-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit usage of HTTP/2 connections #5888
Comments
@sbordet I've submitted a draft PR that enforces such limitation in |
@lorban streams are incremented by 2, so it should be something like
On the client, stream usage On the server, stream usage I would probably be on the safe side and stay at On the client, it's easy to set this value on the On the server, though, there is no There are 2 choices for the server: I'd go with the simpler, which I feel is stop pushing -- after all it's unlikely that the server pushes 1 billion resources to the client through the same connection (although it's possible). We need test cases for the server case (I think the client case is already covered in the |
This issue has been automatically marked as stale because it has been a |
@lorban status of this issue? |
@sbordet enforcing (and testing) this on the server is far from trivial so the balance between the benefits vs the required effort has been negative so far. |
@lorban I don't think it's that difficult. Can you detail? |
This issue has been automatically marked as stale because it has been a |
* Made the high-level HttpConnectionOverHTTP2 implement MaxUsable, so it cannot be used to open more streams than allowed. * Implemented low-level handling of explicit stream ids provided by applications. * Implemented low-level handling of stream id overflow. * Added test cases. Signed-off-by: Simone Bordet <[email protected]>
Signed-off-by: Ludovic Orban <[email protected]>
* Now using a placeholder HTTP2Stream for streams opened with a PRIORITY, but not yet with a HEADERS. Signed-off-by: Simone Bordet <[email protected]>
* Fixed maxUsage check in AbstractConnectionPool. Signed-off-by: Simone Bordet <[email protected]>
Jetty version
9.4.x
Description
HTTP/2 connections have an implicit max usage count determined by the fact that stream ids can go up to
2^31-1
and cannot be negative.As such, the HTTP/2 client connection pool should default to close connections as they reach that limit (or maybe just before that).
The text was updated successfully, but these errors were encountered: