Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dead-lettering carries over the TTL into the new queue #18

Closed
rjrudman opened this issue Jun 4, 2013 · 5 comments
Closed

Dead-lettering carries over the TTL into the new queue #18

rjrudman opened this issue Jun 4, 2013 · 5 comments
Milestone

Comments

@rjrudman
Copy link

rjrudman commented Jun 4, 2013

If you set an expiration on a message, and the queue has x-dead-letter-exchange or x-dead-letter-routing-key set, when the message is pushed to the new queue, the TTL still persists.

This means that if you set up a queue to watch for dead-lettered items, if it's not processed quickly enough these messages will vanish forever.

Perhaps there should be a parameter to set the new TTL after dead-lettering, or remove the TTL after this occurs altogether?

@ghost ghost assigned hyperthunk Jun 4, 2013
@hyperthunk
Copy link
Contributor

Hmn, this is an interesting question. I suspect this won't happen if you set TTL on the queue rather than the individual messages, but even for per-message-ttl you raise an interesting question about how the semantics should work. We will have a discussion about this and let you know which way we're going shortly.

Thanks for reporting it!

@hyperthunk
Copy link
Contributor

In conclusion, we've decided to remove the 'expiration' property from messages that are dead-lettered, since we consider this less surprising behaviour from a user perspective. The fix is visible in http://hg.rabbitmq.com/rabbitmq-server/rev/ecd2b82b69cc and will be included in the next release.

Thanks again for the report!

@rjrudman
Copy link
Author

rjrudman commented Jun 6, 2013

Thank you very much for the response and quick turn around! The fix looks great

@hyperthunk
Copy link
Contributor

Fix is due to go out in 3.1.2, which should come out in the next couple of days.

@hyperthunk
Copy link
Contributor

This was included in today's release - see the release notes for details. Thanks again for raising it.

@dumbbell dumbbell added this to the n/a milestone Mar 24, 2015
@dumbbell dumbbell added this to the n/a milestone Mar 24, 2015
dcorbacho pushed a commit that referenced this issue May 27, 2016
dcorbacho pushed a commit that referenced this issue Jul 5, 2023
Secure replica listener using a one time token
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants