-
Notifications
You must be signed in to change notification settings - Fork 354
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Server memory overflow due to stream receivers retain payloads regardless requestN #887
Comments
This one should be applied only for 1.0.x. In 1.1 we are fixing (#761) dedicated Request Operators to not store anything in memory |
Closes rsocketgh-887 Signed-off-by: Rossen Stoyanchev <rstoyanchev@vmware.com>
Closes rsocketgh-887 Signed-off-by: Rossen Stoyanchev <rstoyanchev@vmware.com>
Closes rsocketgh-887 Signed-off-by: Rossen Stoyanchev <rstoyanchev@vmware.com>
I recently started to run into the following exception for a requestStream call on the client. It seems somehow related to changes fixed to address this issue. But I am struggling to root cause if this is wrong usage or framework issue. Is there any guidance on where to look?
|
@lkolisko in your case it is a little bit different issues and not directly related to that one. (Although it might be the result of the commit landed to fix this one) Your issues might be the result of the recent changes that we landed into 1.0.3, but to make sure it is the real bug of misusage of the frame, we have to see the code Cheers, |
Rogue clients may not respect requestN from server, send frames firehose which are queued by receivers - UnicastProcessors, backed by unbounded queue.
Affects server
Responder
channel; alsoRequester
stream & channel - if server sends requests to client.Reproducible with test below, It roughly models system that processes batches of messages asynchronously, calls new batch with requestN once current one is completed
Test fails with error
The text was updated successfully, but these errors were encountered: