mirror of
https://github.com/containers/skopeo.git
synced 2025-04-28 11:14:08 +00:00
Merge pull request #2548 from containers/renovate/go-golang.org-x-net-vulnerability
chore(deps): update module golang.org/x/net to v0.36.0 [security]
This commit is contained in:
commit
ceabd93f4a
8
go.mod
8
go.mod
@ -124,13 +124,13 @@ require (
|
|||||||
go.opentelemetry.io/otel v1.31.0 // indirect
|
go.opentelemetry.io/otel v1.31.0 // indirect
|
||||||
go.opentelemetry.io/otel/metric v1.31.0 // indirect
|
go.opentelemetry.io/otel/metric v1.31.0 // indirect
|
||||||
go.opentelemetry.io/otel/trace v1.31.0 // indirect
|
go.opentelemetry.io/otel/trace v1.31.0 // indirect
|
||||||
golang.org/x/crypto v0.32.0 // indirect
|
golang.org/x/crypto v0.35.0 // indirect
|
||||||
golang.org/x/mod v0.22.0 // indirect
|
golang.org/x/mod v0.22.0 // indirect
|
||||||
golang.org/x/net v0.34.0 // indirect
|
golang.org/x/net v0.36.0 // indirect
|
||||||
golang.org/x/oauth2 v0.25.0 // indirect
|
golang.org/x/oauth2 v0.25.0 // indirect
|
||||||
golang.org/x/sync v0.10.0 // indirect
|
golang.org/x/sync v0.11.0 // indirect
|
||||||
golang.org/x/sys v0.30.0 // indirect
|
golang.org/x/sys v0.30.0 // indirect
|
||||||
golang.org/x/text v0.21.0 // indirect
|
golang.org/x/text v0.22.0 // indirect
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20250102185135-69823020774d // indirect
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20250102185135-69823020774d // indirect
|
||||||
google.golang.org/grpc v1.69.4 // indirect
|
google.golang.org/grpc v1.69.4 // indirect
|
||||||
google.golang.org/protobuf v1.36.2 // indirect
|
google.golang.org/protobuf v1.36.2 // indirect
|
||||||
|
14
go.sum
14
go.sum
@ -383,8 +383,8 @@ golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliY
|
|||||||
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
|
golang.org/x/crypto v0.19.0/go.mod h1:Iy9bg/ha4yyC70EfRS8jz+B6ybOBKMaSxLj6P6oBDfU=
|
||||||
golang.org/x/crypto v0.23.0/go.mod h1:CKFgDieR+mRhux2Lsu27y0fO304Db0wZe70UKqHu0v8=
|
golang.org/x/crypto v0.23.0/go.mod h1:CKFgDieR+mRhux2Lsu27y0fO304Db0wZe70UKqHu0v8=
|
||||||
golang.org/x/crypto v0.30.0/go.mod h1:kDsLvtWBEx7MV9tJOj9bnXsPbxwJQ6csT/x4KIN4Ssk=
|
golang.org/x/crypto v0.30.0/go.mod h1:kDsLvtWBEx7MV9tJOj9bnXsPbxwJQ6csT/x4KIN4Ssk=
|
||||||
golang.org/x/crypto v0.32.0 h1:euUpcYgM8WcP71gNpTqQCn6rC2t6ULUPiOzfWaXVVfc=
|
golang.org/x/crypto v0.35.0 h1:b15kiHdrGCHrP6LvwaQ3c03kgNhhiMgvlhxHQhmg2Xs=
|
||||||
golang.org/x/crypto v0.32.0/go.mod h1:ZnnJkOaASj8g0AjIduWNlq2NRxL0PlBrbKVyZ6V/Ugc=
|
golang.org/x/crypto v0.35.0/go.mod h1:dy7dXNW32cAb/6/PRuTNsix8T+vJAqvuIy5Bli/x0YQ=
|
||||||
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
||||||
golang.org/x/exp v0.0.0-20250103183323-7d7fa50e5329 h1:9kj3STMvgqy3YA4VQXBrN7925ICMxD5wzMRcgA30588=
|
golang.org/x/exp v0.0.0-20250103183323-7d7fa50e5329 h1:9kj3STMvgqy3YA4VQXBrN7925ICMxD5wzMRcgA30588=
|
||||||
golang.org/x/exp v0.0.0-20250103183323-7d7fa50e5329/go.mod h1:qj5a5QZpwLU2NLQudwIN5koi3beDhSAlJwa67PuM98c=
|
golang.org/x/exp v0.0.0-20250103183323-7d7fa50e5329/go.mod h1:qj5a5QZpwLU2NLQudwIN5koi3beDhSAlJwa67PuM98c=
|
||||||
@ -416,8 +416,8 @@ golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
|||||||
golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
|
golang.org/x/net v0.15.0/go.mod h1:idbUs1IY1+zTqbi8yxTbhexhEEk5ur9LInksu6HrEpk=
|
||||||
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
|
golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
|
||||||
golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
|
golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
|
||||||
golang.org/x/net v0.34.0 h1:Mb7Mrk043xzHgnRM88suvJFwzVrRfHEHJEl5/71CKw0=
|
golang.org/x/net v0.36.0 h1:vWF2fRbw4qslQsQzgFqZff+BItCvGFQqKzKIzx1rmoA=
|
||||||
golang.org/x/net v0.34.0/go.mod h1:di0qlW3YNM5oh6GqDGQr92MyTozJPmybPK4Ev/Gm31k=
|
golang.org/x/net v0.36.0/go.mod h1:bFmbeoIPfrw4sMHNhb4J9f6+tPziuGjq7Jk/38fxi1I=
|
||||||
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
golang.org/x/oauth2 v0.25.0 h1:CY4y7XT9v0cRI9oupztF8AgiIu99L/ksR/Xp/6jrZ70=
|
golang.org/x/oauth2 v0.25.0 h1:CY4y7XT9v0cRI9oupztF8AgiIu99L/ksR/Xp/6jrZ70=
|
||||||
golang.org/x/oauth2 v0.25.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
|
golang.org/x/oauth2 v0.25.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=
|
||||||
@ -431,8 +431,9 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
|||||||
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
|
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
|
||||||
golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
||||||
golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
||||||
golang.org/x/sync v0.10.0 h1:3NQrjDixjgGwUOCaF8w2+VYHv0Ve/vGYSbdkTa98gmQ=
|
|
||||||
golang.org/x/sync v0.10.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
golang.org/x/sync v0.10.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
||||||
|
golang.org/x/sync v0.11.0 h1:GGz8+XQP4FvTTrjZPzNKTMFtSXH80RAzG+5ghFPgK9w=
|
||||||
|
golang.org/x/sync v0.11.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
|
||||||
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
@ -469,8 +470,9 @@ golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
|
|||||||
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
|
golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE=
|
||||||
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
|
golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
|
||||||
golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
|
golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
|
||||||
golang.org/x/text v0.21.0 h1:zyQAAkrwaneQ066sspRyJaG9VNi/YJ1NfzcGB3hZ/qo=
|
|
||||||
golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
|
golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
|
||||||
|
golang.org/x/text v0.22.0 h1:bofq7m3/HAFvbF51jz3Q9wLg3jkvSPuiZu/pD1XwgtM=
|
||||||
|
golang.org/x/text v0.22.0/go.mod h1:YRoo4H8PVmsu+E3Ou7cqLVH8oXWIHVoX0jqUWALQhfY=
|
||||||
golang.org/x/time v0.9.0 h1:EsRrnYcQiGH+5FfbgvV4AP7qEZstoyrHB0DzarOQ4ZY=
|
golang.org/x/time v0.9.0 h1:EsRrnYcQiGH+5FfbgvV4AP7qEZstoyrHB0DzarOQ4ZY=
|
||||||
golang.org/x/time v0.9.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
|
golang.org/x/time v0.9.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
39
vendor/golang.org/x/net/http2/http2.go
generated
vendored
39
vendor/golang.org/x/net/http2/http2.go
generated
vendored
@ -34,11 +34,19 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
VerboseLogs bool
|
VerboseLogs bool
|
||||||
logFrameWrites bool
|
logFrameWrites bool
|
||||||
logFrameReads bool
|
logFrameReads bool
|
||||||
inTests bool
|
inTests bool
|
||||||
disableExtendedConnectProtocol bool
|
|
||||||
|
// Enabling extended CONNECT by causes browsers to attempt to use
|
||||||
|
// WebSockets-over-HTTP/2. This results in problems when the server's websocket
|
||||||
|
// package doesn't support extended CONNECT.
|
||||||
|
//
|
||||||
|
// Disable extended CONNECT by default for now.
|
||||||
|
//
|
||||||
|
// Issue #71128.
|
||||||
|
disableExtendedConnectProtocol = true
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
@ -51,8 +59,8 @@ func init() {
|
|||||||
logFrameWrites = true
|
logFrameWrites = true
|
||||||
logFrameReads = true
|
logFrameReads = true
|
||||||
}
|
}
|
||||||
if strings.Contains(e, "http2xconnect=0") {
|
if strings.Contains(e, "http2xconnect=1") {
|
||||||
disableExtendedConnectProtocol = true
|
disableExtendedConnectProtocol = false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -407,23 +415,6 @@ func (s *sorter) SortStrings(ss []string) {
|
|||||||
s.v = save
|
s.v = save
|
||||||
}
|
}
|
||||||
|
|
||||||
// validPseudoPath reports whether v is a valid :path pseudo-header
|
|
||||||
// value. It must be either:
|
|
||||||
//
|
|
||||||
// - a non-empty string starting with '/'
|
|
||||||
// - the string '*', for OPTIONS requests.
|
|
||||||
//
|
|
||||||
// For now this is only used a quick check for deciding when to clean
|
|
||||||
// up Opaque URLs before sending requests from the Transport.
|
|
||||||
// See golang.org/issue/16847
|
|
||||||
//
|
|
||||||
// We used to enforce that the path also didn't start with "//", but
|
|
||||||
// Google's GFE accepts such paths and Chrome sends them, so ignore
|
|
||||||
// that part of the spec. See golang.org/issue/19103.
|
|
||||||
func validPseudoPath(v string) bool {
|
|
||||||
return (len(v) > 0 && v[0] == '/') || v == "*"
|
|
||||||
}
|
|
||||||
|
|
||||||
// incomparable is a zero-width, non-comparable type. Adding it to a struct
|
// incomparable is a zero-width, non-comparable type. Adding it to a struct
|
||||||
// makes that struct also non-comparable, and generally doesn't add
|
// makes that struct also non-comparable, and generally doesn't add
|
||||||
// any size (as long as it's first).
|
// any size (as long as it's first).
|
||||||
|
125
vendor/golang.org/x/net/http2/server.go
generated
vendored
125
vendor/golang.org/x/net/http2/server.go
generated
vendored
@ -50,6 +50,7 @@ import (
|
|||||||
|
|
||||||
"golang.org/x/net/http/httpguts"
|
"golang.org/x/net/http/httpguts"
|
||||||
"golang.org/x/net/http2/hpack"
|
"golang.org/x/net/http2/hpack"
|
||||||
|
"golang.org/x/net/internal/httpcommon"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -812,8 +813,7 @@ const maxCachedCanonicalHeadersKeysSize = 2048
|
|||||||
|
|
||||||
func (sc *serverConn) canonicalHeader(v string) string {
|
func (sc *serverConn) canonicalHeader(v string) string {
|
||||||
sc.serveG.check()
|
sc.serveG.check()
|
||||||
buildCommonHeaderMapsOnce()
|
cv, ok := httpcommon.CachedCanonicalHeader(v)
|
||||||
cv, ok := commonCanonHeader[v]
|
|
||||||
if ok {
|
if ok {
|
||||||
return cv
|
return cv
|
||||||
}
|
}
|
||||||
@ -2233,25 +2233,25 @@ func (sc *serverConn) newStream(id, pusherID uint32, state streamState) *stream
|
|||||||
func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*responseWriter, *http.Request, error) {
|
func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*responseWriter, *http.Request, error) {
|
||||||
sc.serveG.check()
|
sc.serveG.check()
|
||||||
|
|
||||||
rp := requestParam{
|
rp := httpcommon.ServerRequestParam{
|
||||||
method: f.PseudoValue("method"),
|
Method: f.PseudoValue("method"),
|
||||||
scheme: f.PseudoValue("scheme"),
|
Scheme: f.PseudoValue("scheme"),
|
||||||
authority: f.PseudoValue("authority"),
|
Authority: f.PseudoValue("authority"),
|
||||||
path: f.PseudoValue("path"),
|
Path: f.PseudoValue("path"),
|
||||||
protocol: f.PseudoValue("protocol"),
|
Protocol: f.PseudoValue("protocol"),
|
||||||
}
|
}
|
||||||
|
|
||||||
// extended connect is disabled, so we should not see :protocol
|
// extended connect is disabled, so we should not see :protocol
|
||||||
if disableExtendedConnectProtocol && rp.protocol != "" {
|
if disableExtendedConnectProtocol && rp.Protocol != "" {
|
||||||
return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
|
return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
|
||||||
}
|
}
|
||||||
|
|
||||||
isConnect := rp.method == "CONNECT"
|
isConnect := rp.Method == "CONNECT"
|
||||||
if isConnect {
|
if isConnect {
|
||||||
if rp.protocol == "" && (rp.path != "" || rp.scheme != "" || rp.authority == "") {
|
if rp.Protocol == "" && (rp.Path != "" || rp.Scheme != "" || rp.Authority == "") {
|
||||||
return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
|
return nil, nil, sc.countError("bad_connect", streamError(f.StreamID, ErrCodeProtocol))
|
||||||
}
|
}
|
||||||
} else if rp.method == "" || rp.path == "" || (rp.scheme != "https" && rp.scheme != "http") {
|
} else if rp.Method == "" || rp.Path == "" || (rp.Scheme != "https" && rp.Scheme != "http") {
|
||||||
// See 8.1.2.6 Malformed Requests and Responses:
|
// See 8.1.2.6 Malformed Requests and Responses:
|
||||||
//
|
//
|
||||||
// Malformed requests or responses that are detected
|
// Malformed requests or responses that are detected
|
||||||
@ -2265,15 +2265,16 @@ func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*res
|
|||||||
return nil, nil, sc.countError("bad_path_method", streamError(f.StreamID, ErrCodeProtocol))
|
return nil, nil, sc.countError("bad_path_method", streamError(f.StreamID, ErrCodeProtocol))
|
||||||
}
|
}
|
||||||
|
|
||||||
rp.header = make(http.Header)
|
header := make(http.Header)
|
||||||
|
rp.Header = header
|
||||||
for _, hf := range f.RegularFields() {
|
for _, hf := range f.RegularFields() {
|
||||||
rp.header.Add(sc.canonicalHeader(hf.Name), hf.Value)
|
header.Add(sc.canonicalHeader(hf.Name), hf.Value)
|
||||||
}
|
}
|
||||||
if rp.authority == "" {
|
if rp.Authority == "" {
|
||||||
rp.authority = rp.header.Get("Host")
|
rp.Authority = header.Get("Host")
|
||||||
}
|
}
|
||||||
if rp.protocol != "" {
|
if rp.Protocol != "" {
|
||||||
rp.header.Set(":protocol", rp.protocol)
|
header.Set(":protocol", rp.Protocol)
|
||||||
}
|
}
|
||||||
|
|
||||||
rw, req, err := sc.newWriterAndRequestNoBody(st, rp)
|
rw, req, err := sc.newWriterAndRequestNoBody(st, rp)
|
||||||
@ -2282,7 +2283,7 @@ func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*res
|
|||||||
}
|
}
|
||||||
bodyOpen := !f.StreamEnded()
|
bodyOpen := !f.StreamEnded()
|
||||||
if bodyOpen {
|
if bodyOpen {
|
||||||
if vv, ok := rp.header["Content-Length"]; ok {
|
if vv, ok := rp.Header["Content-Length"]; ok {
|
||||||
if cl, err := strconv.ParseUint(vv[0], 10, 63); err == nil {
|
if cl, err := strconv.ParseUint(vv[0], 10, 63); err == nil {
|
||||||
req.ContentLength = int64(cl)
|
req.ContentLength = int64(cl)
|
||||||
} else {
|
} else {
|
||||||
@ -2298,84 +2299,38 @@ func (sc *serverConn) newWriterAndRequest(st *stream, f *MetaHeadersFrame) (*res
|
|||||||
return rw, req, nil
|
return rw, req, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type requestParam struct {
|
func (sc *serverConn) newWriterAndRequestNoBody(st *stream, rp httpcommon.ServerRequestParam) (*responseWriter, *http.Request, error) {
|
||||||
method string
|
|
||||||
scheme, authority, path string
|
|
||||||
protocol string
|
|
||||||
header http.Header
|
|
||||||
}
|
|
||||||
|
|
||||||
func (sc *serverConn) newWriterAndRequestNoBody(st *stream, rp requestParam) (*responseWriter, *http.Request, error) {
|
|
||||||
sc.serveG.check()
|
sc.serveG.check()
|
||||||
|
|
||||||
var tlsState *tls.ConnectionState // nil if not scheme https
|
var tlsState *tls.ConnectionState // nil if not scheme https
|
||||||
if rp.scheme == "https" {
|
if rp.Scheme == "https" {
|
||||||
tlsState = sc.tlsState
|
tlsState = sc.tlsState
|
||||||
}
|
}
|
||||||
|
|
||||||
needsContinue := httpguts.HeaderValuesContainsToken(rp.header["Expect"], "100-continue")
|
res := httpcommon.NewServerRequest(rp)
|
||||||
if needsContinue {
|
if res.InvalidReason != "" {
|
||||||
rp.header.Del("Expect")
|
return nil, nil, sc.countError(res.InvalidReason, streamError(st.id, ErrCodeProtocol))
|
||||||
}
|
|
||||||
// Merge Cookie headers into one "; "-delimited value.
|
|
||||||
if cookies := rp.header["Cookie"]; len(cookies) > 1 {
|
|
||||||
rp.header.Set("Cookie", strings.Join(cookies, "; "))
|
|
||||||
}
|
|
||||||
|
|
||||||
// Setup Trailers
|
|
||||||
var trailer http.Header
|
|
||||||
for _, v := range rp.header["Trailer"] {
|
|
||||||
for _, key := range strings.Split(v, ",") {
|
|
||||||
key = http.CanonicalHeaderKey(textproto.TrimString(key))
|
|
||||||
switch key {
|
|
||||||
case "Transfer-Encoding", "Trailer", "Content-Length":
|
|
||||||
// Bogus. (copy of http1 rules)
|
|
||||||
// Ignore.
|
|
||||||
default:
|
|
||||||
if trailer == nil {
|
|
||||||
trailer = make(http.Header)
|
|
||||||
}
|
|
||||||
trailer[key] = nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
delete(rp.header, "Trailer")
|
|
||||||
|
|
||||||
var url_ *url.URL
|
|
||||||
var requestURI string
|
|
||||||
if rp.method == "CONNECT" && rp.protocol == "" {
|
|
||||||
url_ = &url.URL{Host: rp.authority}
|
|
||||||
requestURI = rp.authority // mimic HTTP/1 server behavior
|
|
||||||
} else {
|
|
||||||
var err error
|
|
||||||
url_, err = url.ParseRequestURI(rp.path)
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, sc.countError("bad_path", streamError(st.id, ErrCodeProtocol))
|
|
||||||
}
|
|
||||||
requestURI = rp.path
|
|
||||||
}
|
}
|
||||||
|
|
||||||
body := &requestBody{
|
body := &requestBody{
|
||||||
conn: sc,
|
conn: sc,
|
||||||
stream: st,
|
stream: st,
|
||||||
needsContinue: needsContinue,
|
needsContinue: res.NeedsContinue,
|
||||||
}
|
}
|
||||||
req := &http.Request{
|
req := (&http.Request{
|
||||||
Method: rp.method,
|
Method: rp.Method,
|
||||||
URL: url_,
|
URL: res.URL,
|
||||||
RemoteAddr: sc.remoteAddrStr,
|
RemoteAddr: sc.remoteAddrStr,
|
||||||
Header: rp.header,
|
Header: rp.Header,
|
||||||
RequestURI: requestURI,
|
RequestURI: res.RequestURI,
|
||||||
Proto: "HTTP/2.0",
|
Proto: "HTTP/2.0",
|
||||||
ProtoMajor: 2,
|
ProtoMajor: 2,
|
||||||
ProtoMinor: 0,
|
ProtoMinor: 0,
|
||||||
TLS: tlsState,
|
TLS: tlsState,
|
||||||
Host: rp.authority,
|
Host: rp.Authority,
|
||||||
Body: body,
|
Body: body,
|
||||||
Trailer: trailer,
|
Trailer: res.Trailer,
|
||||||
}
|
}).WithContext(st.ctx)
|
||||||
req = req.WithContext(st.ctx)
|
|
||||||
|
|
||||||
rw := sc.newResponseWriter(st, req)
|
rw := sc.newResponseWriter(st, req)
|
||||||
return rw, req, nil
|
return rw, req, nil
|
||||||
}
|
}
|
||||||
@ -3270,12 +3225,12 @@ func (sc *serverConn) startPush(msg *startPushRequest) {
|
|||||||
// we start in "half closed (remote)" for simplicity.
|
// we start in "half closed (remote)" for simplicity.
|
||||||
// See further comments at the definition of stateHalfClosedRemote.
|
// See further comments at the definition of stateHalfClosedRemote.
|
||||||
promised := sc.newStream(promisedID, msg.parent.id, stateHalfClosedRemote)
|
promised := sc.newStream(promisedID, msg.parent.id, stateHalfClosedRemote)
|
||||||
rw, req, err := sc.newWriterAndRequestNoBody(promised, requestParam{
|
rw, req, err := sc.newWriterAndRequestNoBody(promised, httpcommon.ServerRequestParam{
|
||||||
method: msg.method,
|
Method: msg.method,
|
||||||
scheme: msg.url.Scheme,
|
Scheme: msg.url.Scheme,
|
||||||
authority: msg.url.Host,
|
Authority: msg.url.Host,
|
||||||
path: msg.url.RequestURI(),
|
Path: msg.url.RequestURI(),
|
||||||
header: cloneHeader(msg.header), // clone since handler runs concurrently with writing the PUSH_PROMISE
|
Header: cloneHeader(msg.header), // clone since handler runs concurrently with writing the PUSH_PROMISE
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// Should not happen, since we've already validated msg.url.
|
// Should not happen, since we've already validated msg.url.
|
||||||
|
334
vendor/golang.org/x/net/http2/transport.go
generated
vendored
334
vendor/golang.org/x/net/http2/transport.go
generated
vendored
@ -25,7 +25,6 @@ import (
|
|||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptrace"
|
"net/http/httptrace"
|
||||||
"net/textproto"
|
"net/textproto"
|
||||||
"sort"
|
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
@ -35,6 +34,7 @@ import (
|
|||||||
"golang.org/x/net/http/httpguts"
|
"golang.org/x/net/http/httpguts"
|
||||||
"golang.org/x/net/http2/hpack"
|
"golang.org/x/net/http2/hpack"
|
||||||
"golang.org/x/net/idna"
|
"golang.org/x/net/idna"
|
||||||
|
"golang.org/x/net/internal/httpcommon"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -1275,23 +1275,6 @@ func (cc *ClientConn) closeForLostPing() {
|
|||||||
// exported. At least they'll be DeepEqual for h1-vs-h2 comparisons tests.
|
// exported. At least they'll be DeepEqual for h1-vs-h2 comparisons tests.
|
||||||
var errRequestCanceled = errors.New("net/http: request canceled")
|
var errRequestCanceled = errors.New("net/http: request canceled")
|
||||||
|
|
||||||
func commaSeparatedTrailers(req *http.Request) (string, error) {
|
|
||||||
keys := make([]string, 0, len(req.Trailer))
|
|
||||||
for k := range req.Trailer {
|
|
||||||
k = canonicalHeader(k)
|
|
||||||
switch k {
|
|
||||||
case "Transfer-Encoding", "Trailer", "Content-Length":
|
|
||||||
return "", fmt.Errorf("invalid Trailer key %q", k)
|
|
||||||
}
|
|
||||||
keys = append(keys, k)
|
|
||||||
}
|
|
||||||
if len(keys) > 0 {
|
|
||||||
sort.Strings(keys)
|
|
||||||
return strings.Join(keys, ","), nil
|
|
||||||
}
|
|
||||||
return "", nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (cc *ClientConn) responseHeaderTimeout() time.Duration {
|
func (cc *ClientConn) responseHeaderTimeout() time.Duration {
|
||||||
if cc.t.t1 != nil {
|
if cc.t.t1 != nil {
|
||||||
return cc.t.t1.ResponseHeaderTimeout
|
return cc.t.t1.ResponseHeaderTimeout
|
||||||
@ -1303,22 +1286,6 @@ func (cc *ClientConn) responseHeaderTimeout() time.Duration {
|
|||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
// checkConnHeaders checks whether req has any invalid connection-level headers.
|
|
||||||
// per RFC 7540 section 8.1.2.2: Connection-Specific Header Fields.
|
|
||||||
// Certain headers are special-cased as okay but not transmitted later.
|
|
||||||
func checkConnHeaders(req *http.Request) error {
|
|
||||||
if v := req.Header.Get("Upgrade"); v != "" {
|
|
||||||
return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
|
|
||||||
}
|
|
||||||
if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
|
|
||||||
return fmt.Errorf("http2: invalid Transfer-Encoding request header: %q", vv)
|
|
||||||
}
|
|
||||||
if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !asciiEqualFold(vv[0], "close") && !asciiEqualFold(vv[0], "keep-alive")) {
|
|
||||||
return fmt.Errorf("http2: invalid Connection request header: %q", vv)
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// actualContentLength returns a sanitized version of
|
// actualContentLength returns a sanitized version of
|
||||||
// req.ContentLength, where 0 actually means zero (not unknown) and -1
|
// req.ContentLength, where 0 actually means zero (not unknown) and -1
|
||||||
// means unknown.
|
// means unknown.
|
||||||
@ -1364,25 +1331,7 @@ func (cc *ClientConn) roundTrip(req *http.Request, streamf func(*clientStream))
|
|||||||
donec: make(chan struct{}),
|
donec: make(chan struct{}),
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(bradfitz): this is a copy of the logic in net/http. Unify somewhere?
|
cs.requestedGzip = httpcommon.IsRequestGzip(req.Method, req.Header, cc.t.disableCompression())
|
||||||
if !cc.t.disableCompression() &&
|
|
||||||
req.Header.Get("Accept-Encoding") == "" &&
|
|
||||||
req.Header.Get("Range") == "" &&
|
|
||||||
!cs.isHead {
|
|
||||||
// Request gzip only, not deflate. Deflate is ambiguous and
|
|
||||||
// not as universally supported anyway.
|
|
||||||
// See: https://zlib.net/zlib_faq.html#faq39
|
|
||||||
//
|
|
||||||
// Note that we don't request this for HEAD requests,
|
|
||||||
// due to a bug in nginx:
|
|
||||||
// http://trac.nginx.org/nginx/ticket/358
|
|
||||||
// https://golang.org/issue/5522
|
|
||||||
//
|
|
||||||
// We don't request gzip if the request is for a range, since
|
|
||||||
// auto-decoding a portion of a gzipped document will just fail
|
|
||||||
// anyway. See https://golang.org/issue/8923
|
|
||||||
cs.requestedGzip = true
|
|
||||||
}
|
|
||||||
|
|
||||||
go cs.doRequest(req, streamf)
|
go cs.doRequest(req, streamf)
|
||||||
|
|
||||||
@ -1496,10 +1445,6 @@ func (cs *clientStream) writeRequest(req *http.Request, streamf func(*clientStre
|
|||||||
cc := cs.cc
|
cc := cs.cc
|
||||||
ctx := cs.ctx
|
ctx := cs.ctx
|
||||||
|
|
||||||
if err := checkConnHeaders(req); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// wait for setting frames to be received, a server can change this value later,
|
// wait for setting frames to be received, a server can change this value later,
|
||||||
// but we just wait for the first settings frame
|
// but we just wait for the first settings frame
|
||||||
var isExtendedConnect bool
|
var isExtendedConnect bool
|
||||||
@ -1663,26 +1608,39 @@ func (cs *clientStream) encodeAndWriteHeaders(req *http.Request) error {
|
|||||||
// we send: HEADERS{1}, CONTINUATION{0,} + DATA{0,} (DATA is
|
// we send: HEADERS{1}, CONTINUATION{0,} + DATA{0,} (DATA is
|
||||||
// sent by writeRequestBody below, along with any Trailers,
|
// sent by writeRequestBody below, along with any Trailers,
|
||||||
// again in form HEADERS{1}, CONTINUATION{0,})
|
// again in form HEADERS{1}, CONTINUATION{0,})
|
||||||
trailers, err := commaSeparatedTrailers(req)
|
cc.hbuf.Reset()
|
||||||
|
res, err := encodeRequestHeaders(req, cs.requestedGzip, cc.peerMaxHeaderListSize, func(name, value string) {
|
||||||
|
cc.writeHeader(name, value)
|
||||||
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return fmt.Errorf("http2: %w", err)
|
||||||
}
|
|
||||||
hasTrailers := trailers != ""
|
|
||||||
contentLen := actualContentLength(req)
|
|
||||||
hasBody := contentLen != 0
|
|
||||||
hdrs, err := cc.encodeHeaders(req, cs.requestedGzip, trailers, contentLen)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
}
|
||||||
|
hdrs := cc.hbuf.Bytes()
|
||||||
|
|
||||||
// Write the request.
|
// Write the request.
|
||||||
endStream := !hasBody && !hasTrailers
|
endStream := !res.HasBody && !res.HasTrailers
|
||||||
cs.sentHeaders = true
|
cs.sentHeaders = true
|
||||||
err = cc.writeHeaders(cs.ID, endStream, int(cc.maxFrameSize), hdrs)
|
err = cc.writeHeaders(cs.ID, endStream, int(cc.maxFrameSize), hdrs)
|
||||||
traceWroteHeaders(cs.trace)
|
traceWroteHeaders(cs.trace)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func encodeRequestHeaders(req *http.Request, addGzipHeader bool, peerMaxHeaderListSize uint64, headerf func(name, value string)) (httpcommon.EncodeHeadersResult, error) {
|
||||||
|
return httpcommon.EncodeHeaders(req.Context(), httpcommon.EncodeHeadersParam{
|
||||||
|
Request: httpcommon.Request{
|
||||||
|
Header: req.Header,
|
||||||
|
Trailer: req.Trailer,
|
||||||
|
URL: req.URL,
|
||||||
|
Host: req.Host,
|
||||||
|
Method: req.Method,
|
||||||
|
ActualContentLength: actualContentLength(req),
|
||||||
|
},
|
||||||
|
AddGzipHeader: addGzipHeader,
|
||||||
|
PeerMaxHeaderListSize: peerMaxHeaderListSize,
|
||||||
|
DefaultUserAgent: defaultUserAgent,
|
||||||
|
}, headerf)
|
||||||
|
}
|
||||||
|
|
||||||
// cleanupWriteRequest performs post-request tasks.
|
// cleanupWriteRequest performs post-request tasks.
|
||||||
//
|
//
|
||||||
// If err (the result of writeRequest) is non-nil and the stream is not closed,
|
// If err (the result of writeRequest) is non-nil and the stream is not closed,
|
||||||
@ -2070,218 +2028,6 @@ func (cs *clientStream) awaitFlowControl(maxBytes int) (taken int32, err error)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func validateHeaders(hdrs http.Header) string {
|
|
||||||
for k, vv := range hdrs {
|
|
||||||
if !httpguts.ValidHeaderFieldName(k) && k != ":protocol" {
|
|
||||||
return fmt.Sprintf("name %q", k)
|
|
||||||
}
|
|
||||||
for _, v := range vv {
|
|
||||||
if !httpguts.ValidHeaderFieldValue(v) {
|
|
||||||
// Don't include the value in the error,
|
|
||||||
// because it may be sensitive.
|
|
||||||
return fmt.Sprintf("value for header %q", k)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
var errNilRequestURL = errors.New("http2: Request.URI is nil")
|
|
||||||
|
|
||||||
func isNormalConnect(req *http.Request) bool {
|
|
||||||
return req.Method == "CONNECT" && req.Header.Get(":protocol") == ""
|
|
||||||
}
|
|
||||||
|
|
||||||
// requires cc.wmu be held.
|
|
||||||
func (cc *ClientConn) encodeHeaders(req *http.Request, addGzipHeader bool, trailers string, contentLength int64) ([]byte, error) {
|
|
||||||
cc.hbuf.Reset()
|
|
||||||
if req.URL == nil {
|
|
||||||
return nil, errNilRequestURL
|
|
||||||
}
|
|
||||||
|
|
||||||
host := req.Host
|
|
||||||
if host == "" {
|
|
||||||
host = req.URL.Host
|
|
||||||
}
|
|
||||||
host, err := httpguts.PunycodeHostPort(host)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
if !httpguts.ValidHostHeader(host) {
|
|
||||||
return nil, errors.New("http2: invalid Host header")
|
|
||||||
}
|
|
||||||
|
|
||||||
var path string
|
|
||||||
if !isNormalConnect(req) {
|
|
||||||
path = req.URL.RequestURI()
|
|
||||||
if !validPseudoPath(path) {
|
|
||||||
orig := path
|
|
||||||
path = strings.TrimPrefix(path, req.URL.Scheme+"://"+host)
|
|
||||||
if !validPseudoPath(path) {
|
|
||||||
if req.URL.Opaque != "" {
|
|
||||||
return nil, fmt.Errorf("invalid request :path %q from URL.Opaque = %q", orig, req.URL.Opaque)
|
|
||||||
} else {
|
|
||||||
return nil, fmt.Errorf("invalid request :path %q", orig)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check for any invalid headers+trailers and return an error before we
|
|
||||||
// potentially pollute our hpack state. (We want to be able to
|
|
||||||
// continue to reuse the hpack encoder for future requests)
|
|
||||||
if err := validateHeaders(req.Header); err != "" {
|
|
||||||
return nil, fmt.Errorf("invalid HTTP header %s", err)
|
|
||||||
}
|
|
||||||
if err := validateHeaders(req.Trailer); err != "" {
|
|
||||||
return nil, fmt.Errorf("invalid HTTP trailer %s", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
enumerateHeaders := func(f func(name, value string)) {
|
|
||||||
// 8.1.2.3 Request Pseudo-Header Fields
|
|
||||||
// The :path pseudo-header field includes the path and query parts of the
|
|
||||||
// target URI (the path-absolute production and optionally a '?' character
|
|
||||||
// followed by the query production, see Sections 3.3 and 3.4 of
|
|
||||||
// [RFC3986]).
|
|
||||||
f(":authority", host)
|
|
||||||
m := req.Method
|
|
||||||
if m == "" {
|
|
||||||
m = http.MethodGet
|
|
||||||
}
|
|
||||||
f(":method", m)
|
|
||||||
if !isNormalConnect(req) {
|
|
||||||
f(":path", path)
|
|
||||||
f(":scheme", req.URL.Scheme)
|
|
||||||
}
|
|
||||||
if trailers != "" {
|
|
||||||
f("trailer", trailers)
|
|
||||||
}
|
|
||||||
|
|
||||||
var didUA bool
|
|
||||||
for k, vv := range req.Header {
|
|
||||||
if asciiEqualFold(k, "host") || asciiEqualFold(k, "content-length") {
|
|
||||||
// Host is :authority, already sent.
|
|
||||||
// Content-Length is automatic, set below.
|
|
||||||
continue
|
|
||||||
} else if asciiEqualFold(k, "connection") ||
|
|
||||||
asciiEqualFold(k, "proxy-connection") ||
|
|
||||||
asciiEqualFold(k, "transfer-encoding") ||
|
|
||||||
asciiEqualFold(k, "upgrade") ||
|
|
||||||
asciiEqualFold(k, "keep-alive") {
|
|
||||||
// Per 8.1.2.2 Connection-Specific Header
|
|
||||||
// Fields, don't send connection-specific
|
|
||||||
// fields. We have already checked if any
|
|
||||||
// are error-worthy so just ignore the rest.
|
|
||||||
continue
|
|
||||||
} else if asciiEqualFold(k, "user-agent") {
|
|
||||||
// Match Go's http1 behavior: at most one
|
|
||||||
// User-Agent. If set to nil or empty string,
|
|
||||||
// then omit it. Otherwise if not mentioned,
|
|
||||||
// include the default (below).
|
|
||||||
didUA = true
|
|
||||||
if len(vv) < 1 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
vv = vv[:1]
|
|
||||||
if vv[0] == "" {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
} else if asciiEqualFold(k, "cookie") {
|
|
||||||
// Per 8.1.2.5 To allow for better compression efficiency, the
|
|
||||||
// Cookie header field MAY be split into separate header fields,
|
|
||||||
// each with one or more cookie-pairs.
|
|
||||||
for _, v := range vv {
|
|
||||||
for {
|
|
||||||
p := strings.IndexByte(v, ';')
|
|
||||||
if p < 0 {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
f("cookie", v[:p])
|
|
||||||
p++
|
|
||||||
// strip space after semicolon if any.
|
|
||||||
for p+1 <= len(v) && v[p] == ' ' {
|
|
||||||
p++
|
|
||||||
}
|
|
||||||
v = v[p:]
|
|
||||||
}
|
|
||||||
if len(v) > 0 {
|
|
||||||
f("cookie", v)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, v := range vv {
|
|
||||||
f(k, v)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if shouldSendReqContentLength(req.Method, contentLength) {
|
|
||||||
f("content-length", strconv.FormatInt(contentLength, 10))
|
|
||||||
}
|
|
||||||
if addGzipHeader {
|
|
||||||
f("accept-encoding", "gzip")
|
|
||||||
}
|
|
||||||
if !didUA {
|
|
||||||
f("user-agent", defaultUserAgent)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Do a first pass over the headers counting bytes to ensure
|
|
||||||
// we don't exceed cc.peerMaxHeaderListSize. This is done as a
|
|
||||||
// separate pass before encoding the headers to prevent
|
|
||||||
// modifying the hpack state.
|
|
||||||
hlSize := uint64(0)
|
|
||||||
enumerateHeaders(func(name, value string) {
|
|
||||||
hf := hpack.HeaderField{Name: name, Value: value}
|
|
||||||
hlSize += uint64(hf.Size())
|
|
||||||
})
|
|
||||||
|
|
||||||
if hlSize > cc.peerMaxHeaderListSize {
|
|
||||||
return nil, errRequestHeaderListSize
|
|
||||||
}
|
|
||||||
|
|
||||||
trace := httptrace.ContextClientTrace(req.Context())
|
|
||||||
traceHeaders := traceHasWroteHeaderField(trace)
|
|
||||||
|
|
||||||
// Header list size is ok. Write the headers.
|
|
||||||
enumerateHeaders(func(name, value string) {
|
|
||||||
name, ascii := lowerHeader(name)
|
|
||||||
if !ascii {
|
|
||||||
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
|
||||||
// field names have to be ASCII characters (just as in HTTP/1.x).
|
|
||||||
return
|
|
||||||
}
|
|
||||||
cc.writeHeader(name, value)
|
|
||||||
if traceHeaders {
|
|
||||||
traceWroteHeaderField(trace, name, value)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
return cc.hbuf.Bytes(), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// shouldSendReqContentLength reports whether the http2.Transport should send
|
|
||||||
// a "content-length" request header. This logic is basically a copy of the net/http
|
|
||||||
// transferWriter.shouldSendContentLength.
|
|
||||||
// The contentLength is the corrected contentLength (so 0 means actually 0, not unknown).
|
|
||||||
// -1 means unknown.
|
|
||||||
func shouldSendReqContentLength(method string, contentLength int64) bool {
|
|
||||||
if contentLength > 0 {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
if contentLength < 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
// For zero bodies, whether we send a content-length depends on the method.
|
|
||||||
// It also kinda doesn't matter for http2 either way, with END_STREAM.
|
|
||||||
switch method {
|
|
||||||
case "POST", "PUT", "PATCH":
|
|
||||||
return true
|
|
||||||
default:
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// requires cc.wmu be held.
|
// requires cc.wmu be held.
|
||||||
func (cc *ClientConn) encodeTrailers(trailer http.Header) ([]byte, error) {
|
func (cc *ClientConn) encodeTrailers(trailer http.Header) ([]byte, error) {
|
||||||
cc.hbuf.Reset()
|
cc.hbuf.Reset()
|
||||||
@ -2298,7 +2044,7 @@ func (cc *ClientConn) encodeTrailers(trailer http.Header) ([]byte, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for k, vv := range trailer {
|
for k, vv := range trailer {
|
||||||
lowKey, ascii := lowerHeader(k)
|
lowKey, ascii := httpcommon.LowerHeader(k)
|
||||||
if !ascii {
|
if !ascii {
|
||||||
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
||||||
// field names have to be ASCII characters (just as in HTTP/1.x).
|
// field names have to be ASCII characters (just as in HTTP/1.x).
|
||||||
@ -2464,6 +2210,13 @@ func (rl *clientConnReadLoop) cleanup() {
|
|||||||
}
|
}
|
||||||
cc.cond.Broadcast()
|
cc.cond.Broadcast()
|
||||||
cc.mu.Unlock()
|
cc.mu.Unlock()
|
||||||
|
|
||||||
|
if !cc.seenSettings {
|
||||||
|
// If we have a pending request that wants extended CONNECT,
|
||||||
|
// let it continue and fail with the connection error.
|
||||||
|
cc.extendedConnectAllowed = true
|
||||||
|
close(cc.seenSettingsChan)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// countReadFrameError calls Transport.CountError with a string
|
// countReadFrameError calls Transport.CountError with a string
|
||||||
@ -2556,9 +2309,6 @@ func (rl *clientConnReadLoop) run() error {
|
|||||||
if VerboseLogs {
|
if VerboseLogs {
|
||||||
cc.vlogf("http2: Transport conn %p received error from processing frame %v: %v", cc, summarizeFrame(f), err)
|
cc.vlogf("http2: Transport conn %p received error from processing frame %v: %v", cc, summarizeFrame(f), err)
|
||||||
}
|
}
|
||||||
if !cc.seenSettings {
|
|
||||||
close(cc.seenSettingsChan)
|
|
||||||
}
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -2653,7 +2403,7 @@ func (rl *clientConnReadLoop) handleResponse(cs *clientStream, f *MetaHeadersFra
|
|||||||
Status: status + " " + http.StatusText(statusCode),
|
Status: status + " " + http.StatusText(statusCode),
|
||||||
}
|
}
|
||||||
for _, hf := range regularFields {
|
for _, hf := range regularFields {
|
||||||
key := canonicalHeader(hf.Name)
|
key := httpcommon.CanonicalHeader(hf.Name)
|
||||||
if key == "Trailer" {
|
if key == "Trailer" {
|
||||||
t := res.Trailer
|
t := res.Trailer
|
||||||
if t == nil {
|
if t == nil {
|
||||||
@ -2661,7 +2411,7 @@ func (rl *clientConnReadLoop) handleResponse(cs *clientStream, f *MetaHeadersFra
|
|||||||
res.Trailer = t
|
res.Trailer = t
|
||||||
}
|
}
|
||||||
foreachHeaderElement(hf.Value, func(v string) {
|
foreachHeaderElement(hf.Value, func(v string) {
|
||||||
t[canonicalHeader(v)] = nil
|
t[httpcommon.CanonicalHeader(v)] = nil
|
||||||
})
|
})
|
||||||
} else {
|
} else {
|
||||||
vv := header[key]
|
vv := header[key]
|
||||||
@ -2785,7 +2535,7 @@ func (rl *clientConnReadLoop) processTrailers(cs *clientStream, f *MetaHeadersFr
|
|||||||
|
|
||||||
trailer := make(http.Header)
|
trailer := make(http.Header)
|
||||||
for _, hf := range f.RegularFields() {
|
for _, hf := range f.RegularFields() {
|
||||||
key := canonicalHeader(hf.Name)
|
key := httpcommon.CanonicalHeader(hf.Name)
|
||||||
trailer[key] = append(trailer[key], hf.Value)
|
trailer[key] = append(trailer[key], hf.Value)
|
||||||
}
|
}
|
||||||
cs.trailer = trailer
|
cs.trailer = trailer
|
||||||
@ -3331,7 +3081,7 @@ func (cc *ClientConn) writeStreamReset(streamID uint32, code ErrCode, ping bool,
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
|
errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
|
||||||
errRequestHeaderListSize = errors.New("http2: request header list larger than peer's advertised limit")
|
errRequestHeaderListSize = httpcommon.ErrRequestHeaderListSize
|
||||||
)
|
)
|
||||||
|
|
||||||
func (cc *ClientConn) logf(format string, args ...interface{}) {
|
func (cc *ClientConn) logf(format string, args ...interface{}) {
|
||||||
@ -3515,16 +3265,6 @@ func traceFirstResponseByte(trace *httptrace.ClientTrace) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func traceHasWroteHeaderField(trace *httptrace.ClientTrace) bool {
|
|
||||||
return trace != nil && trace.WroteHeaderField != nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func traceWroteHeaderField(trace *httptrace.ClientTrace, k, v string) {
|
|
||||||
if trace != nil && trace.WroteHeaderField != nil {
|
|
||||||
trace.WroteHeaderField(k, []string{v})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func traceGot1xxResponseFunc(trace *httptrace.ClientTrace) func(int, textproto.MIMEHeader) error {
|
func traceGot1xxResponseFunc(trace *httptrace.ClientTrace) func(int, textproto.MIMEHeader) error {
|
||||||
if trace != nil {
|
if trace != nil {
|
||||||
return trace.Got1xxResponse
|
return trace.Got1xxResponse
|
||||||
|
3
vendor/golang.org/x/net/http2/write.go
generated
vendored
3
vendor/golang.org/x/net/http2/write.go
generated
vendored
@ -13,6 +13,7 @@ import (
|
|||||||
|
|
||||||
"golang.org/x/net/http/httpguts"
|
"golang.org/x/net/http/httpguts"
|
||||||
"golang.org/x/net/http2/hpack"
|
"golang.org/x/net/http2/hpack"
|
||||||
|
"golang.org/x/net/internal/httpcommon"
|
||||||
)
|
)
|
||||||
|
|
||||||
// writeFramer is implemented by any type that is used to write frames.
|
// writeFramer is implemented by any type that is used to write frames.
|
||||||
@ -351,7 +352,7 @@ func encodeHeaders(enc *hpack.Encoder, h http.Header, keys []string) {
|
|||||||
}
|
}
|
||||||
for _, k := range keys {
|
for _, k := range keys {
|
||||||
vv := h[k]
|
vv := h[k]
|
||||||
k, ascii := lowerHeader(k)
|
k, ascii := httpcommon.LowerHeader(k)
|
||||||
if !ascii {
|
if !ascii {
|
||||||
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
||||||
// field names have to be ASCII characters (just as in HTTP/1.x).
|
// field names have to be ASCII characters (just as in HTTP/1.x).
|
||||||
|
53
vendor/golang.org/x/net/internal/httpcommon/ascii.go
generated
vendored
Normal file
53
vendor/golang.org/x/net/internal/httpcommon/ascii.go
generated
vendored
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
// Copyright 2025 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package httpcommon
|
||||||
|
|
||||||
|
import "strings"
|
||||||
|
|
||||||
|
// The HTTP protocols are defined in terms of ASCII, not Unicode. This file
|
||||||
|
// contains helper functions which may use Unicode-aware functions which would
|
||||||
|
// otherwise be unsafe and could introduce vulnerabilities if used improperly.
|
||||||
|
|
||||||
|
// asciiEqualFold is strings.EqualFold, ASCII only. It reports whether s and t
|
||||||
|
// are equal, ASCII-case-insensitively.
|
||||||
|
func asciiEqualFold(s, t string) bool {
|
||||||
|
if len(s) != len(t) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for i := 0; i < len(s); i++ {
|
||||||
|
if lower(s[i]) != lower(t[i]) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// lower returns the ASCII lowercase version of b.
|
||||||
|
func lower(b byte) byte {
|
||||||
|
if 'A' <= b && b <= 'Z' {
|
||||||
|
return b + ('a' - 'A')
|
||||||
|
}
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// isASCIIPrint returns whether s is ASCII and printable according to
|
||||||
|
// https://tools.ietf.org/html/rfc20#section-4.2.
|
||||||
|
func isASCIIPrint(s string) bool {
|
||||||
|
for i := 0; i < len(s); i++ {
|
||||||
|
if s[i] < ' ' || s[i] > '~' {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// asciiToLower returns the lowercase version of s if s is ASCII and printable,
|
||||||
|
// and whether or not it was.
|
||||||
|
func asciiToLower(s string) (lower string, ok bool) {
|
||||||
|
if !isASCIIPrint(s) {
|
||||||
|
return "", false
|
||||||
|
}
|
||||||
|
return strings.ToLower(s), true
|
||||||
|
}
|
@ -1,11 +1,11 @@
|
|||||||
// Copyright 2014 The Go Authors. All rights reserved.
|
// Copyright 2025 The Go Authors. All rights reserved.
|
||||||
// Use of this source code is governed by a BSD-style
|
// Use of this source code is governed by a BSD-style
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
package http2
|
package httpcommon
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"net/http"
|
"net/textproto"
|
||||||
"sync"
|
"sync"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -82,13 +82,15 @@ func buildCommonHeaderMaps() {
|
|||||||
commonLowerHeader = make(map[string]string, len(common))
|
commonLowerHeader = make(map[string]string, len(common))
|
||||||
commonCanonHeader = make(map[string]string, len(common))
|
commonCanonHeader = make(map[string]string, len(common))
|
||||||
for _, v := range common {
|
for _, v := range common {
|
||||||
chk := http.CanonicalHeaderKey(v)
|
chk := textproto.CanonicalMIMEHeaderKey(v)
|
||||||
commonLowerHeader[chk] = v
|
commonLowerHeader[chk] = v
|
||||||
commonCanonHeader[v] = chk
|
commonCanonHeader[v] = chk
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func lowerHeader(v string) (lower string, ascii bool) {
|
// LowerHeader returns the lowercase form of a header name,
|
||||||
|
// used on the wire for HTTP/2 and HTTP/3 requests.
|
||||||
|
func LowerHeader(v string) (lower string, ascii bool) {
|
||||||
buildCommonHeaderMapsOnce()
|
buildCommonHeaderMapsOnce()
|
||||||
if s, ok := commonLowerHeader[v]; ok {
|
if s, ok := commonLowerHeader[v]; ok {
|
||||||
return s, true
|
return s, true
|
||||||
@ -96,10 +98,18 @@ func lowerHeader(v string) (lower string, ascii bool) {
|
|||||||
return asciiToLower(v)
|
return asciiToLower(v)
|
||||||
}
|
}
|
||||||
|
|
||||||
func canonicalHeader(v string) string {
|
// CanonicalHeader canonicalizes a header name. (For example, "host" becomes "Host".)
|
||||||
|
func CanonicalHeader(v string) string {
|
||||||
buildCommonHeaderMapsOnce()
|
buildCommonHeaderMapsOnce()
|
||||||
if s, ok := commonCanonHeader[v]; ok {
|
if s, ok := commonCanonHeader[v]; ok {
|
||||||
return s
|
return s
|
||||||
}
|
}
|
||||||
return http.CanonicalHeaderKey(v)
|
return textproto.CanonicalMIMEHeaderKey(v)
|
||||||
|
}
|
||||||
|
|
||||||
|
// CachedCanonicalHeader returns the canonical form of a well-known header name.
|
||||||
|
func CachedCanonicalHeader(v string) (string, bool) {
|
||||||
|
buildCommonHeaderMapsOnce()
|
||||||
|
s, ok := commonCanonHeader[v]
|
||||||
|
return s, ok
|
||||||
}
|
}
|
467
vendor/golang.org/x/net/internal/httpcommon/request.go
generated
vendored
Normal file
467
vendor/golang.org/x/net/internal/httpcommon/request.go
generated
vendored
Normal file
@ -0,0 +1,467 @@
|
|||||||
|
// Copyright 2025 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package httpcommon
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"net/http/httptrace"
|
||||||
|
"net/textproto"
|
||||||
|
"net/url"
|
||||||
|
"sort"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/http/httpguts"
|
||||||
|
"golang.org/x/net/http2/hpack"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrRequestHeaderListSize = errors.New("request header list larger than peer's advertised limit")
|
||||||
|
)
|
||||||
|
|
||||||
|
// Request is a subset of http.Request.
|
||||||
|
// It'd be simpler to pass an *http.Request, of course, but we can't depend on net/http
|
||||||
|
// without creating a dependency cycle.
|
||||||
|
type Request struct {
|
||||||
|
URL *url.URL
|
||||||
|
Method string
|
||||||
|
Host string
|
||||||
|
Header map[string][]string
|
||||||
|
Trailer map[string][]string
|
||||||
|
ActualContentLength int64 // 0 means 0, -1 means unknown
|
||||||
|
}
|
||||||
|
|
||||||
|
// EncodeHeadersParam is parameters to EncodeHeaders.
|
||||||
|
type EncodeHeadersParam struct {
|
||||||
|
Request Request
|
||||||
|
|
||||||
|
// AddGzipHeader indicates that an "accept-encoding: gzip" header should be
|
||||||
|
// added to the request.
|
||||||
|
AddGzipHeader bool
|
||||||
|
|
||||||
|
// PeerMaxHeaderListSize, when non-zero, is the peer's MAX_HEADER_LIST_SIZE setting.
|
||||||
|
PeerMaxHeaderListSize uint64
|
||||||
|
|
||||||
|
// DefaultUserAgent is the User-Agent header to send when the request
|
||||||
|
// neither contains a User-Agent nor disables it.
|
||||||
|
DefaultUserAgent string
|
||||||
|
}
|
||||||
|
|
||||||
|
// EncodeHeadersParam is the result of EncodeHeaders.
|
||||||
|
type EncodeHeadersResult struct {
|
||||||
|
HasBody bool
|
||||||
|
HasTrailers bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// EncodeHeaders constructs request headers common to HTTP/2 and HTTP/3.
|
||||||
|
// It validates a request and calls headerf with each pseudo-header and header
|
||||||
|
// for the request.
|
||||||
|
// The headerf function is called with the validated, canonicalized header name.
|
||||||
|
func EncodeHeaders(ctx context.Context, param EncodeHeadersParam, headerf func(name, value string)) (res EncodeHeadersResult, _ error) {
|
||||||
|
req := param.Request
|
||||||
|
|
||||||
|
// Check for invalid connection-level headers.
|
||||||
|
if err := checkConnHeaders(req.Header); err != nil {
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if req.URL == nil {
|
||||||
|
return res, errors.New("Request.URL is nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
host := req.Host
|
||||||
|
if host == "" {
|
||||||
|
host = req.URL.Host
|
||||||
|
}
|
||||||
|
host, err := httpguts.PunycodeHostPort(host)
|
||||||
|
if err != nil {
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
if !httpguts.ValidHostHeader(host) {
|
||||||
|
return res, errors.New("invalid Host header")
|
||||||
|
}
|
||||||
|
|
||||||
|
// isNormalConnect is true if this is a non-extended CONNECT request.
|
||||||
|
isNormalConnect := false
|
||||||
|
var protocol string
|
||||||
|
if vv := req.Header[":protocol"]; len(vv) > 0 {
|
||||||
|
protocol = vv[0]
|
||||||
|
}
|
||||||
|
if req.Method == "CONNECT" && protocol == "" {
|
||||||
|
isNormalConnect = true
|
||||||
|
} else if protocol != "" && req.Method != "CONNECT" {
|
||||||
|
return res, errors.New("invalid :protocol header in non-CONNECT request")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate the path, except for non-extended CONNECT requests which have no path.
|
||||||
|
var path string
|
||||||
|
if !isNormalConnect {
|
||||||
|
path = req.URL.RequestURI()
|
||||||
|
if !validPseudoPath(path) {
|
||||||
|
orig := path
|
||||||
|
path = strings.TrimPrefix(path, req.URL.Scheme+"://"+host)
|
||||||
|
if !validPseudoPath(path) {
|
||||||
|
if req.URL.Opaque != "" {
|
||||||
|
return res, fmt.Errorf("invalid request :path %q from URL.Opaque = %q", orig, req.URL.Opaque)
|
||||||
|
} else {
|
||||||
|
return res, fmt.Errorf("invalid request :path %q", orig)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check for any invalid headers+trailers and return an error before we
|
||||||
|
// potentially pollute our hpack state. (We want to be able to
|
||||||
|
// continue to reuse the hpack encoder for future requests)
|
||||||
|
if err := validateHeaders(req.Header); err != "" {
|
||||||
|
return res, fmt.Errorf("invalid HTTP header %s", err)
|
||||||
|
}
|
||||||
|
if err := validateHeaders(req.Trailer); err != "" {
|
||||||
|
return res, fmt.Errorf("invalid HTTP trailer %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
trailers, err := commaSeparatedTrailers(req.Trailer)
|
||||||
|
if err != nil {
|
||||||
|
return res, err
|
||||||
|
}
|
||||||
|
|
||||||
|
enumerateHeaders := func(f func(name, value string)) {
|
||||||
|
// 8.1.2.3 Request Pseudo-Header Fields
|
||||||
|
// The :path pseudo-header field includes the path and query parts of the
|
||||||
|
// target URI (the path-absolute production and optionally a '?' character
|
||||||
|
// followed by the query production, see Sections 3.3 and 3.4 of
|
||||||
|
// [RFC3986]).
