiver could receive a WINDOW_UPDATE frame on a "half
 | 
						||
			// closed (remote)" or "closed" stream. A receiver MUST
 | 
						||
			// NOT treat this as an error, see Section 5.1."
 | 
						||
			return nil
 | 
						||
		}
 | 
						||
		if !st.flow.add(int32(f.Increment)) {
 | 
						||
			return sc.countError("bad_flow", streamError(f.StreamID, ErrCodeFlowControl))
 | 
						||
		}
 | 
						||
	default: // connection-level flow control
 | 
						||
		if !sc.flow.add(int32(f.Increment)) {
 | 
						||
			return goAwayFlowError{}
 | 
						||
		}
 | 
						||
	}
 | 
						||
	sc.scheduleFrameWrite()
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processResetStream(f *RSTStreamFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	state, st := sc.state(f.StreamID)
 | 
						||
	if state == stateIdle {
 | 
						||
		// 6.4 "RST_STREAM frames MUST NOT be sent for a
 | 
						||
		// stream in the "idle" state. If a RST_STREAM frame
 | 
						||
		// identifying an idle stream is received, the
 | 
						||
		// recipient MUST treat this as a connection error
 | 
						||
		// (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						||
		return sc.countError("reset_idle_stream", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	if st != nil {
 | 
						||
		st.cancelCtx()
 | 
						||
		sc.closeStream(st, streamError(f.StreamID, f.ErrCode))
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) closeStream(st *stream, err error) {
 | 
						||
	sc.serveG.check()
 | 
						||
	if st.state == stateIdle || st.state == stateClosed {
 | 
						||
		panic(fmt.Sprintf("invariant; can't close stream in state %v", st.state))
 | 
						||
	}
 | 
						||
	st.state = stateClosed
 | 
						||
	if st.readDeadline != nil {
 | 
						||
		st.readDeadline.Stop()
 | 
						||
	}
 | 
						||
	if st.writeDeadline != nil {
 | 
						||
		st.writeDeadline.Stop()
 | 
						||
	}
 | 
						||
	if st.isPushed() {
 | 
						||
		sc.curPushedStreams--
 | 
						||
	} else {
 | 
						||
		sc.curClientStreams--
 | 
						||
	}
 | 
						||
	delete(sc.streams, st.id)
 | 
						||
	if len(sc.streams) == 0 {
 | 
						||
		sc.setConnState(http.StateIdle)
 | 
						||
		if sc.srv.IdleTimeout > 0 && sc.idleTimer != nil {
 | 
						||
			sc.idleTimer.Reset(sc.srv.IdleTimeout)
 | 
						||
		}
 | 
						||
		if h1ServerKeepAlivesDisabled(sc.hs) {
 | 
						||
			sc.startGracefulShutdownInternal()
 | 
						||
		}
 | 
						||
	}
 | 
						||
	if p := st.body; p != nil {
 | 
						||
		// Return any buffered unread bytes worth of conn-level flow control.
 | 
						||
		// See golang.org/issue/16481
 | 
						||
		sc.sendWindowUpdate(nil, p.Len())
 | 
						||
 | 
						||
		p.CloseWithError(err)
 | 
						||
	}
 | 
						||
	if e, ok := err.(StreamError); ok {
 | 
						||
		if e.Cause != nil {
 | 
						||
			err = e.Cause
 | 
						||
		} else {
 | 
						||
			err = errStreamClosed
 | 
						||
		}
 | 
						||
	}
 | 
						||
	st.closeErr = err
 | 
						||
	st.cancelCtx()
 | 
						||
	st.cw.Close() // signals Handler's CloseNotifier, unblocks writes, etc
 | 
						||
	sc.writeSched.CloseStream(st.id)
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processSettings(f *SettingsFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	if f.IsAck() {
 | 
						||
		sc.unackedSettings--
 | 
						||
		if sc.unackedSettings < 0 {
 | 
						||
			// Why is the peer ACKing settings we never sent?
 | 
						||
			// The spec doesn't mention this case, but
 | 
						||
			// hang up on them anyway.
 | 
						||
			return sc.countError("ack_mystery", ConnectionError(ErrCodeProtocol))
 | 
						||
		}
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	if f.NumSettings() > 100 || f.HasDuplicates() {
 | 
						||
		// This isn't actually in the spec, but hang up on
 | 
						||
		// suspiciously large settings frames or those with
 | 
						||
		// duplicate entries.
 | 
						||
		return sc.countError("settings_big_or_dups", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	if err := f.ForeachSetting(sc.processSetting); err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	// TODO: judging by RFC 7540, Section 6.5.3 each SETTINGS frame should be
 | 
						||
	// acknowledged individually, even if multiple are received before the ACK.
 | 
						||
	sc.needToSendSettingsAck = true
 | 
						||
	sc.scheduleFrameWrite()
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processSetting(s Setting) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	if err := s.Valid(); err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	if VerboseLogs {
 | 
						||
		sc.vlogf("http2: server processing setting %v", s)
 | 
						||
	}
 | 
						||
	switch s.ID {
 | 
						||
	case SettingHeaderTableSize:
 | 
						||
		sc.hpackEncoder.SetMaxDynamicTableSize(s.Val)
 | 
						||
	case SettingEnablePush:
 | 
						||
		sc.pushEnabled = s.Val != 0
 | 
						||
	case SettingMaxConcurrentStreams:
 | 
						||
		sc.clientMaxStreams = s.Val
 | 
						||
	case SettingInitialWindowSize:
 | 
						||
		return sc.processSettingInitialWindowSize(s.Val)
 | 
						||
	case SettingMaxFrameSize:
 | 
						||
		sc.maxFrameSize = int32(s.Val) // the maximum valid s.Val is < 2^31
 | 
						||
	case SettingMaxHeaderListSize:
 | 
						||
		sc.peerMaxHeaderListSize = s.Val
 | 
						||
	default:
 | 
						||
		// Unknown setting: "An endpoint that receives a SETTINGS
 | 
						||
		// frame with any unknown or unsupported identifier MUST
 | 
						||
		// ignore that setting."
 | 
						||
		if VerboseLogs {
 | 
						||
			sc.vlogf("http2: server ignoring unknown setting %v", s)
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processSettingInitialWindowSize(val uint32) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	// Note: val already validated to be within range by
 | 
						||
	// processSetting's Valid call.
 | 
						||
 | 
						||
	// "A SETTINGS frame can alter the initial flow control window
 | 
						||
	// size for all current streams. When the value of
 | 
						||
	// SETTINGS_INITIAL_WINDOW_SIZE changes, a receiver MUST
 | 
						||
	// adjust the size of all stream flow control windows that it
 | 
						||
	// maintains by the difference between the new value and the
 | 
						||
	// old value."
 | 
						||
	old := sc.initialStreamSendWindowSize
 | 
						||
	sc.initialStreamSendWindowSize = int32(val)
 | 
						||
	growth := int32(val) - old // may be negative
 | 
						||
	for _, st := range sc.streams {
 | 
						||
		if !st.flow.add(growth) {
 | 
						||
			// 6.9.2 Initial Flow Control Window Size
 | 
						||
			// "An endpoint MUST treat a change to
 | 
						||
			// SETTINGS_INITIAL_WINDOW_SIZE that causes any flow
 | 
						||
			// control window to exceed the maximum size as a
 | 
						||
			// connection error (Section 5.4.1) of type
 | 
						||
			// FLOW_CONTROL_ERROR."
 | 
						||
			return sc.countError("setting_win_size", ConnectionError(ErrCodeFlowControl))
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processData(f *DataFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	id := f.Header().StreamID
 | 
						||
 | 
						||
	data := f.Data()
 | 
						||
	state, st := sc.state(id)
 | 
						||
	if id == 0 || state == stateIdle {
 | 
						||
		// Section 6.1: "DATA frames MUST be associated with a
 | 
						||
		// stream. If a DATA frame is received whose stream
 | 
						||
		// identifier field is 0x0, the recipient MUST respond
 | 
						||
		// with a connection error (Section 5.4.1) of type
 | 
						||
		// PROTOCOL_ERROR."
 | 
						||
		//
 | 
						||
		// Section 5.1: "Receiving any frame other than HEADERS
 | 
						||
		// or PRIORITY on a stream in this state MUST be
 | 
						||
		// treated as a connection error (Section 5.4.1) of
 | 
						||
		// type PROTOCOL_ERROR."
 | 
						||
		return sc.countError("data_on_idle", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
 | 
						||
	// "If a DATA frame is received whose stream is not in "open"
 | 
						||
	// or "half closed (local)" state, the recipient MUST respond
 | 
						||
	// with a stream error (Section 5.4.2) of type STREAM_CLOSED."
 | 
						||
	if st == nil || state != stateOpen || st.gotTrailerHeader || st.resetQueued {
 | 
						||
		// This includes sending a RST_STREAM if the stream is
 | 
						||
		// in stateHalfClosedLocal (which currently means that
 | 
						||
		// the http.Handler returned, so it's done reading &
 | 
						||
		// done writing). Try to stop the client from sending
 | 
						||
		// more DATA.
 | 
						||
 | 
						||
		// But still enforce their connection-level flow control,
 | 
						||
		// and return any flow control bytes since we're not going
 | 
						||
		// to consume them.
 | 
						||
		if !sc.inflow.take(f.Length) {
 | 
						||
			return sc.countError("data_flow", streamError(id, ErrCodeFlowControl))
 | 
						||
		}
 | 
						||
		sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						||
 | 
						||
		if st != nil && st.resetQueued {
 | 
						||
			// Already have a stream error in flight. Don't send another.
 | 
						||
			return nil
 | 
						||
		}
 | 
						||
		return sc.countError("closed", streamError(id, ErrCodeStreamClosed))
 | 
						||
	}
 | 
						||
	if st.body == nil {
 | 
						||
		panic("internal error: should have a body in this state")
 | 
						||
	}
 | 
						||
 | 
						||
	// Sender sending more than they'd declared?
 | 
						||
	if st.declBodyBytes != -1 && st.bodyBytes+int64(len(data)) > st.declBodyBytes {
 | 
						||
		if !sc.inflow.take(f.Length) {
 | 
						||
			return sc.countError("data_flow", streamError(id, ErrCodeFlowControl))
 | 
						||
		}
 | 
						||
		sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
 | 
						||
 | 
						||
		st.body.CloseWithError(fmt.Errorf("sender tried to send more than declared Content-Length of %d bytes", st.declBodyBytes))
 | 
						||
		// RFC 7540, sec 8.1.2.6: A request or response is also malformed if the
 | 
						||
		// value of a content-length header field does not equal the sum of the
 | 
						||
		// DATA frame payload lengths that form the body.
 | 
						||
		return sc.countError("send_too_much", streamError(id, ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	if f.Length > 0 {
 | 
						||
		// Check whether the client has flow control quota.
 | 
						||
		if !takeInflows(&sc.inflow, &st.inflow, f.Length) {
 | 
						||
			return sc.countError("flow_on_data_length", streamError(id, ErrCodeFlowControl))
 | 
						||
		}
 | 
						||
 | 
						||
		if len(data) > 0 {
 | 
						||
			st.bodyBytes += int64(len(data))
 | 
						||
			wrote, err := st.body.Write(data)
 | 
						||
			if err != nil {
 | 
						||
				// The handler has closed the request body.
 | 
						||
				// Return the connection-level flow control for the discarded data,
 | 
						||
				// but not the stream-level flow control.
 | 
						||
				sc.sendWindowUpdate(nil, int(f.Length)-wrote)
 | 
						||
				return nil
 | 
						||
			}
 | 
						||
			if wrote != len(data) {
 | 
						||
				panic("internal error: bad Writer")
 | 
						||
			}
 | 
						||
		}
 | 
						||
 | 
						||
		// Return any padded flow control now, since we won't
 | 
						||
		// refund it later on body reads.
 | 
						||
		// Call sendWindowUpdate even if there is no padding,
 | 
						||
		// to return buffered flow control credit if the sent
 | 
						||
		// window has shrunk.
 | 
						||
		pad := int32(f.Length) - int32(len(data))
 | 
						||
		sc.sendWindowUpdate32(nil, pad)
 | 
						||
		sc.sendWindowUpdate32(st, pad)
 | 
						||
	}
 | 
						||
	if f.StreamEnded() {
 | 
						||
		st.endStream()
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processGoAway(f *GoAwayFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	if f.ErrCode != ErrCodeNo {
 | 
						||
		sc.logf("http2: received GOAWAY %+v, starting graceful shutdown", f)
 | 
						||
	} else {
 | 
						||
		sc.vlogf("http2: received GOAWAY %+v, starting graceful shutdown", f)
 | 
						||
	}
 | 
						||
	sc.startGracefulShutdownInternal()
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-6.8
 | 
						||
	// We should not create any new streams, which means we should disable push.
 | 
						||
	sc.pushEnabled = false
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
// isPushed reports whether the stream is server-initiated.
 | 
						||
func (st *stream) isPushed() bool {
 | 
						||
	return st.id%2 == 0
 | 
						||
}
 | 
						||
 | 
						||
// endStream closes a Request.Body's pipe. It is called when a DATA
 | 
						||
// frame says a request body is over (or after trailers).
 | 
						||
func (st *stream) endStream() {
 | 
						||
	sc := st.sc
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	if st.declBodyBytes != -1 && st.declBodyBytes != st.bodyBytes {
 | 
						||
		st.body.CloseWithError(fmt.Errorf("request declared a Content-Length of %d but only wrote %d bytes",
 | 
						||
			st.declBodyBytes, st.bodyBytes))
 | 
						||
	} else {
 | 
						||
		st.body.closeWithErrorAndCode(io.EOF, st.copyTrailersToHandlerRequest)
 | 
						||
		st.body.CloseWithError(io.EOF)
 | 
						||
	}
 | 
						||
	st.state = stateHalfClosedRemote
 | 
						||
}
 | 
						||
 | 
						||
// copyTrailersToHandlerRequest is run in the Handler's goroutine in
 | 
						||
// its Request.Body.Read just before it gets io.EOF.
 | 
						||
func (st *stream) copyTrailersToHandlerRequest() {
 | 
						||
	for k, vv := range st.trailer {
 | 
						||
		if _, ok := st.reqTrailer[k]; ok {
 | 
						||
			// Only copy it over it was pre-declared.
 | 
						||
			st.reqTrailer[k] = vv
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// onReadTimeout is run on its own goroutine (from time.AfterFunc)
 | 
						||
// when the stream's ReadTimeout has fired.
 | 
						||
func (st *stream) onReadTimeout() {
 | 
						||
	if st.body != nil {
 | 
						||
		// Wrap the ErrDeadlineExceeded to avoid callers depending on us
 | 
						||
		// returning the bare error.
 | 
						||
		st.body.CloseWithError(fmt.Errorf("%w", os.ErrDeadlineExceeded))
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// onWriteTimeout is run on its own goroutine (from time.AfterFunc)
 | 
						||
// when the stream's WriteTimeout has fired.
 | 
						||
func (st *stream) onWriteTimeout() {
 | 
						||
	st.sc.writeFrameFromHandler(FrameWriteRequest{write: StreamError{
 | 
						||
		StreamID: st.id,
 | 
						||
		Code:     ErrCodeInternal,
 | 
						||
		Cause:    os.ErrDeadlineExceeded,
 | 
						||
	}})
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processHeaders(f *MetaHeadersFrame) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	id := f.StreamID
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-5.1.1
 | 
						||
	// Streams initiated by a client MUST use odd-numbered stream
 | 
						||
	// identifiers. [...] An endpoint that receives an unexpected
 | 
						||
	// stream identifier MUST respond with a connection error
 | 
						||
	// (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						||
	if id%2 != 1 {
 | 
						||
		return sc.countError("headers_even", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	// A HEADERS frame can be used to create a new stream or
 | 
						||
	// send a trailer for an open one. If we already have a stream
 | 
						||
	// open, let it process its own HEADERS frame (trailers at this
 | 
						||
	// point, if it's valid).
 | 
						||
	if st := sc.streams[f.StreamID]; st != nil {
 | 
						||
		if st.resetQueued {
 | 
						||
			// We're sending RST_STREAM to close the stream, so don't bother
 | 
						||
			// processing this frame.
 | 
						||
			return nil
 | 
						||
		}
 | 
						||
		// RFC 7540, sec 5.1: If an endpoint receives additional frames, other than
 | 
						||
		// WINDOW_UPDATE, PRIORITY, or RST_STREAM, for a stream that is in
 | 
						||
		// this state, it MUST respond with a stream error (Section 5.4.2) of
 | 
						||
		// type STREAM_CLOSED.
 | 
						||
		if st.state == stateHalfClosedRemote {
 | 
						||
			return sc.countError("headers_half_closed", streamError(id, ErrCodeStreamClosed))
 | 
						||
		}
 | 
						||
		return st.processTrailerHeaders(f)
 | 
						||
	}
 | 
						||
 | 
						||
	// [...] The identifier of a newly established stream MUST be
 | 
						||
	// numerically greater than all streams that the initiating
 | 
						||
	// endpoint has opened or reserved. [...]  An endpoint that
 | 
						||
	// receives an unexpected stream identifier MUST respond with
 | 
						||
	// a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
 | 
						||
	if id <= sc.maxClientStreamID {
 | 
						||
		return sc.countError("stream_went_down", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	sc.maxClientStreamID = id
 | 
						||
 | 
						||
	if sc.idleTimer != nil {
 | 
						||
		sc.idleTimer.Stop()
 | 
						||
	}
 | 
						||
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-5.1.2
 | 
						||
	// [...] Endpoints MUST NOT exceed the limit set by their peer. An
 | 
						||
	// endpoint that receives a HEADERS frame that causes their
 | 
						||
	// advertised concurrent stream limit to be exceeded MUST treat
 | 
						||
	// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR
 | 
						||
	// or REFUSED_STREAM.
 | 
						||
	if sc.curClientStreams+1 > sc.advMaxStreams {
 | 
						||
		if sc.unackedSettings == 0 {
 | 
						||
			// They should know better.
 | 
						||
			return sc.countError("over_max_streams", streamError(id, ErrCodeProtocol))
 | 
						||
		}
 | 
						||
		// Assume it's a network race, where they just haven't
 | 
						||
		// received our last SETTINGS update. But actually
 | 
						||
		// this can't happen yet, because we don't yet provide
 | 
						||
		// a way for users to adjust server parameters at
 | 
						||
		// runtime.
 | 
						||
		return sc.countError("over_max_streams_race", streamError(id, ErrCodeRefusedStream))
 | 
						||
	}
 | 
						||
 | 
						||
	initialState := stateOpen
 | 
						||
	if f.StreamEnded() {
 | 
						||
		initialState = stateHalfClosedRemote
 | 
						||
	}
 | 
						||
	st := sc.newStream(id, 0, initialState)
 | 
						||
 | 
						||
	if f.HasPriority() {
 | 
						||
		if err := sc.checkPriority(f.StreamID, f.Priority); err != nil {
 | 
						||
			return err
 | 
						||
		}
 | 
						||
		sc.writeSched.AdjustStream(st.id, f.Priority)
 | 
						||
	}
 | 
						||
 | 
						||
	rw, req, err := sc.newWriterAndRequest(st, f)
 | 
						||
	if err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	st.reqTrailer = req.Trailer
 | 
						||
	if st.reqTrailer != nil {
 | 
						||
		st.trailer = make(http.Header)
 | 
						||
	}
 | 
						||
	st.body = req.Body.(*requestBody).pipe // may be nil
 | 
						||
	st.declBodyBytes = req.ContentLength
 | 
						||
 | 
						||
	handler := sc.handler.ServeHTTP
 | 
						||
	if f.Truncated {
 | 
						||
		// Their header list was too long. Send a 431 error.
 | 
						||
		handler = handleHeaderListTooLong
 | 
						||
	} else if err := checkValidHTTP2RequestHeaders(req.Header); err != nil {
 | 
						||
		handler = new400Handler(err)
 | 
						||
	}
 | 
						||
 | 
						||
	// The net/http package sets the read deadline from the
 | 
						||
	// http.Server.ReadTimeout during the TLS handshake, but then
 | 
						||
	// passes the connection off to us with the deadline already
 | 
						||
	// set. Disarm it here after the request headers are read,
 | 
						||
	// similar to how the http1 server works. Here it's
 | 
						||
	// technically more like the http1 Server's ReadHeaderTimeout
 | 
						||
	// (in Go 1.8), though. That's a more sane option anyway.
 | 
						||
	if sc.hs.ReadTimeout > 0 {
 | 
						||
		sc.conn.SetReadDeadline(time.Time{})
 | 
						||
		st.readDeadline = sc.srv.afterFunc(sc.hs.ReadTimeout, st.onReadTimeout)
 | 
						||
	}
 | 
						||
 | 
						||
	return sc.scheduleHandler(id, rw, req, handler)
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) upgradeRequest(req *http.Request) {
 | 
						||
	sc.serveG.check()
 | 
						||
	id := uint32(1)
 | 
						||
	sc.maxClientStreamID = id
 | 
						||
	st := sc.newStream(id, 0, stateHalfClosedRemote)
 | 
						||
	st.reqTrailer = req.Trailer
 | 
						||
	if st.reqTrailer != nil {
 | 
						||
		st.trailer = make(http.Header)
 | 
						||
	}
 | 
						||
	rw := sc.newResponseWriter(st, req)
 | 
						||
 | 
						||
	// Disable any read deadline set by the net/http package
 | 
						||
	// prior to the upgrade.
 | 
						||
	if sc.hs.ReadTimeout > 0 {
 | 
						||
		sc.conn.SetReadDeadline(time.Time{})
 | 
						||
	}
 | 
						||
 | 
						||
	// This is the first request on the connection,
 | 
						||
	// so start the handler directly rather than going
 | 
						||
	// through scheduleHandler.
 | 
						||
	sc.curHandlers++
 | 
						||
	go sc.runHandler(rw, req, sc.handler.ServeHTTP)
 | 
						||
}
 | 
						||
 | 
						||
func (st *stream) processTrailerHeaders(f *MetaHeadersFrame) error {
 | 
						||
	sc := st.sc
 | 
						||
	sc.serveG.check()
 | 
						||
	if st.gotTrailerHeader {
 | 
						||
		return sc.countError("dup_trailers", ConnectionError(ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	st.gotTrailerHeader = true
 | 
						||
	if !f.StreamEnded() {
 | 
						||
		return sc.countError("trailers_not_ended", streamError(st.id, ErrCodeProtocol))
 | 
						||
	}
 | 
						||
 | 
						||
	if len(f.PseudoFields()) > 0 {
 | 
						||
		return sc.countError("trailers_pseudo", streamError(st.id, ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	if st.trailer != nil {
 | 
						||
		for _, hf := range f.RegularFields() {
 | 
						||
			key := sc.canonicalHeader(hf.Name)
 | 
						||
			if !httpguts.ValidTrailerHeader(key) {
 | 
						||
				// TODO: send more details to the peer somehow. But http2 has
 | 
						||
				// no way to send debug data at a stream level. Discuss with
 | 
						||
				// HTTP folk.
 | 
						||
				return sc.countError("trailers_bogus", streamError(st.id, ErrCodeProtocol))
 | 
						||
			}
 | 
						||
			st.trailer[key] = append(st.trailer[key], hf.Value)
 | 
						||
		}
 | 
						||
	}
 | 
						||
	st.endStream()
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) checkPriority(streamID uint32, p PriorityParam) error {
 | 
						||
	if streamID == p.StreamDep {
 | 
						||
		// Section 5.3.1: "A stream cannot depend on itself. An endpoint MUST treat
 | 
						||
		// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR."
 | 
						||
		// Section 5.3.3 says that a stream can depend on one of its dependencies,
 | 
						||
		// so it's only self-dependencies that are forbidden.
 | 
						||
		return sc.countError("priority", streamError(streamID, ErrCodeProtocol))
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) processPriority(f *PriorityFrame) error {
 | 
						||
	if err := sc.checkPriority(f.StreamID, f.PriorityParam); err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	sc.writeSched.AdjustStream(f.StreamID, f.PriorityParam)
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) newStream(id, pusherID uint32, state streamState) *stream {
 | 
						||
	sc.serveG.check()
 | 
						||
	if id == 0 {
 | 
						||
		panic("internal error: cannot create stream with id 0")
 | 
						||
	}
 | 
						||
 | 
						||
	ctx, cancelCtx := context.WithCancel(sc.baseCtx)
 | 
						||
	st := &stream{
 | 
						||
		sc:        sc,
 | 
						||
		id:        id,
 | 
						||
		state:     state,
 | 
						||
		ctx:       ctx,
 | 
						||
		cancelCtx: cancelCtx,
 | 
						||
	}
 | 
						||
	st.cw.Init()
 | 
						||
	st.flow.conn = &sc.flow // link to conn-level counter
 | 
						||
	st.flow.add(sc.initialStreamSendWindowSize)
 | 
						||
	st.inflow.init(sc.srv.initialStreamRecvWindowSize())
 | 
						||
	if sc.hs.WriteTimeout > 0 {
 | 
						||
		st.writeDeadline = sc.srv.afterFunc(sc.hs.WriteTimeout, st.onWriteTimeout)
 | 
						||
	}
 | 
						||
 | 
						||
	sc.streams[id] = st
 | 
						||
	sc.writeSched.OpenStream(st.id, OpenStreamOptions{PusherID: pusherID})
 | 
						||
	if st.isPushed() {
 | 
						||
		sc.curPushedStreams++
 | 
						||
	} else {
 | 
						||
		sc.curClientStreams++
 | 
						||
	}
 | 
						||
	if sc.curOpenStreams() == 1 {
 | 
						||
		sc.setConnState(http.StateActive)
 | 
						||
	}
 | 
						||
 | 
						||
	return st
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*responseWriter, *http.Request, error) {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	rp := requestParam{
 | 
						||
		method:    f.PseudoValue("method"),
 | 
						||
		scheme:    f.PseudoValue("scheme"),
 | 
						||
		authority: f.PseudoValue("authority"),
 | 
						||
		path:      f.PseudoValue("path"),
 | 
						||
	}
 | 
						||
 | 
						||
	isConnect := rp.method == "CONNECT"
 | 
						||
	if isConnect {
 | 
						||
		if rp.path != "" || rp.scheme != "" || rp.authority == "" {
 | 
						||
			return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
 | 
						||
		}
 | 
						||
	} else if rp.method == "" || rp.path == "" || (rp.scheme != "https" && rp.scheme != "http") {
 | 
						||
		// See 8.1.2.6 Malformed Requests and Responses:
 | 
						||
		//
 | 
						||
		// Malformed requests or responses that are detected
 | 
						||
		// MUST be treated as a stream error (Section 5.4.2)
 | 
						||
		// of type PROTOCOL_ERROR."
 | 
						||
		//
 | 
						||
		// 8.1.2.3 Request Pseudo-Header Fields
 | 
						||
		// "All HTTP/2 requests MUST include exactly one valid
 | 
						||
		// value for the :method, :scheme, and :path
 | 
						||
		// pseudo-header fields"
 | 
						||
		return nil, nil, sc.countError("bad_path_method", streamError(f.StreamID, ErrCodeProtocol))
 | 
						||
	}
 | 
						||
 | 
						||
	rp.header = make(http.Header)
 | 
						||
	for _, hf := range f.RegularFields() {
 | 
						||
		rp.header.Add(sc.canonicalHeader(hf.Name), hf.Value)
 | 
						||
	}
 | 
						||
	if rp.authority == "" {
 | 
						||
		rp.authority = rp.header.Get("Host")
 | 
						||
	}
 | 
						||
 | 
						||
	rw, req, err := sc.newWriterAndRequestNoBody(st, rp)
 | 
						||
	if err != nil {
 | 
						||
		return nil, nil, err
 | 
						||
	}
 | 
						||
	bodyOpen := !f.StreamEnded()
 | 
						||
	if bodyOpen {
 | 
						||
		if vv, ok := rp.header["Content-Length"]; ok {
 | 
						||
			if cl, err := strconv.ParseUint(vv[0], 10, 63); err == nil {
 | 
						||
				req.ContentLength = int64(cl)
 | 
						||
			} else {
 | 
						||
				req.ContentLength = 0
 | 
						||
			}
 | 
						||
		} else {
 | 
						||
			req.ContentLength = -1
 | 
						||
		}
 | 
						||
		req.Body.(*requestBody).pipe = &pipe{
 | 
						||
			b: &dataBuffer{expected: req.ContentLength},
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return rw, req, nil
 | 
						||
}
 | 
						||
 | 
						||
type requestParam struct {
 | 
						||
	method                  string
 | 
						||
	scheme, authority, path string
 | 
						||
	header                  http.Header
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) newWriterAndRequestNoBody(st *stream, rp requestParam) (*responseWriter, *http.Request, error) {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	var tlsState *tls.ConnectionState // nil if not scheme https
 | 
						||
	if rp.scheme == "https" {
 | 
						||
		tlsState = sc.tlsState
 | 
						||
	}
 | 
						||
 | 
						||
	needsContinue := httpguts.HeaderValuesContainsToken(rp.header["Expect"], "100-continue")
 | 
						||
	if needsContinue {
 | 
						||
		rp.header.Del("Expect")
 | 
						||
	}
 | 
						||
	// Merge Cookie headers into one "; "-delimited value.
 | 
						||
	if cookies := rp.header["Cookie"]; len(cookies) > 1 {
 | 
						||
		rp.header.Set("Cookie", strings.Join(cookies, "; "))
 | 
						||
	}
 | 
						||
 | 
						||
	// Setup Trailers
 | 
						||
	var trailer http.Header
 | 
						||
	for _, v := range rp.header["Trailer"] {
 | 
						||
		for _, key := range strings.Split(v, ",") {
 | 
						||
			key = http.CanonicalHeaderKey(textproto.TrimString(key))
 | 
						||
			switch key {
 | 
						||
			case "Transfer-Encoding", "Trailer", "Content-Length":
 | 
						||
				// Bogus. (copy of http1 rules)
 | 
						||
				// Ignore.
 | 
						||
			default:
 | 
						||
				if trailer == nil {
 | 
						||
					trailer = make(http.Header)
 | 
						||
				}
 | 
						||
				trailer[key] = nil
 | 
						||
			}
 | 
						||
		}
 | 
						||
	}
 | 
						||
	delete(rp.header, "Trailer")
 | 
						||
 | 
						||
	var url_ *url.URL
 | 
						||
	var requestURI string
 | 
						||
	if rp.method == "CONNECT" {
 | 
						||
		url_ = &url.URL{Host: rp.authority}
 | 
						||
		requestURI = rp.authority // mimic HTTP/1 server behavior
 | 
						||
	} else {
 | 
						||
		var err error
 | 
						||
		url_, err = url.ParseRequestURI(rp.path)
 | 
						||
		if err != nil {
 | 
						||
			return nil, nil, sc.countError("bad_path", streamError(st.id, ErrCodeProtocol))
 | 
						||
		}
 | 
						||
		requestURI = rp.path
 | 
						||
	}
 | 
						||
 | 
						||
	body := &requestBody{
 | 
						||
		conn:          sc,
 | 
						||
		stream:        st,
 | 
						||
		needsContinue: needsContinue,
 | 
						||
	}
 | 
						||
	req := &http.Request{
 | 
						||
		Method:     rp.method,
 | 
						||
		URL:        url_,
 | 
						||
		RemoteAddr: sc.remoteAddrStr,
 | 
						||
		Header:     rp.header,
 | 
						||
		RequestURI: requestURI,
 | 
						||
		Proto:      "HTTP/2.0",
 | 
						||
		ProtoMajor: 2,
 | 
						||
		ProtoMinor: 0,
 | 
						||
		TLS:        tlsState,
 | 
						||
		Host:       rp.authority,
 | 
						||
		Body:       body,
 | 
						||
		Trailer:    trailer,
 | 
						||
	}
 | 
						||
	req = req.WithContext(st.ctx)
 | 
						||
 | 
						||
	rw := sc.newResponseWriter(st, req)
 | 
						||
	return rw, req, nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) newResponseWriter(st *stream, req *http.Request) *responseWriter {
 | 
						||
	rws := responseWriterStatePool.Get().(*responseWriterState)
 | 
						||
	bwSave := rws.bw
 | 
						||
	*rws = responseWriterState{} // zero all the fields
 | 
						||
	rws.conn = sc
 | 
						||
	rws.bw = bwSave
 | 
						||
	rws.bw.Reset(chunkWriter{rws})
 | 
						||
	rws.stream = st
 | 
						||
	rws.req = req
 | 
						||
	return &responseWriter{rws: rws}
 | 
						||
}
 | 
						||
 | 
						||
type unstartedHandler struct {
 | 
						||
	streamID uint32
 | 
						||
	rw       *responseWriter
 | 
						||
	req      *http.Request
 | 
						||
	handler  func(http.ResponseWriter, *http.Request)
 | 
						||
}
 | 
						||
 | 
						||
// scheduleHandler starts a handler goroutine,
 | 
						||
// or schedules one to start as soon as an existing handler finishes.
 | 
						||
func (sc *serverConn) scheduleHandler(streamID uint32, rw *responseWriter, req *http.Request, handler func(http.ResponseWriter, *http.Request)) error {
 | 
						||
	sc.serveG.check()
 | 
						||
	maxHandlers := sc.advMaxStreams
 | 
						||
	if sc.curHandlers < maxHandlers {
 | 
						||
		sc.curHandlers++
 | 
						||
		go sc.runHandler(rw, req, handler)
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	if len(sc.unstartedHandlers) > int(4*sc.advMaxStreams) {
 | 
						||
		return sc.countError("too_many_early_resets", ConnectionError(ErrCodeEnhanceYourCalm))
 | 
						||
	}
 | 
						||
	sc.unstartedHandlers = append(sc.unstartedHandlers, unstartedHandler{
 | 
						||
		streamID: streamID,
 | 
						||
		rw:       rw,
 | 
						||
		req:      req,
 | 
						||
		handler:  handler,
 | 
						||
	})
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) handlerDone() {
 | 
						||
	sc.serveG.check()
 | 
						||
	sc.curHandlers--
 | 
						||
	i := 0
 | 
						||
	maxHandlers := sc.advMaxStreams
 | 
						||
	for ; i < len(sc.unstartedHandlers); i++ {
 | 
						||
		u := sc.unstartedHandlers[i]
 | 
						||
		if sc.streams[u.streamID] == nil {
 | 
						||
			// This stream was reset before its goroutine had a chance to start.
 | 
						||
			continue
 | 
						||
		}
 | 
						||
		if sc.curHandlers >= maxHandlers {
 | 
						||
			break
 | 
						||
		}
 | 
						||
		sc.curHandlers++
 | 
						||
		go sc.runHandler(u.rw, u.req, u.handler)
 | 
						||
		sc.unstartedHandlers[i] = unstartedHandler{} // don't retain references
 | 
						||
	}
 | 
						||
	sc.unstartedHandlers = sc.unstartedHandlers[i:]
 | 
						||
	if len(sc.unstartedHandlers) == 0 {
 | 
						||
		sc.unstartedHandlers = nil
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// Run on its own goroutine.
 | 
						||
func (sc *serverConn) runHandler(rw *responseWriter, req *http.Request, handler func(http.ResponseWriter, *http.Request)) {
 | 
						||
	sc.srv.markNewGoroutine()
 | 
						||
	defer sc.sendServeMsg(handlerDoneMsg)
 | 
						||
	didPanic := true
 | 
						||
	defer func() {
 | 
						||
		rw.rws.stream.cancelCtx()
 | 
						||
		if req.MultipartForm != nil {
 | 
						||
			req.MultipartForm.RemoveAll()
 | 
						||
		}
 | 
						||
		if didPanic {
 | 
						||
			e := recover()
 | 
						||
			sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						||
				write:  handlerPanicRST{rw.rws.stream.id},
 | 
						||
				stream: rw.rws.stream,
 | 
						||
			})
 | 
						||
			// Same as net/http:
 | 
						||
			if e != nil && e != http.ErrAbortHandler {
 | 
						||
				const size = 64 << 10
 | 
						||
				buf := make([]byte, size)
 | 
						||
				buf = buf[:runtime.Stack(buf, false)]
 | 
						||
				sc.logf("http2: panic serving %v: %v\n%s", sc.conn.RemoteAddr(), e, buf)
 | 
						||
			}
 | 
						||
			return
 | 
						||
		}
 | 
						||
		rw.handlerDone()
 | 
						||
	}()
 | 
						||
	handler(rw, req)
 | 
						||
	didPanic = false
 | 
						||
}
 | 
						||
 | 
						||
func handleHeaderListTooLong(w http.ResponseWriter, r *http.Request) {
 | 
						||
	// 10.5.1 Limits on Header Block Size:
 | 
						||
	// .. "A server that receives a larger header block than it is
 | 
						||
	// willing to handle can send an HTTP 431 (Request Header Fields Too
 | 
						||
	// Large) status code"
 | 
						||
	const statusRequestHeaderFieldsTooLarge = 431 // only in Go 1.6+
 | 
						||
	w.WriteHeader(statusRequestHeaderFieldsTooLarge)
 | 
						||
	io.WriteString(w, "<h1>HTTP Error 431</h1><p>Request Header Field(s) Too Large</p>")
 | 
						||
}
 | 
						||
 | 
						||
// called from handler goroutines.
 | 
						||
// h may be nil.
 | 
						||
func (sc *serverConn) writeHeaders(st *stream, headerData *writeResHeaders) error {
 | 
						||
	sc.serveG.checkNotOn() // NOT on
 | 
						||
	var errc chan error
 | 
						||
	if headerData.h != nil {
 | 
						||
		// If there's a header map (which we don't own), so we have to block on
 | 
						||
		// waiting for this frame to be written, so an http.Flush mid-handler
 | 
						||
		// writes out the correct value of keys, before a handler later potentially
 | 
						||
		// mutates it.
 | 
						||
		errc = errChanPool.Get().(chan error)
 | 
						||
	}
 | 
						||
	if err := sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						||
		write:  headerData,
 | 
						||
		stream: st,
 | 
						||
		done:   errc,
 | 
						||
	}); err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	if errc != nil {
 | 
						||
		select {
 | 
						||
		case err := <-errc:
 | 
						||
			errChanPool.Put(errc)
 | 
						||
			return err
 | 
						||
		case <-sc.doneServing:
 | 
						||
			return errClientDisconnected
 | 
						||
		case <-st.cw:
 | 
						||
			return errStreamClosed
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
// called from handler goroutines.
 | 
						||
func (sc *serverConn) write100ContinueHeaders(st *stream) {
 | 
						||
	sc.writeFrameFromHandler(FrameWriteRequest{
 | 
						||
		write:  write100ContinueHeadersFrame{st.id},
 | 
						||
		stream: st,
 | 
						||
	})
 | 
						||
}
 | 
						||
 | 
						||
// A bodyReadMsg tells the server loop that the http.Handler read n
 | 
						||
// bytes of the DATA from the client on the given stream.
 | 
						||
type bodyReadMsg struct {
 | 
						||
	st *stream
 | 
						||
	n  int
 | 
						||
}
 | 
						||
 | 
						||
// called from handler goroutines.
 | 
						||
// Notes that the handler for the given stream ID read n bytes of its body
 | 
						||
// and schedules flow control tokens to be sent.
