mirror of
https://github.com/golang/go
synced 2024-11-20 01:24:43 -07:00
http: export Transport, add keep-alive support
This patch adds a connection cache and keep-alive support to Transport, which is used by the HTTP client. It's also structured such that it's easy to add HTTP pipelining in the future. R=rsc, petar-m, bradfitzwork, r CC=golang-dev https://golang.org/cl/4272045
This commit is contained in:
parent
538f63453d
commit
059c07cab0
@ -57,40 +57,6 @@ type readClose struct {
|
|||||||
io.Closer
|
io.Closer
|
||||||
}
|
}
|
||||||
|
|
||||||
// matchNoProxy returns true if requests to addr should not use a proxy,
|
|
||||||
// according to the NO_PROXY or no_proxy environment variable.
|
|
||||||
func matchNoProxy(addr string) bool {
|
|
||||||
if len(addr) == 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
no_proxy := os.Getenv("NO_PROXY")
|
|
||||||
if len(no_proxy) == 0 {
|
|
||||||
no_proxy = os.Getenv("no_proxy")
|
|
||||||
}
|
|
||||||
if no_proxy == "*" {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
addr = strings.ToLower(strings.TrimSpace(addr))
|
|
||||||
if hasPort(addr) {
|
|
||||||
addr = addr[:strings.LastIndex(addr, ":")]
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, p := range strings.Split(no_proxy, ",", -1) {
|
|
||||||
p = strings.ToLower(strings.TrimSpace(p))
|
|
||||||
if len(p) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if hasPort(p) {
|
|
||||||
p = p[:strings.LastIndex(p, ":")]
|
|
||||||
}
|
|
||||||
if addr == p || (p[0] == '.' && (strings.HasSuffix(addr, p) || addr == p[1:])) {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
// Do sends an HTTP request and returns an HTTP response, following
|
// Do sends an HTTP request and returns an HTTP response, following
|
||||||
// policy (e.g. redirects, cookies, auth) as configured on the client.
|
// policy (e.g. redirects, cookies, auth) as configured on the client.
|
||||||
//
|
//
|
||||||
|
34
src/pkg/http/export_test.go
Normal file
34
src/pkg/http/export_test.go
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
// Copyright 2011 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// Bridge package to expose http internals to tests in the http_test
|
||||||
|
// package.
|
||||||
|
|
||||||
|
package http
|
||||||
|
|
||||||
|
func (t *Transport) IdleConnKeysForTesting() (keys []string) {
|
||||||
|
keys = make([]string, 0)
|
||||||
|
t.lk.Lock()
|
||||||
|
defer t.lk.Unlock()
|
||||||
|
if t.idleConn == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for key, _ := range t.idleConn {
|
||||||
|
keys = append(keys, key)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Transport) IdleConnCountForTesting(cacheKey string) int {
|
||||||
|
t.lk.Lock()
|
||||||
|
defer t.lk.Unlock()
|
||||||
|
if t.idleConn == nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
conns, ok := t.idleConn[cacheKey]
|
||||||
|
if !ok {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
return len(conns)
|
||||||
|
}
|
@ -9,6 +9,7 @@ package httptest
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"http"
|
"http"
|
||||||
|
"os"
|
||||||
"net"
|
"net"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -19,6 +20,21 @@ type Server struct {
|
|||||||
Listener net.Listener
|
Listener net.Listener
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// historyListener keeps track of all connections that it's ever
|
||||||
|
// accepted.
|
||||||
|
type historyListener struct {
|
||||||
|
net.Listener
|
||||||
|
history []net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *historyListener) Accept() (c net.Conn, err os.Error) {
|
||||||
|
c, err = hs.Listener.Accept()
|
||||||
|
if err == nil {
|
||||||
|
hs.history = append(hs.history, c)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
// NewServer starts and returns a new Server.
|
// NewServer starts and returns a new Server.
|
||||||
// The caller should call Close when finished, to shut it down.
|
// The caller should call Close when finished, to shut it down.
|
||||||
func NewServer(handler http.Handler) *Server {
|
func NewServer(handler http.Handler) *Server {
|
||||||
@ -29,10 +45,10 @@ func NewServer(handler http.Handler) *Server {
|
|||||||
panic(fmt.Sprintf("httptest: failed to listen on a port: %v", err))
|
panic(fmt.Sprintf("httptest: failed to listen on a port: %v", err))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
ts.Listener = l
|
ts.Listener = &historyListener{l, make([]net.Conn, 0)}
|
||||||
ts.URL = "http://" + l.Addr().String()
|
ts.URL = "http://" + l.Addr().String()
|
||||||
server := &http.Server{Handler: handler}
|
server := &http.Server{Handler: handler}
|
||||||
go server.Serve(l)
|
go server.Serve(ts.Listener)
|
||||||
return ts
|
return ts
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -40,3 +56,15 @@ func NewServer(handler http.Handler) *Server {
|
|||||||
func (s *Server) Close() {
|
func (s *Server) Close() {
|
||||||
s.Listener.Close()
|
s.Listener.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CloseClientConnections closes any currently open HTTP connections
|
||||||
|
// to the test Server.
|
||||||
|
func (s *Server) CloseClientConnections() {
|
||||||
|
hl, ok := s.Listener.(*historyListener)
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for _, conn := range hl.history {
|
||||||
|
conn.Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -213,6 +213,7 @@ type ClientConn struct {
|
|||||||
|
|
||||||
pipe textproto.Pipeline
|
pipe textproto.Pipeline
|
||||||
writeReq func(*Request, io.Writer) os.Error
|
writeReq func(*Request, io.Writer) os.Error
|
||||||
|
readRes func(buf *bufio.Reader, method string) (*Response, os.Error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewClientConn returns a new ClientConn reading and writing c. If r is not
|
// NewClientConn returns a new ClientConn reading and writing c. If r is not
|
||||||
@ -226,6 +227,7 @@ func NewClientConn(c net.Conn, r *bufio.Reader) *ClientConn {
|
|||||||
r: r,
|
r: r,
|
||||||
pipereq: make(map[*Request]uint),
|
pipereq: make(map[*Request]uint),
|
||||||
writeReq: (*Request).Write,
|
writeReq: (*Request).Write,
|
||||||
|
readRes: ReadResponse,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -363,7 +365,7 @@ func (cc *ClientConn) Read(req *Request) (resp *Response, err os.Error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resp, err = ReadResponse(r, req.Method)
|
resp, err = cc.readRes(r, req.Method)
|
||||||
cc.lk.Lock()
|
cc.lk.Lock()
|
||||||
defer cc.lk.Unlock()
|
defer cc.lk.Unlock()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -12,31 +12,33 @@ import (
|
|||||||
// TODO(mattn):
|
// TODO(mattn):
|
||||||
// test ProxyAuth
|
// test ProxyAuth
|
||||||
|
|
||||||
var MatchNoProxyTests = []struct {
|
var UseProxyTests = []struct {
|
||||||
host string
|
host string
|
||||||
match bool
|
match bool
|
||||||
}{
|
}{
|
||||||
{"localhost", true}, // match completely
|
{"localhost", false}, // match completely
|
||||||
{"barbaz.net", true}, // match as .barbaz.net
|
{"barbaz.net", false}, // match as .barbaz.net
|
||||||
{"foobar.com:443", true}, // have a port but match
|
{"foobar.com:443", false}, // have a port but match
|
||||||
{"foofoobar.com", false}, // not match as a part of foobar.com
|
{"foofoobar.com", true}, // not match as a part of foobar.com
|
||||||
{"baz.com", false}, // not match as a part of barbaz.com
|
{"baz.com", true}, // not match as a part of barbaz.com
|
||||||
{"localhost.net", false}, // not match as suffix of address
|
{"localhost.net", true}, // not match as suffix of address
|
||||||
{"local.localhost", false}, // not match as prefix as address
|
{"local.localhost", true}, // not match as prefix as address
|
||||||
{"barbarbaz.net", false}, // not match because NO_PROXY have a '.'
|
{"barbarbaz.net", true}, // not match because NO_PROXY have a '.'
|
||||||
{"www.foobar.com", false}, // not match because NO_PROXY is not .foobar.com
|
{"www.foobar.com", true}, // not match because NO_PROXY is not .foobar.com
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestMatchNoProxy(t *testing.T) {
|
func TestUseProxy(t *testing.T) {
|
||||||
oldenv := os.Getenv("NO_PROXY")
|
oldenv := os.Getenv("NO_PROXY")
|
||||||
no_proxy := "foobar.com, .barbaz.net , localhost"
|
no_proxy := "foobar.com, .barbaz.net , localhost"
|
||||||
os.Setenv("NO_PROXY", no_proxy)
|
os.Setenv("NO_PROXY", no_proxy)
|
||||||
defer os.Setenv("NO_PROXY", oldenv)
|
defer os.Setenv("NO_PROXY", oldenv)
|
||||||
|
|
||||||
for _, test := range MatchNoProxyTests {
|
tr := &Transport{}
|
||||||
if matchNoProxy(test.host) != test.match {
|
|
||||||
|
for _, test := range UseProxyTests {
|
||||||
|
if tr.useProxy(test.host) != test.match {
|
||||||
if test.match {
|
if test.match {
|
||||||
t.Errorf("matchNoProxy(%v) = %v, want %v", test.host, !test.match, test.match)
|
t.Errorf("useProxy(%v) = %v, want %v", test.host, !test.match, test.match)
|
||||||
} else {
|
} else {
|
||||||
t.Errorf("not expected: '%s' shouldn't match as '%s'", test.host, no_proxy)
|
t.Errorf("not expected: '%s' shouldn't match as '%s'", test.host, no_proxy)
|
||||||
}
|
}
|
||||||
|
@ -250,7 +250,9 @@ func TestServerTimeouts(t *testing.T) {
|
|||||||
url := fmt.Sprintf("http://localhost:%d/", addr.Port)
|
url := fmt.Sprintf("http://localhost:%d/", addr.Port)
|
||||||
|
|
||||||
// Hit the HTTP server successfully.
|
// Hit the HTTP server successfully.
|
||||||
r, _, err := Get(url)
|
tr := &Transport{DisableKeepAlives: true} // they interfere with this test
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
r, _, err := c.Get(url)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("http Get #1: %v", err)
|
t.Fatalf("http Get #1: %v", err)
|
||||||
}
|
}
|
||||||
@ -335,6 +337,7 @@ func TestIdentityResponse(t *testing.T) {
|
|||||||
t.Errorf("for %s expected len(res.TransferEncoding) of %d; got %d (%v)",
|
t.Errorf("for %s expected len(res.TransferEncoding) of %d; got %d (%v)",
|
||||||
url, expected, tl, res.TransferEncoding)
|
url, expected, tl, res.TransferEncoding)
|
||||||
}
|
}
|
||||||
|
res.Body.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
// Verify that ErrContentLength is returned
|
// Verify that ErrContentLength is returned
|
||||||
@ -343,7 +346,6 @@ func TestIdentityResponse(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("error with Get of %s: %v", url, err)
|
t.Fatalf("error with Get of %s: %v", url, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Verify that the connection is closed when the declared Content-Length
|
// Verify that the connection is closed when the declared Content-Length
|
||||||
// is larger than what the handler wrote.
|
// is larger than what the handler wrote.
|
||||||
conn, err := net.Dial("tcp", "", ts.Listener.Addr().String())
|
conn, err := net.Dial("tcp", "", ts.Listener.Addr().String())
|
||||||
|
@ -9,6 +9,8 @@ import (
|
|||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"encoding/base64"
|
"encoding/base64"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
"net"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
@ -20,22 +22,24 @@ import (
|
|||||||
// each call to Do and uses HTTP proxies as directed by the
|
// each call to Do and uses HTTP proxies as directed by the
|
||||||
// $HTTP_PROXY and $NO_PROXY (or $http_proxy and $no_proxy)
|
// $HTTP_PROXY and $NO_PROXY (or $http_proxy and $no_proxy)
|
||||||
// environment variables.
|
// environment variables.
|
||||||
var DefaultTransport RoundTripper = &transport{}
|
var DefaultTransport RoundTripper = &Transport{}
|
||||||
|
|
||||||
// transport implements Tranport for the default case, using TCP
|
// Transport is an implementation of RoundTripper that supports http,
|
||||||
// connections to either the host or a proxy, serving http or https
|
// https, and http proxies (for either http or https with CONNECT).
|
||||||
// schemes. In the future this may become public and support options
|
// Transport can also cache connections for future re-use.
|
||||||
// on keep-alive connection duration, pipelining controls, etc. For
|
type Transport struct {
|
||||||
// now this is simply a port of the old Go code client code to the
|
lk sync.Mutex
|
||||||
// Transport interface.
|
idleConn map[string][]*persistConn
|
||||||
type transport struct {
|
|
||||||
// TODO: keep-alives, pipelining, etc using a map from
|
// TODO: tunables on max cached connections (total, per-server), duration
|
||||||
// scheme/host to a connection. Something like:
|
// TODO: optional pipelining
|
||||||
l sync.Mutex
|
|
||||||
hostConn map[string]*ClientConn
|
IgnoreEnvironment bool // don't look at environment variables for proxy configuration
|
||||||
|
DisableKeepAlives bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ct *transport) RoundTrip(req *Request) (resp *Response, err os.Error) {
|
// RoundTrip implements the RoundTripper interface.
|
||||||
|
func (t *Transport) RoundTrip(req *Request) (resp *Response, err os.Error) {
|
||||||
if req.URL == nil {
|
if req.URL == nil {
|
||||||
if req.URL, err = ParseURL(req.RawURL); err != nil {
|
if req.URL, err = ParseURL(req.RawURL); err != nil {
|
||||||
return
|
return
|
||||||
@ -45,26 +49,71 @@ func (ct *transport) RoundTrip(req *Request) (resp *Response, err os.Error) {
|
|||||||
return nil, &badStringError{"unsupported protocol scheme", req.URL.Scheme}
|
return nil, &badStringError{"unsupported protocol scheme", req.URL.Scheme}
|
||||||
}
|
}
|
||||||
|
|
||||||
addr := req.URL.Host
|
cm, err := t.connectMethodForRequest(req)
|
||||||
if !hasPort(addr) {
|
if err != nil {
|
||||||
addr += ":" + req.URL.Scheme
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
var proxyURL *URL
|
// Get the cached or newly-created connection to either the
|
||||||
proxyAuth := ""
|
// host (for http or https), the http proxy, or the http proxy
|
||||||
proxy := ""
|
// pre-CONNECTed to https server. In any case, we'll be ready
|
||||||
if !matchNoProxy(addr) {
|
// to send it requests.
|
||||||
proxy = os.Getenv("HTTP_PROXY")
|
pconn, err := t.getConn(cm)
|
||||||
if proxy == "" {
|
if err != nil {
|
||||||
proxy = os.Getenv("http_proxy")
|
return nil, err
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var write = (*Request).Write
|
return pconn.roundTrip(req)
|
||||||
|
}
|
||||||
|
|
||||||
if proxy != "" {
|
// CloseIdleConnections closes any connections which were previously
|
||||||
write = (*Request).WriteProxy
|
// connected from previous requests but are now sitting idle in
|
||||||
proxyURL, err = ParseRequestURL(proxy)
|
// a "keep-alive" state. It does not interrupt any connections currently
|
||||||
|
// in use.
|
||||||
|
func (t *Transport) CloseIdleConnections() {
|
||||||
|
t.lk.Lock()
|
||||||
|
defer t.lk.Unlock()
|
||||||
|
if t.idleConn == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for _, conns := range t.idleConn {
|
||||||
|
for _, pconn := range conns {
|
||||||
|
pconn.close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
t.idleConn = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Private implementation past this point.
|
||||||
|
//
|
||||||
|
|
||||||
|
func (t *Transport) getenvEitherCase(k string) string {
|
||||||
|
if t.IgnoreEnvironment {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
if v := t.getenv(strings.ToUpper(k)); v != "" {
|
||||||
|
return v
|
||||||
|
}
|
||||||
|
return t.getenv(strings.ToLower(k))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Transport) getenv(k string) string {
|
||||||
|
if t.IgnoreEnvironment {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return os.Getenv(k)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Transport) connectMethodForRequest(req *Request) (*connectMethod, os.Error) {
|
||||||
|
cm := &connectMethod{
|
||||||
|
targetScheme: req.URL.Scheme,
|
||||||
|
targetAddr: canonicalAddr(req.URL),
|
||||||
|
}
|
||||||
|
|
||||||
|
proxy := t.getenvEitherCase("HTTP_PROXY")
|
||||||
|
if proxy != "" && t.useProxy(cm.targetAddr) {
|
||||||
|
proxyURL, err := ParseRequestURL(proxy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, os.ErrorString("invalid proxy address")
|
return nil, os.ErrorString("invalid proxy address")
|
||||||
}
|
}
|
||||||
@ -74,39 +123,111 @@ func (ct *transport) RoundTrip(req *Request) (resp *Response, err os.Error) {
|
|||||||
return nil, os.ErrorString("invalid proxy address")
|
return nil, os.ErrorString("invalid proxy address")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
addr = proxyURL.Host
|
cm.proxyURL = proxyURL
|
||||||
proxyInfo := proxyURL.RawUserinfo
|
}
|
||||||
|
return cm, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// proxyAuth returns the Proxy-Authorization header to set
|
||||||
|
// on requests, if applicable.
|
||||||
|
func (cm *connectMethod) proxyAuth() string {
|
||||||
|
if cm.proxyURL == nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
proxyInfo := cm.proxyURL.RawUserinfo
|
||||||
if proxyInfo != "" {
|
if proxyInfo != "" {
|
||||||
enc := base64.URLEncoding
|
enc := base64.URLEncoding
|
||||||
encoded := make([]byte, enc.EncodedLen(len(proxyInfo)))
|
encoded := make([]byte, enc.EncodedLen(len(proxyInfo)))
|
||||||
enc.Encode(encoded, []byte(proxyInfo))
|
enc.Encode(encoded, []byte(proxyInfo))
|
||||||
proxyAuth = "Basic " + string(encoded)
|
return "Basic " + string(encoded)
|
||||||
}
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Transport) putIdleConn(pconn *persistConn) {
|
||||||
|
t.lk.Lock()
|
||||||
|
defer t.lk.Unlock()
|
||||||
|
if t.DisableKeepAlives {
|
||||||
|
pconn.close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if pconn.isBroken() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
key := pconn.cacheKey
|
||||||
|
t.idleConn[key] = append(t.idleConn[key], pconn)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Transport) getIdleConn(cm *connectMethod) (pconn *persistConn) {
|
||||||
|
t.lk.Lock()
|
||||||
|
defer t.lk.Unlock()
|
||||||
|
if t.idleConn == nil {
|
||||||
|
t.idleConn = make(map[string][]*persistConn)
|
||||||
|
}
|
||||||
|
key := cm.String()
|
||||||
|
for {
|
||||||
|
pconns, ok := t.idleConn[key]
|
||||||
|
if !ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if len(pconns) == 1 {
|
||||||
|
pconn = pconns[0]
|
||||||
|
t.idleConn[key] = nil, false
|
||||||
|
} else {
|
||||||
|
// 2 or more cached connections; pop last
|
||||||
|
// TODO: queue?
|
||||||
|
pconn = pconns[len(pconns)-1]
|
||||||
|
t.idleConn[key] = pconns[0 : len(pconns)-1]
|
||||||
|
}
|
||||||
|
if !pconn.isBroken() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// getConn dials and creates a new persistConn to the target as
|
||||||
|
// specified in the connectMethod. This includes doing a proxy CONNECT
|
||||||
|
// and/or setting up TLS. If this doesn't return an error, the persistConn
|
||||||
|
// is ready to write requests to.
|
||||||
|
func (t *Transport) getConn(cm *connectMethod) (*persistConn, os.Error) {
|
||||||
|
if pc := t.getIdleConn(cm); pc != nil {
|
||||||
|
return pc, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Connect to server or proxy
|
conn, err := net.Dial("tcp", "", cm.addr())
|
||||||
conn, err := net.Dial("tcp", "", addr)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if req.URL.Scheme == "http" {
|
pa := cm.proxyAuth()
|
||||||
// Include proxy http header if needed.
|
|
||||||
if proxyAuth != "" {
|
pconn := &persistConn{
|
||||||
req.Header.Set("Proxy-Authorization", proxyAuth)
|
t: t,
|
||||||
|
cacheKey: cm.String(),
|
||||||
|
conn: conn,
|
||||||
|
reqch: make(chan requestAndChan, 50),
|
||||||
}
|
}
|
||||||
} else { // https
|
newClientConnFunc := NewClientConn
|
||||||
if proxyURL != nil {
|
|
||||||
// Ask proxy for direct connection to server.
|
switch {
|
||||||
// addr defaults above to ":https" but we need to use numbers
|
case cm.proxyURL == nil:
|
||||||
addr = req.URL.Host
|
// Do nothing.
|
||||||
if !hasPort(addr) {
|
case cm.targetScheme == "http":
|
||||||
addr += ":443"
|
newClientConnFunc = NewProxyClientConn
|
||||||
|
if pa != "" {
|
||||||
|
pconn.mutateRequestFunc = func(req *Request) {
|
||||||
|
if req.Header == nil {
|
||||||
|
req.Header = make(Header)
|
||||||
}
|
}
|
||||||
fmt.Fprintf(conn, "CONNECT %s HTTP/1.1\r\n", addr)
|
req.Header.Set("Proxy-Authorization", pa)
|
||||||
fmt.Fprintf(conn, "Host: %s\r\n", addr)
|
}
|
||||||
if proxyAuth != "" {
|
}
|
||||||
fmt.Fprintf(conn, "Proxy-Authorization: %s\r\n", proxyAuth)
|
case cm.targetScheme == "https":
|
||||||
|
fmt.Fprintf(conn, "CONNECT %s HTTP/1.1\r\n", cm.targetAddr)
|
||||||
|
fmt.Fprintf(conn, "Host: %s\r\n", cm.targetAddr)
|
||||||
|
if pa != "" {
|
||||||
|
fmt.Fprintf(conn, "Proxy-Authorization: %s\r\n", pa)
|
||||||
}
|
}
|
||||||
fmt.Fprintf(conn, "\r\n")
|
fmt.Fprintf(conn, "\r\n")
|
||||||
|
|
||||||
@ -116,41 +237,291 @@ func (ct *transport) RoundTrip(req *Request) (resp *Response, err os.Error) {
|
|||||||
br := bufio.NewReader(conn)
|
br := bufio.NewReader(conn)
|
||||||
resp, err := ReadResponse(br, "CONNECT")
|
resp, err := ReadResponse(br, "CONNECT")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
conn.Close()
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if resp.StatusCode != 200 {
|
if resp.StatusCode != 200 {
|
||||||
f := strings.Split(resp.Status, " ", 2)
|
f := strings.Split(resp.Status, " ", 2)
|
||||||
|
conn.Close()
|
||||||
return nil, os.ErrorString(f[1])
|
return nil, os.ErrorString(f[1])
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if cm.targetScheme == "https" {
|
||||||
// Initiate TLS and check remote host name against certificate.
|
// Initiate TLS and check remote host name against certificate.
|
||||||
conn = tls.Client(conn, nil)
|
conn = tls.Client(conn, nil)
|
||||||
if err = conn.(*tls.Conn).Handshake(); err != nil {
|
if err = conn.(*tls.Conn).Handshake(); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
h := req.URL.Host
|
if err = conn.(*tls.Conn).VerifyHostname(cm.tlsHost()); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
pconn.conn = conn
|
||||||
|
}
|
||||||
|
|
||||||
|
pconn.br = bufio.NewReader(pconn.conn)
|
||||||
|
pconn.cc = newClientConnFunc(conn, pconn.br)
|
||||||
|
pconn.cc.readRes = readResponseWithEOFSignal
|
||||||
|
go pconn.readLoop()
|
||||||
|
return pconn, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// useProxy returns true if requests to addr should use a proxy,
|
||||||
|
// according to the NO_PROXY or no_proxy environment variable.
|
||||||
|
func (t *Transport) useProxy(addr string) bool {
|
||||||
|
if len(addr) == 0 {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
no_proxy := t.getenvEitherCase("NO_PROXY")
|
||||||
|
if no_proxy == "*" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
addr = strings.ToLower(strings.TrimSpace(addr))
|
||||||
|
if hasPort(addr) {
|
||||||
|
addr = addr[:strings.LastIndex(addr, ":")]
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, p := range strings.Split(no_proxy, ",", -1) {
|
||||||
|
p = strings.ToLower(strings.TrimSpace(p))
|
||||||
|
if len(p) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if hasPort(p) {
|
||||||
|
p = p[:strings.LastIndex(p, ":")]
|
||||||
|
}
|
||||||
|
if addr == p || (p[0] == '.' && (strings.HasSuffix(addr, p) || addr == p[1:])) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// connectMethod is the map key (in its String form) for keeping persistent
|
||||||
|
// TCP connections alive for subsequent HTTP requests.
|
||||||
|
//
|
||||||
|
// A connect method may be of the following types:
|
||||||
|
//
|
||||||
|
// Cache key form Description
|
||||||
|
// ----------------- -------------------------
|
||||||
|
// ||http|foo.com http directly to server, no proxy
|
||||||
|
// ||https|foo.com https directly to server, no proxy
|
||||||
|
// http://proxy.com|https|foo.com http to proxy, then CONNECT to foo.com
|
||||||
|
// http://proxy.com|http http to proxy, http to anywhere after that
|
||||||
|
//
|
||||||
|
// Note: no support to https to the proxy yet.
|
||||||
|
//
|
||||||
|
type connectMethod struct {
|
||||||
|
proxyURL *URL // "" for no proxy, else full proxy URL
|
||||||
|
targetScheme string // "http" or "https"
|
||||||
|
targetAddr string // Not used if proxy + http targetScheme (4th example in table)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ck *connectMethod) String() string {
|
||||||
|
proxyStr := ""
|
||||||
|
if ck.proxyURL != nil {
|
||||||
|
proxyStr = ck.proxyURL.String()
|
||||||
|
}
|
||||||
|
return strings.Join([]string{proxyStr, ck.targetScheme, ck.targetAddr}, "|")
|
||||||
|
}
|
||||||
|
|
||||||
|
// addr returns the first hop "host:port" to which we need to TCP connect.
|
||||||
|
func (cm *connectMethod) addr() string {
|
||||||
|
if cm.proxyURL != nil {
|
||||||
|
return canonicalAddr(cm.proxyURL)
|
||||||
|
}
|
||||||
|
return cm.targetAddr
|
||||||
|
}
|
||||||
|
|
||||||
|
// tlsHost returns the host name to match against the peer's
|
||||||
|
// TLS certificate.
|
||||||
|
func (cm *connectMethod) tlsHost() string {
|
||||||
|
h := cm.targetAddr
|
||||||
if hasPort(h) {
|
if hasPort(h) {
|
||||||
h = h[:strings.LastIndex(h, ":")]
|
h = h[:strings.LastIndex(h, ":")]
|
||||||
}
|
}
|
||||||
if err = conn.(*tls.Conn).VerifyHostname(h); err != nil {
|
return h
|
||||||
return nil, err
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
err = write(req, conn)
|
type readResult struct {
|
||||||
|
res *Response // either res or err will be set
|
||||||
|
err os.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
type writeRequest struct {
|
||||||
|
// Set by client (in pc.roundTrip)
|
||||||
|
req *Request
|
||||||
|
resch chan *readResult
|
||||||
|
|
||||||
|
// Set by writeLoop if an error writing headers.
|
||||||
|
writeErr os.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
// persistConn wraps a connection, usually a persistent one
|
||||||
|
// (but may be used for non-keep-alive requests as well)
|
||||||
|
type persistConn struct {
|
||||||
|
t *Transport
|
||||||
|
cacheKey string // its connectMethod.String()
|
||||||
|
conn net.Conn
|
||||||
|
cc *ClientConn
|
||||||
|
br *bufio.Reader
|
||||||
|
reqch chan requestAndChan // written by roundTrip(); read by readLoop()
|
||||||
|
mutateRequestFunc func(*Request) // nil or func to modify each outbound request
|
||||||
|
|
||||||
|
lk sync.Mutex // guards numExpectedResponses and broken
|
||||||
|
numExpectedResponses int
|
||||||
|
broken bool // an error has happened on this connection; marked broken so it's not reused.
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *persistConn) isBroken() bool {
|
||||||
|
pc.lk.Lock()
|
||||||
|
defer pc.lk.Unlock()
|
||||||
|
return pc.broken
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *persistConn) expectingResponse() bool {
|
||||||
|
pc.lk.Lock()
|
||||||
|
defer pc.lk.Unlock()
|
||||||
|
return pc.numExpectedResponses > 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *persistConn) readLoop() {
|
||||||
|
alive := true
|
||||||
|
for alive {
|
||||||
|
pb, err := pc.br.Peek(1)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
conn.Close()
|
if (err == os.EOF || err == os.EINVAL) && !pc.expectingResponse() {
|
||||||
return nil, err
|
// Remote side closed on us. (We probably hit their
|
||||||
|
// max idle timeout)
|
||||||
|
pc.close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !pc.expectingResponse() {
|
||||||
|
log.Printf("Unsolicited response received on idle HTTP channel starting with %q; err=%v",
|
||||||
|
string(pb), err)
|
||||||
|
pc.close()
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
reader := bufio.NewReader(conn)
|
rc := <-pc.reqch
|
||||||
resp, err = ReadResponse(reader, req.Method)
|
resp, err := pc.cc.Read(rc.req)
|
||||||
|
if err == nil && !rc.req.Close {
|
||||||
|
pc.t.putIdleConn(pc)
|
||||||
|
}
|
||||||
|
if err == ErrPersistEOF {
|
||||||
|
// Succeeded, but we can't send any more
|
||||||
|
// persistent connections on this again. We
|
||||||
|
// hide this error to upstream callers.
|
||||||
|
alive = false
|
||||||
|
err = nil
|
||||||
|
} else if err != nil {
|
||||||
|
alive = false
|
||||||
|
}
|
||||||
|
rc.ch <- responseAndError{resp, err}
|
||||||
|
|
||||||
|
// Wait for the just-returned response body to be fully consumed
|
||||||
|
// before we race and peek on the underlying bufio reader.
|
||||||
|
if alive {
|
||||||
|
<-resp.Body.(*bodyEOFSignal).ch
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type responseAndError struct {
|
||||||
|
res *Response
|
||||||
|
err os.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
type requestAndChan struct {
|
||||||
|
req *Request
|
||||||
|
ch chan responseAndError
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *persistConn) roundTrip(req *Request) (resp *Response, err os.Error) {
|
||||||
|
if pc.mutateRequestFunc != nil {
|
||||||
|
pc.mutateRequestFunc(req)
|
||||||
|
}
|
||||||
|
|
||||||
|
pc.lk.Lock()
|
||||||
|
pc.numExpectedResponses++
|
||||||
|
pc.lk.Unlock()
|
||||||
|
|
||||||
|
err = pc.cc.Write(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
conn.Close()
|
pc.close()
|
||||||
return nil, err
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
resp.Body = readClose{resp.Body, conn}
|
ch := make(chan responseAndError, 1)
|
||||||
|
pc.reqch <- requestAndChan{req, ch}
|
||||||
|
re := <-ch
|
||||||
|
pc.lk.Lock()
|
||||||
|
pc.numExpectedResponses--
|
||||||
|
pc.lk.Unlock()
|
||||||
|
return re.res, re.err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pc *persistConn) close() {
|
||||||
|
pc.lk.Lock()
|
||||||
|
defer pc.lk.Unlock()
|
||||||
|
pc.broken = true
|
||||||
|
pc.cc.Close()
|
||||||
|
pc.conn.Close()
|
||||||
|
pc.mutateRequestFunc = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var portMap = map[string]string{
|
||||||
|
"http": "80",
|
||||||
|
"https": "443",
|
||||||
|
}
|
||||||
|
|
||||||
|
// canonicalAddr returns url.Host but always with a ":port" suffix
|
||||||
|
func canonicalAddr(url *URL) string {
|
||||||
|
addr := url.Host
|
||||||
|
if !hasPort(addr) {
|
||||||
|
return addr + ":" + portMap[url.Scheme]
|
||||||
|
}
|
||||||
|
return addr
|
||||||
|
}
|
||||||
|
|
||||||
|
func responseIsKeepAlive(res *Response) bool {
|
||||||
|
// TODO: implement. for now just always shutting down the connection.
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// readResponseWithEOFSignal is a wrapper around ReadResponse that replaces
|
||||||
|
// the response body with a bodyEOFSignal-wrapped version.
|
||||||
|
func readResponseWithEOFSignal(r *bufio.Reader, requestMethod string) (resp *Response, err os.Error) {
|
||||||
|
resp, err = ReadResponse(r, requestMethod)
|
||||||
|
if err == nil {
|
||||||
|
resp.Body = &bodyEOFSignal{resp.Body, make(chan bool, 1), false}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// bodyEOFSignal wraps a ReadCloser but sends on ch once once
|
||||||
|
// the wrapped ReadCloser is fully consumed (including on Close)
|
||||||
|
type bodyEOFSignal struct {
|
||||||
|
body io.ReadCloser
|
||||||
|
ch chan bool
|
||||||
|
done bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (es *bodyEOFSignal) Read(p []byte) (n int, err os.Error) {
|
||||||
|
n, err = es.body.Read(p)
|
||||||
|
if err == os.EOF && !es.done {
|
||||||
|
es.ch <- true
|
||||||
|
es.done = true
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (es *bodyEOFSignal) Close() (err os.Error) {
|
||||||
|
err = es.body.Close()
|
||||||
|
if err == nil && !es.done {
|
||||||
|
es.ch <- true
|
||||||
|
es.done = true
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -11,9 +11,204 @@ import (
|
|||||||
. "http"
|
. "http"
|
||||||
"http/httptest"
|
"http/httptest"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// TODO: test 5 pipelined requests with responses: 1) OK, 2) OK, Connection: Close
|
||||||
|
// and then verify that the final 2 responses get errors back.
|
||||||
|
|
||||||
|
// hostPortHandler writes back the client's "host:port".
|
||||||
|
var hostPortHandler = HandlerFunc(func(w ResponseWriter, r *Request) {
|
||||||
|
if r.FormValue("close") == "true" {
|
||||||
|
w.Header().Set("Connection", "close")
|
||||||
|
}
|
||||||
|
fmt.Fprintf(w, "%s", r.RemoteAddr)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Two subsequent requests and verify their response is the same.
|
||||||
|
// The response from the server is our own IP:port
|
||||||
|
func TestTransportKeepAlives(t *testing.T) {
|
||||||
|
ts := httptest.NewServer(hostPortHandler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
for _, disableKeepAlive := range []bool{false, true} {
|
||||||
|
tr := &Transport{DisableKeepAlives: disableKeepAlive}
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
|
||||||
|
fetch := func(n int) string {
|
||||||
|
res, _, err := c.Get(ts.URL)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in disableKeepAlive=%v, req #%d, GET: %v", disableKeepAlive, n, err)
|
||||||
|
}
|
||||||
|
body, err := ioutil.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in disableKeepAlive=%v, req #%d, ReadAll: %v", disableKeepAlive, n, err)
|
||||||
|
}
|
||||||
|
return string(body)
|
||||||
|
}
|
||||||
|
|
||||||
|
body1 := fetch(1)
|
||||||
|
body2 := fetch(2)
|
||||||
|
|
||||||
|
bodiesDiffer := body1 != body2
|
||||||
|
if bodiesDiffer != disableKeepAlive {
|
||||||
|
t.Errorf("error in disableKeepAlive=%v. unexpected bodiesDiffer=%v; body1=%q; body2=%q",
|
||||||
|
disableKeepAlive, bodiesDiffer, body1, body2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTransportConnectionCloseOnResponse(t *testing.T) {
|
||||||
|
ts := httptest.NewServer(hostPortHandler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
for _, connectionClose := range []bool{false, true} {
|
||||||
|
tr := &Transport{}
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
|
||||||
|
fetch := func(n int) string {
|
||||||
|
req := new(Request)
|
||||||
|
var err os.Error
|
||||||
|
req.URL, err = ParseURL(ts.URL + fmt.Sprintf("?close=%v", connectionClose))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("URL parse error: %v", err)
|
||||||
|
}
|
||||||
|
req.Method = "GET"
|
||||||
|
req.Proto = "HTTP/1.1"
|
||||||
|
req.ProtoMajor = 1
|
||||||
|
req.ProtoMinor = 1
|
||||||
|
|
||||||
|
res, err := c.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in connectionClose=%v, req #%d, Do: %v", connectionClose, n, err)
|
||||||
|
}
|
||||||
|
body, err := ioutil.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in connectionClose=%v, req #%d, ReadAll: %v", connectionClose, n, err)
|
||||||
|
}
|
||||||
|
return string(body)
|
||||||
|
}
|
||||||
|
|
||||||
|
body1 := fetch(1)
|
||||||
|
body2 := fetch(2)
|
||||||
|
bodiesDiffer := body1 != body2
|
||||||
|
if bodiesDiffer != connectionClose {
|
||||||
|
t.Errorf("error in connectionClose=%v. unexpected bodiesDiffer=%v; body1=%q; body2=%q",
|
||||||
|
connectionClose, bodiesDiffer, body1, body2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTransportConnectionCloseOnRequest(t *testing.T) {
|
||||||
|
ts := httptest.NewServer(hostPortHandler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
for _, connectionClose := range []bool{false, true} {
|
||||||
|
tr := &Transport{}
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
|
||||||
|
fetch := func(n int) string {
|
||||||
|
req := new(Request)
|
||||||
|
var err os.Error
|
||||||
|
req.URL, err = ParseURL(ts.URL)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("URL parse error: %v", err)
|
||||||
|
}
|
||||||
|
req.Method = "GET"
|
||||||
|
req.Proto = "HTTP/1.1"
|
||||||
|
req.ProtoMajor = 1
|
||||||
|
req.ProtoMinor = 1
|
||||||
|
req.Close = connectionClose
|
||||||
|
|
||||||
|
res, err := c.Do(req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in connectionClose=%v, req #%d, Do: %v", connectionClose, n, err)
|
||||||
|
}
|
||||||
|
body, err := ioutil.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in connectionClose=%v, req #%d, ReadAll: %v", connectionClose, n, err)
|
||||||
|
}
|
||||||
|
return string(body)
|
||||||
|
}
|
||||||
|
|
||||||
|
body1 := fetch(1)
|
||||||
|
body2 := fetch(2)
|
||||||
|
bodiesDiffer := body1 != body2
|
||||||
|
if bodiesDiffer != connectionClose {
|
||||||
|
t.Errorf("error in connectionClose=%v. unexpected bodiesDiffer=%v; body1=%q; body2=%q",
|
||||||
|
connectionClose, bodiesDiffer, body1, body2)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTransportIdleCacheKeys(t *testing.T) {
|
||||||
|
ts := httptest.NewServer(hostPortHandler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
tr := &Transport{DisableKeepAlives: false}
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
|
||||||
|
if e, g := 0, len(tr.IdleConnKeysForTesting()); e != g {
|
||||||
|
t.Errorf("After CloseIdleConnections expected %d idle conn cache keys; got %d", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, _, err := c.Get(ts.URL); err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
keys := tr.IdleConnKeysForTesting()
|
||||||
|
if e, g := 1, len(keys); e != g {
|
||||||
|
t.Fatalf("After Get expected %d idle conn cache keys; got %d", e, g)
|
||||||
|
}
|
||||||
|
|
||||||
|
if e := "|http|" + ts.Listener.Addr().String(); keys[0] != e {
|
||||||
|
t.Logf("Expected idle cache key %q; got %q", e, keys[0])
|
||||||
|
}
|
||||||
|
|
||||||
|
tr.CloseIdleConnections()
|
||||||
|
if e, g := 0, len(tr.IdleConnKeysForTesting()); e != g {
|
||||||
|
t.Errorf("After CloseIdleConnections expected %d idle conn cache keys; got %d", e, g)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTransportServerClosingUnexpectedly(t *testing.T) {
|
||||||
|
ts := httptest.NewServer(hostPortHandler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
tr := &Transport{}
|
||||||
|
c := &Client{Transport: tr}
|
||||||
|
|
||||||
|
fetch := func(n int) string {
|
||||||
|
res, _, err := c.Get(ts.URL)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in req #%d, GET: %v", n, err)
|
||||||
|
}
|
||||||
|
body, err := ioutil.ReadAll(res.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error in req #%d, ReadAll: %v", n, err)
|
||||||
|
}
|
||||||
|
res.Body.Close()
|
||||||
|
return string(body)
|
||||||
|
}
|
||||||
|
|
||||||
|
body1 := fetch(1)
|
||||||
|
body2 := fetch(2)
|
||||||
|
|
||||||
|
ts.CloseClientConnections() // surprise!
|
||||||
|
time.Sleep(25e6) // idle for a bit (test is inherently racey, but expectedly)
|
||||||
|
|
||||||
|
body3 := fetch(3)
|
||||||
|
|
||||||
|
if body1 != body2 {
|
||||||
|
t.Errorf("expected body1 and body2 to be equal")
|
||||||
|
}
|
||||||
|
if body2 == body3 {
|
||||||
|
t.Errorf("expected body2 and body3 to be different")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestTransportNilURL(t *testing.T) {
|
func TestTransportNilURL(t *testing.T) {
|
||||||
ts := httptest.NewServer(HandlerFunc(func(w ResponseWriter, r *Request) {
|
ts := httptest.NewServer(HandlerFunc(func(w ResponseWriter, r *Request) {
|
||||||
fmt.Fprintf(w, "Hi")
|
fmt.Fprintf(w, "Hi")
|
||||||
@ -28,9 +223,8 @@ func TestTransportNilURL(t *testing.T) {
|
|||||||
req.ProtoMajor = 1
|
req.ProtoMajor = 1
|
||||||
req.ProtoMinor = 1
|
req.ProtoMinor = 1
|
||||||
|
|
||||||
// TODO(bradfitz): test &transport{} and not DefaultTransport
|
tr := &Transport{}
|
||||||
// once Transport is exported.
|
res, err := tr.RoundTrip(req)
|
||||||
res, err := DefaultTransport.RoundTrip(req)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected RoundTrip error: %v", err)
|
t.Fatalf("unexpected RoundTrip error: %v", err)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user