Compare commits

...

6 Commits

Author SHA1 Message Date
Yorukot 2c7faa7253
Merge 29a8170d48 into 49cdf0c42e 2025-06-20 15:31:59 -04:00
Damien Neil 49cdf0c42e testing, testing/synctest: handle T.Helper in synctest bubbles
Fixes #74199

Change-Id: I6a15fbd59a3a3f8c496440f56d09d695e1504e4e
Reviewed-on: https://go-review.googlesource.com/c/go/+/682576
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Alan Donovan <adonovan@google.com>
Auto-Submit: Damien Neil <dneil@google.com>
2025-06-20 12:29:58 -07:00
cuishuang 3bf1eecbd3 runtime: fix struct comment
Change-Id: I0c33830b13c8a187ac82504c7653abb8f8cf7530
Reviewed-on: https://go-review.googlesource.com/c/go/+/681655
Reviewed-by: Sean Liao <sean@liao.dev>
Reviewed-by: Junyang Shao <shaojunyang@google.com>
Reviewed-by: Michael Knyszek <mknyszek@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Auto-Submit: Sean Liao <sean@liao.dev>
2025-06-20 11:28:03 -07:00
Sean Liao 8ed23a2936 crypto/cipher: fix link to crypto/aes
Fixes #74309

Change-Id: I4d97514355d825124a8d879c2590b45b039f5fd1
Reviewed-on: https://go-review.googlesource.com/c/go/+/682596
Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
Reviewed-by: Junyang Shao <shaojunyang@google.com>
Reviewed-by: Cherry Mui <cherryyz@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
2025-06-20 11:09:26 -07:00
Adam Bender ef60769b46 go/doc: add a golden test that reproduces #62640
For #62640.
For #61394.

This is a copy of https://go-review.googlesource.com/c/go/+/528402,
which has stalled in review and the owner is no longer working on Go.

Change-Id: Ic7a1ae65c70d4857ab1061ccae1a926bf5c4ff55
Reviewed-on: https://go-review.googlesource.com/c/go/+/681235
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Robert Griesemer <gri@google.com>
Auto-Submit: Robert Griesemer <gri@google.com>
Reviewed-by: Junyang Shao <shaojunyang@google.com>
2025-06-20 10:05:12 -07:00
Yorukot 29a8170d48
net/http: add HTTP/1 debug logging functionality
This commit introduces a set of debug logging features for HTTP/1 connections, similar to those already present for HTTP/2. It includes environment variable initialization for logging levels and functions to log requests, responses, and connections. The changes enhance the ability to trace and debug HTTP/1 interactions, improving observability in the transport layer.

Updates #18733
2025-06-04 12:51:46 +08:00
11 changed files with 637 additions and 10 deletions

View File

@ -82,7 +82,7 @@ func newGCM(cipher Block, nonceSize, tagSize int) (AEAD, error) {
// NewGCMWithRandomNonce returns the given cipher wrapped in Galois Counter
// Mode, with randomly-generated nonces. The cipher must have been created by
// [aes.NewCipher].
// [crypto/aes.NewCipher].
//
// It generates a random 96-bit nonce, which is prepended to the ciphertext by Seal,
// and is extracted from the ciphertext by Open. The NonceSize of the AEAD is zero,

22
src/go/doc/testdata/issue62640.0.golden vendored Normal file
View File

@ -0,0 +1,22 @@
//
PACKAGE issue62640
IMPORTPATH
testdata/issue62640
FILENAMES
testdata/issue62640.go
TYPES
//
type E struct{}
// F should be hidden within S because of the S.F field.
func (E) F()
//
type S struct {
E
F int
}

22
src/go/doc/testdata/issue62640.1.golden vendored Normal file
View File

@ -0,0 +1,22 @@
//
PACKAGE issue62640
IMPORTPATH
testdata/issue62640
FILENAMES
testdata/issue62640.go
TYPES
//
type E struct{}
// F should be hidden within S because of the S.F field.
func (E) F()
//
type S struct {
E
F int
}

