github.com/guyezi/gofrontend@v0.0.0-20200228202240-7a62a49e62c0/libgo/go/net/http/h2_bundle.go (about)

     1  // +build !nethttpomithttp2
     2  
     3  // Code generated by golang.org/x/tools/cmd/bundle. DO NOT EDIT.
     4  //   $ bundle -o=h2_bundle.go -prefix=http2 -tags=!nethttpomithttp2 golang.org/x/net/http2
     5  
     6  // Package http2 implements the HTTP/2 protocol.
     7  //
     8  // This package is low-level and intended to be used directly by very
     9  // few people. Most users will use it indirectly through the automatic
    10  // use by the net/http package (from Go 1.6 and later).
    11  // For use in earlier Go versions see ConfigureServer. (Transport support
    12  // requires Go 1.6 or later)
    13  //
    14  // See https://http2.github.io/ for more information on HTTP/2.
    15  //
    16  // See https://http2.golang.org/ for a test server running this code.
    17  //
    18  
    19  package http
    20  
    21  import (
    22  	"bufio"
    23  	"bytes"
    24  	"compress/gzip"
    25  	"context"
    26  	"crypto/rand"
    27  	"crypto/tls"
    28  	"encoding/binary"
    29  	"errors"
    30  	"fmt"
    31  	"io"
    32  	"io/ioutil"
    33  	"log"
    34  	"math"
    35  	mathrand "math/rand"
    36  	"net"
    37  	"net/http/httptrace"
    38  	"net/textproto"
    39  	"net/url"
    40  	"os"
    41  	"reflect"
    42  	"runtime"
    43  	"sort"
    44  	"strconv"
    45  	"strings"
    46  	"sync"
    47  	"sync/atomic"
    48  	"time"
    49  
    50  	"golang.org/x/net/http/httpguts"
    51  	"golang.org/x/net/http2/hpack"
    52  	"golang.org/x/net/idna"
    53  )
    54  
    55  // A list of the possible cipher suite ids. Taken from
    56  // https://www.iana.org/assignments/tls-parameters/tls-parameters.txt
    57  
    58  const (
    59  	http2cipher_TLS_NULL_WITH_NULL_NULL               uint16 = 0x0000
    60  	http2cipher_TLS_RSA_WITH_NULL_MD5                 uint16 = 0x0001
    61  	http2cipher_TLS_RSA_WITH_NULL_SHA                 uint16 = 0x0002
    62  	http2cipher_TLS_RSA_EXPORT_WITH_RC4_40_MD5        uint16 = 0x0003
    63  	http2cipher_TLS_RSA_WITH_RC4_128_MD5              uint16 = 0x0004
    64  	http2cipher_TLS_RSA_WITH_RC4_128_SHA              uint16 = 0x0005
    65  	http2cipher_TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5    uint16 = 0x0006
    66  	http2cipher_TLS_RSA_WITH_IDEA_CBC_SHA             uint16 = 0x0007
    67  	http2cipher_TLS_RSA_EXPORT_WITH_DES40_CBC_SHA     uint16 = 0x0008
    68  	http2cipher_TLS_RSA_WITH_DES_CBC_SHA              uint16 = 0x0009
    69  	http2cipher_TLS_RSA_WITH_3DES_EDE_CBC_SHA         uint16 = 0x000A
    70  	http2cipher_TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA  uint16 = 0x000B
    71  	http2cipher_TLS_DH_DSS_WITH_DES_CBC_SHA           uint16 = 0x000C
    72  	http2cipher_TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA      uint16 = 0x000D
    73  	http2cipher_TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA  uint16 = 0x000E
    74  	http2cipher_TLS_DH_RSA_WITH_DES_CBC_SHA           uint16 = 0x000F
    75  	http2cipher_TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA      uint16 = 0x0010
    76  	http2cipher_TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA uint16 = 0x0011
    77  	http2cipher_TLS_DHE_DSS_WITH_DES_CBC_SHA          uint16 = 0x0012
    78  	http2cipher_TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA     uint16 = 0x0013
    79  	http2cipher_TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA uint16 = 0x0014
    80  	http2cipher_TLS_DHE_RSA_WITH_DES_CBC_SHA          uint16 = 0x0015
    81  	http2cipher_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA     uint16 = 0x0016
    82  	http2cipher_TLS_DH_anon_EXPORT_WITH_RC4_40_MD5    uint16 = 0x0017
    83  	http2cipher_TLS_DH_anon_WITH_RC4_128_MD5          uint16 = 0x0018
    84  	http2cipher_TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA uint16 = 0x0019
    85  	http2cipher_TLS_DH_anon_WITH_DES_CBC_SHA          uint16 = 0x001A
    86  	http2cipher_TLS_DH_anon_WITH_3DES_EDE_CBC_SHA     uint16 = 0x001B
    87  	// Reserved uint16 =  0x001C-1D
    88  	http2cipher_TLS_KRB5_WITH_DES_CBC_SHA             uint16 = 0x001E
    89  	http2cipher_TLS_KRB5_WITH_3DES_EDE_CBC_SHA        uint16 = 0x001F
    90  	http2cipher_TLS_KRB5_WITH_RC4_128_SHA             uint16 = 0x0020
    91  	http2cipher_TLS_KRB5_WITH_IDEA_CBC_SHA            uint16 = 0x0021
    92  	http2cipher_TLS_KRB5_WITH_DES_CBC_MD5             uint16 = 0x0022
    93  	http2cipher_TLS_KRB5_WITH_3DES_EDE_CBC_MD5        uint16 = 0x0023
    94  	http2cipher_TLS_KRB5_WITH_RC4_128_MD5             uint16 = 0x0024
    95  	http2cipher_TLS_KRB5_WITH_IDEA_CBC_MD5            uint16 = 0x0025
    96  	http2cipher_TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA   uint16 = 0x0026
    97  	http2cipher_TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA   uint16 = 0x0027
    98  	http2cipher_TLS_KRB5_EXPORT_WITH_RC4_40_SHA       uint16 = 0x0028
    99  	http2cipher_TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5   uint16 = 0x0029
   100  	http2cipher_TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5   uint16 = 0x002A
   101  	http2cipher_TLS_KRB5_EXPORT_WITH_RC4_40_MD5       uint16 = 0x002B
   102  	http2cipher_TLS_PSK_WITH_NULL_SHA                 uint16 = 0x002C
   103  	http2cipher_TLS_DHE_PSK_WITH_NULL_SHA             uint16 = 0x002D
   104  	http2cipher_TLS_RSA_PSK_WITH_NULL_SHA             uint16 = 0x002E
   105  	http2cipher_TLS_RSA_WITH_AES_128_CBC_SHA          uint16 = 0x002F
   106  	http2cipher_TLS_DH_DSS_WITH_AES_128_CBC_SHA       uint16 = 0x0030
   107  	http2cipher_TLS_DH_RSA_WITH_AES_128_CBC_SHA       uint16 = 0x0031
   108  	http2cipher_TLS_DHE_DSS_WITH_AES_128_CBC_SHA      uint16 = 0x0032
   109  	http2cipher_TLS_DHE_RSA_WITH_AES_128_CBC_SHA      uint16 = 0x0033
   110  	http2cipher_TLS_DH_anon_WITH_AES_128_CBC_SHA      uint16 = 0x0034
   111  	http2cipher_TLS_RSA_WITH_AES_256_CBC_SHA          uint16 = 0x0035
   112  	http2cipher_TLS_DH_DSS_WITH_AES_256_CBC_SHA       uint16 = 0x0036
   113  	http2cipher_TLS_DH_RSA_WITH_AES_256_CBC_SHA       uint16 = 0x0037
   114  	http2cipher_TLS_DHE_DSS_WITH_AES_256_CBC_SHA      uint16 = 0x0038
   115  	http2cipher_TLS_DHE_RSA_WITH_AES_256_CBC_SHA      uint16 = 0x0039
   116  	http2cipher_TLS_DH_anon_WITH_AES_256_CBC_SHA      uint16 = 0x003A
   117  	http2cipher_TLS_RSA_WITH_NULL_SHA256              uint16 = 0x003B
   118  	http2cipher_TLS_RSA_WITH_AES_128_CBC_SHA256       uint16 = 0x003C
   119  	http2cipher_TLS_RSA_WITH_AES_256_CBC_SHA256       uint16 = 0x003D
   120  	http2cipher_TLS_DH_DSS_WITH_AES_128_CBC_SHA256    uint16 = 0x003E
   121  	http2cipher_TLS_DH_RSA_WITH_AES_128_CBC_SHA256    uint16 = 0x003F
   122  	http2cipher_TLS_DHE_DSS_WITH_AES_128_CBC_SHA256   uint16 = 0x0040
   123  	http2cipher_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA     uint16 = 0x0041
   124  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA  uint16 = 0x0042
   125  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA  uint16 = 0x0043
   126  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA uint16 = 0x0044
   127  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA uint16 = 0x0045
   128  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA uint16 = 0x0046
   129  	// Reserved uint16 =  0x0047-4F
   130  	// Reserved uint16 =  0x0050-58
   131  	// Reserved uint16 =  0x0059-5C
   132  	// Unassigned uint16 =  0x005D-5F
   133  	// Reserved uint16 =  0x0060-66
   134  	http2cipher_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 uint16 = 0x0067
   135  	http2cipher_TLS_DH_DSS_WITH_AES_256_CBC_SHA256  uint16 = 0x0068
   136  	http2cipher_TLS_DH_RSA_WITH_AES_256_CBC_SHA256  uint16 = 0x0069
   137  	http2cipher_TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 uint16 = 0x006A
   138  	http2cipher_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 uint16 = 0x006B
   139  	http2cipher_TLS_DH_anon_WITH_AES_128_CBC_SHA256 uint16 = 0x006C
   140  	http2cipher_TLS_DH_anon_WITH_AES_256_CBC_SHA256 uint16 = 0x006D
   141  	// Unassigned uint16 =  0x006E-83
   142  	http2cipher_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA        uint16 = 0x0084
   143  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA     uint16 = 0x0085
   144  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA     uint16 = 0x0086
   145  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA    uint16 = 0x0087
   146  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA    uint16 = 0x0088
   147  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA    uint16 = 0x0089
   148  	http2cipher_TLS_PSK_WITH_RC4_128_SHA                 uint16 = 0x008A
   149  	http2cipher_TLS_PSK_WITH_3DES_EDE_CBC_SHA            uint16 = 0x008B
   150  	http2cipher_TLS_PSK_WITH_AES_128_CBC_SHA             uint16 = 0x008C
   151  	http2cipher_TLS_PSK_WITH_AES_256_CBC_SHA             uint16 = 0x008D
   152  	http2cipher_TLS_DHE_PSK_WITH_RC4_128_SHA             uint16 = 0x008E
   153  	http2cipher_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA        uint16 = 0x008F
   154  	http2cipher_TLS_DHE_PSK_WITH_AES_128_CBC_SHA         uint16 = 0x0090
   155  	http2cipher_TLS_DHE_PSK_WITH_AES_256_CBC_SHA         uint16 = 0x0091
   156  	http2cipher_TLS_RSA_PSK_WITH_RC4_128_SHA             uint16 = 0x0092
   157  	http2cipher_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA        uint16 = 0x0093
   158  	http2cipher_TLS_RSA_PSK_WITH_AES_128_CBC_SHA         uint16 = 0x0094
   159  	http2cipher_TLS_RSA_PSK_WITH_AES_256_CBC_SHA         uint16 = 0x0095
   160  	http2cipher_TLS_RSA_WITH_SEED_CBC_SHA                uint16 = 0x0096
   161  	http2cipher_TLS_DH_DSS_WITH_SEED_CBC_SHA             uint16 = 0x0097
   162  	http2cipher_TLS_DH_RSA_WITH_SEED_CBC_SHA             uint16 = 0x0098
   163  	http2cipher_TLS_DHE_DSS_WITH_SEED_CBC_SHA            uint16 = 0x0099
   164  	http2cipher_TLS_DHE_RSA_WITH_SEED_CBC_SHA            uint16 = 0x009A
   165  	http2cipher_TLS_DH_anon_WITH_SEED_CBC_SHA            uint16 = 0x009B
   166  	http2cipher_TLS_RSA_WITH_AES_128_GCM_SHA256          uint16 = 0x009C
   167  	http2cipher_TLS_RSA_WITH_AES_256_GCM_SHA384          uint16 = 0x009D
   168  	http2cipher_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256      uint16 = 0x009E
   169  	http2cipher_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384      uint16 = 0x009F
   170  	http2cipher_TLS_DH_RSA_WITH_AES_128_GCM_SHA256       uint16 = 0x00A0
   171  	http2cipher_TLS_DH_RSA_WITH_AES_256_GCM_SHA384       uint16 = 0x00A1
   172  	http2cipher_TLS_DHE_DSS_WITH_AES_128_GCM_SHA256      uint16 = 0x00A2
   173  	http2cipher_TLS_DHE_DSS_WITH_AES_256_GCM_SHA384      uint16 = 0x00A3
   174  	http2cipher_TLS_DH_DSS_WITH_AES_128_GCM_SHA256       uint16 = 0x00A4
   175  	http2cipher_TLS_DH_DSS_WITH_AES_256_GCM_SHA384       uint16 = 0x00A5
   176  	http2cipher_TLS_DH_anon_WITH_AES_128_GCM_SHA256      uint16 = 0x00A6
   177  	http2cipher_TLS_DH_anon_WITH_AES_256_GCM_SHA384      uint16 = 0x00A7
   178  	http2cipher_TLS_PSK_WITH_AES_128_GCM_SHA256          uint16 = 0x00A8
   179  	http2cipher_TLS_PSK_WITH_AES_256_GCM_SHA384          uint16 = 0x00A9
   180  	http2cipher_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256      uint16 = 0x00AA
   181  	http2cipher_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384      uint16 = 0x00AB
   182  	http2cipher_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256      uint16 = 0x00AC
   183  	http2cipher_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384      uint16 = 0x00AD
   184  	http2cipher_TLS_PSK_WITH_AES_128_CBC_SHA256          uint16 = 0x00AE
   185  	http2cipher_TLS_PSK_WITH_AES_256_CBC_SHA384          uint16 = 0x00AF
   186  	http2cipher_TLS_PSK_WITH_NULL_SHA256                 uint16 = 0x00B0
   187  	http2cipher_TLS_PSK_WITH_NULL_SHA384                 uint16 = 0x00B1
   188  	http2cipher_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256      uint16 = 0x00B2
   189  	http2cipher_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384      uint16 = 0x00B3
   190  	http2cipher_TLS_DHE_PSK_WITH_NULL_SHA256             uint16 = 0x00B4
   191  	http2cipher_TLS_DHE_PSK_WITH_NULL_SHA384             uint16 = 0x00B5
   192  	http2cipher_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256      uint16 = 0x00B6
   193  	http2cipher_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384      uint16 = 0x00B7
   194  	http2cipher_TLS_RSA_PSK_WITH_NULL_SHA256             uint16 = 0x00B8
   195  	http2cipher_TLS_RSA_PSK_WITH_NULL_SHA384             uint16 = 0x00B9
   196  	http2cipher_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256     uint16 = 0x00BA
   197  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256  uint16 = 0x00BB
   198  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256  uint16 = 0x00BC
   199  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256 uint16 = 0x00BD
   200  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 uint16 = 0x00BE
   201  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256 uint16 = 0x00BF
   202  	http2cipher_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256     uint16 = 0x00C0
   203  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256  uint16 = 0x00C1
   204  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256  uint16 = 0x00C2
   205  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256 uint16 = 0x00C3
   206  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 uint16 = 0x00C4
   207  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 uint16 = 0x00C5
   208  	// Unassigned uint16 =  0x00C6-FE
   209  	http2cipher_TLS_EMPTY_RENEGOTIATION_INFO_SCSV uint16 = 0x00FF
   210  	// Unassigned uint16 =  0x01-55,*
   211  	http2cipher_TLS_FALLBACK_SCSV uint16 = 0x5600
   212  	// Unassigned                                   uint16 = 0x5601 - 0xC000
   213  	http2cipher_TLS_ECDH_ECDSA_WITH_NULL_SHA                 uint16 = 0xC001
   214  	http2cipher_TLS_ECDH_ECDSA_WITH_RC4_128_SHA              uint16 = 0xC002
   215  	http2cipher_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA         uint16 = 0xC003
   216  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA          uint16 = 0xC004
   217  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA          uint16 = 0xC005
   218  	http2cipher_TLS_ECDHE_ECDSA_WITH_NULL_SHA                uint16 = 0xC006
   219  	http2cipher_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA             uint16 = 0xC007
   220  	http2cipher_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA        uint16 = 0xC008
   221  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA         uint16 = 0xC009
   222  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA         uint16 = 0xC00A
   223  	http2cipher_TLS_ECDH_RSA_WITH_NULL_SHA                   uint16 = 0xC00B
   224  	http2cipher_TLS_ECDH_RSA_WITH_RC4_128_SHA                uint16 = 0xC00C
   225  	http2cipher_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA           uint16 = 0xC00D
   226  	http2cipher_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA            uint16 = 0xC00E
   227  	http2cipher_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA            uint16 = 0xC00F
   228  	http2cipher_TLS_ECDHE_RSA_WITH_NULL_SHA                  uint16 = 0xC010
   229  	http2cipher_TLS_ECDHE_RSA_WITH_RC4_128_SHA               uint16 = 0xC011
   230  	http2cipher_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA          uint16 = 0xC012
   231  	http2cipher_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA           uint16 = 0xC013
   232  	http2cipher_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA           uint16 = 0xC014
   233  	http2cipher_TLS_ECDH_anon_WITH_NULL_SHA                  uint16 = 0xC015
   234  	http2cipher_TLS_ECDH_anon_WITH_RC4_128_SHA               uint16 = 0xC016
   235  	http2cipher_TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA          uint16 = 0xC017
   236  	http2cipher_TLS_ECDH_anon_WITH_AES_128_CBC_SHA           uint16 = 0xC018
   237  	http2cipher_TLS_ECDH_anon_WITH_AES_256_CBC_SHA           uint16 = 0xC019
   238  	http2cipher_TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA            uint16 = 0xC01A
   239  	http2cipher_TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA        uint16 = 0xC01B
   240  	http2cipher_TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA        uint16 = 0xC01C
   241  	http2cipher_TLS_SRP_SHA_WITH_AES_128_CBC_SHA             uint16 = 0xC01D
   242  	http2cipher_TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA         uint16 = 0xC01E
   243  	http2cipher_TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA         uint16 = 0xC01F
   244  	http2cipher_TLS_SRP_SHA_WITH_AES_256_CBC_SHA             uint16 = 0xC020
   245  	http2cipher_TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA         uint16 = 0xC021
   246  	http2cipher_TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA         uint16 = 0xC022
   247  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256      uint16 = 0xC023
   248  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384      uint16 = 0xC024
   249  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256       uint16 = 0xC025
   250  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384       uint16 = 0xC026
   251  	http2cipher_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256        uint16 = 0xC027
   252  	http2cipher_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384        uint16 = 0xC028
   253  	http2cipher_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256         uint16 = 0xC029
   254  	http2cipher_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384         uint16 = 0xC02A
   255  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256      uint16 = 0xC02B
   256  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384      uint16 = 0xC02C
   257  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256       uint16 = 0xC02D
   258  	http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384       uint16 = 0xC02E
   259  	http2cipher_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256        uint16 = 0xC02F
   260  	http2cipher_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384        uint16 = 0xC030
   261  	http2cipher_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256         uint16 = 0xC031
   262  	http2cipher_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384         uint16 = 0xC032
   263  	http2cipher_TLS_ECDHE_PSK_WITH_RC4_128_SHA               uint16 = 0xC033
   264  	http2cipher_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA          uint16 = 0xC034
   265  	http2cipher_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA           uint16 = 0xC035
   266  	http2cipher_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA           uint16 = 0xC036
   267  	http2cipher_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256        uint16 = 0xC037
   268  	http2cipher_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384        uint16 = 0xC038
   269  	http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA                  uint16 = 0xC039
   270  	http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA256               uint16 = 0xC03A
   271  	http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA384               uint16 = 0xC03B
   272  	http2cipher_TLS_RSA_WITH_ARIA_128_CBC_SHA256             uint16 = 0xC03C
   273  	http2cipher_TLS_RSA_WITH_ARIA_256_CBC_SHA384             uint16 = 0xC03D
   274  	http2cipher_TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256          uint16 = 0xC03E
   275  	http2cipher_TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384          uint16 = 0xC03F
   276  	http2cipher_TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256          uint16 = 0xC040
   277  	http2cipher_TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384          uint16 = 0xC041
   278  	http2cipher_TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256         uint16 = 0xC042
   279  	http2cipher_TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384         uint16 = 0xC043
   280  	http2cipher_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256         uint16 = 0xC044
   281  	http2cipher_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384         uint16 = 0xC045
   282  	http2cipher_TLS_DH_anon_WITH_ARIA_128_CBC_SHA256         uint16 = 0xC046
   283  	http2cipher_TLS_DH_anon_WITH_ARIA_256_CBC_SHA384         uint16 = 0xC047
   284  	http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256     uint16 = 0xC048
   285  	http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384     uint16 = 0xC049
   286  	http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256      uint16 = 0xC04A
   287  	http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384      uint16 = 0xC04B
   288  	http2cipher_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256       uint16 = 0xC04C
   289  	http2cipher_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384       uint16 = 0xC04D
   290  	http2cipher_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256        uint16 = 0xC04E
   291  	http2cipher_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384        uint16 = 0xC04F
   292  	http2cipher_TLS_RSA_WITH_ARIA_128_GCM_SHA256             uint16 = 0xC050
   293  	http2cipher_TLS_RSA_WITH_ARIA_256_GCM_SHA384             uint16 = 0xC051
   294  	http2cipher_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256         uint16 = 0xC052
   295  	http2cipher_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384         uint16 = 0xC053
   296  	http2cipher_TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256          uint16 = 0xC054
   297  	http2cipher_TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384          uint16 = 0xC055
   298  	http2cipher_TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256         uint16 = 0xC056
   299  	http2cipher_TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384         uint16 = 0xC057
   300  	http2cipher_TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256          uint16 = 0xC058
   301  	http2cipher_TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384          uint16 = 0xC059
   302  	http2cipher_TLS_DH_anon_WITH_ARIA_128_GCM_SHA256         uint16 = 0xC05A
   303  	http2cipher_TLS_DH_anon_WITH_ARIA_256_GCM_SHA384         uint16 = 0xC05B
   304  	http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256     uint16 = 0xC05C
   305  	http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384     uint16 = 0xC05D
   306  	http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256      uint16 = 0xC05E
   307  	http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384      uint16 = 0xC05F
   308  	http2cipher_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256       uint16 = 0xC060
   309  	http2cipher_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384       uint16 = 0xC061
   310  	http2cipher_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256        uint16 = 0xC062
   311  	http2cipher_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384        uint16 = 0xC063
   312  	http2cipher_TLS_PSK_WITH_ARIA_128_CBC_SHA256             uint16 = 0xC064
   313  	http2cipher_TLS_PSK_WITH_ARIA_256_CBC_SHA384             uint16 = 0xC065
   314  	http2cipher_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256         uint16 = 0xC066
   315  	http2cipher_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384         uint16 = 0xC067
   316  	http2cipher_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256         uint16 = 0xC068
   317  	http2cipher_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384         uint16 = 0xC069
   318  	http2cipher_TLS_PSK_WITH_ARIA_128_GCM_SHA256             uint16 = 0xC06A
   319  	http2cipher_TLS_PSK_WITH_ARIA_256_GCM_SHA384             uint16 = 0xC06B
   320  	http2cipher_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256         uint16 = 0xC06C
   321  	http2cipher_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384         uint16 = 0xC06D
   322  	http2cipher_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256         uint16 = 0xC06E
   323  	http2cipher_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384         uint16 = 0xC06F
   324  	http2cipher_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256       uint16 = 0xC070
   325  	http2cipher_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384       uint16 = 0xC071
   326  	http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 uint16 = 0xC072
   327  	http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 uint16 = 0xC073
   328  	http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256  uint16 = 0xC074
   329  	http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384  uint16 = 0xC075
   330  	http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256   uint16 = 0xC076
   331  	http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384   uint16 = 0xC077
   332  	http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256    uint16 = 0xC078
   333  	http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384    uint16 = 0xC079
   334  	http2cipher_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256         uint16 = 0xC07A
   335  	http2cipher_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384         uint16 = 0xC07B
   336  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256     uint16 = 0xC07C
   337  	http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384     uint16 = 0xC07D
   338  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256      uint16 = 0xC07E
   339  	http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384      uint16 = 0xC07F
   340  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256     uint16 = 0xC080
   341  	http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384     uint16 = 0xC081
   342  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256      uint16 = 0xC082
   343  	http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384      uint16 = 0xC083
   344  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256     uint16 = 0xC084
   345  	http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384     uint16 = 0xC085
   346  	http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 uint16 = 0xC086
   347  	http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 uint16 = 0xC087
   348  	http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256  uint16 = 0xC088
   349  	http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384  uint16 = 0xC089
   350  	http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256   uint16 = 0xC08A
   351  	http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384   uint16 = 0xC08B
   352  	http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256    uint16 = 0xC08C
   353  	http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384    uint16 = 0xC08D
   354  	http2cipher_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256         uint16 = 0xC08E
   355  	http2cipher_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384         uint16 = 0xC08F
   356  	http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256     uint16 = 0xC090
   357  	http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384     uint16 = 0xC091
   358  	http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256     uint16 = 0xC092
   359  	http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384     uint16 = 0xC093
   360  	http2cipher_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256         uint16 = 0xC094
   361  	http2cipher_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384         uint16 = 0xC095
   362  	http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256     uint16 = 0xC096
   363  	http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384     uint16 = 0xC097
   364  	http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256     uint16 = 0xC098
   365  	http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384     uint16 = 0xC099
   366  	http2cipher_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256   uint16 = 0xC09A
   367  	http2cipher_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384   uint16 = 0xC09B
   368  	http2cipher_TLS_RSA_WITH_AES_128_CCM                     uint16 = 0xC09C
   369  	http2cipher_TLS_RSA_WITH_AES_256_CCM                     uint16 = 0xC09D
   370  	http2cipher_TLS_DHE_RSA_WITH_AES_128_CCM                 uint16 = 0xC09E
   371  	http2cipher_TLS_DHE_RSA_WITH_AES_256_CCM                 uint16 = 0xC09F
   372  	http2cipher_TLS_RSA_WITH_AES_128_CCM_8                   uint16 = 0xC0A0
   373  	http2cipher_TLS_RSA_WITH_AES_256_CCM_8                   uint16 = 0xC0A1
   374  	http2cipher_TLS_DHE_RSA_WITH_AES_128_CCM_8               uint16 = 0xC0A2
   375  	http2cipher_TLS_DHE_RSA_WITH_AES_256_CCM_8               uint16 = 0xC0A3
   376  	http2cipher_TLS_PSK_WITH_AES_128_CCM                     uint16 = 0xC0A4
   377  	http2cipher_TLS_PSK_WITH_AES_256_CCM                     uint16 = 0xC0A5
   378  	http2cipher_TLS_DHE_PSK_WITH_AES_128_CCM                 uint16 = 0xC0A6
   379  	http2cipher_TLS_DHE_PSK_WITH_AES_256_CCM                 uint16 = 0xC0A7
   380  	http2cipher_TLS_PSK_WITH_AES_128_CCM_8                   uint16 = 0xC0A8
   381  	http2cipher_TLS_PSK_WITH_AES_256_CCM_8                   uint16 = 0xC0A9
   382  	http2cipher_TLS_PSK_DHE_WITH_AES_128_CCM_8               uint16 = 0xC0AA
   383  	http2cipher_TLS_PSK_DHE_WITH_AES_256_CCM_8               uint16 = 0xC0AB
   384  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CCM             uint16 = 0xC0AC
   385  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CCM             uint16 = 0xC0AD
   386  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8           uint16 = 0xC0AE
   387  	http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8           uint16 = 0xC0AF
   388  	// Unassigned uint16 =  0xC0B0-FF
   389  	// Unassigned uint16 =  0xC1-CB,*
   390  	// Unassigned uint16 =  0xCC00-A7
   391  	http2cipher_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   uint16 = 0xCCA8
   392  	http2cipher_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 uint16 = 0xCCA9
   393  	http2cipher_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     uint16 = 0xCCAA
   394  	http2cipher_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256         uint16 = 0xCCAB
   395  	http2cipher_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   uint16 = 0xCCAC
   396  	http2cipher_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     uint16 = 0xCCAD
   397  	http2cipher_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256     uint16 = 0xCCAE
   398  )
   399  
   400  // isBadCipher reports whether the cipher is blacklisted by the HTTP/2 spec.
   401  // References:
   402  // https://tools.ietf.org/html/rfc7540#appendix-A
   403  // Reject cipher suites from Appendix A.
   404  // "This list includes those cipher suites that do not
   405  // offer an ephemeral key exchange and those that are
   406  // based on the TLS null, stream or block cipher type"
   407  func http2isBadCipher(cipher uint16) bool {
   408  	switch cipher {
   409  	case http2cipher_TLS_NULL_WITH_NULL_NULL,
   410  		http2cipher_TLS_RSA_WITH_NULL_MD5,
   411  		http2cipher_TLS_RSA_WITH_NULL_SHA,
   412  		http2cipher_TLS_RSA_EXPORT_WITH_RC4_40_MD5,
   413  		http2cipher_TLS_RSA_WITH_RC4_128_MD5,
   414  		http2cipher_TLS_RSA_WITH_RC4_128_SHA,
   415  		http2cipher_TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
   416  		http2cipher_TLS_RSA_WITH_IDEA_CBC_SHA,
   417  		http2cipher_TLS_RSA_EXPORT_WITH_DES40_CBC_SHA,
   418  		http2cipher_TLS_RSA_WITH_DES_CBC_SHA,
   419  		http2cipher_TLS_RSA_WITH_3DES_EDE_CBC_SHA,
   420  		http2cipher_TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA,
   421  		http2cipher_TLS_DH_DSS_WITH_DES_CBC_SHA,
   422  		http2cipher_TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA,
   423  		http2cipher_TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA,
   424  		http2cipher_TLS_DH_RSA_WITH_DES_CBC_SHA,
   425  		http2cipher_TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA,
   426  		http2cipher_TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA,
   427  		http2cipher_TLS_DHE_DSS_WITH_DES_CBC_SHA,
   428  		http2cipher_TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
   429  		http2cipher_TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
   430  		http2cipher_TLS_DHE_RSA_WITH_DES_CBC_SHA,
   431  		http2cipher_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
   432  		http2cipher_TLS_DH_anon_EXPORT_WITH_RC4_40_MD5,
   433  		http2cipher_TLS_DH_anon_WITH_RC4_128_MD5,
   434  		http2cipher_TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA,
   435  		http2cipher_TLS_DH_anon_WITH_DES_CBC_SHA,
   436  		http2cipher_TLS_DH_anon_WITH_3DES_EDE_CBC_SHA,
   437  		http2cipher_TLS_KRB5_WITH_DES_CBC_SHA,
   438  		http2cipher_TLS_KRB5_WITH_3DES_EDE_CBC_SHA,
   439  		http2cipher_TLS_KRB5_WITH_RC4_128_SHA,
   440  		http2cipher_TLS_KRB5_WITH_IDEA_CBC_SHA,
   441  		http2cipher_TLS_KRB5_WITH_DES_CBC_MD5,
   442  		http2cipher_TLS_KRB5_WITH_3DES_EDE_CBC_MD5,
   443  		http2cipher_TLS_KRB5_WITH_RC4_128_MD5,
   444  		http2cipher_TLS_KRB5_WITH_IDEA_CBC_MD5,
   445  		http2cipher_TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA,
   446  		http2cipher_TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA,
   447  		http2cipher_TLS_KRB5_EXPORT_WITH_RC4_40_SHA,
   448  		http2cipher_TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5,
   449  		http2cipher_TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5,
   450  		http2cipher_TLS_KRB5_EXPORT_WITH_RC4_40_MD5,
   451  		http2cipher_TLS_PSK_WITH_NULL_SHA,
   452  		http2cipher_TLS_DHE_PSK_WITH_NULL_SHA,
   453  		http2cipher_TLS_RSA_PSK_WITH_NULL_SHA,
   454  		http2cipher_TLS_RSA_WITH_AES_128_CBC_SHA,
   455  		http2cipher_TLS_DH_DSS_WITH_AES_128_CBC_SHA,
   456  		http2cipher_TLS_DH_RSA_WITH_AES_128_CBC_SHA,
   457  		http2cipher_TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
   458  		http2cipher_TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
   459  		http2cipher_TLS_DH_anon_WITH_AES_128_CBC_SHA,
   460  		http2cipher_TLS_RSA_WITH_AES_256_CBC_SHA,
   461  		http2cipher_TLS_DH_DSS_WITH_AES_256_CBC_SHA,
   462  		http2cipher_TLS_DH_RSA_WITH_AES_256_CBC_SHA,
   463  		http2cipher_TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
   464  		http2cipher_TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
   465  		http2cipher_TLS_DH_anon_WITH_AES_256_CBC_SHA,
   466  		http2cipher_TLS_RSA_WITH_NULL_SHA256,
   467  		http2cipher_TLS_RSA_WITH_AES_128_CBC_SHA256,
   468  		http2cipher_TLS_RSA_WITH_AES_256_CBC_SHA256,
   469  		http2cipher_TLS_DH_DSS_WITH_AES_128_CBC_SHA256,
   470  		http2cipher_TLS_DH_RSA_WITH_AES_128_CBC_SHA256,
   471  		http2cipher_TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,
   472  		http2cipher_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA,
   473  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA,
   474  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA,
   475  		http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
   476  		http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
   477  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA,
   478  		http2cipher_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
   479  		http2cipher_TLS_DH_DSS_WITH_AES_256_CBC_SHA256,
   480  		http2cipher_TLS_DH_RSA_WITH_AES_256_CBC_SHA256,
   481  		http2cipher_TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
   482  		http2cipher_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
   483  		http2cipher_TLS_DH_anon_WITH_AES_128_CBC_SHA256,
   484  		http2cipher_TLS_DH_anon_WITH_AES_256_CBC_SHA256,
   485  		http2cipher_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA,
   486  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA,
   487  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA,
   488  		http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
   489  		http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
   490  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA,
   491  		http2cipher_TLS_PSK_WITH_RC4_128_SHA,
   492  		http2cipher_TLS_PSK_WITH_3DES_EDE_CBC_SHA,
   493  		http2cipher_TLS_PSK_WITH_AES_128_CBC_SHA,
   494  		http2cipher_TLS_PSK_WITH_AES_256_CBC_SHA,
   495  		http2cipher_TLS_DHE_PSK_WITH_RC4_128_SHA,
   496  		http2cipher_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
   497  		http2cipher_TLS_DHE_PSK_WITH_AES_128_CBC_SHA,
   498  		http2cipher_TLS_DHE_PSK_WITH_AES_256_CBC_SHA,
   499  		http2cipher_TLS_RSA_PSK_WITH_RC4_128_SHA,
   500  		http2cipher_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
   501  		http2cipher_TLS_RSA_PSK_WITH_AES_128_CBC_SHA,
   502  		http2cipher_TLS_RSA_PSK_WITH_AES_256_CBC_SHA,
   503  		http2cipher_TLS_RSA_WITH_SEED_CBC_SHA,
   504  		http2cipher_TLS_DH_DSS_WITH_SEED_CBC_SHA,
   505  		http2cipher_TLS_DH_RSA_WITH_SEED_CBC_SHA,
   506  		http2cipher_TLS_DHE_DSS_WITH_SEED_CBC_SHA,
   507  		http2cipher_TLS_DHE_RSA_WITH_SEED_CBC_SHA,
   508  		http2cipher_TLS_DH_anon_WITH_SEED_CBC_SHA,
   509  		http2cipher_TLS_RSA_WITH_AES_128_GCM_SHA256,
   510  		http2cipher_TLS_RSA_WITH_AES_256_GCM_SHA384,
   511  		http2cipher_TLS_DH_RSA_WITH_AES_128_GCM_SHA256,
   512  		http2cipher_TLS_DH_RSA_WITH_AES_256_GCM_SHA384,
   513  		http2cipher_TLS_DH_DSS_WITH_AES_128_GCM_SHA256,
   514  		http2cipher_TLS_DH_DSS_WITH_AES_256_GCM_SHA384,
   515  		http2cipher_TLS_DH_anon_WITH_AES_128_GCM_SHA256,
   516  		http2cipher_TLS_DH_anon_WITH_AES_256_GCM_SHA384,
   517  		http2cipher_TLS_PSK_WITH_AES_128_GCM_SHA256,
   518  		http2cipher_TLS_PSK_WITH_AES_256_GCM_SHA384,
   519  		http2cipher_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256,
   520  		http2cipher_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384,
   521  		http2cipher_TLS_PSK_WITH_AES_128_CBC_SHA256,
   522  		http2cipher_TLS_PSK_WITH_AES_256_CBC_SHA384,
   523  		http2cipher_TLS_PSK_WITH_NULL_SHA256,
   524  		http2cipher_TLS_PSK_WITH_NULL_SHA384,
   525  		http2cipher_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256,
   526  		http2cipher_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384,
   527  		http2cipher_TLS_DHE_PSK_WITH_NULL_SHA256,
   528  		http2cipher_TLS_DHE_PSK_WITH_NULL_SHA384,
   529  		http2cipher_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256,
   530  		http2cipher_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384,
   531  		http2cipher_TLS_RSA_PSK_WITH_NULL_SHA256,
   532  		http2cipher_TLS_RSA_PSK_WITH_NULL_SHA384,
   533  		http2cipher_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256,
   534  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256,
   535  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256,
   536  		http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
   537  		http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
   538  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256,
   539  		http2cipher_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256,
   540  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256,
   541  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256,
   542  		http2cipher_TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
   543  		http2cipher_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
   544  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256,
   545  		http2cipher_TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
   546  		http2cipher_TLS_ECDH_ECDSA_WITH_NULL_SHA,
   547  		http2cipher_TLS_ECDH_ECDSA_WITH_RC4_128_SHA,
   548  		http2cipher_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
   549  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
   550  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
   551  		http2cipher_TLS_ECDHE_ECDSA_WITH_NULL_SHA,
   552  		http2cipher_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
   553  		http2cipher_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
   554  		http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
   555  		http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
   556  		http2cipher_TLS_ECDH_RSA_WITH_NULL_SHA,
   557  		http2cipher_TLS_ECDH_RSA_WITH_RC4_128_SHA,
   558  		http2cipher_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
   559  		http2cipher_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
   560  		http2cipher_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
   561  		http2cipher_TLS_ECDHE_RSA_WITH_NULL_SHA,
   562  		http2cipher_TLS_ECDHE_RSA_WITH_RC4_128_SHA,
   563  		http2cipher_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
   564  		http2cipher_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
   565  		http2cipher_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
   566  		http2cipher_TLS_ECDH_anon_WITH_NULL_SHA,
   567  		http2cipher_TLS_ECDH_anon_WITH_RC4_128_SHA,
   568  		http2cipher_TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA,
   569  		http2cipher_TLS_ECDH_anon_WITH_AES_128_CBC_SHA,
   570  		http2cipher_TLS_ECDH_anon_WITH_AES_256_CBC_SHA,
   571  		http2cipher_TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
   572  		http2cipher_TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
   573  		http2cipher_TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
   574  		http2cipher_TLS_SRP_SHA_WITH_AES_128_CBC_SHA,
   575  		http2cipher_TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
   576  		http2cipher_TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
   577  		http2cipher_TLS_SRP_SHA_WITH_AES_256_CBC_SHA,
   578  		http2cipher_TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
   579  		http2cipher_TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
   580  		http2cipher_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
   581  		http2cipher_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
   582  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
   583  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
   584  		http2cipher_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
   585  		http2cipher_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
   586  		http2cipher_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
   587  		http2cipher_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,
   588  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
   589  		http2cipher_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
   590  		http2cipher_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,
   591  		http2cipher_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,
   592  		http2cipher_TLS_ECDHE_PSK_WITH_RC4_128_SHA,
   593  		http2cipher_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
   594  		http2cipher_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA,
   595  		http2cipher_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA,
   596  		http2cipher_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
   597  		http2cipher_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
   598  		http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA,
   599  		http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA256,
   600  		http2cipher_TLS_ECDHE_PSK_WITH_NULL_SHA384,
   601  		http2cipher_TLS_RSA_WITH_ARIA_128_CBC_SHA256,
   602  		http2cipher_TLS_RSA_WITH_ARIA_256_CBC_SHA384,
   603  		http2cipher_TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256,
   604  		http2cipher_TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384,
   605  		http2cipher_TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256,
   606  		http2cipher_TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384,
   607  		http2cipher_TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256,
   608  		http2cipher_TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384,
   609  		http2cipher_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256,
   610  		http2cipher_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384,
   611  		http2cipher_TLS_DH_anon_WITH_ARIA_128_CBC_SHA256,
   612  		http2cipher_TLS_DH_anon_WITH_ARIA_256_CBC_SHA384,
   613  		http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256,
   614  		http2cipher_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384,
   615  		http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256,
   616  		http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384,
   617  		http2cipher_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256,
   618  		http2cipher_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384,
   619  		http2cipher_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256,
   620  		http2cipher_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384,
   621  		http2cipher_TLS_RSA_WITH_ARIA_128_GCM_SHA256,
   622  		http2cipher_TLS_RSA_WITH_ARIA_256_GCM_SHA384,
   623  		http2cipher_TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256,
   624  		http2cipher_TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384,
   625  		http2cipher_TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256,
   626  		http2cipher_TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384,
   627  		http2cipher_TLS_DH_anon_WITH_ARIA_128_GCM_SHA256,
   628  		http2cipher_TLS_DH_anon_WITH_ARIA_256_GCM_SHA384,
   629  		http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256,
   630  		http2cipher_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384,
   631  		http2cipher_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256,
   632  		http2cipher_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384,
   633  		http2cipher_TLS_PSK_WITH_ARIA_128_CBC_SHA256,
   634  		http2cipher_TLS_PSK_WITH_ARIA_256_CBC_SHA384,
   635  		http2cipher_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256,
   636  		http2cipher_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384,
   637  		http2cipher_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256,
   638  		http2cipher_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384,
   639  		http2cipher_TLS_PSK_WITH_ARIA_128_GCM_SHA256,
   640  		http2cipher_TLS_PSK_WITH_ARIA_256_GCM_SHA384,
   641  		http2cipher_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
   642  		http2cipher_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
   643  		http2cipher_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256,
   644  		http2cipher_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384,
   645  		http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
   646  		http2cipher_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
   647  		http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
   648  		http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
   649  		http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
   650  		http2cipher_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
   651  		http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256,
   652  		http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384,
   653  		http2cipher_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256,
   654  		http2cipher_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384,
   655  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256,
   656  		http2cipher_TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384,
   657  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256,
   658  		http2cipher_TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384,
   659  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256,
   660  		http2cipher_TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384,
   661  		http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256,
   662  		http2cipher_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384,
   663  		http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256,
   664  		http2cipher_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384,
   665  		http2cipher_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256,
   666  		http2cipher_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384,
   667  		http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256,
   668  		http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384,
   669  		http2cipher_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256,
   670  		http2cipher_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384,
   671  		http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
   672  		http2cipher_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
   673  		http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
   674  		http2cipher_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
   675  		http2cipher_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
   676  		http2cipher_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
   677  		http2cipher_TLS_RSA_WITH_AES_128_CCM,
   678  		http2cipher_TLS_RSA_WITH_AES_256_CCM,
   679  		http2cipher_TLS_RSA_WITH_AES_128_CCM_8,
   680  		http2cipher_TLS_RSA_WITH_AES_256_CCM_8,
   681  		http2cipher_TLS_PSK_WITH_AES_128_CCM,
   682  		http2cipher_TLS_PSK_WITH_AES_256_CCM,
   683  		http2cipher_TLS_PSK_WITH_AES_128_CCM_8,
   684  		http2cipher_TLS_PSK_WITH_AES_256_CCM_8:
   685  		return true
   686  	default:
   687  		return false
   688  	}
   689  }
   690  
   691  // ClientConnPool manages a pool of HTTP/2 client connections.
   692  type http2ClientConnPool interface {
   693  	GetClientConn(req *Request, addr string) (*http2ClientConn, error)
   694  	MarkDead(*http2ClientConn)
   695  }
   696  
   697  // clientConnPoolIdleCloser is the interface implemented by ClientConnPool
   698  // implementations which can close their idle connections.
   699  type http2clientConnPoolIdleCloser interface {
   700  	http2ClientConnPool
   701  	closeIdleConnections()
   702  }
   703  
   704  var (
   705  	_ http2clientConnPoolIdleCloser = (*http2clientConnPool)(nil)
   706  	_ http2clientConnPoolIdleCloser = http2noDialClientConnPool{}
   707  )
   708  
   709  // TODO: use singleflight for dialing and addConnCalls?
   710  type http2clientConnPool struct {
   711  	t *http2Transport
   712  
   713  	mu sync.Mutex // TODO: maybe switch to RWMutex
   714  	// TODO: add support for sharing conns based on cert names
   715  	// (e.g. share conn for googleapis.com and appspot.com)
   716  	conns        map[string][]*http2ClientConn // key is host:port
   717  	dialing      map[string]*http2dialCall     // currently in-flight dials
   718  	keys         map[*http2ClientConn][]string
   719  	addConnCalls map[string]*http2addConnCall // in-flight addConnIfNeede calls
   720  }
   721  
   722  func (p *http2clientConnPool) GetClientConn(req *Request, addr string) (*http2ClientConn, error) {
   723  	return p.getClientConn(req, addr, http2dialOnMiss)
   724  }
   725  
   726  const (
   727  	http2dialOnMiss   = true
   728  	http2noDialOnMiss = false
   729  )
   730  
   731  // shouldTraceGetConn reports whether getClientConn should call any
   732  // ClientTrace.GetConn hook associated with the http.Request.
   733  //
   734  // This complexity is needed to avoid double calls of the GetConn hook
   735  // during the back-and-forth between net/http and x/net/http2 (when the
   736  // net/http.Transport is upgraded to also speak http2), as well as support
   737  // the case where x/net/http2 is being used directly.
   738  func (p *http2clientConnPool) shouldTraceGetConn(st http2clientConnIdleState) bool {
   739  	// If our Transport wasn't made via ConfigureTransport, always
   740  	// trace the GetConn hook if provided, because that means the
   741  	// http2 package is being used directly and it's the one
   742  	// dialing, as opposed to net/http.
   743  	if _, ok := p.t.ConnPool.(http2noDialClientConnPool); !ok {
   744  		return true
   745  	}
   746  	// Otherwise, only use the GetConn hook if this connection has
   747  	// been used previously for other requests. For fresh
   748  	// connections, the net/http package does the dialing.
   749  	return !st.freshConn
   750  }
   751  
   752  func (p *http2clientConnPool) getClientConn(req *Request, addr string, dialOnMiss bool) (*http2ClientConn, error) {
   753  	if http2isConnectionCloseRequest(req) && dialOnMiss {
   754  		// It gets its own connection.
   755  		http2traceGetConn(req, addr)
   756  		const singleUse = true
   757  		cc, err := p.t.dialClientConn(addr, singleUse)
   758  		if err != nil {
   759  			return nil, err
   760  		}
   761  		return cc, nil
   762  	}
   763  	p.mu.Lock()
   764  	for _, cc := range p.conns[addr] {
   765  		if st := cc.idleState(); st.canTakeNewRequest {
   766  			if p.shouldTraceGetConn(st) {
   767  				http2traceGetConn(req, addr)
   768  			}
   769  			p.mu.Unlock()
   770  			return cc, nil
   771  		}
   772  	}
   773  	if !dialOnMiss {
   774  		p.mu.Unlock()
   775  		return nil, http2ErrNoCachedConn
   776  	}
   777  	http2traceGetConn(req, addr)
   778  	call := p.getStartDialLocked(addr)
   779  	p.mu.Unlock()
   780  	<-call.done
   781  	return call.res, call.err
   782  }
   783  
   784  // dialCall is an in-flight Transport dial call to a host.
   785  type http2dialCall struct {
   786  	p    *http2clientConnPool
   787  	done chan struct{}    // closed when done
   788  	res  *http2ClientConn // valid after done is closed
   789  	err  error            // valid after done is closed
   790  }
   791  
   792  // requires p.mu is held.
   793  func (p *http2clientConnPool) getStartDialLocked(addr string) *http2dialCall {
   794  	if call, ok := p.dialing[addr]; ok {
   795  		// A dial is already in-flight. Don't start another.
   796  		return call
   797  	}
   798  	call := &http2dialCall{p: p, done: make(chan struct{})}
   799  	if p.dialing == nil {
   800  		p.dialing = make(map[string]*http2dialCall)
   801  	}
   802  	p.dialing[addr] = call
   803  	go call.dial(addr)
   804  	return call
   805  }
   806  
   807  // run in its own goroutine.
   808  func (c *http2dialCall) dial(addr string) {
   809  	const singleUse = false // shared conn
   810  	c.res, c.err = c.p.t.dialClientConn(addr, singleUse)
   811  	close(c.done)
   812  
   813  	c.p.mu.Lock()
   814  	delete(c.p.dialing, addr)
   815  	if c.err == nil {
   816  		c.p.addConnLocked(addr, c.res)
   817  	}
   818  	c.p.mu.Unlock()
   819  }
   820  
   821  // addConnIfNeeded makes a NewClientConn out of c if a connection for key doesn't
   822  // already exist. It coalesces concurrent calls with the same key.
   823  // This is used by the http1 Transport code when it creates a new connection. Because
   824  // the http1 Transport doesn't de-dup TCP dials to outbound hosts (because it doesn't know
   825  // the protocol), it can get into a situation where it has multiple TLS connections.
   826  // This code decides which ones live or die.
   827  // The return value used is whether c was used.
   828  // c is never closed.
   829  func (p *http2clientConnPool) addConnIfNeeded(key string, t *http2Transport, c *tls.Conn) (used bool, err error) {
   830  	p.mu.Lock()
   831  	for _, cc := range p.conns[key] {
   832  		if cc.CanTakeNewRequest() {
   833  			p.mu.Unlock()
   834  			return false, nil
   835  		}
   836  	}
   837  	call, dup := p.addConnCalls[key]
   838  	if !dup {
   839  		if p.addConnCalls == nil {
   840  			p.addConnCalls = make(map[string]*http2addConnCall)
   841  		}
   842  		call = &http2addConnCall{
   843  			p:    p,
   844  			done: make(chan struct{}),
   845  		}
   846  		p.addConnCalls[key] = call
   847  		go call.run(t, key, c)
   848  	}
   849  	p.mu.Unlock()
   850  
   851  	<-call.done
   852  	if call.err != nil {
   853  		return false, call.err
   854  	}
   855  	return !dup, nil
   856  }
   857  
   858  type http2addConnCall struct {
   859  	p    *http2clientConnPool
   860  	done chan struct{} // closed when done
   861  	err  error
   862  }
   863  
   864  func (c *http2addConnCall) run(t *http2Transport, key string, tc *tls.Conn) {
   865  	cc, err := t.NewClientConn(tc)
   866  
   867  	p := c.p
   868  	p.mu.Lock()
   869  	if err != nil {
   870  		c.err = err
   871  	} else {
   872  		p.addConnLocked(key, cc)
   873  	}
   874  	delete(p.addConnCalls, key)
   875  	p.mu.Unlock()
   876  	close(c.done)
   877  }
   878  
   879  func (p *http2clientConnPool) addConn(key string, cc *http2ClientConn) {
   880  	p.mu.Lock()
   881  	p.addConnLocked(key, cc)
   882  	p.mu.Unlock()
   883  }
   884  
   885  // p.mu must be held
   886  func (p *http2clientConnPool) addConnLocked(key string, cc *http2ClientConn) {
   887  	for _, v := range p.conns[key] {
   888  		if v == cc {
   889  			return
   890  		}
   891  	}
   892  	if p.conns == nil {
   893  		p.conns = make(map[string][]*http2ClientConn)
   894  	}
   895  	if p.keys == nil {
   896  		p.keys = make(map[*http2ClientConn][]string)
   897  	}
   898  	p.conns[key] = append(p.conns[key], cc)
   899  	p.keys[cc] = append(p.keys[cc], key)
   900  }
   901  
   902  func (p *http2clientConnPool) MarkDead(cc *http2ClientConn) {
   903  	p.mu.Lock()
   904  	defer p.mu.Unlock()
   905  	for _, key := range p.keys[cc] {
   906  		vv, ok := p.conns[key]
   907  		if !ok {
   908  			continue
   909  		}
   910  		newList := http2filterOutClientConn(vv, cc)
   911  		if len(newList) > 0 {
   912  			p.conns[key] = newList
   913  		} else {
   914  			delete(p.conns, key)
   915  		}
   916  	}
   917  	delete(p.keys, cc)
   918  }
   919  
   920  func (p *http2clientConnPool) closeIdleConnections() {
   921  	p.mu.Lock()
   922  	defer p.mu.Unlock()
   923  	// TODO: don't close a cc if it was just added to the pool
   924  	// milliseconds ago and has never been used. There's currently
   925  	// a small race window with the HTTP/1 Transport's integration
   926  	// where it can add an idle conn just before using it, and
   927  	// somebody else can concurrently call CloseIdleConns and
   928  	// break some caller's RoundTrip.
   929  	for _, vv := range p.conns {
   930  		for _, cc := range vv {
   931  			cc.closeIfIdle()
   932  		}
   933  	}
   934  }
   935  
   936  func http2filterOutClientConn(in []*http2ClientConn, exclude *http2ClientConn) []*http2ClientConn {
   937  	out := in[:0]
   938  	for _, v := range in {
   939  		if v != exclude {
   940  			out = append(out, v)
   941  		}
   942  	}
   943  	// If we filtered it out, zero out the last item to prevent
   944  	// the GC from seeing it.
   945  	if len(in) != len(out) {
   946  		in[len(in)-1] = nil
   947  	}
   948  	return out
   949  }
   950  
   951  // noDialClientConnPool is an implementation of http2.ClientConnPool
   952  // which never dials. We let the HTTP/1.1 client dial and use its TLS
   953  // connection instead.
   954  type http2noDialClientConnPool struct{ *http2clientConnPool }
   955  
   956  func (p http2noDialClientConnPool) GetClientConn(req *Request, addr string) (*http2ClientConn, error) {
   957  	return p.getClientConn(req, addr, http2noDialOnMiss)
   958  }
   959  
   960  // Buffer chunks are allocated from a pool to reduce pressure on GC.
   961  // The maximum wasted space per dataBuffer is 2x the largest size class,
   962  // which happens when the dataBuffer has multiple chunks and there is
   963  // one unread byte in both the first and last chunks. We use a few size
   964  // classes to minimize overheads for servers that typically receive very
   965  // small request bodies.
   966  //
   967  // TODO: Benchmark to determine if the pools are necessary. The GC may have
   968  // improved enough that we can instead allocate chunks like this:
   969  // make([]byte, max(16<<10, expectedBytesRemaining))
   970  var (
   971  	http2dataChunkSizeClasses = []int{
   972  		1 << 10,
   973  		2 << 10,
   974  		4 << 10,
   975  		8 << 10,
   976  		16 << 10,
   977  	}
   978  	http2dataChunkPools = [...]sync.Pool{
   979  		{New: func() interface{} { return make([]byte, 1<<10) }},
   980  		{New: func() interface{} { return make([]byte, 2<<10) }},
   981  		{New: func() interface{} { return make([]byte, 4<<10) }},
   982  		{New: func() interface{} { return make([]byte, 8<<10) }},
   983  		{New: func() interface{} { return make([]byte, 16<<10) }},
   984  	}
   985  )
   986  
   987  func http2getDataBufferChunk(size int64) []byte {
   988  	i := 0
   989  	for ; i < len(http2dataChunkSizeClasses)-1; i++ {
   990  		if size <= int64(http2dataChunkSizeClasses[i]) {
   991  			break
   992  		}
   993  	}
   994  	return http2dataChunkPools[i].Get().([]byte)
   995  }
   996  
   997  func http2putDataBufferChunk(p []byte) {
   998  	for i, n := range http2dataChunkSizeClasses {
   999  		if len(p) == n {
  1000  			http2dataChunkPools[i].Put(p)
  1001  			return
  1002  		}
  1003  	}
  1004  	panic(fmt.Sprintf("unexpected buffer len=%v", len(p)))
  1005  }
  1006  
  1007  // dataBuffer is an io.ReadWriter backed by a list of data chunks.
  1008  // Each dataBuffer is used to read DATA frames on a single stream.
  1009  // The buffer is divided into chunks so the server can limit the
  1010  // total memory used by a single connection without limiting the
  1011  // request body size on any single stream.
  1012  type http2dataBuffer struct {
  1013  	chunks   [][]byte
  1014  	r        int   // next byte to read is chunks[0][r]
  1015  	w        int   // next byte to write is chunks[len(chunks)-1][w]
  1016  	size     int   // total buffered bytes
  1017  	expected int64 // we expect at least this many bytes in future Write calls (ignored if <= 0)
  1018  }
  1019  
  1020  var http2errReadEmpty = errors.New("read from empty dataBuffer")
  1021  
  1022  // Read copies bytes from the buffer into p.
  1023  // It is an error to read when no data is available.
  1024  func (b *http2dataBuffer) Read(p []byte) (int, error) {
  1025  	if b.size == 0 {
  1026  		return 0, http2errReadEmpty
  1027  	}
  1028  	var ntotal int
  1029  	for len(p) > 0 && b.size > 0 {
  1030  		readFrom := b.bytesFromFirstChunk()
  1031  		n := copy(p, readFrom)
  1032  		p = p[n:]
  1033  		ntotal += n
  1034  		b.r += n
  1035  		b.size -= n
  1036  		// If the first chunk has been consumed, advance to the next chunk.
  1037  		if b.r == len(b.chunks[0]) {
  1038  			http2putDataBufferChunk(b.chunks[0])
  1039  			end := len(b.chunks) - 1
  1040  			copy(b.chunks[:end], b.chunks[1:])
  1041  			b.chunks[end] = nil
  1042  			b.chunks = b.chunks[:end]
  1043  			b.r = 0
  1044  		}
  1045  	}
  1046  	return ntotal, nil
  1047  }
  1048  
  1049  func (b *http2dataBuffer) bytesFromFirstChunk() []byte {
  1050  	if len(b.chunks) == 1 {
  1051  		return b.chunks[0][b.r:b.w]
  1052  	}
  1053  	return b.chunks[0][b.r:]
  1054  }
  1055  
  1056  // Len returns the number of bytes of the unread portion of the buffer.
  1057  func (b *http2dataBuffer) Len() int {
  1058  	return b.size
  1059  }
  1060  
  1061  // Write appends p to the buffer.
  1062  func (b *http2dataBuffer) Write(p []byte) (int, error) {
  1063  	ntotal := len(p)
  1064  	for len(p) > 0 {
  1065  		// If the last chunk is empty, allocate a new chunk. Try to allocate
  1066  		// enough to fully copy p plus any additional bytes we expect to
  1067  		// receive. However, this may allocate less than len(p).
  1068  		want := int64(len(p))
  1069  		if b.expected > want {
  1070  			want = b.expected
  1071  		}
  1072  		chunk := b.lastChunkOrAlloc(want)
  1073  		n := copy(chunk[b.w:], p)
  1074  		p = p[n:]
  1075  		b.w += n
  1076  		b.size += n
  1077  		b.expected -= int64(n)
  1078  	}
  1079  	return ntotal, nil
  1080  }
  1081  
  1082  func (b *http2dataBuffer) lastChunkOrAlloc(want int64) []byte {
  1083  	if len(b.chunks) != 0 {
  1084  		last := b.chunks[len(b.chunks)-1]
  1085  		if b.w < len(last) {
  1086  			return last
  1087  		}
  1088  	}
  1089  	chunk := http2getDataBufferChunk(want)
  1090  	b.chunks = append(b.chunks, chunk)
  1091  	b.w = 0
  1092  	return chunk
  1093  }
  1094  
  1095  // An ErrCode is an unsigned 32-bit error code as defined in the HTTP/2 spec.
  1096  type http2ErrCode uint32
  1097  
  1098  const (
  1099  	http2ErrCodeNo                 http2ErrCode = 0x0
  1100  	http2ErrCodeProtocol           http2ErrCode = 0x1
  1101  	http2ErrCodeInternal           http2ErrCode = 0x2
  1102  	http2ErrCodeFlowControl        http2ErrCode = 0x3
  1103  	http2ErrCodeSettingsTimeout    http2ErrCode = 0x4
  1104  	http2ErrCodeStreamClosed       http2ErrCode = 0x5
  1105  	http2ErrCodeFrameSize          http2ErrCode = 0x6
  1106  	http2ErrCodeRefusedStream      http2ErrCode = 0x7
  1107  	http2ErrCodeCancel             http2ErrCode = 0x8
  1108  	http2ErrCodeCompression        http2ErrCode = 0x9
  1109  	http2ErrCodeConnect            http2ErrCode = 0xa
  1110  	http2ErrCodeEnhanceYourCalm    http2ErrCode = 0xb
  1111  	http2ErrCodeInadequateSecurity http2ErrCode = 0xc
  1112  	http2ErrCodeHTTP11Required     http2ErrCode = 0xd
  1113  )
  1114  
  1115  var http2errCodeName = map[http2ErrCode]string{
  1116  	http2ErrCodeNo:                 "NO_ERROR",
  1117  	http2ErrCodeProtocol:           "PROTOCOL_ERROR",
  1118  	http2ErrCodeInternal:           "INTERNAL_ERROR",
  1119  	http2ErrCodeFlowControl:        "FLOW_CONTROL_ERROR",
  1120  	http2ErrCodeSettingsTimeout:    "SETTINGS_TIMEOUT",
  1121  	http2ErrCodeStreamClosed:       "STREAM_CLOSED",
  1122  	http2ErrCodeFrameSize:          "FRAME_SIZE_ERROR",
  1123  	http2ErrCodeRefusedStream:      "REFUSED_STREAM",
  1124  	http2ErrCodeCancel:             "CANCEL",
  1125  	http2ErrCodeCompression:        "COMPRESSION_ERROR",
  1126  	http2ErrCodeConnect:            "CONNECT_ERROR",
  1127  	http2ErrCodeEnhanceYourCalm:    "ENHANCE_YOUR_CALM",
  1128  	http2ErrCodeInadequateSecurity: "INADEQUATE_SECURITY",
  1129  	http2ErrCodeHTTP11Required:     "HTTP_1_1_REQUIRED",
  1130  }
  1131  
  1132  func (e http2ErrCode) String() string {
  1133  	if s, ok := http2errCodeName[e]; ok {
  1134  		return s
  1135  	}
  1136  	return fmt.Sprintf("unknown error code 0x%x", uint32(e))
  1137  }
  1138  
  1139  // ConnectionError is an error that results in the termination of the
  1140  // entire connection.
  1141  type http2ConnectionError http2ErrCode
  1142  
  1143  func (e http2ConnectionError) Error() string {
  1144  	return fmt.Sprintf("connection error: %s", http2ErrCode(e))
  1145  }
  1146  
  1147  // StreamError is an error that only affects one stream within an
  1148  // HTTP/2 connection.
  1149  type http2StreamError struct {
  1150  	StreamID uint32
  1151  	Code     http2ErrCode
  1152  	Cause    error // optional additional detail
  1153  }
  1154  
  1155  func http2streamError(id uint32, code http2ErrCode) http2StreamError {
  1156  	return http2StreamError{StreamID: id, Code: code}
  1157  }
  1158  
  1159  func (e http2StreamError) Error() string {
  1160  	if e.Cause != nil {
  1161  		return fmt.Sprintf("stream error: stream ID %d; %v; %v", e.StreamID, e.Code, e.Cause)
  1162  	}
  1163  	return fmt.Sprintf("stream error: stream ID %d; %v", e.StreamID, e.Code)
  1164  }
  1165  
  1166  // 6.9.1 The Flow Control Window
  1167  // "If a sender receives a WINDOW_UPDATE that causes a flow control
  1168  // window to exceed this maximum it MUST terminate either the stream
  1169  // or the connection, as appropriate. For streams, [...]; for the
  1170  // connection, a GOAWAY frame with a FLOW_CONTROL_ERROR code."
  1171  type http2goAwayFlowError struct{}
  1172  
  1173  func (http2goAwayFlowError) Error() string { return "connection exceeded flow control window size" }
  1174  
  1175  // connError represents an HTTP/2 ConnectionError error code, along
  1176  // with a string (for debugging) explaining why.
  1177  //
  1178  // Errors of this type are only returned by the frame parser functions
  1179  // and converted into ConnectionError(Code), after stashing away
  1180  // the Reason into the Framer's errDetail field, accessible via
  1181  // the (*Framer).ErrorDetail method.
  1182  type http2connError struct {
  1183  	Code   http2ErrCode // the ConnectionError error code
  1184  	Reason string       // additional reason
  1185  }
  1186  
  1187  func (e http2connError) Error() string {
  1188  	return fmt.Sprintf("http2: connection error: %v: %v", e.Code, e.Reason)
  1189  }
  1190  
  1191  type http2pseudoHeaderError string
  1192  
  1193  func (e http2pseudoHeaderError) Error() string {
  1194  	return fmt.Sprintf("invalid pseudo-header %q", string(e))
  1195  }
  1196  
  1197  type http2duplicatePseudoHeaderError string
  1198  
  1199  func (e http2duplicatePseudoHeaderError) Error() string {
  1200  	return fmt.Sprintf("duplicate pseudo-header %q", string(e))
  1201  }
  1202  
  1203  type http2headerFieldNameError string
  1204  
  1205  func (e http2headerFieldNameError) Error() string {
  1206  	return fmt.Sprintf("invalid header field name %q", string(e))
  1207  }
  1208  
  1209  type http2headerFieldValueError string
  1210  
  1211  func (e http2headerFieldValueError) Error() string {
  1212  	return fmt.Sprintf("invalid header field value %q", string(e))
  1213  }
  1214  
  1215  var (
  1216  	http2errMixPseudoHeaderTypes = errors.New("mix of request and response pseudo headers")
  1217  	http2errPseudoAfterRegular   = errors.New("pseudo header field after regular")
  1218  )
  1219  
  1220  // flow is the flow control window's size.
  1221  type http2flow struct {
  1222  	// n is the number of DATA bytes we're allowed to send.
  1223  	// A flow is kept both on a conn and a per-stream.
  1224  	n int32
  1225  
  1226  	// conn points to the shared connection-level flow that is
  1227  	// shared by all streams on that conn. It is nil for the flow
  1228  	// that's on the conn directly.
  1229  	conn *http2flow
  1230  }
  1231  
  1232  func (f *http2flow) setConnFlow(cf *http2flow) { f.conn = cf }
  1233  
  1234  func (f *http2flow) available() int32 {
  1235  	n := f.n
  1236  	if f.conn != nil && f.conn.n < n {
  1237  		n = f.conn.n
  1238  	}
  1239  	return n
  1240  }
  1241  
  1242  func (f *http2flow) take(n int32) {
  1243  	if n > f.available() {
  1244  		panic("internal error: took too much")
  1245  	}
  1246  	f.n -= n
  1247  	if f.conn != nil {
  1248  		f.conn.n -= n
  1249  	}
  1250  }
  1251  
  1252  // add adds n bytes (positive or negative) to the flow control window.
  1253  // It returns false if the sum would exceed 2^31-1.
  1254  func (f *http2flow) add(n int32) bool {
  1255  	sum := f.n + n
  1256  	if (sum > n) == (f.n > 0) {
  1257  		f.n = sum
  1258  		return true
  1259  	}
  1260  	return false
  1261  }
  1262  
  1263  const http2frameHeaderLen = 9
  1264  
  1265  var http2padZeros = make([]byte, 255) // zeros for padding
  1266  
  1267  // A FrameType is a registered frame type as defined in
  1268  // http://http2.github.io/http2-spec/#rfc.section.11.2
  1269  type http2FrameType uint8
  1270  
  1271  const (
  1272  	http2FrameData         http2FrameType = 0x0
  1273  	http2FrameHeaders      http2FrameType = 0x1
  1274  	http2FramePriority     http2FrameType = 0x2
  1275  	http2FrameRSTStream    http2FrameType = 0x3
  1276  	http2FrameSettings     http2FrameType = 0x4
  1277  	http2FramePushPromise  http2FrameType = 0x5
  1278  	http2FramePing         http2FrameType = 0x6
  1279  	http2FrameGoAway       http2FrameType = 0x7
  1280  	http2FrameWindowUpdate http2FrameType = 0x8
  1281  	http2FrameContinuation http2FrameType = 0x9
  1282  )
  1283  
  1284  var http2frameName = map[http2FrameType]string{
  1285  	http2FrameData:         "DATA",
  1286  	http2FrameHeaders:      "HEADERS",
  1287  	http2FramePriority:     "PRIORITY",
  1288  	http2FrameRSTStream:    "RST_STREAM",
  1289  	http2FrameSettings:     "SETTINGS",
  1290  	http2FramePushPromise:  "PUSH_PROMISE",
  1291  	http2FramePing:         "PING",
  1292  	http2FrameGoAway:       "GOAWAY",
  1293  	http2FrameWindowUpdate: "WINDOW_UPDATE",
  1294  	http2FrameContinuation: "CONTINUATION",
  1295  }
  1296  
  1297  func (t http2FrameType) String() string {
  1298  	if s, ok := http2frameName[t]; ok {
  1299  		return s
  1300  	}
  1301  	return fmt.Sprintf("UNKNOWN_FRAME_TYPE_%d", uint8(t))
  1302  }
  1303  
  1304  // Flags is a bitmask of HTTP/2 flags.
  1305  // The meaning of flags varies depending on the frame type.
  1306  type http2Flags uint8
  1307  
  1308  // Has reports whether f contains all (0 or more) flags in v.
  1309  func (f http2Flags) Has(v http2Flags) bool {
  1310  	return (f & v) == v
  1311  }
  1312  
  1313  // Frame-specific FrameHeader flag bits.
  1314  const (
  1315  	// Data Frame
  1316  	http2FlagDataEndStream http2Flags = 0x1
  1317  	http2FlagDataPadded    http2Flags = 0x8
  1318  
  1319  	// Headers Frame
  1320  	http2FlagHeadersEndStream  http2Flags = 0x1
  1321  	http2FlagHeadersEndHeaders http2Flags = 0x4
  1322  	http2FlagHeadersPadded     http2Flags = 0x8
  1323  	http2FlagHeadersPriority   http2Flags = 0x20
  1324  
  1325  	// Settings Frame
  1326  	http2FlagSettingsAck http2Flags = 0x1
  1327  
  1328  	// Ping Frame
  1329  	http2FlagPingAck http2Flags = 0x1
  1330  
  1331  	// Continuation Frame
  1332  	http2FlagContinuationEndHeaders http2Flags = 0x4
  1333  
  1334  	http2FlagPushPromiseEndHeaders http2Flags = 0x4
  1335  	http2FlagPushPromisePadded     http2Flags = 0x8
  1336  )
  1337  
  1338  var http2flagName = map[http2FrameType]map[http2Flags]string{
  1339  	http2FrameData: {
  1340  		http2FlagDataEndStream: "END_STREAM",
  1341  		http2FlagDataPadded:    "PADDED",
  1342  	},
  1343  	http2FrameHeaders: {
  1344  		http2FlagHeadersEndStream:  "END_STREAM",
  1345  		http2FlagHeadersEndHeaders: "END_HEADERS",
  1346  		http2FlagHeadersPadded:     "PADDED",
  1347  		http2FlagHeadersPriority:   "PRIORITY",
  1348  	},
  1349  	http2FrameSettings: {
  1350  		http2FlagSettingsAck: "ACK",
  1351  	},
  1352  	http2FramePing: {
  1353  		http2FlagPingAck: "ACK",
  1354  	},
  1355  	http2FrameContinuation: {
  1356  		http2FlagContinuationEndHeaders: "END_HEADERS",
  1357  	},
  1358  	http2FramePushPromise: {
  1359  		http2FlagPushPromiseEndHeaders: "END_HEADERS",
  1360  		http2FlagPushPromisePadded:     "PADDED",
  1361  	},
  1362  }
  1363  
  1364  // a frameParser parses a frame given its FrameHeader and payload
  1365  // bytes. The length of payload will always equal fh.Length (which
  1366  // might be 0).
  1367  type http2frameParser func(fc *http2frameCache, fh http2FrameHeader, payload []byte) (http2Frame, error)
  1368  
  1369  var http2frameParsers = map[http2FrameType]http2frameParser{
  1370  	http2FrameData:         http2parseDataFrame,
  1371  	http2FrameHeaders:      http2parseHeadersFrame,
  1372  	http2FramePriority:     http2parsePriorityFrame,
  1373  	http2FrameRSTStream:    http2parseRSTStreamFrame,
  1374  	http2FrameSettings:     http2parseSettingsFrame,
  1375  	http2FramePushPromise:  http2parsePushPromise,
  1376  	http2FramePing:         http2parsePingFrame,
  1377  	http2FrameGoAway:       http2parseGoAwayFrame,
  1378  	http2FrameWindowUpdate: http2parseWindowUpdateFrame,
  1379  	http2FrameContinuation: http2parseContinuationFrame,
  1380  }
  1381  
  1382  func http2typeFrameParser(t http2FrameType) http2frameParser {
  1383  	if f := http2frameParsers[t]; f != nil {
  1384  		return f
  1385  	}
  1386  	return http2parseUnknownFrame
  1387  }
  1388  
  1389  // A FrameHeader is the 9 byte header of all HTTP/2 frames.
  1390  //
  1391  // See http://http2.github.io/http2-spec/#FrameHeader
  1392  type http2FrameHeader struct {
  1393  	valid bool // caller can access []byte fields in the Frame
  1394  
  1395  	// Type is the 1 byte frame type. There are ten standard frame
  1396  	// types, but extension frame types may be written by WriteRawFrame
  1397  	// and will be returned by ReadFrame (as UnknownFrame).
  1398  	Type http2FrameType
  1399  
  1400  	// Flags are the 1 byte of 8 potential bit flags per frame.
  1401  	// They are specific to the frame type.
  1402  	Flags http2Flags
  1403  
  1404  	// Length is the length of the frame, not including the 9 byte header.
  1405  	// The maximum size is one byte less than 16MB (uint24), but only
  1406  	// frames up to 16KB are allowed without peer agreement.
  1407  	Length uint32
  1408  
  1409  	// StreamID is which stream this frame is for. Certain frames
  1410  	// are not stream-specific, in which case this field is 0.
  1411  	StreamID uint32
  1412  }
  1413  
  1414  // Header returns h. It exists so FrameHeaders can be embedded in other
  1415  // specific frame types and implement the Frame interface.
  1416  func (h http2FrameHeader) Header() http2FrameHeader { return h }
  1417  
  1418  func (h http2FrameHeader) String() string {
  1419  	var buf bytes.Buffer
  1420  	buf.WriteString("[FrameHeader ")
  1421  	h.writeDebug(&buf)
  1422  	buf.WriteByte(']')
  1423  	return buf.String()
  1424  }
  1425  
  1426  func (h http2FrameHeader) writeDebug(buf *bytes.Buffer) {
  1427  	buf.WriteString(h.Type.String())
  1428  	if h.Flags != 0 {
  1429  		buf.WriteString(" flags=")
  1430  		set := 0
  1431  		for i := uint8(0); i < 8; i++ {
  1432  			if h.Flags&(1<<i) == 0 {
  1433  				continue
  1434  			}
  1435  			set++
  1436  			if set > 1 {
  1437  				buf.WriteByte('|')
  1438  			}
  1439  			name := http2flagName[h.Type][http2Flags(1<<i)]
  1440  			if name != "" {
  1441  				buf.WriteString(name)
  1442  			} else {
  1443  				fmt.Fprintf(buf, "0x%x", 1<<i)
  1444  			}
  1445  		}
  1446  	}
  1447  	if h.StreamID != 0 {
  1448  		fmt.Fprintf(buf, " stream=%d", h.StreamID)
  1449  	}
  1450  	fmt.Fprintf(buf, " len=%d", h.Length)
  1451  }
  1452  
  1453  func (h *http2FrameHeader) checkValid() {
  1454  	if !h.valid {
  1455  		panic("Frame accessor called on non-owned Frame")
  1456  	}
  1457  }
  1458  
  1459  func (h *http2FrameHeader) invalidate() { h.valid = false }
  1460  
  1461  // frame header bytes.
  1462  // Used only by ReadFrameHeader.
  1463  var http2fhBytes = sync.Pool{
  1464  	New: func() interface{} {
  1465  		buf := make([]byte, http2frameHeaderLen)
  1466  		return &buf
  1467  	},
  1468  }
  1469  
  1470  // ReadFrameHeader reads 9 bytes from r and returns a FrameHeader.
  1471  // Most users should use Framer.ReadFrame instead.
  1472  func http2ReadFrameHeader(r io.Reader) (http2FrameHeader, error) {
  1473  	bufp := http2fhBytes.Get().(*[]byte)
  1474  	defer http2fhBytes.Put(bufp)
  1475  	return http2readFrameHeader(*bufp, r)
  1476  }
  1477  
  1478  func http2readFrameHeader(buf []byte, r io.Reader) (http2FrameHeader, error) {
  1479  	_, err := io.ReadFull(r, buf[:http2frameHeaderLen])
  1480  	if err != nil {
  1481  		return http2FrameHeader{}, err
  1482  	}
  1483  	return http2FrameHeader{
  1484  		Length:   (uint32(buf[0])<<16 | uint32(buf[1])<<8 | uint32(buf[2])),
  1485  		Type:     http2FrameType(buf[3]),
  1486  		Flags:    http2Flags(buf[4]),
  1487  		StreamID: binary.BigEndian.Uint32(buf[5:]) & (1<<31 - 1),
  1488  		valid:    true,
  1489  	}, nil
  1490  }
  1491  
  1492  // A Frame is the base interface implemented by all frame types.
  1493  // Callers will generally type-assert the specific frame type:
  1494  // *HeadersFrame, *SettingsFrame, *WindowUpdateFrame, etc.
  1495  //
  1496  // Frames are only valid until the next call to Framer.ReadFrame.
  1497  type http2Frame interface {
  1498  	Header() http2FrameHeader
  1499  
  1500  	// invalidate is called by Framer.ReadFrame to make this
  1501  	// frame's buffers as being invalid, since the subsequent
  1502  	// frame will reuse them.
  1503  	invalidate()
  1504  }
  1505  
  1506  // A Framer reads and writes Frames.
  1507  type http2Framer struct {
  1508  	r         io.Reader
  1509  	lastFrame http2Frame
  1510  	errDetail error
  1511  
  1512  	// lastHeaderStream is non-zero if the last frame was an
  1513  	// unfinished HEADERS/CONTINUATION.
  1514  	lastHeaderStream uint32
  1515  
  1516  	maxReadSize uint32
  1517  	headerBuf   [http2frameHeaderLen]byte
  1518  
  1519  	// TODO: let getReadBuf be configurable, and use a less memory-pinning
  1520  	// allocator in server.go to minimize memory pinned for many idle conns.
  1521  	// Will probably also need to make frame invalidation have a hook too.
  1522  	getReadBuf func(size uint32) []byte
  1523  	readBuf    []byte // cache for default getReadBuf
  1524  
  1525  	maxWriteSize uint32 // zero means unlimited; TODO: implement
  1526  
  1527  	w    io.Writer
  1528  	wbuf []byte
  1529  
  1530  	// AllowIllegalWrites permits the Framer's Write methods to
  1531  	// write frames that do not conform to the HTTP/2 spec. This
  1532  	// permits using the Framer to test other HTTP/2
  1533  	// implementations' conformance to the spec.
  1534  	// If false, the Write methods will prefer to return an error
  1535  	// rather than comply.
  1536  	AllowIllegalWrites bool
  1537  
  1538  	// AllowIllegalReads permits the Framer's ReadFrame method
  1539  	// to return non-compliant frames or frame orders.
  1540  	// This is for testing and permits using the Framer to test
  1541  	// other HTTP/2 implementations' conformance to the spec.
  1542  	// It is not compatible with ReadMetaHeaders.
  1543  	AllowIllegalReads bool
  1544  
  1545  	// ReadMetaHeaders if non-nil causes ReadFrame to merge
  1546  	// HEADERS and CONTINUATION frames together and return
  1547  	// MetaHeadersFrame instead.
  1548  	ReadMetaHeaders *hpack.Decoder
  1549  
  1550  	// MaxHeaderListSize is the http2 MAX_HEADER_LIST_SIZE.
  1551  	// It's used only if ReadMetaHeaders is set; 0 means a sane default
  1552  	// (currently 16MB)
  1553  	// If the limit is hit, MetaHeadersFrame.Truncated is set true.
  1554  	MaxHeaderListSize uint32
  1555  
  1556  	// TODO: track which type of frame & with which flags was sent
  1557  	// last. Then return an error (unless AllowIllegalWrites) if
  1558  	// we're in the middle of a header block and a
  1559  	// non-Continuation or Continuation on a different stream is
  1560  	// attempted to be written.
  1561  
  1562  	logReads, logWrites bool
  1563  
  1564  	debugFramer       *http2Framer // only use for logging written writes
  1565  	debugFramerBuf    *bytes.Buffer
  1566  	debugReadLoggerf  func(string, ...interface{})
  1567  	debugWriteLoggerf func(string, ...interface{})
  1568  
  1569  	frameCache *http2frameCache // nil if frames aren't reused (default)
  1570  }
  1571  
  1572  func (fr *http2Framer) maxHeaderListSize() uint32 {
  1573  	if fr.MaxHeaderListSize == 0 {
  1574  		return 16 << 20 // sane default, per docs
  1575  	}
  1576  	return fr.MaxHeaderListSize
  1577  }
  1578  
  1579  func (f *http2Framer) startWrite(ftype http2FrameType, flags http2Flags, streamID uint32) {
  1580  	// Write the FrameHeader.
  1581  	f.wbuf = append(f.wbuf[:0],
  1582  		0, // 3 bytes of length, filled in in endWrite
  1583  		0,
  1584  		0,
  1585  		byte(ftype),
  1586  		byte(flags),
  1587  		byte(streamID>>24),
  1588  		byte(streamID>>16),
  1589  		byte(streamID>>8),
  1590  		byte(streamID))
  1591  }
  1592  
  1593  func (f *http2Framer) endWrite() error {
  1594  	// Now that we know the final size, fill in the FrameHeader in
  1595  	// the space previously reserved for it. Abuse append.
  1596  	length := len(f.wbuf) - http2frameHeaderLen
  1597  	if length >= (1 << 24) {
  1598  		return http2ErrFrameTooLarge
  1599  	}
  1600  	_ = append(f.wbuf[:0],
  1601  		byte(length>>16),
  1602  		byte(length>>8),
  1603  		byte(length))
  1604  	if f.logWrites {
  1605  		f.logWrite()
  1606  	}
  1607  
  1608  	n, err := f.w.Write(f.wbuf)
  1609  	if err == nil && n != len(f.wbuf) {
  1610  		err = io.ErrShortWrite
  1611  	}
  1612  	return err
  1613  }
  1614  
  1615  func (f *http2Framer) logWrite() {
  1616  	if f.debugFramer == nil {
  1617  		f.debugFramerBuf = new(bytes.Buffer)
  1618  		f.debugFramer = http2NewFramer(nil, f.debugFramerBuf)
  1619  		f.debugFramer.logReads = false // we log it ourselves, saying "wrote" below
  1620  		// Let us read anything, even if we accidentally wrote it
  1621  		// in the wrong order:
  1622  		f.debugFramer.AllowIllegalReads = true
  1623  	}
  1624  	f.debugFramerBuf.Write(f.wbuf)
  1625  	fr, err := f.debugFramer.ReadFrame()
  1626  	if err != nil {
  1627  		f.debugWriteLoggerf("http2: Framer %p: failed to decode just-written frame", f)
  1628  		return
  1629  	}
  1630  	f.debugWriteLoggerf("http2: Framer %p: wrote %v", f, http2summarizeFrame(fr))
  1631  }
  1632  
  1633  func (f *http2Framer) writeByte(v byte) { f.wbuf = append(f.wbuf, v) }
  1634  
  1635  func (f *http2Framer) writeBytes(v []byte) { f.wbuf = append(f.wbuf, v...) }
  1636  
  1637  func (f *http2Framer) writeUint16(v uint16) { f.wbuf = append(f.wbuf, byte(v>>8), byte(v)) }
  1638  
  1639  func (f *http2Framer) writeUint32(v uint32) {
  1640  	f.wbuf = append(f.wbuf, byte(v>>24), byte(v>>16), byte(v>>8), byte(v))
  1641  }
  1642  
  1643  const (
  1644  	http2minMaxFrameSize = 1 << 14
  1645  	http2maxFrameSize    = 1<<24 - 1
  1646  )
  1647  
  1648  // SetReuseFrames allows the Framer to reuse Frames.
  1649  // If called on a Framer, Frames returned by calls to ReadFrame are only
  1650  // valid until the next call to ReadFrame.
  1651  func (fr *http2Framer) SetReuseFrames() {
  1652  	if fr.frameCache != nil {
  1653  		return
  1654  	}
  1655  	fr.frameCache = &http2frameCache{}
  1656  }
  1657  
  1658  type http2frameCache struct {
  1659  	dataFrame http2DataFrame
  1660  }
  1661  
  1662  func (fc *http2frameCache) getDataFrame() *http2DataFrame {
  1663  	if fc == nil {
  1664  		return &http2DataFrame{}
  1665  	}
  1666  	return &fc.dataFrame
  1667  }
  1668  
  1669  // NewFramer returns a Framer that writes frames to w and reads them from r.
  1670  func http2NewFramer(w io.Writer, r io.Reader) *http2Framer {
  1671  	fr := &http2Framer{
  1672  		w:                 w,
  1673  		r:                 r,
  1674  		logReads:          http2logFrameReads,
  1675  		logWrites:         http2logFrameWrites,
  1676  		debugReadLoggerf:  log.Printf,
  1677  		debugWriteLoggerf: log.Printf,
  1678  	}
  1679  	fr.getReadBuf = func(size uint32) []byte {
  1680  		if cap(fr.readBuf) >= int(size) {
  1681  			return fr.readBuf[:size]
  1682  		}
  1683  		fr.readBuf = make([]byte, size)
  1684  		return fr.readBuf
  1685  	}
  1686  	fr.SetMaxReadFrameSize(http2maxFrameSize)
  1687  	return fr
  1688  }
  1689  
  1690  // SetMaxReadFrameSize sets the maximum size of a frame
  1691  // that will be read by a subsequent call to ReadFrame.
  1692  // It is the caller's responsibility to advertise this
  1693  // limit with a SETTINGS frame.
  1694  func (fr *http2Framer) SetMaxReadFrameSize(v uint32) {
  1695  	if v > http2maxFrameSize {
  1696  		v = http2maxFrameSize
  1697  	}
  1698  	fr.maxReadSize = v
  1699  }
  1700  
  1701  // ErrorDetail returns a more detailed error of the last error
  1702  // returned by Framer.ReadFrame. For instance, if ReadFrame
  1703  // returns a StreamError with code PROTOCOL_ERROR, ErrorDetail
  1704  // will say exactly what was invalid. ErrorDetail is not guaranteed
  1705  // to return a non-nil value and like the rest of the http2 package,
  1706  // its return value is not protected by an API compatibility promise.
  1707  // ErrorDetail is reset after the next call to ReadFrame.
  1708  func (fr *http2Framer) ErrorDetail() error {
  1709  	return fr.errDetail
  1710  }
  1711  
  1712  // ErrFrameTooLarge is returned from Framer.ReadFrame when the peer
  1713  // sends a frame that is larger than declared with SetMaxReadFrameSize.
  1714  var http2ErrFrameTooLarge = errors.New("http2: frame too large")
  1715  
  1716  // terminalReadFrameError reports whether err is an unrecoverable
  1717  // error from ReadFrame and no other frames should be read.
  1718  func http2terminalReadFrameError(err error) bool {
  1719  	if _, ok := err.(http2StreamError); ok {
  1720  		return false
  1721  	}
  1722  	return err != nil
  1723  }
  1724  
  1725  // ReadFrame reads a single frame. The returned Frame is only valid
  1726  // until the next call to ReadFrame.
  1727  //
  1728  // If the frame is larger than previously set with SetMaxReadFrameSize, the
  1729  // returned error is ErrFrameTooLarge. Other errors may be of type
  1730  // ConnectionError, StreamError, or anything else from the underlying
  1731  // reader.
  1732  func (fr *http2Framer) ReadFrame() (http2Frame, error) {
  1733  	fr.errDetail = nil
  1734  	if fr.lastFrame != nil {
  1735  		fr.lastFrame.invalidate()
  1736  	}
  1737  	fh, err := http2readFrameHeader(fr.headerBuf[:], fr.r)
  1738  	if err != nil {
  1739  		return nil, err
  1740  	}
  1741  	if fh.Length > fr.maxReadSize {
  1742  		return nil, http2ErrFrameTooLarge
  1743  	}
  1744  	payload := fr.getReadBuf(fh.Length)
  1745  	if _, err := io.ReadFull(fr.r, payload); err != nil {
  1746  		return nil, err
  1747  	}
  1748  	f, err := http2typeFrameParser(fh.Type)(fr.frameCache, fh, payload)
  1749  	if err != nil {
  1750  		if ce, ok := err.(http2connError); ok {
  1751  			return nil, fr.connError(ce.Code, ce.Reason)
  1752  		}
  1753  		return nil, err
  1754  	}
  1755  	if err := fr.checkFrameOrder(f); err != nil {
  1756  		return nil, err
  1757  	}
  1758  	if fr.logReads {
  1759  		fr.debugReadLoggerf("http2: Framer %p: read %v", fr, http2summarizeFrame(f))
  1760  	}
  1761  	if fh.Type == http2FrameHeaders && fr.ReadMetaHeaders != nil {
  1762  		return fr.readMetaFrame(f.(*http2HeadersFrame))
  1763  	}
  1764  	return f, nil
  1765  }
  1766  
  1767  // connError returns ConnectionError(code) but first
  1768  // stashes away a public reason to the caller can optionally relay it
  1769  // to the peer before hanging up on them. This might help others debug
  1770  // their implementations.
  1771  func (fr *http2Framer) connError(code http2ErrCode, reason string) error {
  1772  	fr.errDetail = errors.New(reason)
  1773  	return http2ConnectionError(code)
  1774  }
  1775  
  1776  // checkFrameOrder reports an error if f is an invalid frame to return
  1777  // next from ReadFrame. Mostly it checks whether HEADERS and
  1778  // CONTINUATION frames are contiguous.
  1779  func (fr *http2Framer) checkFrameOrder(f http2Frame) error {
  1780  	last := fr.lastFrame
  1781  	fr.lastFrame = f
  1782  	if fr.AllowIllegalReads {
  1783  		return nil
  1784  	}
  1785  
  1786  	fh := f.Header()
  1787  	if fr.lastHeaderStream != 0 {
  1788  		if fh.Type != http2FrameContinuation {
  1789  			return fr.connError(http2ErrCodeProtocol,
  1790  				fmt.Sprintf("got %s for stream %d; expected CONTINUATION following %s for stream %d",
  1791  					fh.Type, fh.StreamID,
  1792  					last.Header().Type, fr.lastHeaderStream))
  1793  		}
  1794  		if fh.StreamID != fr.lastHeaderStream {
  1795  			return fr.connError(http2ErrCodeProtocol,
  1796  				fmt.Sprintf("got CONTINUATION for stream %d; expected stream %d",
  1797  					fh.StreamID, fr.lastHeaderStream))
  1798  		}
  1799  	} else if fh.Type == http2FrameContinuation {
  1800  		return fr.connError(http2ErrCodeProtocol, fmt.Sprintf("unexpected CONTINUATION for stream %d", fh.StreamID))
  1801  	}
  1802  
  1803  	switch fh.Type {
  1804  	case http2FrameHeaders, http2FrameContinuation:
  1805  		if fh.Flags.Has(http2FlagHeadersEndHeaders) {
  1806  			fr.lastHeaderStream = 0
  1807  		} else {
  1808  			fr.lastHeaderStream = fh.StreamID
  1809  		}
  1810  	}
  1811  
  1812  	return nil
  1813  }
  1814  
  1815  // A DataFrame conveys arbitrary, variable-length sequences of octets
  1816  // associated with a stream.
  1817  // See http://http2.github.io/http2-spec/#rfc.section.6.1
  1818  type http2DataFrame struct {
  1819  	http2FrameHeader
  1820  	data []byte
  1821  }
  1822  
  1823  func (f *http2DataFrame) StreamEnded() bool {
  1824  	return f.http2FrameHeader.Flags.Has(http2FlagDataEndStream)
  1825  }
  1826  
  1827  // Data returns the frame's data octets, not including any padding
  1828  // size byte or padding suffix bytes.
  1829  // The caller must not retain the returned memory past the next
  1830  // call to ReadFrame.
  1831  func (f *http2DataFrame) Data() []byte {
  1832  	f.checkValid()
  1833  	return f.data
  1834  }
  1835  
  1836  func http2parseDataFrame(fc *http2frameCache, fh http2FrameHeader, payload []byte) (http2Frame, error) {
  1837  	if fh.StreamID == 0 {
  1838  		// DATA frames MUST be associated with a stream. If a
  1839  		// DATA frame is received whose stream identifier
  1840  		// field is 0x0, the recipient MUST respond with a
  1841  		// connection error (Section 5.4.1) of type
  1842  		// PROTOCOL_ERROR.
  1843  		return nil, http2connError{http2ErrCodeProtocol, "DATA frame with stream ID 0"}
  1844  	}
  1845  	f := fc.getDataFrame()
  1846  	f.http2FrameHeader = fh
  1847  
  1848  	var padSize byte
  1849  	if fh.Flags.Has(http2FlagDataPadded) {
  1850  		var err error
  1851  		payload, padSize, err = http2readByte(payload)
  1852  		if err != nil {
  1853  			return nil, err
  1854  		}
  1855  	}
  1856  	if int(padSize) > len(payload) {
  1857  		// If the length of the padding is greater than the
  1858  		// length of the frame payload, the recipient MUST
  1859  		// treat this as a connection error.
  1860  		// Filed: https://github.com/http2/http2-spec/issues/610
  1861  		return nil, http2connError{http2ErrCodeProtocol, "pad size larger than data payload"}
  1862  	}
  1863  	f.data = payload[:len(payload)-int(padSize)]
  1864  	return f, nil
  1865  }
  1866  
  1867  var (
  1868  	http2errStreamID    = errors.New("invalid stream ID")
  1869  	http2errDepStreamID = errors.New("invalid dependent stream ID")
  1870  	http2errPadLength   = errors.New("pad length too large")
  1871  	http2errPadBytes    = errors.New("padding bytes must all be zeros unless AllowIllegalWrites is enabled")
  1872  )
  1873  
  1874  func http2validStreamIDOrZero(streamID uint32) bool {
  1875  	return streamID&(1<<31) == 0
  1876  }
  1877  
  1878  func http2validStreamID(streamID uint32) bool {
  1879  	return streamID != 0 && streamID&(1<<31) == 0
  1880  }
  1881  
  1882  // WriteData writes a DATA frame.
  1883  //
  1884  // It will perform exactly one Write to the underlying Writer.
  1885  // It is the caller's responsibility not to violate the maximum frame size
  1886  // and to not call other Write methods concurrently.
  1887  func (f *http2Framer) WriteData(streamID uint32, endStream bool, data []byte) error {
  1888  	return f.WriteDataPadded(streamID, endStream, data, nil)
  1889  }
  1890  
  1891  // WriteDataPadded writes a DATA frame with optional padding.
  1892  //
  1893  // If pad is nil, the padding bit is not sent.
  1894  // The length of pad must not exceed 255 bytes.
  1895  // The bytes of pad must all be zero, unless f.AllowIllegalWrites is set.
  1896  //
  1897  // It will perform exactly one Write to the underlying Writer.
  1898  // It is the caller's responsibility not to violate the maximum frame size
  1899  // and to not call other Write methods concurrently.
  1900  func (f *http2Framer) WriteDataPadded(streamID uint32, endStream bool, data, pad []byte) error {
  1901  	if !http2validStreamID(streamID) && !f.AllowIllegalWrites {
  1902  		return http2errStreamID
  1903  	}
  1904  	if len(pad) > 0 {
  1905  		if len(pad) > 255 {
  1906  			return http2errPadLength
  1907  		}
  1908  		if !f.AllowIllegalWrites {
  1909  			for _, b := range pad {
  1910  				if b != 0 {
  1911  					// "Padding octets MUST be set to zero when sending."
  1912  					return http2errPadBytes
  1913  				}
  1914  			}
  1915  		}
  1916  	}
  1917  	var flags http2Flags
  1918  	if endStream {
  1919  		flags |= http2FlagDataEndStream
  1920  	}
  1921  	if pad != nil {
  1922  		flags |= http2FlagDataPadded
  1923  	}
  1924  	f.startWrite(http2FrameData, flags, streamID)
  1925  	if pad != nil {
  1926  		f.wbuf = append(f.wbuf, byte(len(pad)))
  1927  	}
  1928  	f.wbuf = append(f.wbuf, data...)
  1929  	f.wbuf = append(f.wbuf, pad...)
  1930  	return f.endWrite()
  1931  }
  1932  
  1933  // A SettingsFrame conveys configuration parameters that affect how
  1934  // endpoints communicate, such as preferences and constraints on peer
  1935  // behavior.
  1936  //
  1937  // See http://http2.github.io/http2-spec/#SETTINGS
  1938  type http2SettingsFrame struct {
  1939  	http2FrameHeader
  1940  	p []byte
  1941  }
  1942  
  1943  func http2parseSettingsFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  1944  	if fh.Flags.Has(http2FlagSettingsAck) && fh.Length > 0 {
  1945  		// When this (ACK 0x1) bit is set, the payload of the
  1946  		// SETTINGS frame MUST be empty. Receipt of a
  1947  		// SETTINGS frame with the ACK flag set and a length
  1948  		// field value other than 0 MUST be treated as a
  1949  		// connection error (Section 5.4.1) of type
  1950  		// FRAME_SIZE_ERROR.
  1951  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  1952  	}
  1953  	if fh.StreamID != 0 {
  1954  		// SETTINGS frames always apply to a connection,
  1955  		// never a single stream. The stream identifier for a
  1956  		// SETTINGS frame MUST be zero (0x0).  If an endpoint
  1957  		// receives a SETTINGS frame whose stream identifier
  1958  		// field is anything other than 0x0, the endpoint MUST
  1959  		// respond with a connection error (Section 5.4.1) of
  1960  		// type PROTOCOL_ERROR.
  1961  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  1962  	}
  1963  	if len(p)%6 != 0 {
  1964  		// Expecting even number of 6 byte settings.
  1965  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  1966  	}
  1967  	f := &http2SettingsFrame{http2FrameHeader: fh, p: p}
  1968  	if v, ok := f.Value(http2SettingInitialWindowSize); ok && v > (1<<31)-1 {
  1969  		// Values above the maximum flow control window size of 2^31 - 1 MUST
  1970  		// be treated as a connection error (Section 5.4.1) of type
  1971  		// FLOW_CONTROL_ERROR.
  1972  		return nil, http2ConnectionError(http2ErrCodeFlowControl)
  1973  	}
  1974  	return f, nil
  1975  }
  1976  
  1977  func (f *http2SettingsFrame) IsAck() bool {
  1978  	return f.http2FrameHeader.Flags.Has(http2FlagSettingsAck)
  1979  }
  1980  
  1981  func (f *http2SettingsFrame) Value(id http2SettingID) (v uint32, ok bool) {
  1982  	f.checkValid()
  1983  	for i := 0; i < f.NumSettings(); i++ {
  1984  		if s := f.Setting(i); s.ID == id {
  1985  			return s.Val, true
  1986  		}
  1987  	}
  1988  	return 0, false
  1989  }
  1990  
  1991  // Setting returns the setting from the frame at the given 0-based index.
  1992  // The index must be >= 0 and less than f.NumSettings().
  1993  func (f *http2SettingsFrame) Setting(i int) http2Setting {
  1994  	buf := f.p
  1995  	return http2Setting{
  1996  		ID:  http2SettingID(binary.BigEndian.Uint16(buf[i*6 : i*6+2])),
  1997  		Val: binary.BigEndian.Uint32(buf[i*6+2 : i*6+6]),
  1998  	}
  1999  }
  2000  
  2001  func (f *http2SettingsFrame) NumSettings() int { return len(f.p) / 6 }
  2002  
  2003  // HasDuplicates reports whether f contains any duplicate setting IDs.
  2004  func (f *http2SettingsFrame) HasDuplicates() bool {
  2005  	num := f.NumSettings()
  2006  	if num == 0 {
  2007  		return false
  2008  	}
  2009  	// If it's small enough (the common case), just do the n^2
  2010  	// thing and avoid a map allocation.
  2011  	if num < 10 {
  2012  		for i := 0; i < num; i++ {
  2013  			idi := f.Setting(i).ID
  2014  			for j := i + 1; j < num; j++ {
  2015  				idj := f.Setting(j).ID
  2016  				if idi == idj {
  2017  					return true
  2018  				}
  2019  			}
  2020  		}
  2021  		return false
  2022  	}
  2023  	seen := map[http2SettingID]bool{}
  2024  	for i := 0; i < num; i++ {
  2025  		id := f.Setting(i).ID
  2026  		if seen[id] {
  2027  			return true
  2028  		}
  2029  		seen[id] = true
  2030  	}
  2031  	return false
  2032  }
  2033  
  2034  // ForeachSetting runs fn for each setting.
  2035  // It stops and returns the first error.
  2036  func (f *http2SettingsFrame) ForeachSetting(fn func(http2Setting) error) error {
  2037  	f.checkValid()
  2038  	for i := 0; i < f.NumSettings(); i++ {
  2039  		if err := fn(f.Setting(i)); err != nil {
  2040  			return err
  2041  		}
  2042  	}
  2043  	return nil
  2044  }
  2045  
  2046  // WriteSettings writes a SETTINGS frame with zero or more settings
  2047  // specified and the ACK bit not set.
  2048  //
  2049  // It will perform exactly one Write to the underlying Writer.
  2050  // It is the caller's responsibility to not call other Write methods concurrently.
  2051  func (f *http2Framer) WriteSettings(settings ...http2Setting) error {
  2052  	f.startWrite(http2FrameSettings, 0, 0)
  2053  	for _, s := range settings {
  2054  		f.writeUint16(uint16(s.ID))
  2055  		f.writeUint32(s.Val)
  2056  	}
  2057  	return f.endWrite()
  2058  }
  2059  
  2060  // WriteSettingsAck writes an empty SETTINGS frame with the ACK bit set.
  2061  //
  2062  // It will perform exactly one Write to the underlying Writer.
  2063  // It is the caller's responsibility to not call other Write methods concurrently.
  2064  func (f *http2Framer) WriteSettingsAck() error {
  2065  	f.startWrite(http2FrameSettings, http2FlagSettingsAck, 0)
  2066  	return f.endWrite()
  2067  }
  2068  
  2069  // A PingFrame is a mechanism for measuring a minimal round trip time
  2070  // from the sender, as well as determining whether an idle connection
  2071  // is still functional.
  2072  // See http://http2.github.io/http2-spec/#rfc.section.6.7
  2073  type http2PingFrame struct {
  2074  	http2FrameHeader
  2075  	Data [8]byte
  2076  }
  2077  
  2078  func (f *http2PingFrame) IsAck() bool { return f.Flags.Has(http2FlagPingAck) }
  2079  
  2080  func http2parsePingFrame(_ *http2frameCache, fh http2FrameHeader, payload []byte) (http2Frame, error) {
  2081  	if len(payload) != 8 {
  2082  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  2083  	}
  2084  	if fh.StreamID != 0 {
  2085  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  2086  	}
  2087  	f := &http2PingFrame{http2FrameHeader: fh}
  2088  	copy(f.Data[:], payload)
  2089  	return f, nil
  2090  }
  2091  
  2092  func (f *http2Framer) WritePing(ack bool, data [8]byte) error {
  2093  	var flags http2Flags
  2094  	if ack {
  2095  		flags = http2FlagPingAck
  2096  	}
  2097  	f.startWrite(http2FramePing, flags, 0)
  2098  	f.writeBytes(data[:])
  2099  	return f.endWrite()
  2100  }
  2101  
  2102  // A GoAwayFrame informs the remote peer to stop creating streams on this connection.
  2103  // See http://http2.github.io/http2-spec/#rfc.section.6.8
  2104  type http2GoAwayFrame struct {
  2105  	http2FrameHeader
  2106  	LastStreamID uint32
  2107  	ErrCode      http2ErrCode
  2108  	debugData    []byte
  2109  }
  2110  
  2111  // DebugData returns any debug data in the GOAWAY frame. Its contents
  2112  // are not defined.
  2113  // The caller must not retain the returned memory past the next
  2114  // call to ReadFrame.
  2115  func (f *http2GoAwayFrame) DebugData() []byte {
  2116  	f.checkValid()
  2117  	return f.debugData
  2118  }
  2119  
  2120  func http2parseGoAwayFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  2121  	if fh.StreamID != 0 {
  2122  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  2123  	}
  2124  	if len(p) < 8 {
  2125  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  2126  	}
  2127  	return &http2GoAwayFrame{
  2128  		http2FrameHeader: fh,
  2129  		LastStreamID:     binary.BigEndian.Uint32(p[:4]) & (1<<31 - 1),
  2130  		ErrCode:          http2ErrCode(binary.BigEndian.Uint32(p[4:8])),
  2131  		debugData:        p[8:],
  2132  	}, nil
  2133  }
  2134  
  2135  func (f *http2Framer) WriteGoAway(maxStreamID uint32, code http2ErrCode, debugData []byte) error {
  2136  	f.startWrite(http2FrameGoAway, 0, 0)
  2137  	f.writeUint32(maxStreamID & (1<<31 - 1))
  2138  	f.writeUint32(uint32(code))
  2139  	f.writeBytes(debugData)
  2140  	return f.endWrite()
  2141  }
  2142  
  2143  // An UnknownFrame is the frame type returned when the frame type is unknown
  2144  // or no specific frame type parser exists.
  2145  type http2UnknownFrame struct {
  2146  	http2FrameHeader
  2147  	p []byte
  2148  }
  2149  
  2150  // Payload returns the frame's payload (after the header).  It is not
  2151  // valid to call this method after a subsequent call to
  2152  // Framer.ReadFrame, nor is it valid to retain the returned slice.
  2153  // The memory is owned by the Framer and is invalidated when the next
  2154  // frame is read.
  2155  func (f *http2UnknownFrame) Payload() []byte {
  2156  	f.checkValid()
  2157  	return f.p
  2158  }
  2159  
  2160  func http2parseUnknownFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  2161  	return &http2UnknownFrame{fh, p}, nil
  2162  }
  2163  
  2164  // A WindowUpdateFrame is used to implement flow control.
  2165  // See http://http2.github.io/http2-spec/#rfc.section.6.9
  2166  type http2WindowUpdateFrame struct {
  2167  	http2FrameHeader
  2168  	Increment uint32 // never read with high bit set
  2169  }
  2170  
  2171  func http2parseWindowUpdateFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  2172  	if len(p) != 4 {
  2173  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  2174  	}
  2175  	inc := binary.BigEndian.Uint32(p[:4]) & 0x7fffffff // mask off high reserved bit
  2176  	if inc == 0 {
  2177  		// A receiver MUST treat the receipt of a
  2178  		// WINDOW_UPDATE frame with an flow control window
  2179  		// increment of 0 as a stream error (Section 5.4.2) of
  2180  		// type PROTOCOL_ERROR; errors on the connection flow
  2181  		// control window MUST be treated as a connection
  2182  		// error (Section 5.4.1).
  2183  		if fh.StreamID == 0 {
  2184  			return nil, http2ConnectionError(http2ErrCodeProtocol)
  2185  		}
  2186  		return nil, http2streamError(fh.StreamID, http2ErrCodeProtocol)
  2187  	}
  2188  	return &http2WindowUpdateFrame{
  2189  		http2FrameHeader: fh,
  2190  		Increment:        inc,
  2191  	}, nil
  2192  }
  2193  
  2194  // WriteWindowUpdate writes a WINDOW_UPDATE frame.
  2195  // The increment value must be between 1 and 2,147,483,647, inclusive.
  2196  // If the Stream ID is zero, the window update applies to the
  2197  // connection as a whole.
  2198  func (f *http2Framer) WriteWindowUpdate(streamID, incr uint32) error {
  2199  	// "The legal range for the increment to the flow control window is 1 to 2^31-1 (2,147,483,647) octets."
  2200  	if (incr < 1 || incr > 2147483647) && !f.AllowIllegalWrites {
  2201  		return errors.New("illegal window increment value")
  2202  	}
  2203  	f.startWrite(http2FrameWindowUpdate, 0, streamID)
  2204  	f.writeUint32(incr)
  2205  	return f.endWrite()
  2206  }
  2207  
  2208  // A HeadersFrame is used to open a stream and additionally carries a
  2209  // header block fragment.
  2210  type http2HeadersFrame struct {
  2211  	http2FrameHeader
  2212  
  2213  	// Priority is set if FlagHeadersPriority is set in the FrameHeader.
  2214  	Priority http2PriorityParam
  2215  
  2216  	headerFragBuf []byte // not owned
  2217  }
  2218  
  2219  func (f *http2HeadersFrame) HeaderBlockFragment() []byte {
  2220  	f.checkValid()
  2221  	return f.headerFragBuf
  2222  }
  2223  
  2224  func (f *http2HeadersFrame) HeadersEnded() bool {
  2225  	return f.http2FrameHeader.Flags.Has(http2FlagHeadersEndHeaders)
  2226  }
  2227  
  2228  func (f *http2HeadersFrame) StreamEnded() bool {
  2229  	return f.http2FrameHeader.Flags.Has(http2FlagHeadersEndStream)
  2230  }
  2231  
  2232  func (f *http2HeadersFrame) HasPriority() bool {
  2233  	return f.http2FrameHeader.Flags.Has(http2FlagHeadersPriority)
  2234  }
  2235  
  2236  func http2parseHeadersFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (_ http2Frame, err error) {
  2237  	hf := &http2HeadersFrame{
  2238  		http2FrameHeader: fh,
  2239  	}
  2240  	if fh.StreamID == 0 {
  2241  		// HEADERS frames MUST be associated with a stream. If a HEADERS frame
  2242  		// is received whose stream identifier field is 0x0, the recipient MUST
  2243  		// respond with a connection error (Section 5.4.1) of type
  2244  		// PROTOCOL_ERROR.
  2245  		return nil, http2connError{http2ErrCodeProtocol, "HEADERS frame with stream ID 0"}
  2246  	}
  2247  	var padLength uint8
  2248  	if fh.Flags.Has(http2FlagHeadersPadded) {
  2249  		if p, padLength, err = http2readByte(p); err != nil {
  2250  			return
  2251  		}
  2252  	}
  2253  	if fh.Flags.Has(http2FlagHeadersPriority) {
  2254  		var v uint32
  2255  		p, v, err = http2readUint32(p)
  2256  		if err != nil {
  2257  			return nil, err
  2258  		}
  2259  		hf.Priority.StreamDep = v & 0x7fffffff
  2260  		hf.Priority.Exclusive = (v != hf.Priority.StreamDep) // high bit was set
  2261  		p, hf.Priority.Weight, err = http2readByte(p)
  2262  		if err != nil {
  2263  			return nil, err
  2264  		}
  2265  	}
  2266  	if len(p)-int(padLength) <= 0 {
  2267  		return nil, http2streamError(fh.StreamID, http2ErrCodeProtocol)
  2268  	}
  2269  	hf.headerFragBuf = p[:len(p)-int(padLength)]
  2270  	return hf, nil
  2271  }
  2272  
  2273  // HeadersFrameParam are the parameters for writing a HEADERS frame.
  2274  type http2HeadersFrameParam struct {
  2275  	// StreamID is the required Stream ID to initiate.
  2276  	StreamID uint32
  2277  	// BlockFragment is part (or all) of a Header Block.
  2278  	BlockFragment []byte
  2279  
  2280  	// EndStream indicates that the header block is the last that
  2281  	// the endpoint will send for the identified stream. Setting
  2282  	// this flag causes the stream to enter one of "half closed"
  2283  	// states.
  2284  	EndStream bool
  2285  
  2286  	// EndHeaders indicates that this frame contains an entire
  2287  	// header block and is not followed by any
  2288  	// CONTINUATION frames.
  2289  	EndHeaders bool
  2290  
  2291  	// PadLength is the optional number of bytes of zeros to add
  2292  	// to this frame.
  2293  	PadLength uint8
  2294  
  2295  	// Priority, if non-zero, includes stream priority information
  2296  	// in the HEADER frame.
  2297  	Priority http2PriorityParam
  2298  }
  2299  
  2300  // WriteHeaders writes a single HEADERS frame.
  2301  //
  2302  // This is a low-level header writing method. Encoding headers and
  2303  // splitting them into any necessary CONTINUATION frames is handled
  2304  // elsewhere.
  2305  //
  2306  // It will perform exactly one Write to the underlying Writer.
  2307  // It is the caller's responsibility to not call other Write methods concurrently.
  2308  func (f *http2Framer) WriteHeaders(p http2HeadersFrameParam) error {
  2309  	if !http2validStreamID(p.StreamID) && !f.AllowIllegalWrites {
  2310  		return http2errStreamID
  2311  	}
  2312  	var flags http2Flags
  2313  	if p.PadLength != 0 {
  2314  		flags |= http2FlagHeadersPadded
  2315  	}
  2316  	if p.EndStream {
  2317  		flags |= http2FlagHeadersEndStream
  2318  	}
  2319  	if p.EndHeaders {
  2320  		flags |= http2FlagHeadersEndHeaders
  2321  	}
  2322  	if !p.Priority.IsZero() {
  2323  		flags |= http2FlagHeadersPriority
  2324  	}
  2325  	f.startWrite(http2FrameHeaders, flags, p.StreamID)
  2326  	if p.PadLength != 0 {
  2327  		f.writeByte(p.PadLength)
  2328  	}
  2329  	if !p.Priority.IsZero() {
  2330  		v := p.Priority.StreamDep
  2331  		if !http2validStreamIDOrZero(v) && !f.AllowIllegalWrites {
  2332  			return http2errDepStreamID
  2333  		}
  2334  		if p.Priority.Exclusive {
  2335  			v |= 1 << 31
  2336  		}
  2337  		f.writeUint32(v)
  2338  		f.writeByte(p.Priority.Weight)
  2339  	}
  2340  	f.wbuf = append(f.wbuf, p.BlockFragment...)
  2341  	f.wbuf = append(f.wbuf, http2padZeros[:p.PadLength]...)
  2342  	return f.endWrite()
  2343  }
  2344  
  2345  // A PriorityFrame specifies the sender-advised priority of a stream.
  2346  // See http://http2.github.io/http2-spec/#rfc.section.6.3
  2347  type http2PriorityFrame struct {
  2348  	http2FrameHeader
  2349  	http2PriorityParam
  2350  }
  2351  
  2352  // PriorityParam are the stream prioritzation parameters.
  2353  type http2PriorityParam struct {
  2354  	// StreamDep is a 31-bit stream identifier for the
  2355  	// stream that this stream depends on. Zero means no
  2356  	// dependency.
  2357  	StreamDep uint32
  2358  
  2359  	// Exclusive is whether the dependency is exclusive.
  2360  	Exclusive bool
  2361  
  2362  	// Weight is the stream's zero-indexed weight. It should be
  2363  	// set together with StreamDep, or neither should be set. Per
  2364  	// the spec, "Add one to the value to obtain a weight between
  2365  	// 1 and 256."
  2366  	Weight uint8
  2367  }
  2368  
  2369  func (p http2PriorityParam) IsZero() bool {
  2370  	return p == http2PriorityParam{}
  2371  }
  2372  
  2373  func http2parsePriorityFrame(_ *http2frameCache, fh http2FrameHeader, payload []byte) (http2Frame, error) {
  2374  	if fh.StreamID == 0 {
  2375  		return nil, http2connError{http2ErrCodeProtocol, "PRIORITY frame with stream ID 0"}
  2376  	}
  2377  	if len(payload) != 5 {
  2378  		return nil, http2connError{http2ErrCodeFrameSize, fmt.Sprintf("PRIORITY frame payload size was %d; want 5", len(payload))}
  2379  	}
  2380  	v := binary.BigEndian.Uint32(payload[:4])
  2381  	streamID := v & 0x7fffffff // mask off high bit
  2382  	return &http2PriorityFrame{
  2383  		http2FrameHeader: fh,
  2384  		http2PriorityParam: http2PriorityParam{
  2385  			Weight:    payload[4],
  2386  			StreamDep: streamID,
  2387  			Exclusive: streamID != v, // was high bit set?
  2388  		},
  2389  	}, nil
  2390  }
  2391  
  2392  // WritePriority writes a PRIORITY frame.
  2393  //
  2394  // It will perform exactly one Write to the underlying Writer.
  2395  // It is the caller's responsibility to not call other Write methods concurrently.
  2396  func (f *http2Framer) WritePriority(streamID uint32, p http2PriorityParam) error {
  2397  	if !http2validStreamID(streamID) && !f.AllowIllegalWrites {
  2398  		return http2errStreamID
  2399  	}
  2400  	if !http2validStreamIDOrZero(p.StreamDep) {
  2401  		return http2errDepStreamID
  2402  	}
  2403  	f.startWrite(http2FramePriority, 0, streamID)
  2404  	v := p.StreamDep
  2405  	if p.Exclusive {
  2406  		v |= 1 << 31
  2407  	}
  2408  	f.writeUint32(v)
  2409  	f.writeByte(p.Weight)
  2410  	return f.endWrite()
  2411  }
  2412  
  2413  // A RSTStreamFrame allows for abnormal termination of a stream.
  2414  // See http://http2.github.io/http2-spec/#rfc.section.6.4
  2415  type http2RSTStreamFrame struct {
  2416  	http2FrameHeader
  2417  	ErrCode http2ErrCode
  2418  }
  2419  
  2420  func http2parseRSTStreamFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  2421  	if len(p) != 4 {
  2422  		return nil, http2ConnectionError(http2ErrCodeFrameSize)
  2423  	}
  2424  	if fh.StreamID == 0 {
  2425  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  2426  	}
  2427  	return &http2RSTStreamFrame{fh, http2ErrCode(binary.BigEndian.Uint32(p[:4]))}, nil
  2428  }
  2429  
  2430  // WriteRSTStream writes a RST_STREAM frame.
  2431  //
  2432  // It will perform exactly one Write to the underlying Writer.
  2433  // It is the caller's responsibility to not call other Write methods concurrently.
  2434  func (f *http2Framer) WriteRSTStream(streamID uint32, code http2ErrCode) error {
  2435  	if !http2validStreamID(streamID) && !f.AllowIllegalWrites {
  2436  		return http2errStreamID
  2437  	}
  2438  	f.startWrite(http2FrameRSTStream, 0, streamID)
  2439  	f.writeUint32(uint32(code))
  2440  	return f.endWrite()
  2441  }
  2442  
  2443  // A ContinuationFrame is used to continue a sequence of header block fragments.
  2444  // See http://http2.github.io/http2-spec/#rfc.section.6.10
  2445  type http2ContinuationFrame struct {
  2446  	http2FrameHeader
  2447  	headerFragBuf []byte
  2448  }
  2449  
  2450  func http2parseContinuationFrame(_ *http2frameCache, fh http2FrameHeader, p []byte) (http2Frame, error) {
  2451  	if fh.StreamID == 0 {
  2452  		return nil, http2connError{http2ErrCodeProtocol, "CONTINUATION frame with stream ID 0"}
  2453  	}
  2454  	return &http2ContinuationFrame{fh, p}, nil
  2455  }
  2456  
  2457  func (f *http2ContinuationFrame) HeaderBlockFragment() []byte {
  2458  	f.checkValid()
  2459  	return f.headerFragBuf
  2460  }
  2461  
  2462  func (f *http2ContinuationFrame) HeadersEnded() bool {
  2463  	return f.http2FrameHeader.Flags.Has(http2FlagContinuationEndHeaders)
  2464  }
  2465  
  2466  // WriteContinuation writes a CONTINUATION frame.
  2467  //
  2468  // It will perform exactly one Write to the underlying Writer.
  2469  // It is the caller's responsibility to not call other Write methods concurrently.
  2470  func (f *http2Framer) WriteContinuation(streamID uint32, endHeaders bool, headerBlockFragment []byte) error {
  2471  	if !http2validStreamID(streamID) && !f.AllowIllegalWrites {
  2472  		return http2errStreamID
  2473  	}
  2474  	var flags http2Flags
  2475  	if endHeaders {
  2476  		flags |= http2FlagContinuationEndHeaders
  2477  	}
  2478  	f.startWrite(http2FrameContinuation, flags, streamID)
  2479  	f.wbuf = append(f.wbuf, headerBlockFragment...)
  2480  	return f.endWrite()
  2481  }
  2482  
  2483  // A PushPromiseFrame is used to initiate a server stream.
  2484  // See http://http2.github.io/http2-spec/#rfc.section.6.6
  2485  type http2PushPromiseFrame struct {
  2486  	http2FrameHeader
  2487  	PromiseID     uint32
  2488  	headerFragBuf []byte // not owned
  2489  }
  2490  
  2491  func (f *http2PushPromiseFrame) HeaderBlockFragment() []byte {
  2492  	f.checkValid()
  2493  	return f.headerFragBuf
  2494  }
  2495  
  2496  func (f *http2PushPromiseFrame) HeadersEnded() bool {
  2497  	return f.http2FrameHeader.Flags.Has(http2FlagPushPromiseEndHeaders)
  2498  }
  2499  
  2500  func http2parsePushPromise(_ *http2frameCache, fh http2FrameHeader, p []byte) (_ http2Frame, err error) {
  2501  	pp := &http2PushPromiseFrame{
  2502  		http2FrameHeader: fh,
  2503  	}
  2504  	if pp.StreamID == 0 {
  2505  		// PUSH_PROMISE frames MUST be associated with an existing,
  2506  		// peer-initiated stream. The stream identifier of a
  2507  		// PUSH_PROMISE frame indicates the stream it is associated
  2508  		// with. If the stream identifier field specifies the value
  2509  		// 0x0, a recipient MUST respond with a connection error
  2510  		// (Section 5.4.1) of type PROTOCOL_ERROR.
  2511  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  2512  	}
  2513  	// The PUSH_PROMISE frame includes optional padding.
  2514  	// Padding fields and flags are identical to those defined for DATA frames
  2515  	var padLength uint8
  2516  	if fh.Flags.Has(http2FlagPushPromisePadded) {
  2517  		if p, padLength, err = http2readByte(p); err != nil {
  2518  			return
  2519  		}
  2520  	}
  2521  
  2522  	p, pp.PromiseID, err = http2readUint32(p)
  2523  	if err != nil {
  2524  		return
  2525  	}
  2526  	pp.PromiseID = pp.PromiseID & (1<<31 - 1)
  2527  
  2528  	if int(padLength) > len(p) {
  2529  		// like the DATA frame, error out if padding is longer than the body.
  2530  		return nil, http2ConnectionError(http2ErrCodeProtocol)
  2531  	}
  2532  	pp.headerFragBuf = p[:len(p)-int(padLength)]
  2533  	return pp, nil
  2534  }
  2535  
  2536  // PushPromiseParam are the parameters for writing a PUSH_PROMISE frame.
  2537  type http2PushPromiseParam struct {
  2538  	// StreamID is the required Stream ID to initiate.
  2539  	StreamID uint32
  2540  
  2541  	// PromiseID is the required Stream ID which this
  2542  	// Push Promises
  2543  	PromiseID uint32
  2544  
  2545  	// BlockFragment is part (or all) of a Header Block.
  2546  	BlockFragment []byte
  2547  
  2548  	// EndHeaders indicates that this frame contains an entire
  2549  	// header block and is not followed by any
  2550  	// CONTINUATION frames.
  2551  	EndHeaders bool
  2552  
  2553  	// PadLength is the optional number of bytes of zeros to add
  2554  	// to this frame.
  2555  	PadLength uint8
  2556  }
  2557  
  2558  // WritePushPromise writes a single PushPromise Frame.
  2559  //
  2560  // As with Header Frames, This is the low level call for writing
  2561  // individual frames. Continuation frames are handled elsewhere.
  2562  //
  2563  // It will perform exactly one Write to the underlying Writer.
  2564  // It is the caller's responsibility to not call other Write methods concurrently.
  2565  func (f *http2Framer) WritePushPromise(p http2PushPromiseParam) error {
  2566  	if !http2validStreamID(p.StreamID) && !f.AllowIllegalWrites {
  2567  		return http2errStreamID
  2568  	}
  2569  	var flags http2Flags
  2570  	if p.PadLength != 0 {
  2571  		flags |= http2FlagPushPromisePadded
  2572  	}
  2573  	if p.EndHeaders {
  2574  		flags |= http2FlagPushPromiseEndHeaders
  2575  	}
  2576  	f.startWrite(http2FramePushPromise, flags, p.StreamID)
  2577  	if p.PadLength != 0 {
  2578  		f.writeByte(p.PadLength)
  2579  	}
  2580  	if !http2validStreamID(p.PromiseID) && !f.AllowIllegalWrites {
  2581  		return http2errStreamID
  2582  	}
  2583  	f.writeUint32(p.PromiseID)
  2584  	f.wbuf = append(f.wbuf, p.BlockFragment...)
  2585  	f.wbuf = append(f.wbuf, http2padZeros[:p.PadLength]...)
  2586  	return f.endWrite()
  2587  }
  2588  
  2589  // WriteRawFrame writes a raw frame. This can be used to write
  2590  // extension frames unknown to this package.
  2591  func (f *http2Framer) WriteRawFrame(t http2FrameType, flags http2Flags, streamID uint32, payload []byte) error {
  2592  	f.startWrite(t, flags, streamID)
  2593  	f.writeBytes(payload)
  2594  	return f.endWrite()
  2595  }
  2596  
  2597  func http2readByte(p []byte) (remain []byte, b byte, err error) {
  2598  	if len(p) == 0 {
  2599  		return nil, 0, io.ErrUnexpectedEOF
  2600  	}
  2601  	return p[1:], p[0], nil
  2602  }
  2603  
  2604  func http2readUint32(p []byte) (remain []byte, v uint32, err error) {
  2605  	if len(p) < 4 {
  2606  		return nil, 0, io.ErrUnexpectedEOF
  2607  	}
  2608  	return p[4:], binary.BigEndian.Uint32(p[:4]), nil
  2609  }
  2610  
  2611  type http2streamEnder interface {
  2612  	StreamEnded() bool
  2613  }
  2614  
  2615  type http2headersEnder interface {
  2616  	HeadersEnded() bool
  2617  }
  2618  
  2619  type http2headersOrContinuation interface {
  2620  	http2headersEnder
  2621  	HeaderBlockFragment() []byte
  2622  }
  2623  
  2624  // A MetaHeadersFrame is the representation of one HEADERS frame and
  2625  // zero or more contiguous CONTINUATION frames and the decoding of
  2626  // their HPACK-encoded contents.
  2627  //
  2628  // This type of frame does not appear on the wire and is only returned
  2629  // by the Framer when Framer.ReadMetaHeaders is set.
  2630  type http2MetaHeadersFrame struct {
  2631  	*http2HeadersFrame
  2632  
  2633  	// Fields are the fields contained in the HEADERS and
  2634  	// CONTINUATION frames. The underlying slice is owned by the
  2635  	// Framer and must not be retained after the next call to
  2636  	// ReadFrame.
  2637  	//
  2638  	// Fields are guaranteed to be in the correct http2 order and
  2639  	// not have unknown pseudo header fields or invalid header
  2640  	// field names or values. Required pseudo header fields may be
  2641  	// missing, however. Use the MetaHeadersFrame.Pseudo accessor
  2642  	// method access pseudo headers.
  2643  	Fields []hpack.HeaderField
  2644  
  2645  	// Truncated is whether the max header list size limit was hit
  2646  	// and Fields is incomplete. The hpack decoder state is still
  2647  	// valid, however.
  2648  	Truncated bool
  2649  }
  2650  
  2651  // PseudoValue returns the given pseudo header field's value.
  2652  // The provided pseudo field should not contain the leading colon.
  2653  func (mh *http2MetaHeadersFrame) PseudoValue(pseudo string) string {
  2654  	for _, hf := range mh.Fields {
  2655  		if !hf.IsPseudo() {
  2656  			return ""
  2657  		}
  2658  		if hf.Name[1:] == pseudo {
  2659  			return hf.Value
  2660  		}
  2661  	}
  2662  	return ""
  2663  }
  2664  
  2665  // RegularFields returns the regular (non-pseudo) header fields of mh.
  2666  // The caller does not own the returned slice.
  2667  func (mh *http2MetaHeadersFrame) RegularFields() []hpack.HeaderField {
  2668  	for i, hf := range mh.Fields {
  2669  		if !hf.IsPseudo() {
  2670  			return mh.Fields[i:]
  2671  		}
  2672  	}
  2673  	return nil
  2674  }
  2675  
  2676  // PseudoFields returns the pseudo header fields of mh.
  2677  // The caller does not own the returned slice.
  2678  func (mh *http2MetaHeadersFrame) PseudoFields() []hpack.HeaderField {
  2679  	for i, hf := range mh.Fields {
  2680  		if !hf.IsPseudo() {
  2681  			return mh.Fields[:i]
  2682  		}
  2683  	}
  2684  	return mh.Fields
  2685  }
  2686  
  2687  func (mh *http2MetaHeadersFrame) checkPseudos() error {
  2688  	var isRequest, isResponse bool
  2689  	pf := mh.PseudoFields()
  2690  	for i, hf := range pf {
  2691  		switch hf.Name {
  2692  		case ":method", ":path", ":scheme", ":authority":
  2693  			isRequest = true
  2694  		case ":status":
  2695  			isResponse = true
  2696  		default:
  2697  			return http2pseudoHeaderError(hf.Name)
  2698  		}
  2699  		// Check for duplicates.
  2700  		// This would be a bad algorithm, but N is 4.
  2701  		// And this doesn't allocate.
  2702  		for _, hf2 := range pf[:i] {
  2703  			if hf.Name == hf2.Name {
  2704  				return http2duplicatePseudoHeaderError(hf.Name)
  2705  			}
  2706  		}
  2707  	}
  2708  	if isRequest && isResponse {
  2709  		return http2errMixPseudoHeaderTypes
  2710  	}
  2711  	return nil
  2712  }
  2713  
  2714  func (fr *http2Framer) maxHeaderStringLen() int {
  2715  	v := fr.maxHeaderListSize()
  2716  	if uint32(int(v)) == v {
  2717  		return int(v)
  2718  	}
  2719  	// They had a crazy big number for MaxHeaderBytes anyway,
  2720  	// so give them unlimited header lengths:
  2721  	return 0
  2722  }
  2723  
  2724  // readMetaFrame returns 0 or more CONTINUATION frames from fr and
  2725  // merge them into the provided hf and returns a MetaHeadersFrame
  2726  // with the decoded hpack values.
  2727  func (fr *http2Framer) readMetaFrame(hf *http2HeadersFrame) (*http2MetaHeadersFrame, error) {
  2728  	if fr.AllowIllegalReads {
  2729  		return nil, errors.New("illegal use of AllowIllegalReads with ReadMetaHeaders")
  2730  	}
  2731  	mh := &http2MetaHeadersFrame{
  2732  		http2HeadersFrame: hf,
  2733  	}
  2734  	var remainSize = fr.maxHeaderListSize()
  2735  	var sawRegular bool
  2736  
  2737  	var invalid error // pseudo header field errors
  2738  	hdec := fr.ReadMetaHeaders
  2739  	hdec.SetEmitEnabled(true)
  2740  	hdec.SetMaxStringLength(fr.maxHeaderStringLen())
  2741  	hdec.SetEmitFunc(func(hf hpack.HeaderField) {
  2742  		if http2VerboseLogs && fr.logReads {
  2743  			fr.debugReadLoggerf("http2: decoded hpack field %+v", hf)
  2744  		}
  2745  		if !httpguts.ValidHeaderFieldValue(hf.Value) {
  2746  			invalid = http2headerFieldValueError(hf.Value)
  2747  		}
  2748  		isPseudo := strings.HasPrefix(hf.Name, ":")
  2749  		if isPseudo {
  2750  			if sawRegular {
  2751  				invalid = http2errPseudoAfterRegular
  2752  			}
  2753  		} else {
  2754  			sawRegular = true
  2755  			if !http2validWireHeaderFieldName(hf.Name) {
  2756  				invalid = http2headerFieldNameError(hf.Name)
  2757  			}
  2758  		}
  2759  
  2760  		if invalid != nil {
  2761  			hdec.SetEmitEnabled(false)
  2762  			return
  2763  		}
  2764  
  2765  		size := hf.Size()
  2766  		if size > remainSize {
  2767  			hdec.SetEmitEnabled(false)
  2768  			mh.Truncated = true
  2769  			return
  2770  		}
  2771  		remainSize -= size
  2772  
  2773  		mh.Fields = append(mh.Fields, hf)
  2774  	})
  2775  	// Lose reference to MetaHeadersFrame:
  2776  	defer hdec.SetEmitFunc(func(hf hpack.HeaderField) {})
  2777  
  2778  	var hc http2headersOrContinuation = hf
  2779  	for {
  2780  		frag := hc.HeaderBlockFragment()
  2781  		if _, err := hdec.Write(frag); err != nil {
  2782  			return nil, http2ConnectionError(http2ErrCodeCompression)
  2783  		}
  2784  
  2785  		if hc.HeadersEnded() {
  2786  			break
  2787  		}
  2788  		if f, err := fr.ReadFrame(); err != nil {
  2789  			return nil, err
  2790  		} else {
  2791  			hc = f.(*http2ContinuationFrame) // guaranteed by checkFrameOrder
  2792  		}
  2793  	}
  2794  
  2795  	mh.http2HeadersFrame.headerFragBuf = nil
  2796  	mh.http2HeadersFrame.invalidate()
  2797  
  2798  	if err := hdec.Close(); err != nil {
  2799  		return nil, http2ConnectionError(http2ErrCodeCompression)
  2800  	}
  2801  	if invalid != nil {
  2802  		fr.errDetail = invalid
  2803  		if http2VerboseLogs {
  2804  			log.Printf("http2: invalid header: %v", invalid)
  2805  		}
  2806  		return nil, http2StreamError{mh.StreamID, http2ErrCodeProtocol, invalid}
  2807  	}
  2808  	if err := mh.checkPseudos(); err != nil {
  2809  		fr.errDetail = err
  2810  		if http2VerboseLogs {
  2811  			log.Printf("http2: invalid pseudo headers: %v", err)
  2812  		}
  2813  		return nil, http2StreamError{mh.StreamID, http2ErrCodeProtocol, err}
  2814  	}
  2815  	return mh, nil
  2816  }
  2817  
  2818  func http2summarizeFrame(f http2Frame) string {
  2819  	var buf bytes.Buffer
  2820  	f.Header().writeDebug(&buf)
  2821  	switch f := f.(type) {
  2822  	case *http2SettingsFrame:
  2823  		n := 0
  2824  		f.ForeachSetting(func(s http2Setting) error {
  2825  			n++
  2826  			if n == 1 {
  2827  				buf.WriteString(", settings:")
  2828  			}
  2829  			fmt.Fprintf(&buf, " %v=%v,", s.ID, s.Val)
  2830  			return nil
  2831  		})
  2832  		if n > 0 {
  2833  			buf.Truncate(buf.Len() - 1) // remove trailing comma
  2834  		}
  2835  	case *http2DataFrame:
  2836  		data := f.Data()
  2837  		const max = 256
  2838  		if len(data) > max {
  2839  			data = data[:max]
  2840  		}
  2841  		fmt.Fprintf(&buf, " data=%q", data)
  2842  		if len(f.Data()) > max {
  2843  			fmt.Fprintf(&buf, " (%d bytes omitted)", len(f.Data())-max)
  2844  		}
  2845  	case *http2WindowUpdateFrame:
  2846  		if f.StreamID == 0 {
  2847  			buf.WriteString(" (conn)")
  2848  		}
  2849  		fmt.Fprintf(&buf, " incr=%v", f.Increment)
  2850  	case *http2PingFrame:
  2851  		fmt.Fprintf(&buf, " ping=%q", f.Data[:])
  2852  	case *http2GoAwayFrame:
  2853  		fmt.Fprintf(&buf, " LastStreamID=%v ErrCode=%v Debug=%q",
  2854  			f.LastStreamID, f.ErrCode, f.debugData)
  2855  	case *http2RSTStreamFrame:
  2856  		fmt.Fprintf(&buf, " ErrCode=%v", f.ErrCode)
  2857  	}
  2858  	return buf.String()
  2859  }
  2860  
  2861  func http2traceHasWroteHeaderField(trace *httptrace.ClientTrace) bool {
  2862  	return trace != nil && trace.WroteHeaderField != nil
  2863  }
  2864  
  2865  func http2traceWroteHeaderField(trace *httptrace.ClientTrace, k, v string) {
  2866  	if trace != nil && trace.WroteHeaderField != nil {
  2867  		trace.WroteHeaderField(k, []string{v})
  2868  	}
  2869  }
  2870  
  2871  func http2traceGot1xxResponseFunc(trace *httptrace.ClientTrace) func(int, textproto.MIMEHeader) error {
  2872  	if trace != nil {
  2873  		return trace.Got1xxResponse
  2874  	}
  2875  	return nil
  2876  }
  2877  
  2878  var http2DebugGoroutines = os.Getenv("DEBUG_HTTP2_GOROUTINES") == "1"
  2879  
  2880  type http2goroutineLock uint64
  2881  
  2882  func http2newGoroutineLock() http2goroutineLock {
  2883  	if !http2DebugGoroutines {
  2884  		return 0
  2885  	}
  2886  	return http2goroutineLock(http2curGoroutineID())
  2887  }
  2888  
  2889  func (g http2goroutineLock) check() {
  2890  	if !http2DebugGoroutines {
  2891  		return
  2892  	}
  2893  	if http2curGoroutineID() != uint64(g) {
  2894  		panic("running on the wrong goroutine")
  2895  	}
  2896  }
  2897  
  2898  func (g http2goroutineLock) checkNotOn() {
  2899  	if !http2DebugGoroutines {
  2900  		return
  2901  	}
  2902  	if http2curGoroutineID() == uint64(g) {
  2903  		panic("running on the wrong goroutine")
  2904  	}
  2905  }
  2906  
  2907  var http2goroutineSpace = []byte("goroutine ")
  2908  
  2909  func http2curGoroutineID() uint64 {
  2910  	bp := http2littleBuf.Get().(*[]byte)
  2911  	defer http2littleBuf.Put(bp)
  2912  	b := *bp
  2913  	b = b[:runtime.Stack(b, false)]
  2914  	// Parse the 4707 out of "goroutine 4707 ["
  2915  	b = bytes.TrimPrefix(b, http2goroutineSpace)
  2916  	i := bytes.IndexByte(b, ' ')
  2917  	if i < 0 {
  2918  		panic(fmt.Sprintf("No space found in %q", b))
  2919  	}
  2920  	b = b[:i]
  2921  	n, err := http2parseUintBytes(b, 10, 64)
  2922  	if err != nil {
  2923  		panic(fmt.Sprintf("Failed to parse goroutine ID out of %q: %v", b, err))
  2924  	}
  2925  	return n
  2926  }
  2927  
  2928  var http2littleBuf = sync.Pool{
  2929  	New: func() interface{} {
  2930  		buf := make([]byte, 64)
  2931  		return &buf
  2932  	},
  2933  }
  2934  
  2935  // parseUintBytes is like strconv.ParseUint, but using a []byte.
  2936  func http2parseUintBytes(s []byte, base int, bitSize int) (n uint64, err error) {
  2937  	var cutoff, maxVal uint64
  2938  
  2939  	if bitSize == 0 {
  2940  		bitSize = int(strconv.IntSize)
  2941  	}
  2942  
  2943  	s0 := s
  2944  	switch {
  2945  	case len(s) < 1:
  2946  		err = strconv.ErrSyntax
  2947  		goto Error
  2948  
  2949  	case 2 <= base && base <= 36:
  2950  		// valid base; nothing to do
  2951  
  2952  	case base == 0:
  2953  		// Look for octal, hex prefix.
  2954  		switch {
  2955  		case s[0] == '0' && len(s) > 1 && (s[1] == 'x' || s[1] == 'X'):
  2956  			base = 16
  2957  			s = s[2:]
  2958  			if len(s) < 1 {
  2959  				err = strconv.ErrSyntax
  2960  				goto Error
  2961  			}
  2962  		case s[0] == '0':
  2963  			base = 8
  2964  		default:
  2965  			base = 10
  2966  		}
  2967  
  2968  	default:
  2969  		err = errors.New("invalid base " + strconv.Itoa(base))
  2970  		goto Error
  2971  	}
  2972  
  2973  	n = 0
  2974  	cutoff = http2cutoff64(base)
  2975  	maxVal = 1<<uint(bitSize) - 1
  2976  
  2977  	for i := 0; i < len(s); i++ {
  2978  		var v byte
  2979  		d := s[i]
  2980  		switch {
  2981  		case '0' <= d && d <= '9':
  2982  			v = d - '0'
  2983  		case 'a' <= d && d <= 'z':
  2984  			v = d - 'a' + 10
  2985  		case 'A' <= d && d <= 'Z':
  2986  			v = d - 'A' + 10
  2987  		default:
  2988  			n = 0
  2989  			err = strconv.ErrSyntax
  2990  			goto Error
  2991  		}
  2992  		if int(v) >= base {
  2993  			n = 0
  2994  			err = strconv.ErrSyntax
  2995  			goto Error
  2996  		}
  2997  
  2998  		if n >= cutoff {
  2999  			// n*base overflows
  3000  			n = 1<<64 - 1
  3001  			err = strconv.ErrRange
  3002  			goto Error
  3003  		}
  3004  		n *= uint64(base)
  3005  
  3006  		n1 := n + uint64(v)
  3007  		if n1 < n || n1 > maxVal {
  3008  			// n+v overflows
  3009  			n = 1<<64 - 1
  3010  			err = strconv.ErrRange
  3011  			goto Error
  3012  		}
  3013  		n = n1
  3014  	}
  3015  
  3016  	return n, nil
  3017  
  3018  Error:
  3019  	return n, &strconv.NumError{Func: "ParseUint", Num: string(s0), Err: err}
  3020  }
  3021  
  3022  // Return the first number n such that n*base >= 1<<64.
  3023  func http2cutoff64(base int) uint64 {
  3024  	if base < 2 {
  3025  		return 0
  3026  	}
  3027  	return (1<<64-1)/uint64(base) + 1
  3028  }
  3029  
  3030  var (
  3031  	http2commonBuildOnce   sync.Once
  3032  	http2commonLowerHeader map[string]string // Go-Canonical-Case -> lower-case
  3033  	http2commonCanonHeader map[string]string // lower-case -> Go-Canonical-Case
  3034  )
  3035  
  3036  func http2buildCommonHeaderMapsOnce() {
  3037  	http2commonBuildOnce.Do(http2buildCommonHeaderMaps)
  3038  }
  3039  
  3040  func http2buildCommonHeaderMaps() {
  3041  	common := []string{
  3042  		"accept",
  3043  		"accept-charset",
  3044  		"accept-encoding",
  3045  		"accept-language",
  3046  		"accept-ranges",
  3047  		"age",
  3048  		"access-control-allow-origin",
  3049  		"allow",
  3050  		"authorization",
  3051  		"cache-control",
  3052  		"content-disposition",
  3053  		"content-encoding",
  3054  		"content-language",
  3055  		"content-length",
  3056  		"content-location",
  3057  		"content-range",
  3058  		"content-type",
  3059  		"cookie",
  3060  		"date",
  3061  		"etag",
  3062  		"expect",
  3063  		"expires",
  3064  		"from",
  3065  		"host",
  3066  		"if-match",
  3067  		"if-modified-since",
  3068  		"if-none-match",
  3069  		"if-unmodified-since",
  3070  		"last-modified",
  3071  		"link",
  3072  		"location",
  3073  		"max-forwards",
  3074  		"proxy-authenticate",
  3075  		"proxy-authorization",
  3076  		"range",
  3077  		"referer",
  3078  		"refresh",
  3079  		"retry-after",
  3080  		"server",
  3081  		"set-cookie",
  3082  		"strict-transport-security",
  3083  		"trailer",
  3084  		"transfer-encoding",
  3085  		"user-agent",
  3086  		"vary",
  3087  		"via",
  3088  		"www-authenticate",
  3089  	}
  3090  	http2commonLowerHeader = make(map[string]string, len(common))
  3091  	http2commonCanonHeader = make(map[string]string, len(common))
  3092  	for _, v := range common {
  3093  		chk := CanonicalHeaderKey(v)
  3094  		http2commonLowerHeader[chk] = v
  3095  		http2commonCanonHeader[v] = chk
  3096  	}
  3097  }
  3098  
  3099  func http2lowerHeader(v string) string {
  3100  	http2buildCommonHeaderMapsOnce()
  3101  	if s, ok := http2commonLowerHeader[v]; ok {
  3102  		return s
  3103  	}
  3104  	return strings.ToLower(v)
  3105  }
  3106  
  3107  var (
  3108  	http2VerboseLogs    bool
  3109  	http2logFrameWrites bool
  3110  	http2logFrameReads  bool
  3111  	http2inTests        bool
  3112  )
  3113  
  3114  func init() {
  3115  	e := os.Getenv("GODEBUG")
  3116  	if strings.Contains(e, "http2debug=1") {
  3117  		http2VerboseLogs = true
  3118  	}
  3119  	if strings.Contains(e, "http2debug=2") {
  3120  		http2VerboseLogs = true
  3121  		http2logFrameWrites = true
  3122  		http2logFrameReads = true
  3123  	}
  3124  }
  3125  
  3126  const (
  3127  	// ClientPreface is the string that must be sent by new
  3128  	// connections from clients.
  3129  	http2ClientPreface = "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n"
  3130  
  3131  	// SETTINGS_MAX_FRAME_SIZE default
  3132  	// http://http2.github.io/http2-spec/#rfc.section.6.5.2
  3133  	http2initialMaxFrameSize = 16384
  3134  
  3135  	// NextProtoTLS is the NPN/ALPN protocol negotiated during
  3136  	// HTTP/2's TLS setup.
  3137  	http2NextProtoTLS = "h2"
  3138  
  3139  	// http://http2.github.io/http2-spec/#SettingValues
  3140  	http2initialHeaderTableSize = 4096
  3141  
  3142  	http2initialWindowSize = 65535 // 6.9.2 Initial Flow Control Window Size
  3143  
  3144  	http2defaultMaxReadFrameSize = 1 << 20
  3145  )
  3146  
  3147  var (
  3148  	http2clientPreface = []byte(http2ClientPreface)
  3149  )
  3150  
  3151  type http2streamState int
  3152  
  3153  // HTTP/2 stream states.
  3154  //
  3155  // See http://tools.ietf.org/html/rfc7540#section-5.1.
  3156  //
  3157  // For simplicity, the server code merges "reserved (local)" into
  3158  // "half-closed (remote)". This is one less state transition to track.
  3159  // The only downside is that we send PUSH_PROMISEs slightly less
  3160  // liberally than allowable. More discussion here:
  3161  // https://lists.w3.org/Archives/Public/ietf-http-wg/2016JulSep/0599.html
  3162  //
  3163  // "reserved (remote)" is omitted since the client code does not
  3164  // support server push.
  3165  const (
  3166  	http2stateIdle http2streamState = iota
  3167  	http2stateOpen
  3168  	http2stateHalfClosedLocal
  3169  	http2stateHalfClosedRemote
  3170  	http2stateClosed
  3171  )
  3172  
  3173  var http2stateName = [...]string{
  3174  	http2stateIdle:             "Idle",
  3175  	http2stateOpen:             "Open",
  3176  	http2stateHalfClosedLocal:  "HalfClosedLocal",
  3177  	http2stateHalfClosedRemote: "HalfClosedRemote",
  3178  	http2stateClosed:           "Closed",
  3179  }
  3180  
  3181  func (st http2streamState) String() string {
  3182  	return http2stateName[st]
  3183  }
  3184  
  3185  // Setting is a setting parameter: which setting it is, and its value.
  3186  type http2Setting struct {
  3187  	// ID is which setting is being set.
  3188  	// See http://http2.github.io/http2-spec/#SettingValues
  3189  	ID http2SettingID
  3190  
  3191  	// Val is the value.
  3192  	Val uint32
  3193  }
  3194  
  3195  func (s http2Setting) String() string {
  3196  	return fmt.Sprintf("[%v = %d]", s.ID, s.Val)
  3197  }
  3198  
  3199  // Valid reports whether the setting is valid.
  3200  func (s http2Setting) Valid() error {
  3201  	// Limits and error codes from 6.5.2 Defined SETTINGS Parameters
  3202  	switch s.ID {
  3203  	case http2SettingEnablePush:
  3204  		if s.Val != 1 && s.Val != 0 {
  3205  			return http2ConnectionError(http2ErrCodeProtocol)
  3206  		}
  3207  	case http2SettingInitialWindowSize:
  3208  		if s.Val > 1<<31-1 {
  3209  			return http2ConnectionError(http2ErrCodeFlowControl)
  3210  		}
  3211  	case http2SettingMaxFrameSize:
  3212  		if s.Val < 16384 || s.Val > 1<<24-1 {
  3213  			return http2ConnectionError(http2ErrCodeProtocol)
  3214  		}
  3215  	}
  3216  	return nil
  3217  }
  3218  
  3219  // A SettingID is an HTTP/2 setting as defined in
  3220  // http://http2.github.io/http2-spec/#iana-settings
  3221  type http2SettingID uint16
  3222  
  3223  const (
  3224  	http2SettingHeaderTableSize      http2SettingID = 0x1
  3225  	http2SettingEnablePush           http2SettingID = 0x2
  3226  	http2SettingMaxConcurrentStreams http2SettingID = 0x3
  3227  	http2SettingInitialWindowSize    http2SettingID = 0x4
  3228  	http2SettingMaxFrameSize         http2SettingID = 0x5
  3229  	http2SettingMaxHeaderListSize    http2SettingID = 0x6
  3230  )
  3231  
  3232  var http2settingName = map[http2SettingID]string{
  3233  	http2SettingHeaderTableSize:      "HEADER_TABLE_SIZE",
  3234  	http2SettingEnablePush:           "ENABLE_PUSH",
  3235  	http2SettingMaxConcurrentStreams: "MAX_CONCURRENT_STREAMS",
  3236  	http2SettingInitialWindowSize:    "INITIAL_WINDOW_SIZE",
  3237  	http2SettingMaxFrameSize:         "MAX_FRAME_SIZE",
  3238  	http2SettingMaxHeaderListSize:    "MAX_HEADER_LIST_SIZE",
  3239  }
  3240  
  3241  func (s http2SettingID) String() string {
  3242  	if v, ok := http2settingName[s]; ok {
  3243  		return v
  3244  	}
  3245  	return fmt.Sprintf("UNKNOWN_SETTING_%d", uint16(s))
  3246  }
  3247  
  3248  var (
  3249  	http2errInvalidHeaderFieldName  = errors.New("http2: invalid header field name")
  3250  	http2errInvalidHeaderFieldValue = errors.New("http2: invalid header field value")
  3251  )
  3252  
  3253  // validWireHeaderFieldName reports whether v is a valid header field
  3254  // name (key). See httpguts.ValidHeaderName for the base rules.
  3255  //
  3256  // Further, http2 says:
  3257  //   "Just as in HTTP/1.x, header field names are strings of ASCII
  3258  //   characters that are compared in a case-insensitive
  3259  //   fashion. However, header field names MUST be converted to
  3260  //   lowercase prior to their encoding in HTTP/2. "
  3261  func http2validWireHeaderFieldName(v string) bool {
  3262  	if len(v) == 0 {
  3263  		return false
  3264  	}
  3265  	for _, r := range v {
  3266  		if !httpguts.IsTokenRune(r) {
  3267  			return false
  3268  		}
  3269  		if 'A' <= r && r <= 'Z' {
  3270  			return false
  3271  		}
  3272  	}
  3273  	return true
  3274  }
  3275  
  3276  func http2httpCodeString(code int) string {
  3277  	switch code {
  3278  	case 200:
  3279  		return "200"
  3280  	case 404:
  3281  		return "404"
  3282  	}
  3283  	return strconv.Itoa(code)
  3284  }
  3285  
  3286  // from pkg io
  3287  type http2stringWriter interface {
  3288  	WriteString(s string) (n int, err error)
  3289  }
  3290  
  3291  // A gate lets two goroutines coordinate their activities.
  3292  type http2gate chan struct{}
  3293  
  3294  func (g http2gate) Done() { g <- struct{}{} }
  3295  
  3296  func (g http2gate) Wait() { <-g }
  3297  
  3298  // A closeWaiter is like a sync.WaitGroup but only goes 1 to 0 (open to closed).
  3299  type http2closeWaiter chan struct{}
  3300  
  3301  // Init makes a closeWaiter usable.
  3302  // It exists because so a closeWaiter value can be placed inside a
  3303  // larger struct and have the Mutex and Cond's memory in the same
  3304  // allocation.
  3305  func (cw *http2closeWaiter) Init() {
  3306  	*cw = make(chan struct{})
  3307  }
  3308  
  3309  // Close marks the closeWaiter as closed and unblocks any waiters.
  3310  func (cw http2closeWaiter) Close() {
  3311  	close(cw)
  3312  }
  3313  
  3314  // Wait waits for the closeWaiter to become closed.
  3315  func (cw http2closeWaiter) Wait() {
  3316  	<-cw
  3317  }
  3318  
  3319  // bufferedWriter is a buffered writer that writes to w.
  3320  // Its buffered writer is lazily allocated as needed, to minimize
  3321  // idle memory usage with many connections.
  3322  type http2bufferedWriter struct {
  3323  	w  io.Writer     // immutable
  3324  	bw *bufio.Writer // non-nil when data is buffered
  3325  }
  3326  
  3327  func http2newBufferedWriter(w io.Writer) *http2bufferedWriter {
  3328  	return &http2bufferedWriter{w: w}
  3329  }
  3330  
  3331  // bufWriterPoolBufferSize is the size of bufio.Writer's
  3332  // buffers created using bufWriterPool.
  3333  //
  3334  // TODO: pick a less arbitrary value? this is a bit under
  3335  // (3 x typical 1500 byte MTU) at least. Other than that,
  3336  // not much thought went into it.
  3337  const http2bufWriterPoolBufferSize = 4 << 10
  3338  
  3339  var http2bufWriterPool = sync.Pool{
  3340  	New: func() interface{} {
  3341  		return bufio.NewWriterSize(nil, http2bufWriterPoolBufferSize)
  3342  	},
  3343  }
  3344  
  3345  func (w *http2bufferedWriter) Available() int {
  3346  	if w.bw == nil {
  3347  		return http2bufWriterPoolBufferSize
  3348  	}
  3349  	return w.bw.Available()
  3350  }
  3351  
  3352  func (w *http2bufferedWriter) Write(p []byte) (n int, err error) {
  3353  	if w.bw == nil {
  3354  		bw := http2bufWriterPool.Get().(*bufio.Writer)
  3355  		bw.Reset(w.w)
  3356  		w.bw = bw
  3357  	}
  3358  	return w.bw.Write(p)
  3359  }
  3360  
  3361  func (w *http2bufferedWriter) Flush() error {
  3362  	bw := w.bw
  3363  	if bw == nil {
  3364  		return nil
  3365  	}
  3366  	err := bw.Flush()
  3367  	bw.Reset(nil)
  3368  	http2bufWriterPool.Put(bw)
  3369  	w.bw = nil
  3370  	return err
  3371  }
  3372  
  3373  func http2mustUint31(v int32) uint32 {
  3374  	if v < 0 || v > 2147483647 {
  3375  		panic("out of range")
  3376  	}
  3377  	return uint32(v)
  3378  }
  3379  
  3380  // bodyAllowedForStatus reports whether a given response status code
  3381  // permits a body. See RFC 7230, section 3.3.
  3382  func http2bodyAllowedForStatus(status int) bool {
  3383  	switch {
  3384  	case status >= 100 && status <= 199:
  3385  		return false
  3386  	case status == 204:
  3387  		return false
  3388  	case status == 304:
  3389  		return false
  3390  	}
  3391  	return true
  3392  }
  3393  
  3394  type http2httpError struct {
  3395  	msg     string
  3396  	timeout bool
  3397  }
  3398  
  3399  func (e *http2httpError) Error() string { return e.msg }
  3400  
  3401  func (e *http2httpError) Timeout() bool { return e.timeout }
  3402  
  3403  func (e *http2httpError) Temporary() bool { return true }
  3404  
  3405  var http2errTimeout error = &http2httpError{msg: "http2: timeout awaiting response headers", timeout: true}
  3406  
  3407  type http2connectionStater interface {
  3408  	ConnectionState() tls.ConnectionState
  3409  }
  3410  
  3411  var http2sorterPool = sync.Pool{New: func() interface{} { return new(http2sorter) }}
  3412  
  3413  type http2sorter struct {
  3414  	v []string // owned by sorter
  3415  }
  3416  
  3417  func (s *http2sorter) Len() int { return len(s.v) }
  3418  
  3419  func (s *http2sorter) Swap(i, j int) { s.v[i], s.v[j] = s.v[j], s.v[i] }
  3420  
  3421  func (s *http2sorter) Less(i, j int) bool { return s.v[i] < s.v[j] }
  3422  
  3423  // Keys returns the sorted keys of h.
  3424  //
  3425  // The returned slice is only valid until s used again or returned to
  3426  // its pool.
  3427  func (s *http2sorter) Keys(h Header) []string {
  3428  	keys := s.v[:0]
  3429  	for k := range h {
  3430  		keys = append(keys, k)
  3431  	}
  3432  	s.v = keys
  3433  	sort.Sort(s)
  3434  	return keys
  3435  }
  3436  
  3437  func (s *http2sorter) SortStrings(ss []string) {
  3438  	// Our sorter works on s.v, which sorter owns, so
  3439  	// stash it away while we sort the user's buffer.
  3440  	save := s.v
  3441  	s.v = ss
  3442  	sort.Sort(s)
  3443  	s.v = save
  3444  }
  3445  
  3446  // validPseudoPath reports whether v is a valid :path pseudo-header
  3447  // value. It must be either:
  3448  //
  3449  //     *) a non-empty string starting with '/'
  3450  //     *) the string '*', for OPTIONS requests.
  3451  //
  3452  // For now this is only used a quick check for deciding when to clean
  3453  // up Opaque URLs before sending requests from the Transport.
  3454  // See golang.org/issue/16847
  3455  //
  3456  // We used to enforce that the path also didn't start with "//", but
  3457  // Google's GFE accepts such paths and Chrome sends them, so ignore
  3458  // that part of the spec. See golang.org/issue/19103.
  3459  func http2validPseudoPath(v string) bool {
  3460  	return (len(v) > 0 && v[0] == '/') || v == "*"
  3461  }
  3462  
  3463  // pipe is a goroutine-safe io.Reader/io.Writer pair. It's like
  3464  // io.Pipe except there are no PipeReader/PipeWriter halves, and the
  3465  // underlying buffer is an interface. (io.Pipe is always unbuffered)
  3466  type http2pipe struct {
  3467  	mu       sync.Mutex
  3468  	c        sync.Cond       // c.L lazily initialized to &p.mu
  3469  	b        http2pipeBuffer // nil when done reading
  3470  	unread   int             // bytes unread when done
  3471  	err      error           // read error once empty. non-nil means closed.
  3472  	breakErr error           // immediate read error (caller doesn't see rest of b)
  3473  	donec    chan struct{}   // closed on error
  3474  	readFn   func()          // optional code to run in Read before error
  3475  }
  3476  
  3477  type http2pipeBuffer interface {
  3478  	Len() int
  3479  	io.Writer
  3480  	io.Reader
  3481  }
  3482  
  3483  func (p *http2pipe) Len() int {
  3484  	p.mu.Lock()
  3485  	defer p.mu.Unlock()
  3486  	if p.b == nil {
  3487  		return p.unread
  3488  	}
  3489  	return p.b.Len()
  3490  }
  3491  
  3492  // Read waits until data is available and copies bytes
  3493  // from the buffer into p.
  3494  func (p *http2pipe) Read(d []byte) (n int, err error) {
  3495  	p.mu.Lock()
  3496  	defer p.mu.Unlock()
  3497  	if p.c.L == nil {
  3498  		p.c.L = &p.mu
  3499  	}
  3500  	for {
  3501  		if p.breakErr != nil {
  3502  			return 0, p.breakErr
  3503  		}
  3504  		if p.b != nil && p.b.Len() > 0 {
  3505  			return p.b.Read(d)
  3506  		}
  3507  		if p.err != nil {
  3508  			if p.readFn != nil {
  3509  				p.readFn()     // e.g. copy trailers
  3510  				p.readFn = nil // not sticky like p.err
  3511  			}
  3512  			p.b = nil
  3513  			return 0, p.err
  3514  		}
  3515  		p.c.Wait()
  3516  	}
  3517  }
  3518  
  3519  var http2errClosedPipeWrite = errors.New("write on closed buffer")
  3520  
  3521  // Write copies bytes from p into the buffer and wakes a reader.
  3522  // It is an error to write more data than the buffer can hold.
  3523  func (p *http2pipe) Write(d []byte) (n int, err error) {
  3524  	p.mu.Lock()
  3525  	defer p.mu.Unlock()
  3526  	if p.c.L == nil {
  3527  		p.c.L = &p.mu
  3528  	}
  3529  	defer p.c.Signal()
  3530  	if p.err != nil {
  3531  		return 0, http2errClosedPipeWrite
  3532  	}
  3533  	if p.breakErr != nil {
  3534  		p.unread += len(d)
  3535  		return len(d), nil // discard when there is no reader
  3536  	}
  3537  	return p.b.Write(d)
  3538  }
  3539  
  3540  // CloseWithError causes the next Read (waking up a current blocked
  3541  // Read if needed) to return the provided err after all data has been
  3542  // read.
  3543  //
  3544  // The error must be non-nil.
  3545  func (p *http2pipe) CloseWithError(err error) { p.closeWithError(&p.err, err, nil) }
  3546  
  3547  // BreakWithError causes the next Read (waking up a current blocked
  3548  // Read if needed) to return the provided err immediately, without
  3549  // waiting for unread data.
  3550  func (p *http2pipe) BreakWithError(err error) { p.closeWithError(&p.breakErr, err, nil) }
  3551  
  3552  // closeWithErrorAndCode is like CloseWithError but also sets some code to run
  3553  // in the caller's goroutine before returning the error.
  3554  func (p *http2pipe) closeWithErrorAndCode(err error, fn func()) { p.closeWithError(&p.err, err, fn) }
  3555  
  3556  func (p *http2pipe) closeWithError(dst *error, err error, fn func()) {
  3557  	if err == nil {
  3558  		panic("err must be non-nil")
  3559  	}
  3560  	p.mu.Lock()
  3561  	defer p.mu.Unlock()
  3562  	if p.c.L == nil {
  3563  		p.c.L = &p.mu
  3564  	}
  3565  	defer p.c.Signal()
  3566  	if *dst != nil {
  3567  		// Already been done.
  3568  		return
  3569  	}
  3570  	p.readFn = fn
  3571  	if dst == &p.breakErr {
  3572  		if p.b != nil {
  3573  			p.unread += p.b.Len()
  3574  		}
  3575  		p.b = nil
  3576  	}
  3577  	*dst = err
  3578  	p.closeDoneLocked()
  3579  }
  3580  
  3581  // requires p.mu be held.
  3582  func (p *http2pipe) closeDoneLocked() {
  3583  	if p.donec == nil {
  3584  		return
  3585  	}
  3586  	// Close if unclosed. This isn't racy since we always
  3587  	// hold p.mu while closing.
  3588  	select {
  3589  	case <-p.donec:
  3590  	default:
  3591  		close(p.donec)
  3592  	}
  3593  }
  3594  
  3595  // Err returns the error (if any) first set by BreakWithError or CloseWithError.
  3596  func (p *http2pipe) Err() error {
  3597  	p.mu.Lock()
  3598  	defer p.mu.Unlock()
  3599  	if p.breakErr != nil {
  3600  		return p.breakErr
  3601  	}
  3602  	return p.err
  3603  }
  3604  
  3605  // Done returns a channel which is closed if and when this pipe is closed
  3606  // with CloseWithError.
  3607  func (p *http2pipe) Done() <-chan struct{} {
  3608  	p.mu.Lock()
  3609  	defer p.mu.Unlock()
  3610  	if p.donec == nil {
  3611  		p.donec = make(chan struct{})
  3612  		if p.err != nil || p.breakErr != nil {
  3613  			// Already hit an error.
  3614  			p.closeDoneLocked()
  3615  		}
  3616  	}
  3617  	return p.donec
  3618  }
  3619  
  3620  const (
  3621  	http2prefaceTimeout         = 10 * time.Second
  3622  	http2firstSettingsTimeout   = 2 * time.Second // should be in-flight with preface anyway
  3623  	http2handlerChunkWriteSize  = 4 << 10
  3624  	http2defaultMaxStreams      = 250 // TODO: make this 100 as the GFE seems to?
  3625  	http2maxQueuedControlFrames = 10000
  3626  )
  3627  
  3628  var (
  3629  	http2errClientDisconnected = errors.New("client disconnected")
  3630  	http2errClosedBody         = errors.New("body closed by handler")
  3631  	http2errHandlerComplete    = errors.New("http2: request body closed due to handler exiting")
  3632  	http2errStreamClosed       = errors.New("http2: stream closed")
  3633  )
  3634  
  3635  var http2responseWriterStatePool = sync.Pool{
  3636  	New: func() interface{} {
  3637  		rws := &http2responseWriterState{}
  3638  		rws.bw = bufio.NewWriterSize(http2chunkWriter{rws}, http2handlerChunkWriteSize)
  3639  		return rws
  3640  	},
  3641  }
  3642  
  3643  // Test hooks.
  3644  var (
  3645  	http2testHookOnConn        func()
  3646  	http2testHookGetServerConn func(*http2serverConn)
  3647  	http2testHookOnPanicMu     *sync.Mutex // nil except in tests
  3648  	http2testHookOnPanic       func(sc *http2serverConn, panicVal interface{}) (rePanic bool)
  3649  )
  3650  
  3651  // Server is an HTTP/2 server.
  3652  type http2Server struct {
  3653  	// MaxHandlers limits the number of http.Handler ServeHTTP goroutines
  3654  	// which may run at a time over all connections.
  3655  	// Negative or zero no limit.
  3656  	// TODO: implement
  3657  	MaxHandlers int
  3658  
  3659  	// MaxConcurrentStreams optionally specifies the number of
  3660  	// concurrent streams that each client may have open at a
  3661  	// time. This is unrelated to the number of http.Handler goroutines
  3662  	// which may be active globally, which is MaxHandlers.
  3663  	// If zero, MaxConcurrentStreams defaults to at least 100, per
  3664  	// the HTTP/2 spec's recommendations.
  3665  	MaxConcurrentStreams uint32
  3666  
  3667  	// MaxReadFrameSize optionally specifies the largest frame
  3668  	// this server is willing to read. A valid value is between
  3669  	// 16k and 16M, inclusive. If zero or otherwise invalid, a
  3670  	// default value is used.
  3671  	MaxReadFrameSize uint32
  3672  
  3673  	// PermitProhibitedCipherSuites, if true, permits the use of
  3674  	// cipher suites prohibited by the HTTP/2 spec.
  3675  	PermitProhibitedCipherSuites bool
  3676  
  3677  	// IdleTimeout specifies how long until idle clients should be
  3678  	// closed with a GOAWAY frame. PING frames are not considered
  3679  	// activity for the purposes of IdleTimeout.
  3680  	IdleTimeout time.Duration
  3681  
  3682  	// MaxUploadBufferPerConnection is the size of the initial flow
  3683  	// control window for each connections. The HTTP/2 spec does not
  3684  	// allow this to be smaller than 65535 or larger than 2^32-1.
  3685  	// If the value is outside this range, a default value will be
  3686  	// used instead.
  3687  	MaxUploadBufferPerConnection int32
  3688  
  3689  	// MaxUploadBufferPerStream is the size of the initial flow control
  3690  	// window for each stream. The HTTP/2 spec does not allow this to
  3691  	// be larger than 2^32-1. If the value is zero or larger than the
  3692  	// maximum, a default value will be used instead.
  3693  	MaxUploadBufferPerStream int32
  3694  
  3695  	// NewWriteScheduler constructs a write scheduler for a connection.
  3696  	// If nil, a default scheduler is chosen.
  3697  	NewWriteScheduler func() http2WriteScheduler
  3698  
  3699  	// Internal state. This is a pointer (rather than embedded directly)
  3700  	// so that we don't embed a Mutex in this struct, which will make the
  3701  	// struct non-copyable, which might break some callers.
  3702  	state *http2serverInternalState
  3703  }
  3704  
  3705  func (s *http2Server) initialConnRecvWindowSize() int32 {
  3706  	if s.MaxUploadBufferPerConnection > http2initialWindowSize {
  3707  		return s.MaxUploadBufferPerConnection
  3708  	}
  3709  	return 1 << 20
  3710  }
  3711  
  3712  func (s *http2Server) initialStreamRecvWindowSize() int32 {
  3713  	if s.MaxUploadBufferPerStream > 0 {
  3714  		return s.MaxUploadBufferPerStream
  3715  	}
  3716  	return 1 << 20
  3717  }
  3718  
  3719  func (s *http2Server) maxReadFrameSize() uint32 {
  3720  	if v := s.MaxReadFrameSize; v >= http2minMaxFrameSize && v <= http2maxFrameSize {
  3721  		return v
  3722  	}
  3723  	return http2defaultMaxReadFrameSize
  3724  }
  3725  
  3726  func (s *http2Server) maxConcurrentStreams() uint32 {
  3727  	if v := s.MaxConcurrentStreams; v > 0 {
  3728  		return v
  3729  	}
  3730  	return http2defaultMaxStreams
  3731  }
  3732  
  3733  // maxQueuedControlFrames is the maximum number of control frames like
  3734  // SETTINGS, PING and RST_STREAM that will be queued for writing before
  3735  // the connection is closed to prevent memory exhaustion attacks.
  3736  func (s *http2Server) maxQueuedControlFrames() int {
  3737  	// TODO: if anybody asks, add a Server field, and remember to define the
  3738  	// behavior of negative values.
  3739  	return http2maxQueuedControlFrames
  3740  }
  3741  
  3742  type http2serverInternalState struct {
  3743  	mu          sync.Mutex
  3744  	activeConns map[*http2serverConn]struct{}
  3745  }
  3746  
  3747  func (s *http2serverInternalState) registerConn(sc *http2serverConn) {
  3748  	if s == nil {
  3749  		return // if the Server was used without calling ConfigureServer
  3750  	}
  3751  	s.mu.Lock()
  3752  	s.activeConns[sc] = struct{}{}
  3753  	s.mu.Unlock()
  3754  }
  3755  
  3756  func (s *http2serverInternalState) unregisterConn(sc *http2serverConn) {
  3757  	if s == nil {
  3758  		return // if the Server was used without calling ConfigureServer
  3759  	}
  3760  	s.mu.Lock()
  3761  	delete(s.activeConns, sc)
  3762  	s.mu.Unlock()
  3763  }
  3764  
  3765  func (s *http2serverInternalState) startGracefulShutdown() {
  3766  	if s == nil {
  3767  		return // if the Server was used without calling ConfigureServer
  3768  	}
  3769  	s.mu.Lock()
  3770  	for sc := range s.activeConns {
  3771  		sc.startGracefulShutdown()
  3772  	}
  3773  	s.mu.Unlock()
  3774  }
  3775  
  3776  // ConfigureServer adds HTTP/2 support to a net/http Server.
  3777  //
  3778  // The configuration conf may be nil.
  3779  //
  3780  // ConfigureServer must be called before s begins serving.
  3781  func http2ConfigureServer(s *Server, conf *http2Server) error {
  3782  	if s == nil {
  3783  		panic("nil *http.Server")
  3784  	}
  3785  	if conf == nil {
  3786  		conf = new(http2Server)
  3787  	}
  3788  	conf.state = &http2serverInternalState{activeConns: make(map[*http2serverConn]struct{})}
  3789  	if h1, h2 := s, conf; h2.IdleTimeout == 0 {
  3790  		if h1.IdleTimeout != 0 {
  3791  			h2.IdleTimeout = h1.IdleTimeout
  3792  		} else {
  3793  			h2.IdleTimeout = h1.ReadTimeout
  3794  		}
  3795  	}
  3796  	s.RegisterOnShutdown(conf.state.startGracefulShutdown)
  3797  
  3798  	if s.TLSConfig == nil {
  3799  		s.TLSConfig = new(tls.Config)
  3800  	} else if s.TLSConfig.CipherSuites != nil {
  3801  		// If they already provided a CipherSuite list, return
  3802  		// an error if it has a bad order or is missing
  3803  		// ECDHE_RSA_WITH_AES_128_GCM_SHA256 or ECDHE_ECDSA_WITH_AES_128_GCM_SHA256.
  3804  		haveRequired := false
  3805  		sawBad := false
  3806  		for i, cs := range s.TLSConfig.CipherSuites {
  3807  			switch cs {
  3808  			case tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  3809  				// Alternative MTI cipher to not discourage ECDSA-only servers.
  3810  				// See http://golang.org/cl/30721 for further information.
  3811  				tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
  3812  				haveRequired = true
  3813  			}
  3814  			if http2isBadCipher(cs) {
  3815  				sawBad = true
  3816  			} else if sawBad {
  3817  				return fmt.Errorf("http2: TLSConfig.CipherSuites index %d contains an HTTP/2-approved cipher suite (%#04x), but it comes after unapproved cipher suites. With this configuration, clients that don't support previous, approved cipher suites may be given an unapproved one and reject the connection.", i, cs)
  3818  			}
  3819  		}
  3820  		if !haveRequired {
  3821  			return fmt.Errorf("http2: TLSConfig.CipherSuites is missing an HTTP/2-required AES_128_GCM_SHA256 cipher (need at least one of TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 or TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256).")
  3822  		}
  3823  	}
  3824  
  3825  	// Note: not setting MinVersion to tls.VersionTLS12,
  3826  	// as we don't want to interfere with HTTP/1.1 traffic
  3827  	// on the user's server. We enforce TLS 1.2 later once
  3828  	// we accept a connection. Ideally this should be done
  3829  	// during next-proto selection, but using TLS <1.2 with
  3830  	// HTTP/2 is still the client's bug.
  3831  
  3832  	s.TLSConfig.PreferServerCipherSuites = true
  3833  
  3834  	haveNPN := false
  3835  	for _, p := range s.TLSConfig.NextProtos {
  3836  		if p == http2NextProtoTLS {
  3837  			haveNPN = true
  3838  			break
  3839  		}
  3840  	}
  3841  	if !haveNPN {
  3842  		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
  3843  	}
  3844  
  3845  	if s.TLSNextProto == nil {
  3846  		s.TLSNextProto = map[string]func(*Server, *tls.Conn, Handler){}
  3847  	}
  3848  	protoHandler := func(hs *Server, c *tls.Conn, h Handler) {
  3849  		if http2testHookOnConn != nil {
  3850  			http2testHookOnConn()
  3851  		}
  3852  		// The TLSNextProto interface predates contexts, so
  3853  		// the net/http package passes down its per-connection
  3854  		// base context via an exported but unadvertised
  3855  		// method on the Handler. This is for internal
  3856  		// net/http<=>http2 use only.
  3857  		var ctx context.Context
  3858  		type baseContexter interface {
  3859  			BaseContext() context.Context
  3860  		}
  3861  		if bc, ok := h.(baseContexter); ok {
  3862  			ctx = bc.BaseContext()
  3863  		}
  3864  		conf.ServeConn(c, &http2ServeConnOpts{
  3865  			Context:    ctx,
  3866  			Handler:    h,
  3867  			BaseConfig: hs,
  3868  		})
  3869  	}
  3870  	s.TLSNextProto[http2NextProtoTLS] = protoHandler
  3871  	return nil
  3872  }
  3873  
  3874  // ServeConnOpts are options for the Server.ServeConn method.
  3875  type http2ServeConnOpts struct {
  3876  	// Context is the base context to use.
  3877  	// If nil, context.Background is used.
  3878  	Context context.Context
  3879  
  3880  	// BaseConfig optionally sets the base configuration
  3881  	// for values. If nil, defaults are used.
  3882  	BaseConfig *Server
  3883  
  3884  	// Handler specifies which handler to use for processing
  3885  	// requests. If nil, BaseConfig.Handler is used. If BaseConfig
  3886  	// or BaseConfig.Handler is nil, http.DefaultServeMux is used.
  3887  	Handler Handler
  3888  }
  3889  
  3890  func (o *http2ServeConnOpts) context() context.Context {
  3891  	if o != nil && o.Context != nil {
  3892  		return o.Context
  3893  	}
  3894  	return context.Background()
  3895  }
  3896  
  3897  func (o *http2ServeConnOpts) baseConfig() *Server {
  3898  	if o != nil && o.BaseConfig != nil {
  3899  		return o.BaseConfig
  3900  	}
  3901  	return new(Server)
  3902  }
  3903  
  3904  func (o *http2ServeConnOpts) handler() Handler {
  3905  	if o != nil {
  3906  		if o.Handler != nil {
  3907  			return o.Handler
  3908  		}
  3909  		if o.BaseConfig != nil && o.BaseConfig.Handler != nil {
  3910  			return o.BaseConfig.Handler
  3911  		}
  3912  	}
  3913  	return DefaultServeMux
  3914  }
  3915  
  3916  // ServeConn serves HTTP/2 requests on the provided connection and
  3917  // blocks until the connection is no longer readable.
  3918  //
  3919  // ServeConn starts speaking HTTP/2 assuming that c has not had any
  3920  // reads or writes. It writes its initial settings frame and expects
  3921  // to be able to read the preface and settings frame from the
  3922  // client. If c has a ConnectionState method like a *tls.Conn, the
  3923  // ConnectionState is used to verify the TLS ciphersuite and to set
  3924  // the Request.TLS field in Handlers.
  3925  //
  3926  // ServeConn does not support h2c by itself. Any h2c support must be
  3927  // implemented in terms of providing a suitably-behaving net.Conn.
  3928  //
  3929  // The opts parameter is optional. If nil, default values are used.
  3930  func (s *http2Server) ServeConn(c net.Conn, opts *http2ServeConnOpts) {
  3931  	baseCtx, cancel := http2serverConnBaseContext(c, opts)
  3932  	defer cancel()
  3933  
  3934  	sc := &http2serverConn{
  3935  		srv:                         s,
  3936  		hs:                          opts.baseConfig(),
  3937  		conn:                        c,
  3938  		baseCtx:                     baseCtx,
  3939  		remoteAddrStr:               c.RemoteAddr().String(),
  3940  		bw:                          http2newBufferedWriter(c),
  3941  		handler:                     opts.handler(),
  3942  		streams:                     make(map[uint32]*http2stream),
  3943  		readFrameCh:                 make(chan http2readFrameResult),
  3944  		wantWriteFrameCh:            make(chan http2FrameWriteRequest, 8),
  3945  		serveMsgCh:                  make(chan interface{}, 8),
  3946  		wroteFrameCh:                make(chan http2frameWriteResult, 1), // buffered; one send in writeFrameAsync
  3947  		bodyReadCh:                  make(chan http2bodyReadMsg),         // buffering doesn't matter either way
  3948  		doneServing:                 make(chan struct{}),
  3949  		clientMaxStreams:            math.MaxUint32, // Section 6.5.2: "Initially, there is no limit to this value"
  3950  		advMaxStreams:               s.maxConcurrentStreams(),
  3951  		initialStreamSendWindowSize: http2initialWindowSize,
  3952  		maxFrameSize:                http2initialMaxFrameSize,
  3953  		headerTableSize:             http2initialHeaderTableSize,
  3954  		serveG:                      http2newGoroutineLock(),
  3955  		pushEnabled:                 true,
  3956  	}
  3957  
  3958  	s.state.registerConn(sc)
  3959  	defer s.state.unregisterConn(sc)
  3960  
  3961  	// The net/http package sets the write deadline from the
  3962  	// http.Server.WriteTimeout during the TLS handshake, but then
  3963  	// passes the connection off to us with the deadline already set.
  3964  	// Write deadlines are set per stream in serverConn.newStream.
  3965  	// Disarm the net.Conn write deadline here.
  3966  	if sc.hs.WriteTimeout != 0 {
  3967  		sc.conn.SetWriteDeadline(time.Time{})
  3968  	}
  3969  
  3970  	if s.NewWriteScheduler != nil {
  3971  		sc.writeSched = s.NewWriteScheduler()
  3972  	} else {
  3973  		sc.writeSched = http2NewRandomWriteScheduler()
  3974  	}
  3975  
  3976  	// These start at the RFC-specified defaults. If there is a higher
  3977  	// configured value for inflow, that will be updated when we send a
  3978  	// WINDOW_UPDATE shortly after sending SETTINGS.
  3979  	sc.flow.add(http2initialWindowSize)
  3980  	sc.inflow.add(http2initialWindowSize)
  3981  	sc.hpackEncoder = hpack.NewEncoder(&sc.headerWriteBuf)
  3982  
  3983  	fr := http2NewFramer(sc.bw, c)
  3984  	fr.ReadMetaHeaders = hpack.NewDecoder(http2initialHeaderTableSize, nil)
  3985  	fr.MaxHeaderListSize = sc.maxHeaderListSize()
  3986  	fr.SetMaxReadFrameSize(s.maxReadFrameSize())
  3987  	sc.framer = fr
  3988  
  3989  	if tc, ok := c.(http2connectionStater); ok {
  3990  		sc.tlsState = new(tls.ConnectionState)
  3991  		*sc.tlsState = tc.ConnectionState()
  3992  		// 9.2 Use of TLS Features
  3993  		// An implementation of HTTP/2 over TLS MUST use TLS
  3994  		// 1.2 or higher with the restrictions on feature set
  3995  		// and cipher suite described in this section. Due to
  3996  		// implementation limitations, it might not be
  3997  		// possible to fail TLS negotiation. An endpoint MUST
  3998  		// immediately terminate an HTTP/2 connection that
  3999  		// does not meet the TLS requirements described in
  4000  		// this section with a connection error (Section
  4001  		// 5.4.1) of type INADEQUATE_SECURITY.
  4002  		if sc.tlsState.Version < tls.VersionTLS12 {
  4003  			sc.rejectConn(http2ErrCodeInadequateSecurity, "TLS version too low")
  4004  			return
  4005  		}
  4006  
  4007  		if sc.tlsState.ServerName == "" {
  4008  			// Client must use SNI, but we don't enforce that anymore,
  4009  			// since it was causing problems when connecting to bare IP
  4010  			// addresses during development.
  4011  			//
  4012  			// TODO: optionally enforce? Or enforce at the time we receive
  4013  			// a new request, and verify the ServerName matches the :authority?
  4014  			// But that precludes proxy situations, perhaps.
  4015  			//
  4016  			// So for now, do nothing here again.
  4017  		}
  4018  
  4019  		if !s.PermitProhibitedCipherSuites && http2isBadCipher(sc.tlsState.CipherSuite) {
  4020  			// "Endpoints MAY choose to generate a connection error
  4021  			// (Section 5.4.1) of type INADEQUATE_SECURITY if one of
  4022  			// the prohibited cipher suites are negotiated."
  4023  			//
  4024  			// We choose that. In my opinion, the spec is weak
  4025  			// here. It also says both parties must support at least
  4026  			// TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no
  4027  			// excuses here. If we really must, we could allow an
  4028  			// "AllowInsecureWeakCiphers" option on the server later.
  4029  			// Let's see how it plays out first.
  4030  			sc.rejectConn(http2ErrCodeInadequateSecurity, fmt.Sprintf("Prohibited TLS 1.2 Cipher Suite: %x", sc.tlsState.CipherSuite))
  4031  			return
  4032  		}
  4033  	}
  4034  
  4035  	if hook := http2testHookGetServerConn; hook != nil {
  4036  		hook(sc)
  4037  	}
  4038  	sc.serve()
  4039  }
  4040  
  4041  func http2serverConnBaseContext(c net.Conn, opts *http2ServeConnOpts) (ctx context.Context, cancel func()) {
  4042  	ctx, cancel = context.WithCancel(opts.context())
  4043  	ctx = context.WithValue(ctx, LocalAddrContextKey, c.LocalAddr())
  4044  	if hs := opts.baseConfig(); hs != nil {
  4045  		ctx = context.WithValue(ctx, ServerContextKey, hs)
  4046  	}
  4047  	return
  4048  }
  4049  
  4050  func (sc *http2serverConn) rejectConn(err http2ErrCode, debug string) {
  4051  	sc.vlogf("http2: server rejecting conn: %v, %s", err, debug)
  4052  	// ignoring errors. hanging up anyway.
  4053  	sc.framer.WriteGoAway(0, err, []byte(debug))
  4054  	sc.bw.Flush()
  4055  	sc.conn.Close()
  4056  }
  4057  
  4058  type http2serverConn struct {
  4059  	// Immutable:
  4060  	srv              *http2Server
  4061  	hs               *Server
  4062  	conn             net.Conn
  4063  	bw               *http2bufferedWriter // writing to conn
  4064  	handler          Handler
  4065  	baseCtx          context.Context
  4066  	framer           *http2Framer
  4067  	doneServing      chan struct{}               // closed when serverConn.serve ends
  4068  	readFrameCh      chan http2readFrameResult   // written by serverConn.readFrames
  4069  	wantWriteFrameCh chan http2FrameWriteRequest // from handlers -> serve
  4070  	wroteFrameCh     chan http2frameWriteResult  // from writeFrameAsync -> serve, tickles more frame writes
  4071  	bodyReadCh       chan http2bodyReadMsg       // from handlers -> serve
  4072  	serveMsgCh       chan interface{}            // misc messages & code to send to / run on the serve loop
  4073  	flow             http2flow                   // conn-wide (not stream-specific) outbound flow control
  4074  	inflow           http2flow                   // conn-wide inbound flow control
  4075  	tlsState         *tls.ConnectionState        // shared by all handlers, like net/http
  4076  	remoteAddrStr    string
  4077  	writeSched       http2WriteScheduler
  4078  
  4079  	// Everything following is owned by the serve loop; use serveG.check():
  4080  	serveG                      http2goroutineLock // used to verify funcs are on serve()
  4081  	pushEnabled                 bool
  4082  	sawFirstSettings            bool // got the initial SETTINGS frame after the preface
  4083  	needToSendSettingsAck       bool
  4084  	unackedSettings             int    // how many SETTINGS have we sent without ACKs?
  4085  	queuedControlFrames         int    // control frames in the writeSched queue
  4086  	clientMaxStreams            uint32 // SETTINGS_MAX_CONCURRENT_STREAMS from client (our PUSH_PROMISE limit)
  4087  	advMaxStreams               uint32 // our SETTINGS_MAX_CONCURRENT_STREAMS advertised the client
  4088  	curClientStreams            uint32 // number of open streams initiated by the client
  4089  	curPushedStreams            uint32 // number of open streams initiated by server push
  4090  	maxClientStreamID           uint32 // max ever seen from client (odd), or 0 if there have been no client requests
  4091  	maxPushPromiseID            uint32 // ID of the last push promise (even), or 0 if there have been no pushes
  4092  	streams                     map[uint32]*http2stream
  4093  	initialStreamSendWindowSize int32
  4094  	maxFrameSize                int32
  4095  	headerTableSize             uint32
  4096  	peerMaxHeaderListSize       uint32            // zero means unknown (default)
  4097  	canonHeader                 map[string]string // http2-lower-case -> Go-Canonical-Case
  4098  	writingFrame                bool              // started writing a frame (on serve goroutine or separate)
  4099  	writingFrameAsync           bool              // started a frame on its own goroutine but haven't heard back on wroteFrameCh
  4100  	needsFrameFlush             bool              // last frame write wasn't a flush
  4101  	inGoAway                    bool              // we've started to or sent GOAWAY
  4102  	inFrameScheduleLoop         bool              // whether we're in the scheduleFrameWrite loop
  4103  	needToSendGoAway            bool              // we need to schedule a GOAWAY frame write
  4104  	goAwayCode                  http2ErrCode
  4105  	shutdownTimer               *time.Timer // nil until used
  4106  	idleTimer                   *time.Timer // nil if unused
  4107  
  4108  	// Owned by the writeFrameAsync goroutine:
  4109  	headerWriteBuf bytes.Buffer
  4110  	hpackEncoder   *hpack.Encoder
  4111  
  4112  	// Used by startGracefulShutdown.
  4113  	shutdownOnce sync.Once
  4114  }
  4115  
  4116  func (sc *http2serverConn) maxHeaderListSize() uint32 {
  4117  	n := sc.hs.MaxHeaderBytes
  4118  	if n <= 0 {
  4119  		n = DefaultMaxHeaderBytes
  4120  	}
  4121  	// http2's count is in a slightly different unit and includes 32 bytes per pair.
  4122  	// So, take the net/http.Server value and pad it up a bit, assuming 10 headers.
  4123  	const perFieldOverhead = 32 // per http2 spec
  4124  	const typicalHeaders = 10   // conservative
  4125  	return uint32(n + typicalHeaders*perFieldOverhead)
  4126  }
  4127  
  4128  func (sc *http2serverConn) curOpenStreams() uint32 {
  4129  	sc.serveG.check()
  4130  	return sc.curClientStreams + sc.curPushedStreams
  4131  }
  4132  
  4133  // stream represents a stream. This is the minimal metadata needed by
  4134  // the serve goroutine. Most of the actual stream state is owned by
  4135  // the http.Handler's goroutine in the responseWriter. Because the
  4136  // responseWriter's responseWriterState is recycled at the end of a
  4137  // handler, this struct intentionally has no pointer to the
  4138  // *responseWriter{,State} itself, as the Handler ending nils out the
  4139  // responseWriter's state field.
  4140  type http2stream struct {
  4141  	// immutable:
  4142  	sc        *http2serverConn
  4143  	id        uint32
  4144  	body      *http2pipe       // non-nil if expecting DATA frames
  4145  	cw        http2closeWaiter // closed wait stream transitions to closed state
  4146  	ctx       context.Context
  4147  	cancelCtx func()
  4148  
  4149  	// owned by serverConn's serve loop:
  4150  	bodyBytes        int64        // body bytes seen so far
  4151  	declBodyBytes    int64        // or -1 if undeclared
  4152  	flow             http2flow    // limits writing from Handler to client
  4153  	inflow           http2flow    // what the client is allowed to POST/etc to us
  4154  	parent           *http2stream // or nil
  4155  	numTrailerValues int64
  4156  	weight           uint8
  4157  	state            http2streamState
  4158  	resetQueued      bool        // RST_STREAM queued for write; set by sc.resetStream
  4159  	gotTrailerHeader bool        // HEADER frame for trailers was seen
  4160  	wroteHeaders     bool        // whether we wrote headers (not status 100)
  4161  	writeDeadline    *time.Timer // nil if unused
  4162  
  4163  	trailer    Header // accumulated trailers
  4164  	reqTrailer Header // handler's Request.Trailer
  4165  }
  4166  
  4167  func (sc *http2serverConn) Framer() *http2Framer { return sc.framer }
  4168  
  4169  func (sc *http2serverConn) CloseConn() error { return sc.conn.Close() }
  4170  
  4171  func (sc *http2serverConn) Flush() error { return sc.bw.Flush() }
  4172  
  4173  func (sc *http2serverConn) HeaderEncoder() (*hpack.Encoder, *bytes.Buffer) {
  4174  	return sc.hpackEncoder, &sc.headerWriteBuf
  4175  }
  4176  
  4177  func (sc *http2serverConn) state(streamID uint32) (http2streamState, *http2stream) {
  4178  	sc.serveG.check()
  4179  	// http://tools.ietf.org/html/rfc7540#section-5.1
  4180  	if st, ok := sc.streams[streamID]; ok {
  4181  		return st.state, st
  4182  	}
  4183  	// "The first use of a new stream identifier implicitly closes all
  4184  	// streams in the "idle" state that might have been initiated by
  4185  	// that peer with a lower-valued stream identifier. For example, if
  4186  	// a client sends a HEADERS frame on stream 7 without ever sending a
  4187  	// frame on stream 5, then stream 5 transitions to the "closed"
  4188  	// state when the first frame for stream 7 is sent or received."
  4189  	if streamID%2 == 1 {
  4190  		if streamID <= sc.maxClientStreamID {
  4191  			return http2stateClosed, nil
  4192  		}
  4193  	} else {
  4194  		if streamID <= sc.maxPushPromiseID {
  4195  			return http2stateClosed, nil
  4196  		}
  4197  	}
  4198  	return http2stateIdle, nil
  4199  }
  4200  
  4201  // setConnState calls the net/http ConnState hook for this connection, if configured.
  4202  // Note that the net/http package does StateNew and StateClosed for us.
  4203  // There is currently no plan for StateHijacked or hijacking HTTP/2 connections.
  4204  func (sc *http2serverConn) setConnState(state ConnState) {
  4205  	if sc.hs.ConnState != nil {
  4206  		sc.hs.ConnState(sc.conn, state)
  4207  	}
  4208  }
  4209  
  4210  func (sc *http2serverConn) vlogf(format string, args ...interface{}) {
  4211  	if http2VerboseLogs {
  4212  		sc.logf(format, args...)
  4213  	}
  4214  }
  4215  
  4216  func (sc *http2serverConn) logf(format string, args ...interface{}) {
  4217  	if lg := sc.hs.ErrorLog; lg != nil {
  4218  		lg.Printf(format, args...)
  4219  	} else {
  4220  		log.Printf(format, args...)
  4221  	}
  4222  }
  4223  
  4224  // errno returns v's underlying uintptr, else 0.
  4225  //
  4226  // TODO: remove this helper function once http2 can use build
  4227  // tags. See comment in isClosedConnError.
  4228  func http2errno(v error) uintptr {
  4229  	if rv := reflect.ValueOf(v); rv.Kind() == reflect.Uintptr {
  4230  		return uintptr(rv.Uint())
  4231  	}
  4232  	return 0
  4233  }
  4234  
  4235  // isClosedConnError reports whether err is an error from use of a closed
  4236  // network connection.
  4237  func http2isClosedConnError(err error) bool {
  4238  	if err == nil {
  4239  		return false
  4240  	}
  4241  
  4242  	// TODO: remove this string search and be more like the Windows
  4243  	// case below. That might involve modifying the standard library
  4244  	// to return better error types.
  4245  	str := err.Error()
  4246  	if strings.Contains(str, "use of closed network connection") {
  4247  		return true
  4248  	}
  4249  
  4250  	// TODO(bradfitz): x/tools/cmd/bundle doesn't really support
  4251  	// build tags, so I can't make an http2_windows.go file with
  4252  	// Windows-specific stuff. Fix that and move this, once we
  4253  	// have a way to bundle this into std's net/http somehow.
  4254  	if runtime.GOOS == "windows" {
  4255  		if oe, ok := err.(*net.OpError); ok && oe.Op == "read" {
  4256  			if se, ok := oe.Err.(*os.SyscallError); ok && se.Syscall == "wsarecv" {
  4257  				const WSAECONNABORTED = 10053
  4258  				const WSAECONNRESET = 10054
  4259  				if n := http2errno(se.Err); n == WSAECONNRESET || n == WSAECONNABORTED {
  4260  					return true
  4261  				}
  4262  			}
  4263  		}
  4264  	}
  4265  	return false
  4266  }
  4267  
  4268  func (sc *http2serverConn) condlogf(err error, format string, args ...interface{}) {
  4269  	if err == nil {
  4270  		return
  4271  	}
  4272  	if err == io.EOF || err == io.ErrUnexpectedEOF || http2isClosedConnError(err) || err == http2errPrefaceTimeout {
  4273  		// Boring, expected errors.
  4274  		sc.vlogf(format, args...)
  4275  	} else {
  4276  		sc.logf(format, args...)
  4277  	}
  4278  }
  4279  
  4280  func (sc *http2serverConn) canonicalHeader(v string) string {
  4281  	sc.serveG.check()
  4282  	http2buildCommonHeaderMapsOnce()
  4283  	cv, ok := http2commonCanonHeader[v]
  4284  	if ok {
  4285  		return cv
  4286  	}
  4287  	cv, ok = sc.canonHeader[v]
  4288  	if ok {
  4289  		return cv
  4290  	}
  4291  	if sc.canonHeader == nil {
  4292  		sc.canonHeader = make(map[string]string)
  4293  	}
  4294  	cv = CanonicalHeaderKey(v)
  4295  	sc.canonHeader[v] = cv
  4296  	return cv
  4297  }
  4298  
  4299  type http2readFrameResult struct {
  4300  	f   http2Frame // valid until readMore is called
  4301  	err error
  4302  
  4303  	// readMore should be called once the consumer no longer needs or
  4304  	// retains f. After readMore, f is invalid and more frames can be
  4305  	// read.
  4306  	readMore func()
  4307  }
  4308  
  4309  // readFrames is the loop that reads incoming frames.
  4310  // It takes care to only read one frame at a time, blocking until the
  4311  // consumer is done with the frame.
  4312  // It's run on its own goroutine.
  4313  func (sc *http2serverConn) readFrames() {
  4314  	gate := make(http2gate)
  4315  	gateDone := gate.Done
  4316  	for {
  4317  		f, err := sc.framer.ReadFrame()
  4318  		select {
  4319  		case sc.readFrameCh <- http2readFrameResult{f, err, gateDone}:
  4320  		case <-sc.doneServing:
  4321  			return
  4322  		}
  4323  		select {
  4324  		case <-gate:
  4325  		case <-sc.doneServing:
  4326  			return
  4327  		}
  4328  		if http2terminalReadFrameError(err) {
  4329  			return
  4330  		}
  4331  	}
  4332  }
  4333  
  4334  // frameWriteResult is the message passed from writeFrameAsync to the serve goroutine.
  4335  type http2frameWriteResult struct {
  4336  	wr  http2FrameWriteRequest // what was written (or attempted)
  4337  	err error                  // result of the writeFrame call
  4338  }
  4339  
  4340  // writeFrameAsync runs in its own goroutine and writes a single frame
  4341  // and then reports when it's done.
  4342  // At most one goroutine can be running writeFrameAsync at a time per
  4343  // serverConn.
  4344  func (sc *http2serverConn) writeFrameAsync(wr http2FrameWriteRequest) {
  4345  	err := wr.write.writeFrame(sc)
  4346  	sc.wroteFrameCh <- http2frameWriteResult{wr, err}
  4347  }
  4348  
  4349  func (sc *http2serverConn) closeAllStreamsOnConnClose() {
  4350  	sc.serveG.check()
  4351  	for _, st := range sc.streams {
  4352  		sc.closeStream(st, http2errClientDisconnected)
  4353  	}
  4354  }
  4355  
  4356  func (sc *http2serverConn) stopShutdownTimer() {
  4357  	sc.serveG.check()
  4358  	if t := sc.shutdownTimer; t != nil {
  4359  		t.Stop()
  4360  	}
  4361  }
  4362  
  4363  func (sc *http2serverConn) notePanic() {
  4364  	// Note: this is for serverConn.serve panicking, not http.Handler code.
  4365  	if http2testHookOnPanicMu != nil {
  4366  		http2testHookOnPanicMu.Lock()
  4367  		defer http2testHookOnPanicMu.Unlock()
  4368  	}
  4369  	if http2testHookOnPanic != nil {
  4370  		if e := recover(); e != nil {
  4371  			if http2testHookOnPanic(sc, e) {
  4372  				panic(e)
  4373  			}
  4374  		}
  4375  	}
  4376  }
  4377  
  4378  func (sc *http2serverConn) serve() {
  4379  	sc.serveG.check()
  4380  	defer sc.notePanic()
  4381  	defer sc.conn.Close()
  4382  	defer sc.closeAllStreamsOnConnClose()
  4383  	defer sc.stopShutdownTimer()
  4384  	defer close(sc.doneServing) // unblocks handlers trying to send
  4385  
  4386  	if http2VerboseLogs {
  4387  		sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs)
  4388  	}
  4389  
  4390  	sc.writeFrame(http2FrameWriteRequest{
  4391  		write: http2writeSettings{
  4392  			{http2SettingMaxFrameSize, sc.srv.maxReadFrameSize()},
  4393  			{http2SettingMaxConcurrentStreams, sc.advMaxStreams},
  4394  			{http2SettingMaxHeaderListSize, sc.maxHeaderListSize()},
  4395  			{http2SettingInitialWindowSize, uint32(sc.srv.initialStreamRecvWindowSize())},
  4396  		},
  4397  	})
  4398  	sc.unackedSettings++
  4399  
  4400  	// Each connection starts with intialWindowSize inflow tokens.
  4401  	// If a higher value is configured, we add more tokens.
  4402  	if diff := sc.srv.initialConnRecvWindowSize() - http2initialWindowSize; diff > 0 {
  4403  		sc.sendWindowUpdate(nil, int(diff))
  4404  	}
  4405  
  4406  	if err := sc.readPreface(); err != nil {
  4407  		sc.condlogf(err, "http2: server: error reading preface from client %v: %v", sc.conn.RemoteAddr(), err)
  4408  		return
  4409  	}
  4410  	// Now that we've got the preface, get us out of the
  4411  	// "StateNew" state. We can't go directly to idle, though.
  4412  	// Active means we read some data and anticipate a request. We'll
  4413  	// do another Active when we get a HEADERS frame.
  4414  	sc.setConnState(StateActive)
  4415  	sc.setConnState(StateIdle)
  4416  
  4417  	if sc.srv.IdleTimeout != 0 {
  4418  		sc.idleTimer = time.AfterFunc(sc.srv.IdleTimeout, sc.onIdleTimer)
  4419  		defer sc.idleTimer.Stop()
  4420  	}
  4421  
  4422  	go sc.readFrames() // closed by defer sc.conn.Close above
  4423  
  4424  	settingsTimer := time.AfterFunc(http2firstSettingsTimeout, sc.onSettingsTimer)
  4425  	defer settingsTimer.Stop()
  4426  
  4427  	loopNum := 0
  4428  	for {
  4429  		loopNum++
  4430  		select {
  4431  		case wr := <-sc.wantWriteFrameCh:
  4432  			if se, ok := wr.write.(http2StreamError); ok {
  4433  				sc.resetStream(se)
  4434  				break
  4435  			}
  4436  			sc.writeFrame(wr)
  4437  		case res := <-sc.wroteFrameCh:
  4438  			sc.wroteFrame(res)
  4439  		case res := <-sc.readFrameCh:
  4440  			if !sc.processFrameFromReader(res) {
  4441  				return
  4442  			}
  4443  			res.readMore()
  4444  			if settingsTimer != nil {
  4445  				settingsTimer.Stop()
  4446  				settingsTimer = nil
  4447  			}
  4448  		case m := <-sc.bodyReadCh:
  4449  			sc.noteBodyRead(m.st, m.n)
  4450  		case msg := <-sc.serveMsgCh:
  4451  			switch v := msg.(type) {
  4452  			case func(int):
  4453  				v(loopNum) // for testing
  4454  			case *http2serverMessage:
  4455  				switch v {
  4456  				case http2settingsTimerMsg:
  4457  					sc.logf("timeout waiting for SETTINGS frames from %v", sc.conn.RemoteAddr())
  4458  					return
  4459  				case http2idleTimerMsg:
  4460  					sc.vlogf("connection is idle")
  4461  					sc.goAway(http2ErrCodeNo)
  4462  				case http2shutdownTimerMsg:
  4463  					sc.vlogf("GOAWAY close timer fired; closing conn from %v", sc.conn.RemoteAddr())
  4464  					return
  4465  				case http2gracefulShutdownMsg:
  4466  					sc.startGracefulShutdownInternal()
  4467  				default:
  4468  					panic("unknown timer")
  4469  				}
  4470  			case *http2startPushRequest:
  4471  				sc.startPush(v)
  4472  			default:
  4473  				panic(fmt.Sprintf("unexpected type %T", v))
  4474  			}
  4475  		}
  4476  
  4477  		// If the peer is causing us to generate a lot of control frames,
  4478  		// but not reading them from us, assume they are trying to make us
  4479  		// run out of memory.
  4480  		if sc.queuedControlFrames > sc.srv.maxQueuedControlFrames() {
  4481  			sc.vlogf("http2: too many control frames in send queue, closing connection")
  4482  			return
  4483  		}
  4484  
  4485  		// Start the shutdown timer after sending a GOAWAY. When sending GOAWAY
  4486  		// with no error code (graceful shutdown), don't start the timer until
  4487  		// all open streams have been completed.
  4488  		sentGoAway := sc.inGoAway && !sc.needToSendGoAway && !sc.writingFrame
  4489  		gracefulShutdownComplete := sc.goAwayCode == http2ErrCodeNo && sc.curOpenStreams() == 0
  4490  		if sentGoAway && sc.shutdownTimer == nil && (sc.goAwayCode != http2ErrCodeNo || gracefulShutdownComplete) {
  4491  			sc.shutDownIn(http2goAwayTimeout)
  4492  		}
  4493  	}
  4494  }
  4495  
  4496  func (sc *http2serverConn) awaitGracefulShutdown(sharedCh <-chan struct{}, privateCh chan struct{}) {
  4497  	select {
  4498  	case <-sc.doneServing:
  4499  	case <-sharedCh:
  4500  		close(privateCh)
  4501  	}
  4502  }
  4503  
  4504  type http2serverMessage int
  4505  
  4506  // Message values sent to serveMsgCh.
  4507  var (
  4508  	http2settingsTimerMsg    = new(http2serverMessage)
  4509  	http2idleTimerMsg        = new(http2serverMessage)
  4510  	http2shutdownTimerMsg    = new(http2serverMessage)
  4511  	http2gracefulShutdownMsg = new(http2serverMessage)
  4512  )
  4513  
  4514  func (sc *http2serverConn) onSettingsTimer() { sc.sendServeMsg(http2settingsTimerMsg) }
  4515  
  4516  func (sc *http2serverConn) onIdleTimer() { sc.sendServeMsg(http2idleTimerMsg) }
  4517  
  4518  func (sc *http2serverConn) onShutdownTimer() { sc.sendServeMsg(http2shutdownTimerMsg) }
  4519  
  4520  func (sc *http2serverConn) sendServeMsg(msg interface{}) {
  4521  	sc.serveG.checkNotOn() // NOT
  4522  	select {
  4523  	case sc.serveMsgCh <- msg:
  4524  	case <-sc.doneServing:
  4525  	}
  4526  }
  4527  
  4528  var http2errPrefaceTimeout = errors.New("timeout waiting for client preface")
  4529  
  4530  // readPreface reads the ClientPreface greeting from the peer or
  4531  // returns errPrefaceTimeout on timeout, or an error if the greeting
  4532  // is invalid.
  4533  func (sc *http2serverConn) readPreface() error {
  4534  	errc := make(chan error, 1)
  4535  	go func() {
  4536  		// Read the client preface
  4537  		buf := make([]byte, len(http2ClientPreface))
  4538  		if _, err := io.ReadFull(sc.conn, buf); err != nil {
  4539  			errc <- err
  4540  		} else if !bytes.Equal(buf, http2clientPreface) {
  4541  			errc <- fmt.Errorf("bogus greeting %q", buf)
  4542  		} else {
  4543  			errc <- nil
  4544  		}
  4545  	}()
  4546  	timer := time.NewTimer(http2prefaceTimeout) // TODO: configurable on *Server?
  4547  	defer timer.Stop()
  4548  	select {
  4549  	case <-timer.C:
  4550  		return http2errPrefaceTimeout
  4551  	case err := <-errc:
  4552  		if err == nil {
  4553  			if http2VerboseLogs {
  4554  				sc.vlogf("http2: server: client %v said hello", sc.conn.RemoteAddr())
  4555  			}
  4556  		}
  4557  		return err
  4558  	}
  4559  }
  4560  
  4561  var http2errChanPool = sync.Pool{
  4562  	New: func() interface{} { return make(chan error, 1) },
  4563  }
  4564  
  4565  var http2writeDataPool = sync.Pool{
  4566  	New: func() interface{} { return new(http2writeData) },
  4567  }
  4568  
  4569  // writeDataFromHandler writes DATA response frames from a handler on
  4570  // the given stream.
  4571  func (sc *http2serverConn) writeDataFromHandler(stream *http2stream, data []byte, endStream bool) error {
  4572  	ch := http2errChanPool.Get().(chan error)
  4573  	writeArg := http2writeDataPool.Get().(*http2writeData)
  4574  	*writeArg = http2writeData{stream.id, data, endStream}
  4575  	err := sc.writeFrameFromHandler(http2FrameWriteRequest{
  4576  		write:  writeArg,
  4577  		stream: stream,
  4578  		done:   ch,
  4579  	})
  4580  	if err != nil {
  4581  		return err
  4582  	}
  4583  	var frameWriteDone bool // the frame write is done (successfully or not)
  4584  	select {
  4585  	case err = <-ch:
  4586  		frameWriteDone = true
  4587  	case <-sc.doneServing:
  4588  		return http2errClientDisconnected
  4589  	case <-stream.cw:
  4590  		// If both ch and stream.cw were ready (as might
  4591  		// happen on the final Write after an http.Handler
  4592  		// ends), prefer the write result. Otherwise this
  4593  		// might just be us successfully closing the stream.
  4594  		// The writeFrameAsync and serve goroutines guarantee
  4595  		// that the ch send will happen before the stream.cw
  4596  		// close.
  4597  		select {
  4598  		case err = <-ch:
  4599  			frameWriteDone = true
  4600  		default:
  4601  			return http2errStreamClosed
  4602  		}
  4603  	}
  4604  	http2errChanPool.Put(ch)
  4605  	if frameWriteDone {
  4606  		http2writeDataPool.Put(writeArg)
  4607  	}
  4608  	return err
  4609  }
  4610  
  4611  // writeFrameFromHandler sends wr to sc.wantWriteFrameCh, but aborts
  4612  // if the connection has gone away.
  4613  //
  4614  // This must not be run from the serve goroutine itself, else it might
  4615  // deadlock writing to sc.wantWriteFrameCh (which is only mildly
  4616  // buffered and is read by serve itself). If you're on the serve
  4617  // goroutine, call writeFrame instead.
  4618  func (sc *http2serverConn) writeFrameFromHandler(wr http2FrameWriteRequest) error {
  4619  	sc.serveG.checkNotOn() // NOT
  4620  	select {
  4621  	case sc.wantWriteFrameCh <- wr:
  4622  		return nil
  4623  	case <-sc.doneServing:
  4624  		// Serve loop is gone.
  4625  		// Client has closed their connection to the server.
  4626  		return http2errClientDisconnected
  4627  	}
  4628  }
  4629  
  4630  // writeFrame schedules a frame to write and sends it if there's nothing
  4631  // already being written.
  4632  //
  4633  // There is no pushback here (the serve goroutine never blocks). It's
  4634  // the http.Handlers that block, waiting for their previous frames to
  4635  // make it onto the wire
  4636  //
  4637  // If you're not on the serve goroutine, use writeFrameFromHandler instead.
  4638  func (sc *http2serverConn) writeFrame(wr http2FrameWriteRequest) {
  4639  	sc.serveG.check()
  4640  
  4641  	// If true, wr will not be written and wr.done will not be signaled.
  4642  	var ignoreWrite bool
  4643  
  4644  	// We are not allowed to write frames on closed streams. RFC 7540 Section
  4645  	// 5.1.1 says: "An endpoint MUST NOT send frames other than PRIORITY on
  4646  	// a closed stream." Our server never sends PRIORITY, so that exception
  4647  	// does not apply.
  4648  	//
  4649  	// The serverConn might close an open stream while the stream's handler
  4650  	// is still running. For example, the server might close a stream when it
  4651  	// receives bad data from the client. If this happens, the handler might
  4652  	// attempt to write a frame after the stream has been closed (since the
  4653  	// handler hasn't yet been notified of the close). In this case, we simply
  4654  	// ignore the frame. The handler will notice that the stream is closed when
  4655  	// it waits for the frame to be written.
  4656  	//
  4657  	// As an exception to this rule, we allow sending RST_STREAM after close.
  4658  	// This allows us to immediately reject new streams without tracking any
  4659  	// state for those streams (except for the queued RST_STREAM frame). This
  4660  	// may result in duplicate RST_STREAMs in some cases, but the client should
  4661  	// ignore those.
  4662  	if wr.StreamID() != 0 {
  4663  		_, isReset := wr.write.(http2StreamError)
  4664  		if state, _ := sc.state(wr.StreamID()); state == http2stateClosed && !isReset {
  4665  			ignoreWrite = true
  4666  		}
  4667  	}
  4668  
  4669  	// Don't send a 100-continue response if we've already sent headers.
  4670  	// See golang.org/issue/14030.
  4671  	switch wr.write.(type) {
  4672  	case *http2writeResHeaders:
  4673  		wr.stream.wroteHeaders = true
  4674  	case http2write100ContinueHeadersFrame:
  4675  		if wr.stream.wroteHeaders {
  4676  			// We do not need to notify wr.done because this frame is
  4677  			// never written with wr.done != nil.
  4678  			if wr.done != nil {
  4679  				panic("wr.done != nil for write100ContinueHeadersFrame")
  4680  			}
  4681  			ignoreWrite = true
  4682  		}
  4683  	}
  4684  
  4685  	if !ignoreWrite {
  4686  		if wr.isControl() {
  4687  			sc.queuedControlFrames++
  4688  			// For extra safety, detect wraparounds, which should not happen,
  4689  			// and pull the plug.
  4690  			if sc.queuedControlFrames < 0 {
  4691  				sc.conn.Close()
  4692  			}
  4693  		}
  4694  		sc.writeSched.Push(wr)
  4695  	}
  4696  	sc.scheduleFrameWrite()
  4697  }
  4698  
  4699  // startFrameWrite starts a goroutine to write wr (in a separate
  4700  // goroutine since that might block on the network), and updates the
  4701  // serve goroutine's state about the world, updated from info in wr.
  4702  func (sc *http2serverConn) startFrameWrite(wr http2FrameWriteRequest) {
  4703  	sc.serveG.check()
  4704  	if sc.writingFrame {
  4705  		panic("internal error: can only be writing one frame at a time")
  4706  	}
  4707  
  4708  	st := wr.stream
  4709  	if st != nil {
  4710  		switch st.state {
  4711  		case http2stateHalfClosedLocal:
  4712  			switch wr.write.(type) {
  4713  			case http2StreamError, http2handlerPanicRST, http2writeWindowUpdate:
  4714  				// RFC 7540 Section 5.1 allows sending RST_STREAM, PRIORITY, and WINDOW_UPDATE
  4715  				// in this state. (We never send PRIORITY from the server, so that is not checked.)
  4716  			default:
  4717  				panic(fmt.Sprintf("internal error: attempt to send frame on a half-closed-local stream: %v", wr))
  4718  			}
  4719  		case http2stateClosed:
  4720  			panic(fmt.Sprintf("internal error: attempt to send frame on a closed stream: %v", wr))
  4721  		}
  4722  	}
  4723  	if wpp, ok := wr.write.(*http2writePushPromise); ok {
  4724  		var err error
  4725  		wpp.promisedID, err = wpp.allocatePromisedID()
  4726  		if err != nil {
  4727  			sc.writingFrameAsync = false
  4728  			wr.replyToWriter(err)
  4729  			return
  4730  		}
  4731  	}
  4732  
  4733  	sc.writingFrame = true
  4734  	sc.needsFrameFlush = true
  4735  	if wr.write.staysWithinBuffer(sc.bw.Available()) {
  4736  		sc.writingFrameAsync = false
  4737  		err := wr.write.writeFrame(sc)
  4738  		sc.wroteFrame(http2frameWriteResult{wr, err})
  4739  	} else {
  4740  		sc.writingFrameAsync = true
  4741  		go sc.writeFrameAsync(wr)
  4742  	}
  4743  }
  4744  
  4745  // errHandlerPanicked is the error given to any callers blocked in a read from
  4746  // Request.Body when the main goroutine panics. Since most handlers read in the
  4747  // main ServeHTTP goroutine, this will show up rarely.
  4748  var http2errHandlerPanicked = errors.New("http2: handler panicked")
  4749  
  4750  // wroteFrame is called on the serve goroutine with the result of
  4751  // whatever happened on writeFrameAsync.
  4752  func (sc *http2serverConn) wroteFrame(res http2frameWriteResult) {
  4753  	sc.serveG.check()
  4754  	if !sc.writingFrame {
  4755  		panic("internal error: expected to be already writing a frame")
  4756  	}
  4757  	sc.writingFrame = false
  4758  	sc.writingFrameAsync = false
  4759  
  4760  	wr := res.wr
  4761  
  4762  	if http2writeEndsStream(wr.write) {
  4763  		st := wr.stream
  4764  		if st == nil {
  4765  			panic("internal error: expecting non-nil stream")
  4766  		}
  4767  		switch st.state {
  4768  		case http2stateOpen:
  4769  			// Here we would go to stateHalfClosedLocal in
  4770  			// theory, but since our handler is done and
  4771  			// the net/http package provides no mechanism
  4772  			// for closing a ResponseWriter while still
  4773  			// reading data (see possible TODO at top of
  4774  			// this file), we go into closed state here
  4775  			// anyway, after telling the peer we're
  4776  			// hanging up on them. We'll transition to
  4777  			// stateClosed after the RST_STREAM frame is
  4778  			// written.
  4779  			st.state = http2stateHalfClosedLocal
  4780  			// Section 8.1: a server MAY request that the client abort
  4781  			// transmission of a request without error by sending a
  4782  			// RST_STREAM with an error code of NO_ERROR after sending
  4783  			// a complete response.
  4784  			sc.resetStream(http2streamError(st.id, http2ErrCodeNo))
  4785  		case http2stateHalfClosedRemote:
  4786  			sc.closeStream(st, http2errHandlerComplete)
  4787  		}
  4788  	} else {
  4789  		switch v := wr.write.(type) {
  4790  		case http2StreamError:
  4791  			// st may be unknown if the RST_STREAM was generated to reject bad input.
  4792  			if st, ok := sc.streams[v.StreamID]; ok {
  4793  				sc.closeStream(st, v)
  4794  			}
  4795  		case http2handlerPanicRST:
  4796  			sc.closeStream(wr.stream, http2errHandlerPanicked)
  4797  		}
  4798  	}
  4799  
  4800  	// Reply (if requested) to unblock the ServeHTTP goroutine.
  4801  	wr.replyToWriter(res.err)
  4802  
  4803  	sc.scheduleFrameWrite()
  4804  }
  4805  
  4806  // scheduleFrameWrite tickles the frame writing scheduler.
  4807  //
  4808  // If a frame is already being written, nothing happens. This will be called again
  4809  // when the frame is done being written.
  4810  //
  4811  // If a frame isn't being written and we need to send one, the best frame
  4812  // to send is selected by writeSched.
  4813  //
  4814  // If a frame isn't being written and there's nothing else to send, we
  4815  // flush the write buffer.
  4816  func (sc *http2serverConn) scheduleFrameWrite() {
  4817  	sc.serveG.check()
  4818  	if sc.writingFrame || sc.inFrameScheduleLoop {
  4819  		return
  4820  	}
  4821  	sc.inFrameScheduleLoop = true
  4822  	for !sc.writingFrameAsync {
  4823  		if sc.needToSendGoAway {
  4824  			sc.needToSendGoAway = false
  4825  			sc.startFrameWrite(http2FrameWriteRequest{
  4826  				write: &http2writeGoAway{
  4827  					maxStreamID: sc.maxClientStreamID,
  4828  					code:        sc.goAwayCode,
  4829  				},
  4830  			})
  4831  			continue
  4832  		}
  4833  		if sc.needToSendSettingsAck {
  4834  			sc.needToSendSettingsAck = false
  4835  			sc.startFrameWrite(http2FrameWriteRequest{write: http2writeSettingsAck{}})
  4836  			continue
  4837  		}
  4838  		if !sc.inGoAway || sc.goAwayCode == http2ErrCodeNo {
  4839  			if wr, ok := sc.writeSched.Pop(); ok {
  4840  				if wr.isControl() {
  4841  					sc.queuedControlFrames--
  4842  				}
  4843  				sc.startFrameWrite(wr)
  4844  				continue
  4845  			}
  4846  		}
  4847  		if sc.needsFrameFlush {
  4848  			sc.startFrameWrite(http2FrameWriteRequest{write: http2flushFrameWriter{}})
  4849  			sc.needsFrameFlush = false // after startFrameWrite, since it sets this true
  4850  			continue
  4851  		}
  4852  		break
  4853  	}
  4854  	sc.inFrameScheduleLoop = false
  4855  }
  4856  
  4857  // startGracefulShutdown gracefully shuts down a connection. This
  4858  // sends GOAWAY with ErrCodeNo to tell the client we're gracefully
  4859  // shutting down. The connection isn't closed until all current
  4860  // streams are done.
  4861  //
  4862  // startGracefulShutdown returns immediately; it does not wait until
  4863  // the connection has shut down.
  4864  func (sc *http2serverConn) startGracefulShutdown() {
  4865  	sc.serveG.checkNotOn() // NOT
  4866  	sc.shutdownOnce.Do(func() { sc.sendServeMsg(http2gracefulShutdownMsg) })
  4867  }
  4868  
  4869  // After sending GOAWAY, the connection will close after goAwayTimeout.
  4870  // If we close the connection immediately after sending GOAWAY, there may
  4871  // be unsent data in our kernel receive buffer, which will cause the kernel
  4872  // to send a TCP RST on close() instead of a FIN. This RST will abort the
  4873  // connection immediately, whether or not the client had received the GOAWAY.
  4874  //
  4875  // Ideally we should delay for at least 1 RTT + epsilon so the client has
  4876  // a chance to read the GOAWAY and stop sending messages. Measuring RTT
  4877  // is hard, so we approximate with 1 second. See golang.org/issue/18701.
  4878  //
  4879  // This is a var so it can be shorter in tests, where all requests uses the
  4880  // loopback interface making the expected RTT very small.
  4881  //
  4882  // TODO: configurable?
  4883  var http2goAwayTimeout = 1 * time.Second
  4884  
  4885  func (sc *http2serverConn) startGracefulShutdownInternal() {
  4886  	sc.goAway(http2ErrCodeNo)
  4887  }
  4888  
  4889  func (sc *http2serverConn) goAway(code http2ErrCode) {
  4890  	sc.serveG.check()
  4891  	if sc.inGoAway {
  4892  		return
  4893  	}
  4894  	sc.inGoAway = true
  4895  	sc.needToSendGoAway = true
  4896  	sc.goAwayCode = code
  4897  	sc.scheduleFrameWrite()
  4898  }
  4899  
  4900  func (sc *http2serverConn) shutDownIn(d time.Duration) {
  4901  	sc.serveG.check()
  4902  	sc.shutdownTimer = time.AfterFunc(d, sc.onShutdownTimer)
  4903  }
  4904  
  4905  func (sc *http2serverConn) resetStream(se http2StreamError) {
  4906  	sc.serveG.check()
  4907  	sc.writeFrame(http2FrameWriteRequest{write: se})
  4908  	if st, ok := sc.streams[se.StreamID]; ok {
  4909  		st.resetQueued = true
  4910  	}
  4911  }
  4912  
  4913  // processFrameFromReader processes the serve loop's read from readFrameCh from the
  4914  // frame-reading goroutine.
  4915  // processFrameFromReader returns whether the connection should be kept open.
  4916  func (sc *http2serverConn) processFrameFromReader(res http2readFrameResult) bool {
  4917  	sc.serveG.check()
  4918  	err := res.err
  4919  	if err != nil {
  4920  		if err == http2ErrFrameTooLarge {
  4921  			sc.goAway(http2ErrCodeFrameSize)
  4922  			return true // goAway will close the loop
  4923  		}
  4924  		clientGone := err == io.EOF || err == io.ErrUnexpectedEOF || http2isClosedConnError(err)
  4925  		if clientGone {
  4926  			// TODO: could we also get into this state if
  4927  			// the peer does a half close
  4928  			// (e.g. CloseWrite) because they're done
  4929  			// sending frames but they're still wanting
  4930  			// our open replies?  Investigate.
  4931  			// TODO: add CloseWrite to crypto/tls.Conn first
  4932  			// so we have a way to test this? I suppose
  4933  			// just for testing we could have a non-TLS mode.
  4934  			return false
  4935  		}
  4936  	} else {
  4937  		f := res.f
  4938  		if http2VerboseLogs {
  4939  			sc.vlogf("http2: server read frame %v", http2summarizeFrame(f))
  4940  		}
  4941  		err = sc.processFrame(f)
  4942  		if err == nil {
  4943  			return true
  4944  		}
  4945  	}
  4946  
  4947  	switch ev := err.(type) {
  4948  	case http2StreamError:
  4949  		sc.resetStream(ev)
  4950  		return true
  4951  	case http2goAwayFlowError:
  4952  		sc.goAway(http2ErrCodeFlowControl)
  4953  		return true
  4954  	case http2ConnectionError:
  4955  		sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev)
  4956  		sc.goAway(http2ErrCode(ev))
  4957  		return true // goAway will handle shutdown
  4958  	default:
  4959  		if res.err != nil {
  4960  			sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err)
  4961  		} else {
  4962  			sc.logf("http2: server closing client connection: %v", err)
  4963  		}
  4964  		return false
  4965  	}
  4966  }
  4967  
  4968  func (sc *http2serverConn) processFrame(f http2Frame) error {
  4969  	sc.serveG.check()
  4970  
  4971  	// First frame received must be SETTINGS.
  4972  	if !sc.sawFirstSettings {
  4973  		if _, ok := f.(*http2SettingsFrame); !ok {
  4974  			return http2ConnectionError(http2ErrCodeProtocol)
  4975  		}
  4976  		sc.sawFirstSettings = true
  4977  	}
  4978  
  4979  	switch f := f.(type) {
  4980  	case *http2SettingsFrame:
  4981  		return sc.processSettings(f)
  4982  	case *http2MetaHeadersFrame:
  4983  		return sc.processHeaders(f)
  4984  	case *http2WindowUpdateFrame:
  4985  		return sc.processWindowUpdate(f)
  4986  	case *http2PingFrame:
  4987  		return sc.processPing(f)
  4988  	case *http2DataFrame:
  4989  		return sc.processData(f)
  4990  	case *http2RSTStreamFrame:
  4991  		return sc.processResetStream(f)
  4992  	case *http2PriorityFrame:
  4993  		return sc.processPriority(f)
  4994  	case *http2GoAwayFrame:
  4995  		return sc.processGoAway(f)
  4996  	case *http2PushPromiseFrame:
  4997  		// A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE
  4998  		// frame as a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
  4999  		return http2ConnectionError(http2ErrCodeProtocol)
  5000  	default:
  5001  		sc.vlogf("http2: server ignoring frame: %v", f.Header())
  5002  		return nil
  5003  	}
  5004  }
  5005  
  5006  func (sc *http2serverConn) processPing(f *http2PingFrame) error {
  5007  	sc.serveG.check()
  5008  	if f.IsAck() {
  5009  		// 6.7 PING: " An endpoint MUST NOT respond to PING frames
  5010  		// containing this flag."
  5011  		return nil
  5012  	}
  5013  	if f.StreamID != 0 {
  5014  		// "PING frames are not associated with any individual
  5015  		// stream. If a PING frame is received with a stream
  5016  		// identifier field value other than 0x0, the recipient MUST
  5017  		// respond with a connection error (Section 5.4.1) of type
  5018  		// PROTOCOL_ERROR."
  5019  		return http2ConnectionError(http2ErrCodeProtocol)
  5020  	}
  5021  	if sc.inGoAway && sc.goAwayCode != http2ErrCodeNo {
  5022  		return nil
  5023  	}
  5024  	sc.writeFrame(http2FrameWriteRequest{write: http2writePingAck{f}})
  5025  	return nil
  5026  }
  5027  
  5028  func (sc *http2serverConn) processWindowUpdate(f *http2WindowUpdateFrame) error {
  5029  	sc.serveG.check()
  5030  	switch {
  5031  	case f.StreamID != 0: // stream-level flow control
  5032  		state, st := sc.state(f.StreamID)
  5033  		if state == http2stateIdle {
  5034  			// Section 5.1: "Receiving any frame other than HEADERS
  5035  			// or PRIORITY on a stream in this state MUST be
  5036  			// treated as a connection error (Section 5.4.1) of
  5037  			// type PROTOCOL_ERROR."
  5038  			return http2ConnectionError(http2ErrCodeProtocol)
  5039  		}
  5040  		if st == nil {
  5041  			// "WINDOW_UPDATE can be sent by a peer that has sent a
  5042  			// frame bearing the END_STREAM flag. This means that a
  5043  			// receiver could receive a WINDOW_UPDATE frame on a "half
  5044  			// closed (remote)" or "closed" stream. A receiver MUST
  5045  			// NOT treat this as an error, see Section 5.1."
  5046  			return nil
  5047  		}
  5048  		if !st.flow.add(int32(f.Increment)) {
  5049  			return http2streamError(f.StreamID, http2ErrCodeFlowControl)
  5050  		}
  5051  	default: // connection-level flow control
  5052  		if !sc.flow.add(int32(f.Increment)) {
  5053  			return http2goAwayFlowError{}
  5054  		}
  5055  	}
  5056  	sc.scheduleFrameWrite()
  5057  	return nil
  5058  }
  5059  
  5060  func (sc *http2serverConn) processResetStream(f *http2RSTStreamFrame) error {
  5061  	sc.serveG.check()
  5062  
  5063  	state, st := sc.state(f.StreamID)
  5064  	if state == http2stateIdle {
  5065  		// 6.4 "RST_STREAM frames MUST NOT be sent for a
  5066  		// stream in the "idle" state. If a RST_STREAM frame
  5067  		// identifying an idle stream is received, the
  5068  		// recipient MUST treat this as a connection error
  5069  		// (Section 5.4.1) of type PROTOCOL_ERROR.
  5070  		return http2ConnectionError(http2ErrCodeProtocol)
  5071  	}
  5072  	if st != nil {
  5073  		st.cancelCtx()
  5074  		sc.closeStream(st, http2streamError(f.StreamID, f.ErrCode))
  5075  	}
  5076  	return nil
  5077  }
  5078  
  5079  func (sc *http2serverConn) closeStream(st *http2stream, err error) {
  5080  	sc.serveG.check()
  5081  	if st.state == http2stateIdle || st.state == http2stateClosed {
  5082  		panic(fmt.Sprintf("invariant; can't close stream in state %v", st.state))
  5083  	}
  5084  	st.state = http2stateClosed
  5085  	if st.writeDeadline != nil {
  5086  		st.writeDeadline.Stop()
  5087  	}
  5088  	if st.isPushed() {
  5089  		sc.curPushedStreams--
  5090  	} else {
  5091  		sc.curClientStreams--
  5092  	}
  5093  	delete(sc.streams, st.id)
  5094  	if len(sc.streams) == 0 {
  5095  		sc.setConnState(StateIdle)
  5096  		if sc.srv.IdleTimeout != 0 {
  5097  			sc.idleTimer.Reset(sc.srv.IdleTimeout)
  5098  		}
  5099  		if http2h1ServerKeepAlivesDisabled(sc.hs) {
  5100  			sc.startGracefulShutdownInternal()
  5101  		}
  5102  	}
  5103  	if p := st.body; p != nil {
  5104  		// Return any buffered unread bytes worth of conn-level flow control.
  5105  		// See golang.org/issue/16481
  5106  		sc.sendWindowUpdate(nil, p.Len())
  5107  
  5108  		p.CloseWithError(err)
  5109  	}
  5110  	st.cw.Close() // signals Handler's CloseNotifier, unblocks writes, etc
  5111  	sc.writeSched.CloseStream(st.id)
  5112  }
  5113  
  5114  func (sc *http2serverConn) processSettings(f *http2SettingsFrame) error {
  5115  	sc.serveG.check()
  5116  	if f.IsAck() {
  5117  		sc.unackedSettings--
  5118  		if sc.unackedSettings < 0 {
  5119  			// Why is the peer ACKing settings we never sent?
  5120  			// The spec doesn't mention this case, but
  5121  			// hang up on them anyway.
  5122  			return http2ConnectionError(http2ErrCodeProtocol)
  5123  		}
  5124  		return nil
  5125  	}
  5126  	if f.NumSettings() > 100 || f.HasDuplicates() {
  5127  		// This isn't actually in the spec, but hang up on
  5128  		// suspiciously large settings frames or those with
  5129  		// duplicate entries.
  5130  		return http2ConnectionError(http2ErrCodeProtocol)
  5131  	}
  5132  	if err := f.ForeachSetting(sc.processSetting); err != nil {
  5133  		return err
  5134  	}
  5135  	// TODO: judging by RFC 7540, Section 6.5.3 each SETTINGS frame should be
  5136  	// acknowledged individually, even if multiple are received before the ACK.
  5137  	sc.needToSendSettingsAck = true
  5138  	sc.scheduleFrameWrite()
  5139  	return nil
  5140  }
  5141  
  5142  func (sc *http2serverConn) processSetting(s http2Setting) error {
  5143  	sc.serveG.check()
  5144  	if err := s.Valid(); err != nil {
  5145  		return err
  5146  	}
  5147  	if http2VerboseLogs {
  5148  		sc.vlogf("http2: server processing setting %v", s)
  5149  	}
  5150  	switch s.ID {
  5151  	case http2SettingHeaderTableSize:
  5152  		sc.headerTableSize = s.Val
  5153  		sc.hpackEncoder.SetMaxDynamicTableSize(s.Val)
  5154  	case http2SettingEnablePush:
  5155  		sc.pushEnabled = s.Val != 0
  5156  	case http2SettingMaxConcurrentStreams:
  5157  		sc.clientMaxStreams = s.Val
  5158  	case http2SettingInitialWindowSize:
  5159  		return sc.processSettingInitialWindowSize(s.Val)
  5160  	case http2SettingMaxFrameSize:
  5161  		sc.maxFrameSize = int32(s.Val) // the maximum valid s.Val is < 2^31
  5162  	case http2SettingMaxHeaderListSize:
  5163  		sc.peerMaxHeaderListSize = s.Val
  5164  	default:
  5165  		// Unknown setting: "An endpoint that receives a SETTINGS
  5166  		// frame with any unknown or unsupported identifier MUST
  5167  		// ignore that setting."
  5168  		if http2VerboseLogs {
  5169  			sc.vlogf("http2: server ignoring unknown setting %v", s)
  5170  		}
  5171  	}
  5172  	return nil
  5173  }
  5174  
  5175  func (sc *http2serverConn) processSettingInitialWindowSize(val uint32) error {
  5176  	sc.serveG.check()
  5177  	// Note: val already validated to be within range by
  5178  	// processSetting's Valid call.
  5179  
  5180  	// "A SETTINGS frame can alter the initial flow control window
  5181  	// size for all current streams. When the value of
  5182  	// SETTINGS_INITIAL_WINDOW_SIZE changes, a receiver MUST
  5183  	// adjust the size of all stream flow control windows that it
  5184  	// maintains by the difference between the new value and the
  5185  	// old value."
  5186  	old := sc.initialStreamSendWindowSize
  5187  	sc.initialStreamSendWindowSize = int32(val)
  5188  	growth := int32(val) - old // may be negative
  5189  	for _, st := range sc.streams {
  5190  		if !st.flow.add(growth) {
  5191  			// 6.9.2 Initial Flow Control Window Size
  5192  			// "An endpoint MUST treat a change to
  5193  			// SETTINGS_INITIAL_WINDOW_SIZE that causes any flow
  5194  			// control window to exceed the maximum size as a
  5195  			// connection error (Section 5.4.1) of type
  5196  			// FLOW_CONTROL_ERROR."
  5197  			return http2ConnectionError(http2ErrCodeFlowControl)
  5198  		}
  5199  	}
  5200  	return nil
  5201  }
  5202  
  5203  func (sc *http2serverConn) processData(f *http2DataFrame) error {
  5204  	sc.serveG.check()
  5205  	if sc.inGoAway && sc.goAwayCode != http2ErrCodeNo {
  5206  		return nil
  5207  	}
  5208  	data := f.Data()
  5209  
  5210  	// "If a DATA frame is received whose stream is not in "open"
  5211  	// or "half closed (local)" state, the recipient MUST respond
  5212  	// with a stream error (Section 5.4.2) of type STREAM_CLOSED."
  5213  	id := f.Header().StreamID
  5214  	state, st := sc.state(id)
  5215  	if id == 0 || state == http2stateIdle {
  5216  		// Section 5.1: "Receiving any frame other than HEADERS
  5217  		// or PRIORITY on a stream in this state MUST be
  5218  		// treated as a connection error (Section 5.4.1) of
  5219  		// type PROTOCOL_ERROR."
  5220  		return http2ConnectionError(http2ErrCodeProtocol)
  5221  	}
  5222  	if st == nil || state != http2stateOpen || st.gotTrailerHeader || st.resetQueued {
  5223  		// This includes sending a RST_STREAM if the stream is
  5224  		// in stateHalfClosedLocal (which currently means that
  5225  		// the http.Handler returned, so it's done reading &
  5226  		// done writing). Try to stop the client from sending
  5227  		// more DATA.
  5228  
  5229  		// But still enforce their connection-level flow control,
  5230  		// and return any flow control bytes since we're not going
  5231  		// to consume them.
  5232  		if sc.inflow.available() < int32(f.Length) {
  5233  			return http2streamError(id, http2ErrCodeFlowControl)
  5234  		}
  5235  		// Deduct the flow control from inflow, since we're
  5236  		// going to immediately add it back in
  5237  		// sendWindowUpdate, which also schedules sending the
  5238  		// frames.
  5239  		sc.inflow.take(int32(f.Length))
  5240  		sc.sendWindowUpdate(nil, int(f.Length)) // conn-level
  5241  
  5242  		if st != nil && st.resetQueued {
  5243  			// Already have a stream error in flight. Don't send another.
  5244  			return nil
  5245  		}
  5246  		return http2streamError(id, http2ErrCodeStreamClosed)
  5247  	}
  5248  	if st.body == nil {
  5249  		panic("internal error: should have a body in this state")
  5250  	}
  5251  
  5252  	// Sender sending more than they'd declared?
  5253  	if st.declBodyBytes != -1 && st.bodyBytes+int64(len(data)) > st.declBodyBytes {
  5254  		st.body.CloseWithError(fmt.Errorf("sender tried to send more than declared Content-Length of %d bytes", st.declBodyBytes))
  5255  		// RFC 7540, sec 8.1.2.6: A request or response is also malformed if the
  5256  		// value of a content-length header field does not equal the sum of the
  5257  		// DATA frame payload lengths that form the body.
  5258  		return http2streamError(id, http2ErrCodeProtocol)
  5259  	}
  5260  	if f.Length > 0 {
  5261  		// Check whether the client has flow control quota.
  5262  		if st.inflow.available() < int32(f.Length) {
  5263  			return http2streamError(id, http2ErrCodeFlowControl)
  5264  		}
  5265  		st.inflow.take(int32(f.Length))
  5266  
  5267  		if len(data) > 0 {
  5268  			wrote, err := st.body.Write(data)
  5269  			if err != nil {
  5270  				return http2streamError(id, http2ErrCodeStreamClosed)
  5271  			}
  5272  			if wrote != len(data) {
  5273  				panic("internal error: bad Writer")
  5274  			}
  5275  			st.bodyBytes += int64(len(data))
  5276  		}
  5277  
  5278  		// Return any padded flow control now, since we won't
  5279  		// refund it later on body reads.
  5280  		if pad := int32(f.Length) - int32(len(data)); pad > 0 {
  5281  			sc.sendWindowUpdate32(nil, pad)
  5282  			sc.sendWindowUpdate32(st, pad)
  5283  		}
  5284  	}
  5285  	if f.StreamEnded() {
  5286  		st.endStream()
  5287  	}
  5288  	return nil
  5289  }
  5290  
  5291  func (sc *http2serverConn) processGoAway(f *http2GoAwayFrame) error {
  5292  	sc.serveG.check()
  5293  	if f.ErrCode != http2ErrCodeNo {
  5294  		sc.logf("http2: received GOAWAY %+v, starting graceful shutdown", f)
  5295  	} else {
  5296  		sc.vlogf("http2: received GOAWAY %+v, starting graceful shutdown", f)
  5297  	}
  5298  	sc.startGracefulShutdownInternal()
  5299  	// http://tools.ietf.org/html/rfc7540#section-6.8
  5300  	// We should not create any new streams, which means we should disable push.
  5301  	sc.pushEnabled = false
  5302  	return nil
  5303  }
  5304  
  5305  // isPushed reports whether the stream is server-initiated.
  5306  func (st *http2stream) isPushed() bool {
  5307  	return st.id%2 == 0
  5308  }
  5309  
  5310  // endStream closes a Request.Body's pipe. It is called when a DATA
  5311  // frame says a request body is over (or after trailers).
  5312  func (st *http2stream) endStream() {
  5313  	sc := st.sc
  5314  	sc.serveG.check()
  5315  
  5316  	if st.declBodyBytes != -1 && st.declBodyBytes != st.bodyBytes {
  5317  		st.body.CloseWithError(fmt.Errorf("request declared a Content-Length of %d but only wrote %d bytes",
  5318  			st.declBodyBytes, st.bodyBytes))
  5319  	} else {
  5320  		st.body.closeWithErrorAndCode(io.EOF, st.copyTrailersToHandlerRequest)
  5321  		st.body.CloseWithError(io.EOF)
  5322  	}
  5323  	st.state = http2stateHalfClosedRemote
  5324  }
  5325  
  5326  // copyTrailersToHandlerRequest is run in the Handler's goroutine in
  5327  // its Request.Body.Read just before it gets io.EOF.
  5328  func (st *http2stream) copyTrailersToHandlerRequest() {
  5329  	for k, vv := range st.trailer {
  5330  		if _, ok := st.reqTrailer[k]; ok {
  5331  			// Only copy it over it was pre-declared.
  5332  			st.reqTrailer[k] = vv
  5333  		}
  5334  	}
  5335  }
  5336  
  5337  // onWriteTimeout is run on its own goroutine (from time.AfterFunc)
  5338  // when the stream's WriteTimeout has fired.
  5339  func (st *http2stream) onWriteTimeout() {
  5340  	st.sc.writeFrameFromHandler(http2FrameWriteRequest{write: http2streamError(st.id, http2ErrCodeInternal)})
  5341  }
  5342  
  5343  func (sc *http2serverConn) processHeaders(f *http2MetaHeadersFrame) error {
  5344  	sc.serveG.check()
  5345  	id := f.StreamID
  5346  	if sc.inGoAway {
  5347  		// Ignore.
  5348  		return nil
  5349  	}
  5350  	// http://tools.ietf.org/html/rfc7540#section-5.1.1
  5351  	// Streams initiated by a client MUST use odd-numbered stream
  5352  	// identifiers. [...] An endpoint that receives an unexpected
  5353  	// stream identifier MUST respond with a connection error
  5354  	// (Section 5.4.1) of type PROTOCOL_ERROR.
  5355  	if id%2 != 1 {
  5356  		return http2ConnectionError(http2ErrCodeProtocol)
  5357  	}
  5358  	// A HEADERS frame can be used to create a new stream or
  5359  	// send a trailer for an open one. If we already have a stream
  5360  	// open, let it process its own HEADERS frame (trailers at this
  5361  	// point, if it's valid).
  5362  	if st := sc.streams[f.StreamID]; st != nil {
  5363  		if st.resetQueued {
  5364  			// We're sending RST_STREAM to close the stream, so don't bother
  5365  			// processing this frame.
  5366  			return nil
  5367  		}
  5368  		// RFC 7540, sec 5.1: If an endpoint receives additional frames, other than
  5369  		// WINDOW_UPDATE, PRIORITY, or RST_STREAM, for a stream that is in
  5370  		// this state, it MUST respond with a stream error (Section 5.4.2) of
  5371  		// type STREAM_CLOSED.
  5372  		if st.state == http2stateHalfClosedRemote {
  5373  			return http2streamError(id, http2ErrCodeStreamClosed)
  5374  		}
  5375  		return st.processTrailerHeaders(f)
  5376  	}
  5377  
  5378  	// [...] The identifier of a newly established stream MUST be
  5379  	// numerically greater than all streams that the initiating
  5380  	// endpoint has opened or reserved. [...]  An endpoint that
  5381  	// receives an unexpected stream identifier MUST respond with
  5382  	// a connection error (Section 5.4.1) of type PROTOCOL_ERROR.
  5383  	if id <= sc.maxClientStreamID {
  5384  		return http2ConnectionError(http2ErrCodeProtocol)
  5385  	}
  5386  	sc.maxClientStreamID = id
  5387  
  5388  	if sc.idleTimer != nil {
  5389  		sc.idleTimer.Stop()
  5390  	}
  5391  
  5392  	// http://tools.ietf.org/html/rfc7540#section-5.1.2
  5393  	// [...] Endpoints MUST NOT exceed the limit set by their peer. An
  5394  	// endpoint that receives a HEADERS frame that causes their
  5395  	// advertised concurrent stream limit to be exceeded MUST treat
  5396  	// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR
  5397  	// or REFUSED_STREAM.
  5398  	if sc.curClientStreams+1 > sc.advMaxStreams {
  5399  		if sc.unackedSettings == 0 {
  5400  			// They should know better.
  5401  			return http2streamError(id, http2ErrCodeProtocol)
  5402  		}
  5403  		// Assume it's a network race, where they just haven't
  5404  		// received our last SETTINGS update. But actually
  5405  		// this can't happen yet, because we don't yet provide
  5406  		// a way for users to adjust server parameters at
  5407  		// runtime.
  5408  		return http2streamError(id, http2ErrCodeRefusedStream)
  5409  	}
  5410  
  5411  	initialState := http2stateOpen
  5412  	if f.StreamEnded() {
  5413  		initialState = http2stateHalfClosedRemote
  5414  	}
  5415  	st := sc.newStream(id, 0, initialState)
  5416  
  5417  	if f.HasPriority() {
  5418  		if err := http2checkPriority(f.StreamID, f.Priority); err != nil {
  5419  			return err
  5420  		}
  5421  		sc.writeSched.AdjustStream(st.id, f.Priority)
  5422  	}
  5423  
  5424  	rw, req, err := sc.newWriterAndRequest(st, f)
  5425  	if err != nil {
  5426  		return err
  5427  	}
  5428  	st.reqTrailer = req.Trailer
  5429  	if st.reqTrailer != nil {
  5430  		st.trailer = make(Header)
  5431  	}
  5432  	st.body = req.Body.(*http2requestBody).pipe // may be nil
  5433  	st.declBodyBytes = req.ContentLength
  5434  
  5435  	handler := sc.handler.ServeHTTP
  5436  	if f.Truncated {
  5437  		// Their header list was too long. Send a 431 error.
  5438  		handler = http2handleHeaderListTooLong
  5439  	} else if err := http2checkValidHTTP2RequestHeaders(req.Header); err != nil {
  5440  		handler = http2new400Handler(err)
  5441  	}
  5442  
  5443  	// The net/http package sets the read deadline from the
  5444  	// http.Server.ReadTimeout during the TLS handshake, but then
  5445  	// passes the connection off to us with the deadline already
  5446  	// set. Disarm it here after the request headers are read,
  5447  	// similar to how the http1 server works. Here it's
  5448  	// technically more like the http1 Server's ReadHeaderTimeout
  5449  	// (in Go 1.8), though. That's a more sane option anyway.
  5450  	if sc.hs.ReadTimeout != 0 {
  5451  		sc.conn.SetReadDeadline(time.Time{})
  5452  	}
  5453  
  5454  	go sc.runHandler(rw, req, handler)
  5455  	return nil
  5456  }
  5457  
  5458  func (st *http2stream) processTrailerHeaders(f *http2MetaHeadersFrame) error {
  5459  	sc := st.sc
  5460  	sc.serveG.check()
  5461  	if st.gotTrailerHeader {
  5462  		return http2ConnectionError(http2ErrCodeProtocol)
  5463  	}
  5464  	st.gotTrailerHeader = true
  5465  	if !f.StreamEnded() {
  5466  		return http2streamError(st.id, http2ErrCodeProtocol)
  5467  	}
  5468  
  5469  	if len(f.PseudoFields()) > 0 {
  5470  		return http2streamError(st.id, http2ErrCodeProtocol)
  5471  	}
  5472  	if st.trailer != nil {
  5473  		for _, hf := range f.RegularFields() {
  5474  			key := sc.canonicalHeader(hf.Name)
  5475  			if !httpguts.ValidTrailerHeader(key) {
  5476  				// TODO: send more details to the peer somehow. But http2 has
  5477  				// no way to send debug data at a stream level. Discuss with
  5478  				// HTTP folk.
  5479  				return http2streamError(st.id, http2ErrCodeProtocol)
  5480  			}
  5481  			st.trailer[key] = append(st.trailer[key], hf.Value)
  5482  		}
  5483  	}
  5484  	st.endStream()
  5485  	return nil
  5486  }
  5487  
  5488  func http2checkPriority(streamID uint32, p http2PriorityParam) error {
  5489  	if streamID == p.StreamDep {
  5490  		// Section 5.3.1: "A stream cannot depend on itself. An endpoint MUST treat
  5491  		// this as a stream error (Section 5.4.2) of type PROTOCOL_ERROR."
  5492  		// Section 5.3.3 says that a stream can depend on one of its dependencies,
  5493  		// so it's only self-dependencies that are forbidden.
  5494  		return http2streamError(streamID, http2ErrCodeProtocol)
  5495  	}
  5496  	return nil
  5497  }
  5498  
  5499  func (sc *http2serverConn) processPriority(f *http2PriorityFrame) error {
  5500  	if sc.inGoAway {
  5501  		return nil
  5502  	}
  5503  	if err := http2checkPriority(f.StreamID, f.http2PriorityParam); err != nil {
  5504  		return err
  5505  	}
  5506  	sc.writeSched.AdjustStream(f.StreamID, f.http2PriorityParam)
  5507  	return nil
  5508  }
  5509  
  5510  func (sc *http2serverConn) newStream(id, pusherID uint32, state http2streamState) *http2stream {
  5511  	sc.serveG.check()
  5512  	if id == 0 {
  5513  		panic("internal error: cannot create stream with id 0")
  5514  	}
  5515  
  5516  	ctx, cancelCtx := context.WithCancel(sc.baseCtx)
  5517  	st := &http2stream{
  5518  		sc:        sc,
  5519  		id:        id,
  5520  		state:     state,
  5521  		ctx:       ctx,
  5522  		cancelCtx: cancelCtx,
  5523  	}
  5524  	st.cw.Init()
  5525  	st.flow.conn = &sc.flow // link to conn-level counter
  5526  	st.flow.add(sc.initialStreamSendWindowSize)
  5527  	st.inflow.conn = &sc.inflow // link to conn-level counter
  5528  	st.inflow.add(sc.srv.initialStreamRecvWindowSize())
  5529  	if sc.hs.WriteTimeout != 0 {
  5530  		st.writeDeadline = time.AfterFunc(sc.hs.WriteTimeout, st.onWriteTimeout)
  5531  	}
  5532  
  5533  	sc.streams[id] = st
  5534  	sc.writeSched.OpenStream(st.id, http2OpenStreamOptions{PusherID: pusherID})
  5535  	if st.isPushed() {
  5536  		sc.curPushedStreams++
  5537  	} else {
  5538  		sc.curClientStreams++
  5539  	}
  5540  	if sc.curOpenStreams() == 1 {
  5541  		sc.setConnState(StateActive)
  5542  	}
  5543  
  5544  	return st
  5545  }
  5546  
  5547  func (sc *http2serverConn) newWriterAndRequest(st *http2stream, f *http2MetaHeadersFrame) (*http2responseWriter, *Request, error) {
  5548  	sc.serveG.check()
  5549  
  5550  	rp := http2requestParam{
  5551  		method:    f.PseudoValue("method"),
  5552  		scheme:    f.PseudoValue("scheme"),
  5553  		authority: f.PseudoValue("authority"),
  5554  		path:      f.PseudoValue("path"),
  5555  	}
  5556  
  5557  	isConnect := rp.method == "CONNECT"
  5558  	if isConnect {
  5559  		if rp.path != "" || rp.scheme != "" || rp.authority == "" {
  5560  			return nil, nil, http2streamError(f.StreamID, http2ErrCodeProtocol)
  5561  		}
  5562  	} else if rp.method == "" || rp.path == "" || (rp.scheme != "https" && rp.scheme != "http") {
  5563  		// See 8.1.2.6 Malformed Requests and Responses:
  5564  		//
  5565  		// Malformed requests or responses that are detected
  5566  		// MUST be treated as a stream error (Section 5.4.2)
  5567  		// of type PROTOCOL_ERROR."
  5568  		//
  5569  		// 8.1.2.3 Request Pseudo-Header Fields
  5570  		// "All HTTP/2 requests MUST include exactly one valid
  5571  		// value for the :method, :scheme, and :path
  5572  		// pseudo-header fields"
  5573  		return nil, nil, http2streamError(f.StreamID, http2ErrCodeProtocol)
  5574  	}
  5575  
  5576  	bodyOpen := !f.StreamEnded()
  5577  	if rp.method == "HEAD" && bodyOpen {
  5578  		// HEAD requests can't have bodies
  5579  		return nil, nil, http2streamError(f.StreamID, http2ErrCodeProtocol)
  5580  	}
  5581  
  5582  	rp.header = make(Header)
  5583  	for _, hf := range f.RegularFields() {
  5584  		rp.header.Add(sc.canonicalHeader(hf.Name), hf.Value)
  5585  	}
  5586  	if rp.authority == "" {
  5587  		rp.authority = rp.header.Get("Host")
  5588  	}
  5589  
  5590  	rw, req, err := sc.newWriterAndRequestNoBody(st, rp)
  5591  	if err != nil {
  5592  		return nil, nil, err
  5593  	}
  5594  	if bodyOpen {
  5595  		if vv, ok := rp.header["Content-Length"]; ok {
  5596  			req.ContentLength, _ = strconv.ParseInt(vv[0], 10, 64)
  5597  		} else {
  5598  			req.ContentLength = -1
  5599  		}
  5600  		req.Body.(*http2requestBody).pipe = &http2pipe{
  5601  			b: &http2dataBuffer{expected: req.ContentLength},
  5602  		}
  5603  	}
  5604  	return rw, req, nil
  5605  }
  5606  
  5607  type http2requestParam struct {
  5608  	method                  string
  5609  	scheme, authority, path string
  5610  	header                  Header
  5611  }
  5612  
  5613  func (sc *http2serverConn) newWriterAndRequestNoBody(st *http2stream, rp http2requestParam) (*http2responseWriter, *Request, error) {
  5614  	sc.serveG.check()
  5615  
  5616  	var tlsState *tls.ConnectionState // nil if not scheme https
  5617  	if rp.scheme == "https" {
  5618  		tlsState = sc.tlsState
  5619  	}
  5620  
  5621  	needsContinue := rp.header.Get("Expect") == "100-continue"
  5622  	if needsContinue {
  5623  		rp.header.Del("Expect")
  5624  	}
  5625  	// Merge Cookie headers into one "; "-delimited value.
  5626  	if cookies := rp.header["Cookie"]; len(cookies) > 1 {
  5627  		rp.header.Set("Cookie", strings.Join(cookies, "; "))
  5628  	}
  5629  
  5630  	// Setup Trailers
  5631  	var trailer Header
  5632  	for _, v := range rp.header["Trailer"] {
  5633  		for _, key := range strings.Split(v, ",") {
  5634  			key = CanonicalHeaderKey(strings.TrimSpace(key))
  5635  			switch key {
  5636  			case "Transfer-Encoding", "Trailer", "Content-Length":
  5637  				// Bogus. (copy of http1 rules)
  5638  				// Ignore.
  5639  			default:
  5640  				if trailer == nil {
  5641  					trailer = make(Header)
  5642  				}
  5643  				trailer[key] = nil
  5644  			}
  5645  		}
  5646  	}
  5647  	delete(rp.header, "Trailer")
  5648  
  5649  	var url_ *url.URL
  5650  	var requestURI string
  5651  	if rp.method == "CONNECT" {
  5652  		url_ = &url.URL{Host: rp.authority}
  5653  		requestURI = rp.authority // mimic HTTP/1 server behavior
  5654  	} else {
  5655  		var err error
  5656  		url_, err = url.ParseRequestURI(rp.path)
  5657  		if err != nil {
  5658  			return nil, nil, http2streamError(st.id, http2ErrCodeProtocol)
  5659  		}
  5660  		requestURI = rp.path
  5661  	}
  5662  
  5663  	body := &http2requestBody{
  5664  		conn:          sc,
  5665  		stream:        st,
  5666  		needsContinue: needsContinue,
  5667  	}
  5668  	req := &Request{
  5669  		Method:     rp.method,
  5670  		URL:        url_,
  5671  		RemoteAddr: sc.remoteAddrStr,
  5672  		Header:     rp.header,
  5673  		RequestURI: requestURI,
  5674  		Proto:      "HTTP/2.0",
  5675  		ProtoMajor: 2,
  5676  		ProtoMinor: 0,
  5677  		TLS:        tlsState,
  5678  		Host:       rp.authority,
  5679  		Body:       body,
  5680  		Trailer:    trailer,
  5681  	}
  5682  	req = req.WithContext(st.ctx)
  5683  
  5684  	rws := http2responseWriterStatePool.Get().(*http2responseWriterState)
  5685  	bwSave := rws.bw
  5686  	*rws = http2responseWriterState{} // zero all the fields
  5687  	rws.conn = sc
  5688  	rws.bw = bwSave
  5689  	rws.bw.Reset(http2chunkWriter{rws})
  5690  	rws.stream = st
  5691  	rws.req = req
  5692  	rws.body = body
  5693  
  5694  	rw := &http2responseWriter{rws: rws}
  5695  	return rw, req, nil
  5696  }
  5697  
  5698  // Run on its own goroutine.
  5699  func (sc *http2serverConn) runHandler(rw *http2responseWriter, req *Request, handler func(ResponseWriter, *Request)) {
  5700  	didPanic := true
  5701  	defer func() {
  5702  		rw.rws.stream.cancelCtx()
  5703  		if didPanic {
  5704  			e := recover()
  5705  			sc.writeFrameFromHandler(http2FrameWriteRequest{
  5706  				write:  http2handlerPanicRST{rw.rws.stream.id},
  5707  				stream: rw.rws.stream,
  5708  			})
  5709  			// Same as net/http:
  5710  			if e != nil && e != ErrAbortHandler {
  5711  				const size = 64 << 10
  5712  				buf := make([]byte, size)
  5713  				buf = buf[:runtime.Stack(buf, false)]
  5714  				sc.logf("http2: panic serving %v: %v\n%s", sc.conn.RemoteAddr(), e, buf)
  5715  			}
  5716  			return
  5717  		}
  5718  		rw.handlerDone()
  5719  	}()
  5720  	handler(rw, req)
  5721  	didPanic = false
  5722  }
  5723  
  5724  func http2handleHeaderListTooLong(w ResponseWriter, r *Request) {
  5725  	// 10.5.1 Limits on Header Block Size:
  5726  	// .. "A server that receives a larger header block than it is
  5727  	// willing to handle can send an HTTP 431 (Request Header Fields Too
  5728  	// Large) status code"
  5729  	const statusRequestHeaderFieldsTooLarge = 431 // only in Go 1.6+
  5730  	w.WriteHeader(statusRequestHeaderFieldsTooLarge)
  5731  	io.WriteString(w, "<h1>HTTP Error 431</h1><p>Request Header Field(s) Too Large</p>")
  5732  }
  5733  
  5734  // called from handler goroutines.
  5735  // h may be nil.
  5736  func (sc *http2serverConn) writeHeaders(st *http2stream, headerData *http2writeResHeaders) error {
  5737  	sc.serveG.checkNotOn() // NOT on
  5738  	var errc chan error
  5739  	if headerData.h != nil {
  5740  		// If there's a header map (which we don't own), so we have to block on
  5741  		// waiting for this frame to be written, so an http.Flush mid-handler
  5742  		// writes out the correct value of keys, before a handler later potentially
  5743  		// mutates it.
  5744  		errc = http2errChanPool.Get().(chan error)
  5745  	}
  5746  	if err := sc.writeFrameFromHandler(http2FrameWriteRequest{
  5747  		write:  headerData,
  5748  		stream: st,
  5749  		done:   errc,
  5750  	}); err != nil {
  5751  		return err
  5752  	}
  5753  	if errc != nil {
  5754  		select {
  5755  		case err := <-errc:
  5756  			http2errChanPool.Put(errc)
  5757  			return err
  5758  		case <-sc.doneServing:
  5759  			return http2errClientDisconnected
  5760  		case <-st.cw:
  5761  			return http2errStreamClosed
  5762  		}
  5763  	}
  5764  	return nil
  5765  }
  5766  
  5767  // called from handler goroutines.
  5768  func (sc *http2serverConn) write100ContinueHeaders(st *http2stream) {
  5769  	sc.writeFrameFromHandler(http2FrameWriteRequest{
  5770  		write:  http2write100ContinueHeadersFrame{st.id},
  5771  		stream: st,
  5772  	})
  5773  }
  5774  
  5775  // A bodyReadMsg tells the server loop that the http.Handler read n
  5776  // bytes of the DATA from the client on the given stream.
  5777  type http2bodyReadMsg struct {
  5778  	st *http2stream
  5779  	n  int
  5780  }
  5781  
  5782  // called from handler goroutines.
  5783  // Notes that the handler for the given stream ID read n bytes of its body
  5784  // and schedules flow control tokens to be sent.
  5785  func (sc *http2serverConn) noteBodyReadFromHandler(st *http2stream, n int, err error) {
  5786  	sc.serveG.checkNotOn() // NOT on
  5787  	if n > 0 {
  5788  		select {
  5789  		case sc.bodyReadCh <- http2bodyReadMsg{st, n}:
  5790  		case <-sc.doneServing:
  5791  		}
  5792  	}
  5793  }
  5794  
  5795  func (sc *http2serverConn) noteBodyRead(st *http2stream, n int) {
  5796  	sc.serveG.check()
  5797  	sc.sendWindowUpdate(nil, n) // conn-level
  5798  	if st.state != http2stateHalfClosedRemote && st.state != http2stateClosed {
  5799  		// Don't send this WINDOW_UPDATE if the stream is closed
  5800  		// remotely.
  5801  		sc.sendWindowUpdate(st, n)
  5802  	}
  5803  }
  5804  
  5805  // st may be nil for conn-level
  5806  func (sc *http2serverConn) sendWindowUpdate(st *http2stream, n int) {
  5807  	sc.serveG.check()
  5808  	// "The legal range for the increment to the flow control
  5809  	// window is 1 to 2^31-1 (2,147,483,647) octets."
  5810  	// A Go Read call on 64-bit machines could in theory read
  5811  	// a larger Read than this. Very unlikely, but we handle it here
  5812  	// rather than elsewhere for now.
  5813  	const maxUint31 = 1<<31 - 1
  5814  	for n >= maxUint31 {
  5815  		sc.sendWindowUpdate32(st, maxUint31)
  5816  		n -= maxUint31
  5817  	}
  5818  	sc.sendWindowUpdate32(st, int32(n))
  5819  }
  5820  
  5821  // st may be nil for conn-level
  5822  func (sc *http2serverConn) sendWindowUpdate32(st *http2stream, n int32) {
  5823  	sc.serveG.check()
  5824  	if n == 0 {
  5825  		return
  5826  	}
  5827  	if n < 0 {
  5828  		panic("negative update")
  5829  	}
  5830  	var streamID uint32
  5831  	if st != nil {
  5832  		streamID = st.id
  5833  	}
  5834  	sc.writeFrame(http2FrameWriteRequest{
  5835  		write:  http2writeWindowUpdate{streamID: streamID, n: uint32(n)},
  5836  		stream: st,
  5837  	})
  5838  	var ok bool
  5839  	if st == nil {
  5840  		ok = sc.inflow.add(n)
  5841  	} else {
  5842  		ok = st.inflow.add(n)
  5843  	}
  5844  	if !ok {
  5845  		panic("internal error; sent too many window updates without decrements?")
  5846  	}
  5847  }
  5848  
  5849  // requestBody is the Handler's Request.Body type.
  5850  // Read and Close may be called concurrently.
  5851  type http2requestBody struct {
  5852  	stream        *http2stream
  5853  	conn          *http2serverConn
  5854  	closed        bool       // for use by Close only
  5855  	sawEOF        bool       // for use by Read only
  5856  	pipe          *http2pipe // non-nil if we have a HTTP entity message body
  5857  	needsContinue bool       // need to send a 100-continue
  5858  }
  5859  
  5860  func (b *http2requestBody) Close() error {
  5861  	if b.pipe != nil && !b.closed {
  5862  		b.pipe.BreakWithError(http2errClosedBody)
  5863  	}
  5864  	b.closed = true
  5865  	return nil
  5866  }
  5867  
  5868  func (b *http2requestBody) Read(p []byte) (n int, err error) {
  5869  	if b.needsContinue {
  5870  		b.needsContinue = false
  5871  		b.conn.write100ContinueHeaders(b.stream)
  5872  	}
  5873  	if b.pipe == nil || b.sawEOF {
  5874  		return 0, io.EOF
  5875  	}
  5876  	n, err = b.pipe.Read(p)
  5877  	if err == io.EOF {
  5878  		b.sawEOF = true
  5879  	}
  5880  	if b.conn == nil && http2inTests {
  5881  		return
  5882  	}
  5883  	b.conn.noteBodyReadFromHandler(b.stream, n, err)
  5884  	return
  5885  }
  5886  
  5887  // responseWriter is the http.ResponseWriter implementation. It's
  5888  // intentionally small (1 pointer wide) to minimize garbage. The
  5889  // responseWriterState pointer inside is zeroed at the end of a
  5890  // request (in handlerDone) and calls on the responseWriter thereafter
  5891  // simply crash (caller's mistake), but the much larger responseWriterState
  5892  // and buffers are reused between multiple requests.
  5893  type http2responseWriter struct {
  5894  	rws *http2responseWriterState
  5895  }
  5896  
  5897  // Optional http.ResponseWriter interfaces implemented.
  5898  var (
  5899  	_ CloseNotifier     = (*http2responseWriter)(nil)
  5900  	_ Flusher           = (*http2responseWriter)(nil)
  5901  	_ http2stringWriter = (*http2responseWriter)(nil)
  5902  )
  5903  
  5904  type http2responseWriterState struct {
  5905  	// immutable within a request:
  5906  	stream *http2stream
  5907  	req    *Request
  5908  	body   *http2requestBody // to close at end of request, if DATA frames didn't
  5909  	conn   *http2serverConn
  5910  
  5911  	// TODO: adjust buffer writing sizes based on server config, frame size updates from peer, etc
  5912  	bw *bufio.Writer // writing to a chunkWriter{this *responseWriterState}
  5913  
  5914  	// mutated by http.Handler goroutine:
  5915  	handlerHeader Header   // nil until called
  5916  	snapHeader    Header   // snapshot of handlerHeader at WriteHeader time
  5917  	trailers      []string // set in writeChunk
  5918  	status        int      // status code passed to WriteHeader
  5919  	wroteHeader   bool     // WriteHeader called (explicitly or implicitly). Not necessarily sent to user yet.
  5920  	sentHeader    bool     // have we sent the header frame?
  5921  	handlerDone   bool     // handler has finished
  5922  	dirty         bool     // a Write failed; don't reuse this responseWriterState
  5923  
  5924  	sentContentLen int64 // non-zero if handler set a Content-Length header
  5925  	wroteBytes     int64
  5926  
  5927  	closeNotifierMu sync.Mutex // guards closeNotifierCh
  5928  	closeNotifierCh chan bool  // nil until first used
  5929  }
  5930  
  5931  type http2chunkWriter struct{ rws *http2responseWriterState }
  5932  
  5933  func (cw http2chunkWriter) Write(p []byte) (n int, err error) { return cw.rws.writeChunk(p) }
  5934  
  5935  func (rws *http2responseWriterState) hasTrailers() bool { return len(rws.trailers) > 0 }
  5936  
  5937  func (rws *http2responseWriterState) hasNonemptyTrailers() bool {
  5938  	for _, trailer := range rws.trailers {
  5939  		if _, ok := rws.handlerHeader[trailer]; ok {
  5940  			return true
  5941  		}
  5942  	}
  5943  	return false
  5944  }
  5945  
  5946  // declareTrailer is called for each Trailer header when the
  5947  // response header is written. It notes that a header will need to be
  5948  // written in the trailers at the end of the response.
  5949  func (rws *http2responseWriterState) declareTrailer(k string) {
  5950  	k = CanonicalHeaderKey(k)
  5951  	if !httpguts.ValidTrailerHeader(k) {
  5952  		// Forbidden by RFC 7230, section 4.1.2.
  5953  		rws.conn.logf("ignoring invalid trailer %q", k)
  5954  		return
  5955  	}
  5956  	if !http2strSliceContains(rws.trailers, k) {
  5957  		rws.trailers = append(rws.trailers, k)
  5958  	}
  5959  }
  5960  
  5961  // writeChunk writes chunks from the bufio.Writer. But because
  5962  // bufio.Writer may bypass its chunking, sometimes p may be
  5963  // arbitrarily large.
  5964  //
  5965  // writeChunk is also responsible (on the first chunk) for sending the
  5966  // HEADER response.
  5967  func (rws *http2responseWriterState) writeChunk(p []byte) (n int, err error) {
  5968  	if !rws.wroteHeader {
  5969  		rws.writeHeader(200)
  5970  	}
  5971  
  5972  	isHeadResp := rws.req.Method == "HEAD"
  5973  	if !rws.sentHeader {
  5974  		rws.sentHeader = true
  5975  		var ctype, clen string
  5976  		if clen = rws.snapHeader.Get("Content-Length"); clen != "" {
  5977  			rws.snapHeader.Del("Content-Length")
  5978  			clen64, err := strconv.ParseInt(clen, 10, 64)
  5979  			if err == nil && clen64 >= 0 {
  5980  				rws.sentContentLen = clen64
  5981  			} else {
  5982  				clen = ""
  5983  			}
  5984  		}
  5985  		if clen == "" && rws.handlerDone && http2bodyAllowedForStatus(rws.status) && (len(p) > 0 || !isHeadResp) {
  5986  			clen = strconv.Itoa(len(p))
  5987  		}
  5988  		_, hasContentType := rws.snapHeader["Content-Type"]
  5989  		// If the Content-Encoding is non-blank, we shouldn't
  5990  		// sniff the body. See Issue golang.org/issue/31753.
  5991  		ce := rws.snapHeader.Get("Content-Encoding")
  5992  		hasCE := len(ce) > 0
  5993  		if !hasCE && !hasContentType && http2bodyAllowedForStatus(rws.status) && len(p) > 0 {
  5994  			ctype = DetectContentType(p)
  5995  		}
  5996  		var date string
  5997  		if _, ok := rws.snapHeader["Date"]; !ok {
  5998  			// TODO(bradfitz): be faster here, like net/http? measure.
  5999  			date = time.Now().UTC().Format(TimeFormat)
  6000  		}
  6001  
  6002  		for _, v := range rws.snapHeader["Trailer"] {
  6003  			http2foreachHeaderElement(v, rws.declareTrailer)
  6004  		}
  6005  
  6006  		// "Connection" headers aren't allowed in HTTP/2 (RFC 7540, 8.1.2.2),
  6007  		// but respect "Connection" == "close" to mean sending a GOAWAY and tearing
  6008  		// down the TCP connection when idle, like we do for HTTP/1.
  6009  		// TODO: remove more Connection-specific header fields here, in addition
  6010  		// to "Connection".
  6011  		if _, ok := rws.snapHeader["Connection"]; ok {
  6012  			v := rws.snapHeader.Get("Connection")
  6013  			delete(rws.snapHeader, "Connection")
  6014  			if v == "close" {
  6015  				rws.conn.startGracefulShutdown()
  6016  			}
  6017  		}
  6018  
  6019  		endStream := (rws.handlerDone && !rws.hasTrailers() && len(p) == 0) || isHeadResp
  6020  		err = rws.conn.writeHeaders(rws.stream, &http2writeResHeaders{
  6021  			streamID:      rws.stream.id,
  6022  			httpResCode:   rws.status,
  6023  			h:             rws.snapHeader,
  6024  			endStream:     endStream,
  6025  			contentType:   ctype,
  6026  			contentLength: clen,
  6027  			date:          date,
  6028  		})
  6029  		if err != nil {
  6030  			rws.dirty = true
  6031  			return 0, err
  6032  		}
  6033  		if endStream {
  6034  			return 0, nil
  6035  		}
  6036  	}
  6037  	if isHeadResp {
  6038  		return len(p), nil
  6039  	}
  6040  	if len(p) == 0 && !rws.handlerDone {
  6041  		return 0, nil
  6042  	}
  6043  
  6044  	if rws.handlerDone {
  6045  		rws.promoteUndeclaredTrailers()
  6046  	}
  6047  
  6048  	// only send trailers if they have actually been defined by the
  6049  	// server handler.
  6050  	hasNonemptyTrailers := rws.hasNonemptyTrailers()
  6051  	endStream := rws.handlerDone && !hasNonemptyTrailers
  6052  	if len(p) > 0 || endStream {
  6053  		// only send a 0 byte DATA frame if we're ending the stream.
  6054  		if err := rws.conn.writeDataFromHandler(rws.stream, p, endStream); err != nil {
  6055  			rws.dirty = true
  6056  			return 0, err
  6057  		}
  6058  	}
  6059  
  6060  	if rws.handlerDone && hasNonemptyTrailers {
  6061  		err = rws.conn.writeHeaders(rws.stream, &http2writeResHeaders{
  6062  			streamID:  rws.stream.id,
  6063  			h:         rws.handlerHeader,
  6064  			trailers:  rws.trailers,
  6065  			endStream: true,
  6066  		})
  6067  		if err != nil {
  6068  			rws.dirty = true
  6069  		}
  6070  		return len(p), err
  6071  	}
  6072  	return len(p), nil
  6073  }
  6074  
  6075  // TrailerPrefix is a magic prefix for ResponseWriter.Header map keys
  6076  // that, if present, signals that the map entry is actually for
  6077  // the response trailers, and not the response headers. The prefix
  6078  // is stripped after the ServeHTTP call finishes and the values are
  6079  // sent in the trailers.
  6080  //
  6081  // This mechanism is intended only for trailers that are not known
  6082  // prior to the headers being written. If the set of trailers is fixed
  6083  // or known before the header is written, the normal Go trailers mechanism
  6084  // is preferred:
  6085  //    https://golang.org/pkg/net/http/#ResponseWriter
  6086  //    https://golang.org/pkg/net/http/#example_ResponseWriter_trailers
  6087  const http2TrailerPrefix = "Trailer:"
  6088  
  6089  // promoteUndeclaredTrailers permits http.Handlers to set trailers
  6090  // after the header has already been flushed. Because the Go
  6091  // ResponseWriter interface has no way to set Trailers (only the
  6092  // Header), and because we didn't want to expand the ResponseWriter
  6093  // interface, and because nobody used trailers, and because RFC 7230
  6094  // says you SHOULD (but not must) predeclare any trailers in the
  6095  // header, the official ResponseWriter rules said trailers in Go must
  6096  // be predeclared, and then we reuse the same ResponseWriter.Header()
  6097  // map to mean both Headers and Trailers. When it's time to write the
  6098  // Trailers, we pick out the fields of Headers that were declared as
  6099  // trailers. That worked for a while, until we found the first major
  6100  // user of Trailers in the wild: gRPC (using them only over http2),
  6101  // and gRPC libraries permit setting trailers mid-stream without
  6102  // predeclaring them. So: change of plans. We still permit the old
  6103  // way, but we also permit this hack: if a Header() key begins with
  6104  // "Trailer:", the suffix of that key is a Trailer. Because ':' is an
  6105  // invalid token byte anyway, there is no ambiguity. (And it's already
  6106  // filtered out) It's mildly hacky, but not terrible.
  6107  //
  6108  // This method runs after the Handler is done and promotes any Header
  6109  // fields to be trailers.
  6110  func (rws *http2responseWriterState) promoteUndeclaredTrailers() {
  6111  	for k, vv := range rws.handlerHeader {
  6112  		if !strings.HasPrefix(k, http2TrailerPrefix) {
  6113  			continue
  6114  		}
  6115  		trailerKey := strings.TrimPrefix(k, http2TrailerPrefix)
  6116  		rws.declareTrailer(trailerKey)
  6117  		rws.handlerHeader[CanonicalHeaderKey(trailerKey)] = vv
  6118  	}
  6119  
  6120  	if len(rws.trailers) > 1 {
  6121  		sorter := http2sorterPool.Get().(*http2sorter)
  6122  		sorter.SortStrings(rws.trailers)
  6123  		http2sorterPool.Put(sorter)
  6124  	}
  6125  }
  6126  
  6127  func (w *http2responseWriter) Flush() {
  6128  	rws := w.rws
  6129  	if rws == nil {
  6130  		panic("Header called after Handler finished")
  6131  	}
  6132  	if rws.bw.Buffered() > 0 {
  6133  		if err := rws.bw.Flush(); err != nil {
  6134  			// Ignore the error. The frame writer already knows.
  6135  			return
  6136  		}
  6137  	} else {
  6138  		// The bufio.Writer won't call chunkWriter.Write
  6139  		// (writeChunk with zero bytes, so we have to do it
  6140  		// ourselves to force the HTTP response header and/or
  6141  		// final DATA frame (with END_STREAM) to be sent.
  6142  		rws.writeChunk(nil)
  6143  	}
  6144  }
  6145  
  6146  func (w *http2responseWriter) CloseNotify() <-chan bool {
  6147  	rws := w.rws
  6148  	if rws == nil {
  6149  		panic("CloseNotify called after Handler finished")
  6150  	}
  6151  	rws.closeNotifierMu.Lock()
  6152  	ch := rws.closeNotifierCh
  6153  	if ch == nil {
  6154  		ch = make(chan bool, 1)
  6155  		rws.closeNotifierCh = ch
  6156  		cw := rws.stream.cw
  6157  		go func() {
  6158  			cw.Wait() // wait for close
  6159  			ch <- true
  6160  		}()
  6161  	}
  6162  	rws.closeNotifierMu.Unlock()
  6163  	return ch
  6164  }
  6165  
  6166  func (w *http2responseWriter) Header() Header {
  6167  	rws := w.rws
  6168  	if rws == nil {
  6169  		panic("Header called after Handler finished")
  6170  	}
  6171  	if rws.handlerHeader == nil {
  6172  		rws.handlerHeader = make(Header)
  6173  	}
  6174  	return rws.handlerHeader
  6175  }
  6176  
  6177  // checkWriteHeaderCode is a copy of net/http's checkWriteHeaderCode.
  6178  func http2checkWriteHeaderCode(code int) {
  6179  	// Issue 22880: require valid WriteHeader status codes.
  6180  	// For now we only enforce that it's three digits.
  6181  	// In the future we might block things over 599 (600 and above aren't defined
  6182  	// at http://httpwg.org/specs/rfc7231.html#status.codes)
  6183  	// and we might block under 200 (once we have more mature 1xx support).
  6184  	// But for now any three digits.
  6185  	//
  6186  	// We used to send "HTTP/1.1 000 0" on the wire in responses but there's
  6187  	// no equivalent bogus thing we can realistically send in HTTP/2,
  6188  	// so we'll consistently panic instead and help people find their bugs
  6189  	// early. (We can't return an error from WriteHeader even if we wanted to.)
  6190  	if code < 100 || code > 999 {
  6191  		panic(fmt.Sprintf("invalid WriteHeader code %v", code))
  6192  	}
  6193  }
  6194  
  6195  func (w *http2responseWriter) WriteHeader(code int) {
  6196  	rws := w.rws
  6197  	if rws == nil {
  6198  		panic("WriteHeader called after Handler finished")
  6199  	}
  6200  	rws.writeHeader(code)
  6201  }
  6202  
  6203  func (rws *http2responseWriterState) writeHeader(code int) {
  6204  	if !rws.wroteHeader {
  6205  		http2checkWriteHeaderCode(code)
  6206  		rws.wroteHeader = true
  6207  		rws.status = code
  6208  		if len(rws.handlerHeader) > 0 {
  6209  			rws.snapHeader = http2cloneHeader(rws.handlerHeader)
  6210  		}
  6211  	}
  6212  }
  6213  
  6214  func http2cloneHeader(h Header) Header {
  6215  	h2 := make(Header, len(h))
  6216  	for k, vv := range h {
  6217  		vv2 := make([]string, len(vv))
  6218  		copy(vv2, vv)
  6219  		h2[k] = vv2
  6220  	}
  6221  	return h2
  6222  }
  6223  
  6224  // The Life Of A Write is like this:
  6225  //
  6226  // * Handler calls w.Write or w.WriteString ->
  6227  // * -> rws.bw (*bufio.Writer) ->
  6228  // * (Handler might call Flush)
  6229  // * -> chunkWriter{rws}
  6230  // * -> responseWriterState.writeChunk(p []byte)
  6231  // * -> responseWriterState.writeChunk (most of the magic; see comment there)
  6232  func (w *http2responseWriter) Write(p []byte) (n int, err error) {
  6233  	return w.write(len(p), p, "")
  6234  }
  6235  
  6236  func (w *http2responseWriter) WriteString(s string) (n int, err error) {
  6237  	return w.write(len(s), nil, s)
  6238  }
  6239  
  6240  // either dataB or dataS is non-zero.
  6241  func (w *http2responseWriter) write(lenData int, dataB []byte, dataS string) (n int, err error) {
  6242  	rws := w.rws
  6243  	if rws == nil {
  6244  		panic("Write called after Handler finished")
  6245  	}
  6246  	if !rws.wroteHeader {
  6247  		w.WriteHeader(200)
  6248  	}
  6249  	if !http2bodyAllowedForStatus(rws.status) {
  6250  		return 0, ErrBodyNotAllowed
  6251  	}
  6252  	rws.wroteBytes += int64(len(dataB)) + int64(len(dataS)) // only one can be set
  6253  	if rws.sentContentLen != 0 && rws.wroteBytes > rws.sentContentLen {
  6254  		// TODO: send a RST_STREAM
  6255  		return 0, errors.New("http2: handler wrote more than declared Content-Length")
  6256  	}
  6257  
  6258  	if dataB != nil {
  6259  		return rws.bw.Write(dataB)
  6260  	} else {
  6261  		return rws.bw.WriteString(dataS)
  6262  	}
  6263  }
  6264  
  6265  func (w *http2responseWriter) handlerDone() {
  6266  	rws := w.rws
  6267  	dirty := rws.dirty
  6268  	rws.handlerDone = true
  6269  	w.Flush()
  6270  	w.rws = nil
  6271  	if !dirty {
  6272  		// Only recycle the pool if all prior Write calls to
  6273  		// the serverConn goroutine completed successfully. If
  6274  		// they returned earlier due to resets from the peer
  6275  		// there might still be write goroutines outstanding
  6276  		// from the serverConn referencing the rws memory. See
  6277  		// issue 20704.
  6278  		http2responseWriterStatePool.Put(rws)
  6279  	}
  6280  }
  6281  
  6282  // Push errors.
  6283  var (
  6284  	http2ErrRecursivePush    = errors.New("http2: recursive push not allowed")
  6285  	http2ErrPushLimitReached = errors.New("http2: push would exceed peer's SETTINGS_MAX_CONCURRENT_STREAMS")
  6286  )
  6287  
  6288  var _ Pusher = (*http2responseWriter)(nil)
  6289  
  6290  func (w *http2responseWriter) Push(target string, opts *PushOptions) error {
  6291  	st := w.rws.stream
  6292  	sc := st.sc
  6293  	sc.serveG.checkNotOn()
  6294  
  6295  	// No recursive pushes: "PUSH_PROMISE frames MUST only be sent on a peer-initiated stream."
