| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "quiche/quic/core/http/quic_spdy_stream.h" |
| |
| #include <limits> |
| #include <memory> |
| #include <string> |
| #include <utility> |
| |
| #include "absl/base/macros.h" |
| #include "absl/strings/numbers.h" |
| #include "absl/strings/str_cat.h" |
| #include "absl/strings/string_view.h" |
| #include "quiche/http2/http2_constants.h" |
| #include "quiche/quic/core/http/capsule.h" |
| #include "quiche/quic/core/http/http_constants.h" |
| #include "quiche/quic/core/http/http_decoder.h" |
| #include "quiche/quic/core/http/http_frames.h" |
| #include "quiche/quic/core/http/quic_spdy_session.h" |
| #include "quiche/quic/core/http/spdy_utils.h" |
| #include "quiche/quic/core/http/web_transport_http3.h" |
| #include "quiche/quic/core/qpack/qpack_decoder.h" |
| #include "quiche/quic/core/qpack/qpack_encoder.h" |
| #include "quiche/quic/core/quic_types.h" |
| #include "quiche/quic/core/quic_utils.h" |
| #include "quiche/quic/core/quic_versions.h" |
| #include "quiche/quic/core/quic_write_blocked_list.h" |
| #include "quiche/quic/core/web_transport_interface.h" |
| #include "quiche/quic/platform/api/quic_bug_tracker.h" |
| #include "quiche/quic/platform/api/quic_flag_utils.h" |
| #include "quiche/quic/platform/api/quic_flags.h" |
| #include "quiche/quic/platform/api/quic_logging.h" |
| #include "quiche/common/quiche_mem_slice_storage.h" |
| #include "quiche/common/quiche_text_utils.h" |
| #include "quiche/spdy/core/spdy_protocol.h" |
| |
| using spdy::Http2HeaderBlock; |
| using spdy::SpdyPriority; |
| |
| namespace quic { |
| |
| // Visitor of HttpDecoder that passes data frame to QuicSpdyStream and closes |
| // the connection on unexpected frames. |
| class QuicSpdyStream::HttpDecoderVisitor : public HttpDecoder::Visitor { |
| public: |
| explicit HttpDecoderVisitor(QuicSpdyStream* stream) : stream_(stream) {} |
| HttpDecoderVisitor(const HttpDecoderVisitor&) = delete; |
| HttpDecoderVisitor& operator=(const HttpDecoderVisitor&) = delete; |
| |
| void OnError(HttpDecoder* decoder) override { |
| stream_->OnUnrecoverableError(decoder->error(), decoder->error_detail()); |
| } |
| |
| bool OnMaxPushIdFrame() override { |
| CloseConnectionOnWrongFrame("Max Push Id"); |
| return false; |
| } |
| |
| bool OnGoAwayFrame(const GoAwayFrame& /*frame*/) override { |
| CloseConnectionOnWrongFrame("Goaway"); |
| return false; |
| } |
| |
| bool OnSettingsFrameStart(QuicByteCount /*header_length*/) override { |
| CloseConnectionOnWrongFrame("Settings"); |
| return false; |
| } |
| |
| bool OnSettingsFrame(const SettingsFrame& /*frame*/) override { |
| CloseConnectionOnWrongFrame("Settings"); |
| return false; |
| } |
| |
| bool OnDataFrameStart(QuicByteCount header_length, |
| QuicByteCount payload_length) override { |
| return stream_->OnDataFrameStart(header_length, payload_length); |
| } |
| |
| bool OnDataFramePayload(absl::string_view payload) override { |
| QUICHE_DCHECK(!payload.empty()); |
| return stream_->OnDataFramePayload(payload); |
| } |
| |
| bool OnDataFrameEnd() override { return stream_->OnDataFrameEnd(); } |
| |
| bool OnHeadersFrameStart(QuicByteCount header_length, |
| QuicByteCount payload_length) override { |
| if (!VersionUsesHttp3(stream_->transport_version())) { |
| CloseConnectionOnWrongFrame("Headers"); |
| return false; |
| } |
| return stream_->OnHeadersFrameStart(header_length, payload_length); |
| } |
| |
| bool OnHeadersFramePayload(absl::string_view payload) override { |
| QUICHE_DCHECK(!payload.empty()); |
| if (!VersionUsesHttp3(stream_->transport_version())) { |
| CloseConnectionOnWrongFrame("Headers"); |
| return false; |
| } |
| return stream_->OnHeadersFramePayload(payload); |
| } |
| |
| bool OnHeadersFrameEnd() override { |
| if (!VersionUsesHttp3(stream_->transport_version())) { |
| CloseConnectionOnWrongFrame("Headers"); |
| return false; |
| } |
| return stream_->OnHeadersFrameEnd(); |
| } |
| |
| bool OnPriorityUpdateFrameStart(QuicByteCount /*header_length*/) override { |
| CloseConnectionOnWrongFrame("Priority update"); |
| return false; |
| } |
| |
| bool OnPriorityUpdateFrame(const PriorityUpdateFrame& /*frame*/) override { |
| CloseConnectionOnWrongFrame("Priority update"); |
| return false; |
| } |
| |
| bool OnAcceptChFrameStart(QuicByteCount /*header_length*/) override { |
| CloseConnectionOnWrongFrame("ACCEPT_CH"); |
| return false; |
| } |
| |
| bool OnAcceptChFrame(const AcceptChFrame& /*frame*/) override { |
| CloseConnectionOnWrongFrame("ACCEPT_CH"); |
| return false; |
| } |
| |
| void OnWebTransportStreamFrameType( |
| QuicByteCount header_length, WebTransportSessionId session_id) override { |
| stream_->OnWebTransportStreamFrameType(header_length, session_id); |
| } |
| |
| bool OnUnknownFrameStart(uint64_t frame_type, QuicByteCount header_length, |
| QuicByteCount payload_length) override { |
| return stream_->OnUnknownFrameStart(frame_type, header_length, |
| payload_length); |
| } |
| |
| bool OnUnknownFramePayload(absl::string_view payload) override { |
| return stream_->OnUnknownFramePayload(payload); |
| } |
| |
| bool OnUnknownFrameEnd() override { return stream_->OnUnknownFrameEnd(); } |
| |
| private: |
| void CloseConnectionOnWrongFrame(absl::string_view frame_type) { |
| stream_->OnUnrecoverableError( |
| QUIC_HTTP_FRAME_UNEXPECTED_ON_SPDY_STREAM, |
| absl::StrCat(frame_type, " frame received on data stream")); |
| } |
| |
| QuicSpdyStream* stream_; |
| }; |
| |
| #define ENDPOINT \ |
| (session()->perspective() == Perspective::IS_SERVER ? "Server: " \ |
| : "Client:" \ |
| " ") |
| |
| namespace { |
| HttpDecoder::Options HttpDecoderOptionsForBidiStream( |
| QuicSpdySession* spdy_session) { |
| HttpDecoder::Options options; |
| options.allow_web_transport_stream = |
| spdy_session->WillNegotiateWebTransport(); |
| return options; |
| } |
| } // namespace |
| |
| QuicSpdyStream::QuicSpdyStream(QuicStreamId id, QuicSpdySession* spdy_session, |
| StreamType type) |
| : QuicStream(id, spdy_session, /*is_static=*/false, type), |
| spdy_session_(spdy_session), |
| on_body_available_called_because_sequencer_is_closed_(false), |
| visitor_(nullptr), |
| blocked_on_decoding_headers_(false), |
| headers_decompressed_(false), |
| header_list_size_limit_exceeded_(false), |
| headers_payload_length_(0), |
| trailers_decompressed_(false), |
| trailers_consumed_(false), |
| http_decoder_visitor_(std::make_unique<HttpDecoderVisitor>(this)), |
| decoder_(http_decoder_visitor_.get(), |
| HttpDecoderOptionsForBidiStream(spdy_session)), |
| sequencer_offset_(0), |
| is_decoder_processing_input_(false), |
| ack_listener_(nullptr), |
| last_sent_urgency_(kDefaultUrgency) { |
| QUICHE_DCHECK_EQ(session()->connection(), spdy_session->connection()); |
