2013-09-03 17:17:06 -04:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2021-01-08 11:58:15 -05:00
|
|
|
* Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2013-09-03 17:17:06 -04:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 08:02:01 -05:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2013-09-03 17:17:06 -04:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
|
|
|
|
#include "curl_setup.h"
|
|
|
|
|
|
|
|
#ifdef USE_NGHTTP2
|
|
|
|
#include <nghttp2/nghttp2.h>
|
2013-09-07 05:03:23 -04:00
|
|
|
#include "urldata.h"
|
2013-09-03 17:17:06 -04:00
|
|
|
#include "http2.h"
|
2013-09-07 05:03:23 -04:00
|
|
|
#include "http.h"
|
2013-09-07 07:01:43 -04:00
|
|
|
#include "sendf.h"
|
2017-05-31 09:00:45 -04:00
|
|
|
#include "select.h"
|
2013-09-07 07:01:43 -04:00
|
|
|
#include "curl_base64.h"
|
2016-09-30 12:54:02 -04:00
|
|
|
#include "strcase.h"
|
2014-02-14 08:02:44 -05:00
|
|
|
#include "multiif.h"
|
2015-06-01 05:45:52 -04:00
|
|
|
#include "url.h"
|
2015-09-27 17:20:13 -04:00
|
|
|
#include "connect.h"
|
2016-03-03 01:24:27 -05:00
|
|
|
#include "strtoofft.h"
|
2016-11-07 04:55:25 -05:00
|
|
|
#include "strdup.h"
|
2020-05-02 11:04:08 -04:00
|
|
|
#include "dynbuf.h"
|
2016-04-29 09:46:40 -04:00
|
|
|
/* The last 3 #include files should be in this order */
|
|
|
|
#include "curl_printf.h"
|
2015-03-24 18:12:03 -04:00
|
|
|
#include "curl_memory.h"
|
2013-09-07 07:01:43 -04:00
|
|
|
#include "memdebug.h"
|
2013-09-03 17:17:06 -04:00
|
|
|
|
2018-03-19 11:28:05 -04:00
|
|
|
#define H2_BUFSIZE 32768
|
2015-04-29 11:00:53 -04:00
|
|
|
|
2020-02-21 05:30:05 -05:00
|
|
|
#if (NGHTTP2_VERSION_NUM < 0x010c00)
|
2014-01-29 16:53:08 -05:00
|
|
|
#error too old nghttp2 version, upgrade!
|
|
|
|
#endif
|
|
|
|
|
2020-02-21 05:30:05 -05:00
|
|
|
#ifdef CURL_DISABLE_VERBOSE_STRINGS
|
2016-04-01 14:42:25 -04:00
|
|
|
#define nghttp2_session_callbacks_set_error_callback(x,y)
|
|
|
|
#endif
|
|
|
|
|
2016-11-28 14:08:35 -05:00
|
|
|
#if (NGHTTP2_VERSION_NUM >= 0x010c00)
|
|
|
|
#define NGHTTP2_HAS_SET_LOCAL_WINDOW_SIZE 1
|
|
|
|
#endif
|
|
|
|
|
2020-02-27 03:42:11 -05:00
|
|
|
#define HTTP2_HUGE_WINDOW_SIZE (32 * 1024 * 1024) /* 32 MB */
|
2016-11-16 02:55:30 -05:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
#ifdef DEBUG_HTTP2
|
|
|
|
#define H2BUGF(x) x
|
|
|
|
#else
|
2019-11-30 03:29:36 -05:00
|
|
|
#define H2BUGF(x) do { } while(0)
|
2018-01-30 17:19:53 -05:00
|
|
|
#endif
|
|
|
|
|
2018-03-19 11:28:05 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
2018-03-19 11:28:05 -04:00
|
|
|
char *mem, size_t len, CURLcode *err);
|
2021-01-08 11:58:15 -05:00
|
|
|
static bool http2_connisdead(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn);
|
2018-03-19 11:28:05 -04:00
|
|
|
static int h2_session_send(struct Curl_easy *data,
|
|
|
|
nghttp2_session *h2);
|
2021-01-08 11:58:15 -05:00
|
|
|
static int h2_process_pending_input(struct Curl_easy *data,
|
2018-03-19 11:28:05 -04:00
|
|
|
struct http_conn *httpc,
|
|
|
|
CURLcode *err);
|
|
|
|
|
2015-09-13 10:07:05 -04:00
|
|
|
/*
|
|
|
|
* Curl_http2_init_state() is called when the easy handle is created and
|
|
|
|
* allows for HTTP/2 specific init of state.
|
|
|
|
*/
|
|
|
|
void Curl_http2_init_state(struct UrlState *state)
|
|
|
|
{
|
2015-10-21 16:47:24 -04:00
|
|
|
state->stream_weight = NGHTTP2_DEFAULT_WEIGHT;
|
2015-09-13 10:07:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_http2_init_userset() is called when the easy handle is created and
|
|
|
|
* allows for HTTP/2 specific user-set fields.
|
|
|
|
*/
|
|
|
|
void Curl_http2_init_userset(struct UserDefined *set)
|
|
|
|
{
|
2015-10-21 16:47:24 -04:00
|
|
|
set->stream_weight = NGHTTP2_DEFAULT_WEIGHT;
|
2015-09-13 10:07:05 -04:00
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static int http2_getsock(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn,
|
|
|
|
curl_socket_t *sock)
|
2014-02-14 08:02:44 -05:00
|
|
|
{
|
2015-04-27 07:21:41 -04:00
|
|
|
const struct http_conn *c = &conn->proto.httpc;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct SingleRequest *k = &data->req;
|
2014-02-14 08:02:44 -05:00
|
|
|
int bitmap = GETSOCK_BLANK;
|
|
|
|
|
|
|
|
sock[0] = conn->sock[FIRSTSOCKET];
|
|
|
|
|
2020-12-22 03:09:46 -05:00
|
|
|
if(!(k->keepon & KEEP_RECV_PAUSE))
|
|
|
|
/* Unless paused - in a HTTP/2 connection we can basically always get a
|
|
|
|
frame so we should always be ready for one */
|
|
|
|
bitmap |= GETSOCK_READSOCK(FIRSTSOCKET);
|
2014-02-14 08:02:44 -05:00
|
|
|
|
2018-05-12 15:58:46 -04:00
|
|
|
/* we're still uploading or the HTTP/2 layer wants to send data */
|
|
|
|
if(((k->keepon & (KEEP_SEND|KEEP_SEND_PAUSE)) == KEEP_SEND) ||
|
|
|
|
nghttp2_session_want_write(c->h2))
|
2014-02-14 08:02:44 -05:00
|
|
|
bitmap |= GETSOCK_WRITESOCK(FIRSTSOCKET);
|
|
|
|
|
|
|
|
return bitmap;
|
|
|
|
}
|
|
|
|
|
2017-02-13 04:35:18 -05:00
|
|
|
/*
|
|
|
|
* http2_stream_free() free HTTP2 stream related data
|
|
|
|
*/
|
|
|
|
static void http2_stream_free(struct HTTP *http)
|
2014-03-10 13:30:01 -04:00
|
|
|
{
|
2015-07-30 06:01:20 -04:00
|
|
|
if(http) {
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_free(&http->header_recvbuf);
|
2015-07-30 06:01:20 -04:00
|
|
|
for(; http->push_headers_used > 0; --http->push_headers_used) {
|
|
|
|
free(http->push_headers[http->push_headers_used - 1]);
|
|
|
|
}
|
|
|
|
free(http->push_headers);
|
|
|
|
http->push_headers = NULL;
|
|
|
|
}
|
2017-02-13 04:35:18 -05:00
|
|
|
}
|
|
|
|
|
2018-07-16 18:29:11 -04:00
|
|
|
/*
|
|
|
|
* Disconnects *a* connection used for HTTP/2. It might be an old one from the
|
|
|
|
* connection cache and not the "main" one. Don't touch the easy handle!
|
|
|
|
*/
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static CURLcode http2_disconnect(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn,
|
2017-02-13 04:35:18 -05:00
|
|
|
bool dead_connection)
|
|
|
|
{
|
|
|
|
struct http_conn *c = &conn->proto.httpc;
|
|
|
|
(void)dead_connection;
|
2021-01-08 11:58:15 -05:00
|
|
|
#ifndef DEBUG_HTTP2
|
|
|
|
(void)data;
|
|
|
|
#endif
|
2017-02-13 04:35:18 -05:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "HTTP/2 DISCONNECT starts now\n"));
|
2017-02-13 04:35:18 -05:00
|
|
|
|
|
|
|
nghttp2_session_del(c->h2);
|
|
|
|
Curl_safefree(c->inbuf);
|
2015-07-30 06:01:20 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "HTTP/2 DISCONNECT done\n"));
|
2014-03-10 13:30:01 -04:00
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2017-05-31 09:00:45 -04:00
|
|
|
/*
|
|
|
|
* The server may send us data at any point (e.g. PING frames). Therefore,
|
|
|
|
* we cannot assume that an HTTP/2 socket is dead just because it is readable.
|
|
|
|
*
|
|
|
|
* Instead, if it is readable, run Curl_connalive() to peek at the socket
|
|
|
|
* and distinguish between closed and data.
|
|
|
|
*/
|
2021-01-08 11:58:15 -05:00
|
|
|
static bool http2_connisdead(struct Curl_easy *data, struct connectdata *conn)
|
2017-05-31 09:00:45 -04:00
|
|
|
{
|
|
|
|
int sval;
|
2018-03-19 11:28:05 -04:00
|
|
|
bool dead = TRUE;
|
2017-05-31 09:00:45 -04:00
|
|
|
|
2018-03-19 11:28:05 -04:00
|
|
|
if(conn->bits.close)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
sval = SOCKET_READABLE(conn->sock[FIRSTSOCKET], 0);
|
2017-05-31 09:00:45 -04:00
|
|
|
if(sval == 0) {
|
|
|
|
/* timeout */
|
2018-03-19 11:28:05 -04:00
|
|
|
dead = FALSE;
|
2017-05-31 09:00:45 -04:00
|
|
|
}
|
|
|
|
else if(sval & CURL_CSELECT_ERR) {
|
|
|
|
/* socket is in an error state */
|
2018-03-19 11:28:05 -04:00
|
|
|
dead = TRUE;
|
2017-05-31 09:00:45 -04:00
|
|
|
}
|
|
|
|
else if(sval & CURL_CSELECT_IN) {
|
|
|
|
/* readable with no error. could still be closed */
|
2018-03-19 11:28:05 -04:00
|
|
|
dead = !Curl_connalive(conn);
|
|
|
|
if(!dead) {
|
|
|
|
/* This happens before we've sent off a request and the connection is
|
2018-09-09 15:29:39 -04:00
|
|
|
not in use by any other transfer, there shouldn't be any data here,
|
2018-03-19 11:28:05 -04:00
|
|
|
only "protocol frames" */
|
|
|
|
CURLcode result;
|
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2018-04-26 10:07:10 -04:00
|
|
|
ssize_t nread = -1;
|
|
|
|
if(httpc->recv_underlying)
|
|
|
|
/* if called "too early", this pointer isn't setup yet! */
|
|
|
|
nread = ((Curl_recv *)httpc->recv_underlying)(
|
2021-01-08 11:58:15 -05:00
|
|
|
data, FIRSTSOCKET, httpc->inbuf, H2_BUFSIZE, &result);
|
2018-03-19 11:28:05 -04:00
|
|
|
if(nread != -1) {
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data,
|
2018-03-19 11:28:05 -04:00
|
|
|
"%d bytes stray data read before trying h2 connection\n",
|
|
|
|
(int)nread);
|
|
|
|
httpc->nread_inbuf = 0;
|
|
|
|
httpc->inbuflen = nread;
|
2021-01-08 11:58:15 -05:00
|
|
|
(void)h2_process_pending_input(data, httpc, &result);
|
2018-03-19 11:28:05 -04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
/* the read failed so let's say this is dead anyway */
|
|
|
|
dead = TRUE;
|
|
|
|
}
|
2017-05-31 09:00:45 -04:00
|
|
|
}
|
|
|
|
|
2018-03-19 11:28:05 -04:00
|
|
|
return dead;
|
2017-05-31 09:00:45 -04:00
|
|
|
}
|
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
/*
|
|
|
|
* Set the transfer that is currently using this HTTP/2 connection.
|
|
|
|
*/
|
|
|
|
static void set_transfer(struct http_conn *c,
|
|
|
|
struct Curl_easy *data)
|
|
|
|
{
|
|
|
|
c->trnsfr = data;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get the transfer that is currently using this HTTP/2 connection.
|
|
|
|
*/
|
|
|
|
static struct Curl_easy *get_transfer(struct http_conn *c)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(c && c->trnsfr);
|
|
|
|
return c->trnsfr;
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static unsigned int http2_conncheck(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn,
|
2017-05-31 09:00:45 -04:00
|
|
|
unsigned int checks_to_perform)
|
|
|
|
{
|
|
|
|
unsigned int ret_val = CONNRESULT_NONE;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct http_conn *c = &conn->proto.httpc;
|
2018-04-18 11:40:17 -04:00
|
|
|
int rc;
|
|
|
|
bool send_frames = false;
|
2017-05-31 09:00:45 -04:00
|
|
|
|
|
|
|
if(checks_to_perform & CONNCHECK_ISDEAD) {
|
2021-01-08 11:58:15 -05:00
|
|
|
if(http2_connisdead(data, conn))
|
2017-05-31 09:00:45 -04:00
|
|
|
ret_val |= CONNRESULT_DEAD;
|
|
|
|
}
|
|
|
|
|
2018-04-18 11:40:17 -04:00
|
|
|
if(checks_to_perform & CONNCHECK_KEEPALIVE) {
|
|
|
|
struct curltime now = Curl_now();
|
2021-01-08 11:58:15 -05:00
|
|
|
timediff_t elapsed = Curl_timediff(now, conn->keepalive);
|
2018-04-18 11:40:17 -04:00
|
|
|
|
2021-01-26 08:23:36 -05:00
|
|
|
if(elapsed > data->set.upkeep_interval_ms) {
|
2018-04-18 11:40:17 -04:00
|
|
|
/* Perform an HTTP/2 PING */
|
|
|
|
rc = nghttp2_submit_ping(c->h2, 0, ZERO_NULL);
|
|
|
|
if(!rc) {
|
|
|
|
/* Successfully added a PING frame to the session. Need to flag this
|
|
|
|
so the frame is sent. */
|
|
|
|
send_frames = true;
|
|
|
|
}
|
|
|
|
else {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "nghttp2_submit_ping() failed: %s(%d)",
|
2018-04-18 11:40:17 -04:00
|
|
|
nghttp2_strerror(rc), rc);
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
conn->keepalive = now;
|
2018-04-18 11:40:17 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(send_frames) {
|
2021-02-15 02:35:32 -05:00
|
|
|
set_transfer(c, data); /* set the transfer */
|
2018-04-18 11:40:17 -04:00
|
|
|
rc = nghttp2_session_send(c->h2);
|
|
|
|
if(rc)
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "nghttp2_session_send() failed: %s(%d)",
|
2018-04-18 11:40:17 -04:00
|
|
|
nghttp2_strerror(rc), rc);
|
|
|
|
}
|
|
|
|
|
2017-05-31 09:00:45 -04:00
|
|
|
return ret_val;
|
|
|
|
}
|
|
|
|
|
headers: Remove no longer exported functions
There were a leftover few prototypes of Curl_ functions that we used to
export but no longer do, this removes those prototypes and cleans up any
comments still referring to them.
Curl_write32_le(), Curl_strcpy_url(), Curl_strlen_url(), Curl_up_free()
Curl_concat_url(), Curl_detach_connnection(), Curl_http_setup_conn()
were made static in 05b100aee247bb9bec8e9a1b0166496aa4248d1c.
Curl_http_perhapsrewind() made static in 574aecee208f79d391f10d57520b3.
For the remainder, I didn't trawl the Git logs hard enough to capture
their exact time of deletion, but they were all gone: Curl_splayprint(),
Curl_http2_send_request(), Curl_global_host_cache_dtor(),
Curl_scan_cache_used(), Curl_hostcache_destroy(), Curl_second_connect(),
Curl_http_auth_stage() and Curl_close_connections().
Closes #4096
Reviewed-by: Daniel Stenberg <daniel@haxx.se>
2019-07-10 13:26:40 -04:00
|
|
|
/* called from http_setup_conn */
|
2016-06-21 09:47:12 -04:00
|
|
|
void Curl_http2_setup_req(struct Curl_easy *data)
|
2015-05-11 05:41:10 -04:00
|
|
|
{
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *http = data->req.p.http;
|
2015-05-18 08:09:32 -04:00
|
|
|
http->bodystarted = FALSE;
|
|
|
|
http->status_code = -1;
|
|
|
|
http->pausedata = NULL;
|
|
|
|
http->pauselen = 0;
|
|
|
|
http->closed = FALSE;
|
2016-08-28 10:44:03 -04:00
|
|
|
http->close_handled = FALSE;
|
2020-05-28 12:30:47 -04:00
|
|
|
http->mem = NULL;
|
|
|
|
http->len = 0;
|
2015-05-18 08:09:32 -04:00
|
|
|
http->memlen = 0;
|
2021-04-19 07:15:05 -04:00
|
|
|
http->error = NGHTTP2_NO_ERROR;
|
2015-05-11 05:41:10 -04:00
|
|
|
}
|
|
|
|
|
headers: Remove no longer exported functions
There were a leftover few prototypes of Curl_ functions that we used to
export but no longer do, this removes those prototypes and cleans up any
comments still referring to them.
Curl_write32_le(), Curl_strcpy_url(), Curl_strlen_url(), Curl_up_free()
Curl_concat_url(), Curl_detach_connnection(), Curl_http_setup_conn()
were made static in 05b100aee247bb9bec8e9a1b0166496aa4248d1c.
Curl_http_perhapsrewind() made static in 574aecee208f79d391f10d57520b3.
For the remainder, I didn't trawl the Git logs hard enough to capture
their exact time of deletion, but they were all gone: Curl_splayprint(),
Curl_http2_send_request(), Curl_global_host_cache_dtor(),
Curl_scan_cache_used(), Curl_hostcache_destroy(), Curl_second_connect(),
Curl_http_auth_stage() and Curl_close_connections().
Closes #4096
Reviewed-by: Daniel Stenberg <daniel@haxx.se>
2019-07-10 13:26:40 -04:00
|
|
|
/* called from http_setup_conn */
|
2015-06-01 08:20:57 -04:00
|
|
|
void Curl_http2_setup_conn(struct connectdata *conn)
|
|
|
|
{
|
|
|
|
conn->proto.httpc.settings.max_concurrent_streams =
|
|
|
|
DEFAULT_MAX_CONCURRENT_STREAMS;
|
|
|
|
}
|
|
|
|
|
2013-09-12 07:51:04 -04:00
|
|
|
/*
|
|
|
|
* HTTP2 handler interface. This isn't added to the general list of protocols
|
|
|
|
* but will be used at run-time when the protocol is dynamically switched from
|
|
|
|
* HTTP to HTTP2.
|
|
|
|
*/
|
2017-04-30 16:33:33 -04:00
|
|
|
static const struct Curl_handler Curl_handler_http2 = {
|
2016-03-29 10:08:38 -04:00
|
|
|
"HTTP", /* scheme */
|
2013-09-12 07:51:04 -04:00
|
|
|
ZERO_NULL, /* setup_connection */
|
2014-05-20 10:50:24 -04:00
|
|
|
Curl_http, /* do_it */
|
2015-03-14 13:17:59 -04:00
|
|
|
Curl_http_done, /* done */
|
2013-09-12 07:51:04 -04:00
|
|
|
ZERO_NULL, /* do_more */
|
|
|
|
ZERO_NULL, /* connect_it */
|
|
|
|
ZERO_NULL, /* connecting */
|
|
|
|
ZERO_NULL, /* doing */
|
2014-02-14 08:02:44 -05:00
|
|
|
http2_getsock, /* proto_getsock */
|
|
|
|
http2_getsock, /* doing_getsock */
|
2013-09-12 07:51:04 -04:00
|
|
|
ZERO_NULL, /* domore_getsock */
|
2021-01-08 11:58:15 -05:00
|
|
|
http2_getsock, /* perform_getsock */
|
2014-03-10 13:30:01 -04:00
|
|
|
http2_disconnect, /* disconnect */
|
2013-09-12 07:51:04 -04:00
|
|
|
ZERO_NULL, /* readwrite */
|
2017-05-31 09:00:45 -04:00
|
|
|
http2_conncheck, /* connection_check */
|
2021-05-17 02:54:00 -04:00
|
|
|
ZERO_NULL, /* attach connection */
|
2013-09-12 07:51:04 -04:00
|
|
|
PORT_HTTP, /* defport */
|
2014-01-30 09:58:07 -05:00
|
|
|
CURLPROTO_HTTP, /* protocol */
|
2020-09-21 07:45:24 -04:00
|
|
|
CURLPROTO_HTTP, /* family */
|
2016-08-11 08:00:23 -04:00
|
|
|
PROTOPT_STREAM /* flags */
|
2013-09-12 07:51:04 -04:00
|
|
|
};
|
|
|
|
|
2017-04-30 16:33:33 -04:00
|
|
|
static const struct Curl_handler Curl_handler_http2_ssl = {
|
2016-03-29 10:08:38 -04:00
|
|
|
"HTTPS", /* scheme */
|
2014-02-14 08:02:44 -05:00
|
|
|
ZERO_NULL, /* setup_connection */
|
2014-05-20 10:50:24 -04:00
|
|
|
Curl_http, /* do_it */
|
2015-03-14 13:17:59 -04:00
|
|
|
Curl_http_done, /* done */
|
2014-02-14 08:02:44 -05:00
|
|
|
ZERO_NULL, /* do_more */
|
|
|
|
ZERO_NULL, /* connect_it */
|
|
|
|
ZERO_NULL, /* connecting */
|
|
|
|
ZERO_NULL, /* doing */
|
|
|
|
http2_getsock, /* proto_getsock */
|
|
|
|
http2_getsock, /* doing_getsock */
|
|
|
|
ZERO_NULL, /* domore_getsock */
|
2021-01-08 11:58:15 -05:00
|
|
|
http2_getsock, /* perform_getsock */
|
2014-03-10 13:30:01 -04:00
|
|
|
http2_disconnect, /* disconnect */
|
2014-02-14 08:02:44 -05:00
|
|
|
ZERO_NULL, /* readwrite */
|
2017-05-31 09:00:45 -04:00
|
|
|
http2_conncheck, /* connection_check */
|
2021-05-17 02:54:00 -04:00
|
|
|
ZERO_NULL, /* attach connection */
|
2014-02-14 08:02:44 -05:00
|
|
|
PORT_HTTP, /* defport */
|
2014-04-20 13:37:54 -04:00
|
|
|
CURLPROTO_HTTPS, /* protocol */
|
2020-09-21 07:45:24 -04:00
|
|
|
CURLPROTO_HTTP, /* family */
|
2016-08-11 08:00:23 -04:00
|
|
|
PROTOPT_SSL | PROTOPT_STREAM /* flags */
|
2014-02-14 08:02:44 -05:00
|
|
|
};
|
2013-09-12 07:51:04 -04:00
|
|
|
|
2013-09-03 17:17:06 -04:00
|
|
|
/*
|
|
|
|
* Store nghttp2 version info in this buffer, Prefix with a space. Return
|
|
|
|
* total length written.
|
|
|
|
*/
|
|
|
|
int Curl_http2_ver(char *p, size_t len)
|
|
|
|
{
|
|
|
|
nghttp2_info *h2 = nghttp2_version(0);
|
2020-03-01 10:16:19 -05:00
|
|
|
return msnprintf(p, len, "nghttp2/%s", h2->version_str);
|
2013-09-03 17:17:06 -04:00
|
|
|
}
|
|
|
|
|
2013-09-07 07:01:43 -04:00
|
|
|
/*
|
|
|
|
* The implementation of nghttp2_send_callback type. Here we write |data| with
|
|
|
|
* size |length| to the network and return the number of bytes actually
|
|
|
|
* written. See the documentation of nghttp2_send_callback for the details.
|
|
|
|
*/
|
|
|
|
static ssize_t send_callback(nghttp2_session *h2,
|
2021-01-08 11:58:15 -05:00
|
|
|
const uint8_t *mem, size_t length, int flags,
|
2013-09-07 07:01:43 -04:00
|
|
|
void *userp)
|
|
|
|
{
|
|
|
|
struct connectdata *conn = (struct connectdata *)userp;
|
2015-04-27 07:21:41 -04:00
|
|
|
struct http_conn *c = &conn->proto.httpc;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct Curl_easy *data = get_transfer(c);
|
2013-09-07 07:01:43 -04:00
|
|
|
ssize_t written;
|
2014-12-14 08:09:29 -05:00
|
|
|
CURLcode result = CURLE_OK;
|
|
|
|
|
2013-09-07 07:01:43 -04:00
|
|
|
(void)h2;
|
|
|
|
(void)flags;
|
|
|
|
|
2018-08-22 03:47:22 -04:00
|
|
|
if(!c->send_underlying)
|
|
|
|
/* called before setup properly! */
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
written = ((Curl_send*)c->send_underlying)(data, FIRSTSOCKET,
|
2021-01-08 11:58:15 -05:00
|
|
|
mem, length, &result);
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2014-12-14 08:09:29 -05:00
|
|
|
if(result == CURLE_AGAIN) {
|
2014-01-31 10:51:24 -05:00
|
|
|
return NGHTTP2_ERR_WOULDBLOCK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(written == -1) {
|
2021-02-15 02:35:32 -05:00
|
|
|
failf(data, "Failed sending HTTP2 data");
|
2013-09-07 07:01:43 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
|
|
|
if(!written)
|
2013-09-07 07:01:43 -04:00
|
|
|
return NGHTTP2_ERR_WOULDBLOCK;
|
|
|
|
|
|
|
|
return written;
|
|
|
|
}
|
|
|
|
|
2015-06-01 05:45:52 -04:00
|
|
|
|
|
|
|
/* We pass a pointer to this struct in the push callback, but the contents of
|
|
|
|
the struct are hidden from the user. */
|
|
|
|
struct curl_pushheaders {
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data;
|
2015-06-01 05:45:52 -04:00
|
|
|
const nghttp2_push_promise *frame;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* push header access function. Only to be used from within the push callback
|
|
|
|
*/
|
2015-06-01 09:52:46 -04:00
|
|
|
char *curl_pushheader_bynum(struct curl_pushheaders *h, size_t num)
|
2015-06-01 05:45:52 -04:00
|
|
|
{
|
|
|
|
/* Verify that we got a good easy handle in the push header struct, mostly to
|
|
|
|
detect rubbish input fast(er). */
|
|
|
|
if(!h || !GOOD_EASY_HANDLE(h->data))
|
|
|
|
return NULL;
|
2015-06-01 09:52:46 -04:00
|
|
|
else {
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *stream = h->data->req.p.http;
|
2015-06-01 09:52:46 -04:00
|
|
|
if(num < stream->push_headers_used)
|
|
|
|
return stream->push_headers[num];
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* push header access function. Only to be used from within the push callback
|
|
|
|
*/
|
2015-06-02 05:50:00 -04:00
|
|
|
char *curl_pushheader_byname(struct curl_pushheaders *h, const char *header)
|
2015-06-01 09:52:46 -04:00
|
|
|
{
|
2015-06-06 05:07:00 -04:00
|
|
|
/* Verify that we got a good easy handle in the push header struct,
|
|
|
|
mostly to detect rubbish input fast(er). Also empty header name
|
|
|
|
is just a rubbish too. We have to allow ":" at the beginning of
|
|
|
|
the header, but header == ":" must be rejected. If we have ':' in
|
|
|
|
the middle of header, it could be matched in middle of the value,
|
|
|
|
this is because we do prefix match.*/
|
|
|
|
if(!h || !GOOD_EASY_HANDLE(h->data) || !header || !header[0] ||
|
2016-09-30 12:54:02 -04:00
|
|
|
!strcmp(header, ":") || strchr(header + 1, ':'))
|
2015-06-01 09:52:46 -04:00
|
|
|
return NULL;
|
|
|
|
else {
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *stream = h->data->req.p.http;
|
2015-06-01 09:52:46 -04:00
|
|
|
size_t len = strlen(header);
|
|
|
|
size_t i;
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i<stream->push_headers_used; i++) {
|
2015-06-01 09:52:46 -04:00
|
|
|
if(!strncmp(header, stream->push_headers[i], len)) {
|
2015-11-16 02:22:08 -05:00
|
|
|
/* sub-match, make sure that it is followed by a colon */
|
2015-06-01 09:52:46 -04:00
|
|
|
if(stream->push_headers[i][len] != ':')
|
|
|
|
continue;
|
2017-09-09 17:55:08 -04:00
|
|
|
return &stream->push_headers[i][len + 1];
|
2015-06-01 09:52:46 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-06-01 05:45:52 -04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-07-29 06:30:29 -04:00
|
|
|
/*
|
|
|
|
* This specific transfer on this connection has been "drained".
|
|
|
|
*/
|
|
|
|
static void drained_transfer(struct Curl_easy *data,
|
|
|
|
struct http_conn *httpc)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(httpc->drain_total >= data->state.drain);
|
|
|
|
httpc->drain_total -= data->state.drain;
|
|
|
|
data->state.drain = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mark this transfer to get "drained".
|
|
|
|
*/
|
|
|
|
static void drain_this(struct Curl_easy *data,
|
|
|
|
struct http_conn *httpc)
|
|
|
|
{
|
|
|
|
data->state.drain++;
|
|
|
|
httpc->drain_total++;
|
|
|
|
DEBUGASSERT(httpc->drain_total >= data->state.drain);
|
|
|
|
}
|
|
|
|
|
2016-06-21 13:31:24 -04:00
|
|
|
static struct Curl_easy *duphandle(struct Curl_easy *data)
|
2015-06-01 08:20:57 -04:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *second = curl_easy_duphandle(data);
|
2015-06-01 08:20:57 -04:00
|
|
|
if(second) {
|
|
|
|
/* setup the request struct */
|
|
|
|
struct HTTP *http = calloc(1, sizeof(struct HTTP));
|
|
|
|
if(!http) {
|
2019-10-28 04:28:05 -04:00
|
|
|
(void)Curl_close(&second);
|
2015-06-01 08:20:57 -04:00
|
|
|
}
|
|
|
|
else {
|
2020-11-23 02:32:41 -05:00
|
|
|
second->req.p.http = http;
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_init(&http->header_recvbuf, DYN_H2_HEADERS);
|
|
|
|
Curl_http2_setup_req(second);
|
|
|
|
second->state.stream_weight = data->state.stream_weight;
|
2015-06-01 08:20:57 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return second;
|
|
|
|
}
|
|
|
|
|
2020-06-23 08:28:34 -04:00
|
|
|
static int set_transfer_url(struct Curl_easy *data,
|
|
|
|
struct curl_pushheaders *hp)
|
|
|
|
{
|
|
|
|
const char *v;
|
|
|
|
CURLU *u = curl_url();
|
|
|
|
CURLUcode uc;
|
2021-05-05 03:16:06 -04:00
|
|
|
char *url = NULL;
|
2021-04-30 12:14:45 -04:00
|
|
|
int rc = 0;
|
2020-06-23 08:28:34 -04:00
|
|
|
|
|
|
|
v = curl_pushheader_byname(hp, ":scheme");
|
|
|
|
if(v) {
|
|
|
|
uc = curl_url_set(u, CURLUPART_SCHEME, v, 0);
|
2021-04-30 12:14:45 -04:00
|
|
|
if(uc) {
|
|
|
|
rc = 1;
|
|
|
|
goto fail;
|
|
|
|
}
|
2020-06-23 08:28:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
v = curl_pushheader_byname(hp, ":authority");
|
|
|
|
if(v) {
|
|
|
|
uc = curl_url_set(u, CURLUPART_HOST, v, 0);
|
2021-04-30 12:14:45 -04:00
|
|
|
if(uc) {
|
|
|
|
rc = 2;
|
|
|
|
goto fail;
|
|
|
|
}
|
2020-06-23 08:28:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
v = curl_pushheader_byname(hp, ":path");
|
|
|
|
if(v) {
|
|
|
|
uc = curl_url_set(u, CURLUPART_PATH, v, 0);
|
2021-04-30 12:14:45 -04:00
|
|
|
if(uc) {
|
|
|
|
rc = 3;
|
|
|
|
goto fail;
|
|
|
|
}
|
2020-06-23 08:28:34 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
uc = curl_url_get(u, CURLUPART_URL, &url, 0);
|
|
|
|
if(uc)
|
2021-04-30 12:14:45 -04:00
|
|
|
rc = 4;
|
|
|
|
fail:
|
2020-06-23 08:28:34 -04:00
|
|
|
curl_url_cleanup(u);
|
2021-04-30 12:14:45 -04:00
|
|
|
if(rc)
|
|
|
|
return rc;
|
2020-06-23 08:28:34 -04:00
|
|
|
|
2021-03-26 09:25:45 -04:00
|
|
|
if(data->state.url_alloc)
|
|
|
|
free(data->state.url);
|
|
|
|
data->state.url_alloc = TRUE;
|
|
|
|
data->state.url = url;
|
2020-06-23 08:28:34 -04:00
|
|
|
return 0;
|
|
|
|
}
|
2015-06-01 08:20:57 -04:00
|
|
|
|
2016-06-21 09:47:12 -04:00
|
|
|
static int push_promise(struct Curl_easy *data,
|
2015-06-01 08:20:57 -04:00
|
|
|
struct connectdata *conn,
|
2015-06-01 05:45:52 -04:00
|
|
|
const nghttp2_push_promise *frame)
|
|
|
|
{
|
2020-07-15 18:24:29 -04:00
|
|
|
int rv; /* one of the CURL_PUSH_* defines */
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "PUSH_PROMISE received, stream %u!\n",
|
2015-06-01 08:20:57 -04:00
|
|
|
frame->promised_stream_id));
|
2015-06-01 05:45:52 -04:00
|
|
|
if(data->multi->push_cb) {
|
2015-06-01 08:20:57 -04:00
|
|
|
struct HTTP *stream;
|
2015-11-29 18:11:42 -05:00
|
|
|
struct HTTP *newstream;
|
2015-06-01 08:20:57 -04:00
|
|
|
struct curl_pushheaders heads;
|
|
|
|
CURLMcode rc;
|
|
|
|
struct http_conn *httpc;
|
2015-06-02 05:01:30 -04:00
|
|
|
size_t i;
|
2015-06-01 05:45:52 -04:00
|
|
|
/* clone the parent */
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *newhandle = duphandle(data);
|
2015-06-01 05:45:52 -04:00
|
|
|
if(!newhandle) {
|
|
|
|
infof(data, "failed to duplicate handle\n");
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY; /* FAIL HARD */
|
2015-06-01 08:20:57 -04:00
|
|
|
goto fail;
|
2015-06-01 05:45:52 -04:00
|
|
|
}
|
2015-06-01 08:20:57 -04:00
|
|
|
|
|
|
|
heads.data = data;
|
|
|
|
heads.frame = frame;
|
|
|
|
/* ask the application */
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Got PUSH_PROMISE, ask application!\n"));
|
2015-06-01 08:20:57 -04:00
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data->req.p.http;
|
2015-07-20 15:35:15 -04:00
|
|
|
if(!stream) {
|
2020-12-23 17:41:13 -05:00
|
|
|
failf(data, "Internal NULL stream!");
|
2019-10-28 04:28:05 -04:00
|
|
|
(void)Curl_close(&newhandle);
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY;
|
2015-07-20 15:35:15 -04:00
|
|
|
goto fail;
|
|
|
|
}
|
2015-06-01 08:20:57 -04:00
|
|
|
|
2020-06-23 08:28:34 -04:00
|
|
|
rv = set_transfer_url(newhandle, &heads);
|
2020-07-15 18:24:29 -04:00
|
|
|
if(rv) {
|
2021-04-30 12:18:02 -04:00
|
|
|
(void)Curl_close(&newhandle);
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY;
|
2020-06-23 08:28:34 -04:00
|
|
|
goto fail;
|
2020-07-15 18:24:29 -04:00
|
|
|
}
|
2020-06-23 08:28:34 -04:00
|
|
|
|
2018-02-10 09:13:15 -05:00
|
|
|
Curl_set_in_callback(data, true);
|
2015-06-01 08:20:57 -04:00
|
|
|
rv = data->multi->push_cb(data, newhandle,
|
2015-06-01 09:52:46 -04:00
|
|
|
stream->push_headers_used, &heads,
|
2015-06-01 08:20:57 -04:00
|
|
|
data->multi->push_userp);
|
2018-02-10 09:13:15 -05:00
|
|
|
Curl_set_in_callback(data, false);
|
2015-06-01 09:52:46 -04:00
|
|
|
|
2015-06-02 05:01:30 -04:00
|
|
|
/* free the headers again */
|
2017-09-09 17:09:06 -04:00
|
|
|
for(i = 0; i<stream->push_headers_used; i++)
|
2015-06-02 05:01:30 -04:00
|
|
|
free(stream->push_headers[i]);
|
2015-06-01 09:52:46 -04:00
|
|
|
free(stream->push_headers);
|
|
|
|
stream->push_headers = NULL;
|
2017-02-07 03:17:55 -05:00
|
|
|
stream->push_headers_used = 0;
|
2015-06-01 09:52:46 -04:00
|
|
|
|
2015-06-01 08:20:57 -04:00
|
|
|
if(rv) {
|
2020-07-15 18:24:29 -04:00
|
|
|
DEBUGASSERT((rv > CURL_PUSH_OK) && (rv <= CURL_PUSH_ERROROUT));
|
2015-06-01 08:20:57 -04:00
|
|
|
/* denied, kill off the new handle again */
|
2020-11-23 02:32:41 -05:00
|
|
|
http2_stream_free(newhandle->req.p.http);
|
|
|
|
newhandle->req.p.http = NULL;
|
2019-10-28 04:28:05 -04:00
|
|
|
(void)Curl_close(&newhandle);
|
2015-06-01 08:20:57 -04:00
|
|
|
goto fail;
|
2015-06-01 05:45:52 -04:00
|
|
|
}
|
2015-06-01 08:20:57 -04:00
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
newstream = newhandle->req.p.http;
|
2015-11-29 18:11:42 -05:00
|
|
|
newstream->stream_id = frame->promised_stream_id;
|
|
|
|
newhandle->req.maxdownload = -1;
|
|
|
|
newhandle->req.size = -1;
|
|
|
|
|
2015-06-01 08:20:57 -04:00
|
|
|
/* approved, add to the multi handle and immediately switch to PERFORM
|
|
|
|
state with the given connection !*/
|
|
|
|
rc = Curl_multi_add_perform(data->multi, newhandle, conn);
|
|
|
|
if(rc) {
|
|
|
|
infof(data, "failed to add handle to multi\n");
|
2020-11-23 02:32:41 -05:00
|
|
|
http2_stream_free(newhandle->req.p.http);
|
|
|
|
newhandle->req.p.http = NULL;
|
2019-10-28 04:28:05 -04:00
|
|
|
Curl_close(&newhandle);
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY;
|
2015-06-01 08:20:57 -04:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
httpc = &conn->proto.httpc;
|
2018-08-14 09:28:29 -04:00
|
|
|
rv = nghttp2_session_set_stream_user_data(httpc->h2,
|
|
|
|
frame->promised_stream_id,
|
|
|
|
newhandle);
|
|
|
|
if(rv) {
|
2018-08-25 15:15:47 -04:00
|
|
|
infof(data, "failed to set user_data for stream %d\n",
|
2018-08-14 09:28:29 -04:00
|
|
|
frame->promised_stream_id);
|
|
|
|
DEBUGASSERT(0);
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY;
|
2018-08-14 09:28:29 -04:00
|
|
|
goto fail;
|
|
|
|
}
|
2015-06-01 05:45:52 -04:00
|
|
|
}
|
|
|
|
else {
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Got PUSH_PROMISE, ignore it!\n"));
|
2020-07-15 18:24:29 -04:00
|
|
|
rv = CURL_PUSH_DENY;
|
2015-06-01 05:45:52 -04:00
|
|
|
}
|
2015-06-01 08:20:57 -04:00
|
|
|
fail:
|
2015-06-01 05:45:52 -04:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2019-02-11 11:25:48 -05:00
|
|
|
/*
|
|
|
|
* multi_connchanged() is called to tell that there is a connection in
|
2019-04-05 10:38:36 -04:00
|
|
|
* this multi handle that has changed state (multiplexing become possible, the
|
2019-02-11 11:25:48 -05:00
|
|
|
* number of allowed streams changed or similar), and a subsequent use of this
|
|
|
|
* multi handle should move CONNECT_PEND handles back to CONNECT to have them
|
|
|
|
* retry.
|
|
|
|
*/
|
|
|
|
static void multi_connchanged(struct Curl_multi *multi)
|
|
|
|
{
|
|
|
|
multi->recheckstate = TRUE;
|
|
|
|
}
|
|
|
|
|
2014-01-29 18:11:56 -05:00
|
|
|
static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame,
|
|
|
|
void *userp)
|
|
|
|
{
|
2015-08-24 05:26:30 -04:00
|
|
|
struct connectdata *conn = (struct connectdata *)userp;
|
2016-01-08 17:06:59 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s = NULL;
|
2015-04-29 08:19:39 -04:00
|
|
|
struct HTTP *stream = NULL;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct Curl_easy *data = get_transfer(httpc);
|
2014-02-02 07:31:13 -05:00
|
|
|
int rv;
|
2014-08-01 10:10:10 -04:00
|
|
|
size_t left, ncopy;
|
2015-04-29 08:19:39 -04:00
|
|
|
int32_t stream_id = frame->hd.stream_id;
|
2018-09-14 05:48:53 -04:00
|
|
|
CURLcode result;
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2015-08-10 20:26:36 -04:00
|
|
|
if(!stream_id) {
|
|
|
|
/* stream ID zero is for connection-oriented stuff */
|
2016-01-08 17:06:59 -05:00
|
|
|
if(frame->hd.type == NGHTTP2_SETTINGS) {
|
|
|
|
uint32_t max_conn = httpc->settings.max_concurrent_streams;
|
2021-02-15 02:35:32 -05:00
|
|
|
H2BUGF(infof(data, "Got SETTINGS\n"));
|
2016-01-08 17:06:59 -05:00
|
|
|
httpc->settings.max_concurrent_streams =
|
|
|
|
nghttp2_session_get_remote_settings(
|
|
|
|
session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS);
|
|
|
|
httpc->settings.enable_push =
|
|
|
|
nghttp2_session_get_remote_settings(
|
|
|
|
session, NGHTTP2_SETTINGS_ENABLE_PUSH);
|
2021-02-15 02:35:32 -05:00
|
|
|
H2BUGF(infof(data, "MAX_CONCURRENT_STREAMS == %d\n",
|
2016-01-08 17:06:59 -05:00
|
|
|
httpc->settings.max_concurrent_streams));
|
2021-02-15 02:35:32 -05:00
|
|
|
H2BUGF(infof(data, "ENABLE_PUSH == %s\n",
|
2016-01-08 17:06:59 -05:00
|
|
|
httpc->settings.enable_push?"TRUE":"false"));
|
|
|
|
if(max_conn != httpc->settings.max_concurrent_streams) {
|
|
|
|
/* only signal change if the value actually changed */
|
2021-02-15 02:35:32 -05:00
|
|
|
infof(data,
|
2018-05-28 15:46:22 -04:00
|
|
|
"Connection state changed (MAX_CONCURRENT_STREAMS == %u)!\n",
|
2018-03-10 17:56:21 -05:00
|
|
|
httpc->settings.max_concurrent_streams);
|
2021-02-15 02:35:32 -05:00
|
|
|
multi_connchanged(data->multi);
|
2016-01-08 17:06:59 -05:00
|
|
|
}
|
|
|
|
}
|
2015-08-10 20:26:36 -04:00
|
|
|
return 0;
|
2015-04-29 08:19:39 -04:00
|
|
|
}
|
2016-01-08 17:06:59 -05:00
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
2015-08-10 20:26:36 -04:00
|
|
|
if(!data_s) {
|
2021-02-15 02:35:32 -05:00
|
|
|
H2BUGF(infof(data,
|
2016-06-21 09:47:12 -04:00
|
|
|
"No Curl_easy associated with stream: %x\n",
|
2015-08-10 20:26:36 -04:00
|
|
|
stream_id));
|
2015-05-22 09:17:16 -04:00
|
|
|
return 0;
|
2015-08-10 20:26:36 -04:00
|
|
|
}
|
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2016-08-11 08:00:23 -04:00
|
|
|
if(!stream) {
|
2018-05-14 11:40:48 -04:00
|
|
|
H2BUGF(infof(data_s, "No proto pointer for stream: %x\n",
|
2016-08-11 08:00:23 -04:00
|
|
|
stream_id));
|
2015-08-10 20:26:36 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2016-08-11 08:00:23 -04:00
|
|
|
}
|
2015-08-10 20:26:36 -04:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "on_frame_recv() header %x stream %x\n",
|
2015-08-10 20:26:36 -04:00
|
|
|
frame->hd.type, stream_id));
|
2015-04-29 08:19:39 -04:00
|
|
|
|
2014-02-02 07:31:13 -05:00
|
|
|
switch(frame->hd.type) {
|
2014-08-01 10:10:10 -04:00
|
|
|
case NGHTTP2_DATA:
|
2015-04-29 08:19:39 -04:00
|
|
|
/* If body started on this stream, then receiving DATA is illegal. */
|
|
|
|
if(!stream->bodystarted) {
|
2014-08-01 10:10:10 -04:00
|
|
|
rv = nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE,
|
2015-04-29 08:19:39 -04:00
|
|
|
stream_id, NGHTTP2_PROTOCOL_ERROR);
|
2014-08-01 10:10:10 -04:00
|
|
|
|
|
|
|
if(nghttp2_is_fatal(rv)) {
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2014-02-02 07:31:13 -05:00
|
|
|
case NGHTTP2_HEADERS:
|
2015-04-29 08:19:39 -04:00
|
|
|
if(stream->bodystarted) {
|
2015-05-16 05:03:47 -04:00
|
|
|
/* Only valid HEADERS after body started is trailer HEADERS. We
|
2015-12-13 05:32:58 -05:00
|
|
|
buffer them in on_header callback. */
|
2014-08-01 10:10:10 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-05-16 05:03:47 -04:00
|
|
|
/* nghttp2 guarantees that :status is received, and we store it to
|
2018-04-21 06:33:52 -04:00
|
|
|
stream->status_code. Fuzzing has proven this can still be reached
|
|
|
|
without status code having been set. */
|
|
|
|
if(stream->status_code == -1)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2014-08-01 10:10:10 -04:00
|
|
|
|
|
|
|
/* Only final status code signals the end of header */
|
2015-05-16 05:03:47 -04:00
|
|
|
if(stream->status_code / 100 != 1) {
|
2015-04-29 08:19:39 -04:00
|
|
|
stream->bodystarted = TRUE;
|
2015-05-16 05:03:47 -04:00
|
|
|
stream->status_code = -1;
|
|
|
|
}
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_add(&stream->header_recvbuf, "\r\n");
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-04-28 14:39:47 -04:00
|
|
|
|
2020-05-02 11:04:08 -04:00
|
|
|
left = Curl_dyn_len(&stream->header_recvbuf) -
|
|
|
|
stream->nread_header_recvbuf;
|
2018-08-13 06:12:14 -04:00
|
|
|
ncopy = CURLMIN(stream->len, left);
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2015-04-30 02:20:49 -04:00
|
|
|
memcpy(&stream->mem[stream->memlen],
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_ptr(&stream->header_recvbuf) +
|
|
|
|
stream->nread_header_recvbuf,
|
2015-04-30 02:20:49 -04:00
|
|
|
ncopy);
|
2015-04-29 08:19:39 -04:00
|
|
|
stream->nread_header_recvbuf += ncopy;
|
2014-02-04 08:54:42 -05:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "Store %zu bytes headers from stream %u at %p\n",
|
2015-04-30 02:20:49 -04:00
|
|
|
ncopy, stream_id, stream->mem));
|
|
|
|
|
2015-04-29 11:00:53 -04:00
|
|
|
stream->len -= ncopy;
|
2015-04-30 02:20:49 -04:00
|
|
|
stream->memlen += ncopy;
|
|
|
|
|
2018-07-29 06:30:29 -04:00
|
|
|
drain_this(data_s, httpc);
|
2021-02-15 02:35:32 -05:00
|
|
|
/* if we receive data for another handle, wake that up */
|
|
|
|
if(get_transfer(httpc) != data_s)
|
|
|
|
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
2014-02-02 07:31:13 -05:00
|
|
|
break;
|
|
|
|
case NGHTTP2_PUSH_PROMISE:
|
2015-06-01 08:20:57 -04:00
|
|
|
rv = push_promise(data_s, conn, &frame->push_promise);
|
2015-06-01 05:45:52 -04:00
|
|
|
if(rv) { /* deny! */
|
2020-07-15 18:24:29 -04:00
|
|
|
int h2;
|
|
|
|
DEBUGASSERT((rv > CURL_PUSH_OK) && (rv <= CURL_PUSH_ERROROUT));
|
|
|
|
h2 = nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE,
|
2015-06-01 05:45:52 -04:00
|
|
|
frame->push_promise.promised_stream_id,
|
|
|
|
NGHTTP2_CANCEL);
|
2020-07-15 18:24:29 -04:00
|
|
|
if(nghttp2_is_fatal(h2))
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
else if(rv == CURL_PUSH_ERROROUT) {
|
|
|
|
DEBUGF(infof(data_s, "Fail the parent stream (too)\n"));
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-06-01 05:45:52 -04:00
|
|
|
}
|
2014-02-02 07:31:13 -05:00
|
|
|
}
|
|
|
|
break;
|
2015-05-07 10:44:00 -04:00
|
|
|
default:
|
2018-05-14 11:40:48 -04:00
|
|
|
H2BUGF(infof(data_s, "Got frame type %x for stream %u!\n",
|
2015-05-07 10:44:00 -04:00
|
|
|
frame->hd.type, stream_id));
|
|
|
|
break;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
2014-01-29 18:11:56 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_data_chunk_recv(nghttp2_session *session, uint8_t flags,
|
|
|
|
int32_t stream_id,
|
2021-02-15 02:35:32 -05:00
|
|
|
const uint8_t *mem, size_t len, void *userp)
|
2014-01-29 18:11:56 -05:00
|
|
|
{
|
2015-04-29 08:19:39 -04:00
|
|
|
struct HTTP *stream;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s;
|
2014-02-04 08:57:29 -05:00
|
|
|
size_t nread;
|
2015-09-27 13:40:20 -04:00
|
|
|
struct connectdata *conn = (struct connectdata *)userp;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2014-01-29 18:11:56 -05:00
|
|
|
(void)session;
|
|
|
|
(void)flags;
|
2014-01-30 10:09:36 -05:00
|
|
|
|
2015-04-29 08:19:39 -04:00
|
|
|
DEBUGASSERT(stream_id); /* should never be a zero stream ID here */
|
|
|
|
|
|
|
|
/* get the stream from the hash based on Stream ID */
|
2015-08-10 20:26:36 -04:00
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
|
|
|
if(!data_s)
|
2015-04-29 08:19:39 -04:00
|
|
|
/* Receiving a Stream ID not in the hash should not happen, this is an
|
|
|
|
internal error more than anything else! */
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-08-10 20:26:36 -04:00
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2015-08-10 20:26:36 -04:00
|
|
|
if(!stream)
|
2015-07-20 15:35:15 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2014-02-02 07:31:13 -05:00
|
|
|
|
2018-08-13 06:12:14 -04:00
|
|
|
nread = CURLMIN(stream->len, len);
|
2021-02-15 02:35:32 -05:00
|
|
|
memcpy(&stream->mem[stream->memlen], mem, nread);
|
2014-02-04 08:57:29 -05:00
|
|
|
|
2015-04-29 11:00:53 -04:00
|
|
|
stream->len -= nread;
|
2015-04-30 02:20:49 -04:00
|
|
|
stream->memlen += nread;
|
|
|
|
|
2018-07-29 06:30:29 -04:00
|
|
|
drain_this(data_s, &conn->proto.httpc);
|
2015-09-27 13:40:20 -04:00
|
|
|
|
|
|
|
/* if we receive data for another handle, wake that up */
|
2021-02-15 02:35:32 -05:00
|
|
|
if(get_transfer(httpc) != data_s)
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
2014-02-04 08:57:29 -05:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "%zu data received for stream %u "
|
2015-04-30 12:34:41 -04:00
|
|
|
"(%zu left in buffer %p, total %zu)\n",
|
2015-04-30 02:20:49 -04:00
|
|
|
nread, stream_id,
|
2015-04-30 12:34:41 -04:00
|
|
|
stream->len, stream->mem,
|
|
|
|
stream->memlen));
|
2014-01-30 10:09:36 -05:00
|
|
|
|
2014-02-04 08:57:29 -05:00
|
|
|
if(nread < len) {
|
2021-02-15 02:35:32 -05:00
|
|
|
stream->pausedata = mem + nread;
|
2015-05-11 09:10:21 -04:00
|
|
|
stream->pauselen = len - nread;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "NGHTTP2_ERR_PAUSE - %zu bytes out of buffer"
|
2015-05-20 08:27:08 -04:00
|
|
|
", stream %u\n",
|
2015-05-11 09:54:50 -04:00
|
|
|
len - nread, stream_id));
|
2019-01-02 12:04:58 -05:00
|
|
|
data_s->conn->proto.httpc.pause_stream_id = stream_id;
|
2016-02-22 07:20:38 -05:00
|
|
|
|
2014-02-04 08:57:29 -05:00
|
|
|
return NGHTTP2_ERR_PAUSE;
|
|
|
|
}
|
2016-02-22 07:20:38 -05:00
|
|
|
|
|
|
|
/* pause execution of nghttp2 if we received data for another handle
|
|
|
|
in order to process them first. */
|
2021-02-15 02:35:32 -05:00
|
|
|
if(get_transfer(httpc) != data_s) {
|
2019-01-02 12:04:58 -05:00
|
|
|
data_s->conn->proto.httpc.pause_stream_id = stream_id;
|
2016-02-22 07:20:38 -05:00
|
|
|
|
|
|
|
return NGHTTP2_ERR_PAUSE;
|
|
|
|
}
|
|
|
|
|
2014-01-29 18:11:56 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_stream_close(nghttp2_session *session, int32_t stream_id,
|
2014-08-25 11:18:32 -04:00
|
|
|
uint32_t error_code, void *userp)
|
2014-01-29 18:11:56 -05:00
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s;
|
2015-04-29 09:21:45 -04:00
|
|
|
struct HTTP *stream;
|
2016-02-23 09:33:04 -05:00
|
|
|
struct connectdata *conn = (struct connectdata *)userp;
|
2018-08-14 09:28:29 -04:00
|
|
|
int rv;
|
2014-01-29 18:11:56 -05:00
|
|
|
(void)session;
|
|
|
|
(void)stream_id;
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2015-04-29 09:21:45 -04:00
|
|
|
if(stream_id) {
|
2018-03-10 17:48:43 -05:00
|
|
|
struct http_conn *httpc;
|
2015-04-29 09:21:45 -04:00
|
|
|
/* get the stream from the hash based on Stream ID, stream ID zero is for
|
|
|
|
connection-oriented stuff */
|
2015-08-10 20:26:36 -04:00
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
2015-04-29 09:21:45 -04:00
|
|
|
if(!data_s) {
|
2015-05-16 05:13:10 -04:00
|
|
|
/* We could get stream ID not in the hash. For example, if we
|
2015-08-10 20:26:36 -04:00
|
|
|
decided to reject stream (e.g., PUSH_PROMISE). */
|
2015-05-16 05:13:10 -04:00
|
|
|
return 0;
|
2015-04-29 09:21:45 -04:00
|
|
|
}
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "on_stream_close(), %s (err %d), stream %u\n",
|
2020-07-02 12:47:11 -04:00
|
|
|
nghttp2_http2_strerror(error_code), error_code, stream_id));
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2015-08-10 20:26:36 -04:00
|
|
|
if(!stream)
|
2015-07-20 15:35:15 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2015-04-29 09:21:45 -04:00
|
|
|
stream->closed = TRUE;
|
2018-03-10 17:48:43 -05:00
|
|
|
httpc = &conn->proto.httpc;
|
2018-07-29 06:30:29 -04:00
|
|
|
drain_this(data_s, httpc);
|
2019-10-17 08:25:45 -04:00
|
|
|
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
2021-04-19 07:15:05 -04:00
|
|
|
stream->error = error_code;
|
2015-05-11 17:17:36 -04:00
|
|
|
|
|
|
|
/* remove the entry from the hash as the stream is now gone */
|
2018-08-14 09:28:29 -04:00
|
|
|
rv = nghttp2_session_set_stream_user_data(session, stream_id, 0);
|
|
|
|
if(rv) {
|
2018-08-25 15:15:47 -04:00
|
|
|
infof(data_s, "http/2: failed to clear user_data for stream %d!\n",
|
2018-08-14 09:28:29 -04:00
|
|
|
stream_id);
|
|
|
|
DEBUGASSERT(0);
|
|
|
|
}
|
2018-12-20 04:36:52 -05:00
|
|
|
if(stream_id == httpc->pause_stream_id) {
|
|
|
|
H2BUGF(infof(data_s, "Stopped the pause stream!\n"));
|
|
|
|
httpc->pause_stream_id = 0;
|
|
|
|
}
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "Removed stream %u hash!\n", stream_id));
|
2018-08-14 09:28:29 -04:00
|
|
|
stream->stream_id = 0; /* cleared */
|
2015-04-29 09:21:45 -04:00
|
|
|
}
|
2014-01-29 18:11:56 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int on_begin_headers(nghttp2_session *session,
|
|
|
|
const nghttp2_frame *frame, void *userp)
|
|
|
|
{
|
2015-12-13 05:32:58 -05:00
|
|
|
struct HTTP *stream;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s = NULL;
|
2015-08-10 20:26:36 -04:00
|
|
|
(void)userp;
|
|
|
|
|
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, frame->hd.stream_id);
|
2015-12-13 05:32:58 -05:00
|
|
|
if(!data_s) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "on_begin_headers() was called\n"));
|
2015-12-13 05:32:58 -05:00
|
|
|
|
|
|
|
if(frame->hd.type != NGHTTP2_HEADERS) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2015-12-13 05:32:58 -05:00
|
|
|
if(!stream || !stream->bodystarted) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-29 18:11:56 -05:00
|
|
|
return 0;
|
|
|
|
}
|
2014-01-29 17:45:24 -05:00
|
|
|
|
2014-08-01 10:10:10 -04:00
|
|
|
/* Decode HTTP status code. Returns -1 if no valid status code was
|
|
|
|
decoded. */
|
|
|
|
static int decode_status_code(const uint8_t *value, size_t len)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
if(len != 3) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
res = 0;
|
|
|
|
|
|
|
|
for(i = 0; i < 3; ++i) {
|
|
|
|
char c = value[i];
|
|
|
|
|
|
|
|
if(c < '0' || c > '9') {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
res *= 10;
|
|
|
|
res += c - '0';
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2014-01-29 17:45:24 -05:00
|
|
|
/* frame->hd.type is either NGHTTP2_HEADERS or NGHTTP2_PUSH_PROMISE */
|
2014-01-29 18:11:56 -05:00
|
|
|
static int on_header(nghttp2_session *session, const nghttp2_frame *frame,
|
2014-04-05 05:57:20 -04:00
|
|
|
const uint8_t *name, size_t namelen,
|
|
|
|
const uint8_t *value, size_t valuelen,
|
|
|
|
uint8_t flags,
|
|
|
|
void *userp)
|
2014-01-29 17:45:24 -05:00
|
|
|
{
|
2015-04-29 08:19:39 -04:00
|
|
|
struct HTTP *stream;
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s;
|
2015-04-29 08:19:39 -04:00
|
|
|
int32_t stream_id = frame->hd.stream_id;
|
2015-09-27 13:40:20 -04:00
|
|
|
struct connectdata *conn = (struct connectdata *)userp;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2018-09-14 05:48:53 -04:00
|
|
|
CURLcode result;
|
2014-04-05 05:57:20 -04:00
|
|
|
(void)flags;
|
2014-01-29 17:45:24 -05:00
|
|
|
|
2015-04-29 08:19:39 -04:00
|
|
|
DEBUGASSERT(stream_id); /* should never be a zero stream ID here */
|
|
|
|
|
|
|
|
/* get the stream from the hash based on Stream ID */
|
2015-08-10 20:26:36 -04:00
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
|
|
|
if(!data_s)
|
2015-04-29 08:19:39 -04:00
|
|
|
/* Receiving a Stream ID not in the hash should not happen, this is an
|
|
|
|
internal error more than anything else! */
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-08-10 20:26:36 -04:00
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2015-07-20 15:35:15 -04:00
|
|
|
if(!stream) {
|
2020-12-23 17:41:13 -05:00
|
|
|
failf(data_s, "Internal NULL stream!");
|
2015-07-20 15:35:15 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
}
|
2014-02-02 07:31:13 -05:00
|
|
|
|
2015-06-01 08:20:57 -04:00
|
|
|
/* Store received PUSH_PROMISE headers to be used when the subsequent
|
|
|
|
PUSH_PROMISE callback comes */
|
|
|
|
if(frame->hd.type == NGHTTP2_PUSH_PROMISE) {
|
2015-06-01 09:52:46 -04:00
|
|
|
char *h;
|
|
|
|
|
2019-02-18 03:10:01 -05:00
|
|
|
if(!strcmp(":authority", (const char *)name)) {
|
2019-04-03 11:16:18 -04:00
|
|
|
/* pseudo headers are lower case */
|
2019-02-18 03:10:01 -05:00
|
|
|
int rc = 0;
|
|
|
|
char *check = aprintf("%s:%d", conn->host.name, conn->remote_port);
|
|
|
|
if(!check)
|
|
|
|
/* no memory */
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2019-09-16 09:32:58 -04:00
|
|
|
if(!Curl_strcasecompare(check, (const char *)value) &&
|
|
|
|
((conn->remote_port != conn->given->defport) ||
|
|
|
|
!Curl_strcasecompare(conn->host.name, (const char *)value))) {
|
2019-02-18 03:10:01 -05:00
|
|
|
/* This is push is not for the same authority that was asked for in
|
|
|
|
* the URL. RFC 7540 section 8.2 says: "A client MUST treat a
|
|
|
|
* PUSH_PROMISE for which the server is not authoritative as a stream
|
|
|
|
* error of type PROTOCOL_ERROR."
|
|
|
|
*/
|
|
|
|
(void)nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE,
|
|
|
|
stream_id, NGHTTP2_PROTOCOL_ERROR);
|
|
|
|
rc = NGHTTP2_ERR_CALLBACK_FAILURE;
|
|
|
|
}
|
|
|
|
free(check);
|
|
|
|
if(rc)
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2015-06-01 09:52:46 -04:00
|
|
|
if(!stream->push_headers) {
|
|
|
|
stream->push_headers_alloc = 10;
|
|
|
|
stream->push_headers = malloc(stream->push_headers_alloc *
|
|
|
|
sizeof(char *));
|
2018-10-02 18:56:29 -04:00
|
|
|
if(!stream->push_headers)
|
|
|
|
return NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE;
|
2015-06-01 09:52:46 -04:00
|
|
|
stream->push_headers_used = 0;
|
|
|
|
}
|
|
|
|
else if(stream->push_headers_used ==
|
|
|
|
stream->push_headers_alloc) {
|
|
|
|
char **headp;
|
|
|
|
stream->push_headers_alloc *= 2;
|
2016-11-07 04:55:25 -05:00
|
|
|
headp = Curl_saferealloc(stream->push_headers,
|
|
|
|
stream->push_headers_alloc * sizeof(char *));
|
2015-06-01 09:52:46 -04:00
|
|
|
if(!headp) {
|
|
|
|
stream->push_headers = NULL;
|
2015-06-06 05:10:30 -04:00
|
|
|
return NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE;
|
2015-06-01 09:52:46 -04:00
|
|
|
}
|
|
|
|
stream->push_headers = headp;
|
|
|
|
}
|
|
|
|
h = aprintf("%s:%s", name, value);
|
|
|
|
if(h)
|
|
|
|
stream->push_headers[stream->push_headers_used++] = h;
|
2015-06-01 08:20:57 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-01-08 03:04:19 -05:00
|
|
|
if(stream->bodystarted) {
|
2020-05-06 17:31:43 -04:00
|
|
|
/* This is a trailer */
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "h2 trailer: %.*s: %.*s\n", namelen, name, valuelen,
|
2016-01-08 03:04:19 -05:00
|
|
|
value));
|
2020-08-03 06:19:09 -04:00
|
|
|
result = Curl_dyn_addf(&stream->trailer_recvbuf,
|
2020-05-06 17:31:43 -04:00
|
|
|
"%.*s: %.*s\r\n", namelen, name,
|
|
|
|
valuelen, value);
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2016-01-08 03:04:19 -05:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-02-04 08:54:42 -05:00
|
|
|
if(namelen == sizeof(":status") - 1 &&
|
2015-05-16 05:03:47 -04:00
|
|
|
memcmp(":status", name, namelen) == 0) {
|
|
|
|
/* nghttp2 guarantees :status is received first and only once, and
|
|
|
|
value is 3 digits status code, and decode_status_code always
|
|
|
|
succeeds. */
|
|
|
|
stream->status_code = decode_status_code(value, valuelen);
|
|
|
|
DEBUGASSERT(stream->status_code != -1);
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_add(&stream->header_recvbuf, "HTTP/2 ");
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_addn(&stream->header_recvbuf, value, valuelen);
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2016-04-06 08:08:15 -04:00
|
|
|
/* the space character after the status code is mandatory */
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_add(&stream->header_recvbuf, " \r\n");
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-09-27 13:40:20 -04:00
|
|
|
/* if we receive data for another handle, wake that up */
|
2021-02-15 02:35:32 -05:00
|
|
|
if(get_transfer(httpc) != data_s)
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "h2 status: HTTP/2 %03d (easy %p)\n",
|
2015-11-29 18:12:46 -05:00
|
|
|
stream->status_code, data_s));
|
2014-02-04 08:54:42 -05:00
|
|
|
return 0;
|
2014-01-29 17:45:24 -05:00
|
|
|
}
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2015-05-16 05:03:47 -04:00
|
|
|
/* nghttp2 guarantees that namelen > 0, and :status was already
|
|
|
|
received, and this is not pseudo-header field . */
|
|
|
|
/* convert to a HTTP1-style header */
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_addn(&stream->header_recvbuf, name, namelen);
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_add(&stream->header_recvbuf, ": ");
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_addn(&stream->header_recvbuf, value, valuelen);
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_add(&stream->header_recvbuf, "\r\n");
|
2018-09-14 05:48:53 -04:00
|
|
|
if(result)
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-09-27 13:40:20 -04:00
|
|
|
/* if we receive data for another handle, wake that up */
|
2021-02-15 02:35:32 -05:00
|
|
|
if(get_transfer(httpc) != data_s)
|
2017-05-09 06:47:49 -04:00
|
|
|
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
2014-08-01 10:10:10 -04:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "h2 header: %.*s: %.*s\n", namelen, name, valuelen,
|
2015-05-16 05:03:47 -04:00
|
|
|
value));
|
2014-01-29 17:45:24 -05:00
|
|
|
|
|
|
|
return 0; /* 0 is successful */
|
|
|
|
}
|
|
|
|
|
2014-02-14 08:02:44 -05:00
|
|
|
static ssize_t data_source_read_callback(nghttp2_session *session,
|
|
|
|
int32_t stream_id,
|
|
|
|
uint8_t *buf, size_t length,
|
2014-04-05 05:57:20 -04:00
|
|
|
uint32_t *data_flags,
|
2014-02-14 08:02:44 -05:00
|
|
|
nghttp2_data_source *source,
|
|
|
|
void *userp)
|
|
|
|
{
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data_s;
|
2015-05-18 08:01:38 -04:00
|
|
|
struct HTTP *stream = NULL;
|
2014-02-14 08:02:44 -05:00
|
|
|
size_t nread;
|
|
|
|
(void)source;
|
2015-08-10 20:26:36 -04:00
|
|
|
(void)userp;
|
2014-02-14 08:02:44 -05:00
|
|
|
|
2015-05-18 08:01:38 -04:00
|
|
|
if(stream_id) {
|
|
|
|
/* get the stream from the hash based on Stream ID, stream ID zero is for
|
|
|
|
connection-oriented stuff */
|
2015-08-10 20:26:36 -04:00
|
|
|
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
|
|
|
if(!data_s)
|
2015-05-18 08:01:38 -04:00
|
|
|
/* Receiving a Stream ID not in the hash should not happen, this is an
|
|
|
|
internal error more than anything else! */
|
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-08-10 20:26:36 -04:00
|
|
|
|
2020-11-23 02:32:41 -05:00
|
|
|
stream = data_s->req.p.http;
|
2015-08-10 20:26:36 -04:00
|
|
|
if(!stream)
|
2015-07-20 15:35:15 -04:00
|
|
|
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
2015-05-18 08:01:38 -04:00
|
|
|
}
|
2015-08-10 20:26:36 -04:00
|
|
|
else
|
2015-05-18 08:01:38 -04:00
|
|
|
return NGHTTP2_ERR_INVALID_ARGUMENT;
|
|
|
|
|
2018-08-13 06:12:14 -04:00
|
|
|
nread = CURLMIN(stream->upload_len, length);
|
2014-02-14 08:02:44 -05:00
|
|
|
if(nread > 0) {
|
2015-05-18 08:01:38 -04:00
|
|
|
memcpy(buf, stream->upload_mem, nread);
|
|
|
|
stream->upload_mem += nread;
|
|
|
|
stream->upload_len -= nread;
|
2016-09-06 17:12:12 -04:00
|
|
|
if(data_s->state.infilesize != -1)
|
|
|
|
stream->upload_left -= nread;
|
2014-02-14 08:02:44 -05:00
|
|
|
}
|
|
|
|
|
2015-05-18 08:01:38 -04:00
|
|
|
if(stream->upload_left == 0)
|
2016-09-05 03:25:58 -04:00
|
|
|
*data_flags = NGHTTP2_DATA_FLAG_EOF;
|
2014-02-14 08:02:44 -05:00
|
|
|
else if(nread == 0)
|
|
|
|
return NGHTTP2_ERR_DEFERRED;
|
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data_s, "data_source_read_callback: "
|
2015-05-20 08:27:08 -04:00
|
|
|
"returns %zu bytes stream %u\n",
|
2015-05-18 08:01:38 -04:00
|
|
|
nread, stream_id));
|
|
|
|
|
2014-02-14 08:02:44 -05:00
|
|
|
return nread;
|
|
|
|
}
|
|
|
|
|
2020-02-21 05:30:05 -05:00
|
|
|
#if !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
2016-04-01 14:42:25 -04:00
|
|
|
static int error_callback(nghttp2_session *session,
|
|
|
|
const char *msg,
|
|
|
|
size_t len,
|
|
|
|
void *userp)
|
|
|
|
{
|
|
|
|
(void)session;
|
2021-02-15 02:35:32 -05:00
|
|
|
(void)msg;
|
|
|
|
(void)len;
|
|
|
|
(void)userp;
|
2016-04-01 14:42:25 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
static void populate_settings(struct Curl_easy *data,
|
2016-12-10 08:54:59 -05:00
|
|
|
struct http_conn *httpc)
|
|
|
|
{
|
|
|
|
nghttp2_settings_entry *iv = httpc->local_settings;
|
|
|
|
|
|
|
|
iv[0].settings_id = NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS;
|
2021-02-15 02:35:32 -05:00
|
|
|
iv[0].value = Curl_multi_max_concurrent_streams(data->multi);
|
2016-12-10 08:54:59 -05:00
|
|
|
|
|
|
|
iv[1].settings_id = NGHTTP2_SETTINGS_INITIAL_WINDOW_SIZE;
|
|
|
|
iv[1].value = HTTP2_HUGE_WINDOW_SIZE;
|
|
|
|
|
|
|
|
iv[2].settings_id = NGHTTP2_SETTINGS_ENABLE_PUSH;
|
2021-02-15 02:35:32 -05:00
|
|
|
iv[2].value = data->multi->push_cb != NULL;
|
2016-12-10 08:54:59 -05:00
|
|
|
|
|
|
|
httpc->local_settings_num = 3;
|
|
|
|
}
|
|
|
|
|
2019-12-09 05:53:54 -05:00
|
|
|
void Curl_http2_done(struct Curl_easy *data, bool premature)
|
2016-08-11 08:00:23 -04:00
|
|
|
{
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *http = data->req.p.http;
|
2019-12-09 05:53:54 -05:00
|
|
|
struct http_conn *httpc = &data->conn->proto.httpc;
|
2016-08-11 08:00:23 -04:00
|
|
|
|
2018-09-25 05:48:43 -04:00
|
|
|
/* there might be allocated resources done before this got the 'h2' pointer
|
|
|
|
setup */
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_free(&http->header_recvbuf);
|
2020-08-03 06:19:09 -04:00
|
|
|
Curl_dyn_free(&http->trailer_recvbuf);
|
2020-05-02 11:04:08 -04:00
|
|
|
if(http->push_headers) {
|
|
|
|
/* if they weren't used and then freed before */
|
|
|
|
for(; http->push_headers_used > 0; --http->push_headers_used) {
|
|
|
|
free(http->push_headers[http->push_headers_used - 1]);
|
2016-08-11 08:00:23 -04:00
|
|
|
}
|
2020-05-02 11:04:08 -04:00
|
|
|
free(http->push_headers);
|
|
|
|
http->push_headers = NULL;
|
2016-08-11 08:00:23 -04:00
|
|
|
}
|
|
|
|
|
2020-07-03 18:10:04 -04:00
|
|
|
if(!(data->conn->handler->protocol&PROTO_FAMILY_HTTP) ||
|
|
|
|
!httpc->h2) /* not HTTP/2 ? */
|
2018-09-25 05:48:43 -04:00
|
|
|
return;
|
|
|
|
|
2016-08-11 08:00:23 -04:00
|
|
|
if(premature) {
|
|
|
|
/* RST_STREAM */
|
2021-02-15 02:35:32 -05:00
|
|
|
set_transfer(httpc, data); /* set the transfer */
|
2018-08-16 07:21:11 -04:00
|
|
|
if(!nghttp2_submit_rst_stream(httpc->h2, NGHTTP2_FLAG_NONE,
|
|
|
|
http->stream_id, NGHTTP2_STREAM_CLOSED))
|
|
|
|
(void)nghttp2_session_send(httpc->h2);
|
|
|
|
|
2016-08-11 08:00:23 -04:00
|
|
|
if(http->stream_id == httpc->pause_stream_id) {
|
|
|
|
infof(data, "stopped the pause stream!\n");
|
|
|
|
httpc->pause_stream_id = 0;
|
|
|
|
}
|
|
|
|
}
|
2019-05-29 10:21:26 -04:00
|
|
|
|
|
|
|
if(data->state.drain)
|
|
|
|
drained_transfer(data, httpc);
|
|
|
|
|
2018-08-20 07:19:08 -04:00
|
|
|
/* -1 means unassigned and 0 means cleared */
|
|
|
|
if(http->stream_id > 0) {
|
2018-08-14 09:28:29 -04:00
|
|
|
int rv = nghttp2_session_set_stream_user_data(httpc->h2,
|
|
|
|
http->stream_id, 0);
|
|
|
|
if(rv) {
|
2018-08-25 15:15:47 -04:00
|
|
|
infof(data, "http/2: failed to clear user_data for stream %d!\n",
|
2018-08-14 09:28:29 -04:00
|
|
|
http->stream_id);
|
|
|
|
DEBUGASSERT(0);
|
|
|
|
}
|
2021-02-15 02:35:32 -05:00
|
|
|
set_transfer(httpc, NULL);
|
2016-08-11 08:00:23 -04:00
|
|
|
http->stream_id = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-30 00:28:50 -05:00
|
|
|
/*
|
|
|
|
* Initialize nghttp2 for a Curl connection
|
|
|
|
*/
|
2021-01-08 11:58:15 -05:00
|
|
|
static CURLcode http2_init(struct Curl_easy *data, struct connectdata *conn)
|
2014-02-04 08:57:29 -05:00
|
|
|
{
|
2014-01-30 00:28:50 -05:00
|
|
|
if(!conn->proto.httpc.h2) {
|
2014-02-04 08:57:29 -05:00
|
|
|
int rc;
|
2014-08-25 11:18:32 -04:00
|
|
|
nghttp2_session_callbacks *callbacks;
|
|
|
|
|
2014-02-04 08:57:29 -05:00
|
|
|
conn->proto.httpc.inbuf = malloc(H2_BUFSIZE);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(!conn->proto.httpc.inbuf)
|
2014-02-04 08:57:29 -05:00
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
2014-08-25 11:18:32 -04:00
|
|
|
rc = nghttp2_session_callbacks_new(&callbacks);
|
|
|
|
|
|
|
|
if(rc) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Couldn't initialize nghttp2 callbacks!");
|
2014-08-25 11:18:32 -04:00
|
|
|
return CURLE_OUT_OF_MEMORY; /* most likely at least */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* nghttp2_send_callback */
|
|
|
|
nghttp2_session_callbacks_set_send_callback(callbacks, send_callback);
|
|
|
|
/* nghttp2_on_frame_recv_callback */
|
|
|
|
nghttp2_session_callbacks_set_on_frame_recv_callback
|
|
|
|
(callbacks, on_frame_recv);
|
|
|
|
/* nghttp2_on_data_chunk_recv_callback */
|
|
|
|
nghttp2_session_callbacks_set_on_data_chunk_recv_callback
|
|
|
|
(callbacks, on_data_chunk_recv);
|
|
|
|
/* nghttp2_on_stream_close_callback */
|
|
|
|
nghttp2_session_callbacks_set_on_stream_close_callback
|
|
|
|
(callbacks, on_stream_close);
|
|
|
|
/* nghttp2_on_begin_headers_callback */
|
|
|
|
nghttp2_session_callbacks_set_on_begin_headers_callback
|
|
|
|
(callbacks, on_begin_headers);
|
|
|
|
/* nghttp2_on_header_callback */
|
|
|
|
nghttp2_session_callbacks_set_on_header_callback(callbacks, on_header);
|
|
|
|
|
2016-04-01 14:42:25 -04:00
|
|
|
nghttp2_session_callbacks_set_error_callback(callbacks, error_callback);
|
|
|
|
|
2014-01-30 00:28:50 -05:00
|
|
|
/* The nghttp2 session is not yet setup, do it */
|
2015-04-28 14:39:47 -04:00
|
|
|
rc = nghttp2_session_client_new(&conn->proto.httpc.h2, callbacks, conn);
|
2014-08-25 11:18:32 -04:00
|
|
|
|
|
|
|
nghttp2_session_callbacks_del(callbacks);
|
|
|
|
|
2014-01-30 00:28:50 -05:00
|
|
|
if(rc) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Couldn't initialize nghttp2!");
|
2014-01-30 00:28:50 -05:00
|
|
|
return CURLE_OUT_OF_MEMORY; /* most likely at least */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2013-09-07 05:03:23 -04:00
|
|
|
/*
|
|
|
|
* Append headers to ask for a HTTP1.1 to HTTP2 upgrade.
|
|
|
|
*/
|
2020-05-02 11:04:08 -04:00
|
|
|
CURLcode Curl_http2_request_upgrade(struct dynbuf *req,
|
2021-02-15 02:35:32 -05:00
|
|
|
struct Curl_easy *data)
|
2013-09-07 05:03:23 -04:00
|
|
|
{
|
2013-09-07 07:01:43 -04:00
|
|
|
CURLcode result;
|
|
|
|
ssize_t binlen;
|
|
|
|
char *base64;
|
|
|
|
size_t blen;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct connectdata *conn = data->conn;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct SingleRequest *k = &data->req;
|
2014-01-30 08:26:00 -05:00
|
|
|
uint8_t *binsettings = conn->proto.httpc.binsettings;
|
2016-12-10 08:54:59 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2013-09-07 07:01:43 -04:00
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
populate_settings(data, httpc);
|
2013-09-07 07:01:43 -04:00
|
|
|
|
|
|
|
/* this returns number of bytes it wrote */
|
2014-01-30 08:26:00 -05:00
|
|
|
binlen = nghttp2_pack_settings_payload(binsettings, H2_BINSETTINGS_LEN,
|
2016-12-10 08:54:59 -05:00
|
|
|
httpc->local_settings,
|
|
|
|
httpc->local_settings_num);
|
2020-07-03 16:10:27 -04:00
|
|
|
if(binlen <= 0) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "nghttp2 unexpectedly failed on pack_settings_payload");
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_free(req);
|
2013-09-07 07:01:43 -04:00
|
|
|
return CURLE_FAILED_INIT;
|
|
|
|
}
|
2014-01-30 08:26:00 -05:00
|
|
|
conn->proto.httpc.binlen = binlen;
|
2013-09-07 07:01:43 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
result = Curl_base64url_encode(data, (const char *)binsettings, binlen,
|
2014-07-25 02:24:03 -04:00
|
|
|
&base64, &blen);
|
2017-11-01 09:36:15 -04:00
|
|
|
if(result) {
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_free(req);
|
2013-09-07 07:01:43 -04:00
|
|
|
return result;
|
2017-11-01 09:36:15 -04:00
|
|
|
}
|
2013-09-07 07:01:43 -04:00
|
|
|
|
2020-05-02 11:04:08 -04:00
|
|
|
result = Curl_dyn_addf(req,
|
|
|
|
"Connection: Upgrade, HTTP2-Settings\r\n"
|
|
|
|
"Upgrade: %s\r\n"
|
|
|
|
"HTTP2-Settings: %s\r\n",
|
|
|
|
NGHTTP2_CLEARTEXT_PROTO_VERSION_ID, base64);
|
2015-03-16 10:01:15 -04:00
|
|
|
free(base64);
|
2013-09-07 07:01:43 -04:00
|
|
|
|
2013-09-12 07:51:04 -04:00
|
|
|
k->upgr101 = UPGR101_REQUESTED;
|
|
|
|
|
2013-09-07 05:03:23 -04:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
/*
|
|
|
|
* Returns nonzero if current HTTP/2 session should be closed.
|
|
|
|
*/
|
2016-09-05 03:52:09 -04:00
|
|
|
static int should_close_session(struct http_conn *httpc)
|
|
|
|
{
|
2016-02-23 09:33:04 -05:00
|
|
|
return httpc->drain_total == 0 && !nghttp2_session_want_read(httpc->h2) &&
|
2016-09-05 03:52:09 -04:00
|
|
|
!nghttp2_session_want_write(httpc->h2);
|
2016-02-23 09:33:04 -05:00
|
|
|
}
|
|
|
|
|
2016-02-22 07:20:38 -05:00
|
|
|
/*
|
|
|
|
* h2_process_pending_input() processes pending input left in
|
|
|
|
* httpc->inbuf. Then, call h2_session_send() to send pending data.
|
|
|
|
* This function returns 0 if it succeeds, or -1 and error code will
|
|
|
|
* be assigned to *err.
|
|
|
|
*/
|
2021-01-08 11:58:15 -05:00
|
|
|
static int h2_process_pending_input(struct Curl_easy *data,
|
2016-02-22 07:20:38 -05:00
|
|
|
struct http_conn *httpc,
|
2016-09-05 05:07:40 -04:00
|
|
|
CURLcode *err)
|
|
|
|
{
|
2016-02-22 07:20:38 -05:00
|
|
|
ssize_t nread;
|
|
|
|
char *inbuf;
|
|
|
|
ssize_t rv;
|
|
|
|
|
|
|
|
nread = httpc->inbuflen - httpc->nread_inbuf;
|
|
|
|
inbuf = httpc->inbuf + httpc->nread_inbuf;
|
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
set_transfer(httpc, data); /* set the transfer */
|
2016-02-22 07:20:38 -05:00
|
|
|
rv = nghttp2_session_mem_recv(httpc->h2, (const uint8_t *)inbuf, nread);
|
|
|
|
if(rv < 0) {
|
|
|
|
failf(data,
|
|
|
|
"h2_process_pending_input: nghttp2_session_mem_recv() returned "
|
2020-12-23 17:41:13 -05:00
|
|
|
"%zd:%s", rv, nghttp2_strerror((int)rv));
|
2016-02-22 07:20:38 -05:00
|
|
|
*err = CURLE_RECV_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(nread == rv) {
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data,
|
2016-02-22 07:20:38 -05:00
|
|
|
"h2_process_pending_input: All data in connection buffer "
|
|
|
|
"processed\n"));
|
|
|
|
httpc->inbuflen = 0;
|
|
|
|
httpc->nread_inbuf = 0;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
httpc->nread_inbuf += rv;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data,
|
2016-02-22 07:20:38 -05:00
|
|
|
"h2_process_pending_input: %zu bytes left in connection "
|
|
|
|
"buffer\n",
|
|
|
|
httpc->inbuflen - httpc->nread_inbuf));
|
|
|
|
}
|
|
|
|
|
|
|
|
rv = h2_session_send(data, httpc->h2);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv) {
|
2016-02-22 07:20:38 -05:00
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-07-03 16:10:27 -04:00
|
|
|
if(nghttp2_session_check_request_allowed(httpc->h2) == 0) {
|
|
|
|
/* No more requests are allowed in the current session, so
|
|
|
|
the connection may not be reused. This is set when a
|
|
|
|
GOAWAY frame has been received or when the limit of stream
|
|
|
|
identifiers has been reached. */
|
2021-01-08 11:58:15 -05:00
|
|
|
connclose(data->conn, "http/2: No new requests allowed");
|
2020-07-03 16:10:27 -04:00
|
|
|
}
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
if(should_close_session(httpc)) {
|
2021-04-19 07:15:05 -04:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data,
|
2016-02-22 07:20:38 -05:00
|
|
|
"h2_process_pending_input: nothing to do in this session\n"));
|
2021-04-19 07:15:05 -04:00
|
|
|
if(stream->error)
|
2018-03-10 17:48:43 -05:00
|
|
|
*err = CURLE_HTTP2;
|
|
|
|
else {
|
|
|
|
/* not an error per se, but should still close the connection */
|
2021-01-08 11:58:15 -05:00
|
|
|
connclose(data->conn, "GOAWAY received");
|
2018-03-10 17:48:43 -05:00
|
|
|
*err = CURLE_OK;
|
|
|
|
}
|
2016-02-22 07:20:38 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-09-05 05:07:40 -04:00
|
|
|
/*
|
|
|
|
* Called from transfer.c:done_sending when we stop uploading.
|
|
|
|
*/
|
2021-01-08 11:58:15 -05:00
|
|
|
CURLcode Curl_http2_done_sending(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn)
|
2016-09-05 05:07:40 -04:00
|
|
|
{
|
|
|
|
CURLcode result = CURLE_OK;
|
|
|
|
|
|
|
|
if((conn->handler == &Curl_handler_http2_ssl) ||
|
|
|
|
(conn->handler == &Curl_handler_http2)) {
|
|
|
|
/* make sure this is only attempted for HTTP/2 transfers */
|
2021-01-08 11:58:15 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2020-05-15 02:30:18 -04:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
|
|
|
nghttp2_session *h2 = httpc->h2;
|
|
|
|
|
2016-09-05 05:07:40 -04:00
|
|
|
if(stream->upload_left) {
|
|
|
|
/* If the stream still thinks there's data left to upload. */
|
|
|
|
|
|
|
|
stream->upload_left = 0; /* DONE! */
|
|
|
|
|
|
|
|
/* resume sending here to trigger the callback to get called again so
|
|
|
|
that it can signal EOF to nghttp2 */
|
|
|
|
(void)nghttp2_session_resume_data(h2, stream->stream_id);
|
2021-01-08 11:58:15 -05:00
|
|
|
(void)h2_process_pending_input(data, httpc, &result);
|
2016-09-05 05:07:40 -04:00
|
|
|
}
|
2020-05-15 02:30:18 -04:00
|
|
|
|
|
|
|
/* If nghttp2 still has pending frames unsent */
|
|
|
|
if(nghttp2_session_want_write(h2)) {
|
|
|
|
struct SingleRequest *k = &data->req;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
H2BUGF(infof(data, "HTTP/2 still wants to send data (easy %p)\n", data));
|
|
|
|
|
|
|
|
/* and attempt to send the pending frames */
|
|
|
|
rv = h2_session_send(data, h2);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv)
|
2020-05-15 02:30:18 -04:00
|
|
|
result = CURLE_SEND_ERROR;
|
2021-03-15 10:35:10 -04:00
|
|
|
|
|
|
|
if(nghttp2_session_want_write(h2)) {
|
|
|
|
/* re-set KEEP_SEND to make sure we are called again */
|
|
|
|
k->keepon |= KEEP_SEND;
|
|
|
|
}
|
2020-05-15 02:30:18 -04:00
|
|
|
}
|
2016-09-05 05:07:40 -04:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2015-12-13 05:32:58 -05:00
|
|
|
static ssize_t http2_handle_stream_close(struct connectdata *conn,
|
2016-06-21 09:47:12 -04:00
|
|
|
struct Curl_easy *data,
|
2016-09-05 05:07:40 -04:00
|
|
|
struct HTTP *stream, CURLcode *err)
|
|
|
|
{
|
2015-12-13 05:32:58 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
|
|
|
|
2015-05-07 11:52:48 -04:00
|
|
|
if(httpc->pause_stream_id == stream->stream_id) {
|
|
|
|
httpc->pause_stream_id = 0;
|
|
|
|
}
|
2016-02-22 07:20:38 -05:00
|
|
|
|
2018-07-29 06:30:29 -04:00
|
|
|
drained_transfer(data, httpc);
|
2016-02-23 09:33:04 -05:00
|
|
|
|
2016-02-22 07:20:38 -05:00
|
|
|
if(httpc->pause_stream_id == 0) {
|
2021-01-08 11:58:15 -05:00
|
|
|
if(h2_process_pending_input(data, httpc, err) != 0) {
|
2016-02-22 07:20:38 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
DEBUGASSERT(data->state.drain == 0);
|
|
|
|
|
2016-08-28 17:28:52 -04:00
|
|
|
/* Reset to FALSE to prevent infinite loop in readwrite_data function. */
|
2015-05-07 01:51:32 -04:00
|
|
|
stream->closed = FALSE;
|
2021-04-19 07:15:05 -04:00
|
|
|
if(stream->error == NGHTTP2_REFUSED_STREAM) {
|
2018-04-19 14:03:30 -04:00
|
|
|
H2BUGF(infof(data, "REFUSED_STREAM (%d), try again on a new connection!\n",
|
|
|
|
stream->stream_id));
|
|
|
|
connclose(conn, "REFUSED_STREAM"); /* don't use this anymore */
|
|
|
|
data->state.refused_stream = TRUE;
|
|
|
|
*err = CURLE_RECV_ERROR; /* trigger Curl_retry_request() later */
|
|
|
|
return -1;
|
|
|
|
}
|
2021-04-19 07:15:05 -04:00
|
|
|
else if(stream->error != NGHTTP2_NO_ERROR) {
|
2018-05-28 15:46:22 -04:00
|
|
|
failf(data, "HTTP/2 stream %d was not closed cleanly: %s (err %u)",
|
2021-04-19 07:15:05 -04:00
|
|
|
stream->stream_id, nghttp2_http2_strerror(stream->error),
|
|
|
|
stream->error);
|
2016-02-17 07:36:59 -05:00
|
|
|
*err = CURLE_HTTP2_STREAM;
|
2015-05-07 01:51:32 -04:00
|
|
|
return -1;
|
|
|
|
}
|
2015-12-13 05:32:58 -05:00
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
if(!stream->bodystarted) {
|
2018-05-28 15:46:22 -04:00
|
|
|
failf(data, "HTTP/2 stream %d was closed cleanly, but before getting "
|
2018-03-15 08:34:43 -04:00
|
|
|
" all response header fields, treated as error",
|
2016-02-23 09:33:04 -05:00
|
|
|
stream->stream_id);
|
|
|
|
*err = CURLE_HTTP2_STREAM;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-08-03 06:19:09 -04:00
|
|
|
if(Curl_dyn_len(&stream->trailer_recvbuf)) {
|
|
|
|
char *trailp = Curl_dyn_ptr(&stream->trailer_recvbuf);
|
|
|
|
char *lf;
|
|
|
|
|
|
|
|
do {
|
|
|
|
size_t len = 0;
|
|
|
|
CURLcode result;
|
|
|
|
/* each trailer line ends with a newline */
|
|
|
|
lf = strchr(trailp, '\n');
|
|
|
|
if(!lf)
|
|
|
|
break;
|
|
|
|
len = lf + 1 - trailp;
|
|
|
|
|
2020-11-02 11:34:04 -05:00
|
|
|
Curl_debug(data, CURLINFO_HEADER_IN, trailp, len);
|
2020-08-03 06:19:09 -04:00
|
|
|
/* pass the trailers one by one to the callback */
|
2021-01-08 11:58:15 -05:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_HEADER, trailp, len);
|
2020-08-03 06:19:09 -04:00
|
|
|
if(result) {
|
|
|
|
*err = result;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
trailp = ++lf;
|
|
|
|
} while(lf);
|
|
|
|
}
|
|
|
|
|
2016-08-28 10:44:03 -04:00
|
|
|
stream->close_handled = TRUE;
|
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv returns 0, http2_handle_stream_close\n"));
|
2015-05-07 01:51:32 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-13 10:07:05 -04:00
|
|
|
/*
|
|
|
|
* h2_pri_spec() fills in the pri_spec struct, used by nghttp2 to send weight
|
|
|
|
* and dependency to the peer. It also stores the updated values in the state
|
|
|
|
* struct.
|
|
|
|
*/
|
|
|
|
|
2016-06-21 09:47:12 -04:00
|
|
|
static void h2_pri_spec(struct Curl_easy *data,
|
2015-09-13 10:07:05 -04:00
|
|
|
nghttp2_priority_spec *pri_spec)
|
|
|
|
{
|
|
|
|
struct HTTP *depstream = (data->set.stream_depends_on?
|
2020-11-23 02:32:41 -05:00
|
|
|
data->set.stream_depends_on->req.p.http:NULL);
|
2015-09-13 10:07:05 -04:00
|
|
|
int32_t depstream_id = depstream? depstream->stream_id:0;
|
2015-10-21 16:47:24 -04:00
|
|
|
nghttp2_priority_spec_init(pri_spec, depstream_id, data->set.stream_weight,
|
2015-09-13 10:07:05 -04:00
|
|
|
data->set.stream_depends_e);
|
2015-10-21 16:47:24 -04:00
|
|
|
data->state.stream_weight = data->set.stream_weight;
|
2015-09-13 10:07:05 -04:00
|
|
|
data->state.stream_depends_e = data->set.stream_depends_e;
|
|
|
|
data->state.stream_depends_on = data->set.stream_depends_on;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* h2_session_send() checks if there's been an update in the priority /
|
|
|
|
* dependency settings and if so it submits a PRIORITY frame with the updated
|
|
|
|
* info.
|
|
|
|
*/
|
2016-06-21 09:47:12 -04:00
|
|
|
static int h2_session_send(struct Curl_easy *data,
|
2015-09-13 10:07:05 -04:00
|
|
|
nghttp2_session *h2)
|
|
|
|
{
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2021-02-15 02:35:32 -05:00
|
|
|
struct http_conn *httpc = &data->conn->proto.httpc;
|
|
|
|
set_transfer(httpc, data);
|
2015-10-21 16:47:24 -04:00
|
|
|
if((data->set.stream_weight != data->state.stream_weight) ||
|
2015-09-13 10:07:05 -04:00
|
|
|
(data->set.stream_depends_e != data->state.stream_depends_e) ||
|
|
|
|
(data->set.stream_depends_on != data->state.stream_depends_on) ) {
|
|
|
|
/* send new weight and/or dependency */
|
|
|
|
nghttp2_priority_spec pri_spec;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
h2_pri_spec(data, &pri_spec);
|
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Queuing PRIORITY on stream %u (easy %p)\n",
|
2015-11-29 18:12:46 -05:00
|
|
|
stream->stream_id, data));
|
2019-09-30 03:30:58 -04:00
|
|
|
DEBUGASSERT(stream->stream_id != -1);
|
2015-09-13 10:07:05 -04:00
|
|
|
rv = nghttp2_submit_priority(h2, NGHTTP2_FLAG_NONE, stream->stream_id,
|
|
|
|
&pri_spec);
|
|
|
|
if(rv)
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return nghttp2_session_send(h2);
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
2013-09-18 16:43:13 -04:00
|
|
|
char *mem, size_t len, CURLcode *err)
|
|
|
|
{
|
2014-01-30 09:26:20 -05:00
|
|
|
ssize_t nread;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct connectdata *conn = data->conn;
|
2014-01-31 10:51:24 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2014-01-30 09:26:20 -05:00
|
|
|
|
2013-09-18 16:43:13 -04:00
|
|
|
(void)sockindex; /* we always do HTTP2 on sockindex 0 */
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
if(should_close_session(httpc)) {
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data,
|
2016-02-19 10:05:47 -05:00
|
|
|
"http2_recv: nothing to do in this session\n"));
|
2019-08-26 10:00:05 -04:00
|
|
|
if(conn->bits.close) {
|
|
|
|
/* already marked for closure, return OK and we're done */
|
|
|
|
*err = CURLE_OK;
|
|
|
|
return 0;
|
|
|
|
}
|
2016-02-19 10:05:47 -05:00
|
|
|
*err = CURLE_HTTP2;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-04-19 07:13:47 -04:00
|
|
|
if(stream->closed)
|
|
|
|
/* closed overrides paused */
|
|
|
|
return http2_handle_stream_close(conn, data, stream, err);
|
|
|
|
|
2014-02-14 08:02:44 -05:00
|
|
|
/* Nullify here because we call nghttp2_session_send() and they
|
|
|
|
might refer to the old buffer. */
|
2015-05-18 08:01:38 -04:00
|
|
|
stream->upload_mem = NULL;
|
|
|
|
stream->upload_len = 0;
|
2014-02-14 08:02:44 -05:00
|
|
|
|
2015-04-29 08:19:39 -04:00
|
|
|
/*
|
2016-06-21 09:47:12 -04:00
|
|
|
* At this point 'stream' is just in the Curl_easy the connection
|
2015-04-29 08:19:39 -04:00
|
|
|
* identifies as its owner at this time.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if(stream->bodystarted &&
|
2020-05-02 11:04:08 -04:00
|
|
|
stream->nread_header_recvbuf < Curl_dyn_len(&stream->header_recvbuf)) {
|
|
|
|
/* If there is header data pending for this stream to return, do that */
|
2014-02-04 08:54:42 -05:00
|
|
|
size_t left =
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_len(&stream->header_recvbuf) - stream->nread_header_recvbuf;
|
2018-08-13 06:12:14 -04:00
|
|
|
size_t ncopy = CURLMIN(len, left);
|
2020-05-02 11:04:08 -04:00
|
|
|
memcpy(mem, Curl_dyn_ptr(&stream->header_recvbuf) +
|
|
|
|
stream->nread_header_recvbuf, ncopy);
|
2015-04-29 08:19:39 -04:00
|
|
|
stream->nread_header_recvbuf += ncopy;
|
2015-04-29 11:00:53 -04:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv: Got %d bytes from header_recvbuf\n",
|
2015-11-29 18:12:46 -05:00
|
|
|
(int)ncopy));
|
2014-02-04 08:54:42 -05:00
|
|
|
return ncopy;
|
|
|
|
}
|
|
|
|
|
2020-02-27 03:42:11 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv: easy %p (stream %u) win %u/%u\n",
|
|
|
|
data, stream->stream_id,
|
|
|
|
nghttp2_session_get_local_window_size(httpc->h2),
|
|
|
|
nghttp2_session_get_stream_local_window_size(httpc->h2,
|
|
|
|
stream->stream_id)
|
|
|
|
));
|
2015-05-07 10:19:08 -04:00
|
|
|
|
2015-05-11 09:54:50 -04:00
|
|
|
if((data->state.drain) && stream->memlen) {
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv: DRAIN %zu bytes stream %u!! (%p => %p)\n",
|
2015-05-07 10:19:08 -04:00
|
|
|
stream->memlen, stream->stream_id,
|
|
|
|
stream->mem, mem));
|
|
|
|
if(mem != stream->mem) {
|
|
|
|
/* if we didn't get the same buffer this time, we must move the data to
|
|
|
|
the beginning */
|
|
|
|
memmove(mem, stream->mem, stream->memlen);
|
|
|
|
stream->len = len - stream->memlen;
|
|
|
|
stream->mem = mem;
|
|
|
|
}
|
2016-02-22 07:20:38 -05:00
|
|
|
if(httpc->pause_stream_id == stream->stream_id && !stream->pausedata) {
|
|
|
|
/* We have paused nghttp2, but we have no pause data (see
|
|
|
|
on_data_chunk_recv). */
|
|
|
|
httpc->pause_stream_id = 0;
|
2021-01-08 11:58:15 -05:00
|
|
|
if(h2_process_pending_input(data, httpc, err) != 0) {
|
2016-02-22 07:20:38 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2015-05-07 10:19:08 -04:00
|
|
|
}
|
2015-05-11 09:10:21 -04:00
|
|
|
else if(stream->pausedata) {
|
2016-02-22 07:20:38 -05:00
|
|
|
DEBUGASSERT(httpc->pause_stream_id == stream->stream_id);
|
2018-08-13 06:12:14 -04:00
|
|
|
nread = CURLMIN(len, stream->pauselen);
|
2015-05-11 09:10:21 -04:00
|
|
|
memcpy(mem, stream->pausedata, nread);
|
2014-02-04 08:57:29 -05:00
|
|
|
|
2015-05-11 09:10:21 -04:00
|
|
|
stream->pausedata += nread;
|
|
|
|
stream->pauselen -= nread;
|
2014-02-04 08:57:29 -05:00
|
|
|
|
2015-05-11 09:10:21 -04:00
|
|
|
if(stream->pauselen == 0) {
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Unpaused by stream %u\n", stream->stream_id));
|
2017-05-22 07:58:17 -04:00
|
|
|
DEBUGASSERT(httpc->pause_stream_id == stream->stream_id);
|
2015-05-07 11:52:48 -04:00
|
|
|
httpc->pause_stream_id = 0;
|
|
|
|
|
2015-05-11 09:10:21 -04:00
|
|
|
stream->pausedata = NULL;
|
|
|
|
stream->pauselen = 0;
|
2015-12-04 10:40:10 -05:00
|
|
|
|
|
|
|
/* When NGHTTP2_ERR_PAUSE is returned from
|
|
|
|
data_source_read_callback, we might not process DATA frame
|
|
|
|
fully. Calling nghttp2_session_mem_recv() again will
|
|
|
|
continue to process DATA frame, but if there is no incoming
|
|
|
|
frames, then we have to call it again with 0-length data.
|
|
|
|
Without this, on_stream_close callback will not be called,
|
|
|
|
and stream could be hanged. */
|
2021-01-08 11:58:15 -05:00
|
|
|
if(h2_process_pending_input(data, httpc, err) != 0) {
|
2016-02-22 07:20:38 -05:00
|
|
|
return -1;
|
|
|
|
}
|
2014-02-04 08:57:29 -05:00
|
|
|
}
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv: returns unpaused %zd bytes on stream %u\n",
|
2015-11-29 18:12:46 -05:00
|
|
|
nread, stream->stream_id));
|
2014-02-04 08:57:29 -05:00
|
|
|
return nread;
|
|
|
|
}
|
2015-05-07 11:52:48 -04:00
|
|
|
else if(httpc->pause_stream_id) {
|
|
|
|
/* If a stream paused nghttp2_session_mem_recv previously, and has
|
|
|
|
not processed all data, it still refers to the buffer in
|
|
|
|
nghttp2_session. If we call nghttp2_session_mem_recv(), we may
|
|
|
|
overwrite that buffer. To avoid that situation, just return
|
|
|
|
here with CURLE_AGAIN. This could be busy loop since data in
|
|
|
|
socket is not read. But it seems that usually streams are
|
|
|
|
notified with its drain property, and socket is read again
|
|
|
|
quickly. */
|
2019-10-18 11:27:21 -04:00
|
|
|
if(stream->closed)
|
|
|
|
/* closed overrides paused */
|
|
|
|
return 0;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "stream %x is paused, pause id: %x\n",
|
2016-08-11 08:00:23 -04:00
|
|
|
stream->stream_id, httpc->pause_stream_id));
|
2015-05-07 11:52:48 -04:00
|
|
|
*err = CURLE_AGAIN;
|
|
|
|
return -1;
|
|
|
|
}
|
2015-04-30 02:20:49 -04:00
|
|
|
else {
|
|
|
|
/* remember where to store incoming data for this stream and how big the
|
|
|
|
buffer is */
|
|
|
|
stream->mem = mem;
|
|
|
|
stream->len = len;
|
|
|
|
stream->memlen = 0;
|
|
|
|
|
2015-05-07 04:22:57 -04:00
|
|
|
if(httpc->inbuflen == 0) {
|
|
|
|
nread = ((Curl_recv *)httpc->recv_underlying)(
|
2021-01-08 11:58:15 -05:00
|
|
|
data, FIRSTSOCKET, httpc->inbuf, H2_BUFSIZE, err);
|
2014-01-30 12:21:57 -05:00
|
|
|
|
2015-05-07 04:22:57 -04:00
|
|
|
if(nread == -1) {
|
2020-07-03 16:10:27 -04:00
|
|
|
if(*err != CURLE_AGAIN)
|
2015-10-08 02:48:44 -04:00
|
|
|
failf(data, "Failed receiving HTTP2 data");
|
2016-04-11 10:00:15 -04:00
|
|
|
else if(stream->closed)
|
|
|
|
/* received when the stream was already closed! */
|
|
|
|
return http2_handle_stream_close(conn, data, stream, err);
|
|
|
|
|
2015-10-08 02:48:44 -04:00
|
|
|
return -1;
|
2015-05-07 04:22:57 -04:00
|
|
|
}
|
2014-09-12 22:59:23 -04:00
|
|
|
|
2015-05-07 04:22:57 -04:00
|
|
|
if(nread == 0) {
|
2021-03-12 08:11:08 -05:00
|
|
|
if(!stream->closed) {
|
|
|
|
/* This will happen when the server or proxy server is SIGKILLed
|
|
|
|
during data transfer. We should emit an error since our data
|
|
|
|
received may be incomplete. */
|
|
|
|
failf(data, "HTTP/2 stream %d was not closed cleanly before"
|
|
|
|
" end of the underlying stream",
|
|
|
|
stream->stream_id);
|
|
|
|
*err = CURLE_HTTP2_STREAM;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-04-19 14:03:30 -04:00
|
|
|
H2BUGF(infof(data, "end of stream\n"));
|
|
|
|
*err = CURLE_OK;
|
|
|
|
return 0;
|
2015-05-07 04:22:57 -04:00
|
|
|
}
|
2015-02-25 07:50:31 -05:00
|
|
|
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "nread=%zd\n", nread));
|
2015-05-07 04:22:57 -04:00
|
|
|
|
|
|
|
httpc->inbuflen = nread;
|
2020-07-03 16:10:27 -04:00
|
|
|
|
|
|
|
DEBUGASSERT(httpc->nread_inbuf == 0);
|
2015-05-07 04:22:57 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
nread = httpc->inbuflen - httpc->nread_inbuf;
|
2020-07-03 16:10:27 -04:00
|
|
|
(void)nread; /* silence warning, used in debug */
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Use data left in connection buffer, nread=%zd\n",
|
2015-05-07 04:22:57 -04:00
|
|
|
nread));
|
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2021-04-19 07:15:05 -04:00
|
|
|
if(h2_process_pending_input(data, httpc, err))
|
2017-08-18 10:29:55 -04:00
|
|
|
return -1;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
2015-04-30 12:34:41 -04:00
|
|
|
if(stream->memlen) {
|
|
|
|
ssize_t retlen = stream->memlen;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv: returns %zd for stream %u\n",
|
2015-11-29 18:12:46 -05:00
|
|
|
retlen, stream->stream_id));
|
2015-04-30 12:34:41 -04:00
|
|
|
stream->memlen = 0;
|
|
|
|
|
2015-05-11 09:54:50 -04:00
|
|
|
if(httpc->pause_stream_id == stream->stream_id) {
|
|
|
|
/* data for this stream is returned now, but this stream caused a pause
|
|
|
|
already so we need it called again asap */
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "Data returned for PAUSED stream %u\n",
|
2015-05-11 09:54:50 -04:00
|
|
|
stream->stream_id));
|
|
|
|
}
|
2016-02-23 09:33:04 -05:00
|
|
|
else if(!stream->closed) {
|
2018-07-29 06:30:29 -04:00
|
|
|
drained_transfer(data, httpc);
|
2016-02-23 09:33:04 -05:00
|
|
|
}
|
2019-07-29 05:15:33 -04:00
|
|
|
else
|
|
|
|
/* this stream is closed, trigger a another read ASAP to detect that */
|
|
|
|
Curl_expire(data, 0, EXPIRE_RUN_NOW);
|
2015-05-11 09:54:50 -04:00
|
|
|
|
2015-04-30 12:34:41 -04:00
|
|
|
return retlen;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
2019-06-20 06:30:25 -04:00
|
|
|
if(stream->closed)
|
2021-04-19 07:15:05 -04:00
|
|
|
return http2_handle_stream_close(conn, data, stream, err);
|
2014-01-31 10:51:24 -05:00
|
|
|
*err = CURLE_AGAIN;
|
2018-01-30 17:19:53 -05:00
|
|
|
H2BUGF(infof(data, "http2_recv returns AGAIN for stream %u\n",
|
2015-05-11 09:10:21 -04:00
|
|
|
stream->stream_id));
|
2014-01-31 10:51:24 -05:00
|
|
|
return -1;
|
2013-09-18 16:43:13 -04:00
|
|
|
}
|
|
|
|
|
2014-08-07 10:09:25 -04:00
|
|
|
/* Index where :authority header field will appear in request header
|
|
|
|
field list. */
|
|
|
|
#define AUTHORITY_DST_IDX 3
|
|
|
|
|
2019-09-23 05:04:13 -04:00
|
|
|
/* USHRT_MAX is 65535 == 0xffff */
|
2016-03-03 01:24:27 -05:00
|
|
|
#define HEADER_OVERFLOW(x) \
|
2019-09-23 05:04:13 -04:00
|
|
|
(x.namelen > 0xffff || x.valuelen > 0xffff - x.namelen)
|
2016-03-03 01:24:27 -05:00
|
|
|
|
2016-10-30 06:04:03 -04:00
|
|
|
/*
|
|
|
|
* Check header memory for the token "trailers".
|
|
|
|
* Parse the tokens as separated by comma and surrounded by whitespace.
|
|
|
|
* Returns TRUE if found or FALSE if not.
|
|
|
|
*/
|
2016-11-23 02:49:04 -05:00
|
|
|
static bool contains_trailers(const char *p, size_t len)
|
|
|
|
{
|
2016-10-30 06:04:03 -04:00
|
|
|
const char *end = p + len;
|
|
|
|
for(;;) {
|
|
|
|
for(; p != end && (*p == ' ' || *p == '\t'); ++p)
|
|
|
|
;
|
|
|
|
if(p == end || (size_t)(end - p) < sizeof("trailers") - 1)
|
|
|
|
return FALSE;
|
|
|
|
if(strncasecompare("trailers", p, sizeof("trailers") - 1)) {
|
|
|
|
p += sizeof("trailers") - 1;
|
|
|
|
for(; p != end && (*p == ' ' || *p == '\t'); ++p)
|
|
|
|
;
|
|
|
|
if(p == end || *p == ',')
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
/* skip to next token */
|
|
|
|
for(; p != end && *p != ','; ++p)
|
|
|
|
;
|
|
|
|
if(p == end)
|
|
|
|
return FALSE;
|
|
|
|
++p;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
/* Send header to server */
|
|
|
|
HEADERINST_FORWARD,
|
|
|
|
/* Don't send header to server */
|
|
|
|
HEADERINST_IGNORE,
|
|
|
|
/* Discard header, and replace it with "te: trailers" */
|
|
|
|
HEADERINST_TE_TRAILERS
|
|
|
|
} header_instruction;
|
|
|
|
|
|
|
|
/* Decides how to treat given header field. */
|
|
|
|
static header_instruction inspect_header(const char *name, size_t namelen,
|
|
|
|
const char *value, size_t valuelen) {
|
|
|
|
switch(namelen) {
|
|
|
|
case 2:
|
|
|
|
if(!strncasecompare("te", name, namelen))
|
|
|
|
return HEADERINST_FORWARD;
|
|
|
|
|
|
|
|
return contains_trailers(value, valuelen) ?
|
|
|
|
HEADERINST_TE_TRAILERS : HEADERINST_IGNORE;
|
|
|
|
case 7:
|
|
|
|
return strncasecompare("upgrade", name, namelen) ?
|
|
|
|
HEADERINST_IGNORE : HEADERINST_FORWARD;
|
|
|
|
case 10:
|
|
|
|
return (strncasecompare("connection", name, namelen) ||
|
|
|
|
strncasecompare("keep-alive", name, namelen)) ?
|
|
|
|
HEADERINST_IGNORE : HEADERINST_FORWARD;
|
|
|
|
case 16:
|
|
|
|
return strncasecompare("proxy-connection", name, namelen) ?
|
|
|
|
HEADERINST_IGNORE : HEADERINST_FORWARD;
|
|
|
|
case 17:
|
|
|
|
return strncasecompare("transfer-encoding", name, namelen) ?
|
|
|
|
HEADERINST_IGNORE : HEADERINST_FORWARD;
|
|
|
|
default:
|
|
|
|
return HEADERINST_FORWARD;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
2013-09-18 16:43:13 -04:00
|
|
|
const void *mem, size_t len, CURLcode *err)
|
|
|
|
{
|
2014-01-31 10:51:24 -05:00
|
|
|
/*
|
2019-05-14 10:36:15 -04:00
|
|
|
* Currently, we send request in this function, but this function is also
|
|
|
|
* used to send request body. It would be nice to add dedicated function for
|
|
|
|
* request.
|
2014-01-31 10:51:24 -05:00
|
|
|
*/
|
|
|
|
int rv;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct connectdata *conn = data->conn;
|
2014-01-31 10:51:24 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2016-03-03 01:24:27 -05:00
|
|
|
nghttp2_nv *nva = NULL;
|
2014-01-31 10:51:24 -05:00
|
|
|
size_t nheader;
|
|
|
|
size_t i;
|
2014-08-07 10:09:25 -04:00
|
|
|
size_t authority_idx;
|
2016-11-23 02:30:18 -05:00
|
|
|
char *hdbuf = (char *)mem;
|
2016-03-03 01:24:27 -05:00
|
|
|
char *end, *line_end;
|
2014-02-14 08:02:44 -05:00
|
|
|
nghttp2_data_provider data_prd;
|
2014-05-07 11:20:05 -04:00
|
|
|
int32_t stream_id;
|
2015-05-07 10:44:00 -04:00
|
|
|
nghttp2_session *h2 = httpc->h2;
|
2015-09-13 10:07:05 -04:00
|
|
|
nghttp2_priority_spec pri_spec;
|
2014-05-07 11:20:05 -04:00
|
|
|
|
2013-09-18 16:43:13 -04:00
|
|
|
(void)sockindex;
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "http2_send len=%zu\n", len));
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2015-04-27 07:54:47 -04:00
|
|
|
if(stream->stream_id != -1) {
|
2016-08-28 10:44:03 -04:00
|
|
|
if(stream->close_handled) {
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "stream %d closed\n", stream->stream_id);
|
2016-08-28 17:28:52 -04:00
|
|
|
*err = CURLE_HTTP2_STREAM;
|
2016-08-28 10:44:03 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
else if(stream->closed) {
|
2021-01-08 11:58:15 -05:00
|
|
|
return http2_handle_stream_close(conn, data, stream, err);
|
2016-08-28 10:44:03 -04:00
|
|
|
}
|
2014-02-14 08:02:44 -05:00
|
|
|
/* If stream_id != -1, we have dispatched request HEADERS, and now
|
|
|
|
are going to send or sending request body in DATA frame */
|
2015-05-18 08:01:38 -04:00
|
|
|
stream->upload_mem = mem;
|
|
|
|
stream->upload_len = len;
|
2019-06-24 05:21:26 -04:00
|
|
|
rv = nghttp2_session_resume_data(h2, stream->stream_id);
|
|
|
|
if(nghttp2_is_fatal(rv)) {
|
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
2021-01-08 11:58:15 -05:00
|
|
|
rv = h2_session_send(data, h2);
|
2014-02-14 08:02:44 -05:00
|
|
|
if(nghttp2_is_fatal(rv)) {
|
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
2015-05-18 08:01:38 -04:00
|
|
|
len -= stream->upload_len;
|
|
|
|
|
http2: Faster http2 upload
Previously, when we send all given buffer in data_source_callback, we
return NGHTTP2_ERR_DEFERRED, and nghttp2 library removes this stream
temporarily for writing. This itself is good. If this is the sole
stream in the session, nghttp2_session_want_write() returns zero,
which means that libcurl does not check writeability of the underlying
socket. This leads to very slow upload, because it seems curl only
upload 16k something per 1 second. To fix this, if we still have data
to send, call nghttp2_session_resume_data after nghttp2_session_send.
This makes nghttp2_session_want_write() returns nonzero (if connection
window still opens), and as a result, socket writeability is checked,
and upload speed becomes normal.
2015-05-20 10:11:43 -04:00
|
|
|
/* Nullify here because we call nghttp2_session_send() and they
|
|
|
|
might refer to the old buffer. */
|
|
|
|
stream->upload_mem = NULL;
|
|
|
|
stream->upload_len = 0;
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
if(should_close_session(httpc)) {
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "http2_send: nothing to do in this session\n"));
|
2016-02-22 07:20:38 -05:00
|
|
|
*err = CURLE_HTTP2;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
http2: Faster http2 upload
Previously, when we send all given buffer in data_source_callback, we
return NGHTTP2_ERR_DEFERRED, and nghttp2 library removes this stream
temporarily for writing. This itself is good. If this is the sole
stream in the session, nghttp2_session_want_write() returns zero,
which means that libcurl does not check writeability of the underlying
socket. This leads to very slow upload, because it seems curl only
upload 16k something per 1 second. To fix this, if we still have data
to send, call nghttp2_session_resume_data after nghttp2_session_send.
This makes nghttp2_session_want_write() returns nonzero (if connection
window still opens), and as a result, socket writeability is checked,
and upload speed becomes normal.
2015-05-20 10:11:43 -04:00
|
|
|
if(stream->upload_left) {
|
|
|
|
/* we are sure that we have more data to send here. Calling the
|
|
|
|
following API will make nghttp2_session_want_write() return
|
|
|
|
nonzero if remote window allows it, which then libcurl checks
|
|
|
|
socket is writable or not. See http2_perform_getsock(). */
|
|
|
|
nghttp2_session_resume_data(h2, stream->stream_id);
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "http2_send returns %zu for stream %u\n", len,
|
2015-05-18 08:01:38 -04:00
|
|
|
stream->stream_id));
|
|
|
|
return len;
|
2014-02-14 08:02:44 -05:00
|
|
|
}
|
|
|
|
|
2014-01-31 10:51:24 -05:00
|
|
|
/* Calculate number of headers contained in [mem, mem + len) */
|
|
|
|
/* Here, we assume the curl http code generate *correct* HTTP header
|
|
|
|
field block */
|
|
|
|
nheader = 0;
|
2016-03-03 01:24:27 -05:00
|
|
|
for(i = 1; i < len; ++i) {
|
|
|
|
if(hdbuf[i] == '\n' && hdbuf[i - 1] == '\r') {
|
2014-01-31 10:51:24 -05:00
|
|
|
++nheader;
|
2016-03-03 01:24:27 -05:00
|
|
|
++i;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
}
|
2016-03-03 01:24:27 -05:00
|
|
|
if(nheader < 2)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
/* We counted additional 2 \r\n in the first and last line. We need 3
|
2014-01-31 10:51:24 -05:00
|
|
|
new headers: :method, :path and :scheme. Therefore we need one
|
|
|
|
more space. */
|
|
|
|
nheader += 1;
|
|
|
|
nva = malloc(sizeof(nghttp2_nv) * nheader);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(!nva) {
|
2014-01-31 10:51:24 -05:00
|
|
|
*err = CURLE_OUT_OF_MEMORY;
|
|
|
|
return -1;
|
|
|
|
}
|
2016-03-03 01:24:27 -05:00
|
|
|
|
2018-04-20 10:32:46 -04:00
|
|
|
/* Extract :method, :path from request line
|
|
|
|
We do line endings with CRLF so checking for CR is enough */
|
|
|
|
line_end = memchr(hdbuf, '\r', len);
|
|
|
|
if(!line_end)
|
|
|
|
goto fail;
|
2016-03-03 01:24:27 -05:00
|
|
|
|
|
|
|
/* Method does not contain spaces */
|
|
|
|
end = memchr(hdbuf, ' ', line_end - hdbuf);
|
|
|
|
if(!end || end == hdbuf)
|
2015-07-23 05:51:53 -04:00
|
|
|
goto fail;
|
2014-01-31 10:51:24 -05:00
|
|
|
nva[0].name = (unsigned char *)":method";
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[0].namelen = strlen((char *)nva[0].name);
|
2014-01-31 10:51:24 -05:00
|
|
|
nva[0].value = (unsigned char *)hdbuf;
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[0].valuelen = (size_t)(end - hdbuf);
|
2014-04-05 05:57:20 -04:00
|
|
|
nva[0].flags = NGHTTP2_NV_FLAG_NONE;
|
2016-03-03 01:24:27 -05:00
|
|
|
if(HEADER_OVERFLOW(nva[0])) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Failed sending HTTP request: Header overflow");
|
2016-03-03 01:24:27 -05:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
|
|
|
hdbuf = end + 1;
|
|
|
|
|
2016-03-03 01:24:27 -05:00
|
|
|
/* Path may contain spaces so scan backwards */
|
|
|
|
end = NULL;
|
|
|
|
for(i = (size_t)(line_end - hdbuf); i; --i) {
|
|
|
|
if(hdbuf[i - 1] == ' ') {
|
|
|
|
end = &hdbuf[i - 1];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(!end || end == hdbuf)
|
2015-07-23 05:51:53 -04:00
|
|
|
goto fail;
|
2014-01-31 10:51:24 -05:00
|
|
|
nva[1].name = (unsigned char *)":path";
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[1].namelen = strlen((char *)nva[1].name);
|
2014-01-31 10:51:24 -05:00
|
|
|
nva[1].value = (unsigned char *)hdbuf;
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[1].valuelen = (size_t)(end - hdbuf);
|
2014-04-05 05:57:20 -04:00
|
|
|
nva[1].flags = NGHTTP2_NV_FLAG_NONE;
|
2016-03-03 01:24:27 -05:00
|
|
|
if(HEADER_OVERFLOW(nva[1])) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Failed sending HTTP request: Header overflow");
|
2016-03-03 01:24:27 -05:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
|
|
|
nva[2].name = (unsigned char *)":scheme";
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[2].namelen = strlen((char *)nva[2].name);
|
2014-01-31 10:51:24 -05:00
|
|
|
if(conn->handler->flags & PROTOPT_SSL)
|
|
|
|
nva[2].value = (unsigned char *)"https";
|
|
|
|
else
|
|
|
|
nva[2].value = (unsigned char *)"http";
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[2].valuelen = strlen((char *)nva[2].value);
|
2014-04-05 05:57:20 -04:00
|
|
|
nva[2].flags = NGHTTP2_NV_FLAG_NONE;
|
2016-03-03 01:24:27 -05:00
|
|
|
if(HEADER_OVERFLOW(nva[2])) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Failed sending HTTP request: Header overflow");
|
2015-07-23 05:51:53 -04:00
|
|
|
goto fail;
|
2016-03-03 01:24:27 -05:00
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2014-08-07 10:09:25 -04:00
|
|
|
authority_idx = 0;
|
2015-10-16 14:51:12 -04:00
|
|
|
i = 3;
|
|
|
|
while(i < nheader) {
|
2015-09-03 16:23:50 -04:00
|
|
|
size_t hlen;
|
2016-03-03 01:24:27 -05:00
|
|
|
|
|
|
|
hdbuf = line_end + 2;
|
|
|
|
|
2018-04-26 04:41:21 -04:00
|
|
|
/* check for next CR, but only within the piece of data left in the given
|
|
|
|
buffer */
|
|
|
|
line_end = memchr(hdbuf, '\r', len - (hdbuf - (char *)mem));
|
|
|
|
if(!line_end || (line_end == hdbuf))
|
2016-03-03 01:24:27 -05:00
|
|
|
goto fail;
|
|
|
|
|
|
|
|
/* header continuation lines are not supported */
|
|
|
|
if(*hdbuf == ' ' || *hdbuf == '\t')
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
for(end = hdbuf; end < line_end && *end != ':'; ++end)
|
|
|
|
;
|
|
|
|
if(end == hdbuf || end == line_end)
|
2015-07-23 05:51:53 -04:00
|
|
|
goto fail;
|
2015-09-03 16:23:50 -04:00
|
|
|
hlen = end - hdbuf;
|
2016-03-03 01:24:27 -05:00
|
|
|
|
2016-10-30 06:04:03 -04:00
|
|
|
if(hlen == 4 && strncasecompare("host", hdbuf, 4)) {
|
2014-08-07 10:09:25 -04:00
|
|
|
authority_idx = i;
|
2014-01-31 10:51:24 -05:00
|
|
|
nva[i].name = (unsigned char *)":authority";
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[i].namelen = strlen((char *)nva[i].name);
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
else {
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[i].namelen = (size_t)(end - hdbuf);
|
2019-09-22 16:17:12 -04:00
|
|
|
/* Lower case the header name for HTTP/2 */
|
|
|
|
Curl_strntolower((char *)hdbuf, hdbuf, nva[i].namelen);
|
|
|
|
nva[i].name = (unsigned char *)hdbuf;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
hdbuf = end + 1;
|
2016-03-03 01:24:27 -05:00
|
|
|
while(*hdbuf == ' ' || *hdbuf == '\t')
|
|
|
|
++hdbuf;
|
|
|
|
end = line_end;
|
2016-10-30 06:04:03 -04:00
|
|
|
|
|
|
|
switch(inspect_header((const char *)nva[i].name, nva[i].namelen, hdbuf,
|
|
|
|
end - hdbuf)) {
|
|
|
|
case HEADERINST_IGNORE:
|
|
|
|
/* skip header fields prohibited by HTTP/2 specification. */
|
|
|
|
--nheader;
|
|
|
|
continue;
|
|
|
|
case HEADERINST_TE_TRAILERS:
|
|
|
|
nva[i].value = (uint8_t*)"trailers";
|
|
|
|
nva[i].valuelen = sizeof("trailers") - 1;
|
|
|
|
break;
|
|
|
|
default:
|
2015-10-16 14:51:12 -04:00
|
|
|
nva[i].value = (unsigned char *)hdbuf;
|
2016-03-03 01:24:27 -05:00
|
|
|
nva[i].valuelen = (size_t)(end - hdbuf);
|
2014-02-14 08:02:44 -05:00
|
|
|
}
|
2016-10-30 06:04:03 -04:00
|
|
|
|
|
|
|
nva[i].flags = NGHTTP2_NV_FLAG_NONE;
|
|
|
|
if(HEADER_OVERFLOW(nva[i])) {
|
2021-01-08 11:58:15 -05:00
|
|
|
failf(data, "Failed sending HTTP request: Header overflow");
|
2016-10-30 06:04:03 -04:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
++i;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
|
2014-08-07 10:09:25 -04:00
|
|
|
/* :authority must come before non-pseudo header fields */
|
2021-04-19 04:46:11 -04:00
|
|
|
if(authority_idx && authority_idx != AUTHORITY_DST_IDX) {
|
2014-08-07 10:09:25 -04:00
|
|
|
nghttp2_nv authority = nva[authority_idx];
|
|
|
|
for(i = authority_idx; i > AUTHORITY_DST_IDX; --i) {
|
|
|
|
nva[i] = nva[i - 1];
|
|
|
|
}
|
|
|
|
nva[i] = authority;
|
|
|
|
}
|
|
|
|
|
2016-03-03 01:24:27 -05:00
|
|
|
/* Warn stream may be rejected if cumulative length of headers is too large.
|
|
|
|
It appears nghttp2 will not send a header frame larger than 64KB. */
|
2017-01-11 06:15:37 -05:00
|
|
|
#define MAX_ACC 60000 /* <64KB to account for some overhead */
|
2016-03-03 01:24:27 -05:00
|
|
|
{
|
|
|
|
size_t acc = 0;
|
|
|
|
|
|
|
|
for(i = 0; i < nheader; ++i) {
|
2017-01-11 06:15:37 -05:00
|
|
|
acc += nva[i].namelen + nva[i].valuelen;
|
2016-09-15 08:12:53 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "h2 header: %.*s:%.*s\n",
|
2016-09-15 08:12:53 -04:00
|
|
|
nva[i].namelen, nva[i].name,
|
|
|
|
nva[i].valuelen, nva[i].value));
|
2016-03-03 01:24:27 -05:00
|
|
|
}
|
|
|
|
|
2017-01-11 06:15:37 -05:00
|
|
|
if(acc > MAX_ACC) {
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "http2_send: Warning: The cumulative length of all "
|
2020-11-23 16:42:07 -05:00
|
|
|
"headers exceeds %d bytes and that could cause the "
|
2017-01-11 06:15:37 -05:00
|
|
|
"stream to be rejected.\n", MAX_ACC);
|
2016-03-03 01:24:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
h2_pri_spec(data, &pri_spec);
|
2015-09-13 10:07:05 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "http2_send request allowed %d (easy handle %p)\n",
|
|
|
|
nghttp2_session_check_request_allowed(h2), (void *)data));
|
2020-07-02 19:46:22 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
switch(data->state.httpreq) {
|
2014-02-14 08:02:44 -05:00
|
|
|
case HTTPREQ_POST:
|
|
|
|
case HTTPREQ_POST_FORM:
|
2017-09-02 12:47:10 -04:00
|
|
|
case HTTPREQ_POST_MIME:
|
2014-02-14 08:02:44 -05:00
|
|
|
case HTTPREQ_PUT:
|
2021-01-08 11:58:15 -05:00
|
|
|
if(data->state.infilesize != -1)
|
|
|
|
stream->upload_left = data->state.infilesize;
|
2016-09-05 02:51:06 -04:00
|
|
|
else
|
|
|
|
/* data sending without specifying the data amount up front */
|
|
|
|
stream->upload_left = -1; /* unknown, but not zero */
|
|
|
|
|
2014-02-14 08:02:44 -05:00
|
|
|
data_prd.read_callback = data_source_read_callback;
|
|
|
|
data_prd.source.ptr = NULL;
|
2015-09-13 10:07:05 -04:00
|
|
|
stream_id = nghttp2_submit_request(h2, &pri_spec, nva, nheader,
|
2021-01-08 11:58:15 -05:00
|
|
|
&data_prd, data);
|
2014-02-14 08:02:44 -05:00
|
|
|
break;
|
|
|
|
default:
|
2015-09-13 10:07:05 -04:00
|
|
|
stream_id = nghttp2_submit_request(h2, &pri_spec, nva, nheader,
|
2021-01-08 11:58:15 -05:00
|
|
|
NULL, data);
|
2014-02-14 08:02:44 -05:00
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2015-07-23 05:51:53 -04:00
|
|
|
Curl_safefree(nva);
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2014-05-07 11:20:05 -04:00
|
|
|
if(stream_id < 0) {
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data,
|
2020-07-03 16:10:27 -04:00
|
|
|
"http2_send() nghttp2_submit_request error (%s)%d\n",
|
|
|
|
nghttp2_strerror(stream_id), stream_id));
|
2014-01-31 10:51:24 -05:00
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "Using Stream ID: %x (easy handle %p)\n",
|
|
|
|
stream_id, (void *)data);
|
2015-04-27 07:54:47 -04:00
|
|
|
stream->stream_id = stream_id;
|
2014-05-07 11:20:05 -04:00
|
|
|
|
2021-02-15 02:35:32 -05:00
|
|
|
rv = h2_session_send(data, h2);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv) {
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data,
|
2020-07-03 16:10:27 -04:00
|
|
|
"http2_send() nghttp2_session_send error (%s)%d\n",
|
|
|
|
nghttp2_strerror(rv), rv));
|
|
|
|
|
2014-01-31 10:51:24 -05:00
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-02-23 09:33:04 -05:00
|
|
|
if(should_close_session(httpc)) {
|
2021-01-08 11:58:15 -05:00
|
|
|
H2BUGF(infof(data, "http2_send: nothing to do in this session\n"));
|
2016-02-22 07:20:38 -05:00
|
|
|
*err = CURLE_HTTP2;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-09-23 05:05:37 -04:00
|
|
|
/* If whole HEADERS frame was sent off to the underlying socket, the nghttp2
|
|
|
|
library calls data_source_read_callback. But only it found that no data
|
|
|
|
available, so it deferred the DATA transmission. Which means that
|
|
|
|
nghttp2_session_want_write() returns 0 on http2_perform_getsock(), which
|
|
|
|
results that no writable socket check is performed. To workaround this,
|
|
|
|
we issue nghttp2_session_resume_data() here to bring back DATA
|
|
|
|
transmission from deferred state. */
|
|
|
|
nghttp2_session_resume_data(h2, stream->stream_id);
|
2014-01-31 10:51:24 -05:00
|
|
|
|
|
|
|
return len;
|
2015-07-23 05:51:53 -04:00
|
|
|
|
2015-10-16 14:51:12 -04:00
|
|
|
fail:
|
2015-07-23 05:51:53 -04:00
|
|
|
free(nva);
|
|
|
|
*err = CURLE_SEND_ERROR;
|
|
|
|
return -1;
|
2013-09-18 16:43:13 -04:00
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
CURLcode Curl_http2_setup(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn)
|
2013-09-12 07:51:04 -04:00
|
|
|
{
|
2015-03-23 05:25:18 -04:00
|
|
|
CURLcode result;
|
2014-01-30 08:26:00 -05:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2015-04-27 07:54:47 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
DEBUGASSERT(data->state.buffer);
|
2020-05-28 12:30:47 -04:00
|
|
|
|
2015-04-27 07:54:47 -04:00
|
|
|
stream->stream_id = -1;
|
2015-04-27 06:52:07 -04:00
|
|
|
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_init(&stream->header_recvbuf, DYN_H2_HEADERS);
|
2020-08-03 06:19:09 -04:00
|
|
|
Curl_dyn_init(&stream->trailer_recvbuf, DYN_H2_TRAILERS);
|
2015-05-08 09:53:18 -04:00
|
|
|
|
2015-04-27 06:52:07 -04:00
|
|
|
if((conn->handler == &Curl_handler_http2_ssl) ||
|
|
|
|
(conn->handler == &Curl_handler_http2))
|
|
|
|
return CURLE_OK; /* already done */
|
|
|
|
|
2014-02-14 08:02:44 -05:00
|
|
|
if(conn->handler->flags & PROTOPT_SSL)
|
|
|
|
conn->handler = &Curl_handler_http2_ssl;
|
|
|
|
else
|
|
|
|
conn->handler = &Curl_handler_http2;
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
result = http2_init(data, conn);
|
2018-09-14 05:16:26 -04:00
|
|
|
if(result) {
|
2020-05-02 11:04:08 -04:00
|
|
|
Curl_dyn_free(&stream->header_recvbuf);
|
2015-03-23 05:25:18 -04:00
|
|
|
return result;
|
2018-09-14 05:16:26 -04:00
|
|
|
}
|
2015-03-23 05:25:18 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "Using HTTP2, server supports multi-use\n");
|
2015-05-18 08:01:38 -04:00
|
|
|
stream->upload_left = 0;
|
|
|
|
stream->upload_mem = NULL;
|
|
|
|
stream->upload_len = 0;
|
2021-01-08 11:58:15 -05:00
|
|
|
stream->mem = data->state.buffer;
|
|
|
|
stream->len = data->set.buffer_size;
|
2014-02-04 08:54:42 -05:00
|
|
|
|
2015-05-07 04:22:57 -04:00
|
|
|
httpc->inbuflen = 0;
|
|
|
|
httpc->nread_inbuf = 0;
|
|
|
|
|
2015-05-07 11:52:48 -04:00
|
|
|
httpc->pause_stream_id = 0;
|
2016-02-23 09:33:04 -05:00
|
|
|
httpc->drain_total = 0;
|
2015-05-07 11:52:48 -04:00
|
|
|
|
2015-04-30 09:25:06 -04:00
|
|
|
conn->bits.multiplex = TRUE; /* at least potentially multiplexed */
|
2014-02-05 03:21:16 -05:00
|
|
|
conn->httpversion = 20;
|
2015-05-18 02:56:29 -04:00
|
|
|
conn->bundle->multiuse = BUNDLE_MULTIPLEX;
|
2014-02-04 09:07:08 -05:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "Connection state changed (HTTP/2 confirmed)\n");
|
|
|
|
multi_connchanged(data->multi);
|
2015-05-11 05:41:10 -04:00
|
|
|
|
2015-03-23 05:25:18 -04:00
|
|
|
return CURLE_OK;
|
2014-05-20 10:50:24 -04:00
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
CURLcode Curl_http2_switched(struct Curl_easy *data,
|
2014-11-12 12:07:24 -05:00
|
|
|
const char *mem, size_t nread)
|
2014-05-20 10:50:24 -04:00
|
|
|
{
|
2014-12-14 08:09:29 -05:00
|
|
|
CURLcode result;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct connectdata *conn = data->conn;
|
2014-05-20 10:50:24 -04:00
|
|
|
struct http_conn *httpc = &conn->proto.httpc;
|
|
|
|
int rv;
|
2021-01-08 11:58:15 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2014-05-20 10:50:24 -04:00
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
result = Curl_http2_setup(data, conn);
|
2015-03-19 08:44:18 -04:00
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
|
2018-05-14 03:38:56 -04:00
|
|
|
httpc->recv_underlying = conn->recv[FIRSTSOCKET];
|
|
|
|
httpc->send_underlying = conn->send[FIRSTSOCKET];
|
2014-05-20 10:50:24 -04:00
|
|
|
conn->recv[FIRSTSOCKET] = http2_recv;
|
|
|
|
conn->send[FIRSTSOCKET] = http2_send;
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
if(data->req.upgr101 == UPGR101_RECEIVED) {
|
2014-02-02 07:31:13 -05:00
|
|
|
/* stream 1 is opened implicitly on upgrade */
|
2015-04-27 07:54:47 -04:00
|
|
|
stream->stream_id = 1;
|
2014-01-31 10:51:24 -05:00
|
|
|
/* queue SETTINGS frame (again) */
|
2021-05-10 18:50:27 -04:00
|
|
|
rv = nghttp2_session_upgrade2(httpc->h2, httpc->binsettings, httpc->binlen,
|
|
|
|
data->state.httpreq == HTTPREQ_HEAD, NULL);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv) {
|
2021-05-10 18:50:27 -04:00
|
|
|
failf(data, "nghttp2_session_upgrade2() failed: %s(%d)",
|
2014-01-31 10:51:24 -05:00
|
|
|
nghttp2_strerror(rv), rv);
|
2014-07-23 03:23:56 -04:00
|
|
|
return CURLE_HTTP2;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
2015-05-21 12:21:59 -04:00
|
|
|
|
2018-08-14 09:28:29 -04:00
|
|
|
rv = nghttp2_session_set_stream_user_data(httpc->h2,
|
|
|
|
stream->stream_id,
|
|
|
|
data);
|
|
|
|
if(rv) {
|
2018-08-25 15:15:47 -04:00
|
|
|
infof(data, "http/2: failed to set user_data for stream %d!\n",
|
2018-08-14 09:28:29 -04:00
|
|
|
stream->stream_id);
|
|
|
|
DEBUGASSERT(0);
|
|
|
|
}
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
else {
|
2021-02-15 02:35:32 -05:00
|
|
|
populate_settings(data, httpc);
|
2016-12-10 08:54:59 -05:00
|
|
|
|
2014-02-02 07:31:13 -05:00
|
|
|
/* stream ID is unknown at this point */
|
2015-04-27 07:54:47 -04:00
|
|
|
stream->stream_id = -1;
|
2016-12-10 08:54:59 -05:00
|
|
|
rv = nghttp2_submit_settings(httpc->h2, NGHTTP2_FLAG_NONE,
|
|
|
|
httpc->local_settings,
|
|
|
|
httpc->local_settings_num);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv) {
|
2014-07-23 03:23:56 -04:00
|
|
|
failf(data, "nghttp2_submit_settings() failed: %s(%d)",
|
2014-01-31 10:51:24 -05:00
|
|
|
nghttp2_strerror(rv), rv);
|
2014-07-23 03:23:56 -04:00
|
|
|
return CURLE_HTTP2;
|
2014-01-31 10:51:24 -05:00
|
|
|
}
|
|
|
|
}
|
2014-11-12 12:07:24 -05:00
|
|
|
|
2016-11-16 02:55:30 -05:00
|
|
|
rv = nghttp2_session_set_local_window_size(httpc->h2, NGHTTP2_FLAG_NONE, 0,
|
|
|
|
HTTP2_HUGE_WINDOW_SIZE);
|
2021-04-19 04:46:11 -04:00
|
|
|
if(rv) {
|
2016-11-16 02:55:30 -05:00
|
|
|
failf(data, "nghttp2_session_set_local_window_size() failed: %s(%d)",
|
|
|
|
nghttp2_strerror(rv), rv);
|
|
|
|
return CURLE_HTTP2;
|
|
|
|
}
|
|
|
|
|
2015-05-25 11:10:05 -04:00
|
|
|
/* we are going to copy mem to httpc->inbuf. This is required since
|
|
|
|
mem is part of buffer pointed by stream->mem, and callbacks
|
|
|
|
called by nghttp2_session_mem_recv() will write stream specific
|
|
|
|
data into stream->mem, overwriting data already there. */
|
|
|
|
if(H2_BUFSIZE < nread) {
|
|
|
|
failf(data, "connection buffer size is too small to store data following "
|
2021-01-08 11:58:15 -05:00
|
|
|
"HTTP Upgrade response header: buflen=%d, datalen=%zu",
|
2015-05-25 11:10:05 -04:00
|
|
|
H2_BUFSIZE, nread);
|
|
|
|
return CURLE_HTTP2;
|
|
|
|
}
|
|
|
|
|
2021-01-08 11:58:15 -05:00
|
|
|
infof(data, "Copying HTTP/2 data in stream buffer to connection buffer"
|
|
|
|
" after upgrade: len=%zu\n",
|
2015-05-25 11:10:05 -04:00
|
|
|
nread);
|
2014-11-12 12:07:24 -05:00
|
|
|
|
2016-11-16 02:16:10 -05:00
|
|
|
if(nread)
|
|
|
|
memcpy(httpc->inbuf, mem, nread);
|
2015-05-25 11:10:05 -04:00
|
|
|
|
2020-07-03 16:10:27 -04:00
|
|
|
httpc->inbuflen = nread;
|
2015-04-01 11:28:58 -04:00
|
|
|
|
2020-07-03 16:10:27 -04:00
|
|
|
DEBUGASSERT(httpc->nread_inbuf == 0);
|
2015-04-01 11:28:58 -04:00
|
|
|
|
2021-05-10 18:05:36 -04:00
|
|
|
/* Good enough to call it an end once the remaining payload is copied to the
|
|
|
|
* connection buffer.
|
|
|
|
* Some servers (e.g. nghttpx v1.43.0) may fulfill stream 1 immediately
|
|
|
|
* following the protocol switch other than waiting for the client-side
|
|
|
|
* connection preface. If h2_process_pending_input is invoked here to parse
|
|
|
|
* the remaining payload, stream 1 would be marked as closed too early and
|
|
|
|
* thus ignored in http2_recv (following 252790c53).
|
|
|
|
* The logic in lib/http.c and lib/transfer.c guarantees a following
|
|
|
|
* http2_recv would be invoked very soon. */
|
2016-02-22 07:20:38 -05:00
|
|
|
|
2014-07-23 03:23:56 -04:00
|
|
|
return CURLE_OK;
|
2013-09-12 07:51:04 -04:00
|
|
|
}
|
|
|
|
|
2020-02-27 03:42:11 -05:00
|
|
|
CURLcode Curl_http2_stream_pause(struct Curl_easy *data, bool pause)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(data);
|
|
|
|
DEBUGASSERT(data->conn);
|
|
|
|
/* if it isn't HTTP/2, we're done */
|
2021-05-17 03:05:39 -04:00
|
|
|
if(!(data->conn->handler->protocol & PROTO_FAMILY_HTTP) ||
|
|
|
|
!data->conn->proto.httpc.h2)
|
2020-02-27 03:42:11 -05:00
|
|
|
return CURLE_OK;
|
|
|
|
#ifdef NGHTTP2_HAS_SET_LOCAL_WINDOW_SIZE
|
|
|
|
else {
|
2020-11-23 02:32:41 -05:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
2020-02-27 03:42:11 -05:00
|
|
|
struct http_conn *httpc = &data->conn->proto.httpc;
|
|
|
|
uint32_t window = !pause * HTTP2_HUGE_WINDOW_SIZE;
|
|
|
|
int rv = nghttp2_session_set_local_window_size(httpc->h2,
|
|
|
|
NGHTTP2_FLAG_NONE,
|
|
|
|
stream->stream_id,
|
|
|
|
window);
|
|
|
|
if(rv) {
|
|
|
|
failf(data, "nghttp2_session_set_local_window_size() failed: %s(%d)",
|
|
|
|
nghttp2_strerror(rv), rv);
|
|
|
|
return CURLE_HTTP2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure the window update gets sent */
|
|
|
|
rv = h2_session_send(data, httpc->h2);
|
|
|
|
if(rv)
|
|
|
|
return CURLE_SEND_ERROR;
|
|
|
|
|
|
|
|
DEBUGF(infof(data, "Set HTTP/2 window size to %u for stream %u\n",
|
|
|
|
window, stream->stream_id));
|
|
|
|
|
|
|
|
#ifdef DEBUGBUILD
|
|
|
|
{
|
|
|
|
/* read out the stream local window again */
|
|
|
|
uint32_t window2 =
|
|
|
|
nghttp2_session_get_stream_local_window_size(httpc->h2,
|
|
|
|
stream->stream_id);
|
|
|
|
DEBUGF(infof(data, "HTTP/2 window size is now %u for stream %u\n",
|
|
|
|
window2, stream->stream_id));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2017-06-18 17:57:45 -04:00
|
|
|
CURLcode Curl_http2_add_child(struct Curl_easy *parent,
|
|
|
|
struct Curl_easy *child,
|
|
|
|
bool exclusive)
|
2016-11-14 18:32:00 -05:00
|
|
|
{
|
2017-06-05 05:57:47 -04:00
|
|
|
if(parent) {
|
|
|
|
struct Curl_http2_dep **tail;
|
|
|
|
struct Curl_http2_dep *dep = calloc(1, sizeof(struct Curl_http2_dep));
|
2017-06-18 17:57:45 -04:00
|
|
|
if(!dep)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
2017-06-05 05:57:47 -04:00
|
|
|
dep->data = child;
|
|
|
|
|
|
|
|
if(parent->set.stream_dependents && exclusive) {
|
|
|
|
struct Curl_http2_dep *node = parent->set.stream_dependents;
|
|
|
|
while(node) {
|
|
|
|
node->data->set.stream_depends_on = child;
|
|
|
|
node = node->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
tail = &child->set.stream_dependents;
|
|
|
|
while(*tail)
|
|
|
|
tail = &(*tail)->next;
|
|
|
|
|
|
|
|
DEBUGASSERT(!*tail);
|
|
|
|
*tail = parent->set.stream_dependents;
|
|
|
|
parent->set.stream_dependents = 0;
|
2016-11-14 18:32:00 -05:00
|
|
|
}
|
|
|
|
|
2017-06-05 05:57:47 -04:00
|
|
|
tail = &parent->set.stream_dependents;
|
|
|
|
while(*tail) {
|
|
|
|
(*tail)->data->set.stream_depends_e = FALSE;
|
2016-11-14 18:32:00 -05:00
|
|
|
tail = &(*tail)->next;
|
2017-06-05 05:57:47 -04:00
|
|
|
}
|
2016-11-14 18:32:00 -05:00
|
|
|
|
|
|
|
DEBUGASSERT(!*tail);
|
2017-06-05 05:57:47 -04:00
|
|
|
*tail = dep;
|
2016-11-14 18:32:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
child->set.stream_depends_on = parent;
|
|
|
|
child->set.stream_depends_e = exclusive;
|
2017-06-18 17:57:45 -04:00
|
|
|
return CURLE_OK;
|
2016-11-14 18:32:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
void Curl_http2_remove_child(struct Curl_easy *parent, struct Curl_easy *child)
|
|
|
|
{
|
|
|
|
struct Curl_http2_dep *last = 0;
|
|
|
|
struct Curl_http2_dep *data = parent->set.stream_dependents;
|
|
|
|
DEBUGASSERT(child->set.stream_depends_on == parent);
|
|
|
|
|
|
|
|
while(data && data->data != child) {
|
|
|
|
last = data;
|
|
|
|
data = data->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(data);
|
|
|
|
|
|
|
|
if(data) {
|
|
|
|
if(last) {
|
|
|
|
last->next = data->next;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
parent->set.stream_dependents = data->next;
|
|
|
|
}
|
|
|
|
free(data);
|
|
|
|
}
|
|
|
|
|
|
|
|
child->set.stream_depends_on = 0;
|
|
|
|
child->set.stream_depends_e = FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Curl_http2_cleanup_dependencies(struct Curl_easy *data)
|
|
|
|
{
|
|
|
|
while(data->set.stream_dependents) {
|
|
|
|
struct Curl_easy *tmp = data->set.stream_dependents->data;
|
|
|
|
Curl_http2_remove_child(data, tmp);
|
|
|
|
if(data->set.stream_depends_on)
|
|
|
|
Curl_http2_add_child(data->set.stream_depends_on, tmp, FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(data->set.stream_depends_on)
|
|
|
|
Curl_http2_remove_child(data->set.stream_depends_on, data);
|
|
|
|
}
|
|
|
|
|
2018-12-07 11:04:39 -05:00
|
|
|
/* Only call this function for a transfer that already got a HTTP/2
|
|
|
|
CURLE_HTTP2_STREAM error! */
|
2021-04-19 07:15:05 -04:00
|
|
|
bool Curl_h2_http_1_1_error(struct Curl_easy *data)
|
2018-12-07 11:04:39 -05:00
|
|
|
{
|
2021-04-19 07:15:05 -04:00
|
|
|
struct HTTP *stream = data->req.p.http;
|
|
|
|
return (stream->error == NGHTTP2_HTTP_1_1_REQUIRED);
|
2018-12-07 11:04:39 -05:00
|
|
|
}
|
|
|
|
|
2015-07-21 07:55:39 -04:00
|
|
|
#else /* !USE_NGHTTP2 */
|
|
|
|
|
|
|
|
/* Satisfy external references even if http2 is not compiled in. */
|
|
|
|
#include <curl/curl.h>
|
|
|
|
|
|
|
|
char *curl_pushheader_bynum(struct curl_pushheaders *h, size_t num)
|
|
|
|
{
|
|
|
|
(void) h;
|
|
|
|
(void) num;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
char *curl_pushheader_byname(struct curl_pushheaders *h, const char *header)
|
|
|
|
{
|
|
|
|
(void) h;
|
|
|
|
(void) header;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* USE_NGHTTP2 */
|