25
src/go/doc/testdata/issue62640.2.golden vendored Normal file
View File

@ -0,0 +1,25 @@
//
PACKAGE issue62640
IMPORTPATH
testdata/issue62640
FILENAMES
testdata/issue62640.go
TYPES
//
type E struct{}
// F should be hidden within S because of the S.F field.
func (E) F()
//
type S struct {
E
F int
}
// F should be hidden within S because of the S.F field.
func (S) F()

15
src/go/doc/testdata/issue62640.go vendored Normal file
View File

@ -0,0 +1,15 @@
// Copyright 2025 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package issue62640
type E struct{}
// F should be hidden within S because of the S.F field.
func (E) F() {}
type S struct {
E
F int
}

View File

@ -0,0 +1,405 @@
// Copyright 2025 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package http
import (
"bytes"
"log"
"strings"
"testing"
)
func TestHTTP1Debug(t *testing.T) {
tests := []struct {
name string
godebug string
expected map[string]bool
}{
{
name: "no debug",
godebug: "",
expected: map[string]bool{
"verbose": false,
"requests": false,
"responses": false,
},
},
{
name: "level 1",
godebug: "http1debug=1",
expected: map[string]bool{
"verbose": true,
"requests": false,
"responses": false,
},
},
{
name: "level 2",
godebug: "http1debug=2",
expected: map[string]bool{
"verbose": true,
"requests": true,
"responses": true,
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Save original debug state
origVerbose := http1VerboseLogs
origRequests := http1logRequests
origResponses := http1logResponses
defer func() {
// Restore original debug state
http1VerboseLogs = origVerbose
http1logRequests = origRequests
http1logResponses = origResponses
}()
// Reset debug state
http1VerboseLogs = false
http1logRequests = false
http1logResponses = false
// Simulate the init() function
if strings.Contains(tt.godebug, "http1debug=1") {
http1VerboseLogs = true
}
if strings.Contains(tt.godebug, "http1debug=2") {
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
}
// Verify expected state
if http1VerboseLogs != tt.expected["verbose"] {
t.Errorf("Expected verbose=%v, got %v", tt.expected["verbose"], http1VerboseLogs)
}
if http1logRequests != tt.expected["requests"] {
t.Errorf("Expected requests=%v, got %v", tt.expected["requests"], http1logRequests)
}
if http1logResponses != tt.expected["responses"] {
t.Errorf("Expected responses=%v, got %v", tt.expected["responses"], http1logResponses)
}
})
}
}
func TestHTTP1LogFunctions(t *testing.T) {
// Save original debug state
origVerbose := http1VerboseLogs
origRequests := http1logRequests
origResponses := http1logResponses
defer func() {
// Restore original debug state
http1VerboseLogs = origVerbose
http1logRequests = origRequests
http1logResponses = origResponses
}()
// Capture log output
var logBuf bytes.Buffer
oldOutput := log.Writer()
log.SetOutput(&logBuf)
defer log.SetOutput(oldOutput)
// Test http1Logf with verbose logging enabled
http1VerboseLogs = true
http1Logf("test verbose log: %s", "message")
if !strings.Contains(logBuf.String(), "http1: test verbose log: message") {
t.Errorf("http1Logf not working, got: %s", logBuf.String())
}
logBuf.Reset()
// Test http1Logf with verbose logging disabled
http1VerboseLogs = false
http1Logf("should not appear")
if strings.Contains(logBuf.String(), "should not appear") {
t.Errorf("http1Logf should not log when verbose is disabled, got: %s", logBuf.String())
}
}
func TestHTTP1DebugInitialization(t *testing.T) {
// Test that debug flag parsing works correctly
tests := []struct {
name string
godebugValue string
expectVerbose bool
expectRequests bool
expectResponses bool
expectConnections bool
}{
{
name: "http1debug=1",
godebugValue: "http1debug=1",
expectVerbose: true,
expectRequests: false,
expectResponses: false,
expectConnections: false,
},
{
name: "http1debug=2",
godebugValue: "http1debug=2",
expectVerbose: true,
expectRequests: true,
expectResponses: true,
expectConnections: false,
},
{
name: "http1xconnect=1",
godebugValue: "http1xconnect=1",
expectVerbose: true,
expectRequests: true,
expectResponses: true,
expectConnections: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Save original debug state
origVerbose := http1VerboseLogs
origRequests := http1logRequests
origResponses := http1logResponses
origConnections := http1logConnections
defer func() {
// Restore original debug state
http1VerboseLogs = origVerbose
http1logRequests = origRequests
http1logResponses = origResponses
http1logConnections = origConnections
}()
// Reset debug flags
http1VerboseLogs = false
http1logRequests = false
http1logResponses = false
http1logConnections = false
// Simulate GODEBUG parsing (matching the actual init function)
e := tt.godebugValue
if strings.Contains(e, "http1debug=1") {
http1VerboseLogs = true
}
if strings.Contains(e, "http1debug=2") {
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
}
if strings.Contains(e, "http1xconnect=1") {
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
http1logConnections = true
}
// Check that flags are set correctly
if http1VerboseLogs != tt.expectVerbose {
t.Errorf("Expected verbose=%v, got %v", tt.expectVerbose, http1VerboseLogs)
}
if http1logRequests != tt.expectRequests {
t.Errorf("Expected requests=%v, got %v", tt.expectRequests, http1logRequests)
}
if http1logResponses != tt.expectResponses {
t.Errorf("Expected responses=%v, got %v", tt.expectResponses, http1logResponses)
}
if http1logConnections != tt.expectConnections {
t.Errorf("Expected connections=%v, got %v", tt.expectConnections, http1logConnections)
}
})
}
}
// TestHTTP1DebugWithRemoteAddr tests the debug logging functionality
func TestHTTP1DebugWithRemoteAddr(t *testing.T) {
// Save original debug state
origVerbose := http1VerboseLogs
origRequests := http1logRequests
origResponses := http1logResponses
defer func() {
// Restore original debug state
http1VerboseLogs = origVerbose
http1logRequests = origRequests
http1logResponses = origResponses
}()
// Enable all HTTP/1 debug logging
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
// Capture log output
var logBuf bytes.Buffer
oldOutput := log.Writer()
log.SetOutput(&logBuf)
defer log.SetOutput(oldOutput)
// Test the debug logging functions
http1Logf("test log: %s", "basic verbose log")
// Verify logging works
logOutput := logBuf.String()
if !strings.Contains(logOutput, "test log: basic verbose log") {
t.Errorf("Expected log output to contain test message, got: %s", logOutput)
}
t.Logf("Debug logging test completed successfully")
}
// TestHTTP1AllLogFunctions tests all HTTP/1 debug logging functions
func TestHTTP1AllLogFunctions(t *testing.T) {
// Save original debug state
origVerbose := http1VerboseLogs
origRequests := http1logRequests
origResponses := http1logResponses
origConnections := http1logConnections
defer func() {
// Restore original debug state
http1VerboseLogs = origVerbose
http1logRequests = origRequests
http1logResponses = origResponses
http1logConnections = origConnections
}()
// Capture log output
var logBuf bytes.Buffer
oldOutput := log.Writer()
log.SetOutput(&logBuf)
defer log.SetOutput(oldOutput)
tests := []struct {
name string
setup func()
logFunc func()
expected string
enabled bool
}{
{
name: "verbose logging enabled",
setup: func() {
http1VerboseLogs = true
http1logRequests = false
http1logResponses = false
http1logConnections = false
},
logFunc: func() {
http1Logf("verbose test message")
},
expected: "http1: verbose test message",
enabled: true,
},
{
name: "verbose logging disabled",
setup: func() {
http1VerboseLogs = false
},
logFunc: func() {
http1Logf("should not appear")
},
expected: "should not appear",
enabled: false,
},
{
name: "request logging enabled",
setup: func() {
http1VerboseLogs = false
http1logRequests = true
http1logResponses = false
http1logConnections = false
},
logFunc: func() {
http1LogRequest("request test message")
},
expected: "http1: request: request test message",
enabled: true,
},
{
name: "request logging disabled",
setup: func() {
http1logRequests = false
},
logFunc: func() {
http1LogRequest("request should not appear")
},
expected: "request should not appear",
enabled: false,
},
{
name: "response logging enabled",
setup: func() {
http1VerboseLogs = false
http1logRequests = false
http1logResponses = true
http1logConnections = false
},
logFunc: func() {
http1LogResponse("response test message")
},
expected: "http1: response: response test message",
enabled: true,
},
{
name: "response logging disabled",
setup: func() {
http1logResponses = false
},
logFunc: func() {
http1LogResponse("response should not appear")
},
expected: "response should not appear",
enabled: false,
},
{
name: "connection logging enabled",
setup: func() {
http1VerboseLogs = false
http1logRequests = false
http1logResponses = false
http1logConnections = true
},
logFunc: func() {
http1LogConnection("connection test message")
},
expected: "http1: connection: connection test message",
enabled: true,
},
{
name: "connection logging disabled",
setup: func() {
http1logConnections = false
},
logFunc: func() {
http1LogConnection("connection should not appear")
},
expected: "connection should not appear",
enabled: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
logBuf.Reset()
tt.setup()
tt.logFunc()
output := logBuf.String()
if tt.enabled {
if !strings.Contains(output, tt.expected) {
t.Errorf("Expected log to contain '%s', got: %s", tt.expected, output)
}
} else {
if strings.Contains(output, tt.expected) {
t.Errorf("Expected log NOT to contain '%s', but it did. Got: %s", tt.expected, output)
}
}
})
}
}

View File

@ -26,6 +26,7 @@ import (
"net/http/internal/ascii"
"net/textproto"
"net/url"
"os"
"reflect"
"strings"
"sync"
@ -37,6 +38,59 @@ import (
"golang.org/x/net/http/httpproxy"
)
// HTTP/1 debug logging variables, similar to HTTP/2 implementation
var (
http1VerboseLogs bool
http1logRequests bool
http1logResponses bool
http1logConnections bool
)
func init() {
// Initialize HTTP/1 debug logging based on GODEBUG environment variable
// This matches the HTTP/2 implementation pattern exactly
e := os.Getenv("GODEBUG")
if strings.Contains(e, "http1debug=1") {
http1VerboseLogs = true
}
if strings.Contains(e, "http1debug=2") {
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
}
if strings.Contains(e, "http1xconnect=1") {
http1VerboseLogs = true
http1logRequests = true
http1logResponses = true
http1logConnections = true
}
}
// HTTP/1 debug logging functions, similar to HTTP/2 logf and vlogf
func http1Logf(format string, args ...interface{}) {
if http1VerboseLogs {
log.Printf("http1: "+format, args...)
}
}
func http1LogRequest(format string, args ...interface{}) {
if http1logRequests {
log.Printf("http1: request: "+format, args...)
}
}
func http1LogResponse(format string, args ...interface{}) {
if http1logResponses {
log.Printf("http1: response: "+format, args...)
}
}
func http1LogConnection(format string, args ...interface{}) {
if http1logConnections {
log.Printf("http1: connection: "+format, args...)
}
}
// DefaultTransport is the default implementation of [Transport] and is
// used by [DefaultClient]. It establishes network connections as needed
// and caches them for reuse by subsequent calls. It uses HTTP proxies
@ -1063,7 +1117,7 @@ func (t *Transport) tryPutIdleConn(pconn *persistConn) error {
// HTTP/2 (pconn.alt != nil) connections do not come out of the idle list,
// because multiple goroutines can use them simultaneously.
// If this is an HTTP/2 connection being “returned,” we're done.
// If this is an HTTP/2 connection being "returned," we're done.
if pconn.alt != nil && t.idleLRU.m[pconn] != nil {
return nil
}
@ -1734,6 +1788,8 @@ type erringRoundTripper interface {
var testHookProxyConnectTimeout = context.WithTimeout
func (t *Transport) dialConn(ctx context.Context, cm connectMethod) (pconn *persistConn, err error) {
http1LogConnection("dialing connection to %s (scheme: %s)", cm.addr(), cm.scheme())
pconn = &persistConn{
t: t,
cacheKey: cm.key(),
@ -1752,9 +1808,11 @@ func (t *Transport) dialConn(ctx context.Context, cm connectMethod) (pconn *pers
return err
}
if cm.scheme() == "https" && t.hasCustomTLSDialer() {
http1LogConnection("using custom TLS dialer for %s", cm.addr())
var err error
pconn.conn, err = t.customDialTLS(ctx, "tcp", cm.addr())
if err != nil {
http1LogConnection("custom TLS dial failed for %s: %v", cm.addr(), err)
return nil, wrapErr(err)
}
if tc, ok := pconn.conn.(*tls.Conn); ok {
@ -1763,11 +1821,13 @@ func (t *Transport) dialConn(ctx context.Context, cm connectMethod) (pconn *pers
if trace != nil && trace.TLSHandshakeStart != nil {
trace.TLSHandshakeStart()
}
http1LogConnection("performing TLS handshake for %s", cm.addr())
if err := tc.HandshakeContext(ctx); err != nil {
go pconn.conn.Close()
if trace != nil && trace.TLSHandshakeDone != nil {
trace.TLSHandshakeDone(tls.ConnectionState{}, err)
}
http1LogConnection("TLS handshake failed for %s: %v", cm.addr(), err)
return nil, err
}
cs := tc.ConnectionState()
@ -1775,21 +1835,28 @@ func (t *Transport) dialConn(ctx context.Context, cm connectMethod) (pconn *pers
trace.TLSHandshakeDone(cs, nil)
}
pconn.tlsState = &cs
http1LogConnection("TLS handshake completed for %s (protocol: %s)", cm.addr(), cs.NegotiatedProtocol)
}
} else {
http1LogConnection("dialing TCP connection to %s", cm.addr())
conn, err := t.dial(ctx, "tcp", cm.addr())
if err != nil {
http1LogConnection("TCP dial failed for %s: %v", cm.addr(), err)
return nil, wrapErr(err)
}
pconn.conn = conn
http1LogConnection("TCP connection established to %s", cm.addr())
if cm.scheme() == "https" {
var firstTLSHost string
if firstTLSHost, _, err = net.SplitHostPort(cm.addr()); err != nil {
return nil, wrapErr(err)
}
http1LogConnection("adding TLS to connection for %s", firstTLSHost)
if err = pconn.addTLS(ctx, firstTLSHost, trace); err != nil {
http1LogConnection("TLS setup failed for %s: %v", firstTLSHost, err)
return nil, wrapErr(err)
}
http1LogConnection("TLS setup completed for %s", firstTLSHost)
}
}
@ -1797,7 +1864,9 @@ func (t *Transport) dialConn(ctx context.Context, cm connectMethod) (pconn *pers
switch {
case cm.proxyURL == nil:
// Do nothing. Not using a proxy.
http1LogConnection("direct connection to %s (no proxy)", cm.addr())
case cm.proxyURL.Scheme == "socks5" || cm.proxyURL.Scheme == "socks5h":
http1LogConnection("using SOCKS5 proxy %s for %s", cm.proxyURL.Host, cm.targetAddr)
conn := pconn.conn
d := socksNewDialer("tcp", conn.RemoteAddr().String())
if u := cm.proxyURL.User; u != nil {
@ -2462,10 +2531,13 @@ func (pc *persistConn) readResponse(rc requestAndChan, trace *httptrace.ClientTr
for {
resp, err = ReadResponse(pc.br, rc.treq.Request)
if err != nil {
http1LogResponse("failed to read response from %s: %v", pc.safeRemoteAddr(), err)
return
}
resCode := resp.StatusCode
http1LogResponse("received response from %s: %d %s", pc.safeRemoteAddr(), resCode, resp.Status)
if continueCh != nil && resCode == StatusContinue {
http1LogResponse("received 100 Continue response from %s", pc.safeRemoteAddr())
if trace != nil && trace.Got100Continue != nil {
trace.Got100Continue()
}
@ -2476,6 +2548,7 @@ func (pc *persistConn) readResponse(rc requestAndChan, trace *httptrace.ClientTr
// treat 101 as a terminal status, see issue 26161
is1xxNonTerminal := is1xx && resCode != StatusSwitchingProtocols
if is1xxNonTerminal {
http1LogResponse("received 1xx non-terminal response %d from %s", resCode, pc.safeRemoteAddr())
if trace != nil && trace.Got1xxResponse != nil {
if err := trace.Got1xxResponse(resCode, textproto.MIMEHeader(resp.Header)); err != nil {
return nil, err
@ -2494,6 +2567,7 @@ func (pc *persistConn) readResponse(rc requestAndChan, trace *httptrace.ClientTr
break
}
if resp.isProtocolSwitch() {
http1LogResponse("protocol switch response from %s: %s", pc.safeRemoteAddr(), resp.Header.Get("Upgrade"))
resp.Body = newReadWriteCloserBody(pc.br, pc.conn)
}
if continueCh != nil {
@ -2510,13 +2584,16 @@ func (pc *persistConn) readResponse(rc requestAndChan, trace *httptrace.ClientTr
// Given that we'll send the body if ExpectContinueTimeout expires,
// be consistent and always send it if we aren't closing the connection.
if resp.Close || rc.treq.Request.Close {
http1LogResponse("closing connection after response from %s (no 100-continue)", pc.safeRemoteAddr())
close(continueCh) // don't send the body; the connection will close
} else {
http1LogResponse("sending request body after response from %s (no 100-continue)", pc.safeRemoteAddr())
continueCh <- struct{}{} // send the body
}
}
resp.TLS = pc.tlsState
http1LogResponse("response processing completed for %s: %d %s", pc.safeRemoteAddr(), resp.StatusCode, resp.Status)
return
}
@ -2597,6 +2674,7 @@ func (pc *persistConn) writeLoop() {
select {
case wr := <-pc.writech:
startBytesWritten := pc.nwrite
http1LogRequest("writing request %s %s to %s", wr.req.Method, wr.req.URL.String(), pc.safeRemoteAddr())
err := wr.req.Request.write(pc.bw, pc.isProxy, wr.req.extra, pc.waitForContinue(wr.continueCh))
if bre, ok := err.(requestBodyReadError); ok {
err = bre.error
@ -2616,6 +2694,10 @@ func (pc *persistConn) writeLoop() {
if pc.nwrite == startBytesWritten {
err = nothingWrittenError{err}
}
http1LogRequest("request write failed for %s %s: %v", wr.req.Method, wr.req.URL.String(), err)
} else {
bytesWritten := pc.nwrite - startBytesWritten
http1LogRequest("request written successfully for %s %s (%d bytes)", wr.req.Method, wr.req.URL.String(), bytesWritten)
}
pc.writeErrCh <- err // to the body reader, which might recycle us
wr.ch <- err // to the roundTrip function
@ -2624,6 +2706,7 @@ func (pc *persistConn) writeLoop() {
return
}
case <-pc.closech:
http1LogConnection("writeLoop exiting due to connection close")
return
}
}
@ -2794,7 +2877,7 @@ func (pc *persistConn) roundTrip(req *transportRequest) (resp *Response, err err
gone := make(chan struct{})
defer close(gone)
const debugRoundTrip = false
debugRoundTrip := http1VerboseLogs
// Write the request concurrently with waiting for a response,
// in case the server decides to reply before reading our full
@ -2817,7 +2900,7 @@ func (pc *persistConn) roundTrip(req *transportRequest) (resp *Response, err err
panic(fmt.Sprintf("internal error: exactly one of res or err should be set; nil=%v", re.res == nil))
}
if debugRoundTrip {
req.logf("resc recv: %p, %T/%#v", re.res, re.err, re.err)
http1Logf("resc recv: %p, %T/%#v", re.res, re.err, re.err)
}
if re.err != nil {
return nil, pc.mapRoundTripError(req, startBytesWritten, re.err)
@ -2833,7 +2916,7 @@ func (pc *persistConn) roundTrip(req *transportRequest) (resp *Response, err err
select {
case err := <-writeErrCh:
if debugRoundTrip {
req.logf("writeErrCh recv: %T/%#v", err, err)
http1Logf("writeErrCh recv: %T/%#v", err, err)
}
if err != nil {
pc.close(fmt.Errorf("write error: %w", err))
@ -2841,7 +2924,7 @@ func (pc *persistConn) roundTrip(req *transportRequest) (resp *Response, err err
}
if d := pc.t.ResponseHeaderTimeout; d > 0 {
if debugRoundTrip {
req.logf("starting timer for %v", d)
http1Logf("starting timer for %v", d)
}
timer := time.NewTimer(d)
defer timer.Stop() // prevent leaks
@ -2857,12 +2940,12 @@ func (pc *persistConn) roundTrip(req *transportRequest) (resp *Response, err err
default:
}
if debugRoundTrip {
req.logf("closech recv: %T %#v", pc.closed, pc.closed)
http1Logf("closech recv: %T %#v", pc.closed, pc.closed)
}
return nil, pc.mapRoundTripError(req, startBytesWritten, pc.closed)
case <-respHeaderTimer:
if debugRoundTrip {
req.logf("timeout waiting for response headers.")
http1Logf("timeout waiting for response headers.")
}
pc.close(errTimeout)
return nil, errTimeout
@ -3137,3 +3220,26 @@ func (cl *connLRU) remove(pc *persistConn) {
func (cl *connLRU) len() int {
return len(cl.m)
}
// Helper function to safely get remote address for logging
func (pc *persistConn) safeRemoteAddr() string {
if pc.conn == nil {
return "unknown"
}
// Use a defer/recover to safely handle test connections that might panic
var result string
defer func() {
if recover() != nil {
// If RemoteAddr() panics (e.g., in test scenarios), just return unknown
result = "unknown"
}
}()
if addr := pc.conn.RemoteAddr(); addr != nil {
result = addr.String()
} else {
result = "unknown"
}
return result
}

View File

@ -312,8 +312,10 @@ type heapArena struct {
// during marking.
pageSpecials [pagesPerArena / 8]uint8
// pageUseSpanDartboard is a bitmap that indicates which spans are
// heap spans and also gcUsesSpanDartboard.
// pageUseSpanInlineMarkBits is a bitmap where each bit corresponds
// to a span, as only spans one page in size can have inline mark bits.
// The bit indicates that the span has a spanInlineMarkBits struct
// stored directly at the top end of the span's memory.
pageUseSpanInlineMarkBits [pagesPerArena / 8]uint8
// checkmarks stores the debug.gccheckmark state. It is only

View File

@ -0,0 +1,15 @@
// Copyright 2025 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package synctest_test
import "testing"
// helperLog is a t.Helper which logs.
// Since it is a helper, the log prefix should contain
// the caller's file, not helper_test.go.
func helperLog(t *testing.T, s string) {
t.Helper()
t.Log(s)
}

View File

@ -140,6 +140,18 @@ func TestRun(t *testing.T) {
})
}
func TestHelper(t *testing.T) {
runTest(t, []string{"-test.v"}, func() {
synctest.Test(t, func(t *testing.T) {
helperLog(t, "log in helper")
})
}, `^=== RUN TestHelper
synctest_test.go:.* log in helper
--- PASS: TestHelper.*
PASS
$`)
}
func wantPanic(t *testing.T, want string) {
if e := recover(); e != nil {
if got := fmt.Sprint(e); got != want {

View File

@ -1261,6 +1261,9 @@ func (c *common) Skipped() bool {
// When printing file and line information, that function will be skipped.
// Helper may be called simultaneously from multiple goroutines.
func (c *common) Helper() {
if c.isSynctest {
c = c.parent
}
c.mu.Lock()
defer c.mu.Unlock()
if c.helperPCs == nil {