 | 
						||
func (sc *serverConn) noteBodyReadFromHandler(st *stream, n int, err error) {
 | 
						||
	sc.serveG.checkNotOn() // NOT on
 | 
						||
	if n > 0 {
 | 
						||
		select {
 | 
						||
		case sc.bodyReadCh <- bodyReadMsg{st, n}:
 | 
						||
		case <-sc.doneServing:
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) noteBodyRead(st *stream, n int) {
 | 
						||
	sc.serveG.check()
 | 
						||
	sc.sendWindowUpdate(nil, n) // conn-level
 | 
						||
	if st.state != stateHalfClosedRemote && st.state != stateClosed {
 | 
						||
		// Don't send this WINDOW_UPDATE if the stream is closed
 | 
						||
		// remotely.
 | 
						||
		sc.sendWindowUpdate(st, n)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// st may be nil for conn-level
 | 
						||
func (sc *serverConn) sendWindowUpdate32(st *stream, n int32) {
 | 
						||
	sc.sendWindowUpdate(st, int(n))
 | 
						||
}
 | 
						||
 | 
						||
// st may be nil for conn-level
 | 
						||
func (sc *serverConn) sendWindowUpdate(st *stream, n int) {
 | 
						||
	sc.serveG.check()
 | 
						||
	var streamID uint32
 | 
						||
	var send int32
 | 
						||
	if st == nil {
 | 
						||
		send = sc.inflow.add(n)
 | 
						||
	} else {
 | 
						||
		streamID = st.id
 | 
						||
		send = st.inflow.add(n)
 | 
						||
	}
 | 
						||
	if send == 0 {
 | 
						||
		return
 | 
						||
	}
 | 
						||
	sc.writeFrame(FrameWriteRequest{
 | 
						||
		write:  writeWindowUpdate{streamID: streamID, n: uint32(send)},
 | 
						||
		stream: st,
 | 
						||
	})
 | 
						||
}
 | 
						||
 | 
						||
// requestBody is the Handler's Request.Body type.
 | 
						||
// Read and Close may be called concurrently.
 | 
						||
type requestBody struct {
 | 
						||
	_             incomparable
 | 
						||
	stream        *stream
 | 
						||
	conn          *serverConn
 | 
						||
	closeOnce     sync.Once // for use by Close only
 | 
						||
	sawEOF        bool      // for use by Read only
 | 
						||
	pipe          *pipe     // non-nil if we have an HTTP entity message body
 | 
						||
	needsContinue bool      // need to send a 100-continue
 | 
						||
}
 | 
						||
 | 
						||
func (b *requestBody) Close() error {
 | 
						||
	b.closeOnce.Do(func() {
 | 
						||
		if b.pipe != nil {
 | 
						||
			b.pipe.BreakWithError(errClosedBody)
 | 
						||
		}
 | 
						||
	})
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (b *requestBody) Read(p []byte) (n int, err error) {
 | 
						||
	if b.needsContinue {
 | 
						||
		b.needsContinue = false
 | 
						||
		b.conn.write100ContinueHeaders(b.stream)
 | 
						||
	}
 | 
						||
	if b.pipe == nil || b.sawEOF {
 | 
						||
		return 0, io.EOF
 | 
						||
	}
 | 
						||
	n, err = b.pipe.Read(p)
 | 
						||
	if err == io.EOF {
 | 
						||
		b.sawEOF = true
 | 
						||
	}
 | 
						||
	if b.conn == nil && inTests {
 | 
						||
		return
 | 
						||
	}
 | 
						||
	b.conn.noteBodyReadFromHandler(b.stream, n, err)
 | 
						||
	return
 | 
						||
}
 | 
						||
 | 
						||
// responseWriter is the http.ResponseWriter implementation. It's
 | 
						||
// intentionally small (1 pointer wide) to minimize garbage. The
 | 
						||
// responseWriterState pointer inside is zeroed at the end of a
 | 
						||
// request (in handlerDone) and calls on the responseWriter thereafter
 | 
						||
// simply crash (caller's mistake), but the much larger responseWriterState
 | 
						||
// and buffers are reused between multiple requests.
 | 
						||
type responseWriter struct {
 | 
						||
	rws *responseWriterState
 | 
						||
}
 | 
						||
 | 
						||
// Optional http.ResponseWriter interfaces implemented.
 | 
						||
var (
 | 
						||
	_ http.CloseNotifier = (*responseWriter)(nil)
 | 
						||
	_ http.Flusher       = (*responseWriter)(nil)
 | 
						||
	_ stringWriter       = (*responseWriter)(nil)
 | 
						||
)
 | 
						||
 | 
						||
type responseWriterState struct {
 | 
						||
	// immutable within a request:
 | 
						||
	stream *stream
 | 
						||
	req    *http.Request
 | 
						||
	conn   *serverConn
 | 
						||
 | 
						||
	// TODO: adjust buffer writing sizes based on server config, frame size updates from peer, etc
 | 
						||
	bw *bufio.Writer // writing to a chunkWriter{this *responseWriterState}
 | 
						||
 | 
						||
	// mutated by http.Handler goroutine:
 | 
						||
	handlerHeader http.Header // nil until called
 | 
						||
	snapHeader    http.Header // snapshot of handlerHeader at WriteHeader time
 | 
						||
	trailers      []string    // set in writeChunk
 | 
						||
	status        int         // status code passed to WriteHeader
 | 
						||
	wroteHeader   bool        // WriteHeader called (explicitly or implicitly). Not necessarily sent to user yet.
 | 
						||
	sentHeader    bool        // have we sent the header frame?
 | 
						||
	handlerDone   bool        // handler has finished
 | 
						||
 | 
						||
	sentContentLen int64 // non-zero if handler set a Content-Length header
 | 
						||
	wroteBytes     int64
 | 
						||
 | 
						||
	closeNotifierMu sync.Mutex // guards closeNotifierCh
 | 
						||
	closeNotifierCh chan bool  // nil until first used
 | 
						||
}
 | 
						||
 | 
						||
type chunkWriter struct{ rws *responseWriterState }
 | 
						||
 | 
						||
func (cw chunkWriter) Write(p []byte) (n int, err error) {
 | 
						||
	n, err = cw.rws.writeChunk(p)
 | 
						||
	if err == errStreamClosed {
 | 
						||
		// If writing failed because the stream has been closed,
 | 
						||
		// return the reason it was closed.
 | 
						||
		err = cw.rws.stream.closeErr
 | 
						||
	}
 | 
						||
	return n, err
 | 
						||
}
 | 
						||
 | 
						||
func (rws *responseWriterState) hasTrailers() bool { return len(rws.trailers) > 0 }
 | 
						||
 | 
						||
func (rws *responseWriterState) hasNonemptyTrailers() bool {
 | 
						||
	for _, trailer := range rws.trailers {
 | 
						||
		if _, ok := rws.handlerHeader[trailer]; ok {
 | 
						||
			return true
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return false
 | 
						||
}
 | 
						||
 | 
						||
// declareTrailer is called for each Trailer header when the
 | 
						||
// response header is written. It notes that a header will need to be
 | 
						||
// written in the trailers at the end of the response.
 | 
						||
func (rws *responseWriterState) declareTrailer(k string) {
 | 
						||
	k = http.CanonicalHeaderKey(k)
 | 
						||
	if !httpguts.ValidTrailerHeader(k) {
 | 
						||
		// Forbidden by RFC 7230, section 4.1.2.
 | 
						||
		rws.conn.logf("ignoring invalid trailer %q", k)
 | 
						||
		return
 | 
						||
	}
 | 
						||
	if !strSliceContains(rws.trailers, k) {
 | 
						||
		rws.trailers = append(rws.trailers, k)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// writeChunk writes chunks from the bufio.Writer. But because
 | 
						||
// bufio.Writer may bypass its chunking, sometimes p may be
 | 
						||
// arbitrarily large.
 | 
						||
//
 | 
						||
// writeChunk is also responsible (on the first chunk) for sending the
 | 
						||
// HEADER response.
 | 
						||
func (rws *responseWriterState) writeChunk(p []byte) (n int, err error) {
 | 
						||
	if !rws.wroteHeader {
 | 
						||
		rws.writeHeader(200)
 | 
						||
	}
 | 
						||
 | 
						||
	if rws.handlerDone {
 | 
						||
		rws.promoteUndeclaredTrailers()
 | 
						||
	}
 | 
						||
 | 
						||
	isHeadResp := rws.req.Method == "HEAD"
 | 
						||
	if !rws.sentHeader {
 | 
						||
		rws.sentHeader = true
 | 
						||
		var ctype, clen string
 | 
						||
		if clen = rws.snapHeader.Get("Content-Length"); clen != "" {
 | 
						||
			rws.snapHeader.Del("Content-Length")
 | 
						||
			if cl, err := strconv.ParseUint(clen, 10, 63); err == nil {
 | 
						||
				rws.sentContentLen = int64(cl)
 | 
						||
			} else {
 | 
						||
				clen = ""
 | 
						||
			}
 | 
						||
		}
 | 
						||
		_, hasContentLength := rws.snapHeader["Content-Length"]
 | 
						||
		if !hasContentLength && clen == "" && rws.handlerDone && bodyAllowedForStatus(rws.status) && (len(p) > 0 || !isHeadResp) {
 | 
						||
			clen = strconv.Itoa(len(p))
 | 
						||
		}
 | 
						||
		_, hasContentType := rws.snapHeader["Content-Type"]
 | 
						||
		// If the Content-Encoding is non-blank, we shouldn't
 | 
						||
		// sniff the body. See Issue golang.org/issue/31753.
 | 
						||
		ce := rws.snapHeader.Get("Content-Encoding")
 | 
						||
		hasCE := len(ce) > 0
 | 
						||
		if !hasCE && !hasContentType && bodyAllowedForStatus(rws.status) && len(p) > 0 {
 | 
						||
			ctype = http.DetectContentType(p)
 | 
						||
		}
 | 
						||
		var date string
 | 
						||
		if _, ok := rws.snapHeader["Date"]; !ok {
 | 
						||
			// TODO(bradfitz): be faster here, like net/http? measure.
 | 
						||
			date = rws.conn.srv.now().UTC().Format(http.TimeFormat)
 | 
						||
		}
 | 
						||
 | 
						||
		for _, v := range rws.snapHeader["Trailer"] {
 | 
						||
			foreachHeaderElement(v, rws.declareTrailer)
 | 
						||
		}
 | 
						||
 | 
						||
		// "Connection" headers aren't allowed in HTTP/2 (RFC 7540, 8.1.2.2),
 | 
						||
		// but respect "Connection" == "close" to mean sending a GOAWAY and tearing
 | 
						||
		// down the TCP connection when idle, like we do for HTTP/1.
 | 
						||
		// TODO: remove more Connection-specific header fields here, in addition
 | 
						||
		// to "Connection".
 | 
						||
		if _, ok := rws.snapHeader["Connection"]; ok {
 | 
						||
			v := rws.snapHeader.Get("Connection")
 | 
						||
			delete(rws.snapHeader, "Connection")
 | 
						||
			if v == "close" {
 | 
						||
				rws.conn.startGracefulShutdown()
 | 
						||
			}
 | 
						||
		}
 | 
						||
 | 
						||
		endStream := (rws.handlerDone && !rws.hasTrailers() && len(p) == 0) || isHeadResp
 | 
						||
		err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						||
			streamID:      rws.stream.id,
 | 
						||
			httpResCode:   rws.status,
 | 
						||
			h:             rws.snapHeader,
 | 
						||
			endStream:     endStream,
 | 
						||
			contentType:   ctype,
 | 
						||
			contentLength: clen,
 | 
						||
			date:          date,
 | 
						||
		})
 | 
						||
		if err != nil {
 | 
						||
			return 0, err
 | 
						||
		}
 | 
						||
		if endStream {
 | 
						||
			return 0, nil
 | 
						||
		}
 | 
						||
	}
 | 
						||
	if isHeadResp {
 | 
						||
		return len(p), nil
 | 
						||
	}
 | 
						||
	if len(p) == 0 && !rws.handlerDone {
 | 
						||
		return 0, nil
 | 
						||
	}
 | 
						||
 | 
						||
	// only send trailers if they have actually been defined by the
 | 
						||
	// server handler.
 | 
						||
	hasNonemptyTrailers := rws.hasNonemptyTrailers()
 | 
						||
	endStream := rws.handlerDone && !hasNonemptyTrailers
 | 
						||
	if len(p) > 0 || endStream {
 | 
						||
		// only send a 0 byte DATA frame if we're ending the stream.
 | 
						||
		if err := rws.conn.writeDataFromHandler(rws.stream, p, endStream); err != nil {
 | 
						||
			return 0, err
 | 
						||
		}
 | 
						||
	}
 | 
						||
 | 
						||
	if rws.handlerDone && hasNonemptyTrailers {
 | 
						||
		err = rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						||
			streamID:  rws.stream.id,
 | 
						||
			h:         rws.handlerHeader,
 | 
						||
			trailers:  rws.trailers,
 | 
						||
			endStream: true,
 | 
						||
		})
 | 
						||
		return len(p), err
 | 
						||
	}
 | 
						||
	return len(p), nil
 | 
						||
}
 | 
						||
 | 
						||
// TrailerPrefix is a magic prefix for ResponseWriter.Header map keys
 | 
						||
// that, if present, signals that the map entry is actually for
 | 
						||
// the response trailers, and not the response headers. The prefix
 | 
						||
// is stripped after the ServeHTTP call finishes and the values are
 | 
						||
// sent in the trailers.
 | 
						||
//
 | 
						||
// This mechanism is intended only for trailers that are not known
 | 
						||
// prior to the headers being written. If the set of trailers is fixed
 | 
						||
// or known before the header is written, the normal Go trailers mechanism
 | 
						||
// is preferred:
 | 
						||
//
 | 
						||
//	https://golang.org/pkg/net/http/#ResponseWriter
 | 
						||
//	https://golang.org/pkg/net/http/#example_ResponseWriter_trailers
 | 
						||
const TrailerPrefix = "Trailer:"
 | 
						||
 | 
						||
// promoteUndeclaredTrailers permits http.Handlers to set trailers
 | 
						||
// after the header has already been flushed. Because the Go
 | 
						||
// ResponseWriter interface has no way to set Trailers (only the
 | 
						||
// Header), and because we didn't want to expand the ResponseWriter
 | 
						||
// interface, and because nobody used trailers, and because RFC 7230
 | 
						||
// says you SHOULD (but not must) predeclare any trailers in the
 | 
						||
// header, the official ResponseWriter rules said trailers in Go must
 | 
						||
// be predeclared, and then we reuse the same ResponseWriter.Header()
 | 
						||
// map to mean both Headers and Trailers. When it's time to write the
 | 
						||
// Trailers, we pick out the fields of Headers that were declared as
 | 
						||
// trailers. That worked for a while, until we found the first major
 | 
						||
// user of Trailers in the wild: gRPC (using them only over http2),
 | 
						||
// and gRPC libraries permit setting trailers mid-stream without
 | 
						||
// predeclaring them. So: change of plans. We still permit the old
 | 
						||
// way, but we also permit this hack: if a Header() key begins with
 | 
						||
// "Trailer:", the suffix of that key is a Trailer. Because ':' is an
 | 
						||
// invalid token byte anyway, there is no ambiguity. (And it's already
 | 
						||
// filtered out) It's mildly hacky, but not terrible.
 | 
						||
//
 | 
						||
// This method runs after the Handler is done and promotes any Header
 | 
						||
// fields to be trailers.
 | 
						||
func (rws *responseWriterState) promoteUndeclaredTrailers() {
 | 
						||
	for k, vv := range rws.handlerHeader {
 | 
						||
		if !strings.HasPrefix(k, TrailerPrefix) {
 | 
						||
			continue
 | 
						||
		}
 | 
						||
		trailerKey := strings.TrimPrefix(k, TrailerPrefix)
 | 
						||
		rws.declareTrailer(trailerKey)
 | 
						||
		rws.handlerHeader[http.CanonicalHeaderKey(trailerKey)] = vv
 | 
						||
	}
 | 
						||
 | 
						||
	if len(rws.trailers) > 1 {
 | 
						||
		sorter := sorterPool.Get().(*sorter)
 | 
						||
		sorter.SortStrings(rws.trailers)
 | 
						||
		sorterPool.Put(sorter)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) SetReadDeadline(deadline time.Time) error {
 | 
						||
	st := w.rws.stream
 | 
						||
	if !deadline.IsZero() && deadline.Before(w.rws.conn.srv.now()) {
 | 
						||
		// If we're setting a deadline in the past, reset the stream immediately
 | 
						||
		// so writes after SetWriteDeadline returns will fail.
 | 
						||
		st.onReadTimeout()
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	w.rws.conn.sendServeMsg(func(sc *serverConn) {
 | 
						||
		if st.readDeadline != nil {
 | 
						||
			if !st.readDeadline.Stop() {
 | 
						||
				// Deadline already exceeded, or stream has been closed.
 | 
						||
				return
 | 
						||
			}
 | 
						||
		}
 | 
						||
		if deadline.IsZero() {
 | 
						||
			st.readDeadline = nil
 | 
						||
		} else if st.readDeadline == nil {
 | 
						||
			st.readDeadline = sc.srv.afterFunc(deadline.Sub(sc.srv.now()), st.onReadTimeout)
 | 
						||
		} else {
 | 
						||
			st.readDeadline.Reset(deadline.Sub(sc.srv.now()))
 | 
						||
		}
 | 
						||
	})
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) SetWriteDeadline(deadline time.Time) error {
 | 
						||
	st := w.rws.stream
 | 
						||
	if !deadline.IsZero() && deadline.Before(w.rws.conn.srv.now()) {
 | 
						||
		// If we're setting a deadline in the past, reset the stream immediately
 | 
						||
		// so writes after SetWriteDeadline returns will fail.
 | 
						||
		st.onWriteTimeout()
 | 
						||
		return nil
 | 
						||
	}
 | 
						||
	w.rws.conn.sendServeMsg(func(sc *serverConn) {
 | 
						||
		if st.writeDeadline != nil {
 | 
						||
			if !st.writeDeadline.Stop() {
 | 
						||
				// Deadline already exceeded, or stream has been closed.
 | 
						||
				return
 | 
						||
			}
 | 
						||
		}
 | 
						||
		if deadline.IsZero() {
 | 
						||
			st.writeDeadline = nil
 | 
						||
		} else if st.writeDeadline == nil {
 | 
						||
			st.writeDeadline = sc.srv.afterFunc(deadline.Sub(sc.srv.now()), st.onWriteTimeout)
 | 
						||
		} else {
 | 
						||
			st.writeDeadline.Reset(deadline.Sub(sc.srv.now()))
 | 
						||
		}
 | 
						||
	})
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) Flush() {
 | 
						||
	w.FlushError()
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) FlushError() error {
 | 
						||
	rws := w.rws
 | 
						||
	if rws == nil {
 | 
						||
		panic("Header called after Handler finished")
 | 
						||
	}
 | 
						||
	var err error
 | 
						||
	if rws.bw.Buffered() > 0 {
 | 
						||
		err = rws.bw.Flush()
 | 
						||
	} else {
 | 
						||
		// The bufio.Writer won't call chunkWriter.Write
 | 
						||
		// (writeChunk with zero bytes), so we have to do it
 | 
						||
		// ourselves to force the HTTP response header and/or
 | 
						||
		// final DATA frame (with END_STREAM) to be sent.
 | 
						||
		_, err = chunkWriter{rws}.Write(nil)
 | 
						||
		if err == nil {
 | 
						||
			select {
 | 
						||
			case <-rws.stream.cw:
 | 
						||
				err = rws.stream.closeErr
 | 
						||
			default:
 | 
						||
			}
 | 
						||
		}
 | 
						||
	}
 | 
						||
	return err
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) CloseNotify() <-chan bool {
 | 
						||
	rws := w.rws
 | 
						||
	if rws == nil {
 | 
						||
		panic("CloseNotify called after Handler finished")
 | 
						||
	}
 | 
						||
	rws.closeNotifierMu.Lock()
 | 
						||
	ch := rws.closeNotifierCh
 | 
						||
	if ch == nil {
 | 
						||
		ch = make(chan bool, 1)
 | 
						||
		rws.closeNotifierCh = ch
 | 
						||
		cw := rws.stream.cw
 | 
						||
		go func() {
 | 
						||
			cw.Wait() // wait for close
 | 
						||
			ch <- true
 | 
						||
		}()
 | 
						||
	}
 | 
						||
	rws.closeNotifierMu.Unlock()
 | 
						||
	return ch
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) Header() http.Header {
 | 
						||
	rws := w.rws
 | 
						||
	if rws == nil {
 | 
						||
		panic("Header called after Handler finished")
 | 
						||
	}
 | 
						||
	if rws.handlerHeader == nil {
 | 
						||
		rws.handlerHeader = make(http.Header)
 | 
						||
	}
 | 
						||
	return rws.handlerHeader
 | 
						||
}
 | 
						||
 | 
						||
// checkWriteHeaderCode is a copy of net/http's checkWriteHeaderCode.
 | 
						||
func checkWriteHeaderCode(code int) {
 | 
						||
	// Issue 22880: require valid WriteHeader status codes.
 | 
						||
	// For now we only enforce that it's three digits.
 | 
						||
	// In the future we might block things over 599 (600 and above aren't defined
 | 
						||
	// at http://httpwg.org/specs/rfc7231.html#status.codes).
 | 
						||
	// But for now any three digits.
 | 
						||
	//
 | 
						||
	// We used to send "HTTP/1.1 000 0" on the wire in responses but there's
 | 
						||
	// no equivalent bogus thing we can realistically send in HTTP/2,
 | 
						||
	// so we'll consistently panic instead and help people find their bugs
 | 
						||
	// early. (We can't return an error from WriteHeader even if we wanted to.)
 | 
						||
	if code < 100 || code > 999 {
 | 
						||
		panic(fmt.Sprintf("invalid WriteHeader code %v", code))
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) WriteHeader(code int) {
 | 
						||
	rws := w.rws
 | 
						||
	if rws == nil {
 | 
						||
		panic("WriteHeader called after Handler finished")
 | 
						||
	}
 | 
						||
	rws.writeHeader(code)
 | 
						||
}
 | 
						||
 | 
						||
func (rws *responseWriterState) writeHeader(code int) {
 | 
						||
	if rws.wroteHeader {
 | 
						||
		return
 | 
						||
	}
 | 
						||
 | 
						||
	checkWriteHeaderCode(code)
 | 
						||
 | 
						||
	// Handle informational headers
 | 
						||
	if code >= 100 && code <= 199 {
 | 
						||
		// Per RFC 8297 we must not clear the current header map
 | 
						||
		h := rws.handlerHeader
 | 
						||
 | 
						||
		_, cl := h["Content-Length"]
 | 
						||
		_, te := h["Transfer-Encoding"]
 | 
						||
		if cl || te {
 | 
						||
			h = h.Clone()
 | 
						||
			h.Del("Content-Length")
 | 
						||
			h.Del("Transfer-Encoding")
 | 
						||
		}
 | 
						||
 | 
						||
		rws.conn.writeHeaders(rws.stream, &writeResHeaders{
 | 
						||
			streamID:    rws.stream.id,
 | 
						||
			httpResCode: code,
 | 
						||
			h:           h,
 | 
						||
			endStream:   rws.handlerDone && !rws.hasTrailers(),
 | 
						||
		})
 | 
						||
 | 
						||
		return
 | 
						||
	}
 | 
						||
 | 
						||
	rws.wroteHeader = true
 | 
						||
	rws.status = code
 | 
						||
	if len(rws.handlerHeader) > 0 {
 | 
						||
		rws.snapHeader = cloneHeader(rws.handlerHeader)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func cloneHeader(h http.Header) http.Header {
 | 
						||
	h2 := make(http.Header, len(h))
 | 
						||
	for k, vv := range h {
 | 
						||
		vv2 := make([]string, len(vv))
 | 
						||
		copy(vv2, vv)
 | 
						||
		h2[k] = vv2
 | 
						||
	}
 | 
						||
	return h2
 | 
						||
}
 | 
						||
 | 
						||
// The Life Of A Write is like this:
 | 
						||
//
 | 
						||
// * Handler calls w.Write or w.WriteString ->
 | 
						||
// * -> rws.bw (*bufio.Writer) ->
 | 
						||
// * (Handler might call Flush)
 | 
						||
// * -> chunkWriter{rws}
 | 
						||
// * -> responseWriterState.writeChunk(p []byte)
 | 
						||
// * -> responseWriterState.writeChunk (most of the magic; see comment there)
 | 
						||
func (w *responseWriter) Write(p []byte) (n int, err error) {
 | 
						||
	return w.write(len(p), p, "")
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) WriteString(s string) (n int, err error) {
 | 
						||
	return w.write(len(s), nil, s)
 | 
						||
}
 | 
						||
 | 
						||
// either dataB or dataS is non-zero.
 | 
						||
func (w *responseWriter) write(lenData int, dataB []byte, dataS string) (n int, err error) {
 | 
						||
	rws := w.rws
 | 
						||
	if rws == nil {
 | 
						||
		panic("Write called after Handler finished")
 | 
						||
	}
 | 
						||
	if !rws.wroteHeader {
 | 
						||
		w.WriteHeader(200)
 | 
						||
	}
 | 
						||
	if !bodyAllowedForStatus(rws.status) {
 | 
						||
		return 0, http.ErrBodyNotAllowed
 | 
						||
	}
 | 
						||
	rws.wroteBytes += int64(len(dataB)) + int64(len(dataS)) // only one can be set
 | 
						||
	if rws.sentContentLen != 0 && rws.wroteBytes > rws.sentContentLen {
 | 
						||
		// TODO: send a RST_STREAM
 | 
						||
		return 0, errors.New("http2: handler wrote more than declared Content-Length")
 | 
						||
	}
 | 
						||
 | 
						||
	if dataB != nil {
 | 
						||
		return rws.bw.Write(dataB)
 | 
						||
	} else {
 | 
						||
		return rws.bw.WriteString(dataS)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
func (w *responseWriter) handlerDone() {
 | 
						||
	rws := w.rws
 | 
						||
	rws.handlerDone = true
 | 
						||
	w.Flush()
 | 
						||
	w.rws = nil
 | 
						||
	responseWriterStatePool.Put(rws)
 | 
						||
}
 | 
						||
 | 
						||
// Push errors.
 | 
						||
var (
 | 
						||
	ErrRecursivePush    = errors.New("http2: recursive push not allowed")
 | 
						||
	ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
 | 
						||
)
 | 
						||
 | 
						||
var _ http.Pusher = (*responseWriter)(nil)
 | 
						||
 | 
						||
func (w *responseWriter) Push(target string, opts *http.PushOptions) error {
 | 
						||
	st := w.rws.stream
 | 
						||
	sc := st.sc
 | 
						||
	sc.serveG.checkNotOn()
 | 
						||
 | 
						||
	// No recursive pushes: "PUSH_PROMISE frames MUST only be sent on a peer-initiated stream."
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-6.6
 | 
						||
	if st.isPushed() {
 | 
						||
		return ErrRecursivePush
 | 
						||
	}
 | 
						||
 | 
						||
	if opts == nil {
 | 
						||
		opts = new(http.PushOptions)
 | 
						||
	}
 | 
						||
 | 
						||
	// Default options.
 | 
						||
	if opts.Method == "" {
 | 
						||
		opts.Method = "GET"
 | 
						||
	}
 | 
						||
	if opts.Header == nil {
 | 
						||
		opts.Header = http.Header{}
 | 
						||
	}
 | 
						||
	wantScheme := "http"
 | 
						||
	if w.rws.req.TLS != nil {
 | 
						||
		wantScheme = "https"
 | 
						||
	}
 | 
						||
 | 
						||
	// Validate the request.
 | 
						||
	u, err := url.Parse(target)
 | 
						||
	if err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	if u.Scheme == "" {
 | 
						||
		if !strings.HasPrefix(target, "/") {
 | 
						||
			return fmt.Errorf("target must be an absolute URL or an absolute path: %q", target)
 | 
						||
		}
 | 
						||
		u.Scheme = wantScheme
 | 
						||
		u.Host = w.rws.req.Host
 | 
						||
	} else {
 | 
						||
		if u.Scheme != wantScheme {
 | 
						||
			return fmt.Errorf("cannot push URL with scheme %q from request with scheme %q", u.Scheme, wantScheme)
 | 
						||
		}
 | 
						||
		if u.Host == "" {
 | 
						||
			return errors.New("URL must have a host")
 | 
						||
		}
 | 
						||
	}
 | 
						||
	for k := range opts.Header {
 | 
						||
		if strings.HasPrefix(k, ":") {
 | 
						||
			return fmt.Errorf("promised request headers cannot include pseudo header %q", k)
 | 
						||
		}
 | 
						||
		// These headers are meaningful only if the request has a body,
 | 
						||
		// but PUSH_PROMISE requests cannot have a body.
 | 
						||
		// http://tools.ietf.org/html/rfc7540#section-8.2
 | 
						||
		// Also disallow Host, since the promised URL must be absolute.
 | 
						||
		if asciiEqualFold(k, "content-length") ||
 | 
						||
			asciiEqualFold(k, "content-encoding") ||
 | 
						||
			asciiEqualFold(k, "trailer") ||
 | 
						||
			asciiEqualFold(k, "te") ||
 | 
						||
			asciiEqualFold(k, "expect") ||
 | 
						||
			asciiEqualFold(k, "host") {
 | 
						||
			return fmt.Errorf("promised request headers cannot include %q", k)
 | 
						||
		}
 | 
						||
	}
 | 
						||
	if err := checkValidHTTP2RequestHeaders(opts.Header); err != nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
 | 
						||
	// The RFC effectively limits promised requests to GET and HEAD:
 | 
						||
	// "Promised requests MUST be cacheable [GET, HEAD, or POST], and MUST be safe [GET or HEAD]"
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-8.2
 | 
						||
	if opts.Method != "GET" && opts.Method != "HEAD" {
 | 
						||
		return fmt.Errorf("method %q must be GET or HEAD", opts.Method)
 | 
						||
	}
 | 
						||
 | 
						||
	msg := &startPushRequest{
 | 
						||
		parent: st,
 | 
						||
		method: opts.Method,
 | 
						||
		url:    u,
 | 
						||
		header: cloneHeader(opts.Header),
 | 
						||
		done:   errChanPool.Get().(chan error),
 | 
						||
	}
 | 
						||
 | 
						||
	select {
 | 
						||
	case <-sc.doneServing:
 | 
						||
		return errClientDisconnected
 | 
						||
	case <-st.cw:
 | 
						||
		return errStreamClosed
 | 
						||
	case sc.serveMsgCh <- msg:
 | 
						||
	}
 | 
						||
 | 
						||
	select {
 | 
						||
	case <-sc.doneServing:
 | 
						||
		return errClientDisconnected
 | 
						||
	case <-st.cw:
 | 
						||
		return errStreamClosed
 | 
						||
	case err := <-msg.done:
 | 
						||
		errChanPool.Put(msg.done)
 | 
						||
		return err
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
type startPushRequest struct {
 | 
						||
	parent *stream
 | 
						||
	method string
 | 
						||
	url    *url.URL
 | 
						||
	header http.Header
 | 
						||
	done   chan error
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) startPush(msg *startPushRequest) {
 | 
						||
	sc.serveG.check()
 | 
						||
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-6.6.
 | 
						||
	// PUSH_PROMISE frames MUST only be sent on a peer-initiated stream that
 | 
						||
	// is in either the "open" or "half-closed (remote)" state.
 | 
						||
	if msg.parent.state != stateOpen && msg.parent.state != stateHalfClosedRemote {
 | 
						||
		// responseWriter.Push checks that the stream is peer-initiated.
 | 
						||
		msg.done <- errStreamClosed
 | 
						||
		return
 | 
						||
	}
 | 
						||
 | 
						||
	// http://tools.ietf.org/html/rfc7540#section-6.6.
 | 
						||
	if !sc.pushEnabled {
 | 
						||
		msg.done <- http.ErrNotSupported
 | 
						||
		return
 | 
						||
	}
 | 
						||
 | 
						||
	// PUSH_PROMISE frames must be sent in increasing order by stream ID, so
 | 
						||
	// we allocate an ID for the promised stream lazily, when the PUSH_PROMISE
 | 
						||
	// is written. Once the ID is allocated, we start the request handler.
 | 
						||
	allocatePromisedID := func() (uint32, error) {
 | 
						||
		sc.serveG.check()
 | 
						||
 | 
						||
		// Check this again, just in case. Technically, we might have received
 | 
						||
		// an updated SETTINGS by the time we got around to writing this frame.
 | 
						||
		if !sc.pushEnabled {
 | 
						||
			return 0, http.ErrNotSupported
 | 
						||
		}
 | 
						||
		// http://tools.ietf.org/html/rfc7540#section-6.5.2.
 | 
						||
		if sc.curPushedStreams+1 > sc.clientMaxStreams {
 | 
						||
			return 0, ErrPushLimitReached
 | 
						||
		}
 | 
						||
 | 
						||
		// http://tools.ietf.org/html/rfc7540#section-5.1.1.
 | 
						||
		// Streams initiated by the server MUST use even-numbered identifiers.
 | 
						||
		// A server that is unable to establish a new stream identifier can send a GOAWAY
 | 
						||
		// frame so that the client is forced to open a new connection for new streams.
 | 
						||
		if sc.maxPushPromiseID+2 >= 1<<31 {
 | 
						||
			sc.startGracefulShutdownInternal()
 | 
						||
			return 0, ErrPushLimitReached
 | 
						||
		}
 | 
						||
		sc.maxPushPromiseID += 2
 | 
						||
		promisedID := sc.maxPushPromiseID
 | 
						||
 | 
						||
		// http://tools.ietf.org/html/rfc7540#section-8.2.
 | 
						||
		// Strictly speaking, the new stream should start in "reserved (local)", then
 | 
						||
		// transition to "half closed (remote)" after sending the initial HEADERS, but
 | 
						||
		// we start in "half closed (remote)" for simplicity.
 | 
						||
		// See further comments at the definition of stateHalfClosedRemote.
 | 
						||
		promised := sc.newStream(promisedID, msg.parent.id, stateHalfClosedRemote)
 | 
						||
		rw, req, err := sc.newWriterAndRequestNoBody(promised, requestParam{
 | 
						||
			method:    msg.method,
 | 
						||
			scheme:    msg.url.Scheme,
 | 
						||
			authority: msg.url.Host,
 | 
						||
			path:      msg.url.RequestURI(),
 | 
						||
			header:    cloneHeader(msg.header), // clone since handler runs concurrently with writing the PUSH_PROMISE
 | 
						||
		})
 | 
						||
		if err != nil {
 | 
						||
			// Should not happen, since we've already validated msg.url.
 | 
						||
			panic(fmt.Sprintf("newWriterAndRequestNoBody(%+v): %v", msg.url, err))
 | 
						||
		}
 | 
						||
 | 
						||
		sc.curHandlers++
 | 
						||
		go sc.runHandler(rw, req, sc.handler.ServeHTTP)
 | 
						||
		return promisedID, nil
 | 
						||
	}
 | 
						||
 | 
						||
	sc.writeFrame(FrameWriteRequest{
 | 
						||
		write: &writePushPromise{
 | 
						||
			streamID:           msg.parent.id,
 | 
						||
			method:             msg.method,
 | 
						||
			url:                msg.url,
 | 
						||
			h:                  msg.header,
 | 
						||
			allocatePromisedID: allocatePromisedID,
 | 
						||
		},
 | 
						||
		stream: msg.parent,
 | 
						||
		done:   msg.done,
 | 
						||
	})
 | 
						||
}
 | 
						||
 | 
						||
// foreachHeaderElement splits v according to the "#rule" construction
 | 
						||
// in RFC 7230 section 7 and calls fn for each non-empty element.
 | 
						||
func foreachHeaderElement(v string, fn func(string)) {
 | 
						||
	v = textproto.TrimString(v)
 | 
						||
	if v == "" {
 | 
						||
		return
 | 
						||
	}
 | 
						||
	if !strings.Contains(v, ",") {
 | 
						||
		fn(v)
 | 
						||
		return
 | 
						||
	}
 | 
						||
	for _, f := range strings.Split(v, ",") {
 | 
						||
		if f = textproto.TrimString(f); f != "" {
 | 
						||
			fn(f)
 | 
						||
		}
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// From http://httpwg.org/specs/rfc7540.html#rfc.section.8.1.2.2
 | 
						||
var connHeaders = []string{
 | 
						||
	"Connection",
 | 
						||
	"Keep-Alive",
 | 
						||
	"Proxy-Connection",
 | 
						||
	"Transfer-Encoding",
 | 
						||
	"Upgrade",
 | 
						||
}
 | 
						||
 | 
						||
// checkValidHTTP2RequestHeaders checks whether h is a valid HTTP/2 request,
 | 
						||
// per RFC 7540 Section 8.1.2.2.
 | 
						||
// The returned error is reported to users.
 | 
						||
func checkValidHTTP2RequestHeaders(h http.Header) error {
 | 
						||
	for _, k := range connHeaders {
 | 
						||
		if _, ok := h[k]; ok {
 | 
						||
			return fmt.Errorf("request header %q is not valid in HTTP/2", k)
 | 
						||
		}
 | 
						||
	}
 | 
						||
	te := h["Te"]
 | 
						||
	if len(te) > 0 && (len(te) > 1 || (te[0] != "trailers" && te[0] != "")) {
 | 
						||
		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
 | 
						||
	}
 | 
						||
	return nil
 | 
						||
}
 | 
						||
 | 
						||
func new400Handler(err error) http.HandlerFunc {
 | 
						||
	return func(w http.ResponseWriter, r *http.Request) {
 | 
						||
		http.Error(w, err.Error(), http.StatusBadRequest)
 | 
						||
	}
 | 
						||
}
 | 
						||
 | 
						||
// h1ServerKeepAlivesDisabled reports whether hs has its keep-alives
 | 
						||
// disabled. See comments on h1ServerShutdownChan above for why
 | 
						||
// the code is written this way.
 | 
						||
func h1ServerKeepAlivesDisabled(hs *http.Server) bool {
 | 
						||
	var x interface{} = hs
 | 
						||
	type I interface {
 | 
						||
		doKeepAlives() bool
 | 
						||
	}
 | 
						||
	if hs, ok := x.(I); ok {
 | 
						||
		return !hs.doKeepAlives()
 | 
						||
	}
 | 
						||
	return false
 | 
						||
}
 | 
						||
 | 
						||
func (sc *serverConn) countError(name string, err error) error {
 | 
						||
	if sc == nil || sc.srv == nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	f := sc.srv.CountError
 | 
						||
	if f == nil {
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	var typ string
 | 
						||
	var code ErrCode
 | 
						||
	switch e := err.(type) {
 | 
						||
	case ConnectionError:
 | 
						||
		typ = "conn"
 | 
						||
		code = ErrCode(e)
 | 
						||
	case StreamError:
 | 
						||
		typ = "stream"
 | 
						||
		code = ErrCode(e.Code)
 | 
						||
	default:
 | 
						||
		return err
 | 
						||
	}
 | 
						||
	codeStr := errCodeName[code]
 | 
						||
	if codeStr == "" {
 | 
						||
		codeStr = strconv.Itoa(int(code))
 | 
						||
	}
 | 
						||
	f(fmt.Sprintf("%s_%s_%s", typ, codeStr, name))
 | 
						||
	return err
 | 
						||
}
 |