Skip to content

Commit 5844a6b

Browse files
fabianfettglbrntt
andauthored
Crash fix: HTTP2 can handle requests are cancelled (#555)
Co-authored-by: George Barnett <[email protected]>
1 parent 5ead318 commit 5844a6b

File tree

4 files changed

+52
-9
lines changed

4 files changed

+52
-9
lines changed

Sources/AsyncHTTPClient/ConnectionPool/HTTP2/HTTP2ClientRequestHandler.swift

+6-2
Original file line numberDiff line numberDiff line change
@@ -193,11 +193,15 @@ final class HTTP2ClientRequestHandler: ChannelDuplexHandler {
193193
case .forwardResponseBodyParts(let parts):
194194
self.request!.receiveResponseBodyParts(parts)
195195

196-
case .failRequest(let error, let finalAction):
196+
case .failRequest(let error, _):
197197
self.request!.fail(error)
198198
self.request = nil
199199
self.runTimeoutAction(.clearIdleReadTimeoutTimer, context: context)
200-
self.runFinalAction(finalAction, context: context)
200+
// No matter the error reason, we must always make sure the h2 stream is closed. Only
201+
// once the h2 stream is closed, it is released from the h2 multiplexer. The
202+
// HTTPRequestStateMachine may signal finalAction: .none in the error case (as this is
203+
// the right result for HTTP/1). In the h2 case we MUST always close.
204+
self.runFinalAction(.close, context: context)
201205

202206
case .succeedRequest(let finalAction, let finalParts):
203207
self.request!.succeedRequest(finalParts)

Sources/AsyncHTTPClient/ConnectionPool/HTTPRequestStateMachine.swift

+19-7
Original file line numberDiff line numberDiff line change
@@ -108,16 +108,24 @@ struct HTTPRequestStateMachine {
108108
}
109109

110110
mutating func startRequest(head: HTTPRequestHead, metadata: RequestFramingMetadata) -> Action {
111-
guard case .initialized = self.state else {
112-
preconditionFailure("`start()` must be called first, and exactly once. Invalid state: \(self.state)")
113-
}
111+
switch self.state {
112+
case .initialized:
113+
guard self.isChannelWritable else {
114+
self.state = .waitForChannelToBecomeWritable(head, metadata)
115+
return .wait
116+
}
117+
return self.startSendingRequest(head: head, metadata: metadata)
114118

115-
guard self.isChannelWritable else {
116-
self.state = .waitForChannelToBecomeWritable(head, metadata)
119+
case .failed:
120+
// The request state machine is marked as failed before the request is started, if
121+
// the request was cancelled before hitting the channel handler. Before `startRequest`
122+
// is called on the state machine, `willExecuteRequest` is called on
123+
// `HTTPExecutableRequest`, which might loopback to state machines cancel method.
117124
return .wait
118-
}
119125

120-
return self.startSendingRequest(head: head, metadata: metadata)
126+
case .running, .finished, .waitForChannelToBecomeWritable, .modifying:
127+
preconditionFailure("`startRequest()` must be called first, and exactly once. Invalid state: \(self.state)")
128+
}
121129
}
122130

123131
mutating func writabilityChanged(writable: Bool) -> Action {
@@ -381,6 +389,10 @@ struct HTTPRequestStateMachine {
381389
case .initialized, .waitForChannelToBecomeWritable:
382390
let error = HTTPClientError.cancelled
383391
self.state = .failed(error)
392+
// Okay, this has different semantics for HTTP/1 and HTTP/2. In HTTP/1 we don't want to
393+
// close the connection, if we haven't sent anything yet, to reuse the connection for
394+
// another request. In HTTP/2 we must close the channel to ensure it is released from
395+
// HTTP/2 multiplexer.
384396
return .failRequest(error, .none)
385397

386398
case .running:

Tests/AsyncHTTPClientTests/HTTP2ClientTests+XCTest.swift

+1
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ extension HTTP2ClientTests {
3434
("testUncleanShutdownCancelsExecutingAndQueuedTasks", testUncleanShutdownCancelsExecutingAndQueuedTasks),
3535
("testCancelingRunningRequest", testCancelingRunningRequest),
3636
("testReadTimeout", testReadTimeout),
37+
("testH2CanHandleRequestsThatHaveAlreadyHitTheDeadline", testH2CanHandleRequestsThatHaveAlreadyHitTheDeadline),
3738
("testStressCancelingRunningRequestFromDifferentThreads", testStressCancelingRunningRequestFromDifferentThreads),
3839
("testPlatformConnectErrorIsForwardedOnTimeout", testPlatformConnectErrorIsForwardedOnTimeout),
3940
]

Tests/AsyncHTTPClientTests/HTTP2ClientTests.swift

+26
Original file line numberDiff line numberDiff line change
@@ -313,6 +313,32 @@ class HTTP2ClientTests: XCTestCase {
313313
}
314314
}
315315

316+
func testH2CanHandleRequestsThatHaveAlreadyHitTheDeadline() {
317+
let bin = HTTPBin(.http2(compress: false))
318+
defer { XCTAssertNoThrow(try bin.shutdown()) }
319+
var config = HTTPClient.Configuration()
320+
var tlsConfig = TLSConfiguration.makeClientConfiguration()
321+
tlsConfig.certificateVerification = .none
322+
config.tlsConfiguration = tlsConfig
323+
config.httpVersion = .automatic
324+
let client = HTTPClient(
325+
eventLoopGroupProvider: .createNew,
326+
configuration: config,
327+
backgroundActivityLogger: Logger(label: "HTTPClient", factory: StreamLogHandler.standardOutput(label:))
328+
)
329+
defer { XCTAssertNoThrow(try client.syncShutdown()) }
330+
331+
var request: HTTPClient.Request?
332+
XCTAssertNoThrow(request = try HTTPClient.Request(url: "https://localhost:\(bin.port)"))
333+
334+
// just to establish an existing connection
335+
XCTAssertNoThrow(try client.execute(request: XCTUnwrap(request)).wait())
336+
337+
XCTAssertThrowsError(try client.execute(request: XCTUnwrap(request), deadline: .now() - .seconds(2)).wait()) {
338+
XCTAssertEqual($0 as? HTTPClientError, .deadlineExceeded)
339+
}
340+
}
341+
316342
func testStressCancelingRunningRequestFromDifferentThreads() {
317343
let bin = HTTPBin(.http2(compress: false)) { _ in SendHeaderAndWaitChannelHandler() }
318344
defer { XCTAssertNoThrow(try bin.shutdown()) }

0 commit comments

Comments
 (0)