  6296  	// http://tools.ietf.org/html/rfc7540#section-6.6
  6297  	if st.isPushed() {
  6298  		return http2ErrRecursivePush
  6299  	}
  6300  
  6301  	if opts == nil {
  6302  		opts = new(PushOptions)
  6303  	}
  6304  
  6305  	// Default options.
  6306  	if opts.Method == "" {
  6307  		opts.Method = "GET"
  6308  	}
  6309  	if opts.Header == nil {
  6310  		opts.Header = Header{}
  6311  	}
  6312  	wantScheme := "http"
  6313  	if w.rws.req.TLS != nil {
  6314  		wantScheme = "https"
  6315  	}
  6316  
  6317  	// Validate the request.
  6318  	u, err := url.Parse(target)
  6319  	if err != nil {
  6320  		return err
  6321  	}
  6322  	if u.Scheme == "" {
  6323  		if !strings.HasPrefix(target, "/") {
  6324  			return fmt.Errorf("target must be an absolute URL or an absolute path: %q", target)
  6325  		}
  6326  		u.Scheme = wantScheme
  6327  		u.Host = w.rws.req.Host
  6328  	} else {
  6329  		if u.Scheme != wantScheme {
  6330  			return fmt.Errorf("cannot push URL with scheme %q from request with scheme %q", u.Scheme, wantScheme)
  6331  		}
  6332  		if u.Host == "" {
  6333  			return errors.New("URL must have a host")
  6334  		}
  6335  	}
  6336  	for k := range opts.Header {
  6337  		if strings.HasPrefix(k, ":") {
  6338  			return fmt.Errorf("promised request headers cannot include pseudo header %q", k)
  6339  		}
  6340  		// These headers are meaningful only if the request has a body,
  6341  		// but PUSH_PROMISE requests cannot have a body.
  6342  		// http://tools.ietf.org/html/rfc7540#section-8.2
  6343  		// Also disallow Host, since the promised URL must be absolute.
  6344  		switch strings.ToLower(k) {
  6345  		case "content-length", "content-encoding", "trailer", "te", "expect", "host":
  6346  			return fmt.Errorf("promised request headers cannot include %q", k)
  6347  		}
  6348  	}
  6349  	if err := http2checkValidHTTP2RequestHeaders(opts.Header); err != nil {
  6350  		return err
  6351  	}
  6352  
  6353  	// The RFC effectively limits promised requests to GET and HEAD:
  6354  	// "Promised requests MUST be cacheable [GET, HEAD, or POST], and MUST be safe [GET or HEAD]"
  6355  	// http://tools.ietf.org/html/rfc7540#section-8.2
  6356  	if opts.Method != "GET" && opts.Method != "HEAD" {
  6357  		return fmt.Errorf("method %q must be GET or HEAD", opts.Method)
  6358  	}
  6359  
  6360  	msg := &http2startPushRequest{
  6361  		parent: st,
  6362  		method: opts.Method,
  6363  		url:    u,
  6364  		header: http2cloneHeader(opts.Header),
  6365  		done:   http2errChanPool.Get().(chan error),
  6366  	}
  6367  
  6368  	select {
  6369  	case <-sc.doneServing:
  6370  		return http2errClientDisconnected
  6371  	case <-st.cw:
  6372  		return http2errStreamClosed
  6373  	case sc.serveMsgCh <- msg:
  6374  	}
  6375  
  6376  	select {
  6377  	case <-sc.doneServing:
  6378  		return http2errClientDisconnected
  6379  	case <-st.cw:
  6380  		return http2errStreamClosed
  6381  	case err := <-msg.done:
  6382  		http2errChanPool.Put(msg.done)
  6383  		return err
  6384  	}
  6385  }
  6386  
  6387  type http2startPushRequest struct {
  6388  	parent *http2stream
  6389  	method string
  6390  	url    *url.URL
  6391  	header Header
  6392  	done   chan error
  6393  }
  6394  
  6395  func (sc *http2serverConn) startPush(msg *http2startPushRequest) {
  6396  	sc.serveG.check()
  6397  
  6398  	// http://tools.ietf.org/html/rfc7540#section-6.6.
  6399  	// PUSH_PROMISE frames MUST only be sent on a peer-initiated stream that
  6400  	// is in either the "open" or "half-closed (remote)" state.
  6401  	if msg.parent.state != http2stateOpen && msg.parent.state != http2stateHalfClosedRemote {
  6402  		// responseWriter.Push checks that the stream is peer-initiated.
  6403  		msg.done <- http2errStreamClosed
  6404  		return
  6405  	}
  6406  
  6407  	// http://tools.ietf.org/html/rfc7540#section-6.6.
  6408  	if !sc.pushEnabled {
  6409  		msg.done <- ErrNotSupported
  6410  		return
  6411  	}
  6412  
  6413  	// PUSH_PROMISE frames must be sent in increasing order by stream ID, so
  6414  	// we allocate an ID for the promised stream lazily, when the PUSH_PROMISE
  6415  	// is written. Once the ID is allocated, we start the request handler.
  6416  	allocatePromisedID := func() (uint32, error) {
  6417  		sc.serveG.check()
  6418  
  6419  		// Check this again, just in case. Technically, we might have received
  6420  		// an updated SETTINGS by the time we got around to writing this frame.
  6421  		if !sc.pushEnabled {
  6422  			return 0, ErrNotSupported
  6423  		}
  6424  		// http://tools.ietf.org/html/rfc7540#section-6.5.2.
  6425  		if sc.curPushedStreams+1 > sc.clientMaxStreams {
  6426  			return 0, http2ErrPushLimitReached
  6427  		}
  6428  
  6429  		// http://tools.ietf.org/html/rfc7540#section-5.1.1.
  6430  		// Streams initiated by the server MUST use even-numbered identifiers.
  6431  		// A server that is unable to establish a new stream identifier can send a GOAWAY
  6432  		// frame so that the client is forced to open a new connection for new streams.
  6433  		if sc.maxPushPromiseID+2 >= 1<<31 {
  6434  			sc.startGracefulShutdownInternal()
  6435  			return 0, http2ErrPushLimitReached
  6436  		}
  6437  		sc.maxPushPromiseID += 2
  6438  		promisedID := sc.maxPushPromiseID
  6439  
  6440  		// http://tools.ietf.org/html/rfc7540#section-8.2.
  6441  		// Strictly speaking, the new stream should start in "reserved (local)", then
  6442  		// transition to "half closed (remote)" after sending the initial HEADERS, but
  6443  		// we start in "half closed (remote)" for simplicity.
  6444  		// See further comments at the definition of stateHalfClosedRemote.
  6445  		promised := sc.newStream(promisedID, msg.parent.id, http2stateHalfClosedRemote)
  6446  		rw, req, err := sc.newWriterAndRequestNoBody(promised, http2requestParam{
  6447  			method:    msg.method,
  6448  			scheme:    msg.url.Scheme,
  6449  			authority: msg.url.Host,
  6450  			path:      msg.url.RequestURI(),
  6451  			header:    http2cloneHeader(msg.header), // clone since handler runs concurrently with writing the PUSH_PROMISE
  6452  		})
  6453  		if err != nil {
  6454  			// Should not happen, since we've already validated msg.url.
  6455  			panic(fmt.Sprintf("newWriterAndRequestNoBody(%+v): %v", msg.url, err))
  6456  		}
  6457  
  6458  		go sc.runHandler(rw, req, sc.handler.ServeHTTP)
  6459  		return promisedID, nil
  6460  	}
  6461  
  6462  	sc.writeFrame(http2FrameWriteRequest{
  6463  		write: &http2writePushPromise{
  6464  			streamID:           msg.parent.id,
  6465  			method:             msg.method,
  6466  			url:                msg.url,
  6467  			h:                  msg.header,
  6468  			allocatePromisedID: allocatePromisedID,
  6469  		},
  6470  		stream: msg.parent,
  6471  		done:   msg.done,
  6472  	})
  6473  }
  6474  
  6475  // foreachHeaderElement splits v according to the "#rule" construction
  6476  // in RFC 7230 section 7 and calls fn for each non-empty element.
  6477  func http2foreachHeaderElement(v string, fn func(string)) {
  6478  	v = textproto.TrimString(v)
  6479  	if v == "" {
  6480  		return
  6481  	}
  6482  	if !strings.Contains(v, ",") {
  6483  		fn(v)
  6484  		return
  6485  	}
  6486  	for _, f := range strings.Split(v, ",") {
  6487  		if f = textproto.TrimString(f); f != "" {
  6488  			fn(f)
  6489  		}
  6490  	}
  6491  }
  6492  
  6493  // From http://httpwg.org/specs/rfc7540.html#rfc.section.8.1.2.2
  6494  var http2connHeaders = []string{
  6495  	"Connection",
  6496  	"Keep-Alive",
  6497  	"Proxy-Connection",
  6498  	"Transfer-Encoding",
  6499  	"Upgrade",
  6500  }
  6501  
  6502  // checkValidHTTP2RequestHeaders checks whether h is a valid HTTP/2 request,
  6503  // per RFC 7540 Section 8.1.2.2.
  6504  // The returned error is reported to users.
  6505  func http2checkValidHTTP2RequestHeaders(h Header) error {
  6506  	for _, k := range http2connHeaders {
  6507  		if _, ok := h[k]; ok {
  6508  			return fmt.Errorf("request header %q is not valid in HTTP/2", k)
  6509  		}
  6510  	}
  6511  	te := h["Te"]
  6512  	if len(te) > 0 && (len(te) > 1 || (te[0] != "trailers" && te[0] != "")) {
  6513  		return errors.New(`request header "TE" may only be "trailers" in HTTP/2`)
  6514  	}
  6515  	return nil
  6516  }
  6517  
  6518  func http2new400Handler(err error) HandlerFunc {
  6519  	return func(w ResponseWriter, r *Request) {
  6520  		Error(w, err.Error(), StatusBadRequest)
  6521  	}
  6522  }
  6523  
  6524  // h1ServerKeepAlivesDisabled reports whether hs has its keep-alives
  6525  // disabled. See comments on h1ServerShutdownChan above for why
  6526  // the code is written this way.
  6527  func http2h1ServerKeepAlivesDisabled(hs *Server) bool {
  6528  	var x interface{} = hs
  6529  	type I interface {
  6530  		doKeepAlives() bool
  6531  	}
  6532  	if hs, ok := x.(I); ok {
  6533  		return !hs.doKeepAlives()
  6534  	}
  6535  	return false
  6536  }
  6537  
  6538  const (
  6539  	// transportDefaultConnFlow is how many connection-level flow control
  6540  	// tokens we give the server at start-up, past the default 64k.
  6541  	http2transportDefaultConnFlow = 1 << 30
  6542  
  6543  	// transportDefaultStreamFlow is how many stream-level flow
  6544  	// control tokens we announce to the peer, and how many bytes
  6545  	// we buffer per stream.
  6546  	http2transportDefaultStreamFlow = 4 << 20
  6547  
  6548  	// transportDefaultStreamMinRefresh is the minimum number of bytes we'll send
  6549  	// a stream-level WINDOW_UPDATE for at a time.
  6550  	http2transportDefaultStreamMinRefresh = 4 << 10
  6551  
  6552  	http2defaultUserAgent = "Go-http-client/2.0"
  6553  )
  6554  
  6555  // Transport is an HTTP/2 Transport.
  6556  //
  6557  // A Transport internally caches connections to servers. It is safe
  6558  // for concurrent use by multiple goroutines.
  6559  type http2Transport struct {
  6560  	// DialTLS specifies an optional dial function for creating
  6561  	// TLS connections for requests.
  6562  	//
  6563  	// If DialTLS is nil, tls.Dial is used.
  6564  	//
  6565  	// If the returned net.Conn has a ConnectionState method like tls.Conn,
  6566  	// it will be used to set http.Response.TLS.
  6567  	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
  6568  
  6569  	// TLSClientConfig specifies the TLS configuration to use with
  6570  	// tls.Client. If nil, the default configuration is used.
  6571  	TLSClientConfig *tls.Config
  6572  
  6573  	// ConnPool optionally specifies an alternate connection pool to use.
  6574  	// If nil, the default is used.
  6575  	ConnPool http2ClientConnPool
  6576  
  6577  	// DisableCompression, if true, prevents the Transport from
  6578  	// requesting compression with an "Accept-Encoding: gzip"
  6579  	// request header when the Request contains no existing
  6580  	// Accept-Encoding value. If the Transport requests gzip on
  6581  	// its own and gets a gzipped response, it's transparently
  6582  	// decoded in the Response.Body. However, if the user
  6583  	// explicitly requested gzip it is not automatically
  6584  	// uncompressed.
  6585  	DisableCompression bool
  6586  
  6587  	// AllowHTTP, if true, permits HTTP/2 requests using the insecure,
  6588  	// plain-text "http" scheme. Note that this does not enable h2c support.
  6589  	AllowHTTP bool
  6590  
  6591  	// MaxHeaderListSize is the http2 SETTINGS_MAX_HEADER_LIST_SIZE to
  6592  	// send in the initial settings frame. It is how many bytes
  6593  	// of response headers are allowed. Unlike the http2 spec, zero here
  6594  	// means to use a default limit (currently 10MB). If you actually
  6595  	// want to advertise an ulimited value to the peer, Transport
  6596  	// interprets the highest possible value here (0xffffffff or 1<<32-1)
  6597  	// to mean no limit.
  6598  	MaxHeaderListSize uint32
  6599  
  6600  	// StrictMaxConcurrentStreams controls whether the server's
  6601  	// SETTINGS_MAX_CONCURRENT_STREAMS should be respected
  6602  	// globally. If false, new TCP connections are created to the
  6603  	// server as needed to keep each under the per-connection
  6604  	// SETTINGS_MAX_CONCURRENT_STREAMS limit. If true, the
  6605  	// server's SETTINGS_MAX_CONCURRENT_STREAMS is interpreted as
  6606  	// a global limit and callers of RoundTrip block when needed,
  6607  	// waiting for their turn.
  6608  	StrictMaxConcurrentStreams bool
  6609  
  6610  	// t1, if non-nil, is the standard library Transport using
  6611  	// this transport. Its settings are used (but not its
  6612  	// RoundTrip method, etc).
  6613  	t1 *Transport
  6614  
  6615  	connPoolOnce  sync.Once
  6616  	connPoolOrDef http2ClientConnPool // non-nil version of ConnPool
  6617  }
  6618  
  6619  func (t *http2Transport) maxHeaderListSize() uint32 {
  6620  	if t.MaxHeaderListSize == 0 {
  6621  		return 10 << 20
  6622  	}
  6623  	if t.MaxHeaderListSize == 0xffffffff {
  6624  		return 0
  6625  	}
  6626  	return t.MaxHeaderListSize
  6627  }
  6628  
  6629  func (t *http2Transport) disableCompression() bool {
  6630  	return t.DisableCompression || (t.t1 != nil && t.t1.DisableCompression)
  6631  }
  6632  
  6633  // ConfigureTransport configures a net/http HTTP/1 Transport to use HTTP/2.
  6634  // It returns an error if t1 has already been HTTP/2-enabled.
  6635  func http2ConfigureTransport(t1 *Transport) error {
  6636  	_, err := http2configureTransport(t1)
  6637  	return err
  6638  }
  6639  
  6640  func http2configureTransport(t1 *Transport) (*http2Transport, error) {
  6641  	connPool := new(http2clientConnPool)
  6642  	t2 := &http2Transport{
  6643  		ConnPool: http2noDialClientConnPool{connPool},
  6644  		t1:       t1,
  6645  	}
  6646  	connPool.t = t2
  6647  	if err := http2registerHTTPSProtocol(t1, http2noDialH2RoundTripper{t2}); err != nil {
  6648  		return nil, err
  6649  	}
  6650  	if t1.TLSClientConfig == nil {
  6651  		t1.TLSClientConfig = new(tls.Config)
  6652  	}
  6653  	if !http2strSliceContains(t1.TLSClientConfig.NextProtos, "h2") {
  6654  		t1.TLSClientConfig.NextProtos = append([]string{"h2"}, t1.TLSClientConfig.NextProtos...)
  6655  	}
  6656  	if !http2strSliceContains(t1.TLSClientConfig.NextProtos, "http/1.1") {
  6657  		t1.TLSClientConfig.NextProtos = append(t1.TLSClientConfig.NextProtos, "http/1.1")
  6658  	}
  6659  	upgradeFn := func(authority string, c *tls.Conn) RoundTripper {
  6660  		addr := http2authorityAddr("https", authority)
  6661  		if used, err := connPool.addConnIfNeeded(addr, t2, c); err != nil {
  6662  			go c.Close()
  6663  			return http2erringRoundTripper{err}
  6664  		} else if !used {
  6665  			// Turns out we don't need this c.
  6666  			// For example, two goroutines made requests to the same host
  6667  			// at the same time, both kicking off TCP dials. (since protocol
  6668  			// was unknown)
  6669  			go c.Close()
  6670  		}
  6671  		return t2
  6672  	}
  6673  	if m := t1.TLSNextProto; len(m) == 0 {
  6674  		t1.TLSNextProto = map[string]func(string, *tls.Conn) RoundTripper{
  6675  			"h2": upgradeFn,
  6676  		}
  6677  	} else {
  6678  		m["h2"] = upgradeFn
  6679  	}
  6680  	return t2, nil
  6681  }
  6682  
  6683  func (t *http2Transport) connPool() http2ClientConnPool {
  6684  	t.connPoolOnce.Do(t.initConnPool)
  6685  	return t.connPoolOrDef
  6686  }
  6687  
  6688  func (t *http2Transport) initConnPool() {
  6689  	if t.ConnPool != nil {
  6690  		t.connPoolOrDef = t.ConnPool
  6691  	} else {
  6692  		t.connPoolOrDef = &http2clientConnPool{t: t}
  6693  	}
  6694  }
  6695  
  6696  // ClientConn is the state of a single HTTP/2 client connection to an
  6697  // HTTP/2 server.
  6698  type http2ClientConn struct {
  6699  	t         *http2Transport
  6700  	tconn     net.Conn             // usually *tls.Conn, except specialized impls
  6701  	tlsState  *tls.ConnectionState // nil only for specialized impls
  6702  	reused    uint32               // whether conn is being reused; atomic
  6703  	singleUse bool                 // whether being used for a single http.Request
  6704  
  6705  	// readLoop goroutine fields:
  6706  	readerDone chan struct{} // closed on error
  6707  	readerErr  error         // set before readerDone is closed
  6708  
  6709  	idleTimeout time.Duration // or 0 for never
  6710  	idleTimer   *time.Timer
  6711  
  6712  	mu              sync.Mutex // guards following
  6713  	cond            *sync.Cond // hold mu; broadcast on flow/closed changes
  6714  	flow            http2flow  // our conn-level flow control quota (cs.flow is per stream)
  6715  	inflow          http2flow  // peer's conn-level flow control
  6716  	closing         bool
  6717  	closed          bool
  6718  	wantSettingsAck bool                          // we sent a SETTINGS frame and haven't heard back
  6719  	goAway          *http2GoAwayFrame             // if non-nil, the GoAwayFrame we received
  6720  	goAwayDebug     string                        // goAway frame's debug data, retained as a string
  6721  	streams         map[uint32]*http2clientStream // client-initiated
  6722  	nextStreamID    uint32
  6723  	pendingRequests int                       // requests blocked and waiting to be sent because len(streams) == maxConcurrentStreams
  6724  	pings           map[[8]byte]chan struct{} // in flight ping data to notification channel
  6725  	bw              *bufio.Writer
  6726  	br              *bufio.Reader
  6727  	fr              *http2Framer
  6728  	lastActive      time.Time
  6729  	lastIdle        time.Time // time last idle
  6730  	// Settings from peer: (also guarded by mu)
  6731  	maxFrameSize          uint32
  6732  	maxConcurrentStreams  uint32
  6733  	peerMaxHeaderListSize uint64
  6734  	initialWindowSize     uint32
  6735  
  6736  	hbuf    bytes.Buffer // HPACK encoder writes into this
  6737  	henc    *hpack.Encoder
  6738  	freeBuf [][]byte
  6739  
  6740  	wmu  sync.Mutex // held while writing; acquire AFTER mu if holding both
  6741  	werr error      // first write error that has occurred
  6742  }
  6743  
  6744  // clientStream is the state for a single HTTP/2 stream. One of these
  6745  // is created for each Transport.RoundTrip call.
  6746  type http2clientStream struct {
  6747  	cc            *http2ClientConn
  6748  	req           *Request
  6749  	trace         *httptrace.ClientTrace // or nil
  6750  	ID            uint32
  6751  	resc          chan http2resAndError
  6752  	bufPipe       http2pipe // buffered pipe with the flow-controlled response payload
  6753  	startedWrite  bool      // started request body write; guarded by cc.mu
  6754  	requestedGzip bool
  6755  	on100         func() // optional code to run if get a 100 continue response
  6756  
  6757  	flow        http2flow // guarded by cc.mu
  6758  	inflow      http2flow // guarded by cc.mu
  6759  	bytesRemain int64     // -1 means unknown; owned by transportResponseBody.Read
  6760  	readErr     error     // sticky read error; owned by transportResponseBody.Read
  6761  	stopReqBody error     // if non-nil, stop writing req body; guarded by cc.mu
  6762  	didReset    bool      // whether we sent a RST_STREAM to the server; guarded by cc.mu
  6763  
  6764  	peerReset chan struct{} // closed on peer reset
  6765  	resetErr  error         // populated before peerReset is closed
  6766  
  6767  	done chan struct{} // closed when stream remove from cc.streams map; close calls guarded by cc.mu
  6768  
  6769  	// owned by clientConnReadLoop:
  6770  	firstByte    bool  // got the first response byte
  6771  	pastHeaders  bool  // got first MetaHeadersFrame (actual headers)
  6772  	pastTrailers bool  // got optional second MetaHeadersFrame (trailers)
  6773  	num1xx       uint8 // number of 1xx responses seen
  6774  
  6775  	trailer    Header  // accumulated trailers
  6776  	resTrailer *Header // client's Response.Trailer
  6777  }
  6778  
  6779  // awaitRequestCancel waits for the user to cancel a request or for the done
  6780  // channel to be signaled. A non-nil error is returned only if the request was
  6781  // canceled.
  6782  func http2awaitRequestCancel(req *Request, done <-chan struct{}) error {
  6783  	ctx := req.Context()
  6784  	if req.Cancel == nil && ctx.Done() == nil {
  6785  		return nil
  6786  	}
  6787  	select {
  6788  	case <-req.Cancel:
  6789  		return http2errRequestCanceled
  6790  	case <-ctx.Done():
  6791  		return ctx.Err()
  6792  	case <-done:
  6793  		return nil
  6794  	}
  6795  }
  6796  
  6797  var http2got1xxFuncForTests func(int, textproto.MIMEHeader) error
  6798  
  6799  // get1xxTraceFunc returns the value of request's httptrace.ClientTrace.Got1xxResponse func,
  6800  // if any. It returns nil if not set or if the Go version is too old.
  6801  func (cs *http2clientStream) get1xxTraceFunc() func(int, textproto.MIMEHeader) error {
  6802  	if fn := http2got1xxFuncForTests; fn != nil {
  6803  		return fn
  6804  	}
  6805  	return http2traceGot1xxResponseFunc(cs.trace)
  6806  }
  6807  
  6808  // awaitRequestCancel waits for the user to cancel a request, its context to
  6809  // expire, or for the request to be done (any way it might be removed from the
  6810  // cc.streams map: peer reset, successful completion, TCP connection breakage,
  6811  // etc). If the request is canceled, then cs will be canceled and closed.
  6812  func (cs *http2clientStream) awaitRequestCancel(req *Request) {
  6813  	if err := http2awaitRequestCancel(req, cs.done); err != nil {
  6814  		cs.cancelStream()
  6815  		cs.bufPipe.CloseWithError(err)
  6816  	}
  6817  }
  6818  
  6819  func (cs *http2clientStream) cancelStream() {
  6820  	cc := cs.cc
  6821  	cc.mu.Lock()
  6822  	didReset := cs.didReset
  6823  	cs.didReset = true
  6824  	cc.mu.Unlock()
  6825  
  6826  	if !didReset {
  6827  		cc.writeStreamReset(cs.ID, http2ErrCodeCancel, nil)
  6828  		cc.forgetStreamID(cs.ID)
  6829  	}
  6830  }
  6831  
  6832  // checkResetOrDone reports any error sent in a RST_STREAM frame by the
  6833  // server, or errStreamClosed if the stream is complete.
  6834  func (cs *http2clientStream) checkResetOrDone() error {
  6835  	select {
  6836  	case <-cs.peerReset:
  6837  		return cs.resetErr
  6838  	case <-cs.done:
  6839  		return http2errStreamClosed
  6840  	default:
  6841  		return nil
  6842  	}
  6843  }
  6844  
  6845  func (cs *http2clientStream) getStartedWrite() bool {
  6846  	cc := cs.cc
  6847  	cc.mu.Lock()
  6848  	defer cc.mu.Unlock()
  6849  	return cs.startedWrite
  6850  }
  6851  
  6852  func (cs *http2clientStream) abortRequestBodyWrite(err error) {
  6853  	if err == nil {
  6854  		panic("nil error")
  6855  	}
  6856  	cc := cs.cc
  6857  	cc.mu.Lock()
  6858  	cs.stopReqBody = err
  6859  	cc.cond.Broadcast()
  6860  	cc.mu.Unlock()
  6861  }
  6862  
  6863  type http2stickyErrWriter struct {
  6864  	w   io.Writer
  6865  	err *error
  6866  }
  6867  
  6868  func (sew http2stickyErrWriter) Write(p []byte) (n int, err error) {
  6869  	if *sew.err != nil {
  6870  		return 0, *sew.err
  6871  	}
  6872  	n, err = sew.w.Write(p)
  6873  	*sew.err = err
  6874  	return
  6875  }
  6876  
  6877  // noCachedConnError is the concrete type of ErrNoCachedConn, which
  6878  // needs to be detected by net/http regardless of whether it's its
  6879  // bundled version (in h2_bundle.go with a rewritten type name) or
  6880  // from a user's x/net/http2. As such, as it has a unique method name
  6881  // (IsHTTP2NoCachedConnError) that net/http sniffs for via func
  6882  // isNoCachedConnError.
  6883  type http2noCachedConnError struct{}
  6884  
  6885  func (http2noCachedConnError) IsHTTP2NoCachedConnError() {}
  6886  
  6887  func (http2noCachedConnError) Error() string { return "http2: no cached connection was available" }
  6888  
  6889  // isNoCachedConnError reports whether err is of type noCachedConnError
  6890  // or its equivalent renamed type in net/http2's h2_bundle.go. Both types
  6891  // may coexist in the same running program.
  6892  func http2isNoCachedConnError(err error) bool {
  6893  	_, ok := err.(interface{ IsHTTP2NoCachedConnError() })
  6894  	return ok
  6895  }
  6896  
  6897  var http2ErrNoCachedConn error = http2noCachedConnError{}
  6898  
  6899  // RoundTripOpt are options for the Transport.RoundTripOpt method.
  6900  type http2RoundTripOpt struct {
  6901  	// OnlyCachedConn controls whether RoundTripOpt may
  6902  	// create a new TCP connection. If set true and
  6903  	// no cached connection is available, RoundTripOpt
  6904  	// will return ErrNoCachedConn.
  6905  	OnlyCachedConn bool
  6906  }
  6907  
  6908  func (t *http2Transport) RoundTrip(req *Request) (*Response, error) {
  6909  	return t.RoundTripOpt(req, http2RoundTripOpt{})
  6910  }
  6911  
  6912  // authorityAddr returns a given authority (a host/IP, or host:port / ip:port)
  6913  // and returns a host:port. The port 443 is added if needed.
  6914  func http2authorityAddr(scheme string, authority string) (addr string) {
  6915  	host, port, err := net.SplitHostPort(authority)
  6916  	if err != nil { // authority didn't have a port
  6917  		port = "443"
  6918  		if scheme == "http" {
  6919  			port = "80"
  6920  		}
  6921  		host = authority
  6922  	}
  6923  	if a, err := idna.ToASCII(host); err == nil {
  6924  		host = a
  6925  	}
  6926  	// IPv6 address literal, without a port:
  6927  	if strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]") {
  6928  		return host + ":" + port
  6929  	}
  6930  	return net.JoinHostPort(host, port)
  6931  }
  6932  
  6933  // RoundTripOpt is like RoundTrip, but takes options.
  6934  func (t *http2Transport) RoundTripOpt(req *Request, opt http2RoundTripOpt) (*Response, error) {
  6935  	if !(req.URL.Scheme == "https" || (req.URL.Scheme == "http" && t.AllowHTTP)) {
  6936  		return nil, errors.New("http2: unsupported scheme")
  6937  	}
  6938  
  6939  	addr := http2authorityAddr(req.URL.Scheme, req.URL.Host)
  6940  	for retry := 0; ; retry++ {
  6941  		cc, err := t.connPool().GetClientConn(req, addr)
  6942  		if err != nil {
  6943  			t.vlogf("http2: Transport failed to get client conn for %s: %v", addr, err)
  6944  			return nil, err
  6945  		}
  6946  		reused := !atomic.CompareAndSwapUint32(&cc.reused, 0, 1)
  6947  		http2traceGotConn(req, cc, reused)
  6948  		res, gotErrAfterReqBodyWrite, err := cc.roundTrip(req)
  6949  		if err != nil && retry <= 6 {
  6950  			if req, err = http2shouldRetryRequest(req, err, gotErrAfterReqBodyWrite); err == nil {
  6951  				// After the first retry, do exponential backoff with 10% jitter.
  6952  				if retry == 0 {
  6953  					continue
  6954  				}
  6955  				backoff := float64(uint(1) << (uint(retry) - 1))
  6956  				backoff += backoff * (0.1 * mathrand.Float64())
  6957  				select {
  6958  				case <-time.After(time.Second * time.Duration(backoff)):
  6959  					continue
  6960  				case <-req.Context().Done():
  6961  					return nil, req.Context().Err()
  6962  				}
  6963  			}
  6964  		}
  6965  		if err != nil {
  6966  			t.vlogf("RoundTrip failure: %v", err)
  6967  			return nil, err
  6968  		}
  6969  		return res, nil
  6970  	}
  6971  }
  6972  
  6973  // CloseIdleConnections closes any connections which were previously
  6974  // connected from previous requests but are now sitting idle.
  6975  // It does not interrupt any connections currently in use.
  6976  func (t *http2Transport) CloseIdleConnections() {
  6977  	if cp, ok := t.connPool().(http2clientConnPoolIdleCloser); ok {
  6978  		cp.closeIdleConnections()
  6979  	}
  6980  }
  6981  
  6982  var (
  6983  	http2errClientConnClosed    = errors.New("http2: client conn is closed")
  6984  	http2errClientConnUnusable  = errors.New("http2: client conn not usable")
  6985  	http2errClientConnGotGoAway = errors.New("http2: Transport received Server's graceful shutdown GOAWAY")
  6986  )
  6987  
  6988  // shouldRetryRequest is called by RoundTrip when a request fails to get
  6989  // response headers. It is always called with a non-nil error.
  6990  // It returns either a request to retry (either the same request, or a
  6991  // modified clone), or an error if the request can't be replayed.
  6992  func http2shouldRetryRequest(req *Request, err error, afterBodyWrite bool) (*Request, error) {
  6993  	if !http2canRetryError(err) {
  6994  		return nil, err
  6995  	}
  6996  	// If the Body is nil (or http.NoBody), it's safe to reuse
  6997  	// this request and its Body.
  6998  	if req.Body == nil || req.Body == NoBody {
  6999  		return req, nil
  7000  	}
  7001  
  7002  	// If the request body can be reset back to its original
  7003  	// state via the optional req.GetBody, do that.
  7004  	if req.GetBody != nil {
  7005  		// TODO: consider a req.Body.Close here? or audit that all caller paths do?
  7006  		body, err := req.GetBody()
  7007  		if err != nil {
  7008  			return nil, err
  7009  		}
  7010  		newReq := *req
  7011  		newReq.Body = body
  7012  		return &newReq, nil
  7013  	}
  7014  
  7015  	// The Request.Body can't reset back to the beginning, but we
  7016  	// don't seem to have started to read from it yet, so reuse
  7017  	// the request directly. The "afterBodyWrite" means the
  7018  	// bodyWrite process has started, which becomes true before
  7019  	// the first Read.
  7020  	if !afterBodyWrite {
  7021  		return req, nil
  7022  	}
  7023  
  7024  	return nil, fmt.Errorf("http2: Transport: cannot retry err [%v] after Request.Body was written; define Request.GetBody to avoid this error", err)
  7025  }
  7026  
  7027  func http2canRetryError(err error) bool {
  7028  	if err == http2errClientConnUnusable || err == http2errClientConnGotGoAway {
  7029  		return true
  7030  	}
  7031  	if se, ok := err.(http2StreamError); ok {
  7032  		return se.Code == http2ErrCodeRefusedStream
  7033  	}
  7034  	return false
  7035  }
  7036  
  7037  func (t *http2Transport) dialClientConn(addr string, singleUse bool) (*http2ClientConn, error) {
  7038  	host, _, err := net.SplitHostPort(addr)
  7039  	if err != nil {
  7040  		return nil, err
  7041  	}
  7042  	tconn, err := t.dialTLS()("tcp", addr, t.newTLSConfig(host))
  7043  	if err != nil {
  7044  		return nil, err
  7045  	}
  7046  	return t.newClientConn(tconn, singleUse)
  7047  }
  7048  
  7049  func (t *http2Transport) newTLSConfig(host string) *tls.Config {
  7050  	cfg := new(tls.Config)
  7051  	if t.TLSClientConfig != nil {
  7052  		*cfg = *t.TLSClientConfig.Clone()
  7053  	}
  7054  	if !http2strSliceContains(cfg.NextProtos, http2NextProtoTLS) {
  7055  		cfg.NextProtos = append([]string{http2NextProtoTLS}, cfg.NextProtos...)
  7056  	}
  7057  	if cfg.ServerName == "" {
  7058  		cfg.ServerName = host
  7059  	}
  7060  	return cfg
  7061  }
  7062  
  7063  func (t *http2Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
  7064  	if t.DialTLS != nil {
  7065  		return t.DialTLS
  7066  	}
  7067  	return t.dialTLSDefault
  7068  }
  7069  
  7070  func (t *http2Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {
  7071  	cn, err := tls.Dial(network, addr, cfg)
  7072  	if err != nil {
  7073  		return nil, err
  7074  	}
  7075  	if err := cn.Handshake(); err != nil {
  7076  		return nil, err
  7077  	}
  7078  	if !cfg.InsecureSkipVerify {
  7079  		if err := cn.VerifyHostname(cfg.ServerName); err != nil {
  7080  			return nil, err
  7081  		}
  7082  	}
  7083  	state := cn.ConnectionState()
  7084  	if p := state.NegotiatedProtocol; p != http2NextProtoTLS {
  7085  		return nil, fmt.Errorf("http2: unexpected ALPN protocol %q; want %q", p, http2NextProtoTLS)
  7086  	}
  7087  	if !state.NegotiatedProtocolIsMutual {
  7088  		return nil, errors.New("http2: could not negotiate protocol mutually")
  7089  	}
  7090  	return cn, nil
  7091  }
  7092  
  7093  // disableKeepAlives reports whether connections should be closed as
  7094  // soon as possible after handling the first request.
  7095  func (t *http2Transport) disableKeepAlives() bool {
  7096  	return t.t1 != nil && t.t1.DisableKeepAlives
  7097  }
  7098  
  7099  func (t *http2Transport) expectContinueTimeout() time.Duration {
  7100  	if t.t1 == nil {
  7101  		return 0
  7102  	}
  7103  	return t.t1.ExpectContinueTimeout
  7104  }
  7105  
  7106  func (t *http2Transport) NewClientConn(c net.Conn) (*http2ClientConn, error) {
  7107  	return t.newClientConn(c, t.disableKeepAlives())
  7108  }
  7109  
  7110  func (t *http2Transport) newClientConn(c net.Conn, singleUse bool) (*http2ClientConn, error) {
  7111  	cc := &http2ClientConn{
  7112  		t:                     t,
  7113  		tconn:                 c,
  7114  		readerDone:            make(chan struct{}),
  7115  		nextStreamID:          1,
  7116  		maxFrameSize:          16 << 10,           // spec default
  7117  		initialWindowSize:     65535,              // spec default
  7118  		maxConcurrentStreams:  1000,               // "infinite", per spec. 1000 seems good enough.
  7119  		peerMaxHeaderListSize: 0xffffffffffffffff, // "infinite", per spec. Use 2^64-1 instead.
  7120  		streams:               make(map[uint32]*http2clientStream),
  7121  		singleUse:             singleUse,
  7122  		wantSettingsAck:       true,
  7123  		pings:                 make(map[[8]byte]chan struct{}),
  7124  	}
  7125  	if d := t.idleConnTimeout(); d != 0 {
  7126  		cc.idleTimeout = d
  7127  		cc.idleTimer = time.AfterFunc(d, cc.onIdleTimeout)
  7128  	}
  7129  	if http2VerboseLogs {
  7130  		t.vlogf("http2: Transport creating client conn %p to %v", cc, c.RemoteAddr())
  7131  	}
  7132  
  7133  	cc.cond = sync.NewCond(&cc.mu)
  7134  	cc.flow.add(int32(http2initialWindowSize))
  7135  
  7136  	// TODO: adjust this writer size to account for frame size +
  7137  	// MTU + crypto/tls record padding.
  7138  	cc.bw = bufio.NewWriter(http2stickyErrWriter{c, &cc.werr})
  7139  	cc.br = bufio.NewReader(c)
  7140  	cc.fr = http2NewFramer(cc.bw, cc.br)
  7141  	cc.fr.ReadMetaHeaders = hpack.NewDecoder(http2initialHeaderTableSize, nil)
  7142  	cc.fr.MaxHeaderListSize = t.maxHeaderListSize()
  7143  
  7144  	// TODO: SetMaxDynamicTableSize, SetMaxDynamicTableSizeLimit on
  7145  	// henc in response to SETTINGS frames?
  7146  	cc.henc = hpack.NewEncoder(&cc.hbuf)
  7147  
  7148  	if t.AllowHTTP {
  7149  		cc.nextStreamID = 3
  7150  	}
  7151  
  7152  	if cs, ok := c.(http2connectionStater); ok {
  7153  		state := cs.ConnectionState()
  7154  		cc.tlsState = &state
  7155  	}
  7156  
  7157  	initialSettings := []http2Setting{
  7158  		{ID: http2SettingEnablePush, Val: 0},
  7159  		{ID: http2SettingInitialWindowSize, Val: http2transportDefaultStreamFlow},
  7160  	}
  7161  	if max := t.maxHeaderListSize(); max != 0 {
  7162  		initialSettings = append(initialSettings, http2Setting{ID: http2SettingMaxHeaderListSize, Val: max})
  7163  	}
  7164  
  7165  	cc.bw.Write(http2clientPreface)
  7166  	cc.fr.WriteSettings(initialSettings...)
  7167  	cc.fr.WriteWindowUpdate(0, http2transportDefaultConnFlow)
  7168  	cc.inflow.add(http2transportDefaultConnFlow + http2initialWindowSize)
  7169  	cc.bw.Flush()
  7170  	if cc.werr != nil {
  7171  		return nil, cc.werr
  7172  	}
  7173  
  7174  	go cc.readLoop()
  7175  	return cc, nil
  7176  }
  7177  
  7178  func (cc *http2ClientConn) setGoAway(f *http2GoAwayFrame) {
  7179  	cc.mu.Lock()
  7180  	defer cc.mu.Unlock()
  7181  
  7182  	old := cc.goAway
  7183  	cc.goAway = f
  7184  
  7185  	// Merge the previous and current GoAway error frames.
  7186  	if cc.goAwayDebug == "" {
  7187  		cc.goAwayDebug = string(f.DebugData())
  7188  	}
  7189  	if old != nil && old.ErrCode != http2ErrCodeNo {
  7190  		cc.goAway.ErrCode = old.ErrCode
  7191  	}
  7192  	last := f.LastStreamID
  7193  	for streamID, cs := range cc.streams {
  7194  		if streamID > last {
  7195  			select {
  7196  			case cs.resc <- http2resAndError{err: http2errClientConnGotGoAway}:
  7197  			default:
  7198  			}
  7199  		}
  7200  	}
  7201  }
  7202  
  7203  // CanTakeNewRequest reports whether the connection can take a new request,
  7204  // meaning it has not been closed or received or sent a GOAWAY.
  7205  func (cc *http2ClientConn) CanTakeNewRequest() bool {
  7206  	cc.mu.Lock()
  7207  	defer cc.mu.Unlock()
  7208  	return cc.canTakeNewRequestLocked()
  7209  }
  7210  
  7211  // clientConnIdleState describes the suitability of a client
  7212  // connection to initiate a new RoundTrip request.
  7213  type http2clientConnIdleState struct {
  7214  	canTakeNewRequest bool
  7215  	freshConn         bool // whether it's unused by any previous request
  7216  }
  7217  
  7218  func (cc *http2ClientConn) idleState() http2clientConnIdleState {
  7219  	cc.mu.Lock()
  7220  	defer cc.mu.Unlock()
  7221  	return cc.idleStateLocked()
  7222  }
  7223  
  7224  func (cc *http2ClientConn) idleStateLocked() (st http2clientConnIdleState) {
  7225  	if cc.singleUse && cc.nextStreamID > 1 {
  7226  		return
  7227  	}
  7228  	var maxConcurrentOkay bool
  7229  	if cc.t.StrictMaxConcurrentStreams {
  7230  		// We'll tell the caller we can take a new request to
  7231  		// prevent the caller from dialing a new TCP
  7232  		// connection, but then we'll block later before
  7233  		// writing it.
  7234  		maxConcurrentOkay = true
  7235  	} else {
  7236  		maxConcurrentOkay = int64(len(cc.streams)+1) < int64(cc.maxConcurrentStreams)
  7237  	}
  7238  
  7239  	st.canTakeNewRequest = cc.goAway == nil && !cc.closed && !cc.closing && maxConcurrentOkay &&
  7240  		int64(cc.nextStreamID)+2*int64(cc.pendingRequests) < math.MaxInt32 &&
  7241  		!cc.tooIdleLocked()
  7242  	st.freshConn = cc.nextStreamID == 1 && st.canTakeNewRequest
  7243  	return
  7244  }
  7245  
  7246  func (cc *http2ClientConn) canTakeNewRequestLocked() bool {
  7247  	st := cc.idleStateLocked()
  7248  	return st.canTakeNewRequest
  7249  }
  7250  
  7251  // tooIdleLocked reports whether this connection has been been sitting idle
  7252  // for too much wall time.
  7253  func (cc *http2ClientConn) tooIdleLocked() bool {
  7254  	// The Round(0) strips the monontonic clock reading so the
  7255  	// times are compared based on their wall time. We don't want
  7256  	// to reuse a connection that's been sitting idle during
  7257  	// VM/laptop suspend if monotonic time was also frozen.
  7258  	return cc.idleTimeout != 0 && !cc.lastIdle.IsZero() && time.Since(cc.lastIdle.Round(0)) > cc.idleTimeout
  7259  }
  7260  
  7261  // onIdleTimeout is called from a time.AfterFunc goroutine. It will
  7262  // only be called when we're idle, but because we're coming from a new
  7263  // goroutine, there could be a new request coming in at the same time,
  7264  // so this simply calls the synchronized closeIfIdle to shut down this
  7265  // connection. The timer could just call closeIfIdle, but this is more
  7266  // clear.
  7267  func (cc *http2ClientConn) onIdleTimeout() {
  7268  	cc.closeIfIdle()
  7269  }
  7270  
  7271  func (cc *http2ClientConn) closeIfIdle() {
  7272  	cc.mu.Lock()
  7273  	if len(cc.streams) > 0 {
  7274  		cc.mu.Unlock()
  7275  		return
  7276  	}
  7277  	cc.closed = true
  7278  	nextID := cc.nextStreamID
  7279  	// TODO: do clients send GOAWAY too? maybe? Just Close:
  7280  	cc.mu.Unlock()
  7281  
  7282  	if http2VerboseLogs {
  7283  		cc.vlogf("http2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)", cc, cc.singleUse, nextID-2)
  7284  	}
  7285  	cc.tconn.Close()
  7286  }
  7287  
  7288  var http2shutdownEnterWaitStateHook = func() {}
  7289  
  7290  // Shutdown gracefully close the client connection, waiting for running streams to complete.
  7291  func (cc *http2ClientConn) Shutdown(ctx context.Context) error {
  7292  	if err := cc.sendGoAway(); err != nil {
  7293  		return err
  7294  	}
  7295  	// Wait for all in-flight streams to complete or connection to close
  7296  	done := make(chan error, 1)
  7297  	cancelled := false // guarded by cc.mu
  7298  	go func() {
  7299  		cc.mu.Lock()
  7300  		defer cc.mu.Unlock()
  7301  		for {
  7302  			if len(cc.streams) == 0 || cc.closed {
  7303  				cc.closed = true
  7304  				done <- cc.tconn.Close()
  7305  				break
  7306  			}
  7307  			if cancelled {
  7308  				break
  7309  			}
  7310  			cc.cond.Wait()
  7311  		}
  7312  	}()
  7313  	http2shutdownEnterWaitStateHook()
  7314  	select {
  7315  	case err := <-done:
  7316  		return err
  7317  	case <-ctx.Done():
  7318  		cc.mu.Lock()
  7319  		// Free the goroutine above
  7320  		cancelled = true
  7321  		cc.cond.Broadcast()
  7322  		cc.mu.Unlock()
  7323  		return ctx.Err()
  7324  	}
  7325  }
  7326  
  7327  func (cc *http2ClientConn) sendGoAway() error {
  7328  	cc.mu.Lock()
  7329  	defer cc.mu.Unlock()
  7330  	cc.wmu.Lock()
  7331  	defer cc.wmu.Unlock()
  7332  	if cc.closing {
  7333  		// GOAWAY sent already
  7334  		return nil
  7335  	}
  7336  	// Send a graceful shutdown frame to server
  7337  	maxStreamID := cc.nextStreamID
  7338  	if err := cc.fr.WriteGoAway(maxStreamID, http2ErrCodeNo, nil); err != nil {
  7339  		return err
  7340  	}
  7341  	if err := cc.bw.Flush(); err != nil {
  7342  		return err
  7343  	}
  7344  	// Prevent new requests
  7345  	cc.closing = true
  7346  	return nil
  7347  }
  7348  
  7349  // Close closes the client connection immediately.
  7350  //
  7351  // In-flight requests are interrupted. For a graceful shutdown, use Shutdown instead.
  7352  func (cc *http2ClientConn) Close() error {
  7353  	cc.mu.Lock()
  7354  	defer cc.cond.Broadcast()
  7355  	defer cc.mu.Unlock()
  7356  	err := errors.New("http2: client connection force closed via ClientConn.Close")
  7357  	for id, cs := range cc.streams {
  7358  		select {
  7359  		case cs.resc <- http2resAndError{err: err}:
  7360  		default:
  7361  		}
  7362  		cs.bufPipe.CloseWithError(err)
  7363  		delete(cc.streams, id)
  7364  	}
  7365  	cc.closed = true
  7366  	return cc.tconn.Close()
  7367  }
  7368  
  7369  const http2maxAllocFrameSize = 512 << 10
  7370  
  7371  // frameBuffer returns a scratch buffer suitable for writing DATA frames.
  7372  // They're capped at the min of the peer's max frame size or 512KB
  7373  // (kinda arbitrarily), but definitely capped so we don't allocate 4GB
  7374  // bufers.
  7375  func (cc *http2ClientConn) frameScratchBuffer() []byte {
  7376  	cc.mu.Lock()
  7377  	size := cc.maxFrameSize
  7378  	if size > http2maxAllocFrameSize {
  7379  		size = http2maxAllocFrameSize
  7380  	}
  7381  	for i, buf := range cc.freeBuf {
  7382  		if len(buf) >= int(size) {
  7383  			cc.freeBuf[i] = nil
  7384  			cc.mu.Unlock()
  7385  			return buf[:size]
  7386  		}
  7387  	}
  7388  	cc.mu.Unlock()
  7389  	return make([]byte, size)
  7390  }
  7391  
  7392  func (cc *http2ClientConn) putFrameScratchBuffer(buf []byte) {
  7393  	cc.mu.Lock()
  7394  	defer cc.mu.Unlock()
  7395  	const maxBufs = 4 // arbitrary; 4 concurrent requests per conn? investigate.
  7396  	if len(cc.freeBuf) < maxBufs {
  7397  		cc.freeBuf = append(cc.freeBuf, buf)
  7398  		return
  7399  	}
  7400  	for i, old := range cc.freeBuf {
  7401  		if old == nil {
  7402  			cc.freeBuf[i] = buf
  7403  			return
  7404  		}
  7405  	}
  7406  	// forget about it.
  7407  }
  7408  
  7409  // errRequestCanceled is a copy of net/http's errRequestCanceled because it's not
  7410  // exported. At least they'll be DeepEqual for h1-vs-h2 comparisons tests.
  7411  var http2errRequestCanceled = errors.New("net/http: request canceled")
  7412  
  7413  func http2commaSeparatedTrailers(req *Request) (string, error) {
  7414  	keys := make([]string, 0, len(req.Trailer))
  7415  	for k := range req.Trailer {
  7416  		k = CanonicalHeaderKey(k)
  7417  		switch k {
  7418  		case "Transfer-Encoding", "Trailer", "Content-Length":
  7419  			return "", &http2badStringError{"invalid Trailer key", k}
  7420  		}
  7421  		keys = append(keys, k)
  7422  	}
  7423  	if len(keys) > 0 {
  7424  		sort.Strings(keys)
  7425  		return strings.Join(keys, ","), nil
  7426  	}
  7427  	return "", nil
  7428  }
  7429  
  7430  func (cc *http2ClientConn) responseHeaderTimeout() time.Duration {
  7431  	if cc.t.t1 != nil {
  7432  		return cc.t.t1.ResponseHeaderTimeout
  7433  	}
  7434  	// No way to do this (yet?) with just an http2.Transport. Probably
  7435  	// no need. Request.Cancel this is the new way. We only need to support
  7436  	// this for compatibility with the old http.Transport fields when
  7437  	// we're doing transparent http2.
  7438  	return 0
  7439  }
  7440  
  7441  // checkConnHeaders checks whether req has any invalid connection-level headers.
  7442  // per RFC 7540 section 8.1.2.2: Connection-Specific Header Fields.
  7443  // Certain headers are special-cased as okay but not transmitted later.
  7444  func http2checkConnHeaders(req *Request) error {
  7445  	if v := req.Header.Get("Upgrade"); v != "" {
  7446  		return fmt.Errorf("http2: invalid Upgrade request header: %q", req.Header["Upgrade"])
  7447  	}
  7448  	if vv := req.Header["Transfer-Encoding"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "chunked") {
  7449  		return fmt.Errorf("http2: invalid Transfer-Encoding request header: %q", vv)
  7450  	}
  7451  	if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && !strings.EqualFold(vv[0], "close") && !strings.EqualFold(vv[0], "keep-alive")) {
  7452  		return fmt.Errorf("http2: invalid Connection request header: %q", vv)
  7453  	}
  7454  	return nil
  7455  }
  7456  
  7457  // actualContentLength returns a sanitized version of
  7458  // req.ContentLength, where 0 actually means zero (not unknown) and -1
  7459  // means unknown.
  7460  func http2actualContentLength(req *Request) int64 {
  7461  	if req.Body == nil || req.Body == NoBody {
  7462  		return 0
  7463  	}
  7464  	if req.ContentLength != 0 {
  7465  		return req.ContentLength
  7466  	}
  7467  	return -1
  7468  }
  7469  
  7470  func (cc *http2ClientConn) RoundTrip(req *Request) (*Response, error) {
  7471  	resp, _, err := cc.roundTrip(req)
  7472  	return resp, err
  7473  }
  7474  
  7475  func (cc *http2ClientConn) roundTrip(req *Request) (res *Response, gotErrAfterReqBodyWrite bool, err error) {
  7476  	if err := http2checkConnHeaders(req); err != nil {
  7477  		return nil, false, err
  7478  	}
  7479  	if cc.idleTimer != nil {
  7480  		cc.idleTimer.Stop()
  7481  	}
  7482  
  7483  	trailers, err := http2commaSeparatedTrailers(req)
  7484  	if err != nil {
  7485  		return nil, false, err
  7486  	}
  7487  	hasTrailers := trailers != ""
  7488  
  7489  	cc.mu.Lock()
  7490  	if err := cc.awaitOpenSlotForRequest(req); err != nil {
  7491  		cc.mu.Unlock()
  7492  		return nil, false, err
  7493  	}
  7494  
  7495  	body := req.Body
  7496  	contentLen := http2actualContentLength(req)
  7497  	hasBody := contentLen != 0
  7498  
  7499  	// TODO(bradfitz): this is a copy of the logic in net/http. Unify somewhere?
  7500  	var requestedGzip bool
  7501  	if !cc.t.disableCompression() &&
  7502  		req.Header.Get("Accept-Encoding") == "" &&
  7503  		req.Header.Get("Range") == "" &&
  7504  		req.Method != "HEAD" {
  7505  		// Request gzip only, not deflate. Deflate is ambiguous and
  7506  		// not as universally supported anyway.
  7507  		// See: https://zlib.net/zlib_faq.html#faq39
  7508  		//
  7509  		// Note that we don't request this for HEAD requests,
  7510  		// due to a bug in nginx:
  7511  		//   http://trac.nginx.org/nginx/ticket/358
  7512  		//   https://golang.org/issue/5522
  7513  		//
  7514  		// We don't request gzip if the request is for a range, since
  7515  		// auto-decoding a portion of a gzipped document will just fail
  7516  		// anyway. See https://golang.org/issue/8923
  7517  		requestedGzip = true
  7518  	}
  7519  
  7520  	// we send: HEADERS{1}, CONTINUATION{0,} + DATA{0,} (DATA is
  7521  	// sent by writeRequestBody below, along with any Trailers,
  7522  	// again in form HEADERS{1}, CONTINUATION{0,})
  7523  	hdrs, err := cc.encodeHeaders(req, requestedGzip, trailers, contentLen)
  7524  	if err != nil {
  7525  		cc.mu.Unlock()
  7526  		return nil, false, err
  7527  	}
  7528  
  7529  	cs := cc.newStream()
  7530  	cs.req = req
  7531  	cs.trace = httptrace.ContextClientTrace(req.Context())
  7532  	cs.requestedGzip = requestedGzip
  7533  	bodyWriter := cc.t.getBodyWriterState(cs, body)
  7534  	cs.on100 = bodyWriter.on100
  7535  
  7536  	cc.wmu.Lock()
  7537  	endStream := !hasBody && !hasTrailers
  7538  	werr := cc.writeHeaders(cs.ID, endStream, int(cc.maxFrameSize), hdrs)
  7539  	cc.wmu.Unlock()
  7540  	http2traceWroteHeaders(cs.trace)
  7541  	cc.mu.Unlock()
  7542  
  7543  	if werr != nil {
  7544  		if hasBody {
  7545  			req.Body.Close() // per RoundTripper contract
  7546  			bodyWriter.cancel()
  7547  		}
  7548  		cc.forgetStreamID(cs.ID)
  7549  		// Don't bother sending a RST_STREAM (our write already failed;
  7550  		// no need to keep writing)
  7551  		http2traceWroteRequest(cs.trace, werr)
  7552  		return nil, false, werr
  7553  	}
  7554  
  7555  	var respHeaderTimer <-chan time.Time
  7556  	if hasBody {
  7557  		bodyWriter.scheduleBodyWrite()
  7558  	} else {
  7559  		http2traceWroteRequest(cs.trace, nil)
  7560  		if d := cc.responseHeaderTimeout(); d != 0 {
  7561  			timer := time.NewTimer(d)
  7562  			defer timer.Stop()
  7563  			respHeaderTimer = timer.C
  7564  		}
  7565  	}
  7566  
  7567  	readLoopResCh := cs.resc
  7568  	bodyWritten := false
  7569  	ctx := req.Context()
  7570  
  7571  	handleReadLoopResponse := func(re http2resAndError) (*Response, bool, error) {
  7572  		res := re.res
  7573  		if re.err != nil || res.StatusCode > 299 {
  7574  			// On error or status code 3xx, 4xx, 5xx, etc abort any
  7575  			// ongoing write, assuming that the server doesn't care
  7576  			// about our request body. If the server replied with 1xx or
  7577  			// 2xx, however, then assume the server DOES potentially
  7578  			// want our body (e.g. full-duplex streaming:
  7579  			// golang.org/issue/13444). If it turns out the server
  7580  			// doesn't, they'll RST_STREAM us soon enough. This is a
  7581  			// heuristic to avoid adding knobs to Transport. Hopefully
  7582  			// we can keep it.
  7583  			bodyWriter.cancel()
  7584  			cs.abortRequestBodyWrite(http2errStopReqBodyWrite)
  7585  		}
  7586  		if re.err != nil {
  7587  			cc.forgetStreamID(cs.ID)
  7588  			return nil, cs.getStartedWrite(), re.err
  7589  		}
  7590  		res.Request = req
  7591  		res.TLS = cc.tlsState
  7592  		return res, false, nil
  7593  	}
  7594  
  7595  	for {
  7596  		select {
  7597  		case re := <-readLoopResCh:
  7598  			return handleReadLoopResponse(re)
  7599  		case <-respHeaderTimer:
  7600  			if !hasBody || bodyWritten {
  7601  				cc.writeStreamReset(cs.ID, http2ErrCodeCancel, nil)
  7602  			} else {
  7603  				bodyWriter.cancel()
  7604  				cs.abortRequestBodyWrite(http2errStopReqBodyWriteAndCancel)
  7605  			}
  7606  			cc.forgetStreamID(cs.ID)
  7607  			return nil, cs.getStartedWrite(), http2errTimeout
  7608  		case <-ctx.Done():
  7609  			select {
  7610  			case re := <-readLoopResCh:
  7611  				return handleReadLoopResponse(re)
  7612  			default:
  7613  			}
  7614  			if !hasBody || bodyWritten {
  7615  				cc.writeStreamReset(cs.ID, http2ErrCodeCancel, nil)
  7616  			} else {
  7617  				bodyWriter.cancel()
  7618  				cs.abortRequestBodyWrite(http2errStopReqBodyWriteAndCancel)
  7619  			}
  7620  			cc.forgetStreamID(cs.ID)
  7621  			return nil, cs.getStartedWrite(), ctx.Err()
  7622  		case <-req.Cancel:
  7623  			select {
  7624  			case re := <-readLoopResCh:
  7625  				return handleReadLoopResponse(re)
  7626  			default:
  7627  			}
  7628  			if !hasBody || bodyWritten {
  7629  				cc.writeStreamReset(cs.ID, http2ErrCodeCancel, nil)
  7630  			} else {
  7631  				bodyWriter.cancel()
  7632  				cs.abortRequestBodyWrite(http2errStopReqBodyWriteAndCancel)
  7633  			}
  7634  			cc.forgetStreamID(cs.ID)
  7635  			return nil, cs.getStartedWrite(), http2errRequestCanceled
  7636  		case <-cs.peerReset:
  7637  			select {
  7638  			case re := <-readLoopResCh:
  7639  				return handleReadLoopResponse(re)
  7640  			default:
  7641  			}
  7642  			// processResetStream already removed the
  7643  			// stream from the streams map; no need for
  7644  			// forgetStreamID.
  7645  			return nil, cs.getStartedWrite(), cs.resetErr
  7646  		case err := <-bodyWriter.resc:
  7647  			// Prefer the read loop's response, if available. Issue 16102.
  7648  			select {
  7649  			case re := <-readLoopResCh:
  7650  				return handleReadLoopResponse(re)
  7651  			default:
  7652  			}
  7653  			if err != nil {
  7654  				cc.forgetStreamID(cs.ID)
  7655  				return nil, cs.getStartedWrite(), err
  7656  			}
  7657  			bodyWritten = true
  7658  			if d := cc.responseHeaderTimeout(); d != 0 {
  7659  				timer := time.NewTimer(d)
  7660  				defer timer.Stop()
  7661  				respHeaderTimer = timer.C
  7662  			}
  7663  		}
  7664  	}
  7665  }
  7666  
  7667  // awaitOpenSlotForRequest waits until len(streams) < maxConcurrentStreams.
  7668  // Must hold cc.mu.
  7669  func (cc *http2ClientConn) awaitOpenSlotForRequest(req *Request) error {
  7670  	var waitingForConn chan struct{}
  7671  	var waitingForConnErr error // guarded by cc.mu
  7672  	for {
  7673  		cc.lastActive = time.Now()
  7674  		if cc.closed || !cc.canTakeNewRequestLocked() {
  7675  			if waitingForConn != nil {
  7676  				close(waitingForConn)
  7677  			}
  7678  			return http2errClientConnUnusable
  7679  		}
  7680  		cc.lastIdle = time.Time{}
  7681  		if int64(len(cc.streams))+1 <= int64(cc.maxConcurrentStreams) {
  7682  			if waitingForConn != nil {
  7683  				close(waitingForConn)
  7684  			}
  7685  			return nil
  7686  		}
  7687  		// Unfortunately, we cannot wait on a condition variable and channel at
  7688  		// the same time, so instead, we spin up a goroutine to check if the
  7689  		// request is canceled while we wait for a slot to open in the connection.
  7690  		if waitingForConn == nil {
  7691  			waitingForConn = make(chan struct{})
  7692  			go func() {
  7693  				if err := http2awaitRequestCancel(req, waitingForConn); err != nil {
  7694  					cc.mu.Lock()
  7695  					waitingForConnErr = err
  7696  					cc.cond.Broadcast()
  7697  					cc.mu.Unlock()
  7698  				}
  7699  			}()
  7700  		}
  7701  		cc.pendingRequests++
  7702  		cc.cond.Wait()
  7703  		cc.pendingRequests--
  7704  		if waitingForConnErr != nil {
  7705  			return waitingForConnErr
  7706  		}
  7707  	}
  7708  }
  7709  
  7710  // requires cc.wmu be held
  7711  func (cc *http2ClientConn) writeHeaders(streamID uint32, endStream bool, maxFrameSize int, hdrs []byte) error {
  7712  	first := true // first frame written (HEADERS is first, then CONTINUATION)
  7713  	for len(hdrs) > 0 && cc.werr == nil {
  7714  		chunk := hdrs
  7715  		if len(chunk) > maxFrameSize {
  7716  			chunk = chunk[:maxFrameSize]
  7717  		}
  7718  		hdrs = hdrs[len(chunk):]
  7719  		endHeaders := len(hdrs) == 0
  7720  		if first {
  7721  			cc.fr.WriteHeaders(http2HeadersFrameParam{
  7722  				StreamID:      streamID,
  7723  				BlockFragment: chunk,
  7724  				EndStream:     endStream,
  7725  				EndHeaders:    endHeaders,
  7726  			})
  7727  			first = false
  7728  		} else {
  7729  			cc.fr.WriteContinuation(streamID, endHeaders, chunk)
  7730  		}
  7731  	}
  7732  	// TODO(bradfitz): this Flush could potentially block (as
  7733  	// could the WriteHeaders call(s) above), which means they
  7734  	// wouldn't respond to Request.Cancel being readable. That's
  7735  	// rare, but this should probably be in a goroutine.
  7736  	cc.bw.Flush()
  7737  	return cc.werr
  7738  }
  7739  
  7740  // internal error values; they don't escape to callers
  7741  var (
  7742  	// abort request body write; don't send cancel
  7743  	http2errStopReqBodyWrite = errors.New("http2: aborting request body write")
  7744  
  7745  	// abort request body write, but send stream reset of cancel.
  7746  	http2errStopReqBodyWriteAndCancel = errors.New("http2: canceling request")
  7747  
  7748  	http2errReqBodyTooLong = errors.New("http2: request body larger than specified content length")
  7749  )
  7750  
  7751  func (cs *http2clientStream) writeRequestBody(body io.Reader, bodyCloser io.Closer) (err error) {
  7752  	cc := cs.cc
  7753  	sentEnd := false // whether we sent the final DATA frame w/ END_STREAM
  7754  	buf := cc.frameScratchBuffer()
  7755  	defer cc.putFrameScratchBuffer(buf)
  7756  
  7757  	defer func() {
  7758  		http2traceWroteRequest(cs.trace, err)
  7759  		// TODO: write h12Compare test showing whether
  7760  		// Request.Body is closed by the Transport,
  7761  		// and in multiple cases: server replies <=299 and >299
  7762  		// while still writing request body
  7763  		cerr := bodyCloser.Close()
  7764  		if err == nil {
  7765  			err = cerr
  7766  		}
  7767  	}()
  7768  
  7769  	req := cs.req
  7770  	hasTrailers := req.Trailer != nil
  7771  	remainLen := http2actualContentLength(req)
  7772  	hasContentLen := remainLen != -1
  7773  
  7774  	var sawEOF bool
  7775  	for !sawEOF {
  7776  		n, err := body.Read(buf[:len(buf)-1])
  7777  		if hasContentLen {
  7778  			remainLen -= int64(n)
  7779  			if remainLen == 0 && err == nil {
  7780  				// The request body's Content-Length was predeclared and
  7781  				// we just finished reading it all, but the underlying io.Reader
  7782  				// returned the final chunk with a nil error (which is one of
  7783  				// the two valid things a Reader can do at EOF). Because we'd prefer
  7784  				// to send the END_STREAM bit early, double-check that we're actually
  7785  				// at EOF. Subsequent reads should return (0, EOF) at this point.
  7786  				// If either value is different, we return an error in one of two ways below.
  7787  				var n1 int
  7788  				n1, err = body.Read(buf[n:])
  7789  				remainLen -= int64(n1)
  7790  			}
  7791  			if remainLen < 0 {
  7792  				err = http2errReqBodyTooLong
  7793  				cc.writeStreamReset(cs.ID, http2ErrCodeCancel, err)
  7794  				return err
  7795  			}
  7796  		}
  7797  		if err == io.EOF {
  7798  			sawEOF = true
  7799  			err = nil
  7800  		} else if err != nil {
  7801  			cc.writeStreamReset(cs.ID, http2ErrCodeCancel, err)
  7802  			return err
  7803  		}
  7804  
  7805  		remain := buf[:n]
  7806  		for len(remain) > 0 && err == nil {
  7807  			var allowed int32
  7808  			allowed, err = cs.awaitFlowControl(len(remain))
  7809  			switch {
  7810  			case err == http2errStopReqBodyWrite:
  7811  				return err
  7812  			case err == http2errStopReqBodyWriteAndCancel:
  7813  				cc.writeStreamReset(cs.ID, http2ErrCodeCancel, nil)
  7814  				return err
  7815  			case err != nil:
  7816  				return err
  7817  			}
  7818  			cc.wmu.Lock()
  7819  			data := remain[:allowed]
  7820  			remain = remain[allowed:]
  7821  			sentEnd = sawEOF && len(remain) == 0 && !hasTrailers
  7822  			err = cc.fr.WriteData(cs.ID, sentEnd, data)
  7823  			if err == nil {
  7824  				// TODO(bradfitz): this flush is for latency, not bandwidth.
  7825  				// Most requests won't need this. Make this opt-in or
  7826  				// opt-out?  Use some heuristic on the body type? Nagel-like
  7827  				// timers?  Based on 'n'? Only last chunk of this for loop,
  7828  				// unless flow control tokens are low? For now, always.
  7829  				// If we change this, see comment below.
  7830  				err = cc.bw.Flush()
  7831  			}
  7832  			cc.wmu.Unlock()
  7833  		}
  7834  		if err != nil {
  7835  			return err
  7836  		}
  7837  	}
  7838  
  7839  	if sentEnd {
  7840  		// Already sent END_STREAM (which implies we have no
  7841  		// trailers) and flushed, because currently all
  7842  		// WriteData frames above get a flush. So we're done.
  7843  		return nil
  7844  	}
  7845  
  7846  	var trls []byte
  7847  	if hasTrailers {
  7848  		cc.mu.Lock()
  7849  		trls, err = cc.encodeTrailers(req)
  7850  		cc.mu.Unlock()
  7851  		if err != nil {
  7852  			cc.writeStreamReset(cs.ID, http2ErrCodeInternal, err)
  7853  			cc.forgetStreamID(cs.ID)
  7854  			return err
  7855  		}
  7856  	}
  7857  
  7858  	cc.mu.Lock()
  7859  	maxFrameSize := int(cc.maxFrameSize)
  7860  	cc.mu.Unlock()
  7861  
  7862  	cc.wmu.Lock()
  7863  	defer cc.wmu.Unlock()
  7864  
  7865  	// Two ways to send END_STREAM: either with trailers, or
  7866  	// with an empty DATA frame.
  7867  	if len(trls) > 0 {
  7868  		err = cc.writeHeaders(cs.ID, true, maxFrameSize, trls)
  7869  	} else {
  7870  		err = cc.fr.WriteData(cs.ID, true, nil)
  7871  	}
  7872  	if ferr := cc.bw.Flush(); ferr != nil && err == nil {
  7873  		err = ferr
  7874  	}
  7875  	return err
  7876  }
  7877  
  7878  // awaitFlowControl waits for [1, min(maxBytes, cc.cs.maxFrameSize)] flow
  7879  // control tokens from the server.
  7880  // It returns either the non-zero number of tokens taken or an error
  7881  // if the stream is dead.
  7882  func (cs *http2clientStream) awaitFlowControl(maxBytes int) (taken int32, err error) {
  7883  	cc := cs.cc
  7884  	cc.mu.Lock()
  7885  	defer cc.mu.Unlock()
  7886  	for {
  7887  		if cc.closed {
  7888  			return 0, http2errClientConnClosed
  7889  		}
  7890  		if cs.stopReqBody != nil {
  7891  			return 0, cs.stopReqBody
  7892  		}
  7893  		if err := cs.checkResetOrDone(); err != nil {
  7894  			return 0, err
  7895  		}
  7896  		if a := cs.flow.available(); a > 0 {
  7897  			take := a
  7898  			if int(take) > maxBytes {
  7899  
  7900  				take = int32(maxBytes) // can't truncate int; take is int32
  7901  			}
  7902  			if take > int32(cc.maxFrameSize) {
  7903  				take = int32(cc.maxFrameSize)
  7904  			}
  7905  			cs.flow.take(take)
  7906  			return take, nil
  7907  		}
  7908  		cc.cond.Wait()
  7909  	}
  7910  }
  7911  
  7912  type http2badStringError struct {
  7913  	what string
  7914  	str  string
  7915  }
  7916  
  7917  func (e *http2badStringError) Error() string { return fmt.Sprintf("%s %q", e.what, e.str) }
  7918  
  7919  // requires cc.mu be held.
  7920  func (cc *http2ClientConn) encodeHeaders(req *Request, addGzipHeader bool, trailers string, contentLength int64) ([]byte, error) {
  7921  	cc.hbuf.Reset()
  7922  
  7923  	host := req.Host
  7924  	if host == "" {
  7925  		host = req.URL.Host
  7926  	}
  7927  	host, err := httpguts.PunycodeHostPort(host)
  7928  	if err != nil {
  7929  		return nil, err
  7930  	}
  7931  
  7932  	var path string
  7933  	if req.Method != "CONNECT" {
  7934  		path = req.URL.RequestURI()
  7935  		if !http2validPseudoPath(path) {
  7936  			orig := path
  7937  			path = strings.TrimPrefix(path, req.URL.Scheme+"://"+host)
  7938  			if !http2validPseudoPath(path) {
  7939  				if req.URL.Opaque != "" {
  7940  					return nil, fmt.Errorf("invalid request :path %q from URL.Opaque = %q", orig, req.URL.Opaque)
  7941  				} else {
  7942  					return nil, fmt.Errorf("invalid request :path %q", orig)
  7943  				}
  7944  			}
  7945  		}
  7946  	}
  7947  
  7948  	// Check for any invalid headers and return an error before we
  7949  	// potentially pollute our hpack state. (We want to be able to
  7950  	// continue to reuse the hpack encoder for future requests)
  7951  	for k, vv := range req.Header {
  7952  		if !httpguts.ValidHeaderFieldName(k) {
  7953  			return nil, fmt.Errorf("invalid HTTP header name %q", k)
  7954  		}
  7955  		for _, v := range vv {
  7956  			if !httpguts.ValidHeaderFieldValue(v) {
  7957  				return nil, fmt.Errorf("invalid HTTP header value %q for header %q", v, k)
  7958  			}
  7959  		}
  7960  	}
  7961  
  7962  	enumerateHeaders := func(f func(name, value string)) {
  7963  		// 8.1.2.3 Request Pseudo-Header Fields
  7964  		// The :path pseudo-header field includes the path and query parts of the
  7965  		// target URI (the path-absolute production and optionally a '?' character
  7966  		// followed by the query production (see Sections 3.3 and 3.4 of
  7967  		// [RFC3986]).
  7968  		f(":authority", host)
  7969  		m := req.Method
  7970  		if m == "" {
  7971  			m = MethodGet
  7972  		}
  7973  		f(":method", m)
  7974  		if req.Method != "CONNECT" {
  7975  			f(":path", path)
  7976  			f(":scheme", req.URL.Scheme)
  7977  		}
  7978  		if trailers != "" {
  7979  			f("trailer", trailers)
  7980  		}
  7981  
  7982  		var didUA bool
  7983  		for k, vv := range req.Header {
  7984  			if strings.EqualFold(k, "host") || strings.EqualFold(k, "content-length") {
  7985  				// Host is :authority, already sent.
  7986  				// Content-Length is automatic, set below.
  7987  				continue
  7988  			} else if strings.EqualFold(k, "connection") || strings.EqualFold(k, "proxy-connection") ||
  7989  				strings.EqualFold(k, "transfer-encoding") || strings.EqualFold(k, "upgrade") ||
  7990  				strings.EqualFold(k, "keep-alive") {
  7991  				// Per 8.1.2.2 Connection-Specific Header
  7992  				// Fields, don't send connection-specific
  7993  				// fields. We have already checked if any
  7994  				// are error-worthy so just ignore the rest.
  7995  				continue
  7996  			} else if strings.EqualFold(k, "user-agent") {
  7997  				// Match Go's http1 behavior: at most one
  7998  				// User-Agent. If set to nil or empty string,
  7999  				// then omit it. Otherwise if not mentioned,
  8000  				// include the default (below).
  8001  				didUA = true
  8002  				if len(vv) < 1 {
  8003  					continue
  8004  				}
  8005  				vv = vv[:1]
  8006  				if vv[0] == "" {
  8007  					continue
  8008  				}
  8009  			} else if strings.EqualFold(k, "cookie") {
  8010  				// Per 8.1.2.5 To allow for better compression efficiency, the
  8011  				// Cookie header field MAY be split into separate header fields,
  8012  				// each with one or more cookie-pairs.
  8013  				for _, v := range vv {
  8014  					for {
  8015  						p := strings.IndexByte(v, ';')
  8016  						if p < 0 {
  8017  							break
  8018  						}
  8019  						f("cookie", v[:p])
  8020  						p++
  8021  						// strip space after semicolon if any.
  8022  						for p+1 <= len(v) && v[p] == ' ' {
  8023  							p++
  8024  						}
  8025  						v = v[p:]
  8026  					}
  8027  					if len(v) > 0 {
  8028  						f("cookie", v)
  8029  					}
  8030  				}
  8031  				continue
  8032  			}
  8033  
  8034  			for _, v := range vv {
  8035  				f(k, v)
  8036  			}
  8037  		}
  8038  		if http2shouldSendReqContentLength(req.Method, contentLength) {
  8039  			f("content-length", strconv.FormatInt(contentLength, 10))
  8040  		}
  8041  		if addGzipHeader {
  8042  			f("accept-encoding", "gzip")
  8043  		}
  8044  		if !didUA {
  8045  			f("user-agent", http2defaultUserAgent)
  8046  		}
  8047  	}
  8048  
  8049  	// Do a first pass over the headers counting bytes to ensure
  8050  	// we don't exceed cc.peerMaxHeaderListSize. This is done as a
  8051  	// separate pass before encoding the headers to prevent
  8052  	// modifying the hpack state.
  8053  	hlSize := uint64(0)
  8054  	enumerateHeaders(func(name, value string) {
  8055  		hf := hpack.HeaderField{Name: name, Value: value}
  8056  		hlSize += uint64(hf.Size())
  8057  	})
  8058  
  8059  	if hlSize > cc.peerMaxHeaderListSize {
  8060  		return nil, http2errRequestHeaderListSize
  8061  	}
  8062  
  8063  	trace := httptrace.ContextClientTrace(req.Context())
  8064  	traceHeaders := http2traceHasWroteHeaderField(trace)
  8065  
  8066  	// Header list size is ok. Write the headers.
  8067  	enumerateHeaders(func(name, value string) {
  8068  		name = strings.ToLower(name)
  8069  		cc.writeHeader(name, value)
  8070  		if traceHeaders {
  8071  			http2traceWroteHeaderField(trace, name, value)
  8072  		}
  8073  	})
  8074  
  8075  	return cc.hbuf.Bytes(), nil
  8076  }
  8077  
  8078  // shouldSendReqContentLength reports whether the http2.Transport should send
  8079  // a "content-length" request header. This logic is basically a copy of the net/http
  8080  // transferWriter.shouldSendContentLength.
  8081  // The contentLength is the corrected contentLength (so 0 means actually 0, not unknown).
  8082  // -1 means unknown.
  8083  func http2shouldSendReqContentLength(method string, contentLength int64) bool {
  8084  	if contentLength > 0 {
  8085  		return true
  8086  	}
  8087  	if contentLength < 0 {
  8088  		return false
  8089  	}
  8090  	// For zero bodies, whether we send a content-length depends on the method.
  8091  	// It also kinda doesn't matter for http2 either way, with END_STREAM.
  8092  	switch method {
  8093  	case "POST", "PUT", "PATCH":
  8094  		return true
  8095  	default:
  8096  		return false
  8097  	}
  8098  }
  8099  
  8100  // requires cc.mu be held.
  8101  func (cc *http2ClientConn) encodeTrailers(req *Request) ([]byte, error) {
  8102  	cc.hbuf.Reset()
  8103  
  8104  	hlSize := uint64(0)
  8105  	for k, vv := range req.Trailer {
  8106  		for _, v := range vv {
  8107  			hf := hpack.HeaderField{Name: k, Value: v}
  8108  			hlSize += uint64(hf.Size())
  8109  		}
  8110  	}
  8111  	if hlSize > cc.peerMaxHeaderListSize {
  8112  		return nil, http2errRequestHeaderListSize
  8113  	}
  8114  
  8115  	for k, vv := range req.Trailer {
  8116  		// Transfer-Encoding, etc.. have already been filtered at the
  8117  		// start of RoundTrip
  8118  		lowKey := strings.ToLower(k)
  8119  		for _, v := range vv {
  8120  			cc.writeHeader(lowKey, v)
  8121  		}
  8122  	}
  8123  	return cc.hbuf.Bytes(), nil
  8124  }
  8125  
  8126  func (cc *http2ClientConn) writeHeader(name, value string) {
  8127  	if http2VerboseLogs {
  8128  		log.Printf("http2: Transport encoding header %q = %q", name, value)
  8129  	}
  8130  	cc.henc.WriteField(hpack.HeaderField{Name: name, Value: value})
  8131  }
  8132  
  8133  type http2resAndError struct {
  8134  	res *Response
  8135  	err error
  8136  }
  8137  
  8138  // requires cc.mu be held.
  8139  func (cc *http2ClientConn) newStream() *http2clientStream {
  8140  	cs := &http2clientStream{
  8141  		cc:        cc,
  8142  		ID:        cc.nextStreamID,
  8143  		resc:      make(chan http2resAndError, 1),
  8144  		peerReset: make(chan struct{}),
  8145  		done:      make(chan struct{}),
  8146  	}
  8147  	cs.flow.add(int32(cc.initialWindowSize))
  8148  	cs.flow.setConnFlow(&cc.flow)
  8149  	cs.inflow.add(http2transportDefaultStreamFlow)
  8150  	cs.inflow.setConnFlow(&cc.inflow)
  8151  	cc.nextStreamID += 2
  8152  	cc.streams[cs.ID] = cs
  8153  	return cs
  8154  }
  8155  
  8156  func (cc *http2ClientConn) forgetStreamID(id uint32) {
  8157  	cc.streamByID(id, true)
  8158  }
  8159  
  8160  func (cc *http2ClientConn) streamByID(id uint32, andRemove bool) *http2clientStream {
  8161  	cc.mu.Lock()
  8162  	defer cc.mu.Unlock()
  8163  	cs := cc.streams[id]
  8164  	if andRemove && cs != nil && !cc.closed {
  8165  		cc.lastActive = time.Now()
  8166  		delete(cc.streams, id)
  8167  		if len(cc.streams) == 0 && cc.idleTimer != nil {
  8168  			cc.idleTimer.Reset(cc.idleTimeout)
  8169  			cc.lastIdle = time.Now()
  8170  		}
  8171  		close(cs.done)
  8172  		// Wake up checkResetOrDone via clientStream.awaitFlowControl and
  8173  		// wake up RoundTrip if there is a pending request.
  8174  		cc.cond.Broadcast()
  8175  	}
  8176  	return cs
  8177  }
  8178  
  8179  // clientConnReadLoop is the state owned by the clientConn's frame-reading readLoop.
  8180  type http2clientConnReadLoop struct {
  8181  	cc            *http2ClientConn
  8182  	closeWhenIdle bool
  8183  }
  8184  
  8185  // readLoop runs in its own goroutine and reads and dispatches frames.
  8186  func (cc *http2ClientConn) readLoop() {
  8187  	rl := &http2clientConnReadLoop{cc: cc}
  8188  	defer rl.cleanup()
  8189  	cc.readerErr = rl.run()
  8190  	if ce, ok := cc.readerErr.(http2ConnectionError); ok {
  8191  		cc.wmu.Lock()
  8192  		cc.fr.WriteGoAway(0, http2ErrCode(ce), nil)
  8193  		cc.wmu.Unlock()
  8194  	}
  8195  }
  8196  
  8197  // GoAwayError is returned by the Transport when the server closes the
  8198  // TCP connection after sending a GOAWAY frame.
  8199  type http2GoAwayError struct {
  8200  	LastStreamID uint32
  8201  	ErrCode      http2ErrCode
  8202  	DebugData    string
  8203  }
  8204  
  8205  func (e http2GoAwayError) Error() string {
  8206  	return fmt.Sprintf("http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%q",
  8207  		e.LastStreamID, e.ErrCode, e.DebugData)
  8208  }
  8209  
  8210  func http2isEOFOrNetReadError(err error) bool {
  8211  	if err == io.EOF {
  8212  		return true
  8213  	}
  8214  	ne, ok := err.(*net.OpError)
  8215  	return ok && ne.Op == "read"
  8216  }
  8217  
  8218  func (rl *http2clientConnReadLoop) cleanup() {
  8219  	cc := rl.cc
  8220  	defer cc.tconn.Close()
  8221  	defer cc.t.connPool().MarkDead(cc)
  8222  	defer close(cc.readerDone)
  8223  
  8224  	if cc.idleTimer != nil {
  8225  		cc.idleTimer.Stop()
  8226  	}
  8227  
  8228  	// Close any response bodies if the server closes prematurely.
  8229  	// TODO: also do this if we've written the headers but not
  8230  	// gotten a response yet.
  8231  	err := cc.readerErr
  8232  	cc.mu.Lock()
  8233  	if cc.goAway != nil && http2isEOFOrNetReadError(err) {
  8234  		err = http2GoAwayError{
  8235  			LastStreamID: cc.goAway.LastStreamID,
  8236  			ErrCode:      cc.goAway.ErrCode,
  8237  			DebugData:    cc.goAwayDebug,
  8238  		}
  8239  	} else if err == io.EOF {
  8240  		err = io.ErrUnexpectedEOF
  8241  	}
  8242  	for _, cs := range cc.streams {
  8243  		cs.bufPipe.CloseWithError(err) // no-op if already closed
  8244  		select {
  8245  		case cs.resc <- http2resAndError{err: err}:
  8246  		default:
  8247  		}
  8248  		close(cs.done)
  8249  	}
  8250  	cc.closed = true
  8251  	cc.cond.Broadcast()
  8252  	cc.mu.Unlock()
  8253  }
  8254  
  8255  func (rl *http2clientConnReadLoop) run() error {
  8256  	cc := rl.cc
  8257  	rl.closeWhenIdle = cc.t.disableKeepAlives() || cc.singleUse
  8258  	gotReply := false // ever saw a HEADERS reply
  8259  	gotSettings := false
  8260  	for {
  8261  		f, err := cc.fr.ReadFrame()
  8262  		if err != nil {
  8263  			cc.vlogf("http2: Transport readFrame error on conn %p: (%T) %v", cc, err, err)
  8264  		}
  8265  		if se, ok := err.(http2StreamError); ok {
  8266  			if cs := cc.streamByID(se.StreamID, false); cs != nil {
  8267  				cs.cc.writeStreamReset(cs.ID, se.Code, err)
  8268  				cs.cc.forgetStreamID(cs.ID)
  8269  				if se.Cause == nil {
  8270  					se.Cause = cc.fr.errDetail
  8271  				}
  8272  				rl.endStreamError(cs, se)
  8273  			}
  8274  			continue
  8275  		} else if err != nil {
  8276  			return err
  8277  		}
  8278  		if http2VerboseLogs {
  8279  			cc.vlogf("http2: Transport received %s", http2summarizeFrame(f))
  8280  		}
  8281  		if !gotSettings {
  8282  			if _, ok := f.(*http2SettingsFrame); !ok {
  8283  				cc.logf("protocol error: received %T before a SETTINGS frame", f)
  8284  				return http2ConnectionError(http2ErrCodeProtocol)
  8285  			}
  8286  			gotSettings = true
  8287  		}
  8288  		maybeIdle := false // whether frame might transition us to idle
  8289  
  8290  		switch f := f.(type) {
  8291  		case *http2MetaHeadersFrame:
  8292  			err = rl.processHeaders(f)
  8293  			maybeIdle = true
  8294  			gotReply = true
  8295  		case *http2DataFrame:
  8296  			err = rl.processData(f)
  8297  			maybeIdle = true
  8298  		case *http2GoAwayFrame:
  8299  			err = rl.processGoAway(f)
  8300  			maybeIdle = true
  8301  		case *http2RSTStreamFrame:
  8302  			err = rl.processResetStream(f)
  8303  			maybeIdle = true
  8304  		case *http2SettingsFrame:
  8305  			err = rl.processSettings(f)
  8306  		case *http2PushPromiseFrame:
  8307  			err = rl.processPushPromise(f)
  8308  		case *http2WindowUpdateFrame:
  8309  			err = rl.processWindowUpdate(f)
  8310  		case *http2PingFrame:
  8311  			err = rl.processPing(f)
  8312  		default:
  8313  			cc.logf("Transport: unhandled response frame type %T", f)
  8314  		}
  8315  		if err != nil {
  8316  			if http2VerboseLogs {
  8317  				cc.vlogf("http2: Transport conn %p received error from processing frame %v: %v", cc, http2summarizeFrame(f), err)
  8318  			}
  8319  			return err
  8320  		}
  8321  		if rl.closeWhenIdle && gotReply && maybeIdle {
  8322  			cc.closeIfIdle()
  8323  		}
  8324  	}
  8325  }
  8326  
  8327  func (rl *http2clientConnReadLoop) processHeaders(f *http2MetaHeadersFrame) error {
  8328  	cc := rl.cc
  8329  	cs := cc.streamByID(f.StreamID, false)
  8330  	if cs == nil {
  8331  		// We'd get here if we canceled a request while the
  8332  		// server had its response still in flight. So if this
  8333  		// was just something we canceled, ignore it.
  8334  		return nil
  8335  	}
  8336  	if f.StreamEnded() {
  8337  		// Issue 20521: If the stream has ended, streamByID() causes
  8338  		// clientStream.done to be closed, which causes the request's bodyWriter
  8339  		// to be closed with an errStreamClosed, which may be received by
  8340  		// clientConn.RoundTrip before the result of processing these headers.
  8341  		// Deferring stream closure allows the header processing to occur first.
  8342  		// clientConn.RoundTrip may still receive the bodyWriter error first, but
  8343  		// the fix for issue 16102 prioritises any response.
  8344  		//
  8345  		// Issue 22413: If there is no request body, we should close the
  8346  		// stream before writing to cs.resc so that the stream is closed
  8347  		// immediately once RoundTrip returns.
  8348  		if cs.req.Body != nil {
  8349  			defer cc.forgetStreamID(f.StreamID)
  8350  		} else {
  8351  			cc.forgetStreamID(f.StreamID)
  8352  		}
  8353  	}
  8354  	if !cs.firstByte {
  8355  		if cs.trace != nil {
  8356  			// TODO(bradfitz): move first response byte earlier,
  8357  			// when we first read the 9 byte header, not waiting
  8358  			// until all the HEADERS+CONTINUATION frames have been
  8359  			// merged. This works for now.
  8360  			http2traceFirstResponseByte(cs.trace)
  8361  		}
  8362  		cs.firstByte = true
  8363  	}
  8364  	if !cs.pastHeaders {
  8365  		cs.pastHeaders = true
  8366  	} else {
  8367  		return rl.processTrailers(cs, f)
  8368  	}
  8369  
  8370  	res, err := rl.handleResponse(cs, f)
  8371  	if err != nil {
  8372  		if _, ok := err.(http2ConnectionError); ok {
  8373  			return err
  8374  		}
  8375  		// Any other error type is a stream error.
  8376  		cs.cc.writeStreamReset(f.StreamID, http2ErrCodeProtocol, err)
  8377  		cc.forgetStreamID(cs.ID)
  8378  		cs.resc <- http2resAndError{err: err}
  8379  		return nil // return nil from process* funcs to keep conn alive
  8380  	}
  8381  	if res == nil {
  8382  		// (nil, nil) special case. See handleResponse docs.
  8383  		return nil
  8384  	}
  8385  	cs.resTrailer = &res.Trailer
  8386  	cs.resc <- http2resAndError{res: res}
  8387  	return nil
  8388  }
  8389  
  8390  // may return error types nil, or ConnectionError. Any other error value
  8391  // is a StreamError of type ErrCodeProtocol. The returned error in that case
  8392  // is the detail.
  8393  //
  8394  // As a special case, handleResponse may return (nil, nil) to skip the
  8395  // frame (currently only used for 1xx responses).
  8396  func (rl *http2clientConnReadLoop) handleResponse(cs *http2clientStream, f *http2MetaHeadersFrame) (*Response, error) {
  8397  	if f.Truncated {
  8398  		return nil, http2errResponseHeaderListSize
  8399  	}
  8400  
  8401  	status := f.PseudoValue("status")
  8402  	if status == "" {
  8403  		return nil, errors.New("malformed response from server: missing status pseudo header")
  8404  	}
  8405  	statusCode, err := strconv.Atoi(status)
  8406  	if err != nil {
  8407  		return nil, errors.New("malformed response from server: malformed non-numeric status pseudo header")
  8408  	}
  8409  
  8410  	header := make(Header)
  8411  	res := &Response{
  8412  		Proto:      "HTTP/2.0",
  8413  		ProtoMajor: 2,
  8414  		Header:     header,
  8415  		StatusCode: statusCode,
  8416  		Status:     status + " " + StatusText(statusCode),
  8417  	}
  8418  	for _, hf := range f.RegularFields() {
  8419  		key := CanonicalHeaderKey(hf.Name)
  8420  		if key == "Trailer" {
  8421  			t := res.Trailer
  8422  			if t == nil {
  8423  				t = make(Header)
  8424  				res.Trailer = t
  8425  			}
  8426  			http2foreachHeaderElement(hf.Value, func(v string) {
  8427  				t[CanonicalHeaderKey(v)] = nil
  8428  			})
  8429  		} else {
  8430  			header[key] = append(header[key], hf.Value)
  8431  		}
  8432  	}
  8433  
  8434  	if statusCode >= 100 && statusCode <= 199 {
  8435  		cs.num1xx++
  8436  		const max1xxResponses = 5 // arbitrary bound on number of informational responses, same as net/http
  8437  		if cs.num1xx > max1xxResponses {
  8438  			return nil, errors.New("http2: too many 1xx informational responses")
  8439  		}
  8440  		if fn := cs.get1xxTraceFunc(); fn != nil {
  8441  			if err := fn(statusCode, textproto.MIMEHeader(header)); err != nil {
  8442  				return nil, err
  8443  			}
  8444  		}
  8445  		if statusCode == 100 {
  8446  			http2traceGot100Continue(cs.trace)
  8447  			if cs.on100 != nil {
  8448  				cs.on100() // forces any write delay timer to fire
  8449  			}
  8450  		}
  8451  		cs.pastHeaders = false // do it all again
  8452  		return nil, nil
  8453  	}
  8454  
  8455  	streamEnded := f.StreamEnded()
  8456  	isHead := cs.req.Method == "HEAD"
  8457  	if !streamEnded || isHead {
  8458  		res.ContentLength = -1
  8459  		if clens := res.Header["Content-Length"]; len(clens) == 1 {
  8460  			if clen64, err := strconv.ParseInt(clens[0], 10, 64); err == nil {
  8461  				res.ContentLength = clen64
  8462  			} else {
  8463  				// TODO: care? unlike http/1, it won't mess up our framing, so it's
  8464  				// more safe smuggling-wise to ignore.
  8465  			}
  8466  		} else if len(clens) > 1 {
  8467  			// TODO: care? unlike http/1, it won't mess up our framing, so it's
  8468  			// more safe smuggling-wise to ignore.
  8469  		}
  8470  	}
  8471  
  8472  	if streamEnded || isHead {
  8473  		res.Body = http2noBody
  8474  		return res, nil
  8475  	}
  8476  
  8477  	cs.bufPipe = http2pipe{b: &http2dataBuffer{expected: res.ContentLength}}
  8478  	cs.bytesRemain = res.ContentLength
  8479  	res.Body = http2transportResponseBody{cs}
  8480  	go cs.awaitRequestCancel(cs.req)
  8481  
  8482  	if cs.requestedGzip && res.Header.Get("Content-Encoding") == "gzip" {
  8483  		res.Header.Del("Content-Encoding")
  8484  		res.Header.Del("Content-Length")
  8485  		res.ContentLength = -1
  8486  		res.Body = &http2gzipReader{body: res.Body}
  8487  		res.Uncompressed = true
  8488  	}
  8489  	return res, nil
  8490  }
  8491  
  8492  func (rl *http2clientConnReadLoop) processTrailers(cs *http2clientStream, f *http2MetaHeadersFrame) error {
  8493  	if cs.pastTrailers {
  8494  		// Too many HEADERS frames for this stream.
  8495  		return http2ConnectionError(http2ErrCodeProtocol)
  8496  	}
  8497  	cs.pastTrailers = true
  8498  	if !f.StreamEnded() {
  8499  		// We expect that any headers for trailers also
  8500  		// has END_STREAM.
  8501  		return http2ConnectionError(http2ErrCodeProtocol)
  8502  	}
  8503  	if len(f.PseudoFields()) > 0 {
  8504  		// No pseudo header fields are defined for trailers.
  8505  		// TODO: ConnectionError might be overly harsh? Check.
  8506  		return http2ConnectionError(http2ErrCodeProtocol)
  8507  	}
  8508  
  8509  	trailer := make(Header)
  8510  	for _, hf := range f.RegularFields() {
  8511  		key := CanonicalHeaderKey(hf.Name)
  8512  		trailer[key] = append(trailer[key], hf.Value)
  8513  	}
  8514  	cs.trailer = trailer
  8515  
  8516  	rl.endStream(cs)
  8517  	return nil
  8518  }
  8519  
  8520  // transportResponseBody is the concrete type of Transport.RoundTrip's
  8521  // Response.Body. It is an io.ReadCloser. On Read, it reads from cs.body.
  8522  // On Close it sends RST_STREAM if EOF wasn't already seen.
  8523  type http2transportResponseBody struct {
  8524  	cs *http2clientStream
  8525  }
  8526  
  8527  func (b http2transportResponseBody) Read(p []byte) (n int, err error) {
  8528  	cs := b.cs
  8529  	cc := cs.cc
  8530  
  8531  	if cs.readErr != nil {
  8532  		return 0, cs.readErr
  8533  	}
  8534  	n, err = b.cs.bufPipe.Read(p)
  8535  	if cs.bytesRemain != -1 {
  8536  		if int64(n) > cs.bytesRemain {
  8537  			n = int(cs.bytesRemain)
  8538  			if err == nil {
  8539  				err = errors.New("net/http: server replied with more than declared Content-Length; truncated")
  8540  				cc.writeStreamReset(cs.ID, http2ErrCodeProtocol, err)
  8541  			}
  8542  			cs.readErr = err
  8543  			return int(cs.bytesRemain), err
  8544  		}
  8545  		cs.bytesRemain -= int64(n)
  8546  		if err == io.EOF && cs.bytesRemain > 0 {
  8547  			err = io.ErrUnexpectedEOF
  8548  			cs.readErr = err
  8549  			return n, err
  8550  		}
  8551  	}
  8552  	if n == 0 {
  8553  		// No flow control tokens to send back.
  8554  		return
  8555  	}
  8556  
  8557  	cc.mu.Lock()
  8558  	defer cc.mu.Unlock()
  8559  
  8560  	var connAdd, streamAdd int32
  8561  	// Check the conn-level first, before the stream-level.
  8562  	if v := cc.inflow.available(); v < http2transportDefaultConnFlow/2 {
  8563  		connAdd = http2transportDefaultConnFlow - v
  8564  		cc.inflow.add(connAdd)
  8565  	}
  8566  	if err == nil { // No need to refresh if the stream is over or failed.
  8567  		// Consider any buffered body data (read from the conn but not
  8568  		// consumed by the client) when computing flow control for this
  8569  		// stream.
  8570  		v := int(cs.inflow.available()) + cs.bufPipe.Len()
  8571  		if v < http2transportDefaultStreamFlow-http2transportDefaultStreamMinRefresh {
  8572  			streamAdd = int32(http2transportDefaultStreamFlow - v)
  8573  			cs.inflow.add(streamAdd)
  8574  		}
  8575  	}
  8576  	if connAdd != 0 || streamAdd != 0 {
  8577  		cc.wmu.Lock()
  8578  		defer cc.wmu.Unlock()
  8579  		if connAdd != 0 {
  8580  			cc.fr.WriteWindowUpdate(0, http2mustUint31(connAdd))
  8581  		}
  8582  		if streamAdd != 0 {
  8583  			cc.fr.WriteWindowUpdate(cs.ID, http2mustUint31(streamAdd))
  8584  		}
  8585  		cc.bw.Flush()
  8586  	}
  8587  	return
  8588  }
  8589  
  8590  var http2errClosedResponseBody = errors.New("http2: response body closed")
  8591  
  8592  func (b http2transportResponseBody) Close() error {
  8593  	cs := b.cs
  8594  	cc := cs.cc
  8595  
  8596  	serverSentStreamEnd := cs.bufPipe.Err() == io.EOF
  8597  	unread := cs.bufPipe.Len()
  8598  
  8599  	if unread > 0 || !serverSentStreamEnd {
  8600  		cc.mu.Lock()
  8601  		cc.wmu.Lock()
  8602  		if !serverSentStreamEnd {
  8603  			cc.fr.WriteRSTStream(cs.ID, http2ErrCodeCancel)
  8604  			cs.didReset = true
  8605  		}
  8606  		// Return connection-level flow control.
  8607  		if unread > 0 {
  8608  			cc.inflow.add(int32(unread))
  8609  			cc.fr.WriteWindowUpdate(0, uint32(unread))
  8610  		}
  8611  		cc.bw.Flush()
  8612  		cc.wmu.Unlock()
  8613  		cc.mu.Unlock()
  8614  	}
  8615  
  8616  	cs.bufPipe.BreakWithError(http2errClosedResponseBody)
  8617  	cc.forgetStreamID(cs.ID)
  8618  	return nil
  8619  }
  8620  
  8621  func (rl *http2clientConnReadLoop) processData(f *http2DataFrame) error {
  8622  	cc := rl.cc
  8623  	cs := cc.streamByID(f.StreamID, f.StreamEnded())
  8624  	data := f.Data()
  8625  	if cs == nil {
  8626  		cc.mu.Lock()
  8627  		neverSent := cc.nextStreamID
  8628  		cc.mu.Unlock()
  8629  		if f.StreamID >= neverSent {
  8630  			// We never asked for this.
  8631  			cc.logf("http2: Transport received unsolicited DATA frame; closing connection")
  8632  			return http2ConnectionError(http2ErrCodeProtocol)
  8633  		}
  8634  		// We probably did ask for this, but canceled. Just ignore it.
  8635  		// TODO: be stricter here? only silently ignore things which
  8636  		// we canceled, but not things which were closed normally
  8637  		// by the peer? Tough without accumulating too much state.
  8638  
  8639  		// But at least return their flow control:
  8640  		if f.Length > 0 {
  8641  			cc.mu.Lock()
  8642  			cc.inflow.add(int32(f.Length))
  8643  			cc.mu.Unlock()
  8644  
  8645  			cc.wmu.Lock()
  8646  			cc.fr.WriteWindowUpdate(0, uint32(f.Length))
  8647  			cc.bw.Flush()
  8648  			cc.wmu.Unlock()
  8649  		}
  8650  		return nil
  8651  	}
  8652  	if !cs.firstByte {
  8653  		cc.logf("protocol error: received DATA before a HEADERS frame")
  8654  		rl.endStreamError(cs, http2StreamError{
  8655  			StreamID: f.StreamID,
  8656  			Code:     http2ErrCodeProtocol,
  8657  		})
  8658  		return nil
  8659  	}
  8660  	if f.Length > 0 {
  8661  		if cs.req.Method == "HEAD" && len(data) > 0 {
  8662  			cc.logf("protocol error: received DATA on a HEAD request")
  8663  			rl.endStreamError(cs, http2StreamError{
  8664  				StreamID: f.StreamID,
  8665  				Code:     http2ErrCodeProtocol,
  8666  			})
  8667  			return nil
  8668  		}
  8669  		// Check connection-level flow control.
  8670  		cc.mu.Lock()
  8671  		if cs.inflow.available() >= int32(f.Length) {
  8672  			cs.inflow.take(int32(f.Length))
  8673  		} else {
  8674  			cc.mu.Unlock()
  8675  			return http2ConnectionError(http2ErrCodeFlowControl)
  8676  		}
  8677  		// Return any padded flow control now, since we won't
  8678  		// refund it later on body reads.
  8679  		var refund int
  8680  		if pad := int(f.Length) - len(data); pad > 0 {
  8681  			refund += pad
  8682  		}
  8683  		// Return len(data) now if the stream is already closed,
  8684  		// since data will never be read.
  8685  		didReset := cs.didReset
  8686  		if didReset {
  8687  			refund += len(data)
  8688  		}
  8689  		if refund > 0 {
  8690  			cc.inflow.add(int32(refund))
  8691  			cc.wmu.Lock()
  8692  			cc.fr.WriteWindowUpdate(0, uint32(refund))
  8693  			if !didReset {
  8694  				cs.inflow.add(int32(refund))
  8695  				cc.fr.WriteWindowUpdate(cs.ID, uint32(refund))
  8696  			}
  8697  			cc.bw.Flush()
  8698  			cc.wmu.Unlock()
  8699  		}
  8700  		cc.mu.Unlock()
  8701  
  8702  		if len(data) > 0 && !didReset {
  8703  			if _, err := cs.bufPipe.Write(data); err != nil {
  8704  				rl.endStreamError(cs, err)
  8705  				return err
  8706  			}
  8707  		}
  8708  	}
  8709  
  8710  	if f.StreamEnded() {
  8711  		rl.endStream(cs)
  8712  	}
  8713  	return nil
  8714  }
  8715  
  8716  var http2errInvalidTrailers = errors.New("http2: invalid trailers")
  8717  
  8718  func (rl *http2clientConnReadLoop) endStream(cs *http2clientStream) {
  8719  	// TODO: check that any declared content-length matches, like
  8720  	// server.go's (*stream).endStream method.
  8721  	rl.endStreamError(cs, nil)
  8722  }
  8723  
  8724  func (rl *http2clientConnReadLoop) endStreamError(cs *http2clientStream, err error) {
  8725  	var code func()
  8726  	if err == nil {
  8727  		err = io.EOF
  8728  		code = cs.copyTrailers
  8729  	}
  8730  	if http2isConnectionCloseRequest(cs.req) {
  8731  		rl.closeWhenIdle = true
  8732  	}
  8733  	cs.bufPipe.closeWithErrorAndCode(err, code)
  8734  
  8735  	select {
  8736  	case cs.resc <- http2resAndError{err: err}:
  8737  	default:
  8738  	}
  8739  }
  8740  
  8741  func (cs *http2clientStream) copyTrailers() {
  8742  	for k, vv := range cs.trailer {
  8743  		t := cs.resTrailer
  8744  		if *t == nil {
  8745  			*t = make(Header)
  8746  		}
  8747  		(*t)[k] = vv
  8748  	}
  8749  }
  8750  
  8751  func (rl *http2clientConnReadLoop) processGoAway(f *http2GoAwayFrame) error {
  8752  	cc := rl.cc
  8753  	cc.t.connPool().MarkDead(cc)
  8754  	if f.ErrCode != 0 {
  8755  		// TODO: deal with GOAWAY more. particularly the error code
  8756  		cc.vlogf("transport got GOAWAY with error code = %v", f.ErrCode)
  8757  	}
  8758  	cc.setGoAway(f)
  8759  	return nil
  8760  }
  8761  
  8762  func (rl *http2clientConnReadLoop) processSettings(f *http2SettingsFrame) error {
  8763  	cc := rl.cc
  8764  	cc.mu.Lock()
  8765  	defer cc.mu.Unlock()
  8766  
  8767  	if f.IsAck() {
  8768  		if cc.wantSettingsAck {
  8769  			cc.wantSettingsAck = false
  8770  			return nil
  8771  		}
  8772  		return http2ConnectionError(http2ErrCodeProtocol)
  8773  	}
  8774  
  8775  	err := f.ForeachSetting(func(s http2Setting) error {
  8776  		switch s.ID {
  8777  		case http2SettingMaxFrameSize:
  8778  			cc.maxFrameSize = s.Val
  8779  		case http2SettingMaxConcurrentStreams:
  8780  			cc.maxConcurrentStreams = s.Val
  8781  		case http2SettingMaxHeaderListSize:
  8782  			cc.peerMaxHeaderListSize = uint64(s.Val)
  8783  		case http2SettingInitialWindowSize:
  8784  			// Values above the maximum flow-control
  8785  			// window size of 2^31-1 MUST be treated as a
  8786  			// connection error (Section 5.4.1) of type
  8787  			// FLOW_CONTROL_ERROR.
  8788  			if s.Val > math.MaxInt32 {
  8789  				return http2ConnectionError(http2ErrCodeFlowControl)
  8790  			}
  8791  
  8792  			// Adjust flow control of currently-open
  8793  			// frames by the difference of the old initial
  8794  			// window size and this one.
  8795  			delta := int32(s.Val) - int32(cc.initialWindowSize)
  8796  			for _, cs := range cc.streams {
  8797  				cs.flow.add(delta)
  8798  			}
  8799  			cc.cond.Broadcast()
  8800  
  8801  			cc.initialWindowSize = s.Val
  8802  		default:
  8803  			// TODO(bradfitz): handle more settings? SETTINGS_HEADER_TABLE_SIZE probably.
  8804  			cc.vlogf("Unhandled Setting: %v", s)
  8805  		}
  8806  		return nil
  8807  	})
  8808  	if err != nil {
  8809  		return err
  8810  	}
  8811  
  8812  	cc.wmu.Lock()
  8813  	defer cc.wmu.Unlock()
  8814  
  8815  	cc.fr.WriteSettingsAck()
  8816  	cc.bw.Flush()
  8817  	return cc.werr
  8818  }
  8819  
  8820  func (rl *http2clientConnReadLoop) processWindowUpdate(f *http2WindowUpdateFrame) error {
  8821  	cc := rl.cc
  8822  	cs := cc.streamByID(f.StreamID, false)
  8823  	if f.StreamID != 0 && cs == nil {
  8824  		return nil
  8825  	}
  8826  
  8827  	cc.mu.Lock()
  8828  	defer cc.mu.Unlock()
  8829  
  8830  	fl := &cc.flow
  8831  	if cs != nil {
  8832  		fl = &cs.flow
  8833  	}
  8834  	if !fl.add(int32(f.Increment)) {
  8835  		return http2ConnectionError(http2ErrCodeFlowControl)
  8836  	}
  8837  	cc.cond.Broadcast()
  8838  	return nil
  8839  }
  8840  
  8841  func (rl *http2clientConnReadLoop) processResetStream(f *http2RSTStreamFrame) error {
  8842  	cs := rl.cc.streamByID(f.StreamID, true)
  8843  	if cs == nil {
  8844  		// TODO: return error if server tries to RST_STEAM an idle stream
  8845  		return nil
  8846  	}
  8847  	select {
  8848  	case <-cs.peerReset:
  8849  		// Already reset.
  8850  		// This is the only goroutine
  8851  		// which closes this, so there
  8852  		// isn't a race.
  8853  	default:
  8854  		err := http2streamError(cs.ID, f.ErrCode)
  8855  		cs.resetErr = err
  8856  		close(cs.peerReset)
  8857  		cs.bufPipe.CloseWithError(err)
  8858  		cs.cc.cond.Broadcast() // wake up checkResetOrDone via clientStream.awaitFlowControl
  8859  	}
  8860  	return nil
  8861  }
  8862  
  8863  // Ping sends a PING frame to the server and waits for the ack.
  8864  func (cc *http2ClientConn) Ping(ctx context.Context) error {
  8865  	c := make(chan struct{})
  8866  	// Generate a random payload
  8867  	var p [8]byte
  8868  	for {
  8869  		if _, err := rand.Read(p[:]); err != nil {
  8870  			return err
  8871  		}
  8872  		cc.mu.Lock()
  8873  		// check for dup before insert
  8874  		if _, found := cc.pings[p]; !found {
  8875  			cc.pings[p] = c
  8876  			cc.mu.Unlock()
  8877  			break
  8878  		}
  8879  		cc.mu.Unlock()
  8880  	}
  8881  	cc.wmu.Lock()
  8882  	if err := cc.fr.WritePing(false, p); err != nil {
  8883  		cc.wmu.Unlock()
  8884  		return err
  8885  	}
  8886  	if err := cc.bw.Flush(); err != nil {
  8887  		cc.wmu.Unlock()
  8888  		return err
  8889  	}
  8890  	cc.wmu.Unlock()
  8891  	select {
  8892  	case <-c:
  8893  		return nil
  8894  	case <-ctx.Done():
  8895  		return ctx.Err()
  8896  	case <-cc.readerDone:
  8897  		// connection closed
  8898  		return cc.readerErr
  8899  	}
  8900  }
  8901  
  8902  func (rl *http2clientConnReadLoop) processPing(f *http2PingFrame) error {
  8903  	if f.IsAck() {
  8904  		cc := rl.cc
  8905  		cc.mu.Lock()
  8906  		defer cc.mu.Unlock()
  8907  		// If ack, notify listener if any
  8908  		if c, ok := cc.pings[f.Data]; ok {
  8909  			close(c)
  8910  			delete(cc.pings, f.Data)
  8911  		}
  8912  		return nil
  8913  	}
  8914  	cc := rl.cc
  8915  	cc.wmu.Lock()
  8916  	defer cc.wmu.Unlock()
  8917  	if err := cc.fr.WritePing(true, f.Data); err != nil {
  8918  		return err
  8919  	}
  8920  	return cc.bw.Flush()
  8921  }
  8922  
  8923  func (rl *http2clientConnReadLoop) processPushPromise(f *http2PushPromiseFrame) error {
  8924  	// We told the peer we don't want them.
  8925  	// Spec says:
  8926  	// "PUSH_PROMISE MUST NOT be sent if the SETTINGS_ENABLE_PUSH
  8927  	// setting of the peer endpoint is set to 0. An endpoint that
  8928  	// has set this setting and has received acknowledgement MUST
  8929  	// treat the receipt of a PUSH_PROMISE frame as a connection
  8930  	// error (Section 5.4.1) of type PROTOCOL_ERROR."
  8931  	return http2ConnectionError(http2ErrCodeProtocol)
  8932  }
  8933  
  8934  func (cc *http2ClientConn) writeStreamReset(streamID uint32, code http2ErrCode, err error) {
  8935  	// TODO: map err to more interesting error codes, once the
  8936  	// HTTP community comes up with some. But currently for
  8937  	// RST_STREAM there's no equivalent to GOAWAY frame's debug
  8938  	// data, and the error codes are all pretty vague ("cancel").
  8939  	cc.wmu.Lock()
  8940  	cc.fr.WriteRSTStream(streamID, code)
  8941  	cc.bw.Flush()
  8942  	cc.wmu.Unlock()
  8943  }
  8944  
  8945  var (
  8946  	http2errResponseHeaderListSize = errors.New("http2: response header list larger than advertised limit")
  8947  	http2errRequestHeaderListSize  = errors.New("http2: request header list larger than peer's advertised limit")
  8948  	http2errPseudoTrailers         = errors.New("http2: invalid pseudo header in trailers")
  8949  )
  8950  
  8951  func (cc *http2ClientConn) logf(format string, args ...interface{}) {
  8952  	cc.t.logf(format, args...)
  8953  }
  8954  
  8955  func (cc *http2ClientConn) vlogf(format string, args ...interface{}) {
  8956  	cc.t.vlogf(format, args...)
  8957  }
  8958  
  8959  func (t *http2Transport) vlogf(format string, args ...interface{}) {
  8960  	if http2VerboseLogs {
  8961  		t.logf(format, args...)
  8962  	}
  8963  }
  8964  
  8965  func (t *http2Transport) logf(format string, args ...interface{}) {
  8966  	log.Printf(format, args...)
