Skip to content

Commit 88186e5

Browse files
committed
net/http: don't cache http2.erringRoundTripper connections
Fixes #34978 Change-Id: I3baf1392ba7366ae6628889c47c343ef702ec438 Reviewed-on: https://go-review.googlesource.com/c/go/+/202078 Reviewed-by: Bryan C. Mills <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
1 parent 03fb1f6 commit 88186e5

File tree

2 files changed

+82
-2
lines changed

2 files changed

+82
-2
lines changed

src/net/http/transport.go

+7-2
Original file line numberDiff line numberDiff line change
@@ -540,10 +540,15 @@ func (t *Transport) roundTrip(req *Request) (*Response, error) {
540540
if err == nil {
541541
return resp, nil
542542
}
543-
if http2isNoCachedConnError(err) {
543+
544+
// Failed. Clean up and determine whether to retry.
545+
546+
_, isH2DialError := pconn.alt.(http2erringRoundTripper)
547+
if http2isNoCachedConnError(err) || isH2DialError {
544548
t.removeIdleConn(pconn)
545549
t.decConnsPerHost(pconn.cacheKey)
546-
} else if !pconn.shouldRetryRequest(req, err) {
550+
}
551+
if !pconn.shouldRetryRequest(req, err) {
547552
// Issue 16465: return underlying net.Conn.Read error from peek,
548553
// as we've historically done.
549554
if e, ok := err.(transportReadFromServerError); ok {

src/net/http/transport_test.go

+75
Original file line numberDiff line numberDiff line change
@@ -5814,3 +5814,78 @@ func TestTransportClosesBodyOnInvalidRequests(t *testing.T) {
58145814
})
58155815
}
58165816
}
5817+
5818+
// breakableConn is a net.Conn wrapper with a Write method
5819+
// that will fail when its brokenState is true.
5820+
type breakableConn struct {
5821+
net.Conn
5822+
*brokenState
5823+
}
5824+
5825+
type brokenState struct {
5826+
sync.Mutex
5827+
broken bool
5828+
}
5829+
5830+
func (w *breakableConn) Write(b []byte) (n int, err error) {
5831+
w.Lock()
5832+
defer w.Unlock()
5833+
if w.broken {
5834+
return 0, errors.New("some write error")
5835+
}
5836+
return w.Conn.Write(b)
5837+
}
5838+
5839+
// Issue 34978: don't cache a broken HTTP/2 connection
5840+
func TestDontCacheBrokenHTTP2Conn(t *testing.T) {
5841+
cst := newClientServerTest(t, h2Mode, HandlerFunc(func(w ResponseWriter, r *Request) {}), optQuietLog)
5842+
defer cst.close()
5843+
5844+
var brokenState brokenState
5845+
5846+
cst.tr.Dial = func(netw, addr string) (net.Conn, error) {
5847+
c, err := net.Dial(netw, addr)
5848+
if err != nil {
5849+
t.Errorf("unexpected Dial error: %v", err)
5850+
return nil, err
5851+
}
5852+
return &breakableConn{c, &brokenState}, err
5853+
}
5854+
5855+
const numReqs = 5
5856+
var gotConns uint32 // atomic
5857+
for i := 1; i <= numReqs; i++ {
5858+
brokenState.Lock()
5859+
brokenState.broken = false
5860+
brokenState.Unlock()
5861+
5862+
// doBreak controls whether we break the TCP connection after the TLS
5863+
// handshake (before the HTTP/2 handshake). We test a few failures
5864+
// in a row followed by a final success.
5865+
doBreak := i != numReqs
5866+
5867+
ctx := httptrace.WithClientTrace(context.Background(), &httptrace.ClientTrace{
5868+
GotConn: func(info httptrace.GotConnInfo) {
5869+
atomic.AddUint32(&gotConns, 1)
5870+
},
5871+
TLSHandshakeDone: func(cfg tls.ConnectionState, err error) {
5872+
brokenState.Lock()
5873+
defer brokenState.Unlock()
5874+
if doBreak {
5875+
brokenState.broken = true
5876+
}
5877+
},
5878+
})
5879+
req, err := NewRequestWithContext(ctx, "GET", cst.ts.URL, nil)
5880+
if err != nil {
5881+
t.Fatal(err)
5882+
}
5883+
_, err = cst.c.Do(req)
5884+
if doBreak != (err != nil) {
5885+
t.Errorf("for iteration %d, doBreak=%v; unexpected error %v", i, doBreak, err)
5886+
}
5887+
}
5888+
if got, want := atomic.LoadUint32(&gotConns), 1; int(got) != want {
5889+
t.Errorf("GotConn calls = %v; want %v", got, want)
5890+
}
5891+
}

0 commit comments

Comments
 (0)