123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234 |
- // Copyright 2015 Google LLC.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
- // Package http supports network connections to HTTP servers.
- // This package is not intended for use by end developers. Use the
- // google.golang.org/api/option package to configure API clients.
- package http
- import (
- "context"
- "crypto/tls"
- "errors"
- "net"
- "net/http"
- "time"
- "go.opencensus.io/plugin/ochttp"
- "golang.org/x/net/http2"
- "golang.org/x/oauth2"
- "google.golang.org/api/googleapi/transport"
- "google.golang.org/api/internal"
- "google.golang.org/api/internal/cert"
- "google.golang.org/api/option"
- "google.golang.org/api/transport/http/internal/propagation"
- )
- // NewClient returns an HTTP client for use communicating with a Google cloud
- // service, configured with the given ClientOptions. It also returns the endpoint
- // for the service as specified in the options.
- func NewClient(ctx context.Context, opts ...option.ClientOption) (*http.Client, string, error) {
- settings, err := newSettings(opts)
- if err != nil {
- return nil, "", err
- }
- clientCertSource, dialTLSContext, endpoint, err := internal.GetHTTPTransportConfigAndEndpoint(settings)
- if err != nil {
- return nil, "", err
- }
- // TODO(cbro): consider injecting the User-Agent even if an explicit HTTP client is provided?
- if settings.HTTPClient != nil {
- return settings.HTTPClient, endpoint, nil
- }
- trans, err := newTransport(ctx, defaultBaseTransport(ctx, clientCertSource, dialTLSContext), settings)
- if err != nil {
- return nil, "", err
- }
- return &http.Client{Transport: trans}, endpoint, nil
- }
- // NewTransport creates an http.RoundTripper for use communicating with a Google
- // cloud service, configured with the given ClientOptions. Its RoundTrip method delegates to base.
- func NewTransport(ctx context.Context, base http.RoundTripper, opts ...option.ClientOption) (http.RoundTripper, error) {
- settings, err := newSettings(opts)
- if err != nil {
- return nil, err
- }
- if settings.HTTPClient != nil {
- return nil, errors.New("transport/http: WithHTTPClient passed to NewTransport")
- }
- return newTransport(ctx, base, settings)
- }
- func newTransport(ctx context.Context, base http.RoundTripper, settings *internal.DialSettings) (http.RoundTripper, error) {
- paramTransport := ¶meterTransport{
- base: base,
- userAgent: settings.UserAgent,
- requestReason: settings.RequestReason,
- }
- var trans http.RoundTripper = paramTransport
- trans = addOCTransport(trans, settings)
- switch {
- case settings.NoAuth:
- // Do nothing.
- case settings.APIKey != "":
- paramTransport.quotaProject = internal.GetQuotaProject(nil, settings.QuotaProject)
- trans = &transport.APIKey{
- Transport: trans,
- Key: settings.APIKey,
- }
- default:
- creds, err := internal.Creds(ctx, settings)
- if err != nil {
- return nil, err
- }
- paramTransport.quotaProject = internal.GetQuotaProject(creds, settings.QuotaProject)
- ts := creds.TokenSource
- if settings.ImpersonationConfig == nil && settings.TokenSource != nil {
- ts = settings.TokenSource
- }
- trans = &oauth2.Transport{
- Base: trans,
- Source: ts,
- }
- }
- return trans, nil
- }
- func newSettings(opts []option.ClientOption) (*internal.DialSettings, error) {
- var o internal.DialSettings
- for _, opt := range opts {
- opt.Apply(&o)
- }
- if err := o.Validate(); err != nil {
- return nil, err
- }
- if o.GRPCConn != nil {
- return nil, errors.New("unsupported gRPC connection specified")
- }
- return &o, nil
- }
- type parameterTransport struct {
- userAgent string
- quotaProject string
- requestReason string
- base http.RoundTripper
- }
- func (t *parameterTransport) RoundTrip(req *http.Request) (*http.Response, error) {
- rt := t.base
- if rt == nil {
- return nil, errors.New("transport: no Transport specified")
- }
- newReq := *req
- newReq.Header = make(http.Header)
- for k, vv := range req.Header {
- newReq.Header[k] = vv
- }
- if t.userAgent != "" {
- // TODO(cbro): append to existing User-Agent header?
- newReq.Header.Set("User-Agent", t.userAgent)
- }
- // Attach system parameters into the header
- if t.quotaProject != "" {
- newReq.Header.Set("X-Goog-User-Project", t.quotaProject)
- }
- if t.requestReason != "" {
- newReq.Header.Set("X-Goog-Request-Reason", t.requestReason)
- }
- return rt.RoundTrip(&newReq)
- }
- // Set at init time by dial_appengine.go. If nil, we're not on App Engine.
- var appengineUrlfetchHook func(context.Context) http.RoundTripper
- // defaultBaseTransport returns the base HTTP transport.
- // On App Engine, this is urlfetch.Transport.
- // Otherwise, use a default transport, taking most defaults from
- // http.DefaultTransport.
- // If TLSCertificate is available, set TLSClientConfig as well.
- func defaultBaseTransport(ctx context.Context, clientCertSource cert.Source, dialTLSContext func(context.Context, string, string) (net.Conn, error)) http.RoundTripper {
- if appengineUrlfetchHook != nil {
- return appengineUrlfetchHook(ctx)
- }
- // Copy http.DefaultTransport except for MaxIdleConnsPerHost setting,
- // which is increased due to reported performance issues under load in the GCS
- // client. Transport.Clone is only available in Go 1.13 and up.
- trans := clonedTransport(http.DefaultTransport)
- if trans == nil {
- trans = fallbackBaseTransport()
- }
- trans.MaxIdleConnsPerHost = 100
- if clientCertSource != nil {
- trans.TLSClientConfig = &tls.Config{
- GetClientCertificate: clientCertSource,
- }
- }
- if dialTLSContext != nil {
- // If DialTLSContext is set, TLSClientConfig wil be ignored
- trans.DialTLSContext = dialTLSContext
- }
- configureHTTP2(trans)
- return trans
- }
- // configureHTTP2 configures the ReadIdleTimeout HTTP/2 option for the
- // transport. This allows broken idle connections to be pruned more quickly,
- // preventing the client from attempting to re-use connections that will no
- // longer work.
- func configureHTTP2(trans *http.Transport) {
- http2Trans, err := http2.ConfigureTransports(trans)
- if err == nil {
- http2Trans.ReadIdleTimeout = time.Second * 31
- }
- }
- // fallbackBaseTransport is used in <go1.13 as well as in the rare case if
- // http.DefaultTransport has been reassigned something that's not a
- // *http.Transport.
- func fallbackBaseTransport() *http.Transport {
- return &http.Transport{
- Proxy: http.ProxyFromEnvironment,
- DialContext: (&net.Dialer{
- Timeout: 30 * time.Second,
- KeepAlive: 30 * time.Second,
- DualStack: true,
- }).DialContext,
- MaxIdleConns: 100,
- MaxIdleConnsPerHost: 100,
- IdleConnTimeout: 90 * time.Second,
- TLSHandshakeTimeout: 10 * time.Second,
- ExpectContinueTimeout: 1 * time.Second,
- }
- }
- func addOCTransport(trans http.RoundTripper, settings *internal.DialSettings) http.RoundTripper {
- if settings.TelemetryDisabled {
- return trans
- }
- return &ochttp.Transport{
- Base: trans,
- Propagation: &propagation.HTTPFormat{},
- }
- }
- // clonedTransport returns the given RoundTripper as a cloned *http.Transport.
- // It returns nil if the RoundTripper can't be cloned or coerced to
- // *http.Transport.
- func clonedTransport(rt http.RoundTripper) *http.Transport {
- t, ok := rt.(*http.Transport)
- if !ok {
- return nil
- }
- return t.Clone()
- }
|