This is an automated email from the ASF dual-hosted git repository. markt pushed a commit to branch 8.5.x in repository https://gitbox.apache.org/repos/asf/tomcat.git
commit 7943b50c241a051a49b212e90e25291d1ebcbe97 Author: Mark Thomas <ma...@apache.org> AuthorDate: Wed Aug 7 17:02:37 2019 +0100 Improve HTTP/2 connection timeout handling Timeouts were not always handled correctly leaving some connections open for longer than expected. --- .../apache/coyote/http2/Http2UpgradeHandler.java | 95 ++++++++++++++++------ webapps/docs/changelog.xml | 4 + 2 files changed, 75 insertions(+), 24 deletions(-) diff --git a/java/org/apache/coyote/http2/Http2UpgradeHandler.java b/java/org/apache/coyote/http2/Http2UpgradeHandler.java index e63a484..50365a9 100644 --- a/java/org/apache/coyote/http2/Http2UpgradeHandler.java +++ b/java/org/apache/coyote/http2/Http2UpgradeHandler.java @@ -138,6 +138,9 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU private volatile int newStreamsSinceLastPrune = 0; private final ConcurrentMap<AbstractStream, BacklogTracker> backLogStreams = new ConcurrentHashMap<>(); private long backLogSize = 0; + // The time at which the connection will timeout unless data arrives before + // then. -1 means no timeout. + private volatile long connectionTimeout = -1; // Stream concurrency control private int maxConcurrentStreamExecution = Http2Protocol.DEFAULT_MAX_CONCURRENT_STREAM_EXECUTION; @@ -323,8 +326,10 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU case OPEN_READ: try { // There is data to read so use the read timeout while - // reading frames. - socketWrapper.setReadTimeout(getReadTimeout()); + // reading frames ... + socketWrapper.setReadTimeout(getReadTimeout()); + // ... and disable the connection timeout + setConnectionTimeout(-1); while (true) { try { if (!parser.readFrame(false)) { @@ -340,23 +345,22 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU stream.close(se); } } + if (overheadCount.get() > 0) { + throw new ConnectionException( + sm.getString("upgradeHandler.tooMuchOverhead", connectionId), + Http2Error.ENHANCE_YOUR_CALM); + } } - if (overheadCount.get() > 0) { - throw new ConnectionException( - sm.getString("upgradeHandler.tooMuchOverhead", connectionId), - Http2Error.ENHANCE_YOUR_CALM); - } + // Need to know the correct timeout before starting the read + // but that may not be known at this time if one or more + // requests are currently being processed so don't set a + // timeout for the socket... + socketWrapper.setReadTimeout(-1); + + // ...set a timeout on the connection + setConnectionTimeoutForStreamCount(activeRemoteStreamCount.get()); - if (activeRemoteStreamCount.get() == 0) { - // No streams currently active. Use the keep-alive - // timeout for the connection. - socketWrapper.setReadTimeout(getKeepAliveTimeout()); - } else { - // Streams currently active. Individual streams have - // timeouts so keep the connection open. - socketWrapper.setReadTimeout(-1); - } } catch (Http2Exception ce) { // Really ConnectionException if (log.isDebugEnabled()) { @@ -377,9 +381,12 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU result = SocketState.UPGRADED; break; + case TIMEOUT: + closeConnection(null); + break; + case DISCONNECT: case ERROR: - case TIMEOUT: case STOP: case CONNECT_FAIL: close(); @@ -399,9 +406,41 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU } + /* + * Sets the connection timeout based on the current number of active + * streams. + */ + protected void setConnectionTimeoutForStreamCount(int streamCount) { + if (streamCount == 0) { + // No streams currently active. Use the keep-alive + // timeout for the connection. + long keepAliveTimeout = protocol.getKeepAliveTimeout(); + if (keepAliveTimeout == -1) { + setConnectionTimeout(-1); + } else { + setConnectionTimeout(System.currentTimeMillis() + keepAliveTimeout); + } + } else { + // Streams currently active. Individual streams have + // timeouts so keep the connection open. + setConnectionTimeout(-1); + } + } + + + private void setConnectionTimeout(long connectionTimeout) { + this.connectionTimeout = connectionTimeout; + } + + @Override public void timeoutAsync(long now) { - // TODO: Implement improved connection timeouts + long connectionTimeout = this.connectionTimeout; + if (now == -1 || connectionTimeout > -1 && now > connectionTimeout) { + // Have to dispatch as this will be executed from a non-container + // thread. + socketWrapper.processSocket(SocketEvent.TIMEOUT, true); + } } @@ -510,9 +549,17 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU void closeConnection(Http2Exception ce) { + long code; + byte[] msg; + if (ce == null) { + code = Http2Error.NO_ERROR.getCode(); + msg = null; + } else { + code = ce.getError().getCode(); + msg = ce.getMessage().getBytes(StandardCharsets.UTF_8); + } try { - writeGoAwayFrame(maxProcessedStreamId, ce.getError().getCode(), - ce.getMessage().getBytes(StandardCharsets.UTF_8)); + writeGoAwayFrame(maxProcessedStreamId, code, msg); } catch (IOException ioe) { // Ignore. GOAWAY is sent on a best efforts basis and the original // error has already been logged. @@ -677,7 +724,7 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU header[4] = FLAG_END_OF_STREAM; stream.sentEndOfStream(); if (!stream.isActive()) { - activeRemoteStreamCount.decrementAndGet(); + setConnectionTimeoutForStreamCount(activeRemoteStreamCount.decrementAndGet()); } } if (writeable) { @@ -1193,7 +1240,7 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU if (localSettings.getMaxConcurrentStreams() < activeRemoteStreamCount.incrementAndGet()) { // If there are too many open streams, simply ignore the push // request. - activeRemoteStreamCount.decrementAndGet(); + setConnectionTimeoutForStreamCount(activeRemoteStreamCount.decrementAndGet()); return; } @@ -1427,7 +1474,7 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU if (stream != null) { stream.receivedEndOfStream(); if (!stream.isActive()) { - activeRemoteStreamCount.decrementAndGet(); + setConnectionTimeoutForStreamCount(activeRemoteStreamCount.decrementAndGet()); } } } @@ -1466,7 +1513,7 @@ public class Http2UpgradeHandler extends AbstractStream implements InternalHttpU stream.receivedStartOfHeaders(headersEndStream); closeIdleStreams(streamId); if (localSettings.getMaxConcurrentStreams() < activeRemoteStreamCount.incrementAndGet()) { - activeRemoteStreamCount.decrementAndGet(); + setConnectionTimeoutForStreamCount(activeRemoteStreamCount.decrementAndGet()); throw new StreamException(sm.getString("upgradeHandler.tooManyRemoteStreams", Long.toString(localSettings.getMaxConcurrentStreams())), Http2Error.REFUSED_STREAM, streamId); diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml index e8704dd..e5fc569 100644 --- a/webapps/docs/changelog.xml +++ b/webapps/docs/changelog.xml @@ -132,6 +132,10 @@ Connections that fail the TLS handshake will now appear in the access logs with a 400 status code. (markt) </add> + <fix> + Timeouts for HTTP/2 connections were not always correctly handled + leaving some connections open for longer than expected. (markt) + </fix> </changelog> </subsection> <subsection name="Web applications"> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org