Update oxy dependency
This commit is contained in:
parent
d81c4e6d1a
commit
07be89d6e9
31 changed files with 636 additions and 195 deletions
57
vendor/github.com/vulcand/oxy/buffer/buffer.go
generated
vendored
57
vendor/github.com/vulcand/oxy/buffer/buffer.go
generated
vendored
|
@ -36,13 +36,12 @@ Examples of a buffering middleware:
|
|||
package buffer
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"fmt"
|
||||
"io"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
|
||||
"bufio"
|
||||
"net"
|
||||
"net/http"
|
||||
"reflect"
|
||||
|
||||
"github.com/mailgun/multibuf"
|
||||
|
@ -74,6 +73,8 @@ type Buffer struct {
|
|||
|
||||
next http.Handler
|
||||
errHandler utils.ErrorHandler
|
||||
|
||||
log *log.Logger
|
||||
}
|
||||
|
||||
// New returns a new buffer middleware. New() function supports optional functional arguments
|
||||
|
@ -86,6 +87,8 @@ func New(next http.Handler, setters ...optSetter) (*Buffer, error) {
|
|||
|
||||
maxResponseBodyBytes: DefaultMaxBodyBytes,
|
||||
memResponseBodyBytes: DefaultMemBodyBytes,
|
||||
|
||||
log: log.StandardLogger(),
|
||||
}
|
||||
for _, s := range setters {
|
||||
if err := s(strm); err != nil {
|
||||
|
@ -99,6 +102,16 @@ func New(next http.Handler, setters ...optSetter) (*Buffer, error) {
|
|||
return strm, nil
|
||||
}
|
||||
|
||||
// Logger defines the logger the buffer will use.
|
||||
//
|
||||
// It defaults to logrus.StandardLogger(), the global logger used by logrus.
|
||||
func Logger(l *log.Logger) optSetter {
|
||||
return func(b *Buffer) error {
|
||||
b.log = l
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
type optSetter func(b *Buffer) error
|
||||
|
||||
// CondSetter Conditional setter.
|
||||
|
@ -154,7 +167,7 @@ func MaxRequestBodyBytes(m int64) optSetter {
|
|||
}
|
||||
}
|
||||
|
||||
// MaxRequestBody bytes sets the maximum request body to be stored in memory
|
||||
// MemRequestBodyBytes bytes sets the maximum request body to be stored in memory
|
||||
// buffer middleware will serialize the excess to disk.
|
||||
func MemRequestBodyBytes(m int64) optSetter {
|
||||
return func(b *Buffer) error {
|
||||
|
@ -196,8 +209,8 @@ func (b *Buffer) Wrap(next http.Handler) error {
|
|||
}
|
||||
|
||||
func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
||||
if log.GetLevel() >= log.DebugLevel {
|
||||
logEntry := log.WithField("Request", utils.DumpHttpRequest(req))
|
||||
if b.log.Level >= log.DebugLevel {
|
||||
logEntry := b.log.WithField("Request", utils.DumpHttpRequest(req))
|
||||
logEntry.Debug("vulcand/oxy/buffer: begin ServeHttp on request")
|
||||
defer logEntry.Debug("vulcand/oxy/buffer: completed ServeHttp on request")
|
||||
}
|
||||
|
@ -210,11 +223,11 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
|
||||
// Read the body while keeping limits in mind. This reader controls the maximum bytes
|
||||
// to read into memory and disk. This reader returns an error if the total request size exceeds the
|
||||
// prefefined MaxSizeBytes. This can occur if we got chunked request, in this case ContentLength would be set to -1
|
||||
// predefined MaxSizeBytes. This can occur if we got chunked request, in this case ContentLength would be set to -1
|
||||
// and the reader would be unbounded bufio in the http.Server
|
||||
body, err := multibuf.New(req.Body, multibuf.MaxBytes(b.maxRequestBodyBytes), multibuf.MemBytes(b.memRequestBodyBytes))
|
||||
if err != nil || body == nil {
|
||||
log.Errorf("vulcand/oxy/buffer: error when reading request body, err: %v", err)
|
||||
b.log.Errorf("vulcand/oxy/buffer: error when reading request body, err: %v", err)
|
||||
b.errHandler.ServeHTTP(w, req, err)
|
||||
return
|
||||
}
|
||||
|
@ -235,7 +248,7 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
// set without content length or using chunked TransferEncoding
|
||||
totalSize, err := body.Size()
|
||||
if err != nil {
|
||||
log.Errorf("vulcand/oxy/buffer: failed to get request size, err: %v", err)
|
||||
b.log.Errorf("vulcand/oxy/buffer: failed to get request size, err: %v", err)
|
||||
b.errHandler.ServeHTTP(w, req, err)
|
||||
return
|
||||
}
|
||||
|
@ -251,7 +264,7 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
// We create a special writer that will limit the response size, buffer it to disk if necessary
|
||||
writer, err := multibuf.NewWriterOnce(multibuf.MaxBytes(b.maxResponseBodyBytes), multibuf.MemBytes(b.memResponseBodyBytes))
|
||||
if err != nil {
|
||||
log.Errorf("vulcand/oxy/buffer: failed create response writer, err: %v", err)
|
||||
b.log.Errorf("vulcand/oxy/buffer: failed create response writer, err: %v", err)
|
||||
b.errHandler.ServeHTTP(w, req, err)
|
||||
return
|
||||
}
|
||||
|
@ -261,12 +274,13 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
header: make(http.Header),
|
||||
buffer: writer,
|
||||
responseWriter: w,
|
||||
log: b.log,
|
||||
}
|
||||
defer bw.Close()
|
||||
|
||||
b.next.ServeHTTP(bw, outreq)
|
||||
if bw.hijacked {
|
||||
log.Debugf("vulcand/oxy/buffer: connection was hijacked downstream. Not taking any action in buffer.")
