andy-gg's picture
Upload 2477 files
7e9dc27 verified
local cqueues = require "cqueues"
local monotime = cqueues.monotime
local cc = require "cqueues.condition"
local ce = require "cqueues.errno"
local new_fifo = require "fifo"
local band = require "http.bit".band
local bor = require "http.bit".bor
local h2_error = require "http.h2_error"
local h2_errors = h2_error.errors
local stream_common = require "http.stream_common"
local spack = string.pack or require "compat53.string".pack -- luacheck: ignore 143
local sunpack = string.unpack or require "compat53.string".unpack -- luacheck: ignore 143
local unpack = table.unpack or unpack -- luacheck: ignore 113 143
local assert = assert
if _VERSION:match("%d+%.?%d*") < "5.3" then
assert = require "compat53.module".assert
end
local MAX_HEADER_BUFFER_SIZE = 400*1024 -- 400 KB is max size in h2o
local known_settings = {}
for i, s in pairs({
[0x1] = "HEADER_TABLE_SIZE";
[0x2] = "ENABLE_PUSH";
[0x3] = "MAX_CONCURRENT_STREAMS";
[0x4] = "INITIAL_WINDOW_SIZE";
[0x5] = "MAX_FRAME_SIZE";
[0x6] = "MAX_HEADER_LIST_SIZE";
[0x8] = "SETTINGS_ENABLE_CONNECT_PROTOCOL";
[0x10] = "TLS_RENEG_PERMITTED";
}) do
known_settings[i] = s
known_settings[s] = i
end
local frame_types = {
[0x0] = "DATA";
[0x1] = "HEADERS";
[0x2] = "PRIORITY";
[0x3] = "RST_STREAM";
[0x4] = "SETTING";
[0x5] = "PUSH_PROMISE";
[0x6] = "PING";
[0x7] = "GOAWAY";
[0x8] = "WINDOW_UPDATE";
[0x9] = "CONTINUATION";
[0xa] = "ALTSVC";
[0xc] = "ORIGIN";
}
for i=0x0, 0x9 do
frame_types[frame_types[i]] = i
end
local frame_handlers = {}
local stream_methods = {}
for k, v in pairs(stream_common.methods) do
stream_methods[k] = v
end
local stream_mt = {
__name = "http.h2_stream";
__index = stream_methods;
}
function stream_mt:__tostring()
local dependee_list = {}
for s in pairs(self.dependees) do
dependee_list[#dependee_list+1] = string.format("%d", s.id)
end
table.sort(dependee_list)
dependee_list = table.concat(dependee_list, ",")
return string.format("http.h2_stream{connection=%s;id=%s;state=%q;parent=%s;dependees={%s}}",
tostring(self.connection), tostring(self.id), self.state,
(self.parent and tostring(self.parent.id) or "nil"), dependee_list)
end
local function new_stream(connection)
local self = setmetatable({
connection = connection;
type = connection.type;
state = "idle";
id = nil;
peer_flow_credits = 0;
peer_flow_credits_change = cc.new();
parent = nil;
dependees = setmetatable({}, {__mode="kv"});
weight = 16; -- http2 spec, section 5.3.5
rst_stream_error = nil;
stats_sent_headers = 0; -- number of header blocks sent
stats_recv_headers = 0; -- number of header blocks received
stats_sent = 0; -- #bytes sent in DATA blocks
stats_recv = 0; -- #bytes received in DATA blocks
recv_headers_fifo = new_fifo();
recv_headers_cond = cc.new();
chunk_fifo = new_fifo();
chunk_cond = cc.new();
end_stream_after_continuation = nil;
content_length = nil;
}, stream_mt)
return self
end
function stream_methods:pick_id(id)
assert(self.id == nil)
if id == nil then
if self.connection.recv_goaway_lowest then
h2_error.errors.PROTOCOL_ERROR("Receivers of a GOAWAY frame MUST NOT open additional streams on the connection")
end
if self.type == "client" then
-- Pick next free odd number
id = self.connection.highest_odd_stream + 2
self.connection.highest_odd_stream = id
else
-- Pick next free even number
id = self.connection.highest_even_stream + 2
self.connection.highest_even_stream = id
end
self.id = id
else
assert(type(id) == "number" and id >= 0 and id <= 0x7fffffff and id % 1 == 0, "invalid stream id")
assert(self.connection.streams[id] == nil)
self.id = id
if id % 2 == 0 then
if id > self.connection.highest_even_stream then
self.connection.highest_even_stream = id
end
-- stream 'already' existed but was possibly collected. see http2 spec 5.1.1
if id <= self.connection.highest_even_non_idle_stream then
self:set_state("closed")
end
else
if id > self.connection.highest_odd_stream then
self.connection.highest_odd_stream = id
end
-- stream 'already' existed but was possibly collected. see http2 spec 5.1.1
if id <= self.connection.highest_odd_non_idle_stream then
self:set_state("closed")
end
end
end
-- TODO: check MAX_CONCURRENT_STREAMS
self.connection.streams[id] = self
if id == 0 then
self.connection.stream0 = self
else
self.peer_flow_credits = self.connection.peer_settings[known_settings.INITIAL_WINDOW_SIZE]
self.peer_flow_credits_change:signal()
-- Add dependency on stream 0. http2 spec, 5.3.1
self.connection.stream0:reprioritise(self)
end
return true
end
local valid_states = {
["idle"] = 1; -- initial
["open"] = 2; -- have sent or received headers; haven't sent body yet
["reserved (local)"] = 2; -- have sent a PUSH_PROMISE
["reserved (remote)"] = 2; -- have received a PUSH_PROMISE
["half closed (local)"] = 3; -- have sent whole body
["half closed (remote)"] = 3; -- have received whole body
["closed"] = 4; -- complete
}
function stream_methods:set_state(new)
local new_order = assert(valid_states[new])
local old = self.state
if new_order <= valid_states[old] then
error("invalid state progression ('"..old.."' to '"..new.."')")
end
if new ~= "closed" then
assert(self.id)
end
self.state = new
if new == "closed" or new == "half closed (remote)" then
self.recv_headers_cond:signal()
self.chunk_cond:signal()
end
if old == "idle" then
if self.id % 2 == 0 then
if self.id > self.connection.highest_even_non_idle_stream then
self.connection.highest_even_non_idle_stream = self.id
end
else
if self.id > self.connection.highest_odd_non_idle_stream then
self.connection.highest_odd_non_idle_stream = self.id
end
end
end
if old == "idle" and new ~= "closed" then
self.connection.n_active_streams = self.connection.n_active_streams + 1
elseif old ~= "idle" and new == "closed" then
local n_active_streams = self.connection.n_active_streams - 1
self.connection.n_active_streams = n_active_streams
if n_active_streams == 0 then
self.connection:onidle()(self.connection)
end
end
end
function stream_methods:write_http2_frame(typ, flags, payload, timeout, flush)
local stream_id = assert(self.id, "stream has unset id")
return self.connection:write_http2_frame(typ, flags, stream_id, payload, timeout, flush)
end
function stream_methods:reprioritise(child, exclusive)
assert(child)
assert(child.id)
assert(child.id ~= 0) -- cannot reprioritise stream 0
if self == child then
-- http2 spec, section 5.3.1
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("A stream cannot depend on itself", true), ce.EILSEQ
end
do -- Check if the child is an ancestor
local ancestor = self.parent
while ancestor do
if ancestor == child then
-- Break the loop. http spec, section 5.3.3
local ok, err, errno = child.parent:reprioritise(self, false)
if not ok then
return nil, err, errno
end
break
end
ancestor = ancestor.parent
end
end
-- Remove old parent
if child.parent then
child.parent.dependees[child] = nil
end
-- We are now the parent
child.parent = self
if exclusive then
-- All the parent's deps are now the child's
for s, v in pairs(self.dependees) do
s.parent = child
child.dependees[s] = v
self.dependees[s] = nil
end
else
self.dependees[child] = true
end
return true
end
local chunk_methods = {}
local chunk_mt = {
__name = "http.h2_stream.chunk";
__index = chunk_methods;
}
local function new_chunk(original_length, data)
return setmetatable({
original_length = original_length;
acked = false;
data = data;
}, chunk_mt)
end
function chunk_methods:ack()
if self.acked then
return 0
else
self.acked = true
return self.original_length
end
end
frame_handlers[frame_types.DATA] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'DATA' framess MUST be associated with a stream"), ce.EILSEQ
end
if stream.state == "idle" or stream.state == "reserved (remote)" then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'DATA' frames not allowed in 'idle' state"), ce.EILSEQ
elseif stream.state ~= "open" and stream.state ~= "half closed (local)" then
return nil, h2_errors.STREAM_CLOSED:new_traceback("'DATA' frames not allowed in '" .. stream.state .. "' state"), ce.EILSEQ
end
local end_stream = band(flags, 0x1) ~= 0
local padded = band(flags, 0x8) ~= 0
local original_length = #payload
if padded then
local pad_len = sunpack("> B", payload)
if pad_len >= #payload then -- >= will take care of the pad_len itself
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("length of the padding is the length of the frame payload or greater"), ce.EILSEQ
elseif payload:match("[^%z]", -pad_len) then
-- 6.1: A receiver is not obligated to verify padding but MAY treat non-zero padding as a connection error of type PROTOCOL_ERROR.
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("padding not null bytes"), ce.EILSEQ
end
payload = payload:sub(2, -pad_len-1)
end
local stats_recv = stream.stats_recv + #payload
if stream.content_length and stats_recv > stream.content_length then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("content-length exceeded", true), ce.EILSEQ
end
local chunk = new_chunk(original_length, payload)
stream.chunk_fifo:push(chunk)
stream.stats_recv = stats_recv
if end_stream then
stream.chunk_fifo:push(nil)
-- chunk_cond gets signaled by :set_state
if stream.state == "half closed (local)" then
stream:set_state("closed")
else
stream:set_state("half closed (remote)")
end
else
stream.chunk_cond:signal()
end
return true
end
function stream_methods:write_data_frame(payload, end_stream, padded, timeout, flush)
if self.id == 0 then
h2_errors.PROTOCOL_ERROR("'DATA' frames MUST be associated with a stream")
end
if self.state ~= "open" and self.state ~= "half closed (remote)" then
h2_errors.STREAM_CLOSED("'DATA' frame not allowed in '" .. self.state .. "' state")
end
local pad_len, padding = "", ""
local flags = 0
if end_stream then
flags = bor(flags, 0x1)
end
if padded then
flags = bor(flags, 0x8)
pad_len = spack("> B", padded)
padding = ("\0"):rep(padded)
end
payload = pad_len .. payload .. padding
-- The entire DATA frame payload is included in flow control,
-- including Pad Length and Padding fields if present
local new_stream_peer_flow_credits = self.peer_flow_credits - #payload
local new_connection_peer_flow_credits = self.connection.peer_flow_credits - #payload
if new_stream_peer_flow_credits < 0 or new_connection_peer_flow_credits < 0 then
h2_errors.FLOW_CONTROL_ERROR("not enough flow credits")
end
local ok, err, errno = self:write_http2_frame(frame_types.DATA, flags, payload, timeout, flush)
if not ok then return nil, err, errno end
self.peer_flow_credits = new_stream_peer_flow_credits
self.connection.peer_flow_credits = new_connection_peer_flow_credits
self.stats_sent = self.stats_sent + #payload
if end_stream then
if self.state == "half closed (remote)" then
self:set_state("closed")
else
self:set_state("half closed (local)")
end
end
return ok
end
-- Map from header name to whether it belongs in a request (vs a response)
local valid_pseudo_headers = {
[":method"] = true;
[":scheme"] = true;
[":path"] = true;
[":authority"] = true;
[":status"] = false;
}
local function validate_headers(headers, is_request, nth_header, ended_stream)
-- Section 8.1.2: A request or response containing uppercase header field names MUST be treated as malformed
for name in headers:each() do
if name:lower() ~= name then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("header field names MUST be lowercase", true), ce.EINVAL
end
end
do -- Section 8.1.2.1: Validate that all colon fields are before other ones
local seen_non_colon = false
for name, value in headers:each() do
if name:sub(1,1) == ":" then
--[[ Pseudo-header fields are only valid in the context in
which they are defined. Pseudo-header fields defined for
requests MUST NOT appear in responses; pseudo-header fields
defined for responses MUST NOT appear in requests.
Pseudo-header fields MUST NOT appear in trailers.
Endpoints MUST treat a request or response that contains
undefined or invalid pseudo-header fields as malformed]]
if (is_request and nth_header ~= 1) or valid_pseudo_headers[name] ~= is_request then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("Pseudo-header fields are only valid in the context in which they are defined", true), ce.EILSEQ
end
if seen_non_colon then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("All pseudo-header fields MUST appear in the header block before regular header fields", true), ce.EILSEQ
end
else
seen_non_colon = true
end
if type(value) ~= "string" then
return nil, "invalid header field", ce.EINVAL
end
end
end
if headers:has("connection") then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("An endpoint MUST NOT generate an HTTP/2 message containing connection-specific header fields", true), ce.EILSEQ
end
local te = headers:get_as_sequence("te")
if te.n > 0 and (te[1] ~= "trailers" or te.n ~= 1) then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback([[The TE header field, which MAY be present in an HTTP/2 request; when it is, it MUST NOT contain any value other than "trailers"]], true), ce.EILSEQ
end
if is_request then
if nth_header == 1 then
--[[ All HTTP/2 requests MUST include exactly one valid value for the :method, :scheme,
and :path pseudo-header fields, unless it is a CONNECT request (Section 8.3).
An HTTP request that omits mandatory pseudo-header fields is malformed (Section 8.1.2.6).]]
local methods = headers:get_as_sequence(":method")
if methods.n ~= 1 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("requests MUST include exactly one valid value for the :method, :scheme, and :path pseudo-header fields, unless it is a CONNECT request", true), ce.EILSEQ
elseif methods[1] ~= "CONNECT" then
local scheme = headers:get_as_sequence(":scheme")
local path = headers:get_as_sequence(":path")
if scheme.n ~= 1 or path.n ~= 1 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("requests MUST include exactly one valid value for the :method, :scheme, and :path pseudo-header fields, unless it is a CONNECT request", true), ce.EILSEQ
end
if path[1] == "" and (scheme[1] == "http" or scheme[1] == "https") then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("The :path pseudo-header field MUST NOT be empty for http or https URIs", true), ce.EILSEQ
end
else -- is CONNECT method
-- Section 8.3
if headers:has(":scheme") or headers:has(":path") then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("For a CONNECT request, the :scheme and :path pseudo-header fields MUST be omitted", true), ce.EILSEQ
end
end
elseif nth_header == 2 then
if not ended_stream then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("Trailers MUST be at end of stream", true), ce.EILSEQ
end
elseif nth_header > 2 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("An HTTP request consists of maximum 2 HEADER blocks", true), ce.EILSEQ
end
else
--[[ For HTTP/2 responses, a single :status pseudo-header field is
defined that carries the HTTP status code field (RFC7231, Section 6).
This pseudo-header field MUST be included in all responses; otherwise,
the response is malformed (Section 8.1.2.6)]]
if not headers:has(":status") then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback(":status pseudo-header field MUST be included in all responses", true), ce.EILSEQ
end
end
return true
end
local function process_end_headers(stream, end_stream, pad_len, pos, promised_stream, payload)
if pad_len > 0 then
if pad_len + pos - 1 > #payload then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("length of the padding is the length of the frame payload or greater"), ce.EILSEQ
elseif payload:match("[^%z]", -pad_len) then
-- 6.2: Padding fields and flags are identical to those defined for DATA frames
-- 6.1: A receiver is not obligated to verify padding but MAY treat non-zero padding as a connection error of type PROTOCOL_ERROR.
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("padding not null bytes"), ce.EILSEQ
end
payload = payload:sub(1, -pad_len-1)
end
local headers, newpos, errno = stream.connection.decoding_context:decode_headers(payload, nil, pos)
if not headers then
return nil, newpos, errno
end
if newpos ~= #payload + 1 then
return nil, h2_errors.COMPRESSION_ERROR:new_traceback("incomplete header fragment"), ce.EILSEQ
end
if not promised_stream then
stream.stats_recv_headers = stream.stats_recv_headers + 1
local validate_ok, validate_err, errno2 = validate_headers(headers, stream.type ~= "client", stream.stats_recv_headers, end_stream)
if not validate_ok then
return nil, validate_err, errno2
end
if headers:has("content-length") then
stream.content_length = tonumber(headers:get("content-length"), 10)
end
stream.recv_headers_fifo:push(headers)
if end_stream then
stream.chunk_fifo:push(nil)
-- recv_headers_cond and chunk_cond get signaled by :set_state
if stream.state == "half closed (local)" then
stream:set_state("closed")
else
stream:set_state("half closed (remote)")
end
else
stream.recv_headers_cond:signal()
if stream.state == "idle" then
stream:set_state("open")
end
end
else
local validate_ok, validate_err, errno2 = validate_headers(headers, true, 1, false)
if not validate_ok then
return nil, validate_err, errno2
end
promised_stream:set_state("reserved (remote)")
promised_stream.recv_headers_fifo:push(headers)
promised_stream.recv_headers_cond:signal()
-- If we have sent a haven't seen this stream before, and we should be discarding frames from it,
-- then don't push it into the new_streams fifo
if stream.connection.send_goaway_lowest == nil or promised_stream.id <= stream.connection.send_goaway_lowest then
stream.connection.new_streams:push(promised_stream)
stream.connection.new_streams_cond:signal(1)
end
end
return true
end
frame_handlers[frame_types.HEADERS] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'HEADERS' frames MUST be associated with a stream"), ce.EILSEQ
end
if stream.state ~= "idle" and stream.state ~= "open" and stream.state ~= "half closed (local)" and stream.state ~= "reserved (remote)" then
return nil, h2_errors.STREAM_CLOSED:new_traceback("'HEADERS' frame not allowed in '" .. stream.state .. "' state"), ce.EILSEQ
end
local end_stream = band(flags, 0x1) ~= 0
local end_headers = band(flags, 0x04) ~= 0
local padded = band(flags, 0x8) ~= 0
local priority = band(flags, 0x20) ~= 0
-- index where payload body starts
local pos = 1
local pad_len
if padded then
pad_len = sunpack("> B", payload, pos)
pos = 2
else
pad_len = 0
end
if priority then
local exclusive, stream_dep, weight
local tmp
tmp, weight = sunpack(">I4 B", payload, pos)
exclusive = band(tmp, 0x80000000) ~= 0
stream_dep = band(tmp, 0x7fffffff)
weight = weight + 1
pos = pos + 5
local new_parent = stream.connection.streams[stream_dep]
-- 5.3.1. Stream Dependencies
-- A dependency on a stream that is not currently in the tree
-- results in that stream being given a default priority
if new_parent then
local ok, err, errno = new_parent:reprioritise(stream, exclusive)
if not ok then
return nil, err, errno
end
stream.weight = weight
end
end
local len = #payload - pos + 1 -- TODO: minus pad_len?
if len > MAX_HEADER_BUFFER_SIZE then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("headers too large"), ce.E2BIG
end
if end_headers then
return process_end_headers(stream, end_stream, pad_len, pos, nil, payload)
else
stream.connection.need_continuation = stream
stream.connection.recv_headers_end_stream = end_stream
stream.connection.recv_headers_buffer = { payload }
stream.connection.recv_headers_buffer_pos = pos
stream.connection.recv_headers_buffer_pad_len = pad_len
stream.connection.recv_headers_buffer_items = 1
stream.connection.recv_headers_buffer_length = len
return true
end
end
function stream_methods:write_headers_frame(payload, end_stream, end_headers, padded, exclusive, stream_dep, weight, timeout, flush)
assert(self.state ~= "closed" and self.state ~= "half closed (local)")
if self.id == nil then
self:pick_id()
end
local pad_len, pri, padding = "", "", ""
local flags = 0
if end_stream then
flags = bor(flags, 0x1)
end
if end_headers then
flags = bor(flags, 0x4)
end
if padded then
flags = bor(flags, 0x8)
pad_len = spack("> B", padded)
padding = ("\0"):rep(padded)
end
if weight or stream_dep then
flags = bor(flags, 0x20)
assert(stream_dep <= 0x7fffffff)
local tmp = stream_dep
if exclusive then
tmp = bor(tmp, 0x80000000)
end
weight = weight and weight - 1 or 0
pri = spack("> I4 B", tmp, weight)
end
payload = pad_len .. pri .. payload .. padding
local ok, err, errno = self:write_http2_frame(frame_types.HEADERS, flags, payload, timeout, flush)
if ok == nil then
return nil, err, errno
end
self.stats_sent_headers = self.stats_sent_headers + 1
if end_headers then
if end_stream then
if self.state == "half closed (remote)" or self.state == "reserved (local)" then
self:set_state("closed")
else
self:set_state("half closed (local)")
end
else
if self.state == "idle" then
self:set_state("open")
elseif self.state == "reserved (local)" then
self:set_state("half closed (remote)")
end
end
else
self.end_stream_after_continuation = end_stream
end
return ok
end
frame_handlers[frame_types.PRIORITY] = function(stream, flags, payload) -- luacheck: ignore 212
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'PRIORITY' frames MUST be associated with a stream"), ce.EILSEQ
end
if #payload ~= 5 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'PRIORITY' frames must be 5 bytes", true), ce.EILSEQ
end
local exclusive, stream_dep, weight
local tmp
tmp, weight = sunpack(">I4 B", payload)
weight = weight + 1
exclusive = band(tmp, 0x80000000) ~= 0
stream_dep = band(tmp, 0x7fffffff)
-- 5.3.1. Stream Dependencies
-- A dependency on a stream that is not currently in the tree
-- results in that stream being given a default priority
local new_parent = stream.connection.streams[stream_dep]
if new_parent then
local ok, err, errno = new_parent:reprioritise(stream, exclusive)
if not ok then
return nil, err, errno
end
stream.weight = weight
end
return true
end
function stream_methods:write_priority_frame(exclusive, stream_dep, weight, timeout, flush)
assert(stream_dep <= 0x7fffffff)
if self.id == nil then
self:pick_id()
end
local tmp = stream_dep
if exclusive then
tmp = bor(tmp, 0x80000000)
end
weight = weight and weight - 1 or 0
local payload = spack("> I4 B", tmp, weight)
return self:write_http2_frame(frame_types.PRIORITY, 0, payload, timeout, flush)
end
frame_handlers[frame_types.RST_STREAM] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'RST_STREAM' frames MUST be associated with a stream"), ce.EILSEQ
end
if #payload ~= 4 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'RST_STREAM' frames must be 4 bytes"), ce.EILSEQ
end
if stream.state == "idle" then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'RST_STREAM' frames MUST NOT be sent for a stream in the 'idle' state"), ce.EILSEQ
elseif stream.state == "closed" then
-- probably a delayed RST_STREAM, ignore
return true
end
local err_code = sunpack(">I4", payload)
stream.rst_stream_error = (h2_errors[err_code] or h2_errors.INTERNAL_ERROR):new {
message = string.format("'RST_STREAM' on stream #%d (code=0x%x)", stream.id, err_code);
stream_error = true;
}
stream:set_state("closed")
return true
end
function stream_methods:write_rst_stream_frame(err_code, timeout, flush)
if self.id == 0 then
h2_errors.PROTOCOL_ERROR("'RST_STREAM' frames MUST be associated with a stream")
end
if self.state == "idle" then
h2_errors.PROTOCOL_ERROR([['RST_STREAM' frames MUST NOT be sent for a stream in the "idle" state]])
end
local flags = 0
local payload = spack(">I4", err_code)
local ok, err, errno = self:write_http2_frame(frame_types.RST_STREAM, flags, payload, timeout, flush)
if not ok then return nil, err, errno end
if self.state ~= "closed" then
self:set_state("closed")
end
self:shutdown()
return ok
end
function stream_methods:rst_stream(err, timeout)
local code
if err == nil then
code = 0
elseif h2_error.is(err) then
code = err.code
else
err = h2_errors.INTERNAL_ERROR:new {
message = tostring(err);
stream_error = true;
}
code = err.code
end
if self.rst_stream_error == nil then
self.rst_stream_error = err
end
return self:write_rst_stream_frame(code, timeout)
end
frame_handlers[frame_types.SETTING] = function(stream, flags, payload, deadline)
if stream.id ~= 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("stream identifier for a 'SETTINGS' frame MUST be zero"), ce.EILSEQ
