Home | History | Annotate | Download | only in http

Lines Matching refs:Connection

93 		// It gets its own connection.
155 // addConnIfNeeded makes a NewClientConn out of c if a connection for key doesn't
157 // This is used by the http1 Transport code when it creates a new connection. Because
281 // connection instead.
341 // if there's already has a cached connection to the host.
397 // entire connection.
401 return fmt.Sprintf("connection error: %s", http2ErrCode(e))
405 // HTTP/2 connection.
426 // or the connection, as appropriate. For streams, [...]; for the
427 // connection, a GOAWAY frame with a FLOW_CONTROL_ERROR code."
430 func (http2goAwayFlowError) Error() string { return "connection exceeded flow control window size" }
440 return fmt.Sprintf("http2: connection error: %v: %v", e.Code, e.Reason)
528 // conn points to the shared connection-level flow that is
1274 // from the sender, as well as determining whether an idle connection
1306 // A GoAwayFrame informs the remote peer to stop creating streams on this connection.
1396 // connection as a whole.
2983 // NewWriteScheduler constructs a write scheduler for a connection.
3034 return fmt.Errorf("http2: TLSConfig.CipherSuites index %d contains an HTTP/2-approved cipher suite (%#04x), but it comes after unapproved cipher suites. With this configuration, clients that don't support previous, approved cipher suites may be given an unapproved one and reject the connection.", i, cs)
3102 // ServeConn serves HTTP/2 requests on the provided connection and
3103 // blocks until the connection is no longer readable.
3335 // setConnState calls the net/http ConnState hook for this connection, if configured.
3370 // network connection.
3377 if strings.Contains(str, "use of closed network connection") {
3513 sc.vlogf("http2: server connection from %v on %p", sc.conn.RemoteAddr(), sc.hs)
3578 sc.vlogf("connection is idle")
3665 // if the connection has gone away.
3865 // client we're gracefully shutting down. The connection isn't closed
3913 // processFrameFromReader returns whether the connection should be kept open.
3946 sc.logf("http2: server connection error from %v: %v", sc.conn.RemoteAddr(), ev)
3951 sc.vlogf("http2: server closing client connection; error reading frame from client %s: %v", sc.conn.RemoteAddr(), err)
3953 sc.logf("http2: server closing client connection: %v", err)
5283 "Connection",
5285 "Proxy-Connection",
5326 "Connection": true,
5338 "Proxy-Connection": true,
5387 // transportDefaultConnFlow is how many connection-level flow control
5421 // ConnPool optionally specifies an alternate connection pool to use.
5494 // ClientConn is the state of a single HTTP/2 client connection to an
5574 // map: peer reset, successful completion, TCP connection breakage,
5641 var http2ErrNoCachedConn = errors.New("http2: no cached connection was available")
5646 // create a new TCP connection. If set true and
5647 // no cached connection is available, RoundTripOpt
5927 // connection. The timer could just call closeIfIdle, but this is more
6020 // checkConnHeaders checks whether req has any invalid connection-level headers.
6021 // per RFC 7540 section 8.1.2.2: Connection-Specific Header Fields.
6030 if vv := req.Header["Connection"]; len(vv) > 0 && (len(vv) > 1 || vv[0] != "" && vv[0] != "close" && vv[0] != "keep-alive") {
6031 return fmt.Errorf("http2: invalid Connection request header: %q", vv)
6426 case "connection", "proxy-connection", "transfer-encoding", "upgrade", "keep-alive":
6564 // TCP connection after sending a GOAWAY frame.
6572 connection; LastStreamID=%v, ErrCode=%v, debug=%q",
6956 cc.logf("http2: Transport received unsolicited DATA frame; closing connection")
6975 cc.logf("http2: Transport received DATA frame for closed stream; closing connection")
7369 // connection for a single request and then close the connection.
7371 return req.Close || httplex.HeaderValuesContainsToken(req.Header["Connection"], "close")