|
||||
b.log.Debugf("vulcand/oxy/buffer: connection was hijacked downstream. Not taking any action in buffer.")
|
||||
return
|
||||
}
|
||||
|
||||
|
@ -274,7 +288,7 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
if bw.expectBody(outreq) {
|
||||
rdr, err := writer.Reader()
|
||||
if err != nil {
|
||||
log.Errorf("vulcand/oxy/buffer: failed to read response, err: %v", err)
|
||||
b.log.Errorf("vulcand/oxy/buffer: failed to read response, err: %v", err)
|
||||
b.errHandler.ServeHTTP(w, req, err)
|
||||
return
|
||||
}
|
||||
|
@ -292,17 +306,17 @@ func (b *Buffer) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|||
return
|
||||
}
|
||||
|
||||
attempt += 1
|
||||
attempt++
|
||||
if body != nil {
|
||||
if _, err := body.Seek(0, 0); err != nil {
|
||||
log.Errorf("vulcand/oxy/buffer: failed to rewind response body, err: %v", err)
|
||||
b.log.Errorf("vulcand/oxy/buffer: failed to rewind response body, err: %v", err)
|
||||
b.errHandler.ServeHTTP(w, req, err)
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
outreq = b.copyRequest(req, body, totalSize)
|
||||
log.Debugf("vulcand/oxy/buffer: retry Request(%v %v) attempt %v", req.Method, req.URL, attempt)
|
||||
b.log.Debugf("vulcand/oxy/buffer: retry Request(%v %v) attempt %v", req.Method, req.URL, attempt)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -339,6 +353,7 @@ type bufferWriter struct {
|
|||
buffer multibuf.WriterOnce
|
||||
responseWriter http.ResponseWriter
|
||||
hijacked bool
|
||||
log *log.Logger
|
||||
}
|
||||
|
||||
// RFC2616 #4.4
|
||||
|
@ -376,16 +391,16 @@ func (b *bufferWriter) WriteHeader(code int) {
|
|||
b.code = code
|
||||
}
|
||||
|
||||
//CloseNotifier interface - this allows downstream connections to be terminated when the client terminates.
|
||||
// CloseNotifier interface - this allows downstream connections to be terminated when the client terminates.
|
||||
func (b *bufferWriter) CloseNotify() <-chan bool {
|
||||
if cn, ok := b.responseWriter.(http.CloseNotifier); ok {
|
||||
return cn.CloseNotify()
|
||||
}
|
||||
log.Warningf("Upstream ResponseWriter of type %v does not implement http.CloseNotifier. Returning dummy channel.", reflect.TypeOf(b.responseWriter))
|
||||
b.log.Warningf("Upstream ResponseWriter of type %v does not implement http.CloseNotifier. Returning dummy channel.", reflect.TypeOf(b.responseWriter))
|
||||
return make(<-chan bool)
|
||||
}
|
||||
|
||||
//This allows connections to be hijacked for websockets for instance.
|
||||
// Hijack This allows connections to be hijacked for websockets for instance.
|
||||
func (b *bufferWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
||||
if hi, ok := b.responseWriter.(http.Hijacker); ok {
|
||||
conn, rw, err := hi.Hijack()
|
||||
|
@ -394,12 +409,12 @@ func (b *bufferWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
|||
}
|
||||
return conn, rw, err
|
||||
}
|
||||
log.Warningf("Upstream ResponseWriter of type %v does not implement http.Hijacker. Returning dummy channel.", reflect.TypeOf(b.responseWriter))
|
||||
b.log.Warningf("Upstream ResponseWriter of type %v does not implement http.Hijacker. Returning dummy channel.", reflect.TypeOf(b.responseWriter))
|
||||
return nil, nil, fmt.Errorf("The response writer that was wrapped in this proxy, does not implement http.Hijacker. It is of type: %v", reflect.TypeOf(b.responseWriter))
|
||||
}
|
||||
|
||||
type SizeErrHandler struct {
|
||||
}
|
||||
// SizeErrHandler Size error handler
|
||||
type SizeErrHandler struct{}
|
||||
|
||||
func (e *SizeErrHandler) ServeHTTP(w http.ResponseWriter, req *http.Request, err error) {
|
||||
if _, ok := err.(*multibuf.MaxSizeReachedError); ok {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue