-
Notifications
You must be signed in to change notification settings - Fork 10.5k
HTTP/2: Ignore additional RST_STREAM frames sent to stream #32449
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
@JamesNK Any chance this is backported into 5.0.x series as a bugfix? |
Hi @ahjohannessen. It looks like you just commented on a closed PR. The team will most probably miss it. If you'd like to bring something important up to their attention, consider filing a new issue and add enough details to build context. |
Is there a workaround for this issue in your app? We judge whether to backport fixes based on a bunch of factors such as whether there is a workaround and how many people are encountering the problem. I'd also like to figure out whether this is a bug in the Java gRPC client. I think the Java gRPC client is violating the HTTP/2 spec by double sending the RST_STREAM frame. |
No, sadly not. I have tried various things, but when just as I thought I fixed it then it pops up under different setup. Also this is something that can happen frequently with EventStoreDB as it is common to read a series of streams and look for specific events and end the search mid-stream and issuing a cancel (which is what that led to this situation, i.e. RST_STREAM errorCode=8 then subsequent RST_STREAM errorCode=5)
I would greatly appreciate it could find its way to 5.0.x as that would make it possible to get it into ESDB sooner than waiting for 6.0 to be released.
It seems that it is not violating the spec according to 6.1:
I think that is something @ejona86 is a better person to answer. |
Hi @ahjohannessen. It looks like you just commented on a closed PR. The team will most probably miss it. If you'd like to bring something important up to their attention, consider filing a new issue and add enough details to build context. |
there does not seem to be a reasonable workaround on the server for this either. Everything is internal and I am not seeing a sensible way to try and deal with it closer to the transport. The only possible option I can see is to fork aspnetcore and patch the .net5 version with this fix. I'd rather not be forced to do that unless I really have to. Are there any other alternatives I am missing? |
Hi @jageall. It looks like you just commented on a closed PR. The team will most probably miss it. If you'd like to bring something important up to their attention, consider filing a new issue and add enough details to build context. |
Fixes #32442