uquic/http3
Marten Seemann 497d3f58a5
http3: add a RoundTripOpt to check the server's SETTINGS frame (#4355)
For some requests, the client is required to check the server's HTTP/3
SETTINGS. For example, a client is only allowed to send HTTP/3 datagrams
if the server explicitly enabled support.

SETTINGS are sent asynchronously on a control stream (usually the first
unidirectional stream). This means that the SETTINGS might not be
available at the beginning of the connection. This is not expected to be
the common case, since the server can send the SETTINGS in 0.5-RTT data,
but we have to be able to deal with arbitrary delays.

For WebTransport, there are even more SETTINGS values that the client
needs to check. By making CheckSettings a callback on the RoundTripOpt,
this entire validation logic can live at the WebTransport layer.
2024-03-12 01:03:00 -07:00
..
body.go http3: introduce an HTTP/3 error type (#4039) 2023-09-16 04:57:50 -07:00
body_test.go switch from unmaintained golang/mock to go.uber.org/mock (#4050) 2023-08-28 02:23:55 -07:00
capsule.go rename module, adjust import paths to quic-go/quic-go (#3680) 2023-01-21 19:53:57 -08:00
capsule_test.go deprecate quicvarint.Write in favor of quicvarint.Append (#3690) 2023-02-13 02:52:25 -08:00
client.go http3: add a RoundTripOpt to check the server's SETTINGS frame (#4355) 2024-03-12 01:03:00 -07:00
client_test.go http3: add a RoundTripOpt to check the server's SETTINGS frame (#4355) 2024-03-12 01:03:00 -07:00
error.go http3: introduce an HTTP/3 error type (#4039) 2023-09-16 04:57:50 -07:00
error_codes.go http3: introduce an HTTP/3 error type (#4039) 2023-09-16 04:57:50 -07:00
error_codes_test.go http3: make error codes public and consistent with http2 package (#3744) 2023-04-07 21:53:14 -07:00
error_test.go http3: introduce an HTTP/3 error type (#4039) 2023-09-16 04:57:50 -07:00
frames.go http3: send SETTINGS_ENABLE_CONNECT_PROTOCOL (for Extended CONNECT) (#4341) 2024-03-02 23:15:59 -08:00
frames_test.go http3: send SETTINGS_ENABLE_CONNECT_PROTOCOL (for Extended CONNECT) (#4341) 2024-03-02 23:15:59 -08:00
gzip_reader.go add support for gzipped HTTP/3 requests 2019-04-16 17:26:03 +09:00
headers.go http3: only use :protocol pseudo-header for Extended CONNECT (#4261) 2024-01-25 19:07:35 -08:00
headers_test.go http3: only use :protocol pseudo-header for Extended CONNECT (#4261) 2024-01-25 19:07:35 -08:00
http3_suite_test.go switch from unmaintained golang/mock to go.uber.org/mock (#4050) 2023-08-28 02:23:55 -07:00
http_stream.go utils: switch to standard library min and max functions (#4218) 2023-12-27 21:19:13 -08:00
http_stream_test.go switch from unmaintained golang/mock to go.uber.org/mock (#4050) 2023-08-28 02:23:55 -07:00
mock_quic_early_listener_test.go update gomock to v0.4.0 (#4361) 2024-03-10 18:07:20 -07:00
mock_roundtripcloser_test.go update gomock to v0.4.0 (#4361) 2024-03-10 18:07:20 -07:00
mockgen.go use new gomock feature to generate type-safe methods in mocks (#4057) 2023-10-20 22:55:33 -07:00
README.md http3: add a basic README (#4246) 2024-01-16 19:34:10 -08:00
request_writer.go http3: validate Host header before sending (#3948) 2023-07-11 23:27:24 -07:00
request_writer_test.go switch from unmaintained golang/mock to go.uber.org/mock (#4050) 2023-08-28 02:23:55 -07:00
response_writer.go http3: discard body from responses to HEAD requests (#4115) 2023-10-22 19:31:24 -07:00
response_writer_test.go switch from unmaintained golang/mock to go.uber.org/mock (#4050) 2023-08-28 02:23:55 -07:00
roundtrip.go http3: add a RoundTripOpt to check the server's SETTINGS frame (#4355) 2024-03-12 01:03:00 -07:00
roundtrip_test.go http3: don't automatically set RoundTripper.QuicConfig.EnableDatagrams (#4340) 2024-03-02 22:39:21 -08:00
server.go http3: reject duplicate control streams opened by the client (#4344) 2024-03-02 23:52:52 -08:00
server_test.go http3: reject duplicate control streams opened by the client (#4344) 2024-03-02 23:52:52 -08:00

HTTP/3

PkgGoDev

This package implements HTTP/3 (RFC 9114), including QPACK (RFC 9204). It aims to provide feature parity with the standard library's HTTP/1.1 and HTTP/2 implementation.

Serving HTTP/3

The easiest way to start an HTTP/3 server is using

mux := http.NewServeMux()
// ... add HTTP handlers to mux ...
// If mux is nil, the http.DefaultServeMux is used.
http3.ListenAndServeQUIC("0.0.0.0:443", "/path/to/cert", "/path/to/key", mux)

ListenAndServeQUIC is a convenience function. For more configurability, set up an http3.Server explicitly:

server := http3.Server{
	Handler:    mux,
	Addr:       "0.0.0.0:443",
	TLSConfig:  http3.ConfigureTLSConfig(&tls.Config{}), // use your tls.Config here
	QuicConfig: &quic.Config{},
}
err := server.ListenAndServe()

The http3.Server provides a number of configuration options, please refer to the documentation for a complete list. The QuicConfig is used to configure the underlying QUIC connection. More details can be found in the documentation of the QUIC package.

It is also possible to manually set up a quic.Transport, and then pass the listener to the server. This is useful when you want to set configuration options on the quic.Transport.

tr := quic.Transport{Conn: conn}
tlsConf := http3.ConfigureTLSConfig(&tls.Config{})  // use your tls.Config here
quicConf := &quic.Config{} // QUIC connection options
server := http3.Server{}
ln, _ := tr.ListenEarly(tlsConf, quicConf)
server.ServeListener(ln)

Alternatively, it is also possible to pass fully established QUIC connections to the HTTP/3 server. This is useful if the QUIC server offers multiple ALPNs (via NextProtos in the tls.Config).

tr := quic.Transport{Conn: conn}
tlsConf := http3.ConfigureTLSConfig(&tls.Config{})  // use your tls.Config here
quicConf := &quic.Config{} // QUIC connection options
server := http3.Server{}
// alternatively, use tr.ListenEarly to accept 0-RTT connections
ln, _ := tr.Listen(tlsConf, quicConf)
for {
	c, _ := ln.Accept()
	switch c.ConnectionState().TLS.NegotiatedProtocol {
	case http3.NextProtoH3:
		go server.ServeQUICConn(c) 
        // ... handle other protocols ...  
	}
}

Dialing HTTP/3

This package provides a http.RoundTripper implementation that can be used on the http.Client:

&http3.RoundTripper{
	TLSClientConfig: &tls.Config{},  // set a TLS client config, if desired
	QuicConfig:      &quic.Config{}, // QUIC connection options
}
defer roundTripper.Close()
client := &http.Client{
	Transport: roundTripper,
}

The http3.RoundTripper provides a number of configuration options, please refer to the documentation for a complete list.

To use a custom quic.Transport, the function used to dial new QUIC connections can be configured:

tr := quic.Transport{}
roundTripper := &http3.RoundTripper{
	TLSClientConfig: &tls.Config{},  // set a TLS client config, if desired 
	QuicConfig:      &quic.Config{}, // QUIC connection options 
	Dial: func(ctx context.Context, addr string, tlsConf *tls.Config, quicConf *quic.Config) (quic.EarlyConnection, error) {
		a, err := net.ResolveUDPAddr("udp", addr)
		if err != nil {
			return nil, err
		}
		return tr.DialEarly(ctx, a, tlsConf, quicConf)
	},
}

Using the same UDP Socket for Server and Roundtripper

Since QUIC demultiplexes packets based on their connection IDs, it is possible allows running a QUIC server and client on the same UDP socket. This also works when using HTTP/3: HTTP requests can be sent from the same socket that a server is listening on.

To achieve this using this package, first initialize a single quic.Transport, and pass a quic.EarlyListner obtained from that transport to http3.Server.ServeListener, and use the DialEarly function of the transport as the Dial function for the http3.RoundTripper.

QPACK

HTTP/3 utilizes QPACK (RFC 9204) for efficient HTTP header field compression. Our implementation, available atquic-go/qpack, provides a minimal implementation of the protocol.

While the current implementation is a fully interoperable implementation of the QPACK protocol, it only uses the static compression table. The dynamic table would allow for more effective compression of frequently transmitted header fields. This can be particularly beneficial in scenarios where headers have considerable redundancy or in high-throughput environments.

If you think that your application would benefit from higher compression efficiency, or if you're interested in contributing improvements here, please let us know in #2424.