|
||||||
|
f(":authority", host)
|
||||||
|
m := req.Method
|
||||||
|
if m == "" {
|
||||||
|
m = "GET"
|
||||||
|
}
|
||||||
|
f(":method", m)
|
||||||
|
if !isNormalConnect {
|
||||||
|
f(":path", path)
|
||||||
|
f(":scheme", req.URL.Scheme)
|
||||||
|
}
|
||||||
|
if protocol != "" {
|
||||||
|
f(":protocol", protocol)
|
||||||
|
}
|
||||||
|
if trailers != "" {
|
||||||
|
f("trailer", trailers)
|
||||||
|
}
|
||||||
|
|
||||||
|
var didUA bool
|
||||||
|
for k, vv := range req.Header {
|
||||||
|
if asciiEqualFold(k, "host") || asciiEqualFold(k, "content-length") {
|
||||||
|
// Host is :authority, already sent.
|
||||||
|
// Content-Length is automatic, set below.
|
||||||
|
continue
|
||||||
|
} else if asciiEqualFold(k, "connection") ||
|
||||||
|
asciiEqualFold(k, "proxy-connection") ||
|
||||||
|
asciiEqualFold(k, "transfer-encoding") ||
|
||||||
|
asciiEqualFold(k, "upgrade") ||
|
||||||
|
asciiEqualFold(k, "keep-alive") {
|
||||||
|
// Per 8.1.2.2 Connection-Specific Header
|
||||||
|
// Fields, don't send connection-specific
|
||||||
|
// fields. We have already checked if any
|
||||||
|
// are error-worthy so just ignore the rest.
|
||||||
|
continue
|
||||||
|
} else if asciiEqualFold(k, "user-agent") {
|
||||||
|
// Match Go's http1 behavior: at most one
|
||||||
|
// User-Agent. If set to nil or empty string,
|
||||||
|
// then omit it. Otherwise if not mentioned,
|
||||||
|
// include the default (below).
|
||||||
|
didUA = true
|
||||||
|
if len(vv) < 1 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
vv = vv[:1]
|
||||||
|
if vv[0] == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
} else if asciiEqualFold(k, "cookie") {
|
||||||
|
// Per 8.1.2.5 To allow for better compression efficiency, the
|
||||||
|
// Cookie header field MAY be split into separate header fields,
|
||||||
|
// each with one or more cookie-pairs.
|
||||||
|
for _, v := range vv {
|
||||||
|
for {
|
||||||
|
p := strings.IndexByte(v, ';')
|
||||||
|
if p < 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
f("cookie", v[:p])
|
||||||
|
p++
|
||||||
|
// strip space after semicolon if any.
|
||||||
|
for p+1 <= len(v) && v[p] == ' ' {
|
||||||
|
p++
|
||||||
|
}
|
||||||
|
v = v[p:]
|
||||||
|
}
|
||||||
|
if len(v) > 0 {
|
||||||
|
f("cookie", v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
} else if k == ":protocol" {
|
||||||
|
// :protocol pseudo-header was already sent above.
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, v := range vv {
|
||||||
|
f(k, v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if shouldSendReqContentLength(req.Method, req.ActualContentLength) {
|
||||||
|
f("content-length", strconv.FormatInt(req.ActualContentLength, 10))
|
||||||
|
}
|
||||||
|
if param.AddGzipHeader {
|
||||||
|
f("accept-encoding", "gzip")
|
||||||
|
}
|
||||||
|
if !didUA {
|
||||||
|
f("user-agent", param.DefaultUserAgent)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Do a first pass over the headers counting bytes to ensure
|
||||||
|
// we don't exceed cc.peerMaxHeaderListSize. This is done as a
|
||||||
|
// separate pass before encoding the headers to prevent
|
||||||
|
// modifying the hpack state.
|
||||||
|
if param.PeerMaxHeaderListSize > 0 {
|
||||||
|
hlSize := uint64(0)
|
||||||
|
enumerateHeaders(func(name, value string) {
|
||||||
|
hf := hpack.HeaderField{Name: name, Value: value}
|
||||||
|
hlSize += uint64(hf.Size())
|
||||||
|
})
|
||||||
|
|
||||||
|
if hlSize > param.PeerMaxHeaderListSize {
|
||||||
|
return res, ErrRequestHeaderListSize
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
trace := httptrace.ContextClientTrace(ctx)
|
||||||
|
|
||||||
|
// Header list size is ok. Write the headers.
|
||||||
|
enumerateHeaders(func(name, value string) {
|
||||||
|
name, ascii := LowerHeader(name)
|
||||||
|
if !ascii {
|
||||||
|
// Skip writing invalid headers. Per RFC 7540, Section 8.1.2, header
|
||||||
|
// field names have to be ASCII characters (just as in HTTP/1.x).
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
headerf(name, value)
|
||||||
|
|
||||||
|
if trace != nil && trace.WroteHeaderField != nil {
|
||||||
|
trace.WroteHeaderField(name, []string{value})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
res.HasBody = req.ActualContentLength != 0
|
||||||
|
res.HasTrailers = trailers != ""
|
||||||
|
return res, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsRequestGzip reports whether we should add an Accept-Encoding: gzip header
|
||||||
|
// for a request.
|
||||||
|
func IsRequestGzip(method string, header map[string][]string, disableCompression bool) bool {
|
||||||
|
// TODO(bradfitz): this is a copy of the logic in net/http. Unify somewhere?
|
||||||
|
if !disableCompression &&
|
||||||
|
len(header["Accept-Encoding"]) == 0 &&
|
||||||
|
len(header["Range"]) == 0 &&
|
||||||
|
method != "HEAD" {
|
||||||
|
// Request gzip only, not deflate. Deflate is ambiguous and
|
||||||
|
// not as universally supported anyway.
|
||||||
|
// See: https://zlib.net/zlib_faq.html#faq39
|
||||||
|
//
|
||||||
|
// Note that we don't request this for HEAD requests,
|
||||||
|
// due to a bug in nginx:
|
||||||
|
// http://trac.nginx.org/nginx/ticket/358
|
||||||
|
// https://golang.org/issue/5522
|
||||||
|
//
|
||||||
|
// We don't request gzip if the request is for a range, since
|
||||||
|
// auto-decoding a portion of a gzipped document will just fail
|
||||||
|
// anyway. See https://golang.org/issue/8923
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// checkConnHeaders checks whether req has any invalid connection-level headers.
|
||||||
|
//
|
||||||
|
// https://www.rfc-editor.org/rfc/rfc9114.html#section-4.2-3
|
||||||
|
// https://www.rfc-editor.org/rfc/rfc9113.html#section-8.2.2-1
|
||||||
|
//
|
||||||
|
// Certain headers are special-cased as okay but not transmitted later.
|
||||||
|
// For example, we allow "Transfer-Encoding: chunked", but drop the header when encoding.
|
||||||
|
func checkConnHeaders(h map[string][]string) error {
|
||||||
|
if vv := h["Upgrade"]; len(vv) > 0 && (vv[0] != "" && vv[0] != "chunked") {
|
||||||
|
return fmt.Errorf("invalid Upgrade request header: %q", vv)
|
||||||
|
}
|
||||||
|
if vv := h["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
|
||||||
|
return fmt.Errorf("invalid Transfer-Encoding request header: %q", vv)
|
||||||
|
}
|
||||||
|
if vv := h["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !asciiEqualFold(vv[0], "close") && !asciiEqualFold(vv[0], "keep-alive")) {
|
||||||
|
return fmt.Errorf("invalid Connection request header: %q", vv)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func commaSeparatedTrailers(trailer map[string][]string) (string, error) {
|
||||||
|
keys := make([]string, 0, len(trailer))
|
||||||
|
for k := range trailer {
|
||||||
|
k = CanonicalHeader(k)
|
||||||
|
switch k {
|
||||||
|
case "Transfer-Encoding", "Trailer", "Content-Length":
|
||||||
|
return "", fmt.Errorf("invalid Trailer key %q", k)
|
||||||
|
}
|
||||||
|
keys = append(keys, k)
|
||||||
|
}
|
||||||
|
if len(keys) > 0 {
|
||||||
|
sort.Strings(keys)
|
||||||
|
return strings.Join(keys, ","), nil
|
||||||
|
}
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// validPseudoPath reports whether v is a valid :path pseudo-header
|
||||||
|
// value. It must be either:
|
||||||
|
//
|
||||||
|
// - a non-empty string starting with '/'
|
||||||
|
// - the string '*', for OPTIONS requests.
|
||||||
|
//
|
||||||
|
// For now this is only used a quick check for deciding when to clean
|
||||||
|
// up Opaque URLs before sending requests from the Transport.
|
||||||
|
// See golang.org/issue/16847
|
||||||
|
//
|
||||||
|
// We used to enforce that the path also didn't start with "//", but
|
||||||
|
// Google's GFE accepts such paths and Chrome sends them, so ignore
|
||||||
|
// that part of the spec. See golang.org/issue/19103.
|
||||||
|
func validPseudoPath(v string) bool {
|
||||||
|
return (len(v) > 0 && v[0] == '/') || v == "*"
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateHeaders(hdrs map[string][]string) string {
|
||||||
|
for k, vv := range hdrs {
|
||||||
|
if !httpguts.ValidHeaderFieldName(k) && k != ":protocol" {
|
||||||
|
return fmt.Sprintf("name %q", k)
|
||||||
|
}
|
||||||
|
for _, v := range vv {
|
||||||
|
if !httpguts.ValidHeaderFieldValue(v) {
|
||||||
|
// Don't include the value in the error,
|
||||||
|
// because it may be sensitive.
|
||||||
|
return fmt.Sprintf("value for header %q", k)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// shouldSendReqContentLength reports whether we should send
|
||||||
|
// a "content-length" request header. This logic is basically a copy of the net/http
|
||||||
|
// transferWriter.shouldSendContentLength.
|
||||||
|
// The contentLength is the corrected contentLength (so 0 means actually 0, not unknown).
|
||||||
|
// -1 means unknown.
|
||||||
|
func shouldSendReqContentLength(method string, contentLength int64) bool {
|
||||||
|
if contentLength > 0 {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if contentLength < 0 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
// For zero bodies, whether we send a content-length depends on the method.
|
||||||
|
// It also kinda doesn't matter for http2 either way, with END_STREAM.
|
||||||
|
switch method {
|
||||||
|
case "POST", "PUT", "PATCH":
|
||||||
|
return true
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServerRequestParam is parameters to NewServerRequest.
|
||||||
|
type ServerRequestParam struct {
|
||||||
|
Method string
|
||||||
|
Scheme, Authority, Path string
|
||||||
|
Protocol string
|
||||||
|
Header map[string][]string
|
||||||
|
}
|
||||||
|
|
||||||
|
// ServerRequestResult is the result of NewServerRequest.
|
||||||
|
type ServerRequestResult struct {
|
||||||
|
// Various http.Request fields.
|
||||||
|
URL *url.URL
|
||||||
|
RequestURI string
|
||||||
|
Trailer map[string][]string
|
||||||
|
|
||||||
|
NeedsContinue bool // client provided an "Expect: 100-continue" header
|
||||||
|
|
||||||
|
// If the request should be rejected, this is a short string suitable for passing
|
||||||
|
// to the http2 package's CountError function.
|
||||||
|
// It might be a bit odd to return errors this way rather than returing an error,
|
||||||
|
// but this ensures we don't forget to include a CountError reason.
|
||||||
|
InvalidReason string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewServerRequest(rp ServerRequestParam) ServerRequestResult {
|
||||||
|
needsContinue := httpguts.HeaderValuesContainsToken(rp.Header["Expect"], "100-continue")
|
||||||
|
if needsContinue {
|
||||||
|
delete(rp.Header, "Expect")
|
||||||
|
}
|
||||||
|
// Merge Cookie headers into one "; "-delimited value.
|
||||||
|
if cookies := rp.Header["Cookie"]; len(cookies) > 1 {
|
||||||
|
rp.Header["Cookie"] = []string{strings.Join(cookies, "; ")}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup Trailers
|
||||||
|
var trailer map[string][]string
|
||||||
|
for _, v := range rp.Header["Trailer"] {
|
||||||
|
for _, key := range strings.Split(v, ",") {
|
||||||
|
key = textproto.CanonicalMIMEHeaderKey(textproto.TrimString(key))
|
||||||
|
switch key {
|
||||||
|
case "Transfer-Encoding", "Trailer", "Content-Length":
|
||||||
|
// Bogus. (copy of http1 rules)
|
||||||
|
// Ignore.
|
||||||
|
default:
|
||||||
|
if trailer == nil {
|
||||||
|
trailer = make(map[string][]string)
|
||||||
|
}
|
||||||
|
trailer[key] = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
delete(rp.Header, "Trailer")
|
||||||
|
|
||||||
|
// "':authority' MUST NOT include the deprecated userinfo subcomponent
|
||||||
|
// for "http" or "https" schemed URIs."
|
||||||
|
// https://www.rfc-editor.org/rfc/rfc9113.html#section-8.3.1-2.3.8
|
||||||
|
if strings.IndexByte(rp.Authority, '@') != -1 && (rp.Scheme == "http" || rp.Scheme == "https") {
|
||||||
|
return ServerRequestResult{
|
||||||
|
InvalidReason: "userinfo_in_authority",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var url_ *url.URL
|
||||||
|
var requestURI string
|
||||||
|
if rp.Method == "CONNECT" && rp.Protocol == "" {
|
||||||
|
url_ = &url.URL{Host: rp.Authority}
|
||||||
|
requestURI = rp.Authority // mimic HTTP/1 server behavior
|
||||||
|
} else {
|
||||||
|
var err error
|
||||||
|
url_, err = url.ParseRequestURI(rp.Path)
|
||||||
|
if err != nil {
|
||||||
|
return ServerRequestResult{
|
||||||
|
InvalidReason: "bad_path",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
requestURI = rp.Path
|
||||||
|
}
|
||||||
|
|
||||||
|
return ServerRequestResult{
|
||||||
|
URL: url_,
|
||||||
|
NeedsContinue: needsContinue,
|
||||||
|
RequestURI: requestURI,
|
||||||
|
Trailer: trailer,
|
||||||
|
}
|
||||||
|
}
|
1
vendor/golang.org/x/sync/errgroup/errgroup.go
generated
vendored
1
vendor/golang.org/x/sync/errgroup/errgroup.go
generated
vendored
@ -118,6 +118,7 @@ func (g *Group) TryGo(f func() error) bool {
|
|||||||
|
|
||||||
// SetLimit limits the number of active goroutines in this group to at most n.
|
// SetLimit limits the number of active goroutines in this group to at most n.
|
||||||
// A negative value indicates no limit.
|
// A negative value indicates no limit.
|
||||||
|
// A limit of zero will prevent any new goroutines from being added.
|
||||||
//
|
//
|
||||||
// Any subsequent call to the Go method will block until it can add an active
|
// Any subsequent call to the Go method will block until it can add an active
|
||||||
// goroutine without exceeding the configured limit.
|
// goroutine without exceeding the configured limit.
|
||||||
|
13
vendor/modules.txt
vendored
13
vendor/modules.txt
vendored
@ -623,8 +623,8 @@ go.opentelemetry.io/otel/metric/noop
|
|||||||
## explicit; go 1.22
|
## explicit; go 1.22
|
||||||
go.opentelemetry.io/otel/trace
|
go.opentelemetry.io/otel/trace
|
||||||
go.opentelemetry.io/otel/trace/embedded
|
go.opentelemetry.io/otel/trace/embedded
|
||||||
# golang.org/x/crypto v0.32.0
|
# golang.org/x/crypto v0.35.0
|
||||||
## explicit; go 1.20
|
## explicit; go 1.23.0
|
||||||
golang.org/x/crypto/cast5
|
golang.org/x/crypto/cast5
|
||||||
golang.org/x/crypto/cryptobyte
|
golang.org/x/crypto/cryptobyte
|
||||||
golang.org/x/crypto/cryptobyte/asn1
|
golang.org/x/crypto/cryptobyte/asn1
|
||||||
@ -648,19 +648,20 @@ golang.org/x/exp/maps
|
|||||||
# golang.org/x/mod v0.22.0
|
# golang.org/x/mod v0.22.0
|
||||||
## explicit; go 1.22.0
|
## explicit; go 1.22.0
|
||||||
golang.org/x/mod/sumdb/note
|
golang.org/x/mod/sumdb/note
|
||||||
# golang.org/x/net v0.34.0
|
# golang.org/x/net v0.36.0
|
||||||
## explicit; go 1.18
|
## explicit; go 1.23.0
|
||||||
golang.org/x/net/http/httpguts
|
golang.org/x/net/http/httpguts
|
||||||
golang.org/x/net/http2
|
golang.org/x/net/http2
|
||||||
golang.org/x/net/http2/hpack
|
golang.org/x/net/http2/hpack
|
||||||
golang.org/x/net/idna
|
golang.org/x/net/idna
|
||||||
|
golang.org/x/net/internal/httpcommon
|
||||||
golang.org/x/net/internal/timeseries
|
golang.org/x/net/internal/timeseries
|
||||||
golang.org/x/net/trace
|
golang.org/x/net/trace
|
||||||
# golang.org/x/oauth2 v0.25.0
|
# golang.org/x/oauth2 v0.25.0
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
golang.org/x/oauth2
|
golang.org/x/oauth2
|
||||||
golang.org/x/oauth2/internal
|
golang.org/x/oauth2/internal
|
||||||
# golang.org/x/sync v0.10.0
|
# golang.org/x/sync v0.11.0
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
golang.org/x/sync/errgroup
|
golang.org/x/sync/errgroup
|
||||||
golang.org/x/sync/semaphore
|
golang.org/x/sync/semaphore
|
||||||
@ -674,7 +675,7 @@ golang.org/x/sys/windows/registry
|
|||||||
# golang.org/x/term v0.29.0
|
# golang.org/x/term v0.29.0
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
golang.org/x/term
|
golang.org/x/term
|
||||||
# golang.org/x/text v0.21.0
|
# golang.org/x/text v0.22.0
|
||||||
## explicit; go 1.18
|
## explicit; go 1.18
|
||||||
golang.org/x/text/secure/bidirule
|
golang.org/x/text/secure/bidirule
|
||||||
golang.org/x/text/transform
|
golang.org/x/text/transform
|
||||||
|
Loading…
Reference in New Issue
Block a user