1. 30 Jul, 2018 1 commit
  2. 29 Jul, 2018 1 commit
    • William Chang's avatar
      http2/h2c: add h2c implementation (unencrypted HTTP/2) · c4299a1a
      William Chang authored
      Implements h2c by leveraging the existing http2.Server by implementing the 2
      ways to start an h2c connection as described in RFC 7540, which are: (1)
      create a connection starting with HTTP/1 and then upgrading to h2c [Section 3.2]
      and (2) starting a connection directly speaking h2c (aka starting with prior
      knowledge) [Section 3.4].
      
      For both of the above connection methods the implementation strategy is to
      hijack a HTTP/1 connection, perform the h2c connection on the hijacked
      net.Conn, and create a suitably configured net.Conn to pass into
      http2.Server.ServeConn.
      
      For h2c with prior knowledge this is relatively simple. For that we just have
      to verify the HTTP/2 client preface has been written to the net.Conn, and
      then reforward the client preface to the hijacked connection.
      
      For h2c upgraded from HTTP/1, this is a bit more involved. First we validate
      the HTTP/1 Upgrade request, and respond to the client with 101 Switching
      Protocols. Then we write a HTTP/2 client preface on behalf of the client,
      and a settings frame and a headers frame which correspond to what was in
      the upgrade request. Then since http2.Server is going respond with a
      settings ACK, we swallow it so that it is not forwarded to the client since
      for h2c upgrade from HTTP/1 the 101 Switching Protocols response replaces
      the settins ACK.
      
      Fixes golang/go#14141
      
      Change-Id: I435f40216c883809c0dcb75426c9c59e2ea31182
      Reviewed-on: https://go-review.googlesource.com/112999Reviewed-by: 's avatarBrad Fitzpatrick <bradfitz@golang.org>
      c4299a1a
  3. 24 Jul, 2018 1 commit
  4. 19 Jul, 2018 3 commits
  5. 18 Jul, 2018 1 commit
    • Ian Gudger's avatar
      dns/dnsmessage: fix bug in length fixup · 8887df42
      Ian Gudger authored
      If during packing, the byte slice gets re-allocated between packing the
      ResourceHeader and ResourceBody, the length will get updated in the old
      byte slice before re-allocation resulting in a zero length in the final
      packed message.
      
      This change fixes the bug by passing the offset at which the length
      should be written instead of a slice of the output byte slice from
      ResourceHeader encoding step.
      
      Updates golang/go#16218
      
      Change-Id: Ifd7e2f549b7087ed5b52eaa6ae78970fec4ad988
      Reviewed-on: https://go-review.googlesource.com/123835
      Run-TryBot: Ian Gudger <igudger@google.com>
      TryBot-Result: Gobot Gobot <gobot@golang.org>
      Reviewed-by: 's avatarBrad Fitzpatrick <bradfitz@golang.org>
      8887df42
  6. 12 Jul, 2018 4 commits
  7. 10 Jul, 2018 3 commits
  8. 09 Jul, 2018 6 commits
  9. 06 Jul, 2018 3 commits
  10. 02 Jul, 2018 4 commits
  11. 29 Jun, 2018 3 commits
  12. 28 Jun, 2018 2 commits
    • Brad Fitzpatrick's avatar
      http2: make Server send GOAWAY if Handler sets "Connection: close" header · 97aa3a53
      Brad Fitzpatrick authored
      In Go's HTTP/1.x Server, a "Connection: close" response from a handler results
      in the TCP connection being closed.
      
      In HTTP/2, a "Connection" header is illegal and we weren't previously
      handling it, generating malformed responses to clients. (This is one
      of our violations listed in golang/go#25023)
      
      There was also a feature request in golang/go#20977 for a way for
      HTTP/2 handlers to close the connection after the response. Since we
      already close the connection for "Connection: close" for HTTP/1.x, do
      the same for HTTP/2 and map it to a graceful GOAWAY errcode=NO
      response.
      
      Updates golang/go#25023 (improves 8.1.2.2. Connection-Specific Header Fields)
      Updates golang/go#20977 (fixes after vendor into std)
      
      Change-Id: Iefb33ea73be616052533080c63b54ae679b1d154
      Reviewed-on: https://go-review.googlesource.com/121415
      Run-TryBot: Brad Fitzpatrick <bradfitz@golang.org>
      TryBot-Result: Gobot Gobot <gobot@golang.org>
      Reviewed-by: 's avatarIan Lance Taylor <iant@golang.org>
      97aa3a53
    • Michael Fraenkel's avatar
      http2: correct overflow protection · d1d521f6
      Michael Fraenkel authored
      Correct overflow detection when going negative.
      
      Updates golang/go#25023
      
      Change-Id: Ic2ddb7ee757f081d1826bfbbfd884e2b7e819335
      Reviewed-on: https://go-review.googlesource.com/111675Reviewed-by: 's avatarBrad Fitzpatrick <bradfitz@golang.org>
      Run-TryBot: Brad Fitzpatrick <bradfitz@golang.org>
      TryBot-Result: Gobot Gobot <gobot@golang.org>
      d1d521f6
  13. 27 Jun, 2018 1 commit
  14. 21 Jun, 2018 1 commit
  15. 11 Jun, 2018 1 commit
  16. 30 May, 2018 5 commits