@@ -6,14 +6,14 @@ import (
6
6
"bytes"
7
7
"crypto/sha1"
8
8
"encoding/base64"
9
+ "errors"
10
+ "fmt"
9
11
"io"
10
12
"net/http"
11
13
"net/textproto"
12
14
"net/url"
13
15
"strings"
14
16
15
- "golang.org/x/xerrors"
16
-
17
17
"nhooyr.io/websocket/internal/errd"
18
18
)
19
19
@@ -85,7 +85,7 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
85
85
86
86
hj , ok := w .(http.Hijacker )
87
87
if ! ok {
88
- err = xerrors .New ("http.ResponseWriter does not implement http.Hijacker" )
88
+ err = errors .New ("http.ResponseWriter does not implement http.Hijacker" )
89
89
http .Error (w , http .StatusText (http .StatusNotImplemented ), http .StatusNotImplemented )
90
90
return nil , err
91
91
}
@@ -110,7 +110,7 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
110
110
111
111
netConn , brw , err := hj .Hijack ()
112
112
if err != nil {
113
- err = xerrors .Errorf ("failed to hijack connection: %w" , err )
113
+ err = fmt .Errorf ("failed to hijack connection: %w" , err )
114
114
http .Error (w , http .StatusText (http .StatusInternalServerError ), http .StatusInternalServerError )
115
115
return nil , err
116
116
}
@@ -133,32 +133,32 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
133
133
134
134
func verifyClientRequest (w http.ResponseWriter , r * http.Request ) (errCode int , _ error ) {
135
135
if ! r .ProtoAtLeast (1 , 1 ) {
136
- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: handshake request must be at least HTTP/1.1: %q" , r .Proto )
136
+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: handshake request must be at least HTTP/1.1: %q" , r .Proto )
137
137
}
138
138
139
139
if ! headerContainsToken (r .Header , "Connection" , "Upgrade" ) {
140
140
w .Header ().Set ("Connection" , "Upgrade" )
141
141
w .Header ().Set ("Upgrade" , "websocket" )
142
- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: Connection header %q does not contain Upgrade" , r .Header .Get ("Connection" ))
142
+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: Connection header %q does not contain Upgrade" , r .Header .Get ("Connection" ))
143
143
}
144
144
145
145
if ! headerContainsToken (r .Header , "Upgrade" , "websocket" ) {
146
146
w .Header ().Set ("Connection" , "Upgrade" )
147
147
w .Header ().Set ("Upgrade" , "websocket" )
148
- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: Upgrade header %q does not contain websocket" , r .Header .Get ("Upgrade" ))
148
+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: Upgrade header %q does not contain websocket" , r .Header .Get ("Upgrade" ))
149
149
}
150
150
151
151
if r .Method != "GET" {
152
- return http .StatusMethodNotAllowed , xerrors .Errorf ("WebSocket protocol violation: handshake request method is not GET but %q" , r .Method )
152
+ return http .StatusMethodNotAllowed , fmt .Errorf ("WebSocket protocol violation: handshake request method is not GET but %q" , r .Method )
153
153
}
154
154
155
155
if r .Header .Get ("Sec-WebSocket-Version" ) != "13" {
156
156
w .Header ().Set ("Sec-WebSocket-Version" , "13" )
157
- return http .StatusBadRequest , xerrors .Errorf ("unsupported WebSocket protocol version (only 13 is supported): %q" , r .Header .Get ("Sec-WebSocket-Version" ))
157
+ return http .StatusBadRequest , fmt .Errorf ("unsupported WebSocket protocol version (only 13 is supported): %q" , r .Header .Get ("Sec-WebSocket-Version" ))
158
158
}
159
159
160
160
if r .Header .Get ("Sec-WebSocket-Key" ) == "" {
161
- return http .StatusBadRequest , xerrors .New ("WebSocket protocol violation: missing Sec-WebSocket-Key" )
161
+ return http .StatusBadRequest , errors .New ("WebSocket protocol violation: missing Sec-WebSocket-Key" )
162
162
}
163
163
164
164
return 0 , nil
@@ -169,10 +169,10 @@ func authenticateOrigin(r *http.Request) error {
169
169
if origin != "" {
170
170
u , err := url .Parse (origin )
171
171
if err != nil {
172
- return xerrors .Errorf ("failed to parse Origin header %q: %w" , origin , err )
172
+ return fmt .Errorf ("failed to parse Origin header %q: %w" , origin , err )
173
173
}
174
174
if ! strings .EqualFold (u .Host , r .Host ) {
175
- return xerrors .Errorf ("request Origin %q is not authorized for Host %q" , origin , r .Host )
175
+ return fmt .Errorf ("request Origin %q is not authorized for Host %q" , origin , r .Host )
176
176
}
177
177
}
178
178
return nil
@@ -223,7 +223,7 @@ func acceptDeflate(w http.ResponseWriter, ext websocketExtension, mode Compressi
223
223
continue
224
224
}
225
225
226
- err := xerrors .Errorf ("unsupported permessage-deflate parameter: %q" , p )
226
+ err := fmt .Errorf ("unsupported permessage-deflate parameter: %q" , p )
227
227
http .Error (w , err .Error (), http .StatusBadRequest )
228
228
return nil , err
229
229
}
@@ -253,7 +253,7 @@ func acceptWebkitDeflate(w http.ResponseWriter, ext websocketExtension, mode Com
253
253
//
254
254
// Either way, we're only implementing this for webkit which never sends the max_window_bits
255
255
// parameter so we don't need to worry about it.
256
- err := xerrors .Errorf ("unsupported x-webkit-deflate-frame parameter: %q" , p )
256
+ err := fmt .Errorf ("unsupported x-webkit-deflate-frame parameter: %q" , p )
257
257
http .Error (w , err .Error (), http .StatusBadRequest )
258
258
return nil , err
259
259
}
0 commit comments