Skip to content

Conversation

@josephhackman
Copy link
Contributor

@josephhackmanjosephhackman commented Jul 6, 2020

Fixes: #28438

This approach specifically retains the non-hanging of 204 requests while allowing HEAD to function correctly with keeping sockets open. I check for 204 + 304 specifically rather than the HEAD method because the method is in _http_server, not _http_outgoing, though it could be passed along if that's preferred.

Checklist

  • make -j4 test (UNIX), or vcbuild test (Windows) passes
  • tests and/or benchmarks are included
  • commit message follows commit guidelines

@nodejs-github-botnodejs-github-bot added the http Issues or PRs related to the http subsystem. label Jul 6, 2020
@josephhackmanjosephhackman changed the title Pr 1Allowing HEAD method to work with keep-aliveJul 7, 2020
Copy link
Member

@bnoordhuisbnoordhuis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mostly LGTM, thanks for doing this. Can you also test the 304 status code?

@nodejs-github-bot
Copy link
Collaborator

@josephhackman
Copy link
ContributorAuthor

It seems that the only tests failing are flakey. Is there additional action required on my part?

@bnoordhuis
Copy link
Member

@josephhackman No action on your part is needed but since this is a fairly subtle change it'd be good to get at least one more sign-off from a @nodejs/http member.

josephhackman added a commit to josephhackman/node that referenced this pull request Aug 3, 2020
Re-factoring to address PR comment. The logic here gets somewhat complicated with regards to the if-elseif block circa line 434. The goal of this PR is to prevent head requests from having their Content-Length or Content-Encoding headers cleared except when necessary, which is when the response code is 204 or 304. In trying to address comment, I'm balancing between a larger re-factor than absolutely needed and somewhat ugly control logic. Refs: nodejs#34231 (comment)
@josephhackmanjosephhackman requested a review from a team as a code ownerAugust 10, 2020 16:06
@ronag
Copy link
Member

Just as a side note. HEAD requests have an edge case due to which many HTTP clients (including the node one) will always close the connection and ignore keep-alive.

#12396
nodejs/undici#258

@josephhackman
Copy link
ContributorAuthor

Just as a side note. HEAD requests have an edge case due to which many HTTP clients (including the node one) will always close the connection and ignore keep-alive.

#12396
mcollina/undici#258

This isn't quite true. The node client will close a the connection on a HEAD response if neither the Content-Length or Content-Encoding headers are set. This PR contains a test that empirically verifies this, using the node server and client. This PR does not make any changes to the node client, so it will continue doing what it did before, which is sometimes closing the socket on head-requests.

These headers are allowed by the HTTP standard, so this change should keep the node server just as compliant as it always was, while allowing any properly-implemented client to be substantially faster while sending many HEAD requests to collect metadata.

On the other hand, it is possible that non-standards-compliant clients exist that would malfunction seeing these headers on a HEAD request. I think that's a minimal risk because most people don't implement their own HTTP client library, but many people do mess with the headers on their servers. This leads me to expect that clients tend to be standards-compliant, and if anything, hardened.

Refs: https://tools.ietf.org/html/rfc7231#section-3.3
Refs: https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html

@aduh95aduh95 added the request-ci Add this label to start a Jenkins CI on a PR. label Nov 17, 2020
@github-actionsgithub-actionsbot removed the request-ci Add this label to start a Jenkins CI on a PR. label Nov 17, 2020
@nodejs-github-bot
Copy link
Collaborator

@ronag
Copy link
Member

This needs another approval. I'm not comfortable in my own knowledge here to give the second one.

@nodejs/http

@ronagronag added author ready PRs that have at least one approval, no pending requests for changes, and a CI started. request-ci Add this label to start a Jenkins CI on a PR. labels Dec 27, 2020
@github-actionsgithub-actionsbot removed the request-ci Add this label to start a Jenkins CI on a PR. label Dec 27, 2020
@nodejs-github-bot
Copy link
Collaborator

@aduh95aduh95 added the request-ci Add this label to start a Jenkins CI on a PR. label Jan 3, 2021
@github-actionsgithub-actionsbot removed the request-ci Add this label to start a Jenkins CI on a PR. label Jan 3, 2021
@nodejs-github-bot
Copy link
Collaborator

@aduh95
Copy link
Contributor

Landed in 7afa533 🎉 Thanks a lot for your contribution!

@aduh95aduh95 merged commit 7afa533 into nodejs:masterJan 3, 2021
danielleadams pushed a commit that referenced this pull request Jan 12, 2021
@danielleadamsdanielleadams mentioned this pull request Jan 12, 2021
targos pushed a commit that referenced this pull request May 1, 2021
@danielleadamsdanielleadams mentioned this pull request May 3, 2021
@fluggo
Copy link

I'm not convinced this was a good change. My HEAD methods with status 200 now send content-length: 0 by default, and this is very much not allowed by RFC7230:

A server MAY send a Content-Length header field in a response to a HEAD request (Section 4.3.2 of [RFC7231]); a server MUST NOT send Content-Length in such a response unless its field-value equals the decimal number of octets that would have been sent in the payload body of a response if the same request had used the GET method. 

Seems to me the sensible default would have been transfer-encoding: chunked.

Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment

Labels

author readyPRs that have at least one approval, no pending requests for changes, and a CI started.httpIssues or PRs related to the http subsystem.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

http server respond with inappropriate default headers for HEAD method

8 participants

@josephhackman@nodejs-github-bot@bnoordhuis@ronag@aduh95@fluggo@jasnell@targos