end
local ack = band(flags, 0x1) ~= 0
if ack then -- server is ACK-ing our settings
if #payload ~= 0 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("Receipt of a 'SETTINGS' frame with the ACK flag set and a length field value other than 0"), ce.EILSEQ
end
stream.connection:ack_settings()
return true
else -- settings from server
if #payload % 6 ~= 0 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'SETTINGS' frame with a length other than a multiple of 6 octets"), ce.EILSEQ
end
local peer_settings = {}
for i=1, #payload, 6 do
local id, val = sunpack(">I2 I4", payload, i)
if id == known_settings.HEADER_TABLE_SIZE then
stream.connection.encoding_context:set_max_dynamic_table_size(val)
-- Add a 'max size' element to the next outgoing header
stream.connection.encoding_context:encode_max_size(val)
elseif id == known_settings.ENABLE_PUSH then
-- Convert to boolean
if val == 0 then
val = false
elseif val == 1 then
val = true
else
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("invalid value for boolean"), ce.EILSEQ
end
if val and stream.type == "client" then
-- Clients MUST reject any attempt to change the SETTINGS_ENABLE_PUSH
-- setting to a value other than 0 by treating the message as a connection
-- error of type PROTOCOL_ERROR.
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("SETTINGS_ENABLE_PUSH not allowed for clients"), ce.EILSEQ
end
elseif id == known_settings.INITIAL_WINDOW_SIZE then
if val >= 2^31 then
return nil, h2_errors.FLOW_CONTROL_ERROR:new_traceback("SETTINGS_INITIAL_WINDOW_SIZE must be less than 2^31"), ce.EILSEQ
end
elseif id == known_settings.MAX_FRAME_SIZE then
if val < 16384 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("SETTINGS_MAX_FRAME_SIZE must be greater than or equal to 16384"), ce.EILSEQ
elseif val >= 2^24 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("SETTINGS_MAX_FRAME_SIZE must be less than 2^24"), ce.EILSEQ
end
end
peer_settings[id] = val
end
stream.connection:set_peer_settings(peer_settings)
-- Ack server's settings
local ok, err, errno = stream:write_settings_frame(true, nil, 0, "f")
if not ok then
return ok, err, errno
end
-- ignore :flush failure
stream.connection:flush(deadline and deadline-monotime())
return true
end
end
local function pack_settings_payload(settings)
local i = 0
local a = {}
local function append(k, v)
a[i*2+1] = k
a[i*2+2] = v
i = i + 1
end
local HEADER_TABLE_SIZE = settings[0x1]
if HEADER_TABLE_SIZE == nil then
HEADER_TABLE_SIZE = settings.HEADER_TABLE_SIZE
end
if HEADER_TABLE_SIZE ~= nil then
append(0x1, HEADER_TABLE_SIZE)
end
local ENABLE_PUSH = settings[0x2]
if ENABLE_PUSH == nil then
ENABLE_PUSH = settings.ENABLE_PUSH
end
if ENABLE_PUSH ~= nil then
if type(ENABLE_PUSH) == "boolean" then
ENABLE_PUSH = ENABLE_PUSH and 1 or 0
end
append(0x2, ENABLE_PUSH)
ENABLE_PUSH = ENABLE_PUSH ~= 0
end
local MAX_CONCURRENT_STREAMS = settings[0x3]
if MAX_CONCURRENT_STREAMS == nil then
MAX_CONCURRENT_STREAMS = settings.MAX_CONCURRENT_STREAMS
end
if MAX_CONCURRENT_STREAMS ~= nil then
append(0x3, MAX_CONCURRENT_STREAMS)
end
local INITIAL_WINDOW_SIZE = settings[0x4]
if INITIAL_WINDOW_SIZE == nil then
INITIAL_WINDOW_SIZE = settings.INITIAL_WINDOW_SIZE
end
if INITIAL_WINDOW_SIZE ~= nil then
if INITIAL_WINDOW_SIZE >= 2^31 then
h2_errors.FLOW_CONTROL_ERROR("SETTINGS_INITIAL_WINDOW_SIZE must be less than 2^31")
end
append(0x4, INITIAL_WINDOW_SIZE)
end
local MAX_FRAME_SIZE = settings[0x5]
if MAX_FRAME_SIZE == nil then
MAX_FRAME_SIZE = settings.MAX_FRAME_SIZE
end
if MAX_FRAME_SIZE ~= nil then
if MAX_FRAME_SIZE < 16384 then
h2_errors.PROTOCOL_ERROR("SETTINGS_MAX_FRAME_SIZE must be greater than or equal to 16384")
elseif MAX_FRAME_SIZE >= 2^24 then
h2_errors.PROTOCOL_ERROR("SETTINGS_MAX_FRAME_SIZE must be less than 2^24")
end
append(0x5, MAX_FRAME_SIZE)
end
local MAX_HEADER_LIST_SIZE = settings[0x6]
if MAX_HEADER_LIST_SIZE == nil then
MAX_HEADER_LIST_SIZE = settings.MAX_HEADER_LIST_SIZE
end
if MAX_HEADER_LIST_SIZE ~= nil then
append(0x6, MAX_HEADER_LIST_SIZE)
end
local settings_to_merge = {
HEADER_TABLE_SIZE;
ENABLE_PUSH;
MAX_CONCURRENT_STREAMS;
INITIAL_WINDOW_SIZE;
MAX_FRAME_SIZE;
MAX_HEADER_LIST_SIZE;
}
return spack(">" .. ("I2 I4"):rep(i), unpack(a, 1, i*2)), settings_to_merge
end
function stream_methods:write_settings_frame(ACK, settings, timeout, flush)
if self.id ~= 0 then
h2_errors.PROTOCOL_ERROR("'SETTINGS' frames must be on stream id 0")
end
local flags, payload, settings_to_merge
if ACK then
if settings ~= nil then
h2_errors.PROTOCOL_ERROR("'SETTINGS' ACK cannot have new settings")
end
flags = 0x1
payload = ""
else
flags = 0
payload, settings_to_merge = pack_settings_payload(settings)
end
local ok, err, errno = self:write_http2_frame(frame_types.SETTING, flags, payload, timeout, flush)
if ok and not ACK then
local n = self.connection.send_settings.n + 1
self.connection.send_settings.n = n
self.connection.send_settings[n] = settings_to_merge
ok = n
end
return ok, err, errno
end
frame_handlers[frame_types.PUSH_PROMISE] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if not stream.connection.acked_settings[known_settings.ENABLE_PUSH] then
-- An endpoint that has both set this parameter to 0 and had it acknowledged MUST
-- treat the receipt of a PUSH_PROMISE frame as a connection error of type PROTOCOL_ERROR.
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("SETTINGS_ENABLE_PUSH is 0"), ce.EILSEQ
elseif stream.type == "server" then
-- A client cannot push. Thus, servers MUST treat the receipt of a PUSH_PROMISE
-- frame as a connection error of type PROTOCOL_ERROR.
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("A client cannot push"), ce.EILSEQ
end
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'PUSH_PROMISE' frames MUST be associated with a stream"), ce.EILSEQ
end
local end_headers = band(flags, 0x04) ~= 0
local padded = band(flags, 0x8) ~= 0
-- index where payload body starts
local pos = 1
local pad_len
if padded then
pad_len = sunpack("> B", payload, pos)
pos = 2
else
pad_len = 0
end
local tmp = sunpack(">I4", payload, pos)
local promised_stream_id = band(tmp, 0x7fffffff)
pos = pos + 4
local len = #payload - pos + 1 -- TODO: minus pad_len?
if len > MAX_HEADER_BUFFER_SIZE then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("headers too large"), ce.EILSEQ
end
local promised_stream = stream.connection:new_stream(promised_stream_id)
stream:reprioritise(promised_stream)
if end_headers then
return process_end_headers(stream, false, pad_len, pos, promised_stream, payload)
else
stream.connection.need_continuation = stream
stream.connection.promised_stream = promised_stream
stream.connection.recv_headers_end_stream = false
stream.connection.recv_headers_buffer = { payload }
stream.connection.recv_headers_buffer_pos = pos
stream.connection.recv_headers_buffer_pad_len = pad_len
stream.connection.recv_headers_buffer_items = 1
stream.connection.recv_headers_buffer_length = len
return true
end
end
function stream_methods:write_push_promise_frame(promised_stream_id, payload, end_headers, padded, timeout, flush)
assert(self.state == "open" or self.state == "half closed (remote)")
assert(self.id ~= 0)
local promised_stream = self.connection.streams[promised_stream_id]
assert(promised_stream and promised_stream.state == "idle")
-- 8.2.1: PUSH_PROMISE frames MUST NOT be sent by the client.
assert(self.type == "server" and promised_stream.id % 2 == 0)
local pad_len, padding = "", ""
local flags = 0
if end_headers then
flags = bor(flags, 0x4)
end
if padded then
flags = bor(flags, 0x8)
pad_len = spack("> B", padded)
padding = ("\0"):rep(padded)
end
promised_stream_id = spack(">I4", promised_stream_id)
payload = pad_len .. promised_stream_id .. payload .. padding
local ok, err, errno = self:write_http2_frame(frame_types.PUSH_PROMISE, flags, payload, 0, "f")
if ok == nil then
return nil, err, errno
end
if end_headers then
promised_stream:set_state("reserved (local)")
else
promised_stream.end_stream_after_continuation = false
end
if flush ~= "f" then
return self.connection:flush(timeout)
else
return true
end
end
frame_handlers[frame_types.PING] = function(stream, flags, payload, deadline)
if stream.id ~= 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'PING' must be on stream id 0"), ce.EILSEQ
end
if #payload ~= 8 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'PING' frames must be 8 bytes"), ce.EILSEQ
end
local ack = band(flags, 0x1) ~= 0
if ack then
local cond = stream.connection.pongs[payload]
if cond then
cond:signal()
stream.connection.pongs[payload] = nil
end
return true
else
return stream:write_ping_frame(true, payload, deadline and deadline-monotime())
end
end
function stream_methods:write_ping_frame(ACK, payload, timeout, flush)
if self.id ~= 0 then
h2_errors.PROTOCOL_ERROR("'PING' frames must be on stream id 0")
end
if #payload ~= 8 then
h2_errors.FRAME_SIZE_ERROR("'PING' frames must have 8 byte payload")
end
local flags = ACK and 0x1 or 0
return self:write_http2_frame(frame_types.PING, flags, payload, timeout, flush)
end
frame_handlers[frame_types.GOAWAY] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if stream.id ~= 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'GOAWAY' frames must be on stream id 0"), ce.EILSEQ
end
if #payload < 8 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'GOAWAY' frames must be at least 8 bytes"), ce.EILSEQ
end
local last_streamid = sunpack(">I4 I4", payload)
if stream.connection.recv_goaway_lowest == nil or last_streamid < stream.connection.recv_goaway_lowest then
stream.connection.recv_goaway_lowest = last_streamid
stream.connection.recv_goaway:signal()
end
return true
end
function stream_methods:write_goaway_frame(last_streamid, err_code, debug_msg, timeout, flush)
if self.id ~= 0 then
h2_errors.PROTOCOL_ERROR("'GOAWAY' frames MUST be on stream 0")
end
if self.connection.send_goaway_lowest and last_streamid > self.connection.send_goaway_lowest then
h2_errors.PROTOCOL_ERROR("Endpoints MUST NOT increase the value they send in the last stream identifier")
end
local flags = 0
local payload = spack(">I4 I4", last_streamid, err_code)
if debug_msg then
payload = payload .. debug_msg
end
local ok, err, errno = self:write_http2_frame(frame_types.GOAWAY, flags, payload, 0, "f")
if not ok then
return nil, err, errno
end
self.connection.send_goaway_lowest = last_streamid
if flush ~= "f" then
return self.connection:flush(timeout)
else
return true
end
end
frame_handlers[frame_types.WINDOW_UPDATE] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if #payload ~= 4 then
return nil, h2_errors.FRAME_SIZE_ERROR:new_traceback("'WINDOW_UPDATE' frames must be 4 bytes"), ce.EILSEQ
end
if stream.id ~= 0 and stream.state == "idle" then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback([['WINDOW_UPDATE' frames not allowed in "idle" state]]), ce.EILSEQ
end
local tmp = sunpack(">I4", payload)
if band(tmp, 0x80000000) ~= 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'WINDOW_UPDATE' reserved bit set"), ce.EILSEQ
end
local increment = band(tmp, 0x7fffffff)
if increment == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'WINDOW_UPDATE' MUST not have an increment of 0", stream.id ~= 0), ce.EILSEQ
end
local ob
if stream.id == 0 then -- for connection
ob = stream.connection
else
ob = stream
end
local newval = ob.peer_flow_credits + increment
if newval > 2^31-1 then
return nil, h2_errors.FLOW_CONTROL_ERROR:new_traceback("A sender MUST NOT allow a flow-control window to exceed 2^31-1 octets", stream.id ~= 0), ce.EILSEQ
end
ob.peer_flow_credits = newval
ob.peer_flow_credits_change:signal()
return true
end
function stream_methods:write_window_update_frame(inc, timeout, flush)
local flags = 0
if self.id ~= 0 and self.state == "idle" then
h2_errors.PROTOCOL_ERROR([['WINDOW_UPDATE' frames not allowed in "idle" state]])
end
if inc > 0x7fffffff or inc <= 0 then
h2_errors.PROTOCOL_ERROR("invalid window update increment", true)
end
local payload = spack(">I4", inc)
return self:write_http2_frame(frame_types.WINDOW_UPDATE, flags, payload, timeout, flush)
end
function stream_methods:write_window_update(inc, timeout)
while inc > 0x7fffffff do
local ok, err, errno = self:write_window_update_frame(0x7fffffff, 0, "f")
if not ok then
return nil, err, errno
end
inc = inc - 0x7fffffff
end
return self:write_window_update_frame(inc, timeout)
end
frame_handlers[frame_types.CONTINUATION] = function(stream, flags, payload, deadline) -- luacheck: ignore 212
if stream.id == 0 then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'CONTINUATION' frames MUST be associated with a stream"), ce.EILSEQ
end
if not stream.connection.need_continuation then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("'CONTINUATION' frames MUST be preceded by a 'HEADERS', 'PUSH_PROMISE' or 'CONTINUATION' frame without the 'END_HEADERS' flag set"), ce.EILSEQ
end
local end_headers = band(flags, 0x04) ~= 0
local len = stream.connection.recv_headers_buffer_length + #payload
if len > MAX_HEADER_BUFFER_SIZE then
return nil, h2_errors.PROTOCOL_ERROR:new_traceback("headers too large"), ce.E2BIG
end
table.insert(stream.connection.recv_headers_buffer, payload)
stream.connection.recv_headers_buffer_items = stream.connection.recv_headers_buffer_items + 1
stream.connection.recv_headers_buffer_length = len
if end_headers then
local promised_stream = stream.connection.promised_stream
local pad_len = stream.connection.recv_headers_buffer_pad_len
local pos = stream.connection.recv_headers_buffer_pos
local end_stream = stream.connection.recv_headers_end_stream
payload = table.concat(stream.connection.recv_headers_buffer, "", 1, stream.connection.recv_headers_buffer_items)
stream.connection.recv_headers_end_stream = nil
stream.connection.recv_headers_buffer = nil
stream.connection.recv_headers_buffer_pos = nil
stream.connection.recv_headers_buffer_pad_len = nil
stream.connection.recv_headers_buffer_items = nil
stream.connection.recv_headers_buffer_length = nil
stream.connection.promised_stream = nil
stream.connection.need_continuation = nil
return process_end_headers(stream, end_stream, pad_len, pos, promised_stream, payload)
else
return true
end
end
function stream_methods:write_continuation_frame(payload, end_headers, timeout, flush)
assert(self.state ~= "closed" and self.state ~= "half closed (local)")
local flags = 0
if end_headers then
flags = bor(flags, 0x4)
end
local ok, err, errno = self:write_http2_frame(frame_types.CONTINUATION, flags, payload, timeout, flush)
if ok == nil then
return nil, err, errno
end
if end_headers then
if self.end_stream_after_continuation then
if self.state == "half closed (remote)" or self.state == "reserved (local)" then
self:set_state("closed")
else
self:set_state("half closed (local)")
end
else
if self.state == "idle" then
self:set_state("open")
elseif self.state == "reserved (local)" then
self:set_state("half closed (remote)")
end
end
else
self.end_stream_after_continuation = nil
end
return ok
end
-------------------------------------------
function stream_methods:shutdown()
if self.state ~= "idle" and self.state ~= "closed" and self.id ~= 0 then
self:rst_stream(nil, 0) -- ignore result
end
local len = 0
for i=1, self.chunk_fifo:length() do
local chunk = self.chunk_fifo:peek(i)
if chunk ~= nil then
len = len + chunk:ack()
end
end
if len > 0 then
self.connection:write_window_update(len, 0)
end
return true
end
-- this function *should never throw*
function stream_methods:get_headers(timeout)
local deadline = timeout and (monotime()+timeout)
while self.recv_headers_fifo:length() < 1 do
if self.state == "closed" then
return nil, self.rst_stream_error
end
local which = cqueues.poll(self.recv_headers_cond, self.connection, timeout)
if which == self.connection then
local ok, err, errno = self.connection:step(0)
if not ok then
return nil, err, errno
end
elseif which == timeout then
return nil, ce.strerror(ce.ETIMEDOUT), ce.ETIMEDOUT
end
timeout = deadline and (deadline-monotime())
end
local headers = self.recv_headers_fifo:pop()
return headers
end
function stream_methods:get_next_chunk(timeout)
local deadline = timeout and (monotime()+timeout)
while self.chunk_fifo:length() == 0 do
if self.state == "closed" or self.state == "half closed (remote)" then
return nil, self.rst_stream_error
end
local which = cqueues.poll(self.chunk_cond, self.connection, timeout)
if which == self.connection then
local ok, err, errno = self.connection:step(0)
if not ok then
return nil, err, errno
end
elseif which == timeout then
return nil, ce.strerror(ce.ETIMEDOUT), ce.ETIMEDOUT
end
timeout = deadline and (deadline-monotime())
end
local chunk = self.chunk_fifo:pop()
if chunk == nil then
return nil
else
local data = chunk.data
local len = chunk:ack()
if len > 0 then
-- if they don't get flushed now they will get flushed on next read or write
self:write_window_update(len, 0)
self.connection:write_window_update(len, 0)
end
return data
end
end
function stream_methods:unget(str)
local chunk = new_chunk(0, str)
self.chunk_fifo:insert(1, chunk)
self.chunk_cond:signal()
return true
end
local function write_headers(self, func, headers, extra_frame_data_len, timeout)
local deadline = timeout and (monotime()+timeout)
local SETTINGS_MAX_FRAME_SIZE = self.connection.peer_settings[known_settings.MAX_FRAME_SIZE]
local first_frame_max_size = SETTINGS_MAX_FRAME_SIZE - extra_frame_data_len
assert(first_frame_max_size >= 0)
local encoding_context = self.connection.encoding_context
encoding_context:encode_headers(headers)
local payload = encoding_context:render_data()
encoding_context:clear_data()
if #payload <= first_frame_max_size then
local ok, err, errno = func(payload, true, deadline)
if not ok then
return ok, err, errno
end
else
do
local partial = payload:sub(1, first_frame_max_size)
local ok, err, errno = func(partial, false, deadline)
if not ok then
return ok, err, errno
end
end
local sent = first_frame_max_size
local max = #payload-SETTINGS_MAX_FRAME_SIZE
while sent < max do
local partial = payload:sub(sent+1, sent+SETTINGS_MAX_FRAME_SIZE)
local ok, err, errno = self:write_continuation_frame(partial, false, deadline and deadline-monotime())
if not ok then
return ok, err, errno
end
sent = sent + SETTINGS_MAX_FRAME_SIZE
end
do
local partial = payload:sub(sent+1)
local ok, err, errno = self:write_continuation_frame(partial, true, deadline and deadline-monotime())
if not ok then
return ok, err, errno
end
end
end
return true
end
function stream_methods:write_headers(headers, end_stream, timeout)
assert(headers, "missing argument: headers")
assert(validate_headers(headers, self.type == "client", self.stats_sent_headers+1, end_stream))
assert(type(end_stream) == "boolean", "'end_stream' MUST be a boolean")
local padded, exclusive, stream_dep, weight = nil, nil, nil, nil
return write_headers(self, function(payload, end_headers, deadline)
return self:write_headers_frame(payload, end_stream, end_headers, padded, exclusive, stream_dep, weight, deadline and deadline-monotime())
end, headers, 0, timeout)
end
function stream_methods:push_promise(headers, timeout)
assert(self.type == "server")
assert(headers, "missing argument: headers")
assert(validate_headers(headers, true, 1, false))
assert(headers:has(":authority"), "PUSH_PROMISE must have an :authority")
local promised_stream = self.connection:new_stream()
promised_stream:pick_id()
self:reprioritise(promised_stream)
local padded = nil
local ok, err, errno = write_headers(self, function(payload, end_headers, deadline)
return self:write_push_promise_frame(promised_stream.id, payload, end_headers, padded, deadline)
end, headers, 4, timeout) -- 4 is size of promised stream id
if not ok then
return nil, err, errno
end
promised_stream.recv_headers_fifo:push(headers)
promised_stream.recv_headers_cond:signal()
return promised_stream
end
function stream_methods:write_chunk(payload, end_stream, timeout)
local deadline = timeout and (monotime()+timeout)
local sent = 0
while true do
while self.peer_flow_credits <= 0 do
local which = cqueues.poll(self.peer_flow_credits_change, self.connection, timeout)
if which == self.connection then
local ok, err, errno = self.connection:step(0)
if not ok then
return nil, err, errno
end
elseif which == timeout then
return nil, ce.strerror(ce.ETIMEDOUT), ce.ETIMEDOUT
end
timeout = deadline and (deadline-monotime())
end
while self.connection.peer_flow_credits <= 0 do
local which = cqueues.poll(self.connection.peer_flow_credits_change, self.connection, timeout)
if which == self.connection then
local ok, err, errno = self.connection:step(0)
if not ok then
return nil, err, errno
end
elseif which == timeout then
return nil, ce.strerror(ce.ETIMEDOUT), ce.ETIMEDOUT
end
timeout = deadline and (deadline-monotime())
end
local SETTINGS_MAX_FRAME_SIZE = self.connection.peer_settings[known_settings.MAX_FRAME_SIZE]
local max_available = math.min(self.peer_flow_credits, self.connection.peer_flow_credits, SETTINGS_MAX_FRAME_SIZE)
if max_available < (#payload - sent) then
if max_available > 0 then
-- send partial payload
local ok, err, errno = self:write_data_frame(payload:sub(sent+1, sent+max_available), false, false, timeout)
if not ok then
return nil, err, errno
end
sent = sent + max_available
end
else
break
end
timeout = deadline and (deadline-monotime())
end
local ok, err, errno = self:write_data_frame(payload:sub(sent+1), end_stream, false, timeout)
if not ok then
return nil, err, errno
end
return true
end
return {
new = new_stream;
methods = stream_methods;
mt = stream_mt;
known_settings = known_settings;
frame_types = frame_types;
frame_handlers = frame_handlers;
pack_settings_payload = pack_settings_payload;
}