Skip to content

Commit eba2b19

Browse files
committed
bitswap/httpnet: probe for HEAD support
1 parent 70538fd commit eba2b19

File tree

3 files changed

+58
-41
lines changed

3 files changed

+58
-41
lines changed

bitswap/network/httpnet/httpnet.go

+43-32
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@ var (
4343
DefaultIdleConnTimeout = 30 * time.Second
4444
DefaultResponseHeaderTimeout = 10 * time.Second
4545
DefaultMaxIdleConns = 50
46-
DefaultSupportsHave = true
4746
DefaultInsecureSkipVerify = false
4847
DefaultMaxBackoff = time.Minute
4948
DefaultMaxHTTPAddressesPerPeer = 10
@@ -54,6 +53,8 @@ var pingCid = "bafkqaaa" // identity CID
5453

5554
const http2proto = "HTTP/2.0"
5655

56+
const peerstoreSupportsHeadKey = "http-retrieval-head-support"
57+
5758
// Option allows to configure the Network.
5859
type Option func(net *Network)
5960

@@ -103,15 +104,6 @@ func WithMaxIdleConns(n int) Option {
103104
}
104105
}
105106

106-
// WithSupportsHave specifies whether want to expose that we can handle Have
107-
// messages (i.e. to the MessageQueue). Have messages trigger HEAD HTTP
108-
// requests. Not all HTTP-endpoints may know how to handle a HEAD request.
109-
func WithSupportsHave(b bool) Option {
110-
return func(net *Network) {
111-
net.supportsHave = b
112-
}
113-
}
114-
115107
// WithInsecureSkipVerify allows making HTTPS connections to test servers.
116108
// Use for testing.
117109
func WithInsecureSkipVerify(b bool) Option {
@@ -169,7 +161,6 @@ type Network struct {
169161
idleConnTimeout time.Duration
170162
responseHeaderTimeout time.Duration
171163
maxIdleConns int
172-
supportsHave bool
173164
insecureSkipVerify bool
174165
maxHTTPAddressesPerPeer int
175166
httpWorkers int
@@ -203,7 +194,6 @@ func New(host host.Host, opts ...Option) network.BitSwapNetwork {
203194
idleConnTimeout: DefaultIdleConnTimeout,
204195
responseHeaderTimeout: DefaultResponseHeaderTimeout,
205196
maxIdleConns: DefaultMaxIdleConns,
206-
supportsHave: DefaultSupportsHave,
207197
insecureSkipVerify: DefaultInsecureSkipVerify,
208198
maxHTTPAddressesPerPeer: DefaultMaxHTTPAddressesPerPeer,
209199
httpWorkers: DefaultHTTPWorkers,
@@ -408,42 +398,37 @@ func (ht *Network) Connect(ctx context.Context, p peer.AddrInfo) error {
408398
// time with the client. We call peer.Connected()
409399
// on success.
410400
var workingAddrs []multiaddr.Multiaddr
401+
supportsHead := true
411402
for i, u := range urls {
412-
req, err := buildRequest(ctx, u, "GET", pingCid, ht.userAgent)
413-
if err != nil {
414-
log.Debug(err)
415-
return err
416-
}
417-
418-
log.Debugf("connect request to %s %q", p.ID, req.URL)
419-
resp, err := ht.client.Do(req)
403+
err := ht.connect(ctx, p.ID, u, "GET")
420404
if err != nil {
421-
log.Debugf("connect error %s", err)
405+
// abort if context cancelled
422406
if ctxErr := ctx.Err(); ctxErr != nil {
423-
// abort when context cancelled
424407
return ctxErr
425408
}
426409
continue
427410
}
428-
429-
if resp.Proto != http2proto {
430-
log.Warnf("%s://%q is not using HTTP/2 (%s)", req.URL.Scheme, req.URL.Host, resp.Proto)
411+
// GET works. Does HEAD work though?
412+
err = ht.connect(ctx, p.ID, u, "HEAD")
413+
if err != nil {
414+
// abort if context cancelled
415+
if ctxErr := ctx.Err(); ctxErr != nil {
416+
return ctxErr
417+
}
418+
supportsHead = false
431419
}
432420

433-
if resp.StatusCode >= 500 { // 5xx
434-
log.Debugf("connect error %d <- %s %q", resp.StatusCode, p.ID, req.URL)
435-
// We made a proper request and got a 5xx back.
436-
// We cannot consider this a working connection.
437-
continue
438-
}
439421
workingAddrs = append(workingAddrs, htaddrs.Addrs[i])
440422
}
441423