| QUICHE_DCHECK_EQ(transport_version(), spdy_session->transport_version()); |
| QUICHE_DCHECK(!QuicUtils::IsCryptoStreamId(transport_version(), id)); |
| QUICHE_DCHECK_EQ(0u, sequencer()->NumBytesConsumed()); |
| // If headers are sent on the headers stream, then do not receive any |
| // callbacks from the sequencer until headers are complete. |
| if (!VersionUsesHttp3(transport_version())) { |
| sequencer()->SetBlockedUntilFlush(); |
| } |
| |
| if (VersionUsesHttp3(transport_version())) { |
| sequencer()->set_level_triggered(true); |
| } |
| |
| spdy_session_->OnStreamCreated(this); |
| } |
| |
| QuicSpdyStream::QuicSpdyStream(PendingStream* pending, |
| QuicSpdySession* spdy_session) |
| : QuicStream(pending, spdy_session, /*is_static=*/false), |
| spdy_session_(spdy_session), |
| on_body_available_called_because_sequencer_is_closed_(false), |
| visitor_(nullptr), |
| blocked_on_decoding_headers_(false), |
| headers_decompressed_(false), |
| header_list_size_limit_exceeded_(false), |
| headers_payload_length_(0), |
| trailers_decompressed_(false), |
| trailers_consumed_(false), |
| http_decoder_visitor_(std::make_unique<HttpDecoderVisitor>(this)), |
| decoder_(http_decoder_visitor_.get()), |
| sequencer_offset_(sequencer()->NumBytesConsumed()), |
| is_decoder_processing_input_(false), |
| ack_listener_(nullptr), |
| last_sent_urgency_(kDefaultUrgency) { |
| QUICHE_DCHECK_EQ(session()->connection(), spdy_session->connection()); |
| QUICHE_DCHECK_EQ(transport_version(), spdy_session->transport_version()); |
| QUICHE_DCHECK(!QuicUtils::IsCryptoStreamId(transport_version(), id())); |
| // If headers are sent on the headers stream, then do not receive any |
| // callbacks from the sequencer until headers are complete. |
| if (!VersionUsesHttp3(transport_version())) { |
| sequencer()->SetBlockedUntilFlush(); |
| } |
| |
| if (VersionUsesHttp3(transport_version())) { |
| sequencer()->set_level_triggered(true); |
| } |
| |
| spdy_session_->OnStreamCreated(this); |
| } |
| |
| QuicSpdyStream::~QuicSpdyStream() {} |
| |
| size_t QuicSpdyStream::WriteHeaders( |
| Http2HeaderBlock header_block, bool fin, |
| quiche::QuicheReferenceCountedPointer<QuicAckListenerInterface> |
| ack_listener) { |
| if (!AssertNotWebTransportDataStream("writing headers")) { |
| return 0; |
| } |
| |
| QuicConnection::ScopedPacketFlusher flusher(spdy_session_->connection()); |
| |
| MaybeProcessSentWebTransportHeaders(header_block); |
| |
| if (web_transport_ != nullptr && |
| spdy_session_->perspective() == Perspective::IS_SERVER) { |
| header_block["sec-webtransport-http3-draft"] = "draft02"; |
| } |
| |
| size_t bytes_written = |
| WriteHeadersImpl(std::move(header_block), fin, std::move(ack_listener)); |
| if (!VersionUsesHttp3(transport_version()) && fin) { |
| // If HEADERS are sent on the headers stream, then |fin_sent_| needs to be |
| // set and write side needs to be closed without actually sending a FIN on |
| // this stream. |
| // TODO(rch): Add test to ensure fin_sent_ is set whenever a fin is sent. |
| SetFinSent(); |
| CloseWriteSide(); |
| } |
| |
| if (web_transport_ != nullptr && |
| session()->perspective() == Perspective::IS_CLIENT) { |
| WriteGreaseCapsule(); |
| if (spdy_session_->http_datagram_support() == |
| HttpDatagramSupport::kDraft04) { |
| // Send a REGISTER_DATAGRAM_NO_CONTEXT capsule to support servers that |
| // are running draft-ietf-masque-h3-datagram-04 or -05. |
| uint64_t capsule_type = 0xff37a2; // REGISTER_DATAGRAM_NO_CONTEXT |
| constexpr unsigned char capsule_data[4] = { |
| 0x80, 0xff, 0x7c, 0x00, // WEBTRANSPORT datagram format type |
| }; |
| WriteCapsule(Capsule::Unknown( |
| capsule_type, |
| absl::string_view(reinterpret_cast<const char*>(capsule_data), |
| sizeof(capsule_data)))); |
| WriteGreaseCapsule(); |
| } |
| } |
| |
| return bytes_written; |
| } |
| |
| void QuicSpdyStream::WriteOrBufferBody(absl::string_view data, bool fin) { |
| if (!AssertNotWebTransportDataStream("writing body data")) { |
| return; |
| } |
| if (!VersionUsesHttp3(transport_version()) || data.length() == 0) { |
| WriteOrBufferData(data, fin, nullptr); |
| return; |
| } |
| QuicConnection::ScopedPacketFlusher flusher(spdy_session_->connection()); |
| |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnDataFrameSent(id(), data.length()); |
| } |
| |
| const bool success = |
| WriteDataFrameHeader(data.length(), /*force_write=*/true); |
| QUICHE_DCHECK(success); |
| |
| // Write body. |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() |
| << " is writing DATA frame payload of length " |
| << data.length() << " with fin " << fin; |
| WriteOrBufferData(data, fin, nullptr); |
| } |
| |
| size_t QuicSpdyStream::WriteTrailers( |
| Http2HeaderBlock trailer_block, |
| quiche::QuicheReferenceCountedPointer<QuicAckListenerInterface> |
| ack_listener) { |
| if (fin_sent()) { |
| QUIC_BUG(quic_bug_10410_1) |
| << "Trailers cannot be sent after a FIN, on stream " << id(); |
| return 0; |
| } |
| |
| if (!VersionUsesHttp3(transport_version())) { |
| // The header block must contain the final offset for this stream, as the |
| // trailers may be processed out of order at the peer. |
| const QuicStreamOffset final_offset = |
| stream_bytes_written() + BufferedDataBytes(); |
| QUIC_DLOG(INFO) << ENDPOINT << "Inserting trailer: (" |
| << kFinalOffsetHeaderKey << ", " << final_offset << ")"; |
| trailer_block.insert( |
| std::make_pair(kFinalOffsetHeaderKey, absl::StrCat(final_offset))); |
| } |
| |
| // Write the trailing headers with a FIN, and close stream for writing: |
| // trailers are the last thing to be sent on a stream. |
| const bool kFin = true; |
| size_t bytes_written = |
| WriteHeadersImpl(std::move(trailer_block), kFin, std::move(ack_listener)); |
| |
| // If trailers are sent on the headers stream, then |fin_sent_| needs to be |
| // set without actually sending a FIN on this stream. |
| if (!VersionUsesHttp3(transport_version())) { |
| SetFinSent(); |
| |
| // Also, write side of this stream needs to be closed. However, only do |
| // this if there is no more buffered data, otherwise it will never be sent. |
| if (BufferedDataBytes() == 0) { |
| CloseWriteSide(); |
| } |
| } |
| |
| return bytes_written; |
| } |
| |
| QuicConsumedData QuicSpdyStream::WritevBody(const struct iovec* iov, int count, |
| bool fin) { |
| quiche::QuicheMemSliceStorage storage( |
| iov, count, |
| session()->connection()->helper()->GetStreamSendBufferAllocator(), |
| GetQuicFlag(quic_send_buffer_max_data_slice_size)); |
| return WriteBodySlices(storage.ToSpan(), fin); |
| } |
| |
| bool QuicSpdyStream::WriteDataFrameHeader(QuicByteCount data_length, |
| bool force_write) { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| QUICHE_DCHECK_GT(data_length, 0u); |
| quiche::QuicheBuffer header = HttpEncoder::SerializeDataFrameHeader( |
| data_length, |
| spdy_session_->connection()->helper()->GetStreamSendBufferAllocator()); |
| const bool can_write = CanWriteNewDataAfterData(header.size()); |
| if (!can_write && !force_write) { |
| return false; |
| } |
| |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnDataFrameSent(id(), data_length); |
| } |
| |
| unacked_frame_headers_offsets_.Add( |
| send_buffer().stream_offset(), |
| send_buffer().stream_offset() + header.size()); |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() |
| << " is writing DATA frame header of length " |
| << header.size(); |
| if (can_write) { |
| // Save one copy and allocation if send buffer can accomodate the header. |
| quiche::QuicheMemSlice header_slice(std::move(header)); |
| WriteMemSlices(absl::MakeSpan(&header_slice, 1), false); |
| } else { |
| QUICHE_DCHECK(force_write); |
| WriteOrBufferData(header.AsStringView(), false, nullptr); |
| } |
| return true; |
| } |
| |
| QuicConsumedData QuicSpdyStream::WriteBodySlices( |
| absl::Span<quiche::QuicheMemSlice> slices, bool fin) { |
| if (!VersionUsesHttp3(transport_version()) || slices.empty()) { |
| return WriteMemSlices(slices, fin); |
| } |
| |
| QuicConnection::ScopedPacketFlusher flusher(spdy_session_->connection()); |
| const QuicByteCount data_size = MemSliceSpanTotalSize(slices); |
| if (!WriteDataFrameHeader(data_size, /*force_write=*/false)) { |
| return {0, false}; |
| } |
| |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() |
| << " is writing DATA frame payload of length " << data_size; |
| return WriteMemSlices(slices, fin); |
| } |
| |
| size_t QuicSpdyStream::Readv(const struct iovec* iov, size_t iov_len) { |
| QUICHE_DCHECK(FinishedReadingHeaders()); |
| if (!VersionUsesHttp3(transport_version())) { |
| return sequencer()->Readv(iov, iov_len); |
| } |
| size_t bytes_read = 0; |
| sequencer()->MarkConsumed(body_manager_.ReadBody(iov, iov_len, &bytes_read)); |
| |
| return bytes_read; |
| } |
| |
| int QuicSpdyStream::GetReadableRegions(iovec* iov, size_t iov_len) const { |
| QUICHE_DCHECK(FinishedReadingHeaders()); |
| if (!VersionUsesHttp3(transport_version())) { |
| return sequencer()->GetReadableRegions(iov, iov_len); |
| } |
| return body_manager_.PeekBody(iov, iov_len); |
| } |
| |
| void QuicSpdyStream::MarkConsumed(size_t num_bytes) { |
| QUICHE_DCHECK(FinishedReadingHeaders()); |
| if (!VersionUsesHttp3(transport_version())) { |
| sequencer()->MarkConsumed(num_bytes); |
| return; |
| } |
| |
| sequencer()->MarkConsumed(body_manager_.OnBodyConsumed(num_bytes)); |
| } |
| |
| bool QuicSpdyStream::IsDoneReading() const { |
| bool done_reading_headers = FinishedReadingHeaders(); |
| bool done_reading_body = sequencer()->IsClosed(); |
| bool done_reading_trailers = FinishedReadingTrailers(); |
| return done_reading_headers && done_reading_body && done_reading_trailers; |
| } |
| |
| bool QuicSpdyStream::HasBytesToRead() const { |
| if (!VersionUsesHttp3(transport_version())) { |
| return sequencer()->HasBytesToRead(); |
| } |
| return body_manager_.HasBytesToRead(); |
| } |
| |
| void QuicSpdyStream::MarkTrailersConsumed() { trailers_consumed_ = true; } |
| |
| uint64_t QuicSpdyStream::total_body_bytes_read() const { |
| if (VersionUsesHttp3(transport_version())) { |
| return body_manager_.total_body_bytes_received(); |
| } |
| return sequencer()->NumBytesConsumed(); |
| } |
| |
| void QuicSpdyStream::ConsumeHeaderList() { |
| header_list_.Clear(); |
| |
| if (!FinishedReadingHeaders()) { |
| return; |
| } |
| |
| if (!VersionUsesHttp3(transport_version())) { |
| sequencer()->SetUnblocked(); |
| return; |
| } |
| |
| if (body_manager_.HasBytesToRead()) { |
| HandleBodyAvailable(); |
| return; |
| } |
| |
| if (sequencer()->IsClosed() && |
| !on_body_available_called_because_sequencer_is_closed_) { |
| on_body_available_called_because_sequencer_is_closed_ = true; |
| HandleBodyAvailable(); |
| } |
| } |
| |
| void QuicSpdyStream::OnStreamHeadersPriority( |
| const spdy::SpdyStreamPrecedence& precedence) { |
| QUICHE_DCHECK_EQ(Perspective::IS_SERVER, |
| session()->connection()->perspective()); |
| SetPriority(precedence); |
| } |
| |
| void QuicSpdyStream::OnStreamHeaderList(bool fin, size_t frame_len, |
| const QuicHeaderList& header_list) { |
| if (!spdy_session()->user_agent_id().has_value()) { |
| std::string uaid; |
| for (const auto& kv : header_list) { |
| if (quiche::QuicheTextUtils::ToLower(kv.first) == kUserAgentHeaderName) { |
| uaid = kv.second; |
| break; |
| } |
| } |
| spdy_session()->SetUserAgentId(std::move(uaid)); |
| } |
| |
| // TODO(b/134706391): remove |fin| argument. |
| // When using Google QUIC, an empty header list indicates that the size limit |
| // has been exceeded. |
| // When using IETF QUIC, there is an explicit signal from |
| // QpackDecodedHeadersAccumulator. |
| if ((VersionUsesHttp3(transport_version()) && |
| header_list_size_limit_exceeded_) || |
| (!VersionUsesHttp3(transport_version()) && header_list.empty())) { |
| OnHeadersTooLarge(); |
| if (IsDoneReading()) { |
| return; |
| } |
| } |
| if (!headers_decompressed_) { |
| OnInitialHeadersComplete(fin, frame_len, header_list); |
| } else { |
| OnTrailingHeadersComplete(fin, frame_len, header_list); |
| } |
| } |
| |
| void QuicSpdyStream::OnHeadersDecoded(QuicHeaderList headers, |
| bool header_list_size_limit_exceeded) { |
| header_list_size_limit_exceeded_ = header_list_size_limit_exceeded; |
| qpack_decoded_headers_accumulator_.reset(); |
| |
| QuicSpdySession::LogHeaderCompressionRatioHistogram( |
| /* using_qpack = */ true, |
| /* is_sent = */ false, headers.compressed_header_bytes(), |
| headers.uncompressed_header_bytes()); |
| |
| const QuicStreamId promised_stream_id = spdy_session()->promised_stream_id(); |
| Http3DebugVisitor* const debug_visitor = spdy_session()->debug_visitor(); |
| if (promised_stream_id == |
| QuicUtils::GetInvalidStreamId(transport_version())) { |
| if (debug_visitor) { |
| debug_visitor->OnHeadersDecoded(id(), headers); |
| } |
| |
| OnStreamHeaderList(/* fin = */ false, headers_payload_length_, headers); |
| } else { |
| spdy_session_->OnHeaderList(headers); |
| } |
| |
| if (blocked_on_decoding_headers_) { |
| blocked_on_decoding_headers_ = false; |
| // Continue decoding HTTP/3 frames. |
| OnDataAvailable(); |
| } |
| } |
| |
| void QuicSpdyStream::OnHeaderDecodingError(QuicErrorCode error_code, |
| absl::string_view error_message) { |
| qpack_decoded_headers_accumulator_.reset(); |
| |
| std::string connection_close_error_message = absl::StrCat( |
| "Error decoding ", headers_decompressed_ ? "trailers" : "headers", |
| " on stream ", id(), ": ", error_message); |
| OnUnrecoverableError(error_code, connection_close_error_message); |
| } |
| |
| void QuicSpdyStream::MaybeSendPriorityUpdateFrame() { |
