@@ -6,14 +6,14 @@ import (
66 "bytes"
77 "crypto/sha1"
88 "encoding/base64"
9+ "errors"
10+ "fmt"
911 "io"
1012 "net/http"
1113 "net/textproto"
1214 "net/url"
1315 "strings"
1416
15- "golang.org/x/xerrors"
16-
1717 "nhooyr.io/websocket/internal/errd"
1818)
1919
@@ -85,7 +85,7 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
8585
8686 hj , ok := w .(http.Hijacker )
8787 if ! ok {
88- err = xerrors .New ("http.ResponseWriter does not implement http.Hijacker" )
88+ err = errors .New ("http.ResponseWriter does not implement http.Hijacker" )
8989 http .Error (w , http .StatusText (http .StatusNotImplemented ), http .StatusNotImplemented )
9090 return nil , err
9191 }
@@ -110,7 +110,7 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
110110
111111 netConn , brw , err := hj .Hijack ()
112112 if err != nil {
113- err = xerrors .Errorf ("failed to hijack connection: %w" , err )
113+ err = fmt .Errorf ("failed to hijack connection: %w" , err )
114114 http .Error (w , http .StatusText (http .StatusInternalServerError ), http .StatusInternalServerError )
115115 return nil , err
116116 }
@@ -133,32 +133,32 @@ func accept(w http.ResponseWriter, r *http.Request, opts *AcceptOptions) (_ *Con
133133
134134func verifyClientRequest (w http.ResponseWriter , r * http.Request ) (errCode int , _ error ) {
135135 if ! r .ProtoAtLeast (1 , 1 ) {
136- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: handshake request must be at least HTTP/1.1: %q" , r .Proto )
136+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: handshake request must be at least HTTP/1.1: %q" , r .Proto )
137137 }
138138
139139 if ! headerContainsToken (r .Header , "Connection" , "Upgrade" ) {
140140 w .Header ().Set ("Connection" , "Upgrade" )
141141 w .Header ().Set ("Upgrade" , "websocket" )
142- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: Connection header %q does not contain Upgrade" , r .Header .Get ("Connection" ))
142+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: Connection header %q does not contain Upgrade" , r .Header .Get ("Connection" ))
143143 }
144144
145145 if ! headerContainsToken (r .Header , "Upgrade" , "websocket" ) {
146146 w .Header ().Set ("Connection" , "Upgrade" )
147147 w .Header ().Set ("Upgrade" , "websocket" )
148- return http .StatusUpgradeRequired , xerrors .Errorf ("WebSocket protocol violation: Upgrade header %q does not contain websocket" , r .Header .Get ("Upgrade" ))
148+ return http .StatusUpgradeRequired , fmt .Errorf ("WebSocket protocol violation: Upgrade header %q does not contain websocket" , r .Header .Get ("Upgrade" ))
149149 }
150150
151151 if r .Method != "GET" {
152- return http .StatusMethodNotAllowed , xerrors .Errorf ("WebSocket protocol violation: handshake request method is not GET but %q" , r .Method )
152+ return http .StatusMethodNotAllowed , fmt .Errorf ("WebSocket protocol violation: handshake request method is not GET but %q" , r .Method )
153153 }
154154
155155 if r .Header .Get ("Sec-WebSocket-Version" ) != "13" {
156156 w .Header ().Set ("Sec-WebSocket-Version" , "13" )
157- return http .StatusBadRequest , xerrors .Errorf ("unsupported WebSocket protocol version (only 13 is supported): %q" , r .Header .Get ("Sec-WebSocket-Version" ))
157+ return http .StatusBadRequest , fmt .Errorf ("unsupported WebSocket protocol version (only 13 is supported): %q" , r .Header .Get ("Sec-WebSocket-Version" ))
158158 }
159159
160160 if r .Header .Get ("Sec-WebSocket-Key" ) == "" {
161- return http .StatusBadRequest , xerrors .New ("WebSocket protocol violation: missing Sec-WebSocket-Key" )
161+ return http .StatusBadRequest , errors .New ("WebSocket protocol violation: missing Sec-WebSocket-Key" )
162162 }
163163
164164 return 0 , nil
@@ -169,10 +169,10 @@ func authenticateOrigin(r *http.Request) error {
169169 if origin != "" {
170170 u , err := url .Parse (origin )
171171 if err != nil {
172- return xerrors .Errorf ("failed to parse Origin header %q: %w" , origin , err )
172+ return fmt .Errorf ("failed to parse Origin header %q: %w" , origin , err )
173173 }
174174 if ! strings .EqualFold (u .Host , r .Host ) {
175- return xerrors .Errorf ("request Origin %q is not authorized for Host %q" , origin , r .Host )
175+ return fmt .Errorf ("request Origin %q is not authorized for Host %q" , origin , r .Host )
176176 }
177177 }
178178 return nil
@@ -223,7 +223,7 @@ func acceptDeflate(w http.ResponseWriter, ext websocketExtension, mode Compressi
223223 continue
224224 }
225225
226- err := xerrors .Errorf ("unsupported permessage-deflate parameter: %q" , p )
226+ err := fmt .Errorf ("unsupported permessage-deflate parameter: %q" , p )
227227 http .Error (w , err .Error (), http .StatusBadRequest )
228228 return nil , err
229229 }
@@ -253,7 +253,7 @@ func acceptWebkitDeflate(w http.ResponseWriter, ext websocketExtension, mode Com
253253 //
254254 // Either way, we're only implementing this for webkit which never sends the max_window_bits
255255 // parameter so we don't need to worry about it.
256- err := xerrors .Errorf ("unsupported x-webkit-deflate-frame parameter: %q" , p )
256+ err := fmt .Errorf ("unsupported x-webkit-deflate-frame parameter: %q" , p )
257257 http .Error (w , err .Error (), http .StatusBadRequest )
258258 return nil , err
259259 }
0 commit comments