  8967  }
  8968  
  8969  var http2noBody io.ReadCloser = ioutil.NopCloser(bytes.NewReader(nil))
  8970  
  8971  func http2strSliceContains(ss []string, s string) bool {
  8972  	for _, v := range ss {
  8973  		if v == s {
  8974  			return true
  8975  		}
  8976  	}
  8977  	return false
  8978  }
  8979  
  8980  type http2erringRoundTripper struct{ err error }
  8981  
  8982  func (rt http2erringRoundTripper) RoundTrip(*Request) (*Response, error) { return nil, rt.err }
  8983  
  8984  // gzipReader wraps a response body so it can lazily
  8985  // call gzip.NewReader on the first call to Read
  8986  type http2gzipReader struct {
  8987  	body io.ReadCloser // underlying Response.Body
  8988  	zr   *gzip.Reader  // lazily-initialized gzip reader
  8989  	zerr error         // sticky error
  8990  }
  8991  
  8992  func (gz *http2gzipReader) Read(p []byte) (n int, err error) {
  8993  	if gz.zerr != nil {
  8994  		return 0, gz.zerr
  8995  	}
  8996  	if gz.zr == nil {
  8997  		gz.zr, err = gzip.NewReader(gz.body)
  8998  		if err != nil {
  8999  			gz.zerr = err
  9000  			return 0, err
  9001  		}
  9002  	}
  9003  	return gz.zr.Read(p)
  9004  }
  9005  
  9006  func (gz *http2gzipReader) Close() error {
  9007  	return gz.body.Close()
  9008  }
  9009  
  9010  type http2errorReader struct{ err error }
  9011  
  9012  func (r http2errorReader) Read(p []byte) (int, error) { return 0, r.err }
  9013  
  9014  // bodyWriterState encapsulates various state around the Transport's writing
  9015  // of the request body, particularly regarding doing delayed writes of the body
  9016  // when the request contains "Expect: 100-continue".
  9017  type http2bodyWriterState struct {
  9018  	cs     *http2clientStream
  9019  	timer  *time.Timer   // if non-nil, we're doing a delayed write
  9020  	fnonce *sync.Once    // to call fn with
  9021  	fn     func()        // the code to run in the goroutine, writing the body
  9022  	resc   chan error    // result of fn's execution
  9023  	delay  time.Duration // how long we should delay a delayed write for
  9024  }
  9025  
  9026  func (t *http2Transport) getBodyWriterState(cs *http2clientStream, body io.Reader) (s http2bodyWriterState) {
  9027  	s.cs = cs
  9028  	if body == nil {
  9029  		return
  9030  	}
  9031  	resc := make(chan error, 1)
  9032  	s.resc = resc
  9033  	s.fn = func() {
  9034  		cs.cc.mu.Lock()
  9035  		cs.startedWrite = true
  9036  		cs.cc.mu.Unlock()
  9037  		resc <- cs.writeRequestBody(body, cs.req.Body)
  9038  	}
  9039  	s.delay = t.expectContinueTimeout()
  9040  	if s.delay == 0 ||
  9041  		!httpguts.HeaderValuesContainsToken(
  9042  			cs.req.Header["Expect"],
  9043  			"100-continue") {
  9044  		return
  9045  	}
  9046  	s.fnonce = new(sync.Once)
  9047  
  9048  	// Arm the timer with a very large duration, which we'll
  9049  	// intentionally lower later. It has to be large now because
  9050  	// we need a handle to it before writing the headers, but the
  9051  	// s.delay value is defined to not start until after the
  9052  	// request headers were written.
  9053  	const hugeDuration = 365 * 24 * time.Hour
  9054  	s.timer = time.AfterFunc(hugeDuration, func() {
  9055  		s.fnonce.Do(s.fn)
  9056  	})
  9057  	return
  9058  }
  9059  
  9060  func (s http2bodyWriterState) cancel() {
  9061  	if s.timer != nil {
  9062  		s.timer.Stop()
  9063  	}
  9064  }
  9065  
  9066  func (s http2bodyWriterState) on100() {
  9067  	if s.timer == nil {
  9068  		// If we didn't do a delayed write, ignore the server's
  9069  		// bogus 100 continue response.
  9070  		return
  9071  	}
  9072  	s.timer.Stop()
  9073  	go func() { s.fnonce.Do(s.fn) }()
  9074  }
  9075  
  9076  // scheduleBodyWrite starts writing the body, either immediately (in
  9077  // the common case) or after the delay timeout. It should not be
  9078  // called until after the headers have been written.
  9079  func (s http2bodyWriterState) scheduleBodyWrite() {
  9080  	if s.timer == nil {
  9081  		// We're not doing a delayed write (see
  9082  		// getBodyWriterState), so just start the writing
  9083  		// goroutine immediately.
  9084  		go s.fn()
  9085  		return
  9086  	}
  9087  	http2traceWait100Continue(s.cs.trace)
  9088  	if s.timer.Stop() {
  9089  		s.timer.Reset(s.delay)
  9090  	}
  9091  }
  9092  
  9093  // isConnectionCloseRequest reports whether req should use its own
  9094  // connection for a single request and then close the connection.
  9095  func http2isConnectionCloseRequest(req *Request) bool {
  9096  	return req.Close || httpguts.HeaderValuesContainsToken(req.Header["Connection"], "close")
  9097  }
  9098  
  9099  // registerHTTPSProtocol calls Transport.RegisterProtocol but
  9100  // converting panics into errors.
  9101  func http2registerHTTPSProtocol(t *Transport, rt http2noDialH2RoundTripper) (err error) {
  9102  	defer func() {
  9103  		if e := recover(); e != nil {
  9104  			err = fmt.Errorf("%v", e)
  9105  		}
  9106  	}()
  9107  	t.RegisterProtocol("https", rt)
  9108  	return nil
  9109  }
  9110  
  9111  // noDialH2RoundTripper is a RoundTripper which only tries to complete the request
  9112  // if there's already has a cached connection to the host.
  9113  // (The field is exported so it can be accessed via reflect from net/http; tested
  9114  // by TestNoDialH2RoundTripperType)
  9115  type http2noDialH2RoundTripper struct{ *http2Transport }
  9116  
  9117  func (rt http2noDialH2RoundTripper) RoundTrip(req *Request) (*Response, error) {
  9118  	res, err := rt.http2Transport.RoundTrip(req)
  9119  	if http2isNoCachedConnError(err) {
  9120  		return nil, ErrSkipAltProtocol
  9121  	}
  9122  	return res, err
  9123  }
  9124  
  9125  func (t *http2Transport) idleConnTimeout() time.Duration {
  9126  	if t.t1 != nil {
  9127  		return t.t1.IdleConnTimeout
  9128  	}
  9129  	return 0
  9130  }
  9131  
  9132  func http2traceGetConn(req *Request, hostPort string) {
  9133  	trace := httptrace.ContextClientTrace(req.Context())
  9134  	if trace == nil || trace.GetConn == nil {
  9135  		return
  9136  	}
  9137  	trace.GetConn(hostPort)
  9138  }
  9139  
  9140  func http2traceGotConn(req *Request, cc *http2ClientConn, reused bool) {
  9141  	trace := httptrace.ContextClientTrace(req.Context())
  9142  	if trace == nil || trace.GotConn == nil {
  9143  		return
  9144  	}
  9145  	ci := httptrace.GotConnInfo{Conn: cc.tconn}
  9146  	ci.Reused = reused
  9147  	cc.mu.Lock()
  9148  	ci.WasIdle = len(cc.streams) == 0 && reused
  9149  	if ci.WasIdle && !cc.lastActive.IsZero() {
  9150  		ci.IdleTime = time.Now().Sub(cc.lastActive)
  9151  	}
  9152  	cc.mu.Unlock()
  9153  
  9154  	trace.GotConn(ci)
  9155  }
  9156  
  9157  func http2traceWroteHeaders(trace *httptrace.ClientTrace) {
  9158  	if trace != nil && trace.WroteHeaders != nil {
  9159  		trace.WroteHeaders()
  9160  	}
  9161  }
  9162  
  9163  func http2traceGot100Continue(trace *httptrace.ClientTrace) {
  9164  	if trace != nil && trace.Got100Continue != nil {
  9165  		trace.Got100Continue()
  9166  	}
  9167  }
  9168  
  9169  func http2traceWait100Continue(trace *httptrace.ClientTrace) {
  9170  	if trace != nil && trace.Wait100Continue != nil {
  9171  		trace.Wait100Continue()
  9172  	}
  9173  }
  9174  
  9175  func http2traceWroteRequest(trace *httptrace.ClientTrace, err error) {
  9176  	if trace != nil && trace.WroteRequest != nil {
  9177  		trace.WroteRequest(httptrace.WroteRequestInfo{Err: err})
  9178  	}
  9179  }
  9180  
  9181  func http2traceFirstResponseByte(trace *httptrace.ClientTrace) {
  9182  	if trace != nil && trace.GotFirstResponseByte != nil {
  9183  		trace.GotFirstResponseByte()
  9184  	}
  9185  }
  9186  
  9187  // writeFramer is implemented by any type that is used to write frames.
  9188  type http2writeFramer interface {
  9189  	writeFrame(http2writeContext) error
  9190  
  9191  	// staysWithinBuffer reports whether this writer promises that
  9192  	// it will only write less than or equal to size bytes, and it
  9193  	// won't Flush the write context.
  9194  	staysWithinBuffer(size int) bool
  9195  }
  9196  
  9197  // writeContext is the interface needed by the various frame writer
  9198  // types below. All the writeFrame methods below are scheduled via the
  9199  // frame writing scheduler (see writeScheduler in writesched.go).
  9200  //
  9201  // This interface is implemented by *serverConn.
  9202  //
  9203  // TODO: decide whether to a) use this in the client code (which didn't
  9204  // end up using this yet, because it has a simpler design, not
  9205  // currently implementing priorities), or b) delete this and
  9206  // make the server code a bit more concrete.
  9207  type http2writeContext interface {
  9208  	Framer() *http2Framer
  9209  	Flush() error
  9210  	CloseConn() error
  9211  	// HeaderEncoder returns an HPACK encoder that writes to the
  9212  	// returned buffer.
  9213  	HeaderEncoder() (*hpack.Encoder, *bytes.Buffer)
  9214  }
  9215  
  9216  // writeEndsStream reports whether w writes a frame that will transition
  9217  // the stream to a half-closed local state. This returns false for RST_STREAM,
  9218  // which closes the entire stream (not just the local half).
  9219  func http2writeEndsStream(w http2writeFramer) bool {
  9220  	switch v := w.(type) {
  9221  	case *http2writeData:
  9222  		return v.endStream
  9223  	case *http2writeResHeaders:
  9224  		return v.endStream
  9225  	case nil:
  9226  		// This can only happen if the caller reuses w after it's
  9227  		// been intentionally nil'ed out to prevent use. Keep this
  9228  		// here to catch future refactoring breaking it.
  9229  		panic("writeEndsStream called on nil writeFramer")
  9230  	}
  9231  	return false
  9232  }
  9233  
  9234  type http2flushFrameWriter struct{}
  9235  
  9236  func (http2flushFrameWriter) writeFrame(ctx http2writeContext) error {
  9237  	return ctx.Flush()
  9238  }
  9239  
  9240  func (http2flushFrameWriter) staysWithinBuffer(max int) bool { return false }
  9241  
  9242  type http2writeSettings []http2Setting
  9243  
  9244  func (s http2writeSettings) staysWithinBuffer(max int) bool {
  9245  	const settingSize = 6 // uint16 + uint32
  9246  	return http2frameHeaderLen+settingSize*len(s) <= max
  9247  
  9248  }
  9249  
  9250  func (s http2writeSettings) writeFrame(ctx http2writeContext) error {
  9251  	return ctx.Framer().WriteSettings([]http2Setting(s)...)
  9252  }
  9253  
  9254  type http2writeGoAway struct {
  9255  	maxStreamID uint32
  9256  	code        http2ErrCode
  9257  }
  9258  
  9259  func (p *http2writeGoAway) writeFrame(ctx http2writeContext) error {
  9260  	err := ctx.Framer().WriteGoAway(p.maxStreamID, p.code, nil)
  9261  	ctx.Flush() // ignore error: we're hanging up on them anyway
  9262  	return err
  9263  }
  9264  
  9265  func (*http2writeGoAway) staysWithinBuffer(max int) bool { return false } // flushes
  9266  
  9267  type http2writeData struct {
  9268  	streamID  uint32
  9269  	p         []byte
  9270  	endStream bool
  9271  }
  9272  
  9273  func (w *http2writeData) String() string {
  9274  	return fmt.Sprintf("writeData(stream=%d, p=%d, endStream=%v)", w.streamID, len(w.p), w.endStream)
  9275  }
  9276  
  9277  func (w *http2writeData) writeFrame(ctx http2writeContext) error {
  9278  	return ctx.Framer().WriteData(w.streamID, w.endStream, w.p)
  9279  }
  9280  
  9281  func (w *http2writeData) staysWithinBuffer(max int) bool {
  9282  	return http2frameHeaderLen+len(w.p) <= max
  9283  }
  9284  
  9285  // handlerPanicRST is the message sent from handler goroutines when
  9286  // the handler panics.
  9287  type http2handlerPanicRST struct {
  9288  	StreamID uint32
  9289  }
  9290  
  9291  func (hp http2handlerPanicRST) writeFrame(ctx http2writeContext) error {
  9292  	return ctx.Framer().WriteRSTStream(hp.StreamID, http2ErrCodeInternal)
  9293  }
  9294  
  9295  func (hp http2handlerPanicRST) staysWithinBuffer(max int) bool { return http2frameHeaderLen+4 <= max }
  9296  
  9297  func (se http2StreamError) writeFrame(ctx http2writeContext) error {
  9298  	return ctx.Framer().WriteRSTStream(se.StreamID, se.Code)
  9299  }
  9300  
  9301  func (se http2StreamError) staysWithinBuffer(max int) bool { return http2frameHeaderLen+4 <= max }
  9302  
  9303  type http2writePingAck struct{ pf *http2PingFrame }
  9304  
  9305  func (w http2writePingAck) writeFrame(ctx http2writeContext) error {
  9306  	return ctx.Framer().WritePing(true, w.pf.Data)
  9307  }
  9308  
  9309  func (w http2writePingAck) staysWithinBuffer(max int) bool {
  9310  	return http2frameHeaderLen+len(w.pf.Data) <= max
  9311  }
  9312  
  9313  type http2writeSettingsAck struct{}
  9314  
  9315  func (http2writeSettingsAck) writeFrame(ctx http2writeContext) error {
  9316  	return ctx.Framer().WriteSettingsAck()
  9317  }
  9318  
  9319  func (http2writeSettingsAck) staysWithinBuffer(max int) bool { return http2frameHeaderLen <= max }
  9320  
  9321  // splitHeaderBlock splits headerBlock into fragments so that each fragment fits
  9322  // in a single frame, then calls fn for each fragment. firstFrag/lastFrag are true
  9323  // for the first/last fragment, respectively.
  9324  func http2splitHeaderBlock(ctx http2writeContext, headerBlock []byte, fn func(ctx http2writeContext, frag []byte, firstFrag, lastFrag bool) error) error {
  9325  	// For now we're lazy and just pick the minimum MAX_FRAME_SIZE
  9326  	// that all peers must support (16KB). Later we could care
  9327  	// more and send larger frames if the peer advertised it, but
  9328  	// there's little point. Most headers are small anyway (so we
  9329  	// generally won't have CONTINUATION frames), and extra frames
  9330  	// only waste 9 bytes anyway.
  9331  	const maxFrameSize = 16384
  9332  
  9333  	first := true
  9334  	for len(headerBlock) > 0 {
  9335  		frag := headerBlock
  9336  		if len(frag) > maxFrameSize {
  9337  			frag = frag[:maxFrameSize]
  9338  		}
  9339  		headerBlock = headerBlock[len(frag):]
  9340  		if err := fn(ctx, frag, first, len(headerBlock) == 0); err != nil {
  9341  			return err
  9342  		}
  9343  		first = false
  9344  	}
  9345  	return nil
  9346  }
  9347  
  9348  // writeResHeaders is a request to write a HEADERS and 0+ CONTINUATION frames
  9349  // for HTTP response headers or trailers from a server handler.
  9350  type http2writeResHeaders struct {
  9351  	streamID    uint32
  9352  	httpResCode int      // 0 means no ":status" line
  9353  	h           Header   // may be nil
  9354  	trailers    []string // if non-nil, which keys of h to write. nil means all.
  9355  	endStream   bool
  9356  
  9357  	date          string
  9358  	contentType   string
  9359  	contentLength string
  9360  }
  9361  
  9362  func http2encKV(enc *hpack.Encoder, k, v string) {
  9363  	if http2VerboseLogs {
  9364  		log.Printf("http2: server encoding header %q = %q", k, v)
  9365  	}
  9366  	enc.WriteField(hpack.HeaderField{Name: k, Value: v})
  9367  }
  9368  
  9369  func (w *http2writeResHeaders) staysWithinBuffer(max int) bool {
  9370  	// TODO: this is a common one. It'd be nice to return true
  9371  	// here and get into the fast path if we could be clever and
  9372  	// calculate the size fast enough, or at least a conservative
  9373  	// upper bound that usually fires. (Maybe if w.h and
  9374  	// w.trailers are nil, so we don't need to enumerate it.)
  9375  	// Otherwise I'm afraid that just calculating the length to
  9376  	// answer this question would be slower than the ~2µs benefit.
  9377  	return false
  9378  }
  9379  
  9380  func (w *http2writeResHeaders) writeFrame(ctx http2writeContext) error {
  9381  	enc, buf := ctx.HeaderEncoder()
  9382  	buf.Reset()
  9383  
  9384  	if w.httpResCode != 0 {
  9385  		http2encKV(enc, ":status", http2httpCodeString(w.httpResCode))
  9386  	}
  9387  
  9388  	http2encodeHeaders(enc, w.h, w.trailers)
  9389  
  9390  	if w.contentType != "" {
  9391  		http2encKV(enc, "content-type", w.contentType)
  9392  	}
  9393  	if w.contentLength != "" {
  9394  		http2encKV(enc, "content-length", w.contentLength)
  9395  	}
  9396  	if w.date != "" {
  9397  		http2encKV(enc, "date", w.date)
  9398  	}
  9399  
  9400  	headerBlock := buf.Bytes()
  9401  	if len(headerBlock) == 0 && w.trailers == nil {
  9402  		panic("unexpected empty hpack")
  9403  	}
  9404  
  9405  	return http2splitHeaderBlock(ctx, headerBlock, w.writeHeaderBlock)
  9406  }
  9407  
  9408  func (w *http2writeResHeaders) writeHeaderBlock(ctx http2writeContext, frag []byte, firstFrag, lastFrag bool) error {
  9409  	if firstFrag {
  9410  		return ctx.Framer().WriteHeaders(http2HeadersFrameParam{
  9411  			StreamID:      w.streamID,
  9412  			BlockFragment: frag,
  9413  			EndStream:     w.endStream,
  9414  			EndHeaders:    lastFrag,
  9415  		})
  9416  	} else {
  9417  		return ctx.Framer().WriteContinuation(w.streamID, lastFrag, frag)
  9418  	}
  9419  }
  9420  
  9421  // writePushPromise is a request to write a PUSH_PROMISE and 0+ CONTINUATION frames.
  9422  type http2writePushPromise struct {
  9423  	streamID uint32   // pusher stream
  9424  	method   string   // for :method
  9425  	url      *url.URL // for :scheme, :authority, :path
  9426  	h        Header
  9427  
  9428  	// Creates an ID for a pushed stream. This runs on serveG just before
  9429  	// the frame is written. The returned ID is copied to promisedID.
  9430  	allocatePromisedID func() (uint32, error)
  9431  	promisedID         uint32
  9432  }
  9433  
  9434  func (w *http2writePushPromise) staysWithinBuffer(max int) bool {
  9435  	// TODO: see writeResHeaders.staysWithinBuffer
  9436  	return false
  9437  }
  9438  
  9439  func (w *http2writePushPromise) writeFrame(ctx http2writeContext) error {
  9440  	enc, buf := ctx.HeaderEncoder()
  9441  	buf.Reset()
  9442  
  9443  	http2encKV(enc, ":method", w.method)
  9444  	http2encKV(enc, ":scheme", w.url.Scheme)
  9445  	http2encKV(enc, ":authority", w.url.Host)
  9446  	http2encKV(enc, ":path", w.url.RequestURI())
  9447  	http2encodeHeaders(enc, w.h, nil)
  9448  
  9449  	headerBlock := buf.Bytes()
  9450  	if len(headerBlock) == 0 {
  9451  		panic("unexpected empty hpack")
  9452  	}
  9453  
  9454  	return http2splitHeaderBlock(ctx, headerBlock, w.writeHeaderBlock)
  9455  }
  9456  
  9457  func (w *http2writePushPromise) writeHeaderBlock(ctx http2writeContext, frag []byte, firstFrag, lastFrag bool) error {
  9458  	if firstFrag {
  9459  		return ctx.Framer().WritePushPromise(http2PushPromiseParam{
  9460  			StreamID:      w.streamID,
  9461  			PromiseID:     w.promisedID,
  9462  			BlockFragment: frag,
  9463  			EndHeaders:    lastFrag,
  9464  		})
  9465  	} else {
  9466  		return ctx.Framer().WriteContinuation(w.streamID, lastFrag, frag)
  9467  	}
  9468  }
  9469  
  9470  type http2write100ContinueHeadersFrame struct {
  9471  	streamID uint32
  9472  }
  9473  
  9474  func (w http2write100ContinueHeadersFrame) writeFrame(ctx http2writeContext) error {
  9475  	enc, buf := ctx.HeaderEncoder()
  9476  	buf.Reset()
  9477  	http2encKV(enc, ":status", "100")
  9478  	return ctx.Framer().WriteHeaders(http2HeadersFrameParam{
  9479  		StreamID:      w.streamID,
  9480  		BlockFragment: buf.Bytes(),
  9481  		EndStream:     false,
  9482  		EndHeaders:    true,
  9483  	})
  9484  }
  9485  
  9486  func (w http2write100ContinueHeadersFrame) staysWithinBuffer(max int) bool {
  9487  	// Sloppy but conservative:
  9488  	return 9+2*(len(":status")+len("100")) <= max
  9489  }
  9490  
  9491  type http2writeWindowUpdate struct {
  9492  	streamID uint32 // or 0 for conn-level
  9493  	n        uint32
  9494  }
  9495  
  9496  func (wu http2writeWindowUpdate) staysWithinBuffer(max int) bool { return http2frameHeaderLen+4 <= max }
  9497  
  9498  func (wu http2writeWindowUpdate) writeFrame(ctx http2writeContext) error {
  9499  	return ctx.Framer().WriteWindowUpdate(wu.streamID, wu.n)
  9500  }
  9501  
  9502  // encodeHeaders encodes an http.Header. If keys is not nil, then (k, h[k])
  9503  // is encoded only if k is in keys.
  9504  func http2encodeHeaders(enc *hpack.Encoder, h Header, keys []string) {
  9505  	if keys == nil {
  9506  		sorter := http2sorterPool.Get().(*http2sorter)
  9507  		// Using defer here, since the returned keys from the
  9508  		// sorter.Keys method is only valid until the sorter
  9509  		// is returned:
  9510  		defer http2sorterPool.Put(sorter)
  9511  		keys = sorter.Keys(h)
  9512  	}
  9513  	for _, k := range keys {
  9514  		vv := h[k]
  9515  		k = http2lowerHeader(k)
  9516  		if !http2validWireHeaderFieldName(k) {
  9517  			// Skip it as backup paranoia. Per
  9518  			// golang.org/issue/14048, these should
  9519  			// already be rejected at a higher level.
  9520  			continue
  9521  		}
  9522  		isTE := k == "transfer-encoding"
  9523  		for _, v := range vv {
  9524  			if !httpguts.ValidHeaderFieldValue(v) {
  9525  				// TODO: return an error? golang.org/issue/14048
  9526  				// For now just omit it.
  9527  				continue
  9528  			}
  9529  			// TODO: more of "8.1.2.2 Connection-Specific Header Fields"
  9530  			if isTE && v != "trailers" {
  9531  				continue
  9532  			}
  9533  			http2encKV(enc, k, v)
  9534  		}
  9535  	}
  9536  }
  9537  
  9538  // WriteScheduler is the interface implemented by HTTP/2 write schedulers.
  9539  // Methods are never called concurrently.
  9540  type http2WriteScheduler interface {
  9541  	// OpenStream opens a new stream in the write scheduler.
  9542  	// It is illegal to call this with streamID=0 or with a streamID that is
  9543  	// already open -- the call may panic.
  9544  	OpenStream(streamID uint32, options http2OpenStreamOptions)
  9545  
  9546  	// CloseStream closes a stream in the write scheduler. Any frames queued on
  9547  	// this stream should be discarded. It is illegal to call this on a stream
  9548  	// that is not open -- the call may panic.
  9549  	CloseStream(streamID uint32)
  9550  
  9551  	// AdjustStream adjusts the priority of the given stream. This may be called
  9552  	// on a stream that has not yet been opened or has been closed. Note that
  9553  	// RFC 7540 allows PRIORITY frames to be sent on streams in any state. See:
  9554  	// https://tools.ietf.org/html/rfc7540#section-5.1
  9555  	AdjustStream(streamID uint32, priority http2PriorityParam)
  9556  
  9557  	// Push queues a frame in the scheduler. In most cases, this will not be
  9558  	// called with wr.StreamID()!=0 unless that stream is currently open. The one
  9559  	// exception is RST_STREAM frames, which may be sent on idle or closed streams.
  9560  	Push(wr http2FrameWriteRequest)
  9561  
  9562  	// Pop dequeues the next frame to write. Returns false if no frames can
  9563  	// be written. Frames with a given wr.StreamID() are Pop'd in the same
  9564  	// order they are Push'd. No frames should be discarded except by CloseStream.
  9565  	Pop() (wr http2FrameWriteRequest, ok bool)
  9566  }
  9567  
  9568  // OpenStreamOptions specifies extra options for WriteScheduler.OpenStream.
  9569  type http2OpenStreamOptions struct {
  9570  	// PusherID is zero if the stream was initiated by the client. Otherwise,
  9571  	// PusherID names the stream that pushed the newly opened stream.
  9572  	PusherID uint32
  9573  }
  9574  
  9575  // FrameWriteRequest is a request to write a frame.
  9576  type http2FrameWriteRequest struct {
  9577  	// write is the interface value that does the writing, once the
  9578  	// WriteScheduler has selected this frame to write. The write
  9579  	// functions are all defined in write.go.
  9580  	write http2writeFramer
  9581  
  9582  	// stream is the stream on which this frame will be written.
  9583  	// nil for non-stream frames like PING and SETTINGS.
  9584  	stream *http2stream
  9585  
  9586  	// done, if non-nil, must be a buffered channel with space for
  9587  	// 1 message and is sent the return value from write (or an
  9588  	// earlier error) when the frame has been written.
  9589  	done chan error
  9590  }
  9591  
  9592  // StreamID returns the id of the stream this frame will be written to.
  9593  // 0 is used for non-stream frames such as PING and SETTINGS.
  9594  func (wr http2FrameWriteRequest) StreamID() uint32 {
  9595  	if wr.stream == nil {
  9596  		if se, ok := wr.write.(http2StreamError); ok {
  9597  			// (*serverConn).resetStream doesn't set
  9598  			// stream because it doesn't necessarily have
  9599  			// one. So special case this type of write
  9600  			// message.
  9601  			return se.StreamID
  9602  		}
  9603  		return 0
  9604  	}
  9605  	return wr.stream.id
  9606  }
  9607  
  9608  // isControl reports whether wr is a control frame for MaxQueuedControlFrames
  9609  // purposes. That includes non-stream frames and RST_STREAM frames.
  9610  func (wr http2FrameWriteRequest) isControl() bool {
  9611  	return wr.stream == nil
  9612  }
  9613  
  9614  // DataSize returns the number of flow control bytes that must be consumed
  9615  // to write this entire frame. This is 0 for non-DATA frames.
  9616  func (wr http2FrameWriteRequest) DataSize() int {
  9617  	if wd, ok := wr.write.(*http2writeData); ok {
  9618  		return len(wd.p)
  9619  	}
  9620  	return 0
  9621  }
  9622  
  9623  // Consume consumes min(n, available) bytes from this frame, where available
  9624  // is the number of flow control bytes available on the stream. Consume returns
  9625  // 0, 1, or 2 frames, where the integer return value gives the number of frames
  9626  // returned.
  9627  //
  9628  // If flow control prevents consuming any bytes, this returns (_, _, 0). If
  9629  // the entire frame was consumed, this returns (wr, _, 1). Otherwise, this
  9630  // returns (consumed, rest, 2), where 'consumed' contains the consumed bytes and
  9631  // 'rest' contains the remaining bytes. The consumed bytes are deducted from the
  9632  // underlying stream's flow control budget.
  9633  func (wr http2FrameWriteRequest) Consume(n int32) (http2FrameWriteRequest, http2FrameWriteRequest, int) {
  9634  	var empty http2FrameWriteRequest
  9635  
  9636  	// Non-DATA frames are always consumed whole.
  9637  	wd, ok := wr.write.(*http2writeData)
  9638  	if !ok || len(wd.p) == 0 {
  9639  		return wr, empty, 1
  9640  	}
  9641  
  9642  	// Might need to split after applying limits.
  9643  	allowed := wr.stream.flow.available()
  9644  	if n < allowed {
  9645  		allowed = n
  9646  	}
  9647  	if wr.stream.sc.maxFrameSize < allowed {
  9648  		allowed = wr.stream.sc.maxFrameSize
  9649  	}
  9650  	if allowed <= 0 {
  9651  		return empty, empty, 0
  9652  	}
  9653  	if len(wd.p) > int(allowed) {
  9654  		wr.stream.flow.take(allowed)
  9655  		consumed := http2FrameWriteRequest{
  9656  			stream: wr.stream,
  9657  			write: &http2writeData{
  9658  				streamID: wd.streamID,
  9659  				p:        wd.p[:allowed],
  9660  				// Even if the original had endStream set, there
  9661  				// are bytes remaining because len(wd.p) > allowed,
  9662  				// so we know endStream is false.
  9663  				endStream: false,
  9664  			},
  9665  			// Our caller is blocking on the final DATA frame, not
  9666  			// this intermediate frame, so no need to wait.
  9667  			done: nil,
  9668  		}
  9669  		rest := http2FrameWriteRequest{
  9670  			stream: wr.stream,
  9671  			write: &http2writeData{
  9672  				streamID:  wd.streamID,
  9673  				p:         wd.p[allowed:],
  9674  				endStream: wd.endStream,
  9675  			},
  9676  			done: wr.done,
  9677  		}
  9678  		return consumed, rest, 2
  9679  	}
  9680  
  9681  	// The frame is consumed whole.
  9682  	// NB: This cast cannot overflow because allowed is <= math.MaxInt32.
  9683  	wr.stream.flow.take(int32(len(wd.p)))
  9684  	return wr, empty, 1
  9685  }
  9686  
  9687  // String is for debugging only.
  9688  func (wr http2FrameWriteRequest) String() string {
  9689  	var des string
  9690  	if s, ok := wr.write.(fmt.Stringer); ok {
  9691  		des = s.String()
  9692  	} else {
  9693  		des = fmt.Sprintf("%T", wr.write)
  9694  	}
  9695  	return fmt.Sprintf("[FrameWriteRequest stream=%d, ch=%v, writer=%v]", wr.StreamID(), wr.done != nil, des)
  9696  }
  9697  
  9698  // replyToWriter sends err to wr.done and panics if the send must block
  9699  // This does nothing if wr.done is nil.
  9700  func (wr *http2FrameWriteRequest) replyToWriter(err error) {
  9701  	if wr.done == nil {
  9702  		return
  9703  	}
  9704  	select {
  9705  	case wr.done <- err:
  9706  	default:
  9707  		panic(fmt.Sprintf("unbuffered done channel passed in for type %T", wr.write))
  9708  	}
  9709  	wr.write = nil // prevent use (assume it's tainted after wr.done send)
  9710  }
  9711  
  9712  // writeQueue is used by implementations of WriteScheduler.
  9713  type http2writeQueue struct {
  9714  	s []http2FrameWriteRequest
  9715  }
  9716  
  9717  func (q *http2writeQueue) empty() bool { return len(q.s) == 0 }
  9718  
  9719  func (q *http2writeQueue) push(wr http2FrameWriteRequest) {
  9720  	q.s = append(q.s, wr)
  9721  }
  9722  
  9723  func (q *http2writeQueue) shift() http2FrameWriteRequest {
  9724  	if len(q.s) == 0 {
  9725  		panic("invalid use of queue")
  9726  	}
  9727  	wr := q.s[0]
  9728  	// TODO: less copy-happy queue.
  9729  	copy(q.s, q.s[1:])
  9730  	q.s[len(q.s)-1] = http2FrameWriteRequest{}
  9731  	q.s = q.s[:len(q.s)-1]
  9732  	return wr
  9733  }
  9734  
  9735  // consume consumes up to n bytes from q.s[0]. If the frame is
  9736  // entirely consumed, it is removed from the queue. If the frame
  9737  // is partially consumed, the frame is kept with the consumed
  9738  // bytes removed. Returns true iff any bytes were consumed.
  9739  func (q *http2writeQueue) consume(n int32) (http2FrameWriteRequest, bool) {
  9740  	if len(q.s) == 0 {
  9741  		return http2FrameWriteRequest{}, false
  9742  	}
  9743  	consumed, rest, numresult := q.s[0].Consume(n)
  9744  	switch numresult {
  9745  	case 0:
  9746  		return http2FrameWriteRequest{}, false
  9747  	case 1:
  9748  		q.shift()
  9749  	case 2:
  9750  		q.s[0] = rest
  9751  	}
  9752  	return consumed, true
  9753  }
  9754  
  9755  type http2writeQueuePool []*http2writeQueue
  9756  
  9757  // put inserts an unused writeQueue into the pool.
  9758  
  9759  // put inserts an unused writeQueue into the pool.
  9760  func (p *http2writeQueuePool) put(q *http2writeQueue) {
  9761  	for i := range q.s {
  9762  		q.s[i] = http2FrameWriteRequest{}
  9763  	}
  9764  	q.s = q.s[:0]
  9765  	*p = append(*p, q)
  9766  }
  9767  
  9768  // get returns an empty writeQueue.
  9769  func (p *http2writeQueuePool) get() *http2writeQueue {
  9770  	ln := len(*p)
  9771  	if ln == 0 {
  9772  		return new(http2writeQueue)
  9773  	}
  9774  	x := ln - 1
  9775  	q := (*p)[x]
  9776  	(*p)[x] = nil
  9777  	*p = (*p)[:x]
  9778  	return q
  9779  }
  9780  
  9781  // RFC 7540, Section 5.3.5: the default weight is 16.
  9782  const http2priorityDefaultWeight = 15 // 16 = 15 + 1
  9783  
  9784  // PriorityWriteSchedulerConfig configures a priorityWriteScheduler.
  9785  type http2PriorityWriteSchedulerConfig struct {
  9786  	// MaxClosedNodesInTree controls the maximum number of closed streams to
  9787  	// retain in the priority tree. Setting this to zero saves a small amount
  9788  	// of memory at the cost of performance.
  9789  	//
  9790  	// See RFC 7540, Section 5.3.4:
  9791  	//   "It is possible for a stream to become closed while prioritization
  9792  	//   information ... is in transit. ... This potentially creates suboptimal
  9793  	//   prioritization, since the stream could be given a priority that is
  9794  	//   different from what is intended. To avoid these problems, an endpoint
  9795  	//   SHOULD retain stream prioritization state for a period after streams
  9796  	//   become closed. The longer state is retained, the lower the chance that
  9797  	//   streams are assigned incorrect or default priority values."
  9798  	MaxClosedNodesInTree int
  9799  
  9800  	// MaxIdleNodesInTree controls the maximum number of idle streams to
  9801  	// retain in the priority tree. Setting this to zero saves a small amount
  9802  	// of memory at the cost of performance.
  9803  	//
  9804  	// See RFC 7540, Section 5.3.4:
  9805  	//   Similarly, streams that are in the "idle" state can be assigned
  9806  	//   priority or become a parent of other streams. This allows for the
  9807  	//   creation of a grouping node in the dependency tree, which enables
  9808  	//   more flexible expressions of priority. Idle streams begin with a
  9809  	//   default priority (Section 5.3.5).
  9810  	MaxIdleNodesInTree int
  9811  
  9812  	// ThrottleOutOfOrderWrites enables write throttling to help ensure that
  9813  	// data is delivered in priority order. This works around a race where
  9814  	// stream B depends on stream A and both streams are about to call Write
  9815  	// to queue DATA frames. If B wins the race, a naive scheduler would eagerly
  9816  	// write as much data from B as possible, but this is suboptimal because A
  9817  	// is a higher-priority stream. With throttling enabled, we write a small
  9818  	// amount of data from B to minimize the amount of bandwidth that B can
  9819  	// steal from A.
  9820  	ThrottleOutOfOrderWrites bool
  9821  }
  9822  
  9823  // NewPriorityWriteScheduler constructs a WriteScheduler that schedules
  9824  // frames by following HTTP/2 priorities as described in RFC 7540 Section 5.3.
  9825  // If cfg is nil, default options are used.
  9826  func http2NewPriorityWriteScheduler(cfg *http2PriorityWriteSchedulerConfig) http2WriteScheduler {
  9827  	if cfg == nil {
  9828  		// For justification of these defaults, see:
  9829  		// https://docs.google.com/document/d/1oLhNg1skaWD4_DtaoCxdSRN5erEXrH-KnLrMwEpOtFY
  9830  		cfg = &http2PriorityWriteSchedulerConfig{
  9831  			MaxClosedNodesInTree:     10,
  9832  			MaxIdleNodesInTree:       10,
  9833  			ThrottleOutOfOrderWrites: false,
  9834  		}
  9835  	}
  9836  
  9837  	ws := &http2priorityWriteScheduler{
  9838  		nodes:                make(map[uint32]*http2priorityNode),
  9839  		maxClosedNodesInTree: cfg.MaxClosedNodesInTree,
  9840  		maxIdleNodesInTree:   cfg.MaxIdleNodesInTree,
  9841  		enableWriteThrottle:  cfg.ThrottleOutOfOrderWrites,
  9842  	}
  9843  	ws.nodes[0] = &ws.root
  9844  	if cfg.ThrottleOutOfOrderWrites {
  9845  		ws.writeThrottleLimit = 1024
  9846  	} else {
  9847  		ws.writeThrottleLimit = math.MaxInt32
  9848  	}
  9849  	return ws
  9850  }
  9851  
  9852  type http2priorityNodeState int
  9853  
  9854  const (
  9855  	http2priorityNodeOpen http2priorityNodeState = iota
  9856  	http2priorityNodeClosed
  9857  	http2priorityNodeIdle
  9858  )
  9859  
  9860  // priorityNode is a node in an HTTP/2 priority tree.
  9861  // Each node is associated with a single stream ID.
  9862  // See RFC 7540, Section 5.3.
  9863  type http2priorityNode struct {
  9864  	q            http2writeQueue        // queue of pending frames to write
  9865  	id           uint32                 // id of the stream, or 0 for the root of the tree
  9866  	weight       uint8                  // the actual weight is weight+1, so the value is in [1,256]
  9867  	state        http2priorityNodeState // open | closed | idle
  9868  	bytes        int64                  // number of bytes written by this node, or 0 if closed
  9869  	subtreeBytes int64                  // sum(node.bytes) of all nodes in this subtree
  9870  
  9871  	// These links form the priority tree.
  9872  	parent     *http2priorityNode
  9873  	kids       *http2priorityNode // start of the kids list
  9874  	prev, next *http2priorityNode // doubly-linked list of siblings
  9875  }
  9876  
  9877  func (n *http2priorityNode) setParent(parent *http2priorityNode) {
  9878  	if n == parent {
  9879  		panic("setParent to self")
  9880  	}
  9881  	if n.parent == parent {
  9882  		return
  9883  	}
  9884  	// Unlink from current parent.
  9885  	if parent := n.parent; parent != nil {
  9886  		if n.prev == nil {
  9887  			parent.kids = n.next
  9888  		} else {
  9889  			n.prev.next = n.next
  9890  		}
  9891  		if n.next != nil {
  9892  			n.next.prev = n.prev
  9893  		}
  9894  	}
  9895  	// Link to new parent.
  9896  	// If parent=nil, remove n from the tree.
  9897  	// Always insert at the head of parent.kids (this is assumed by walkReadyInOrder).
  9898  	n.parent = parent
  9899  	if parent == nil {
  9900  		n.next = nil
  9901  		n.prev = nil
  9902  	} else {
  9903  		n.next = parent.kids
  9904  		n.prev = nil
  9905  		if n.next != nil {
  9906  			n.next.prev = n
  9907  		}
  9908  		parent.kids = n
  9909  	}
  9910  }
  9911  
  9912  func (n *http2priorityNode) addBytes(b int64) {
  9913  	n.bytes += b
  9914  	for ; n != nil; n = n.parent {
  9915  		n.subtreeBytes += b
  9916  	}
  9917  }
  9918  
  9919  // walkReadyInOrder iterates over the tree in priority order, calling f for each node
  9920  // with a non-empty write queue. When f returns true, this function returns true and the
  9921  // walk halts. tmp is used as scratch space for sorting.
  9922  //
  9923  // f(n, openParent) takes two arguments: the node to visit, n, and a bool that is true
  9924  // if any ancestor p of n is still open (ignoring the root node).
  9925  func (n *http2priorityNode) walkReadyInOrder(openParent bool, tmp *[]*http2priorityNode, f func(*http2priorityNode, bool) bool) bool {
  9926  	if !n.q.empty() && f(n, openParent) {
  9927  		return true
  9928  	}
  9929  	if n.kids == nil {
  9930  		return false
  9931  	}
  9932  
  9933  	// Don't consider the root "open" when updating openParent since
  9934  	// we can't send data frames on the root stream (only control frames).
  9935  	if n.id != 0 {
  9936  		openParent = openParent || (n.state == http2priorityNodeOpen)
  9937  	}
  9938  
  9939  	// Common case: only one kid or all kids have the same weight.
  9940  	// Some clients don't use weights; other clients (like web browsers)
  9941  	// use mostly-linear priority trees.
  9942  	w := n.kids.weight
  9943  	needSort := false
  9944  	for k := n.kids.next; k != nil; k = k.next {
  9945  		if k.weight != w {
  9946  			needSort = true
  9947  			break
  9948  		}
  9949  	}
  9950  	if !needSort {
  9951  		for k := n.kids; k != nil; k = k.next {
  9952  			if k.walkReadyInOrder(openParent, tmp, f) {
  9953  				return true
  9954  			}
  9955  		}
  9956  		return false
  9957  	}
  9958  
  9959  	// Uncommon case: sort the child nodes. We remove the kids from the parent,
  9960  	// then re-insert after sorting so we can reuse tmp for future sort calls.
  9961  	*tmp = (*tmp)[:0]
  9962  	for n.kids != nil {
  9963  		*tmp = append(*tmp, n.kids)
  9964  		n.kids.setParent(nil)
  9965  	}
  9966  	sort.Sort(http2sortPriorityNodeSiblings(*tmp))
  9967  	for i := len(*tmp) - 1; i >= 0; i-- {
  9968  		(*tmp)[i].setParent(n) // setParent inserts at the head of n.kids
  9969  	}
  9970  	for k := n.kids; k != nil; k = k.next {
  9971  		if k.walkReadyInOrder(openParent, tmp, f) {
  9972  			return true
  9973  		}
  9974  	}
  9975  	return false
  9976  }
  9977  
  9978  type http2sortPriorityNodeSiblings []*http2priorityNode
  9979  
  9980  func (z http2sortPriorityNodeSiblings) Len() int { return len(z) }
  9981  
  9982  func (z http2sortPriorityNodeSiblings) Swap(i, k int) { z[i], z[k] = z[k], z[i] }
  9983  
  9984  func (z http2sortPriorityNodeSiblings) Less(i, k int) bool {
  9985  	// Prefer the subtree that has sent fewer bytes relative to its weight.
  9986  	// See sections 5.3.2 and 5.3.4.
  9987  	wi, bi := float64(z[i].weight+1), float64(z[i].subtreeBytes)
  9988  	wk, bk := float64(z[k].weight+1), float64(z[k].subtreeBytes)
  9989  	if bi == 0 && bk == 0 {
  9990  		return wi >= wk
  9991  	}
  9992  	if bk == 0 {
  9993  		return false
  9994  	}
  9995  	return bi/bk <= wi/wk
  9996  }
  9997  
  9998  type http2priorityWriteScheduler struct {
  9999  	// root is the root of the priority tree, where root.id = 0.
 10000  	// The root queues control frames that are not associated with any stream.
 10001  	root http2priorityNode
 10002  
 10003  	// nodes maps stream ids to priority tree nodes.
 10004  	nodes map[uint32]*http2priorityNode
 10005  
 10006  	// maxID is the maximum stream id in nodes.
 10007  	maxID uint32
 10008  
 10009  	// lists of nodes that have been closed or are idle, but are kept in
 10010  	// the tree for improved prioritization. When the lengths exceed either
 10011  	// maxClosedNodesInTree or maxIdleNodesInTree, old nodes are discarded.
 10012  	closedNodes, idleNodes []*http2priorityNode
 10013  
 10014  	// From the config.
 10015  	maxClosedNodesInTree int
 10016  	maxIdleNodesInTree   int
 10017  	writeThrottleLimit   int32
 10018  	enableWriteThrottle  bool
 10019  
 10020  	// tmp is scratch space for priorityNode.walkReadyInOrder to reduce allocations.
 10021  	tmp []*http2priorityNode
 10022  
 10023  	// pool of empty queues for reuse.
 10024  	queuePool http2writeQueuePool
 10025  }
 10026  
 10027  func (ws *http2priorityWriteScheduler) OpenStream(streamID uint32, options http2OpenStreamOptions) {
 10028  	// The stream may be currently idle but cannot be opened or closed.
 10029  	if curr := ws.nodes[streamID]; curr != nil {
 10030  		if curr.state != http2priorityNodeIdle {
 10031  			panic(fmt.Sprintf("stream %d already opened", streamID))
 10032  		}
 10033  		curr.state = http2priorityNodeOpen
 10034  		return
 10035  	}
 10036  
 10037  	// RFC 7540, Section 5.3.5:
 10038  	//  "All streams are initially assigned a non-exclusive dependency on stream 0x0.
 10039  	//  Pushed streams initially depend on their associated stream. In both cases,
 10040  	//  streams are assigned a default weight of 16."
 10041  	parent := ws.nodes[options.PusherID]
 10042  	if parent == nil {
 10043  		parent = &ws.root
 10044  	}
 10045  	n := &http2priorityNode{
 10046  		q:      *ws.queuePool.get(),
 10047  		id:     streamID,
 10048  		weight: http2priorityDefaultWeight,
 10049  		state:  http2priorityNodeOpen,
 10050  	}
 10051  	n.setParent(parent)
 10052  	ws.nodes[streamID] = n
 10053  	if streamID > ws.maxID {
 10054  		ws.maxID = streamID
 10055  	}
 10056  }
 10057  
 10058  func (ws *http2priorityWriteScheduler) CloseStream(streamID uint32) {
 10059  	if streamID == 0 {
 10060  		panic("violation of WriteScheduler interface: cannot close stream 0")
 10061  	}
 10062  	if ws.nodes[streamID] == nil {
 10063  		panic(fmt.Sprintf("violation of WriteScheduler interface: unknown stream %d", streamID))
 10064  	}
 10065  	if ws.nodes[streamID].state != http2priorityNodeOpen {
 10066  		panic(fmt.Sprintf("violation of WriteScheduler interface: stream %d already closed", streamID))
 10067  	}
 10068  
 10069  	n := ws.nodes[streamID]
 10070  	n.state = http2priorityNodeClosed
 10071  	n.addBytes(-n.bytes)
 10072  
 10073  	q := n.q
 10074  	ws.queuePool.put(&q)
 10075  	n.q.s = nil
 10076  	if ws.maxClosedNodesInTree > 0 {
 10077  		ws.addClosedOrIdleNode(&ws.closedNodes, ws.maxClosedNodesInTree, n)
 10078  	} else {
 10079  		ws.removeNode(n)
 10080  	}
 10081  }
 10082  
 10083  func (ws *http2priorityWriteScheduler) AdjustStream(streamID uint32, priority http2PriorityParam) {
 10084  	if streamID == 0 {
 10085  		panic("adjustPriority on root")
 10086  	}
 10087  
 10088  	// If streamID does not exist, there are two cases:
 10089  	// - A closed stream that has been removed (this will have ID <= maxID)
 10090  	// - An idle stream that is being used for "grouping" (this will have ID > maxID)
 10091  	n := ws.nodes[streamID]
 10092  	if n == nil {
 10093  		if streamID <= ws.maxID || ws.maxIdleNodesInTree == 0 {
 10094  			return
 10095  		}
 10096  		ws.maxID = streamID
 10097  		n = &http2priorityNode{
 10098  			q:      *ws.queuePool.get(),
 10099  			id:     streamID,
 10100  			weight: http2priorityDefaultWeight,
 10101  			state:  http2priorityNodeIdle,
 10102  		}
 10103  		n.setParent(&ws.root)
 10104  		ws.nodes[streamID] = n
 10105  		ws.addClosedOrIdleNode(&ws.idleNodes, ws.maxIdleNodesInTree, n)
 10106  	}
 10107  
 10108  	// Section 5.3.1: A dependency on a stream that is not currently in the tree
 10109  	// results in that stream being given a default priority (Section 5.3.5).
 10110  	parent := ws.nodes[priority.StreamDep]
 10111  	if parent == nil {
 10112  		n.setParent(&ws.root)
 10113  		n.weight = http2priorityDefaultWeight
 10114  		return
 10115  	}
 10116  
 10117  	// Ignore if the client tries to make a node its own parent.
 10118  	if n == parent {
 10119  		return
 10120  	}
 10121  
 10122  	// Section 5.3.3:
 10123  	//   "If a stream is made dependent on one of its own dependencies, the
 10124  	//   formerly dependent stream is first moved to be dependent on the
 10125  	//   reprioritized stream's previous parent. The moved dependency retains
 10126  	//   its weight."
 10127  	//
 10128  	// That is: if parent depends on n, move parent to depend on n.parent.
 10129  	for x := parent.parent; x != nil; x = x.parent {
 10130  		if x == n {
 10131  			parent.setParent(n.parent)
 10132  			break
 10133  		}
 10134  	}
 10135  
 10136  	// Section 5.3.3: The exclusive flag causes the stream to become the sole
 10137  	// dependency of its parent stream, causing other dependencies to become
 10138  	// dependent on the exclusive stream.
 10139  	if priority.Exclusive {
 10140  		k := parent.kids
 10141  		for k != nil {
 10142  			next := k.next
 10143  			if k != n {
 10144  				k.setParent(n)
 10145  			}
 10146  			k = next
 10147  		}
 10148  	}
 10149  
 10150  	n.setParent(parent)
 10151  	n.weight = priority.Weight
 10152  }
 10153  
 10154  func (ws *http2priorityWriteScheduler) Push(wr http2FrameWriteRequest) {
 10155  	var n *http2priorityNode
 10156  	if id := wr.StreamID(); id == 0 {
 10157  		n = &ws.root
 10158  	} else {
 10159  		n = ws.nodes[id]
 10160  		if n == nil {
 10161  			// id is an idle or closed stream. wr should not be a HEADERS or
 10162  			// DATA frame. However, wr can be a RST_STREAM. In this case, we
 10163  			// push wr onto the root, rather than creating a new priorityNode,
 10164  			// since RST_STREAM is tiny and the stream's priority is unknown
 10165  			// anyway. See issue #17919.
 10166  			if wr.DataSize() > 0 {
 10167  				panic("add DATA on non-open stream")
 10168  			}
 10169  			n = &ws.root
 10170  		}
 10171  	}
 10172  	n.q.push(wr)
 10173  }
 10174  
 10175  func (ws *http2priorityWriteScheduler) Pop() (wr http2FrameWriteRequest, ok bool) {
 10176  	ws.root.walkReadyInOrder(false, &ws.tmp, func(n *http2priorityNode, openParent bool) bool {
 10177  		limit := int32(math.MaxInt32)
 10178  		if openParent {
 10179  			limit = ws.writeThrottleLimit
 10180  		}
 10181  		wr, ok = n.q.consume(limit)
 10182  		if !ok {
 10183  			return false
 10184  		}
 10185  		n.addBytes(int64(wr.DataSize()))
 10186  		// If B depends on A and B continuously has data available but A
 10187  		// does not, gradually increase the throttling limit to allow B to
 10188  		// steal more and more bandwidth from A.
 10189  		if openParent {
 10190  			ws.writeThrottleLimit += 1024
 10191  			if ws.writeThrottleLimit < 0 {
 10192  				ws.writeThrottleLimit = math.MaxInt32
 10193  			}
 10194  		} else if ws.enableWriteThrottle {
 10195  			ws.writeThrottleLimit = 1024
 10196  		}
 10197  		return true
 10198  	})
 10199  	return wr, ok
 10200  }
 10201  
 10202  func (ws *http2priorityWriteScheduler) addClosedOrIdleNode(list *[]*http2priorityNode, maxSize int, n *http2priorityNode) {
 10203  	if maxSize == 0 {
 10204  		return
 10205  	}
 10206  	if len(*list) == maxSize {
 10207  		// Remove the oldest node, then shift left.
 10208  		ws.removeNode((*list)[0])
 10209  		x := (*list)[1:]
 10210  		copy(*list, x)
 10211  		*list = (*list)[:len(x)]
 10212  	}
 10213  	*list = append(*list, n)
 10214  }
 10215  
 10216  func (ws *http2priorityWriteScheduler) removeNode(n *http2priorityNode) {
 10217  	for k := n.kids; k != nil; k = k.next {
 10218  		k.setParent(n.parent)
 10219  	}
 10220  	n.setParent(nil)
 10221  	delete(ws.nodes, n.id)
 10222  }
 10223  
 10224  // NewRandomWriteScheduler constructs a WriteScheduler that ignores HTTP/2
 10225  // priorities. Control frames like SETTINGS and PING are written before DATA
 10226  // frames, but if no control frames are queued and multiple streams have queued
 10227  // HEADERS or DATA frames, Pop selects a ready stream arbitrarily.
 10228  func http2NewRandomWriteScheduler() http2WriteScheduler {
 10229  	return &http2randomWriteScheduler{sq: make(map[uint32]*http2writeQueue)}
 10230  }
 10231  
 10232  type http2randomWriteScheduler struct {
 10233  	// zero are frames not associated with a specific stream.
 10234  	zero http2writeQueue
 10235  
 10236  	// sq contains the stream-specific queues, keyed by stream ID.
 10237  	// When a stream is idle, closed, or emptied, it's deleted
 10238  	// from the map.
 10239  	sq map[uint32]*http2writeQueue
 10240  
 10241  	// pool of empty queues for reuse.
 10242  	queuePool http2writeQueuePool
 10243  }
 10244  
 10245  func (ws *http2randomWriteScheduler) OpenStream(streamID uint32, options http2OpenStreamOptions) {
 10246  	// no-op: idle streams are not tracked
 10247  }
 10248  
 10249  func (ws *http2randomWriteScheduler) CloseStream(streamID uint32) {
 10250  	q, ok := ws.sq[streamID]
 10251  	if !ok {
 10252  		return
 10253  	}
 10254  	delete(ws.sq, streamID)
 10255  	ws.queuePool.put(q)
 10256  }
 10257  
 10258  func (ws *http2randomWriteScheduler) AdjustStream(streamID uint32, priority http2PriorityParam) {
 10259  	// no-op: priorities are ignored
 10260  }
 10261  
 10262  func (ws *http2randomWriteScheduler) Push(wr http2FrameWriteRequest) {
 10263  	id := wr.StreamID()
 10264  	if id == 0 {
 10265  		ws.zero.push(wr)
 10266  		return
 10267  	}
 10268  	q, ok := ws.sq[id]
 10269  	if !ok {
 10270  		q = ws.queuePool.get()
 10271  		ws.sq[id] = q
 10272  	}
 10273  	q.push(wr)
 10274  }
 10275  
 10276  func (ws *http2randomWriteScheduler) Pop() (http2FrameWriteRequest, bool) {
 10277  	// Control frames first.
 10278  	if !ws.zero.empty() {
 10279  		return ws.zero.shift(), true
 10280  	}
 10281  	// Iterate over all non-idle streams until finding one that can be consumed.
 10282  	for streamID, q := range ws.sq {
 10283  		if wr, ok := q.consume(math.MaxInt32); ok {
 10284  			if q.empty() {
 10285  				delete(ws.sq, streamID)
 10286  				ws.queuePool.put(q)
 10287  			}
 10288  			return wr, true
 10289  		}
 10290  	}
 10291  	return http2FrameWriteRequest{}, false
 10292  }