Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ignore management frames for a period after closing a connection #140

Merged
merged 4 commits into from
Aug 31, 2018

Conversation

HoneyryderChuck
Copy link
Collaborator

Will fix #139 .

@coveralls
Copy link

Coverage Status

Coverage increased (+0.04%) to 97.194% when pulling 75253c8 on HoneyryderChuck:issue-139 into 9b4a4ce on igrigorik:master.

Copy link
Owner

@igrigorik igrigorik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 for the test, now the fun part.. of fixing the logic. :)

Repository owner deleted a comment from coveralls Aug 22, 2018
Repository owner deleted a comment from coveralls Aug 22, 2018
…es and promptly ignore them after officially closing
@HoneyryderChuck HoneyryderChuck changed the title WIP: ignore management frames for a period after closing a connection ignore management frames for a period after closing a connection Aug 22, 2018
@HoneyryderChuck
Copy link
Collaborator Author

@igrigorik I went with a similar approach with timers. IMO the connection could profit from having a single state transition point of entry (ex: transaction(nextstate)), which would have simplified the initialization of the timer. But that's another story for another time :)

emit(:goaway, frame[:last_stream], frame[:error], frame[:payload])
when :altsvc, :blocked
emit(frame[:type], frame)
else
connection_error
end
when :closed
connection_error if (Time.now - @closed_since) > 15
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall, what you wired up here makes sense. 👍

One question I have is.. Current logic will cover {settings, window_update, ping, goaway} connection management frames. What about other types of frames, do we need to do anything there? Per #139 (comment)...

After sending a GOAWAY frame, the sender can discard frames for
streams initiated by the receiver with identifiers higher than the
identified last stream. However, any frames that alter connection
state cannot be completely ignored. For instance, HEADERS,
PUSH_PROMISE, and CONTINUATION frames MUST be minimally processed to
ensure the state maintained for header compression is consistent (see
Section 4.3); similarly, DATA frames MUST be counted toward the
connection flow-control window. Failure to process these frames can
cause flow control or header compression state to become
unsynchronized.

Anything else / special we need to think about with respect to the above?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd say it's already covered here, here or here.

Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fair enough. One corner case here is that we'll be ignoring all frames, irrespective of their ID being established before or after GOAWAY is emitted, but that's probably OK. If that surfaces as an issue, we can revisit.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is true, and I thought about that. One should throw protocol error for when a stream id is higher than the last stream id from the goaway frame. But I thought that was out of scope. Am I wrong?

Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's worth leaving a comment in the source, stating that we're not enforcing this behavior. I don't think we need to block this PR on implementing that though.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

after reading better, I think I advised for something which is not RFC-compliant. I think this PR covers everything necessary.

@@ -542,6 +542,13 @@
expect { @conn.new_stream }.to raise_error(ConnectionClosed)
end

it 'should not raise error when receiving connection management frames after closing' do
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"should not raise error when receiving connection management frames immediately after emitting goaway"?

Any merit in wiring up tests for one or two other types of frames?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just added.

Copy link
Owner

@igrigorik igrigorik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 thanks for the thorough job on this one!

@igrigorik igrigorik merged commit 9b5c659 into igrigorik:master Aug 31, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

receiving ping while closing connection causing ProtocolError
3 participants