442424
if len(workingAddrs) > 0 {
443425
ht.host.Peerstore().AddAddrs(p.ID, workingAddrs, peerstore.PermanentAddrTTL)
426+
// ignoring error
427+
_ = ht.host.Peerstore().Put(p.ID, peerstoreSupportsHeadKey, supportsHead)
428+
444429
ht.connEvtMgr.Connected(p.ID)
445430
ht.pinger.startPinging(p.ID)
446-
log.Debugf("connect success to %s", p.ID)
431+
log.Debugf("connect success to %s (supports HEAD: %t)", p.ID, supportsHead)
447432
// We "connected"
448433
return nil
449434
}
@@ -453,6 +438,32 @@ func (ht *Network) Connect(ctx context.Context, p peer.AddrInfo) error {
453438
return err
454439
}
455440

441+
func (ht *Network) connect(ctx context.Context, p peer.ID, u network.ParsedURL, method string) error {
442+
req, err := buildRequest(ctx, u, method, pingCid, ht.userAgent)
443+
if err != nil {
444+
log.Debug(err)
445+
return err
446+
}
447+
448+
log.Debugf("connect request to %s %s %q", p, method, req.URL)
449+
resp, err := ht.client.Do(req)
450+
if err != nil {
451+
return err
452+
}
453+
454+
if resp.Proto != http2proto {
455+
log.Warnf("%s://%q is not using HTTP/2 (%s)", req.URL.Scheme, req.URL.Host, resp.Proto)
456+
}
457+
458+
if resp.StatusCode >= 500 { // 5xx
459+
log.Debugf("connect error: %d <- %q (%s)", resp.StatusCode, req.URL, p)
460+
// We made a proper request and got a 5xx back.
461+
// We cannot consider this a working connection.
462+
return err
463+
}
464+
return nil
465+
}
466+
456467
// DisconnectFrom marks this peer as Disconnected in the connection event
457468
// manager, stops pinging for latency measurements and removes it from the
458469
// peerstore.

bitswap/network/httpnet/httpnet_test.go

+7-6
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,11 @@ func (h *Handler) ServeHTTP(rw http.ResponseWriter, r *http.Request) {
190190
return
191191
}
192192

193+
if cidstr == pingCid {
194+
rw.WriteHeader(http.StatusOK)
195+
return
196+
}
197+
193198
if c.Equals(errorCid) {
194199
rw.WriteHeader(http.StatusInternalServerError)
195200
return
@@ -451,9 +456,7 @@ func TestSendMessageWithPartialResponse(t *testing.T) {
451456
func TestSendMessageSendHavesAndDontHaves(t *testing.T) {
452457
ctx := context.Background()
453458
recv := mockReceiver(t)
454-
htnet, mn := mockNetwork(t, recv,
455-
WithSupportsHave(true),
456-
)
459+
htnet, mn := mockNetwork(t, recv)
457460
peer, err := mn.GenPeer()
458461
if err != nil {
459462
t.Fatal(err)
@@ -487,9 +490,7 @@ func TestSendMessageSendHavesAndDontHaves(t *testing.T) {
487490
func TestSendCancels(t *testing.T) {
488491
ctx := context.Background()
489492
recv := mockReceiver(t)
490-
htnet, mn := mockNetwork(t, recv,
491-
WithSupportsHave(true),
492-
)
493+
htnet, mn := mockNetwork(t, recv)
493494
peer, err := mn.GenPeer()
494495
if err != nil {
495496
t.Fatal(err)

bitswap/network/httpnet/msg_sender.go

+8-3
Original file line numberDiff line numberDiff line change
@@ -542,10 +542,15 @@ func (sender *httpMsgSender) Reset() error {
542542
return nil
543543
}
544544

545-
// SupportsHave can advertise whether we would like to support HAVE entries
546-
// (they trigger HEAD requests).
545+
// SupportsHave indicates whether the peer answers to HEAD requests.
546+
// This has been probed during Connect().
547547
func (sender *httpMsgSender) SupportsHave() bool {
548-
return sender.ht.supportsHave
548+
v, err := sender.ht.host.Peerstore().Get(sender.peer, peerstoreSupportsHeadKey)
549+
if err != nil {
550+
return false
551+
}
552+
b, ok := v.(bool)
553+
return ok && b
549554
}
550555

551556
// parseRetryAfter returns how many seconds the Retry-After header header

0 commit comments

Comments
 (0)