| if (!VersionUsesHttp3(transport_version()) || |
| session()->perspective() != Perspective::IS_CLIENT) { |
| return; |
| } |
| |
| // Value between 0 and 7, inclusive. Lower value means higher priority. |
| int urgency = precedence().spdy3_priority(); |
| if (last_sent_urgency_ == urgency) { |
| return; |
| } |
| last_sent_urgency_ = urgency; |
| |
| PriorityUpdateFrame priority_update; |
| priority_update.prioritized_element_type = REQUEST_STREAM; |
| priority_update.prioritized_element_id = id(); |
| priority_update.priority_field_value = absl::StrCat("u=", urgency); |
| spdy_session_->WriteHttp3PriorityUpdate(priority_update); |
| } |
| |
| void QuicSpdyStream::OnHeadersTooLarge() { Reset(QUIC_HEADERS_TOO_LARGE); } |
| |
| void QuicSpdyStream::OnInitialHeadersComplete( |
| bool fin, size_t /*frame_len*/, const QuicHeaderList& header_list) { |
| // TODO(b/134706391): remove |fin| argument. |
| headers_decompressed_ = true; |
| header_list_ = header_list; |
| bool header_too_large = VersionUsesHttp3(transport_version()) |
| ? header_list_size_limit_exceeded_ |
| : header_list.empty(); |
| if (!AreHeaderFieldValuesValid(header_list)) { |
| OnInvalidHeaders(); |
| return; |
| } |
| // Validate request headers if it did not exceed size limit. If it did, |
| // OnHeadersTooLarge() should have already handled it previously. |
| if (!header_too_large && !AreHeadersValid(header_list)) { |
| QUIC_CODE_COUNT_N(quic_validate_request_header, 1, 2); |
| if (GetQuicReloadableFlag(quic_act_upon_invalid_header)) { |
| QUIC_RELOADABLE_FLAG_COUNT(quic_act_upon_invalid_header); |
| OnInvalidHeaders(); |
| return; |
| } |
| } |
| QUIC_CODE_COUNT_N(quic_validate_request_header, 2, 2); |
| |
| if (!GetQuicReloadableFlag(quic_verify_request_headers_2) || |
| !header_too_large) { |
| MaybeProcessReceivedWebTransportHeaders(); |
| } |
| |
| if (VersionUsesHttp3(transport_version())) { |
| if (fin) { |
| OnStreamFrame(QuicStreamFrame(id(), /* fin = */ true, |
| highest_received_byte_offset(), |
| absl::string_view())); |
| } |
| return; |
| } |
| |
| if (fin && !rst_sent()) { |
| OnStreamFrame( |
| QuicStreamFrame(id(), fin, /* offset = */ 0, absl::string_view())); |
| } |
| if (FinishedReadingHeaders()) { |
| sequencer()->SetUnblocked(); |
| } |
| } |
| |
| void QuicSpdyStream::OnPromiseHeaderList( |
| QuicStreamId /* promised_id */, size_t /* frame_len */, |
| const QuicHeaderList& /*header_list */) { |
| // To be overridden in QuicSpdyClientStream. Not supported on |
| // server side. |
| stream_delegate()->OnStreamError(QUIC_INVALID_HEADERS_STREAM_DATA, |
| "Promise headers received by server"); |
| } |
| |
| void QuicSpdyStream::OnTrailingHeadersComplete( |
| bool fin, size_t /*frame_len*/, const QuicHeaderList& header_list) { |
| // TODO(b/134706391): remove |fin| argument. |
| QUICHE_DCHECK(!trailers_decompressed_); |
| if (!VersionUsesHttp3(transport_version()) && fin_received()) { |
| QUIC_DLOG(INFO) << ENDPOINT |
| << "Received Trailers after FIN, on stream: " << id(); |
| stream_delegate()->OnStreamError(QUIC_INVALID_HEADERS_STREAM_DATA, |
| "Trailers after fin"); |
| return; |
| } |
| |
| if (!VersionUsesHttp3(transport_version()) && !fin) { |
| QUIC_DLOG(INFO) << ENDPOINT |
| << "Trailers must have FIN set, on stream: " << id(); |
| stream_delegate()->OnStreamError(QUIC_INVALID_HEADERS_STREAM_DATA, |
| "Fin missing from trailers"); |
| return; |
| } |
| |
| size_t final_byte_offset = 0; |
| const bool expect_final_byte_offset = !VersionUsesHttp3(transport_version()); |
| if (!SpdyUtils::CopyAndValidateTrailers(header_list, expect_final_byte_offset, |
| &final_byte_offset, |
| &received_trailers_)) { |
| QUIC_DLOG(ERROR) << ENDPOINT << "Trailers for stream " << id() |
| << " are malformed."; |
| stream_delegate()->OnStreamError(QUIC_INVALID_HEADERS_STREAM_DATA, |
| "Trailers are malformed"); |
| return; |
| } |
| trailers_decompressed_ = true; |
| if (fin) { |
| const QuicStreamOffset offset = VersionUsesHttp3(transport_version()) |
| ? highest_received_byte_offset() |
| : final_byte_offset; |
| OnStreamFrame(QuicStreamFrame(id(), fin, offset, absl::string_view())); |
| } |
| } |
| |
| void QuicSpdyStream::OnPriorityFrame( |
| const spdy::SpdyStreamPrecedence& precedence) { |
| QUICHE_DCHECK_EQ(Perspective::IS_SERVER, |
| session()->connection()->perspective()); |
| SetPriority(precedence); |
| } |
| |
| void QuicSpdyStream::OnStreamReset(const QuicRstStreamFrame& frame) { |
| if (web_transport_data_ != nullptr) { |
| WebTransportStreamVisitor* webtransport_visitor = |
| web_transport_data_->adapter.visitor(); |
| if (webtransport_visitor != nullptr) { |
| webtransport_visitor->OnResetStreamReceived( |
| Http3ErrorToWebTransportOrDefault(frame.ietf_error_code)); |
| } |
| QuicStream::OnStreamReset(frame); |
| return; |
| } |
| |
| if (VersionUsesHttp3(transport_version()) && !fin_received() && |
| spdy_session_->qpack_decoder()) { |
| spdy_session_->qpack_decoder()->OnStreamReset(id()); |
| qpack_decoded_headers_accumulator_.reset(); |
| } |
| |
| if (VersionUsesHttp3(transport_version()) || |
| frame.error_code != QUIC_STREAM_NO_ERROR) { |
| QuicStream::OnStreamReset(frame); |
| return; |
| } |
| |
| QUIC_DVLOG(1) << ENDPOINT |
| << "Received QUIC_STREAM_NO_ERROR, not discarding response"; |
| set_rst_received(true); |
| MaybeIncreaseHighestReceivedOffset(frame.byte_offset); |
| set_stream_error(frame.error()); |
| CloseWriteSide(); |
| } |
| |
| void QuicSpdyStream::ResetWithError(QuicResetStreamError error) { |
| if (VersionUsesHttp3(transport_version()) && !fin_received() && |
| spdy_session_->qpack_decoder() && web_transport_data_ == nullptr) { |
| spdy_session_->qpack_decoder()->OnStreamReset(id()); |
| qpack_decoded_headers_accumulator_.reset(); |
| } |
| |
| QuicStream::ResetWithError(error); |
| } |
| |
| bool QuicSpdyStream::OnStopSending(QuicResetStreamError error) { |
| if (web_transport_data_ != nullptr) { |
| WebTransportStreamVisitor* visitor = web_transport_data_->adapter.visitor(); |
| if (visitor != nullptr) { |
| visitor->OnStopSendingReceived( |
| Http3ErrorToWebTransportOrDefault(error.ietf_application_code())); |
| } |
| } |
| |
| return QuicStream::OnStopSending(error); |
| } |
| |
| void QuicSpdyStream::OnWriteSideInDataRecvdState() { |
| if (web_transport_data_ != nullptr) { |
| WebTransportStreamVisitor* visitor = web_transport_data_->adapter.visitor(); |
| if (visitor != nullptr) { |
| visitor->OnWriteSideInDataRecvdState(); |
| } |
| } |
| |
| QuicStream::OnWriteSideInDataRecvdState(); |
| } |
| |
| void QuicSpdyStream::OnDataAvailable() { |
| if (!VersionUsesHttp3(transport_version())) { |
| // Sequencer must be blocked until headers are consumed. |
| QUICHE_DCHECK(FinishedReadingHeaders()); |
| } |
| |
| if (!VersionUsesHttp3(transport_version())) { |
| HandleBodyAvailable(); |
| return; |
| } |
| |
| if (web_transport_data_ != nullptr) { |
| web_transport_data_->adapter.OnDataAvailable(); |
| return; |
| } |
| |
| if (!spdy_session()->ShouldProcessIncomingRequests()) { |
| spdy_session()->OnStreamWaitingForClientSettings(id()); |
| return; |
| } |
| |
| if (is_decoder_processing_input_) { |
| // Let the outermost nested OnDataAvailable() call do the work. |
| return; |
| } |
| |
| if (blocked_on_decoding_headers_) { |
| return; |
| } |
| |
| iovec iov; |
| while (session()->connection()->connected() && !reading_stopped() && |
| decoder_.error() == QUIC_NO_ERROR) { |
| QUICHE_DCHECK_GE(sequencer_offset_, sequencer()->NumBytesConsumed()); |
| if (!sequencer()->PeekRegion(sequencer_offset_, &iov)) { |
| break; |
| } |
| |
| QUICHE_DCHECK(!sequencer()->IsClosed()); |
| is_decoder_processing_input_ = true; |
| QuicByteCount processed_bytes = decoder_.ProcessInput( |
| reinterpret_cast<const char*>(iov.iov_base), iov.iov_len); |
| is_decoder_processing_input_ = false; |
| if (!session()->connection()->connected()) { |
| return; |
| } |
| sequencer_offset_ += processed_bytes; |
| if (blocked_on_decoding_headers_) { |
| return; |
| } |
| if (web_transport_data_ != nullptr) { |
| return; |
| } |
| } |
| |
| // Do not call HandleBodyAvailable() until headers are consumed. |
| if (!FinishedReadingHeaders()) { |
| return; |
| } |
| |
| if (body_manager_.HasBytesToRead()) { |
| HandleBodyAvailable(); |
| return; |
| } |
| |
| if (sequencer()->IsClosed() && |
| !on_body_available_called_because_sequencer_is_closed_) { |
| on_body_available_called_because_sequencer_is_closed_ = true; |
| HandleBodyAvailable(); |
| } |
| } |
| |
| void QuicSpdyStream::OnClose() { |
| QuicStream::OnClose(); |
| |
| qpack_decoded_headers_accumulator_.reset(); |
| |
| if (visitor_) { |
| Visitor* visitor = visitor_; |
| // Calling Visitor::OnClose() may result the destruction of the visitor, |
| // so we need to ensure we don't call it again. |
| visitor_ = nullptr; |
| visitor->OnClose(this); |
| } |
| |
| if (web_transport_ != nullptr) { |
| web_transport_->OnConnectStreamClosing(); |
| } |
| if (web_transport_data_ != nullptr) { |
| WebTransportHttp3* web_transport = |
| spdy_session_->GetWebTransportSession(web_transport_data_->session_id); |
| if (web_transport == nullptr) { |
| // Since there is no guaranteed destruction order for streams, the session |
| // could be already removed from the stream map by the time we reach here. |
| QUIC_DLOG(WARNING) << ENDPOINT << "WebTransport stream " << id() |
| << " attempted to notify parent session " |
| << web_transport_data_->session_id |
| << ", but the session could not be found."; |
| return; |
| } |
| web_transport->OnStreamClosed(id()); |
| } |
| } |
| |
| void QuicSpdyStream::OnCanWrite() { |
| QuicStream::OnCanWrite(); |
| |
| // Trailers (and hence a FIN) may have been sent ahead of queued body bytes. |
| if (!HasBufferedData() && fin_sent()) { |
| CloseWriteSide(); |
| } |
| } |
| |
| bool QuicSpdyStream::FinishedReadingHeaders() const { |
| return headers_decompressed_ && header_list_.empty(); |
| } |
| |
| // static |
| bool QuicSpdyStream::ParseHeaderStatusCode(const Http2HeaderBlock& header, |
| int* status_code) { |
| Http2HeaderBlock::const_iterator it = header.find(spdy::kHttp2StatusHeader); |
| if (it == header.end()) { |
| return false; |
| } |
| const absl::string_view status(it->second); |
| if (status.size() != 3) { |
| return false; |
| } |
| // First character must be an integer in range [1,5]. |
| if (status[0] < '1' || status[0] > '5') { |
| return false; |
| } |
| // The remaining two characters must be integers. |
| if (!isdigit(status[1]) || !isdigit(status[2])) { |
| return false; |
| } |
| return absl::SimpleAtoi(status, status_code); |
| } |
| |
| bool QuicSpdyStream::FinishedReadingTrailers() const { |
| // If no further trailing headers are expected, and the decompressed trailers |
| // (if any) have been consumed, then reading of trailers is finished. |
| if (!fin_received()) { |
| return false; |
| } else if (!trailers_decompressed_) { |
| return true; |
| } else { |
| return trailers_consumed_; |
| } |
| } |
| |
| bool QuicSpdyStream::OnDataFrameStart(QuicByteCount header_length, |
| QuicByteCount payload_length) { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnDataFrameReceived(id(), payload_length); |
| } |
| |
| if (!headers_decompressed_ || trailers_decompressed_) { |
| stream_delegate()->OnStreamError( |
| QUIC_HTTP_INVALID_FRAME_SEQUENCE_ON_SPDY_STREAM, |
| "Unexpected DATA frame received."); |
| return false; |
| } |
| |
| sequencer()->MarkConsumed(body_manager_.OnNonBody(header_length)); |
| |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnDataFramePayload(absl::string_view payload) { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| |
| body_manager_.OnBody(payload); |
| |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnDataFrameEnd() { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| |
| QUIC_DVLOG(1) << ENDPOINT |
| << "Reaches the end of a data frame. Total bytes received are " |
| << body_manager_.total_body_bytes_received(); |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnStreamFrameAcked(QuicStreamOffset offset, |
| QuicByteCount data_length, |
| bool fin_acked, |
| QuicTime::Delta ack_delay_time, |
| QuicTime receive_timestamp, |
| QuicByteCount* newly_acked_length) { |
| const bool new_data_acked = QuicStream::OnStreamFrameAcked( |
| offset, data_length, fin_acked, ack_delay_time, receive_timestamp, |
| newly_acked_length); |
| |
| const QuicByteCount newly_acked_header_length = |
| GetNumFrameHeadersInInterval(offset, data_length); |
| QUICHE_DCHECK_LE(newly_acked_header_length, *newly_acked_length); |
| unacked_frame_headers_offsets_.Difference(offset, offset + data_length); |
| if (ack_listener_ != nullptr && new_data_acked) { |
| ack_listener_->OnPacketAcked( |
| *newly_acked_length - newly_acked_header_length, ack_delay_time); |
| } |
| return new_data_acked; |
| } |
| |
| void QuicSpdyStream::OnStreamFrameRetransmitted(QuicStreamOffset offset, |
| QuicByteCount data_length, |
| bool fin_retransmitted) { |
| QuicStream::OnStreamFrameRetransmitted(offset, data_length, |
| fin_retransmitted); |
| |
| const QuicByteCount retransmitted_header_length = |
| GetNumFrameHeadersInInterval(offset, data_length); |
| QUICHE_DCHECK_LE(retransmitted_header_length, data_length); |
| |
| if (ack_listener_ != nullptr) { |
| ack_listener_->OnPacketRetransmitted(data_length - |
| retransmitted_header_length); |
| } |
| } |
| |
| QuicByteCount QuicSpdyStream::GetNumFrameHeadersInInterval( |
| QuicStreamOffset offset, QuicByteCount data_length) const { |
| QuicByteCount header_acked_length = 0; |
| QuicIntervalSet<QuicStreamOffset> newly_acked(offset, offset + data_length); |
| newly_acked.Intersection(unacked_frame_headers_offsets_); |
| for (const auto& interval : newly_acked) { |
| header_acked_length += interval.Length(); |
| } |
| return header_acked_length; |
| } |
| |
| bool QuicSpdyStream::OnHeadersFrameStart(QuicByteCount header_length, |
| QuicByteCount payload_length) { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| QUICHE_DCHECK(!qpack_decoded_headers_accumulator_); |
| |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnHeadersFrameReceived(id(), |
| payload_length); |
| } |
| |
| headers_payload_length_ = payload_length; |
| |
| if (trailers_decompressed_) { |
| stream_delegate()->OnStreamError( |
| QUIC_HTTP_INVALID_FRAME_SEQUENCE_ON_SPDY_STREAM, |
| "HEADERS frame received after trailing HEADERS."); |
| return false; |
| } |
| |
| sequencer()->MarkConsumed(body_manager_.OnNonBody(header_length)); |
| |
| qpack_decoded_headers_accumulator_ = |
| std::make_unique<QpackDecodedHeadersAccumulator>( |
| id(), spdy_session_->qpack_decoder(), this, |
| spdy_session_->max_inbound_header_list_size()); |
| |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnHeadersFramePayload(absl::string_view payload) { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| |
| if (!qpack_decoded_headers_accumulator_) { |
| QUIC_BUG(b215142466_OnHeadersFramePayload); |
| OnHeaderDecodingError(QUIC_INTERNAL_ERROR, |
| "qpack_decoded_headers_accumulator_ is nullptr"); |
| return false; |
| } |
| |
| qpack_decoded_headers_accumulator_->Decode(payload); |
| |
| // |qpack_decoded_headers_accumulator_| is reset if an error is detected. |
| if (!qpack_decoded_headers_accumulator_) { |
| return false; |
| } |
| |
| sequencer()->MarkConsumed(body_manager_.OnNonBody(payload.size())); |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnHeadersFrameEnd() { |
| QUICHE_DCHECK(VersionUsesHttp3(transport_version())); |
| |
| if (!qpack_decoded_headers_accumulator_) { |
| QUIC_BUG(b215142466_OnHeadersFrameEnd); |
| OnHeaderDecodingError(QUIC_INTERNAL_ERROR, |
| "qpack_decoded_headers_accumulator_ is nullptr"); |
| return false; |
| } |
| |
| qpack_decoded_headers_accumulator_->EndHeaderBlock(); |
| |
| // If decoding is complete or an error is detected, then |
| // |qpack_decoded_headers_accumulator_| is already reset. |
| if (qpack_decoded_headers_accumulator_) { |
| blocked_on_decoding_headers_ = true; |
| return false; |
| } |
| |
| return !sequencer()->IsClosed() && !reading_stopped(); |
| } |
| |
| void QuicSpdyStream::OnWebTransportStreamFrameType( |
| QuicByteCount header_length, WebTransportSessionId session_id) { |
| QUIC_DVLOG(1) << ENDPOINT << " Received WEBTRANSPORT_STREAM on stream " |
| << id() << " for session " << session_id; |
| sequencer()->MarkConsumed(header_length); |
| |
| if (headers_payload_length_ > 0 || headers_decompressed_) { |
| QUIC_PEER_BUG(WEBTRANSPORT_STREAM received on HTTP request) |
| << ENDPOINT << "Stream " << id() |
| << " tried to convert to WebTransport, but it already " |
| "has HTTP data on it"; |
| Reset(QUIC_STREAM_FRAME_UNEXPECTED); |
| } |
| if (QuicUtils::IsOutgoingStreamId(spdy_session_->version(), id(), |
| spdy_session_->perspective())) { |
| QUIC_PEER_BUG(WEBTRANSPORT_STREAM received on outgoing request) |
| << ENDPOINT << "Stream " << id() |
| << " tried to convert to WebTransport, but only the " |
| "initiator of the stream can do it."; |
| Reset(QUIC_STREAM_FRAME_UNEXPECTED); |
| } |
| |
| QUICHE_DCHECK(web_transport_ == nullptr); |
| web_transport_data_ = |
| std::make_unique<WebTransportDataStream>(this, session_id); |
| spdy_session_->AssociateIncomingWebTransportStreamWithSession(session_id, |
| id()); |
| } |
| |
| bool QuicSpdyStream::OnUnknownFrameStart(uint64_t frame_type, |
| QuicByteCount header_length, |
| QuicByteCount payload_length) { |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnUnknownFrameReceived(id(), frame_type, |
| payload_length); |
| } |
| spdy_session_->OnUnknownFrameStart(id(), frame_type, header_length, |
| payload_length); |
| |
| // Consume the frame header. |
| QUIC_DVLOG(1) << ENDPOINT << "Consuming " << header_length |
| << " byte long frame header of frame of unknown type " |
| << frame_type << "."; |
| sequencer()->MarkConsumed(body_manager_.OnNonBody(header_length)); |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnUnknownFramePayload(absl::string_view payload) { |
| spdy_session_->OnUnknownFramePayload(id(), payload); |
| |
| // Consume the frame payload. |
| QUIC_DVLOG(1) << ENDPOINT << "Consuming " << payload.size() |
| << " bytes of payload of frame of unknown type."; |
| sequencer()->MarkConsumed(body_manager_.OnNonBody(payload.size())); |
| return true; |
| } |
| |
| bool QuicSpdyStream::OnUnknownFrameEnd() { return true; } |
| |
| size_t QuicSpdyStream::WriteHeadersImpl( |
| spdy::Http2HeaderBlock header_block, bool fin, |
| quiche::QuicheReferenceCountedPointer<QuicAckListenerInterface> |
| ack_listener) { |
| if (!VersionUsesHttp3(transport_version())) { |
| return spdy_session_->WriteHeadersOnHeadersStream( |
| id(), std::move(header_block), fin, precedence(), |
| std::move(ack_listener)); |
| } |
| |
| // Encode header list. |
| QuicByteCount encoder_stream_sent_byte_count; |
| std::string encoded_headers = |
| spdy_session_->qpack_encoder()->EncodeHeaderList( |
| id(), header_block, &encoder_stream_sent_byte_count); |
| |
| if (spdy_session_->debug_visitor()) { |
| spdy_session_->debug_visitor()->OnHeadersFrameSent(id(), header_block); |
| } |
| |
| // Write HEADERS frame. |
| std::string headers_frame_header = |
| HttpEncoder::SerializeHeadersFrameHeader(encoded_headers.size()); |
| unacked_frame_headers_offsets_.Add( |
| send_buffer().stream_offset(), |
| send_buffer().stream_offset() + headers_frame_header.length()); |
| |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() |
| << " is writing HEADERS frame header of length " |
| << headers_frame_header.length(); |
| WriteOrBufferData(headers_frame_header, /* fin = */ false, |
| /* ack_listener = */ nullptr); |
| |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() |
| << " is writing HEADERS frame payload of length " |
| << encoded_headers.length() << " with fin " << fin; |
| WriteOrBufferData(encoded_headers, fin, nullptr); |
| |
| QuicSpdySession::LogHeaderCompressionRatioHistogram( |
| /* using_qpack = */ true, |
| /* is_sent = */ true, |
| encoded_headers.size() + encoder_stream_sent_byte_count, |
| header_block.TotalBytesUsed()); |
| |
| return encoded_headers.size(); |
| } |
| |
| bool QuicSpdyStream::CanWriteNewBodyData(QuicByteCount write_size) const { |
| QUICHE_DCHECK_NE(0u, write_size); |
| if (!VersionUsesHttp3(transport_version())) { |
| return CanWriteNewData(); |
| } |
| |
| return CanWriteNewDataAfterData( |
| HttpEncoder::GetDataFrameHeaderLength(write_size)); |
| } |
| |
| void QuicSpdyStream::MaybeProcessReceivedWebTransportHeaders() { |
| if (!spdy_session_->SupportsWebTransport()) { |
| return; |
| } |
| if (session()->perspective() != Perspective::IS_SERVER) { |
| return; |
| } |
| QUICHE_DCHECK(IsValidWebTransportSessionId(id(), version())); |
| |
| std::string method; |
| std::string protocol; |
| for (const auto& [header_name, header_value] : header_list_) { |
| if (header_name == ":method") { |
| if (!method.empty() || header_value.empty()) { |
| return; |
| } |
| method = header_value; |
| } |
| if (header_name == ":protocol") { |
| if (!protocol.empty() || header_value.empty()) { |
| return; |
| } |
| protocol = header_value; |
| } |
| if (header_name == "datagram-flow-id") { |
| QUIC_DLOG(ERROR) << ENDPOINT |
| << "Rejecting WebTransport due to unexpected " |
| "Datagram-Flow-Id header"; |
| return; |
| } |
| if (header_name == "sec-webtransport-http3-draft02") { |
| if (header_value != "1") { |
| QUIC_DLOG(ERROR) << ENDPOINT |
| << "Rejecting WebTransport due to invalid value of " |
| "Sec-Webtransport-Http3-Draft02 header"; |
| return; |
| } |
| } |
| } |
| |
| if (method != "CONNECT" || protocol != "webtransport") { |
| return; |
| } |
| |
| web_transport_ = |
| std::make_unique<WebTransportHttp3>(spdy_session_, this, id()); |
| } |
| |
| void QuicSpdyStream::MaybeProcessSentWebTransportHeaders( |
| spdy::Http2HeaderBlock& headers) { |
| if (!spdy_session_->SupportsWebTransport()) { |
| return; |
| } |
| if (session()->perspective() != Perspective::IS_CLIENT) { |
| return; |
| } |
| QUICHE_DCHECK(IsValidWebTransportSessionId(id(), version())); |
| |
| const auto method_it = headers.find(":method"); |
| const auto protocol_it = headers.find(":protocol"); |
| if (method_it == headers.end() || protocol_it == headers.end()) { |
| return; |
| } |
| if (method_it->second != "CONNECT" && protocol_it->second != "webtransport") { |
| return; |
| } |
| |
| headers["sec-webtransport-http3-draft02"] = "1"; |
| |
| web_transport_ = |
| std::make_unique<WebTransportHttp3>(spdy_session_, this, id()); |
| } |
| |
| void QuicSpdyStream::OnCanWriteNewData() { |
| if (web_transport_data_ != nullptr) { |
| web_transport_data_->adapter.OnCanWriteNewData(); |
| } |
| } |
| |
| bool QuicSpdyStream::AssertNotWebTransportDataStream( |
| absl::string_view operation) { |
| if (web_transport_data_ != nullptr) { |
| QUIC_BUG(Invalid operation on WebTransport stream) |
| << "Attempted to " << operation << " on WebTransport data stream " |
| << id() << " associated with session " |
| << web_transport_data_->session_id; |
| OnUnrecoverableError(QUIC_INTERNAL_ERROR, |
| absl::StrCat("Attempted to ", operation, |
| " on WebTransport data stream")); |
| return false; |
| } |
| return true; |
| } |
| |
| void QuicSpdyStream::ConvertToWebTransportDataStream( |
| WebTransportSessionId session_id) { |
| if (send_buffer().stream_offset() != 0) { |
| QUIC_BUG(Sending WEBTRANSPORT_STREAM when data already sent) |
| << "Attempted to send a WEBTRANSPORT_STREAM frame when other data has " |
| "already been sent on the stream."; |
| OnUnrecoverableError(QUIC_INTERNAL_ERROR, |
| "Attempted to send a WEBTRANSPORT_STREAM frame when " |
| "other data has already been sent on the stream."); |
| return; |
| } |
| |
| std::string header = |
| HttpEncoder::SerializeWebTransportStreamFrameHeader(session_id); |
| if (header.empty()) { |
| QUIC_BUG(Failed to serialize WEBTRANSPORT_STREAM) |
| << "Failed to serialize a WEBTRANSPORT_STREAM frame."; |
| OnUnrecoverableError(QUIC_INTERNAL_ERROR, |
| "Failed to serialize a WEBTRANSPORT_STREAM frame."); |
| return; |
| } |
| |
| WriteOrBufferData(header, /*fin=*/false, nullptr); |
| web_transport_data_ = |
| std::make_unique<WebTransportDataStream>(this, session_id); |
| QUIC_DVLOG(1) << ENDPOINT << "Successfully opened WebTransport data stream " |
| << id() << " for session " << session_id; |
| } |
| |
| QuicSpdyStream::WebTransportDataStream::WebTransportDataStream( |
| QuicSpdyStream* stream, WebTransportSessionId session_id) |
| : session_id(session_id), |
| adapter(stream->spdy_session_, stream, stream->sequencer()) {} |
| |
| void QuicSpdyStream::HandleReceivedDatagram(absl::string_view payload) { |
| if (datagram_visitor_ == nullptr) { |
| QUIC_DLOG(ERROR) << ENDPOINT << "Received datagram without any visitor"; |
| return; |
| } |
| datagram_visitor_->OnHttp3Datagram(id(), payload); |
| } |
| |
| bool QuicSpdyStream::OnCapsule(const Capsule& capsule) { |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() << " received capsule " |
| << capsule; |
| if (!headers_decompressed_) { |
| QUIC_PEER_BUG(capsule before headers) |
| << ENDPOINT << "Stream " << id() << " received capsule " << capsule |
| << " before headers"; |
| return false; |
| } |
| if (web_transport_ != nullptr && web_transport_->close_received()) { |
| QUIC_PEER_BUG(capsule after close) |
| << ENDPOINT << "Stream " << id() << " received capsule " << capsule |
| << " after CLOSE_WEBTRANSPORT_SESSION."; |
| return false; |
| } |
| switch (capsule.capsule_type()) { |
| case CapsuleType::LEGACY_DATAGRAM: { |
| HandleReceivedDatagram( |
| capsule.legacy_datagram_capsule().http_datagram_payload); |
| } break; |
| case CapsuleType::DATAGRAM_WITHOUT_CONTEXT: { |
| HandleReceivedDatagram( |
| capsule.datagram_without_context_capsule().http_datagram_payload); |
| } break; |
| case CapsuleType::CLOSE_WEBTRANSPORT_SESSION: { |
| if (web_transport_ == nullptr) { |
| QUIC_DLOG(ERROR) << ENDPOINT << "Received capsule " << capsule |
| << " for a non-WebTransport stream."; |
| return false; |
| } |
| web_transport_->OnCloseReceived( |
| capsule.close_web_transport_session_capsule().error_code, |
| capsule.close_web_transport_session_capsule().error_message); |
| } break; |
| } |
| return true; |
| } |
| |
| void QuicSpdyStream::OnCapsuleParseFailure(const std::string& error_message) { |
| QUIC_DLOG(ERROR) << ENDPOINT << "Capsule parse failure: " << error_message; |
| Reset(QUIC_BAD_APPLICATION_PAYLOAD); |
| } |
| |
| void QuicSpdyStream::WriteCapsule(const Capsule& capsule, bool fin) { |
| QUIC_DLOG(INFO) << ENDPOINT << "Stream " << id() << " sending capsule " |
| << capsule; |
| quiche::QuicheBuffer serialized_capsule = SerializeCapsule( |
| capsule, |
| spdy_session_->connection()->helper()->GetStreamSendBufferAllocator()); |
| QUICHE_DCHECK_GT(serialized_capsule.size(), 0u); |
| WriteOrBufferBody(serialized_capsule.AsStringView(), /*fin=*/fin); |
| } |
| |
| void QuicSpdyStream::WriteGreaseCapsule() { |
| // GREASE capsulde IDs have a form of 41 * N + 23. |
| QuicRandom* random = spdy_session_->connection()->random_generator(); |
| uint64_t type = random->InsecureRandUint64() >> 4; |
| type = (type / 41) * 41 + 23; |
| QUICHE_DCHECK_EQ((type - 23) % 41, 0u); |
| |
| constexpr size_t kMaxLength = 64; |
| size_t length = random->InsecureRandUint64() % kMaxLength; |
| std::string bytes(length, '\0'); |
| random->InsecureRandBytes(&bytes[0], bytes.size()); |
| Capsule capsule = Capsule::Unknown(type, bytes); |
| WriteCapsule(capsule, /*fin=*/false); |
| } |
| |
| MessageStatus QuicSpdyStream::SendHttp3Datagram(absl::string_view payload) { |
| return spdy_session_->SendHttp3Datagram(id(), payload); |
| } |
| |
| void QuicSpdyStream::RegisterHttp3DatagramVisitor( |
| Http3DatagramVisitor* visitor) { |
| if (visitor == nullptr) { |
| QUIC_BUG(null datagram visitor) |
| << ENDPOINT << "Null datagram visitor for stream ID " << id(); |
| return; |
| } |
| QUIC_DLOG(INFO) << ENDPOINT << "Registering datagram visitor with stream ID " |
| << id(); |
| |
| if (datagram_visitor_ != nullptr) { |
| QUIC_BUG(h3 datagram double registration) |
| << ENDPOINT |
| << "Attempted to doubly register HTTP/3 datagram with stream ID " |
| << id(); |
| return; |
| } |
| datagram_visitor_ = visitor; |
| QUICHE_DCHECK(!capsule_parser_); |
| capsule_parser_ = std::make_unique<CapsuleParser>(this); |
| } |
| |
| void QuicSpdyStream::UnregisterHttp3DatagramVisitor() { |
| if (datagram_visitor_ == nullptr) { |
| QUIC_BUG(datagram visitor empty during unregistration) |
| << ENDPOINT << "Cannot unregister datagram visitor for stream ID " |
| << id(); |
| return; |
| } |
| QUIC_DLOG(INFO) << ENDPOINT << "Unregistering datagram visitor for stream ID " |
| << id(); |
| datagram_visitor_ = nullptr; |
| } |
| |
| void QuicSpdyStream::ReplaceHttp3DatagramVisitor( |
| Http3DatagramVisitor* visitor) { |
| QUIC_BUG_IF(h3 datagram unknown move, datagram_visitor_ == nullptr) |
| << "Attempted to move missing datagram visitor on HTTP/3 stream ID " |
| << id(); |
| datagram_visitor_ = visitor; |
| } |
| |
| void QuicSpdyStream::SetMaxDatagramTimeInQueue( |
| QuicTime::Delta max_time_in_queue) { |
| spdy_session_->SetMaxDatagramTimeInQueueForStreamId(id(), max_time_in_queue); |
| } |
| |
| void QuicSpdyStream::OnDatagramReceived(QuicDataReader* reader) { |
| if (!headers_decompressed_) { |
| QUIC_DLOG(INFO) << "Dropping datagram received before headers on stream ID " |
| << id(); |
| return; |
| } |
| HandleReceivedDatagram(reader->ReadRemainingPayload()); |
| } |
| |
| QuicByteCount QuicSpdyStream::GetMaxDatagramSize() const { |
| QuicByteCount prefix_size = 0; |
| switch (spdy_session_->http_datagram_support()) { |
| case HttpDatagramSupport::kDraft04: |
| case HttpDatagramSupport::kDraft09: |
| prefix_size = |
| QuicDataWriter::GetVarInt62Len(id() / kHttpDatagramStreamIdDivisor); |
| break; |
| case HttpDatagramSupport::kNone: |
| case HttpDatagramSupport::kDraft04And09: |
| QUIC_BUG(GetMaxDatagramSize called with no datagram support) |
| << "GetMaxDatagramSize() called when no HTTP/3 datagram support has " |
| "been negotiated. Support value: " |
| << spdy_session_->http_datagram_support(); |
| break; |
| } |
| // If the logic above fails, use the largest possible value as the safe one. |
| if (prefix_size == 0) { |
| prefix_size = 8; |
| } |
| |
| QuicByteCount max_datagram_size = |
| session()->GetGuaranteedLargestMessagePayload(); |
| if (max_datagram_size < prefix_size) { |
| QUIC_BUG(max_datagram_size smaller than prefix_size) |
| << "GetGuaranteedLargestMessagePayload() returned a datagram size that " |
| "is not sufficient to fit stream ID into it."; |
| return 0; |
| } |
| return max_datagram_size - prefix_size; |
| } |
| |
| void QuicSpdyStream::HandleBodyAvailable() { |
| if (!capsule_parser_) { |
| OnBodyAvailable(); |
| return; |
| } |
| while (body_manager_.HasBytesToRead()) { |
| iovec iov; |
| int num_iov = GetReadableRegions(&iov, /*iov_len=*/1); |
| if (num_iov == 0) { |
| break; |
| } |
| if (!capsule_parser_->IngestCapsuleFragment(absl::string_view( |
| reinterpret_cast<const char*>(iov.iov_base), iov.iov_len))) { |
| break; |
| } |
| MarkConsumed(iov.iov_len); |
| } |
| // If we received a FIN, make sure that there isn't a partial capsule buffered |
| // in the capsule parser. |
| if (sequencer()->IsClosed()) { |
| capsule_parser_->ErrorIfThereIsRemainingBufferedData(); |
| if (web_transport_ != nullptr) { |
| web_transport_->OnConnectStreamFinReceived(); |
| } |
| OnFinRead(); |
| } |
| } |
| |
| namespace { |
| // Return true if |c| is not allowed in an HTTP/3 wire-encoded header and |
| // pseudo-header names according to |
| // https://datatracker.ietf.org/doc/html/draft-ietf-quic-http#section-4.1.1 and |
| // https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-semantics-19#section-5.6.2 |
| constexpr bool isInvalidHeaderNameCharacter(unsigned char c) { |
| if (c == '!' || c == '|' || c == '~' || c == '*' || c == '+' || c == '-' || |
| c == '.' || |
| // #, $, %, &, ' |
| (c >= '#' && c <= '\'') || |
| // [0-9], : |
| (c >= '0' && c <= ':') || |
| // ^, _, `, [a-z] |
| (c >= '^' && c <= 'z')) { |
| return false; |
| } |
| return true; |
| } |
| } // namespace |
| |
| bool QuicSpdyStream::AreHeadersValid(const QuicHeaderList& header_list) const { |
| QUICHE_DCHECK(GetQuicReloadableFlag(quic_verify_request_headers_2)); |
| for (const std::pair<std::string, std::string>& pair : header_list) { |
| const std::string& name = pair.first; |
| if (std::any_of(name.begin(), name.end(), isInvalidHeaderNameCharacter)) { |
| QUIC_DLOG(ERROR) << "Invalid request header " << name; |
| return false; |
| } |
| if (http2::GetInvalidHttp2HeaderSet().contains(name)) { |
| QUIC_DLOG(ERROR) << name << " header is not allowed"; |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| bool QuicSpdyStream::AreHeaderFieldValuesValid( |
| const QuicHeaderList& header_list) const { |
| if (!VersionUsesHttp3(transport_version())) { |
| return true; |
| } |
| // According to https://www.rfc-editor.org/rfc/rfc9114.html#section-10.3 |
| // "[...] HTTP/3 can transport field values that are not valid. While most |
| // values that can be encoded will not alter field parsing, carriage return |
| // (ASCII 0x0d), line feed (ASCII 0x0a), and the null character (ASCII 0x00) |
| // might be exploited by an attacker if they are translated verbatim. Any |
| // request or response that contains a character not permitted in a field |
| // value MUST be treated as malformed. |
| // [...]" |
| for (const std::pair<std::string, std::string>& pair : header_list) { |
| const std::string& value = pair.second; |
| for (const auto c : value) { |
| if (c == '\0' || c == '\n' || c == '\r') { |
| return false; |
| } |
| } |
| } |
| return true; |
| } |
| |
| void QuicSpdyStream::OnInvalidHeaders() { Reset(QUIC_BAD_APPLICATION_PAYLOAD); } |
| |
| #undef ENDPOINT // undef for jumbo builds |
| } // namespace quic |